Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:28
Static task
static1
Behavioral task
behavioral1
Sample
65db22e558d3d087873b18790a019f53_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65db22e558d3d087873b18790a019f53_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65db22e558d3d087873b18790a019f53_JaffaCakes118.html
-
Size
46KB
-
MD5
65db22e558d3d087873b18790a019f53
-
SHA1
b83a8efd89a2d5c219abc7d9bf3e94efc327140e
-
SHA256
e4cdd1fbbc47f8638e0985a85363b7b5749e6b7cdfb72d410858c1eeaab5ee55
-
SHA512
08d3cb126f929b25fb5504f3b06d5669db2afea73bad29a567c482c86ec41e0b9b8e5eda692218723a19b11d669fcc3c13224117cd0918785d3a6a5814a70bfb
-
SSDEEP
384:zpEcPfNeMbz3I++/I/9U77Zpb95et9WxcQ68RAnkjYDOtSqbSiCed62Us0EFR5ZR:XNU77Zpb97cQ6igVed69fwR5cyRS5246
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422510395" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{66EE0111-17EB-11EF-81DB-4E87F544447C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7076b76df8abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000acc03e4d9374c90da724249c2d47ef728563bf8ca7c5dd00fc325730e34c2ba9000000000e80000000020000200000002dce0619cba415e249aa9d74a6cccfcd24fedc0925fd7b09213ff25d1ccb59be200000006ae0e4c9dc621fe56c4801985581d32494540abcfa287cd4e3893d0b5c2d7f6340000000df5d6b9f88eddcf607807ced7fab38500b8b54c91d345618b2ad36c8fcfebf40d299752d245c90b240591d31447a585c0d2cceb99052fb99ed533284b5596635 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2176 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2176 iexplore.exe 2176 iexplore.exe 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2176 wrote to memory of 2448 2176 iexplore.exe IEXPLORE.EXE PID 2176 wrote to memory of 2448 2176 iexplore.exe IEXPLORE.EXE PID 2176 wrote to memory of 2448 2176 iexplore.exe IEXPLORE.EXE PID 2176 wrote to memory of 2448 2176 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65db22e558d3d087873b18790a019f53_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2176 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e23b24a8ccbb85af94839b870f797f7
SHA11efbdd49ba9fd82bce3370e63107067b74120a84
SHA25619a49657d9d60c0e27d7726cfc50081b11ad59fea55e5b7f92c50c0c4178c101
SHA51267bbfc7fdbdd5eeec9ea75e7a4b5621e1fac5fb5cdcd3a4918aa04c14f3aa4eb192c3369803e2621202c5f2581780a63e4f0c18287f7a11380728c579726a898
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516d307e3b51a232e33af7cb6973f334d
SHA1440b2d4e9d37f14831c563bf7718f8420f234ed1
SHA256809f38fe69b11a3c7621a99331517a0f79f22d4f1eced0c34848756f2850f474
SHA512d4832512bef30497a9dca3888f7ec0e05f8f55f2a4fcd8f77a5080829acab0a8025f82ebc705a4a217d1bc30e890391fed89e2f3e634e5aac17afba751a7b0f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562463c2da8cff1a753cd75554a3684f5
SHA11ea0637b822e6daf485947c3f417e2f402e50adc
SHA2560b2a49e0e0ab7eb0c0ebf78b55315cdd6966ec51a6ebb45a0b81a6e20c738faa
SHA512e6ed1b1b1c6f8384150b981fc64842be2922ccca2acbc459914867881f88e0aa76811b0d468759aa0265696ee1300ca33ca8b93c1efbf04ae32b0b917f144dc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54202cc031ef548c488a7f59537ed2105
SHA10fa284dfd60b3266b5f9e5670a2b59154779d1f5
SHA25683f118c7e61c89bc726eab5c6a49606b0e52c77dd20555513610ea26665f8ed0
SHA512901e77827d055aaaa613f40c3ad9220877ac474e02003bbe3744e216edb4e04fff11b0bdb43e4395cef02e9af35004ff12d589d86b7e4c25f01b618f31329b62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53308fd055c880b779637674c5a6caa45
SHA106ad9fbea2bbf527777c6ed95d95959bfe345f61
SHA25638aec68eb918eec07b6d2c571696f952e9ec4ac4ba14fa11cacc6b069a9a0310
SHA512fc24e348d7acc79eaccf02166b677576b85d3838a2edb19cc21d338aecef61a6d8dff822b4159e91adcdc17a20664e0166178bcb65955d60b7792b8e6caab907
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c762ebba9afb84c50f24a22135d7749
SHA15a78f8f8d645d349a3bd47bee02dbb04198502d0
SHA2567dcc05f8d5ee9cb249d645d247a2f21a25dd6e3882ce06df55b287ac14464fd1
SHA512b60225a47627c812276cb2c5e4783db4b32cf1f34b8e5bbb8b968b19ec62c2f3a1a4b555db14a59b23dd6844611d1e74a78b11b12bbb204e8f6cc2401642980e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5939a41bc9892fd1c264365a7c8a2b8c7
SHA1d324105b74cad2abfb142775e3342e1e747fb09f
SHA256b5774cd9c1b5f94c1fbfb81e272fd805adc908ee3189e9735f9ce983b5909f97
SHA51245058812ab43a0516ccab92cb6aeb1499efde5d0e591eeb41df0db2212c45296b566621aea6c4883c6e932b9ea55583af4f3e03a649a6867ab26405cc5cb1b12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d001bb0365fd3d1eabdcbfdd345c1c4b
SHA1bd6a4b45d55169a34fa5d9448cd5d0d2639ee189
SHA256d47317921bbc890dac3d0055dc8ac30b3c762b993c2240d56ae1c9df9c61da0b
SHA512748bb2ff6b60a27e68ef888b16fa62fc07d667a276061ecfef632028f039fa6bd29b4ecd202048a87365dcaf752aa00f39e2f85c7e2da65ce25a82121cd23129
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b904e835d4e8aa911e727f6d6d16abc
SHA1d7d3b01ab0d0f57cf340a28f5fdfea01396c365b
SHA2569589a185fbd014254779e1b8393cf91dc242d9c28ff45ba7bc970a58dc91288b
SHA512c2488775a2b7022bfeae7e0b51c33de48721861357b8d4bc6b114c16fe7389780a1106109873ef18ae7c34ea4b24d313f6709abba2c341ba18ac09a423d4bfcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b30b0968f1c8d2e2f6999d6c16447b0
SHA1b7b065df0a15a920ba3266331775e17e08f16a9b
SHA256ae66461d5dd0b3bd0691eebbfe669f120e7f6066d9e3519fd31f9662169cfe08
SHA51253445e2d5d1734ecd3d40920d1789028c52f341a8adf524a6033864dfce5bb6e26044bdb275f415b146d897df4dc38f5d25d27ad5cad19e0f60fb73e708326be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5155d3fbc7c8db1eabdccdabe6e788664
SHA16a539f9720b2e283025abf767569985ac89cbbc0
SHA2568891d10819f7929dadd5648b1433dddc711a0666895551c19257ff63d8e755d3
SHA5129fca7cf8ffb6d15fe2e3a422b47010424b356a33f43194dc83119d2476496f563a97311e78d28108451676b254cb04007f4bbe76fe9a86c4e32bb2b4013be12e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5381730ba8572c59387dd23b714ff992b
SHA1c924b8cc6bdce7a3cf65ce05220fa38514cf212a
SHA25653565543fcb687fe4173010404d3e1a7eba363f19726e98f7bd4f526a37afb7b
SHA5121698a0c638098c21a4f1c664a3d39919f4c1c556a1370b69750febea6f8c8edc54425e0fda25d0c13344f3ca2ec1409266a630733c94620f35ccfee8b8776b72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52277b3ee0c58fdc238d96d27cdbefcbf
SHA1e2472937d3059fd22d91f39b0e605b503efd9ad6
SHA256f9d0a41752d26b444484701e8e60deea179cd569f67d5b4ad37eae7753dce21a
SHA5125a4ff65f90da45e700452d423e6a50ccd087ffe88894fc9016381033b85aa05e8b96f3f8d8af5b9419a860c37d5dc2d1bcdc45a78ea5497df79c1b5d633a13a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519548814fe39fe65ce1027e206b4fc83
SHA15b70a7274eceb7ef087ca6a4ca3ec58941a5d975
SHA25695349f9a7cfbaf24ed49d715881368f93a73b6c1ceaee3ae8c3a3aa6c815b038
SHA512621a5cbfd778ab502eaf99c4543720c813cf873d11839d38de8d471a73265468455fdf4ab77da0204c90dc31289124052b7126705922389d3d272d8e773a42d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ad56575466a0a4c5721cde2caf20e83
SHA153f22be7b3b879f20af7a37c55fa4db98952ad0e
SHA256a5821a618fe433e7c9e28867bb7010b1bc5e82d520ad996793d7014ddd1a9e55
SHA5128c6033c9b60c7f41bcbf04110bdce1b485de6174d2c14d59ed5e73b67ae68f2c61e47054d472f9bd54c9493c8f1ee00ff8434e6c1dfb741fa8b69bd16f6bfc40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e458252e732a400a3e01047d96ee51a
SHA1875fa5d63e69f15015be0b167aff6b80f9ef5bd8
SHA2562149fe87060ce5cdd399af23b1726eb64bd732f02a91eb2169b22479b797234e
SHA512df9a60c33fb2fcbb4d75daadabb579e636a22e032ef199b9f45fcd2efd4662dd9eebee6481027635dd8dc1dcdf71d11686de21cfcafff3a8eae40bbfccf0b387
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbbc4140898d18dba1b0e05d6fe4b0ce
SHA1cb2d2334c5981aef7e00b8abcbade0a83534fac4
SHA256c0c0ccb1a7d847e4d42771a023ce8177487cef0085f9139cdb653a19d3e50456
SHA51263c387eb71033d737049007ea407128e8b424e35110e0736be67962a66ac84222c06afea21366e05cb69a4b1f48ce0ccf95d84b2c02decaf436aac62067863fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55dd87edfe8e43ee313e350a1cd58aa14
SHA1947fbc2ffcf5d3d408c1c0f1c0398000af5ab6bf
SHA256298ccd674d6bce1b9c1c7b173077a58e57993025da3bb47d1d94be45c227de50
SHA51261d7beb2269580d125433fdb02654058139bb1e16352a02c9ffd99cf02cd2deaea2df6fc6785d5afa9073d7ccfac0a8221d3311974786ffc7250e9ba4bfb4f70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e265e1d85b224b14a2bf438d62bc94b3
SHA1289f4629d280c4edac6146477a7311d8d708a01e
SHA256a738e6631c5b073e9695cdf3b6a332160d61565690db05a71727202e9d20027c
SHA512f4643319c197225f8853f49f9de5ceb19a95702c9ab6351fb9ad52d5ee4a0cc3d3aba9bfd444f6faba97a9d5d4c24d1f399e5f7e31bb3a06ad962355666f8ec0
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a