Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:22
Static task
static1
Behavioral task
behavioral1
Sample
65ac31bff2da73fd4d538994de81b12e_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65ac31bff2da73fd4d538994de81b12e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65ac31bff2da73fd4d538994de81b12e_JaffaCakes118.html
-
Size
460KB
-
MD5
65ac31bff2da73fd4d538994de81b12e
-
SHA1
f5e0e32158ed08075907ae0df6f5c2d9a90502db
-
SHA256
8ce38c6f990b398c3a9698a65846069919414a72ec9092d48f3c56fd44577777
-
SHA512
2dd3a58c59bb260b3f5c12e32d1ef05599d1d593476fc9dc578380a3b6c73025c677f480489b600f51251cb96e1c8542a6fddf088c2e913c00be7a06831bfd9a
-
SSDEEP
6144:SgsMYod+X3oI+YYQusMYod+X3oI+YSsMYod+X3oI+YLsMYod+X3oI+YQ:r5d+X3u5d+X3+5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1F11BA71-17E2-11EF-BD9C-4E559C6B32B6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50cc92f7eeabda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422506409" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000c92d7bd09a588bfd01d8f2190c2bd8979a3180a7a1c2439c332d15c6f1ccebad000000000e80000000020000200000001919c0e835ae19ab587732a59925e54b1f08efae1739fe5b2e416c48729e4ca52000000004cd3b8747b9c6a7a01083e227844940b9c98b8abccfb1751ede8c93779468a6400000000457133af4e41d408aac2531f611306a8ecc4d00e3dcf269f6e902a29dd463a450e14372176d85089127a9d306289c07d6a08807ca8da8dc744526b68802e7ce iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2900 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2900 iexplore.exe 2900 iexplore.exe 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2900 wrote to memory of 2072 2900 iexplore.exe IEXPLORE.EXE PID 2900 wrote to memory of 2072 2900 iexplore.exe IEXPLORE.EXE PID 2900 wrote to memory of 2072 2900 iexplore.exe IEXPLORE.EXE PID 2900 wrote to memory of 2072 2900 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65ac31bff2da73fd4d538994de81b12e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2900 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51af18c6379e3f73a7603c09629162b6f
SHA15b9489ce1db8b86b8717a79bf5dd9c8e6e0bf3e6
SHA256fbd60de977a0d3ec136c334d94029a0dea92fba258fde9995f8db01251f62e07
SHA512ab7108dbc78974183db1a7879065fa0d4393cf2efbbad20ceea6aa799e181d37c1ad5e97eb9de851891b23065c3c59d7a459bb4c3530cc6f2c5b937bd77bcb9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD547a0f63714e46c4b9310368917d0f728
SHA130552261f245fd95a429086a836ef7eaafed0678
SHA2563ab38e643c9b9dcf3df86526e7740c1bd71b8c28ad79a1817267eb98b3e9ec09
SHA51257903789257368d675095dc5148680b5c64cfb36e2acac69fe45aa9ed1dadc5a1b0e12168569bf080dc203b5332005a0c2fda3e59d400cf96d6332af1775b7b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e75e60f895cc96a8e6fb8b79b7946818
SHA10c715e35d7ed1bb6f6581574112f678c684318ee
SHA25616c73384a4ea974e8169c3953fd9a7ff35916176022ed147e6438cd689721630
SHA512a0ed133dbc8bbe5c4839c1bd1e31931cb13ec56dd445046919a55f9111ad6f18d8ef2d4abc0392398eb1c5b9b713949b9c461e6dbf99ef729a9c9868d5af795c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD50749dbc52a46f41e911153772c561889
SHA1c541878c0a28236e11aee492522e06b78c571057
SHA256fdde00c1ed5dcddc916c9999ed6f93ee3b0937001bf0424722853a9802e3f39f
SHA512d4906932a5f1afaedd9e669565c424ff52c82a75d0430c65279dd2eade92385114cc583b443dd82dbfc347818915d9d66b85e9345fe176cd4e31addae9f57935
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a59eb248a23b427c59bb348efcc471e7
SHA1cb72bb327243ab53d38a6fdc7da9e88895a03d38
SHA256cce43908cd8c1b0c1ffba98024d1517b0b434f64ddd9dd5eb0650ea4c603471f
SHA512b8d3672c0dbd5b1a25a8468af7a74e25ad0a4dc71281375e51b3cb44cc040cf3c025c0e490497023489e596d95eca4c55cdbeb9124184c8d3d602a6700f3db9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d917b8a9327f8a59c92987dfac31e834
SHA11f3c5ba8f6423bf275cf138aeb9a78f12f25329e
SHA25612f53a2e2b59cddde0bfdda2a161252eeb58c9a18ec4a69e47095c6821caa4f8
SHA512c219f9822a9d58708b5eb8693ce9c5cfc555a7998bc78c57571e27dc323fc6559b1936520e660216a674c432f86cc6aea25e5a70af316886581648dcf5e9483f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5595d477da8c481095dc150bdaace0f27
SHA12b28c8ab8e4b5459e7ce8fb17c1cb6cf2fed2f05
SHA2560e0f0f788946fa51ddd92becc0ee79b256abe51c72737f3dc64cc78ceb959d09
SHA51214f09f4dc5b78ea52832903c2316c29995a76278c12c7199c1d1883215f963175e9223a7a9ceb94eb7084f2e9c3acca772afe6b954ad4aac4285546bd22f41b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD504183fbd38d76de495c8b85e55073147
SHA19985146d0e735168175aad64d42ce375afbb8725
SHA256c57d127ea9acb590cb296ccf0dba6a7c8b69886f1bd33495fe4a4f93cc696077
SHA51251d58086527db19dcb249be9ac9edc693af5e16e19ba9bbcb6ee8b2081d59e7c64ff33b9640c3f7da7a0aeb48ad760896cfa43b335a49e891052b95cf5e366b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5da6edad5f791e5bc2891b239717ae976
SHA10ddf21a37e7917bc9a8b174902fe25d1ab7fa8f4
SHA2564eb476c87f3937a4e2c9faf365fe733fba3cb278de1f6f7013237adf753381f6
SHA5129a723015c22d6ecba407c5575ba65f057319efd1ede433da4abc1036ebdb346567d4978349bf5395c9677990d5c92d3f051e969c34939f27f01c6114b82aab0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD58e1dcbea82347ee90c5991f8b0dbb171
SHA198a3a89dd1e44d9d0e79930bd35929d53b7f9fc0
SHA25680446c98b5299fc9dec976a6143438c99c668a8055be932924f0daeb152006f3
SHA5121ef6afa539d19b131f6f991627f8cf4019aa86a69f671329902b85ed6043944bd132efb56684d355cb02898b71b61c741cddb6320c84c6c5192a4d01abe56667
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD570d1638727c2f51b04541d097aba5aa6
SHA14fb2d03ed78abbd5bba528f71a85ebb230c91b50
SHA256b84358f454b8bd214463687b6215900330c59e96e82d84d9967aaff8a152064a
SHA51211aab1161f5705c958ea1ed9f503e078c55f5473ed69f3054c472db9af401c08407cd5112f25cdd5d7ba85665ce4ca574543f16f7a5632bebc8d805b89b40336
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD575ea0826bd04e11a5ac0253750ff6dda
SHA132638cc2cb2957f4ffc881e6ecd73f706c12a7da
SHA256fae057975640d72a9b8d096cac2e94eaee97152a4d19664f060db27d4fc2a5a4
SHA5125a91b0704b3b2a7362caf6e7f1d6c0fdd5b4bd1c5de8520e3e3626a0eb5786af975e70c02fec2a5eeda8413a0758a08d6b180971e975694a83b98cf5a8955db8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a6668138ebb4a9c7116dd0b77b053352
SHA1467abd17f9c894c5797e558157b1cff2963a9f95
SHA25636d90726bf82a1233c931ebfebdd05cec8b32a7464e9d8124c895accac11e631
SHA5126400fd4597379e6ac32aeaf82b038f89b0e6da42884a944b1790a194fbffd3aca3b2e20344e769cb0a18eb816db291ea7c241b79b5d00270e405429c42aa4745
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD597a15f582316fef704da9e0237a59d1f
SHA1af4aec17c89ceb4625b35618ab98a30502440167
SHA256056706c9b64b3238764493fb8313066b69cf26021f45e28f8fa5b8ad7a902e6c
SHA512c80975db220d75889fda074b17c366271e0a1259adb9d51f1abd51422ce9f059d816f26ed4766b44cc4af928ed12eba5cc032feb261339530de9da4ced30973d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e77b0feb5d5ca20637f743856de2610a
SHA1e93b94d28a94558a252ca8150fc58571d078cf9e
SHA256193f5c9c8a2b9705519961abcb5a3e460792dd744929bfebd4a11735c9e7590f
SHA5121ef32348fa844ab4a00c3ea54774583e7fbe22f2281dd62f6f92c9a5526f3791fd4a188ac941bb75332a3c89d294f012ac2fd9486b544f32a23886a59f840df8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD52e1178664dda38b3b494d91d422ce4ed
SHA1404ab494ec19fa4fa4dc886d1a2da84b1cc76e47
SHA256543ee76688b6907d0ce84b37865abe50a37a4ea69a4b4eed536eccf912952825
SHA5124f5fa18bc57431cbdc2d4d6a4ee1ab533f2dffdf437d7c23fb0998f15377538610758fd9a0fd5c4bb61ffb5a298bd6947b61c6804315db3cd860d83045522d09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e7d2596ea6dbd1ee4727c42b9cf4deb5
SHA1fc7e558abcf8087f446424406b337969e18a9a89
SHA256beef72c3cd72e3a686eab1d4378a67052461cbcf388ff064239ba3536c856fdb
SHA512f0b6b03cd16e3e138114ab04f3e84eb79ad2437f61ff2adb9117c2454aa06ddc9e5f9432891a2fd6ccb200336ad8bead63a88d411f8e4406479d04661b2879a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD585e694a3e44d8d910fc85ff7bc05cb54
SHA1e1fdb88dffa958126dfc3e799ea55dca064ab38f
SHA2561b95beb1c5cc999595340c22c80cdad8a554adf4c7651ab2e5e259d9fafba710
SHA5127cd99f2d324f718b572860048b326dbf82ed14fb26410d305e673bd85ba99a23a67f5e1fc7e31360d159f6a7b6e90bd7db4ee9bfe2ec77b293d3de0b769adb87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5134b6e568adc3530601572e6cce0b9ac
SHA1d59fb22e1631fe96ba208e870090cb957714ae72
SHA256194c09d9689dd634203093bb91ce779337ef8e35f2bb4aecdcbf1c5c7d4a2200
SHA512e4b57271ee118139cc54ba758799ef46c8244d77e5684f18eb86065f38ec9b1af6e01ab484300a980be28adf1258221e539581a346d8d8619f893be845a9e6e6
-
C:\Users\Admin\AppData\Local\Temp\Cab4BA3.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\Tar4C14.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a