Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:20
Static task
static1
Behavioral task
behavioral1
Sample
65aad47d908e26a48cf686497db0eed9_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
65aad47d908e26a48cf686497db0eed9_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65aad47d908e26a48cf686497db0eed9_JaffaCakes118.html
-
Size
4KB
-
MD5
65aad47d908e26a48cf686497db0eed9
-
SHA1
e835a18669f4ba029b68a80f58750261b4258bcf
-
SHA256
900fad6209d0b7ddf3714ef3a17bb8dbe164bbe518340415b0bfb1a9ed96a38e
-
SHA512
556d1bbac66c5b27d3160ef6a40f31b41be80ce9671608fa81c169e837319a9af4abc5014ebdf27f305a4d416d0fd323ada29fa44181fa9369a4e1d70c282948
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o+7/I++d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDk
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e27780c68d1c6044a9d32d964ccd2b9a00000000020000000000106600000001000020000000ef976292ceddf93938950fd29ae96355cf62fd911d97467b5bbf1d3d41987dc1000000000e800000000200002000000030ebae7afe1748e0350e785bc7c47642db79dd7c32192f0689eb6b3f42853879200000002ee35d69621e4f33c56078109940b713b0ef3c15615a65b2e02ddfd3c17b022d4000000045d44d6cda09472a2912bbecfc51c0a6500c43927f588fb4e9d858824109b23cef9ce70842030e0ee48e1565dce2e8b064432a3d048e91ce9f1d5d0e2b9382c2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DA866D11-17E1-11EF-B73D-E693E3B3207D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 104421afeeabda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422506295" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2500 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2500 iexplore.exe 2500 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2500 wrote to memory of 2508 2500 iexplore.exe IEXPLORE.EXE PID 2500 wrote to memory of 2508 2500 iexplore.exe IEXPLORE.EXE PID 2500 wrote to memory of 2508 2500 iexplore.exe IEXPLORE.EXE PID 2500 wrote to memory of 2508 2500 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65aad47d908e26a48cf686497db0eed9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2500 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD525597eeb230652909be9aed725f3996d
SHA13a4080cda07f4abd0c111b1cfc4d63b56cc8c21c
SHA256ac4995e06e96e2312dd888273c3a9563700b5258810e5b4f50094a06920f9b14
SHA5126466e838cf7b2156a7a40aaa660632e04496aea2ac4bf91a3ac74230b540a1c3d4a6468b70401ef391b54dd99371623c19aa86fe43c45b5f9c139474794c8c2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5aa22d966cbb25d1870fdd4324903c2f2
SHA19d0b7fe919ecf26b328405224f8b5a8e133cacc5
SHA2561c0c317b22fb32dc353fdfa5bea4820c5dec4953cce5a25648bb308dc9c3c5d8
SHA51240247f738fc883d51542ccfee503756ca392348f3602f467a8cf6f02f793c02387ec4cc233ffdd73ece811e6982972afaf9fe59cd8ce95f5fe06d1406c48733d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD50ad860a410d8494215d209a5a67d3a4d
SHA19a728a238a28240091771a7fdc4ed07529c1a9ea
SHA256d91e5e8da9d9b394018252e22982dd82586bb068954d6b819b864674dab635bc
SHA51289e6dc4ef6fbcf2be5a73c388e94c720d8a13cd6cff94bf8ff6eb9d329b21f15ea10d7e545e5db689604dcf513699f1af7e6127b521e327e68fc596db2ef9b18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5fba5320151957b485ce6a0fc3f21975c
SHA129b397724bfbb57df5c4239aecedf23039edf309
SHA256265f377ec019dfc878aed0deafd29737dba4395307a1553ac4f2879ceba8ff3c
SHA5128b78cabad50881992c971a7bf6b7656aaf636a3abd008a6da1ef60a3f3d05475f1ab49de94cb06e2255c146db6bbff67fae65b933ffa4db557e3f437ae06ef70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f740ce60e6326b7f858b4c2987b8acd8
SHA1a5155c1ca0020d843e683222aafff769e52f1176
SHA25684db4c258dd2d58c9f1a753792873a8f14bb417b3a9df967430d23e890a2a980
SHA512bfa84fc784a8b978afdae76111d0df9885fe16d9132ecf88e46a63ad6c59fb405b6706443e1384f84b7c262ecd64663dc21adfd48d7f1909ee4c1a60e184cfe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59827d3cf5ac6f7d1ed977989191f067f
SHA14ff3603d1ebe5ccf17a7bd2b921446464bbf7ac3
SHA256ec4142803b1c6b6c34361f1f265f1eec7940d51ab1925e4ceffe326fce5ea451
SHA512cff134a43a820301962aaed547fc2692e17f26deaffd196c15ca8cbdf122910322625af34be3e5e3327f84308af5ae604daedd821a99598bdff95114dd96fe07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD50eb3169e1d4a1a8272de7352640a445d
SHA1e5071153defa29f335b52a6066f8b67273f72263
SHA256981b7ce7810b8813b89bdbdf5da24d2f9de4243e0a87e6c9910cfa6874acff2d
SHA512d824e84c92bcb41f4f3b055e60d5d8d212bb06a4d073b4f22c40748dc1877fb2467b49f706241e78fb51199fa21b5b4172f046167af7401542b43ccadcccc7af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59950c6435e980e6795e7c0cca9043928
SHA19f407090447116abd22e578c59ed6673bc66fa83
SHA2564dcb1c8579050e7ad75fce6b7ead1c1adcfa98d0d85c04fdb4591c8755399fcd
SHA5129884e059a9507b2df177628623a1c734f592e6207835f8f3a0a6b09db0b7ef7f3b5e69bf058282607715e4be2ca0dbe041cae9e81fd65d8696dd8a1335cee92d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b963e19c5cb5afddc8b287de1eca4378
SHA1b3aea8f301e951e515824ec5d1f247bffb1a45dd
SHA256e310faac241c42a2aa9161f451994db16463c48b3e2f2b68e662e20ef1290be7
SHA51236f2e0f10b2e03e1527bf4c2ee3b3b4fd5c2cb4ec39113f5b0f5ba2ccb5c20741eae56af7a0af68875e00b659303af99fd0d3c8943a7154e51ba13c43145a7be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5288bac34eb22508d1e177bc98c75ca48
SHA1ed2d6041a94480167501b22a6afda24c6d98840c
SHA25629cca538cf2416868fce3947f52e1d22acf1b5275d9770438dad495e0d82dc89
SHA512a833e927215259ddee75896de4d2f90aa1f1de4026dbf356b4732980a20a21b0b1ca4a1b99da22b1019283f3bf87754bebdb3e74b1d4ebc7bb657c82b5a20a52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d4f47c5c7d859f88466889b7ffa4a45f
SHA1b1883494cfeb5f99ef18b6a44a5fc709dafc0076
SHA25663b4468772bef2e0e21b6feb360191f44b72ffe1ac9dd64bb25fd8a3fb1afa7c
SHA512773bc1b2385e254c45acc2338e19e3ca38495694781baa8fae56e49cdd39b607cd65ffdaa86c265db1aa5e57492a87b657464c036ad0305e300e85443b964e13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5cba360171fb3f682afa7cb4309c18267
SHA1716a33ec2cdf87b112d36de9d1bad50a13ce4ed9
SHA25695ab294552240e98184303122dea9736cf183f62a4fa05b5794d9903377b226a
SHA512a907b85d583614fa51fa67c1b0de1741f29142fb741732017c382742179de1bb3fbefe863b942f932ce756b98be932c11077d23453b178979d537b321d7c37cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD52cb2702d2ac15a170254307c2a7163b8
SHA116907e5acb287216df71880da7bc414b3c106a77
SHA25698d0d60ad725816c2716f7d960c93cfdb9651e2392481e01daeb8a47308d09b1
SHA512be3f2637231fe2a7b8418d11378f617c3917a380182b171ad576348625fe1ee17f02e8f14872ae408c46a9817a28f57c126ac00ca6bab187bdf9f56b552bfb2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56a77983eb0643d70468ba14f5af5079f
SHA11168599b4195f18a81345b18bd3d1b44a3bcd24c
SHA2562fb7c2a1fff8de08fb4456c25384df2d03f0ecb70c0f3910eaccb0acfb76fbaa
SHA512ff7967c88cb45db6cd81cc1696fd36f0de2452a533bac137bc7b28d48ffd533511ae1f854adad5be9fa1a89bb76a8bf63543f27c7eb080b4bc497d90b0b6afc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a1fc13c83a78539f68e70dbb2739616c
SHA12965cba43574a83137b5e4445d608a1a728a3dba
SHA25678358cf7ca9441f71c2c371a369f449de1f323bbfdfee40fbe4951b01ba71996
SHA5127ab2b113646e945798f8b4b12b30c860f2bba574d7305dce428ef95c91ee7829be310122be348662ce58d7183bed2ab46e728eba6064c14dbf6c7a60d8052147
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5fae7d9605162a415a48dd8896738f8d8
SHA16b1d115f8ec6b7c4daef183731ff6d1eec56cf9f
SHA256375df0226c73efdffb243fb2f15f253c44cce24251b6d80dd89f6d7773ef1d22
SHA512db95c0d4a0b1e394c9ff9c261df3ac4fb3f5e670437d8c80479b2bea9a4814bcd8473cc8f35099ba3e116ba7ee23b1b348f3a9373702f153bd1143b1966cf81d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5644f93b33a7016d9f38b1495a56c4917
SHA13977ae287b2286b035176a7249d7aa140dbc5a66
SHA256bad0349c43cbc27cb7b4b884da3b4e7f157b97a80b41cb2e2d4f4f8b06a3d08c
SHA51260414a7704818621702effc31c3a2eb3cba888e3474064e3dc9cb3eeca3cd998cbe4a5e1a91683a78470f4eef8d186475d6be9f880fa20164f8c55a862357ca8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c172336b529394e6ea7db7ba06f72d33
SHA137079c9a3e0d970afb1ab3d587b49c64e2d4408a
SHA2567e1177f0ab3d8f390fadd1793606e69a7ae9a72408647f08b0a340dc723aaf2e
SHA5121c1e62576038d330e301097877247d2f5e933bf471ddff1bbd39d42838f941eb2f78e5d7ecd2fd7c9a823d76f2185c98daae4e2ee48858c2254082ec98d97ca7
-
C:\Users\Admin\AppData\Local\Temp\Cab2281.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar2344.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a