Analysis
-
max time kernel
133s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:06
Static task
static1
Behavioral task
behavioral1
Sample
65a26de75f26d783521395a164687299_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65a26de75f26d783521395a164687299_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65a26de75f26d783521395a164687299_JaffaCakes118.html
-
Size
2KB
-
MD5
65a26de75f26d783521395a164687299
-
SHA1
39af0b31f0ef56c5269e4ec0cadd8e2e7dcd2ce1
-
SHA256
bdf834277395a5c044ff6ef14e5063f7414495caf88784d5ba92dd9b213126b2
-
SHA512
99f6cf319e33b1224b870a24f433ad8b2bad69610287012ef9747a0bb94123227fb0c4c61b24e621e74be715c5e495c134c085ce76b7793998f1371dcaee4ce5
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ED942E81-17DF-11EF-8C89-6200E4292AD7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000966f152413f52830764935a7c0d48b0cefeab8077a548d47f932f0e7f787485a000000000e8000000002000020000000469b4724024a65fe42629533f6009738050b1491e3813b1b71e5ca3371077c6b200000004d1245b9ceb35993f7ce56acb238d8d9b0ae323535854bb80957e770261acd3040000000660be1fde6fa96482b56542ce607b955364f6d07c18827bea09a7a3d50048522b473b955d6ec6b6f7f33cd9d99b47a6535186711bf3dc86765fe7017917d644f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 700229c2ecabda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422505467" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2244 iexplore.exe 2244 iexplore.exe 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2244 wrote to memory of 2836 2244 iexplore.exe IEXPLORE.EXE PID 2244 wrote to memory of 2836 2244 iexplore.exe IEXPLORE.EXE PID 2244 wrote to memory of 2836 2244 iexplore.exe IEXPLORE.EXE PID 2244 wrote to memory of 2836 2244 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65a26de75f26d783521395a164687299_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2244 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8b928edd37062bcf76a06e0ee5682d3
SHA129ad305486f06788f8bf25e83180e07902053c37
SHA256ff21aebbcdeeac96be6cba8c438350761a490a26655d917c3ce17b8d33c509c0
SHA5127ad8255c8aa85f8c5f22f6691a2f449a59ee783ca4c02d07b5e5cba4861e41c32ec2201fd7126799125b9575d8a517ca6405017748094cb838b357d3bbe2fbb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c263908291c526d8eb3706b1f475baad
SHA19d87fc7abc384274a46644274e2d414e026f9229
SHA2561a0bd274ff7f1c4e6ff4f57542528b3fb7cc26a8cc0917c8ea9d9e129cfa0302
SHA5129d785e755008385eb5f73dde3cd3d6a5d473dd7a4b796676df172f9f806c891eee84030deb31f6ccb02d245c4d5bb38b45186daeebc0ad631f7f67678b49b1a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4aad6565113213d757cfc323b94b951
SHA184bd654a05d4d09f90660a3b258fce0d765fadea
SHA2569c915428689dcb9ead6d9e68b6d53fae8fa60bcb67711189f364fd461b62bde1
SHA512a1fbf147484346d9cecd8816222b5e3f7653c97bf0b07fc67ecc50a27b7d190562c1b184b4dcb3671275f6b4e2ec6ea6cb15f9f0b5b3ab9c3a62b3774b18c7f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3f76993e93ea254f84da4b9d5354c19
SHA1ec9a6959cd8967899105a6ee796d889c76df1904
SHA25607b9edd751a3eda609aafc9d4d59302f106954544a7c803542dc38c22c46dfd6
SHA51279ed5772517a7cc276b82df87d7307f639d00a3befb65c16807b553fa595da2b53c7f5ec8ed8154f5610cd190541bb158740523257fa1e9aba16eb616b8345b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547bf8018874f353ce2dde7121aa863ae
SHA1883745547c6b2a11476f47b921964c308d640106
SHA256cf8dcf090c06f1e0b0187677a25b24fde85486820bccda7abcad4b872a6865ba
SHA512cd958e532de3650d9f158e196da13f2a21a189721ef770311f844d93756b1102cc3270ffd471ed137bb9bbf426a1980eb578a189c420d76c5855b57a77b2f1fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc57faeb46aef4e31e1e6239432c7785
SHA1f9b5c8563426e6099fb3d18c20e9c16b549a742a
SHA2566b248e43a5bd67130aaa63afdcb8bec9dc9f1a50863338b0ff85828459200199
SHA512723f0743d23fc3f5f7cdd25ae49515db547977a7f04adbc716a537cfa70bb1dd9a6c87a7afea9858c0f4484bfda132fc4f14726904bf6f173fe8e43bb2fd3f65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556047638152dd11e23fb1e5bd18221d1
SHA18a2a51845f9cc7cdab369a0882d81329740b7698
SHA256b83ab7d269fff0a838c8cb720ca04e8306266cf20da2e712ee423a93a61c0f0a
SHA5126d273722b60bf03fc457d2eeb8c85b8edf7c15742ebd2f08a9dc14db9ce89c731ae9fa1b18e23b0a2b9991f1f7f9859ed446bc56c98da6980e744309129e185f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50669e4aeb1feee4af5b341ba5b2d7410
SHA1b514d317ad168523dfe9e1bb2478e1a517c601f9
SHA256b1376de74743ee4aebab0d25b2c8737e763ab49f8d237aa0f150c31ecd6a5332
SHA51287b17f821e51546c8d153fbeb26fcf8fadba647fbab061bca0e95fa41409d49bf480f31b0cce49b9716ef19e3c1884fcb60bf8e4b78cbe21a56c57759e2f807d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532208da47d3b39944a3b5a2925c94b7f
SHA1ed8720d232edc56363a15a4912831afc4eeb36a1
SHA256944656b3812045af716fd083d6c79a6dd1e733e74a7ad0f6176e85c08431a840
SHA512732074f12e9569611aa068e4b7d709d0072be237d77c6fe595a401be8fe685858cd1adb03dfc51b1e145bb8e3a1918cff17dd7b7908a760350d7fb9c2577553a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff7ad9d85f499ae4d9e3f092e65c46bb
SHA131a5e88100001b766855dc97ce0a09f39eaabeae
SHA2561875743872932e93fecfc0f2bf8fc9939e35f0f8586e04f93eae0d2802add4a7
SHA512f3ea938f664757fe83400d84a83160bca4615cc43d0f4da1f89c3530b623518eeb9f2320d3515b6651c7013317dfb3f48503e2d5408efea0b852b89f0c9e4495
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adeaa150fb3410c319a3cc5c47d8ca52
SHA1aecd9ad263068391d52789e3076b69bd7c3cc8bf
SHA25654d9c029fc296c86205945d4731037348d7442fe616a29401eef8926e199c8e6
SHA512ef72943536b74fa2f9bf8413688d0f16c3ba5a2fed81fe03784d9c7abe90a4ea19d168a94a1b73f1444b278e49ef048c5497d50984289906bb25ba8d4bbc2cbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c4cd1c8b596a3a58a70e980a18a63eb
SHA121a167231845e3f4aab1117f0b125e3dd0c73db2
SHA2561199ac7f5ff91a6c94dc31db5e7183b9dd028a888a43a2d8253e58016ae6d02d
SHA512fbe76f8e4ce6284d480da8159fa2085c4182ca6e7468961aa7d813766b89a987f5831f0d5f1179fbc565d2253e91382fa5d0bc572ba2f950d766a2b3bd65aed7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50134004578d70f67dd805b0c639f492d
SHA10ae7aeb22375931fb1b1e70ca6aba21fb21091cc
SHA2562436dde1c79f3c12429903e565a37a63a33cca4bf8390539aa48cf4b4b47687f
SHA5128c3a39b13de3bb4869c7a16b9e56daa48211196ad43855332a71c043de6c3f51390d6eae54083f1b91dbe440121a624a5b2bad51529cfe19a2dd29abe9de7439
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561f53dc54f2437189853c59d2b3c853b
SHA1470cf20d7571a60cc78045bb39f9da854a251808
SHA256f48207eafe608f53302d73ce544d74df319a415030f765d0d821fc88f7a0fb2e
SHA5129e59199104c176c18beff496e843ae673e24a33daa1f8199c53ccfd86ace0e45c967675f0af99b0098b2d8987ea3feafae287d8a04e3bca66211590cb7876f08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a92ff55e93856849a2f3681c28fcc3a
SHA164b2740a1dfe83db8fd34ba8ce05182d62b60190
SHA2565e479c174b88afc39e1dff9b0d2f7303c7fdd7434974bf3a7b1525ab0dcb0653
SHA51241686f71c4c8c7aadc1fde0f760b7bbe99989f2b08d95a96b7a74b7119df839bd16811115d384c4de3ae98b680b3df2fe77b2ff8a0827c8bd666f32c4a77228e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d62ab95f5ffe8dc03ecf3bbc213cb85
SHA132a25894323f4b1b5a4e0ca5defc5a70d7154064
SHA256a424a5daa6fc675bf420d0c63685e246d9fbe7a756a45f5a4a22ecc935559265
SHA51203f7d17655808613521e78f7610b5f4759ad7ff9614abf730d8cad584198a3c26879621dbcf07cf9f49b219b3313d72c7f123296001e8a8532b4aa6ab0012ac9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6db00b129099329151ad56062ba2fb0
SHA1aa42f3b69a04a4aca51a19b0036d81831b9960d5
SHA2569879dd030bee258eb6a207b155fd4fe53cf71477d0c1536b752733bdb1cac946
SHA5128ca53af45efd71c458e221eff12a7ac5956c234bc1f0d440938ad65fbbb77ab3c0bfd48df01af53658f8a0b39bdb63659bd33d5d9cc0fd13b1d1c40e5d7d98d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cb64edeb7671ba3c3196dd6c2d78fc3
SHA13b176c8b907b948e9a7581a9e286e2bc9bc94e15
SHA25678f12f9e1eb397e66473482b539ea8c6655169280912c56325fda9cd33f22529
SHA512baef53da59e62c648e0b6f8ef27f052bccfef84ae95f02201269e1873f83c40f11dfdb3f67b2e4957ba19e12feea74dbfe59adf4362330cdbba4b88969571f8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a181bcc88963d0f3d68d2e9eb3f440db
SHA147dcbab3d24ab6750f53ec6f777c67888e7437c0
SHA2562cb6993f792a875228aa14f9547be69481b64ad951d825192bafe0071a106c84
SHA512f9dd3b12ecd848c7995d107478b1d888f09875baa846a0a3e5b4377a425ee0cefaa839eb2bfd49808b009188e7198758a04cbab0b0e92c2984233fb7e6f7aab1
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a