Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:14
Static task
static1
Behavioral task
behavioral1
Sample
65a7da98edbb7598db876569c7e43e30_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
65a7da98edbb7598db876569c7e43e30_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65a7da98edbb7598db876569c7e43e30_JaffaCakes118.html
-
Size
51KB
-
MD5
65a7da98edbb7598db876569c7e43e30
-
SHA1
c12ce650aca0d6e6530cde0a1b7901d96ed2b75a
-
SHA256
bd588cdcea3bd03dcb7c94bb38c44a8fc7547109f6a838a608677220cb461620
-
SHA512
296ae85515893b5f8237cd5a56230f7fc170f9d66a0325ab8bf810204d8aec28bc18b6d3a97b39e2b5288a5c749b6670938bc0f752e67edec6f2e964b5c9a337
-
SSDEEP
768:NZFYdi1cya8rin4rwzb+bcGzjnSyuKwOKG:9Y2Va8WnMRzjnSyuKwOV
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000df5e20fc78ff5d449135b86265e0e0f700000000020000000000106600000001000020000000201c2aac78c7511e00bcc7e53e776dee0ef99a647a8d5f0d6900ee1edc46b322000000000e8000000002000020000000f9512187272a0c43ed69d84a563320fd365b5e8effd9285a04a5f440c7549f1420000000f4fc094e7081a6a5e064ddae1f4094aaf212287bba35afcb2bda067d29c035c2400000007196bf6c3cd30d557575bc67a006111ce22eefbe43d0296f09014e353b63bec68314e154940924a6c483e365083724275395278c5d170e032d1c252997c8e778 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{05B7C9D1-17E1-11EF-8FD2-F6A6C85E5F4F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422505937" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c05044daedabda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2932 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2932 iexplore.exe 2932 iexplore.exe 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2932 wrote to memory of 3028 2932 iexplore.exe IEXPLORE.EXE PID 2932 wrote to memory of 3028 2932 iexplore.exe IEXPLORE.EXE PID 2932 wrote to memory of 3028 2932 iexplore.exe IEXPLORE.EXE PID 2932 wrote to memory of 3028 2932 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65a7da98edbb7598db876569c7e43e30_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2932 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590fb8aab724dd852539fffb10968e2dc
SHA1a79bfb86eee1c5dbbbd525b10f763a00b145b500
SHA25681ffe35550dd826a82f268712d7e96f86d0ce3363250067bc40698b6a06d7b66
SHA512e1e81e6f926eb81bf2b6bc7363361d8c0cc76665c9a2173433fda4c4da3e2023e2333d0e3ae12ca0a937823228328c563af792423f273a433e39b0d2c28c609c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b0796db4fa49c3365670ca9e81d8c33
SHA12d497407cb592a6d2f810bd0b3f718d3a1d8e568
SHA2562f94de1a0d693d2e27043e1a2521ed62c7815fd52d6d5f6dbeea3bad5084dbde
SHA512c8186e5fe8bc85af146a5ab41430cbcecfd3ceb44fa32a02559bd2decb4cac59a7354e6e99197197e824bd21169415c1b98351cb91746b46a53786953fd218a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b3e04718925c259447d92af46b10299
SHA168d873356f3b9ccfeb14ec66823ac7c6a9613170
SHA256b45b5565175173bd5ecae8f0523495b428aec8a862ebd553d1cd94c8b6322595
SHA512c084dd8efce66af94ca10bc77d9c60adf5ed1f9d3673d02fca4367cd7e6d4ef4fb74b7e9a699a1dbad7ebdb0f0d6726f208781d92fed0b45c666654eff9e62c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528df489233dbdb4dffda0eadcef515ce
SHA1c2b220e041fab6643cabc9c78bb8acfe486c1006
SHA25623397a4c85b82fd6b448c591fba2a8878bd7193d559f9ee295a4bdec97b67e30
SHA512ee27051dfd4add4560a1a4059f46624e2561377c7374e2a2cd4b0a4b4cd59a4edd208dbd4c41a49cbef8c96c488b0094a46038abec69082b92c33e7d18dc8750
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b570975e7c86ed8c7c5e263cb8611934
SHA10dad1bfd58f5e56e202af969df1001e5faeead80
SHA2560f6b4f25085b320689b165881d1fcd27eb38091d52c1996680f93906aa868a71
SHA5129e17d1c3d6f2233b0a128ae6774ec423c59dd242fa48a032e63e57ae6af11c0fe7405a664132b3700a83f0ececb807eee1088584388c22f612ad8fc046063072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5704ec7655b07b58e32ddde5a61f60374
SHA1ac12c558de9881a07a867c89e7681dffb0f83f9a
SHA256aa6993f93f6d8bf2f6ca63d453f59ff7c3ef54a707272eeaaee3a005e35627fd
SHA512fe91cf924b10a84704c40683c50830355fd58759ef8558fee15ef6a1b5fcc0aa92c1a5c40b05a59221f0c1cee016f9ada58ec029815e33af28182ca2747e4467
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587dfb353f7b96da32f8192c5a98f867c
SHA11f6bb5e0dd1762cd114122e0f9d5c82ec3c7932a
SHA25663fc4b05f08d5ccba1468f42e2a401da3cf1447644b9fe1cdf7fcff024aa4bb7
SHA5126b813a56ed19c11ee26cc2ad2a9e28fccdeccf3d5bb546842cb372b5605b690202db33721b791e4c0da7f483b031b2a86d98de6f7897c1f0ddc9d9616ac29c51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b54d327d6ec13a3a787feeb80fc4a32a
SHA1710569f8d28dacae3927e8e6ac128ec0bffd7973
SHA25665f12c07c941e4d32c6aff46716bfc0149c134a960a3c45afeb8e051ed17510c
SHA51274aba386db6c0fc3c8f330a71acfe14022d2edd936c5497d7b56b088cca49492849f541c2608a61ce29f736e08de7befd7740584640110a0e8833ee41a000734
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc0bd213775b5c03d65e86e0fbd50ff2
SHA13f5772316578cd2b1cfa101a1b5815e87d036e4c
SHA256826abd30c2e34a40e131c31104d6008c764d41e1eaf37e8a1e9f8ef989083096
SHA512ab7b002405389869834328e3e36e868222e0575829fc97c1cd5d7a203405da71b033cf2feeaebcbd523f65f1222979e7b94d0dcfa9d5d37fffc4cd1cae5228db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b39ddc64731a016f4ae3b9712d4b2c4
SHA10d6f2a3e67f967e2f8798616ce089ceedfb7f1d3
SHA256677a92eae586c28b48c19cb8c6cd5581f13696765314a74f80ad355724a8c259
SHA512e027333a947c5a3b1162e8c4151fac33ba20bff8a53a17d7ea150cf5adf9f5db1013ad04665199cf55029e12a7de6bb8ea7759cc3719a7c395bcfad06a1dc565
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599f4acb011eb2fe33b38a262ac0854d5
SHA18292c8f1c3e960eb724cadada86b2afbc7cf51b8
SHA2563c40e9484585723843d78dfdfd4ac0ef12af830aa8ca9259e37f19c020d6d9bd
SHA5121b391efdff36a5ecd9164f60f34d9516354252bc32afc8ac05deab5fc65709a95abf36372e23baf4d6533e1c64f9d16abdd767883b7940294b03563070e0704a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5875f5f265404771101e38a0ae65c4f08
SHA11ad93ad546c8dfcf54aab6a673aeb546cf0c03d2
SHA25661dbf53637e3d309de3898c4bb8a5a95ba9fbe5b8fe1645f357c798490afcb1a
SHA5124821d4c0eae8bfa2f27e70097865f2db7cf4a7c489c32a679c44c0f0abc57f1dd2f706cbf05afb81d9f89eb8b77186aeeddcee31ff5c06c452e41eeb198eb522
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a9b2585c8a2433f46667ae6f3bdbbd1
SHA1ff0fd612bfb809bfd6d0c3676b63b22841394d5b
SHA2563029220a6b18370e3426bfce445a7fbcae08918ba248df075c62b599de12650a
SHA51245cfe622b204ef9d97cae246dd0e660aea743ccda94426b9f81f8b6537d61f20f6eb2bcfa18378eda886e08e25cc255ea777c68b5c85ebe7855b5bd0eb803d73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57013c084dedd7db889dc551d9875d5f0
SHA1bba3dba6f9a356c2ad8c1574028d204cf061b144
SHA25674e50f3576d970cf848f1919d5b14618ae7d0ee43c2729583a2257687325c778
SHA512f1a0ae600bfa9f718ea70035bf2bf60904fb3ef1f73cd406596c23a984073cc92a9ee4468d486172142b1ba668113e9f6ac9cc73e4704c8bf223b607e08d5e95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aacdf5b141eade398cabd8af198aede8
SHA12cab520c691f6ecaadc1dfc5e01454f7f8e132f6
SHA256a504420c5427d94bb32a944ffdca485ca4e24dfe81aa6fb06ce3255f90308642
SHA51255c6b7805dc36c18bcf5974a2b75423f252d7add8197e041c31009652364223a49be72957833f277de338abbfae7f0b092af3ece592cf9772c9bf09e64e3dcb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7814c86f7f2a5bf010acb163359e2d3
SHA14da699867d15ccedd58af0b39f56f42fb9e6832a
SHA2569869f841050970ac3fb4b5dd4f84bb23fb401bb6a7fd7ecd014172c58d95372d
SHA512fb63b95e21539d523b85ef5ed83b2be6c7fd44d075bf3f58ceb8e10640ba66807ed304006c10bdd54c830a413c7c31ff8a92395a6b4adaf5d715bfef8a333ef4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fba906c21303c32140f4cc9b71fbda18
SHA1b44b075df1b49b9e519e7c846207304c8226a98a
SHA256a9c7da8dcc99c1bd3e5a29c93a8a306ff335990703ec300955c5c4c070725c4c
SHA512990080b6998b0d653b55e38839515961a83cb1234c3c54b1e882c76f67c95e684d6474cbd67009cf462f248e0aa2a02b5fd8a3cf4bf3b2550dce18b5c2d90c8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5673816a0802f1c91bd4ae33a13d790c3
SHA131d2927a69b42d46bd61486ef5d16253e9832ef9
SHA256ff80adf1a5edc1d7c921e90d4a9434154809307eda7cf040500c35f89dacfaa2
SHA512372ccfd3ef7c74b92b6e9c373ef80e0a316829948ba806291f835df3599dbe65d879be302a9cfeab767cc4e8c528668ee87790f02fd19aeb937a6720b4901282
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f5b9b8a5031eb7b4fd4c294410dca66
SHA112c14423c96c316afee1712d4a8b82d4c4dbb494
SHA256062fe3d176a8eb8d238922a51146233f648a62822b24d536ec19720e139aab5e
SHA51276dce22470b01d471399b4557e4a001ef6f0f1404becf67fe849b6345c6ff0f29e3d95680320aaa14feaf45ec3a976f1246b5dd067bac70cc8ab21ced25b951b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a