Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:07
Static task
static1
Behavioral task
behavioral1
Sample
65a36fce3611dcb07be50b2b7b8933a0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65a36fce3611dcb07be50b2b7b8933a0_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65a36fce3611dcb07be50b2b7b8933a0_JaffaCakes118.html
-
Size
9KB
-
MD5
65a36fce3611dcb07be50b2b7b8933a0
-
SHA1
0ae6e878318d6d775b7f8ea8acaca0e8797ad382
-
SHA256
6879f8500378f0c79722197b870d81379c07cc6ad06738804af29454d273eddf
-
SHA512
3cdd41bd78804bbd1c4e92b0e2c0207e34e042198d9b5e8e5e2e248def910805f9232847cc3e5ea771be1b0c97865cbaa3fc89c6129c38d37c69a35af878d823
-
SSDEEP
96:SIpWcD8dQcYWUYu3OepKtyJRCy3XCy3CyVgRB74ueMKNkGOXOBHUIX03EYXbbbft:SI4xdVUJp8s0Zz2g78uM2PeBM3f+EP0g
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422505515" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008683a508aa1a4f469541a53d0b21e3a600000000020000000000106600000001000020000000250d625a43349e2edbf0ffa012fb7db4abf0e4f510005811c7596af73edc7a19000000000e8000000002000020000000556097b8dd72e5516541b9dde6aa640b20474bdd80da2b6daee1fa1a70b9f0af20000000a70b1db9f72425bf3b9d3cb0b1e1acaa9acabb410d903c6eeabf15c1406714864000000038d8331967d435c3bb275416008a76d27e54e92a012722680ffd3c129ea35c21d3b60087f6b79439c46f6f17bf141d3fc16e7600ee3fd339ba3dd5e5a349d456 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0997FEE1-17E0-11EF-805C-EAAAC4CFEF2E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00608df7ecabda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2196 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2196 iexplore.exe 2196 iexplore.exe 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2196 wrote to memory of 2504 2196 iexplore.exe IEXPLORE.EXE PID 2196 wrote to memory of 2504 2196 iexplore.exe IEXPLORE.EXE PID 2196 wrote to memory of 2504 2196 iexplore.exe IEXPLORE.EXE PID 2196 wrote to memory of 2504 2196 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65a36fce3611dcb07be50b2b7b8933a0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2196 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5854143f5677a32a7a764e8031c06542a
SHA1423d7756c137a3a95dd8525dba80e988eeea4676
SHA2569de8a91140ff6e4ecce35eaf3c75ecb7efe5bd5049639e225ea070e20d544433
SHA512c28f015019fcb4eb91f88dee0990550708dffef76971fefe675c88f0b6029b381c652092413ba87531fcb5a54596e00fc5dd62cc0ae9265fd65e4e780873f88f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD555632d5b3fdc0032d6c8ae1ebbd231d3
SHA176ca79b51fdf00a29235e2b21293a753fdef347e
SHA256ff2a778bdeb1efed1835b968137514272f29c623b96ff49b0c828caf3f0b59e8
SHA5127de05c4f5b6871d85da75de1c4dc04e79750c0e425ad7ab7e058588e213033bd50faa0f93d2da4a3e2505964a040f1927eb608fe549b2e794768b90fa58c3380
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD530cbd344d2bc2a9dc3584cfabab569c9
SHA16dba1c47f0795452883f44a844927d78164b5b62
SHA25638e9716df631a9bce900f585675bef728be995476406659e0ac2b720e7ef0f1c
SHA5123ecc7e9a7b409acac821decf1f5c1e18de8f04ed903b495e7e5986075a4d53ddbd86eb2c5f50a407061a1bf0199b53bc429d4a59d8bafc87a427f58b67dc00f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD58012f623396b7f8da8d86078214a7557
SHA16305ddc0f1b9eeb1b6d9cce33aec9d9aa97e08e0
SHA2560abf3540e94527dd47b07eb638b27fc8ff6eb7342ae54621d28723cf19a48b91
SHA512e10303faa70c05148c3c44bf1347f901043f698ff3d6b28d78a91765409d0661330e1a0915e0749fa973d26ce3c0c2904e9751e561175f4ac4e0bbe484e037ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5428ad614502569d45e9453d0d2418f50
SHA13948ace1b12e809375df0d62aef5d44318ecb15a
SHA2565de8cb641b5d0e4371f8ba178990de015d9831621c3cfa2941f690277241fb90
SHA5121c08b8efad070ff92d13145bab38f5e797e124bfa6d4fdea99b70a29e7314d1e964295929cbe1535ec2adf9b0f52a78a4c33a96dc1bcf3bf03973a71dd4f7c13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55b15f1e5c1ad4f62c23ef6bc893ef908
SHA1c807aa05373335ec66cf6b856ddf7579fde38fdd
SHA25611ef46c973f100271428305411b280cd3cf67751f754f4aacf81687d3e4dc2b0
SHA512cfceb81080add0a60b73bc108ba21a87bc537e01ea27e38cf5be305d74c6823a0002861efc2cf761e2d0a1bd6c24ce0304b397387edd8bc48a2aebb5d954b8a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD563dba26d995c0b1973127613468f7f92
SHA1b290b25c9e7222b78278ea90ccc67d3925f9e9c3
SHA2566d54726ff3936fd4ba13efdbfd5629d0adf8be74ae54ad71f9e389acf3e5d81a
SHA5125b688aec0a5d3a28c780dedb9572de27113f4a7b055c6e4a78563c94de7bac9163c7c7ec7448e2331b72c589715fc3d9da78555e75aed70ccda4f57d95919f33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD508c75fbba5cb2cd9949f2af158c43731
SHA1bb0d38f44ec9d73794706b2da5433c3bdc596c50
SHA2567f5810ba621652336b6903f622461d83b6ae4abea7cdadbe0e8e3c7a2c582999
SHA5120895f02068d1f517f5de2f38a6194b0200f1a30b8ef088baabb28ab350fc90f1044d2bb55d50189a4934a391b0ff03382ef1191db4c2811685ebd4110d94411f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD575a157adfc8122e8d2faadf9b915b533
SHA1b8b7dc7c2a674cee83779f075a67680ff1e380c2
SHA256f2bb0c23d41dfac743b19eb5b8be428d0fd80ce51efbdfa6231ec39f290b6b2f
SHA5129dc12154fb26e072b40854d3a5e76ec665112f5d6eaec644022d2efdcaeac6688944fa9e8172becb79208db82c2a7024b3475b37f1555844c6f293ec491db0f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b5ab798368fe43360dcdcb79d4faf86f
SHA1b9617cc1d96de3126fb4f5b3392cf23029a0bbc9
SHA256e546602524a62da24847fecd2ddc03bb331157bad5a7457e0186fe32d1187ee4
SHA5127376d140ee94958945f64526f4795f3b7921f9f342ccb95f1fddd33d3229265f86e5a69d004af845269d80385388f3f582e93d619b03a50376e3a8bfc2f8f461
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ab6c60298a4f7e5db203aa74ce480220
SHA1e25de3ca92f1ca53f2c12a2170e225411ad9af53
SHA25673034a4e090e7b58e9d8823304898c4f8b2e89325363645bbb08acf7a54179ad
SHA512269cfd798e679ab59ec469ad025e2570261f65af3c71770ada728fa6d8fc27cdbabb344d76d8ab602cfe4ae45804f5f16bcf01bbb587e25674f999b997f2d0d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5789c5d3fcd4790d070c953e53f5183d5
SHA1eaa747935bc5681f286dc70107d3243ef425568f
SHA256db1af187b1ff4c986adc28a8e06d52012182afe29cdbafff73b6073a99ab030d
SHA512f2cf6f23d56bf2e78dc3429be702695f036b753f6fdf4ba02c093685c8c37440dd3fda12139531c70cf6ccd8360354dfad34c0c3eea353fdb9366373bb22fdb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e5db710b6d801cf4faf4b9af5b3d0b84
SHA1a4a431a0807ed65efaf84872439b5262919b2ef4
SHA2563dad10661063c4a7f5251edcfb25ac20cef32eab63386b7aaa04be0547d4e037
SHA512a590391c34657abadc0a9434928780863b55d32f4eb2b086666a2a45bd7a2f58b1877a3e2bd6c0b1363ad6539f3a06ed91eb06a67d56095ca86e49b4563272f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55f2a866c12aa57a79ca5fbfbca8e8193
SHA14743c32293340ac70edc3f6e7bd6022ddba65c39
SHA256e42332f2e2ee62d14960aac00301be7c35cdcd9659b26d82edfce03e51b01a2e
SHA51292e98c50e179d1c6751a2386dce2a3469fcc59af788e37411b7e714e509e44659b99813531f85d48130497732f5aef6dbd0c5762aac125e5d615cc56e08c0932
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD541ee8d691b178250968a4135d2161ce3
SHA1a2a4d038181d07dfe653a86db53983d3431a838b
SHA25604d42fc0bb8ea73915af911e1b8e58d4efa02b51995fc0a04eaf87258f01cd88
SHA512bd13e799851460fda72807e7ef96d2cb40d4e19f7bc6303243ff20b3f8a1ea3603d042a80bf683876fb6536dbd0d2725ff9e75b662b816cc37f293a3cbb5aabb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD57db953b408dee7571a770b7d2cef156d
SHA1ab9b36d8d67c774981c1496dd7355c0276809c0e
SHA256b9674496a0cc422c6659bcb168fc10eb13ca854569fa2ebf77151c7ce8114482
SHA512ef642c25531d281534c79749ebad3fca08959e905296903e52d50c13af7e58aa068c28de82cf12be91ed09edfcee5840698eb207151f1827a754549cd3f06f03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5eb1e8d171bd0ec851c61bcedfdf2e7b5
SHA199f33c0f462e02ba0f5aa65e4d450a66e53e31ac
SHA25696c91358dd42d40a2858fa940d999cec4f967d4fc901b1c5cf703ff03950ed8e
SHA512f3f712f8f6c633276f019bbb6fb63d95ed15eef75e734ca4da290b5b89b55f15f3263e29b9bb7fc919247083dbbb50a8c38f5a89646c3a7a06ff92367945ab5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD580894409ebeb0419124593e0c2a7fa81
SHA10f50670846da3fa33c4cdb09eb07e6dc6d960064
SHA256062d82aeecb29e530180c9528d7c5c41d8844e161392a79f58a690ae57ece667
SHA5125f97de9788d45398f048d4a948771da8dc4a700abe13609e78f59dae794848ed34394250b4140ffada8d6568a0a5e53e6901717f3b035c05dba9ebdfacfd19c3
-
C:\Users\Admin\AppData\Local\Temp\CabC1CC.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\TarC2DC.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a