Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:07
Static task
static1
Behavioral task
behavioral1
Sample
65a315952db2a300e08f0c6741dfa24a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65a315952db2a300e08f0c6741dfa24a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65a315952db2a300e08f0c6741dfa24a_JaffaCakes118.html
-
Size
44KB
-
MD5
65a315952db2a300e08f0c6741dfa24a
-
SHA1
6e3b1bf6476fdc7c1a2ea8b36a503ad8b0c18802
-
SHA256
17ff6978f0edbfbe7d5920d0169ba71d4d6c4c3f98e4de449932b285f2ea0d61
-
SHA512
7087f35671cf92fad55229eb1426a991904569241dab260dd8e45a63a5efed03ce6db85aeb9512d08d418bfc9c39b32030cfa9e654d84645ab05f24e9e2221d3
-
SSDEEP
768:tqKKni/YR9EiZGBAS9O0A9En5DnjCW945F631H3PRGojCh2M3k6HE1n6u+YMIFCB:tdOiwR9EiZGBASc0A9En5DnjCG45F63q
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422505497" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000920c4aaa7cdc6060fa4ad482d188f73c7e8667b1cf3a8b4aa1e0033442bddd54000000000e80000000020000200000000afaeb2c55f8e3d51dda6668ec138e959ab45ccc3fee2f484a18b52936fa2a1220000000a330abcf91fb92da8aedcbd12d9f68aa2969d79b7ebfdcb34f1ad4ec28b65c2c400000004ffc6fc850cd69102b33799e920d264fc6cb34f69774ac9897ed1e10ea0b616120fca19120c2305f114065be93ed61aa7070312991ace48c0f68830c4b97a1ce iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FF796B61-17DF-11EF-B195-DEECE6B0C1A4} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0e4f5d3ecabda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1832 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1832 iexplore.exe 1832 iexplore.exe 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1832 wrote to memory of 1964 1832 iexplore.exe IEXPLORE.EXE PID 1832 wrote to memory of 1964 1832 iexplore.exe IEXPLORE.EXE PID 1832 wrote to memory of 1964 1832 iexplore.exe IEXPLORE.EXE PID 1832 wrote to memory of 1964 1832 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65a315952db2a300e08f0c6741dfa24a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1832 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5713faca755384cbefabd5322f5fe3cbb
SHA1fa0d9b862dfcde08e593d05c5b7f094cc58bb77e
SHA25667bca8b1e869f4630c2c001fcbd5615f9ee1caba3ebc734efcc00015f0d5b177
SHA512cfdf07da6ac4061b0b2fe441021ecac860c491b03a7637b8b7780aef4b93794b3e5a43189522123d0f5540b1930506147d16a4b155e9b28c18c6587bf378a675
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5700358506d44512d66e6655941ba130e
SHA1cc71d4ce19a4b0297f8689e8d9dbef5851ddf942
SHA2561381c6f25af1e7dd0d394dd8f76444c23cf8f2769e8486e0237612c3e4b95f52
SHA5127443a2a7289cdc0c94a09f6dbcb26f24f48950bd7deba6804cb4b3399c077db4e026ff2eb4bcb0fe469fed4e4e57ecf78b838fd40c5aa78a66f9a4255fa85dd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a163355af3f4a3856b767849ededb10e
SHA136eccac3b96f160c884e914aa03b2fa59be5caf1
SHA25618d2d039dd365894768909aa38e9d5cde8905fdab7bd57c73a561415e422613c
SHA512ad3f10c952b34a6b90954243d49591772b56df5d2715a09b0643f70877e8ccb6e299eec48ad95f200944b75e844d52fa44ff531383c3b51fcd5ea552ebe0633b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a41c6767a11936358b72bb12b97dbf9
SHA1471d7fdb57df916b00c306fb5b51c7eb8901c5b4
SHA256c57e6e49d928135e2a0ec0a85422edd32f8a4720f4a962176b962348c4002ce0
SHA512fd54bbbcc103c2f72b0660df90f855bb561daf5ce4fd066666456ac2c8f980970ef8f0cd58ef047bf893d64dabc4339c337c3e20051457643b88796d9a44c29e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b040ee11c1f3b541f4cc8a514b9689fc
SHA12dbc29d59affc493f3e2eb70d7c654dfba984989
SHA2566955036bf0ccfbce5f73163119932cef9a8853c300b313a7126f5c84368fe761
SHA5124de4d8c4e31c26872dbb4762c8bd45faed88f2731b3e53ad2af5a89033fa4448035bd3b2581baa4d9ce9347ff239bf622549fd914c7f520f331b283834e7bcb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575c579be4787413880f0227a769f2885
SHA159285dec04a16a6c28c6813aad59fd367b212221
SHA25618141a48ea694b8aea9f27347752a3338bab5cad5307864f3945ab462b724f2f
SHA512b6890942fd87e751029b3c5a352a0dfc3d141fdf31500e00e506a1cd3723eb571fe6b09f9f8215a9e4eee30ff891eb7f957281b6a2320658a4c86b2e3e9de102
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cda249c9621699253e065673490ef8cf
SHA12c124b323fcb94aa1882093a006b47acbffc5cb2
SHA2564320370e06a608d9957410c9cbd3888eca371093082b246c699cd2660ab6bfba
SHA5121135261b450c27f29ab94659465ba947926de872a1bf1fef1eda538ced275d1c234b49df0a06c32955790d84aa6642be1086226fe508195cde6651baa9b7d659
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d834a97204184cb94d919314aa3d7fa0
SHA1d6fd2571fca7db0ad3b3308d4a76be9dd7344190
SHA256abbb8e7f9a9b9604620dfd143ba8861f95150a2f2d65eef9722f8ed97148b68e
SHA512bd8bec8bb2be745c7687efad8bad38c6477f5365f15ca8bd75d03696afb3bd979b3ef73c28576380c4e069b6ebab16c34b768baf24bdffdcd5ec4d453bb17d00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a59eccec342ca437fd58efaa04fca1a
SHA14473a23dcfa8f9423750159d3ed87b6498babbb9
SHA256d3e2070e730a8cbe3b64564e7f346d4ff48ed2d2612730d7ddef5f4c8b231757
SHA51211d8333a2ead8bd759bc3cd2b39ef548bd96f6cf6fbc57e8a7381c4058548f0789ce1b10c228d002f1b9283a2ebc8de7c94ff783808913ca36decbab61ad2ac8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f5812cd2012830d442af07f1a37f593
SHA1d2bb9ab2a166f0af9cb56232247a303a7b76ed73
SHA25670c34c7258ae7b715277b8c4751f84da16315e71d88c867b49372b9980073235
SHA51278dae5061d963dd01e2eb6f9863294aa9e9fb351c64071fb2e3c5b85dacd739cff60ae2509b6acdff7f6c305705b69ec96f563ad68f7e07a4e40353f662eb98a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bcf905f82c7257ca65dbf8fb955d79b4
SHA11b761d1af8ed77e4200842c7ae5b320bdbceaac4
SHA256839fd1b84a01cf8a3aa833cb37e716fbaf394bf5657676b92e573a0f96ef5791
SHA51250d67c8104d1d3a8f73806bdebd3002f313618117c42255c383d5ecc0d7ade0b5d0f62e7cfa4990d581e594748c49a3c233a55f5e80a0653694fb58473d4cfa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560b4a72779f74e60cca418d5a7966d41
SHA1b709a39cd9daa4a0e572c9aabbf2b3f59a02d287
SHA2565e26532117474d572775691ad1a25c5065742b723aa8f5ff9dc055c6cd207ed5
SHA51271731087332168bfc1a998acde573f8ea4bcfb7e35c35015a184ed1b0f044d4806f4e0a6251379a9dac52b839f918d629ebc9e1e3c8c4f0dbc15bf465f5e2d7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54690624bdb00561434c63b0f676fde73
SHA16e9073a21ee430a9192188a9919f1aed83a542a6
SHA256634fd1dec4f99a0e98a1c798b78cf10d0f47f07f02907a746d35eab0a0d1a711
SHA51298e67591904a568df2250b38e36eee69eb30512ce1dcf4e156502ef47673b3a6efee8dc82710bdb5d7e56584f6f5958af73edc1a232be4aac4eb30953428c575
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7defcbb132e57b8f5cd4a8061c676b1
SHA13f7fb88e4378c15d9b98e8dfa48989461505f1e3
SHA2567100bc761842946f725ebafa064e59959f29059efb578252d709c74cea9c0ad2
SHA5127b7f50435ed9c75d0033b3ab48a539e9c077fdc89f05042ae1dd2252b9f23ee4b46ffafa4b9f42aa3afad1bbe54d598f553fb692ce93365d10f66894f9c6e2c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d39cec8553c814909f5515118350d564
SHA1496455cd4d8a9927873c3ae92f41d21a1a877810
SHA256e25e5b44260999f319a57422e71f8845716cd31beb8ac8082d887415fa272d21
SHA5129afad5ad34a24db897e521c47a37b01209e1a8a634b8cb97633dd2d3ff932e529fc0e6e1799a9bee2ae719ad3b50c2b7f0f16f955c8831c0782f9817efee0c64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e670e4f6ead8034feca52f8e30936fb
SHA1cdb45ffd4d7642258a3a5ffe73d43feb79df7c56
SHA2565b93ab022b0d2df97cd5478aec9417f89548c44778d37248f2f6db1697eeccd5
SHA512082f9ac4098d1e4f69a8c6d59549367b42dfcba2dca98f7d423f273866c94fe1d19579511c1f211261c49280b86dd67710a9eeccae45d2d06109c5c346b36b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bf03483848fb813aec314ad068f074f
SHA133df405f730f32ef427e285e271f50ae4550c6e7
SHA2564b746808f68df2a0b81d9e0873c8c4a4a2e34441b441caa47192aebc9a192264
SHA512c2fab185d2f6b638ba065e7df7d467638c0ce5cf47498d0e0e7b333974e9309de983ac6694af8720f7305e2b89ea84730fcb1308c96cbab35250048c8a6bcbd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc21255819d42f8cdf796d7231509885
SHA12d07b11ddc443b68dbe8b46e8bd7ef8f954f6bd4
SHA256984ce963a1424d435778bf73a16faba737c8c1a7105c0820709ca525f5795143
SHA5126d642ea2249cd4bb39f43f47dfab3380d57238f2677b62dc0bc74634802f42ff5c80f75b206a88a5cca6eefa1a735007968a07224eb3438a2565fefa44c3295e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a40a47235319165f30e7fa6084032844
SHA11085380750d5069a026e1ba8393679b8fc2cf2dc
SHA256d4135c2b417a1d78abc997acd71c1a4324c5eb5c6843d00dcd878373172eaf95
SHA512b52e2c99ebd8c08cdcb20dfd16e1d54e9940bc12be70075df4e5ecca31d13e31e25c77595cc2f3280936a6af489668f429a45f3a7d0ff8552060f4539b9e0788
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a