Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:03
Static task
static1
Behavioral task
behavioral1
Sample
65a06d0858d695c6210f763e1b7ddfa9_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65a06d0858d695c6210f763e1b7ddfa9_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
65a06d0858d695c6210f763e1b7ddfa9_JaffaCakes118.html
-
Size
28KB
-
MD5
65a06d0858d695c6210f763e1b7ddfa9
-
SHA1
8afb4ae8bcc4a38b49004c34df2c80d083b6d8bc
-
SHA256
ec9471e7d0af8326a09ad0c30bdc471daab32794e98b3c5d520145a8a26c1ecc
-
SHA512
14a114b364d159466f1c636f65b5433c16abf16e0a862bd17a3ff7876cf189467e60325f1dc28e3a19f9f5edbcbac09a9eeb7adea02bb7921776ab3731b0db11
-
SSDEEP
384:7IBFc9Ijf6jIBUhbhm0ohtz1pFALVFxNQq872pM61IPCf71F/DC1hIMSPIYln:7I4vjI6bhml1pSDX8KpM61Jz1F8A9
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000004b09d25f88ba957df81ae047d42d1f77a93a2bab9900d6fc33a749c3a153cad5000000000e8000000002000020000000f21dd5153a68662e2d2ae78aa121b53453ee8ddb494f839726e8cda5ca8348672000000088bcedf660b6a69b1e83b28bc40d03e3dcf57241b6e28d44204c571af440277940000000ed499378c74ed2d25fec48e69f043f54dcf0be067d23043456688b6c4a8cd6bb12a5ad6432959aea3f4ad709430d67111166fe8d95f78a08b56a2d6186e758fe iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8AAB78F1-17DF-11EF-B21B-FA9381F5F0AB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422505301" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0308b5fecabda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2840 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2840 iexplore.exe 2840 iexplore.exe 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2840 wrote to memory of 1676 2840 iexplore.exe IEXPLORE.EXE PID 2840 wrote to memory of 1676 2840 iexplore.exe IEXPLORE.EXE PID 2840 wrote to memory of 1676 2840 iexplore.exe IEXPLORE.EXE PID 2840 wrote to memory of 1676 2840 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65a06d0858d695c6210f763e1b7ddfa9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2840 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f9400a259246f5d325da18a9bb0c6017
SHA18f4ccc2d6c3f5f6c9c550fb66caae0ef6773a911
SHA256a75a797ae5bca986f71d22feef2535bb8ba1d628a4d4a05437b8b5940ae3c503
SHA51229f2710bedd26dfc2e066d03da683d77f94c408a28d7e2779df3b4c3c167d0fb23758dc8d0e72cb123942b0a72c9d6a915b5793236b77cac68f1ea265478bf73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD592e087d7dc7ca6c39e26aa50fb571176
SHA1a2fdf8fdbf14f0f85f5c06886d4cb175d9d3e3fa
SHA256b94a41ce6b9080cf512c8eebf4673c0b243cbf3a53c0bb2b7a2f57960dfb7eb8
SHA512604fa18e33d47e59cdfa347b46fa2e0df10a03bf4ffe46ccfd3ac233c3265f83ae4619b6f660f7e800593c1026dd22a53cc6e9979ff4113aa9523094705c154d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55e210474a22cbd7d108bf3bb3b3c1542
SHA19d2c063e515d10e54a985921af4177e4c862dd38
SHA2563d0108b1f634f7e15fd4e5ede13f3ffbeb18f6b22ad61fe063219197e051c43d
SHA512e64166840d1d066bdf6ea3d5289094ace735139a1ab425b80030fe19ee431ae935b7ae35a1f5bd7bce2310871015c737b45f8471df4d9e24f9394b61a4e3c548
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ee60aff03d16d34e0a7b5ef9ab2144fb
SHA12248d5aa9fa9168b8ff94be704a6954ee3053cf3
SHA256695196e06f4f6259bc68b8fcd8511107f3d6b017c58c4d7e285578e661c57f41
SHA5122d23979a271653e8be1e68f28d7b34e535d335f9b30789fc87ed0a10540ada92cc26fa5d4cd0aeef89bf09497d6eb7fd38e48b73c381d15aa5446cd2460983f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b9690f9bbdec9e60da83fba49c3bedee
SHA1d77c3d73fbb212d5fd9d118c0a344a98f8358597
SHA256af105adbcb224991823868ac3f9b226993bbfa7e0472b058a6130d5086a39468
SHA512886f7eb438b679b29ce78b10160eac1b8ee75245c69e66137ee80c624361767683410f4b07d7e63031d1a27db62c9b32638bb9b0f5830911b405d742a49451d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f1341036e8afb1e8caea74122906235a
SHA10737e950a0d4703c6603cd363fd12ea23628b7d7
SHA256e946aff3cfdb50c4e67357b10a531e13031b8095260be457a0e97195aaf84846
SHA5127b5082295185067880dac832e9fdb390f05aafd97d57ec42882a5d56966d08deb0e447c68ec77db6fd1e8b372e631b464caded6d349eb2adfc28cabcb48c09e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d25948c26e60bf15b40f51afe077aedf
SHA1c6c65c403d7108ecc215174d9d644ac2ca237c83
SHA25680fff194e2d0f1d4f73b8ab3d0eed5c2da307be37ff505eeb93940724554f161
SHA512f46d7af6dff71117f612a97e27fd568f40beaff02ec06e76fccb53015400ae07ed666fd640b319781dc9b02bcee808372ff23dcb681c1acdc64a775141bddbab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b1f78f434277ea1ae215c275e8ceadd5
SHA117394c11051630c43dfdc95b8fff134e20f0616f
SHA2568fe6a37c9400b4a764375e233f1e95cde5c93e3628cbd890bc8a1950f6d539fa
SHA512958a7a9c56f45c30cf6aa088172de09c45b2dc7ed53082d01d9889fa58f33778b0efa73059464d28639a6eac24fb26803e0dcc30b3e7762f87d26219ca980aca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a018b9041762ea3dada3f1133e32d178
SHA180233092062838af2429e5a8105f564512346629
SHA2566442447c42a678a44da04b3f6df919d37f1d5d2e3d411ea7fa37726d6a5b3575
SHA5121c7e74c3819c9d40d1e51d29da932eff9c6e574b3d794803e5a0eb5324767f0a556538806da2d20e7a248e66fc63c02375a352c7402a476832db5afe9f2422df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5773b911ff114a89ccb54db92b5a4aad4
SHA1109f4e5ed278bf0cd29421328a4761831655e1bd
SHA256eb9d7ab7043eb32350ae98160ec8ab0bfc97b1e1bb89860fbbcea83e1e2c4fc1
SHA5121deb1f09a309853f726f7f1f37756b14647e32541695ac020e0419b4dfb90fb8162c8de1cf27c53f580711d7ba0280c996bf1b0aa9796742590f86b97a485de1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD557a64d08a2e93776e7f1ed7cdc7855d0
SHA1ee83d7e52c97a69600b5b0ced4a08b315e3a73f4
SHA256f4899c424d20e0c6bb35122670c95c0be00c438df39f627c4cebc5660997a4bf
SHA51250b4d98dca58bf35bd3d9b643eb140a254bcd0ea331c234e7c4504272c4bb95af12c6dd8f8b34f7380ccaa8898df500627d2c4756438310c213f88dd7361574a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD50730afe81093bdad5afc80aa018fa900
SHA1e912c6bcf3be3ffb4216168121f352c21004ac95
SHA25680574c7c67ea066302cc3408d106da310830916128bd05490633f9079d9f0faf
SHA512e332e2b39d9d78dd6157eb97c09ffe792bfad24eff6dee4d95a5f574288d0edeada579b2f352bc0359d26551c7865147b64fe4acc69d557414efbae8fb42e2e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c04d7afaccee0879e3eecfb2b410abac
SHA1a2a9e9a744cd9ea7290274b16b6c40b5f1baac51
SHA2560612b1f981a5a1543a1800cdf37d2d17ee810ea080367d7465db5c707e100e14
SHA5122b3773199961590af5c129ee3f573fb53e6581bfcc0d733398e9f948e2b7e5bae551cda72a258e7234a876775c2757c6e6739b4b159e6dda047c188675187f21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD52c9addba23cb201d62fe8732bb42ce9b
SHA1ed26e13723a32e4f7f06342e027e75e29af42a2b
SHA256f23dd21f1d5a7342c4e77a812eca19cc095918ef154dd86daa992255655d37dc
SHA5126335e5147cc96a5168feaec04e882a8b0f7e8ded4cf0cb521787dd25686516ee48755e431ded4182b52d270036ebdcdaa24c421bf511892344a440daa1230bc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f144f28501d8d72cbf2724bc2c476dbc
SHA1216dd70c58afb237667c3513333d7d5cf8229cf3
SHA256b4f58686a0b5167b69d372d0defe50772d5f9b42848ec634a428e7bb6ae57136
SHA5126105b301e2ea236609601183265d00d1c6e656a7d4da2833c4e9f016b8e55fc50908a578245e60315dc25034953ddda3bf59cffd9a297f83d2b9c12b92f84f03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b52036faf7fa9e2bb76531ea59ff9d50
SHA18affa1b7214fa1a3cce6d0024f65f2f4f4bde15d
SHA256ba24babc913899d84fe730bec1d5d3555d4f3177feef915217bec9f69356158b
SHA512a5b0ae7ebdd018a0cc31774fb3c9ed1727eb715c5abe76f775098eb2fcfb87e70b5b19a80a7525e0336d5e7547cdcdc4655bbcf59f404a25d3034f30f417ff75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b9d0a13711d6acec0f0c08749eba5989
SHA10ad74988a665c5f6617fb52573ea7f3ad9162c78
SHA25630a693daa79eff067ed7a5cf052e5d3fc106b5f777d0f557d5d0d7d99c4778e4
SHA5124198db7a64525a667c2e6e840ece6ac09efcfaa3f66fc789669bf3e35c9e80bc7a7f84684ce1af005967e300d7972ddee5e954c4a093f59c642cf142cca038a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5dcf9335d63a06a381c69e3c27f038a96
SHA12b9db9bc1a511e65e0245073ec823446834f3f2a
SHA256011bad95945f32aef2ba33c093505eb0cda06b3fa60b583021dc572f84e57649
SHA512c741871a0a9e10a73aaa66c31d8dae03c24307dc8ed2b8fb6f77194be43a64730789fd9a84a35856637b5b6448e6fd8b43ecb3c380976a4a56edc05e8f451f24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e7535475089bbb877893aebc9c828174
SHA1b408de5cde9bebfb3f7f6ad863c6f7e2c387f6d5
SHA2561135741a552274263fb98b6cf628b5594c4c69b8714baf2873468085f37ae846
SHA512a2ba1c379d7b2b86217fd25561b8749fab374f8510f01f58a43c1be82181f57c92eb0b94710e9a60f5fee807d6ad66e0d296910f661dd9177476593c2f23675a
-
C:\Users\Admin\AppData\Local\Temp\Cab3A06.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\Tar3A58.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a