Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:03
Static task
static1
Behavioral task
behavioral1
Sample
65a05aed3769672888b167f2ce607e80_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65a05aed3769672888b167f2ce607e80_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65a05aed3769672888b167f2ce607e80_JaffaCakes118.html
-
Size
25KB
-
MD5
65a05aed3769672888b167f2ce607e80
-
SHA1
f7ff9bf93f299d1b048b5a4aca3ee0ed483d7e17
-
SHA256
c7c8487b2d2293f1679059e3c475291740897e35c85d375471bd53d7e5a517ee
-
SHA512
974946d7496a26326752b8b5d0e4c298d515f544c5ccb96e11198277dbc276c29c69a43f32127ef3b7dbbfab37c1c1470450bd8dc568cdf5c839e2211c175193
-
SSDEEP
384:SOCST3s3mBBIkSgjCujRPZyrKwGMXR8DI0tPShDwbzdcc9Kjtb:S/wDwGMXR8DptPSU8b
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000cc96f36e49a7b84ca5376f9d46d3ae8d000000000200000000001066000000010000200000008156a584744c27dfcf56b39d2093c6d8400e4ac79f3b46a7a7f4b83081098b18000000000e8000000002000020000000d78cc0a1204d9798cb4225270faa2e1708e0afa44e4fe519df62c57f760b46d92000000003fa68cf917f4ab8cd773079f960048a220d387bbdb0fc0959267e833682f46d4000000076f9808d48646daeee4ea6b2a9f8bef61e7ccd25f8427f6dfa0a8083a946fb0223cfc8586ea4d8c15848219074f7b576ad62021ddeb7419b994d8386beff2ecb iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422505294" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{86783F21-17DF-11EF-917A-EA263619F6CB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 302f3f5becabda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2732 iexplore.exe 2732 iexplore.exe 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2732 wrote to memory of 2776 2732 iexplore.exe IEXPLORE.EXE PID 2732 wrote to memory of 2776 2732 iexplore.exe IEXPLORE.EXE PID 2732 wrote to memory of 2776 2732 iexplore.exe IEXPLORE.EXE PID 2732 wrote to memory of 2776 2732 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65a05aed3769672888b167f2ce607e80_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2732 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53762bca43debff6fbcaecc2ba39c817a
SHA14080320037c0a907082bd1562bacdde76fc5bf52
SHA2568a3fcdbc25f8f3950b010ed2095613535f3532859b284910f9475bb7339c46f0
SHA512466dcd6bd6cb9ea2572bb5e93888515cacc5a3efc8e32a772769056be628712240cebfe7c818585c7f40705e3dea59b30f81fe19368bb34df3536e4fd5b9acce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8397ba98ebf1d44c0e4b87951115702
SHA1fbb4f3fe7856d1aeca686e8bbd52640136f05a68
SHA256b8c1cd28c9cfa00eab7681a31d9c7878cd73ab6dc32277c220c4a6f0fce7184d
SHA512dc9c163529179d8071419810b661034718ae4f6d668aa1593e1c18c7a7650c01c9cc9855b3d09c2386365b226eff99fde81e9203fd9e3aa15bfc61d85c877ecc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2e3f6b647a95771dac80ea705b4bcac
SHA1a768197715795c8b81d1d3b5eebca9971a106c5b
SHA2561ae934325141b1292998fbc86a5bb071de83b26ae125f508cc46ad380c86a96f
SHA512c52d8dbc52166c1a666b9b00eaabdadd06d639f1cf7abccdeae9352208cc203ca936e3edd2409a4e161dd343f2aeb0f449c661da93f9663853b79a6694f3d5f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50339801211ad952052d3658a59869325
SHA118f919ed69ed317fad37e8aaef1c63360e29d760
SHA25608a4f6a91b184ae0016b380cdc25e1866bbd81abd4b78c5268b15f61c0bf66e1
SHA512bc6842dcfefb1ebaf4b6a6c37d8aaa976ae1902139ef12f496a551b53c26e33e92ebea5bfb0b7723e842f8a87ec0c64812cd55af0379127722beee8c83f3edb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a534cf5847e65e2016a1faebfb0af41e
SHA11a5fc7739c2844777100bc9b3f971064fd0a24bd
SHA2563152bc3f8c31ce280b596943e3327a6ae180ac29e7848b22fd0ed838f3e4e489
SHA512e9767b498f78ddec49f5b6f89dff80b358d21e9a8378c9ad00e562766d931bb8cdd9d39d02051b4c09d6f645aa19a133112071e38be0680fce9389e406783284
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b73203a44f016170822098246d2c137
SHA109f6341dbced2f68e94d27633fcf2ba14500f0cb
SHA2566957230258659a4e26b8839b523aef3c4ef5625ba97953c064b38117d5e3021f
SHA512fbf00ce51dc33d8cb3dad2e2b720e9720ee706befd9147bff62fc1e803fa092171866ee36b1c0d8d668fc92bdd3f805cd5dd7c12d126f19749131b5f57371295
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db7dcdf9c591e9143edd2f3f289ea2e2
SHA1588b9a52c87eb4d5fa51de17a5963c52bf834b95
SHA2565181d63fb14a8119bef36eb3c308f320a4db362d66736413523377637dc7d920
SHA512ba90036b70895428d8a7b4559905484f1346c206642cfe1ce66341dabb24277e0329979a5b8580676affb60db007c718cad44e561f6729de971c191039c43530
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593be12f9dd180046c2188276205b8037
SHA11d7fecef2638bd71a5063cfe02233543d3239024
SHA256684d969a235897545db09a35367c541f64e53ed475de2efbdf71f7a287331f9d
SHA5121ec308b3782c8549b951646e5c2760c537ace3c42b1d7fb6e814ec028bd8c0eaaa7a3bea004558a7fc82abdec501ce23359dcb157c46902b57b085d39df72a43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f9365e7c7350844dcafc47d88783400
SHA164925d8a1701293fdbcb01a4ba6da5fbde7f4ac9
SHA256d90b50e514c52466fd9dc862edfa96c62fd9f74c9cd22058dd74a11f76398efe
SHA512578d5d20e7152a6d8de491236674f4bd74b8150b8a56521ec24d296c7ef995d7e274dae30a0317013832bda32808dc23bf9647cf6535a2fc7107a2ff5363c42d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566ea8077aa12df6b480534a1a3b07eb5
SHA100d0919b4b71f20d99dd3e8fcaf483e54f934819
SHA25679814c8d8964574b7ce11e8f1944714279e5a023fa4f9904f3d7ff4bccdd0ce3
SHA512eeb052f12c94cd368ae0fb219a6159326b3f28f24b76c12dda43e83b899b1b6d220203343433f70984c1c1629f0e2f27f7f0dcf8ddbcd9fa618fa09f06a0a08d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5acb83b71b6f50694651a3e749b2462
SHA18fb11c5e4a3877663e00816fb6703b8c582eebe8
SHA256e9db1d518cbd0bef66346ae6f27df8baf8a63b6237b855caad2498a26bf5ae3e
SHA512555c2dc60676cedb0597e92e044735d2d1623d0009a71367774615a7fe8c5a648335038863df7d14ac971db7cfcc40a830a26568f9969d22caaff209b041c73f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb99fada67a27782db087e89217a391a
SHA1fea65ce542e63ede407eb142462147e576631dfd
SHA25647dd63584c1570a22f07f80ff29d9f943c152c6d99aa3202eb2708f9944cd42d
SHA512acac7a1ac163ae2d7528c9901fd58e3935b0738e32f8df1220d33c534cfcbc42926ac6b6b857049404a62da218694b46d57edcfa94376c9d8a6aa60f4516ef86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb24ca01af67cae672224ec92ca3e989
SHA116f6b210cda48895472126f2b3b5e2a8442d21ba
SHA256a8e89df4a4c00dc383f1a1c76a39cc086ef36d7ecac1bd961124baddf7f24ceb
SHA512be4d2dd45dc03b69a673912514b312d2bd32f1e390dfa01bdb994f2127d437801eb45c5e6f39ac1cd86f5696ddb38145e55e5dea97c98ebd18f7e353ca5771e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517d2467bf4f1877daa55cb31491f396c
SHA19ee7552eab2b84b1001caffb32e04752749d8316
SHA2568bd1735856e1c8afbc27b9f3cc560b5c5f9828720c254befa5b2807af6893c85
SHA512147d0076b3a00d3c1290a1c2a95a250ff7dc6f791399e33fe9a09e64296901267f9ba0d70c38a3a4c1ce20fad7a1e623d5aaad94f2f1f8a85d56531d877d12f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53295ee64f2af50063709897f9ff842df
SHA1a937a9fd1d55fe6f9c05790eb9d28b59a212ceea
SHA25663b3f8fcc91b86c57272734a837392cf09743561ce5fb9f1d065c1ea6902158a
SHA51207fad85f708dd9c1b22e604d07d9d85f71f0ecb0a35d4328fa41e5dc6e226d77cb42f4e26046c7f412f2d559d00b5292e61e599141a809032ce5c9d24c3e8d03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2beba70855943255199159c0bc085d4
SHA14bfb1ea69f8ff0a71782b96765d849e04420cd44
SHA256bb37c7a37e1c4d0e5df446fbd004137c244a6f3d73390f642139f6b9c6379e5b
SHA5121337e6d4f9bda9e00e9129625fecfe994831048298ee654c4217cb9fa3f60f826205b3ecb69675d05e939e846100e7984b258cfc88efcb1117aebe97f0441ca8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56048155d158b4661ff4791108cee17db
SHA1883d57f022b5112a300baf2af34842bd04d912cb
SHA25640af8b32dd6d3e5a624c6af6bd5abd010b1400b3c0469ac5ec43c5e0d9ffe52a
SHA512cea8acf7e7c3904cd5f3d4d5555012ac008b126bed002cf6c9dd36eb614e53f55113d2edda42a08ad5ad37502094c78cfa0dc5de0dd35d9abf21e0d6c2c6af3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fc00c471660c6c57e45e0afdd35a8bb
SHA198ec9e3d2f8ba40ce6552e10656550dfbb426155
SHA256d9541c28ca463036058f53c2fdc6964ca838ed81c4695493f5495b2e0571355c
SHA512175294fff6e0642be7781b2b9c1e1f92500537a1d605f26c13d70a718969511ce364f1c517b89cf708ec33f4b53cb2a169f242ae9033d22cff36525da217ac3d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a