Analysis
-
max time kernel
142s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:33
Static task
static1
Behavioral task
behavioral1
Sample
65dd4027da25f6d83b01f613c586baed_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65dd4027da25f6d83b01f613c586baed_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65dd4027da25f6d83b01f613c586baed_JaffaCakes118.html
-
Size
217KB
-
MD5
65dd4027da25f6d83b01f613c586baed
-
SHA1
e091a91e81cee82e8cfa10317ab8055119492e31
-
SHA256
ab056ce798d7833068ab6fbdfe1b82a8e0cf43043b84223f87de06321c847478
-
SHA512
bc3e4f71af3a7e40568badc17e0d5fe81a297b547d47ca726c8a89df8fafb5fc951c6b9599669c147292c225c8a73d786187f2c80e2f68224e055b0ac221d2e1
-
SSDEEP
3072:ScbX9ciTIyfkMY+BES09JXAnyrZalI+YQ:Scbtc+FsMYod+X3oI+YQ
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{060F08C1-17EC-11EF-A04B-4EB079F7C2BA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000003874c155f22e2d93ae7bc1b4c2547de6d7e0b7d39e369a2378024fbde38d92b8000000000e800000000200002000000042c96a44989dafdbda0b8e32e3f104812909974c1baa429f07f3c08ff1dd6bdd20000000093514730fe2af3fc86ba50be13983fb58bcd45caf4ed0d49f03037ee1ee92f740000000c16aee801aef1374a262657f12635f32a67d7532b27811dabaef8d6d8a89e7dc9c84c476e26ca3b6b8cb75132fa401f1fb6fc5b2859d06334f3e7d41bc11fd4f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422510662" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80fe5a1df9abda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2084 iexplore.exe 2084 iexplore.exe 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2084 wrote to memory of 2600 2084 iexplore.exe IEXPLORE.EXE PID 2084 wrote to memory of 2600 2084 iexplore.exe IEXPLORE.EXE PID 2084 wrote to memory of 2600 2084 iexplore.exe IEXPLORE.EXE PID 2084 wrote to memory of 2600 2084 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65dd4027da25f6d83b01f613c586baed_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ad555d967c5f2e2fb4e4cb2d4610ae9
SHA1aa1661c8e1c3a4e3f5ab0073c75ea5b321263bf6
SHA256d0b8ba0a960cd4cd1ba2d4ead4cb02da2eefbecda0c694a509e2f118136e9380
SHA512f684a76cbb950abf2dec2ca7f35a8d4ffdb23d97dcf615aeb7bfb9f12f0b870d42605d1d02debc9e5554262ccf408860bcc732d95e353fe99fcade36307a7746
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d648c0fd7dd62df63a4c87265ef5d8a1
SHA16263f68daeb3dac3e97e6c426b79b7ea772ccd0a
SHA256ced8a59459a5ee2bfeffe92399dc28ebe961dc5164b1d0f945735b7926bc1bdb
SHA512dd089af196193c4931ae7997cf232918bf463baffea854844509a30ad971426531a019722e4cadaadfcb21e1e502f97aae0005b502a1d48203d742b5d672e5c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fedd72dd0eb3d2262b43affe32cdc747
SHA145875d62f2251ebdb94b1c70b3384fefa591c1fc
SHA25688bb8aed0f7507c624febac3f50e3aabc454c158c4e44cb1d295e468301be614
SHA512927bcf70954a364f19f27593db84a8dd6db36d6d570c86c63897a8e08e2858c7722648e606c0b539b0050f0a411356acdbefa045c2ac94a0a18451619a9f73d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5005cd8b9b732b136668ec1e71925f4fc
SHA150c1ca6a57d68e56d860a71df9a5b02c986d3f4e
SHA256e15ad7ce4dc54aa6adf79784c334349d6a79eef907e659aa0fc24c211135a587
SHA512762d5d5b8a3608a0bec0e3acda3449efa93bcfb2dd1b737fbb498adf7bf190bb3a5826a33a07dbd39692a77ef907910bff0debe525422559b58db2054d394ba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55aa928f591b2eb800983cadcc5aeef95
SHA1463234edd3994535d2af5e7eb02c69022bbe3bb0
SHA256353ef3ee4d65e3648ed17eab64243c5b141874914cc83be1137b154b6c2adbdc
SHA51299d6da914b2e5964799ba8710e2d15de0872e71b5b7d19992ba340c61aae4560dcd71f41930612fd9c4e3aae2429de269f8e2b47bcc499b483d9b57bab9029b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55521b46acaca3db58b527cbc10c15ef7
SHA124c70b4e636a25e088863f30413a768cf7a065a5
SHA25697019c7378da50793e7d452594b09ac3bfad8fc65dec6a0daca72c8cfad3e0e4
SHA5121ef3c6815a8dc25e7014b6046870704846aa0be45c58a0718ccf831d80c45c6b7706837f4163ff1582b64514ce51d3ab6a018356f4d5bd24f95a7deeb3cc7230
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b45f1da3efdb6b0480d8dd298f844ec
SHA157226bba158f988fe451655b9afc4a574eff859d
SHA256270640973e8c9ef3513d2d91cb53a9ed6527e118c3912a3740a2862ad11e4b88
SHA5127a8a5d3ef8c7b14d39762454e94af277f8a09aaa4c1b26a17229af9fbf9076e55cf214e62947081cb2c827085dafe38bcc275d4cf33341f48c7adac28b14da80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554513025f5c2851cf590060e192215f0
SHA19d4128c8bd8c5de0177f6e4595f7e004773132f2
SHA256745d3420ebf2faeef436228ed702c72cd591de184d000e6daf761cef7837a66b
SHA512e3e3dbb27150337883416b988bde8862ac028dbb5f90d97cb13848661b7c4cdb48a7cb0fefcc15c6d45c6f2385b07b8f69383b8c63f669c920faf947b5b2aebc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d35f3e6475e2e1d92eb63b5af2ddd5a5
SHA1fa59e3bc6bea98af2f0e3eb2e79183fa7df15629
SHA2569df3a4c48c8af622ac1ce6c90d65e6e21d036fd18a23e18c98320b7aef347c35
SHA51254c4fc265528d2d6891d4b3049327c1422287272c759411f3ea5a9cf809762b5a1cd0df013078316846ee9fd3f2c534e677f77d85b2b390cebe6fe8f3161fbc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a4d29fb1d7247e24782b8c746d72861
SHA13ab561315ef315257e66f06deab2b1a925c9615c
SHA25607b03ac5f8a4c64ff4b7197c91175cdee06febc797bafd4571f02786d39d5fba
SHA512745cf86fa4529cc23fdc24db27cfa46227c7c7647ce1313b672d275cbe2abd2572781aae4fdaf3eeb7ca8c49af2ffb82d27d2411d3a67ced8067c9944c4a0489
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587423ae9b2cbcdaa7fd58746ec4fc07d
SHA149c56f1f9e12dcf26d4e3206353b5dbb6e0f473c
SHA256f5c2e4ad8f8f7b3777adf1515b242eb5592f8dbafc536f756455d13b780eeea2
SHA512a912fce7e8dd1e5f548721f3d981525f4c289f79d2707e91bbf847628150f5782c4861d5ee48d59ccabb3138f1482ec4ef460861e18429b0e8f2a334c8d04e9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55939c890c93245a5a85e87e07b76db46
SHA1f47f8125d0aee1de90535db046a09fd53561ebfb
SHA256175abc96e3502de65922621b648a97b39d5a3a11680dac2754ffa233bffcd9c4
SHA51242688dffa57cb1a0673ac222bb2aaecc29fb843a6b998580258ec9c1c0084bd8d1e675cbcc3d11c9a66250f8b7b6e3ada9891c49440f646d46e63f845ce421d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54bcd58d360f8154d9cad94657adb8112
SHA15d700651debb69f19617a5695824ef2fe689c9e7
SHA2566beaa9d3de2c0dfe6688968a0a472720894c195ff9a6c6afc4d6cf29b5d684ff
SHA512d2114c59e7bb0b226e62adcc44a78b08c3078b6e6ef6db855cc44581b03fd9fa566a8d9c0bbba4be55aa832614f10314e0e5202352ad71d4401aa1dc2d6890f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51dce7a76fbbf8ec2e094a1bdbfe84232
SHA1384698f42515597582113a87045235404628a293
SHA2565b760397687645a00df018e57a35e7905ef7a94a31f0a5d7d2199fd715a7ce36
SHA512f53138c6debd6080b8a6cd39816583f4b2022396ec892bfa1409165c209fd6821509e45c59ff966251b9b14ce6d7c614a5dd5192cbc0ff8be1c8bad28a093ad4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bdcb791879881d3a3982c9a9852aa54b
SHA1b069309d4d312d84d8e5ac26ade9d29d61e5b22d
SHA2565785093c90bc5bca05a09488608792c9b405a174c5dce7e11f31a22e7dae5cb7
SHA512cf8157ff11abcc6c7d40ddfb9a0cfe344e1092e3f20d5b4a7fb736208659eb10cd0ae6e153924c7fca9d91d5ddbda4b899ad29863615ed5db7cf1450e87dc8f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570387fa85c44b3b0d6fbaf382c718980
SHA1da0fb2b8380e20541e8452cf3463dfe3ce6a0d07
SHA256cc6a1879088982dea4f91345d2c313ad04746c878826fba71e42c28e401d0b52
SHA5129a3d727ac88a527a575fcea46fb5bad8aefb396cdb0671ba9557da0f923ebc212ac5afead7bbd634ce879b6013e92f2c1488efc52283f047a166c812058fc8bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e76cbcbaed9acb585ef63fb545c3c09
SHA159eb5e7f5cb61a1e24427606bba1caeb92cee0f6
SHA256e3760b1038cbe109127e24702e0d3c55a8925dedb51f863e10a8185c53c00ae6
SHA5128577c43f60435c67b23d8f2074f3876ab8ef499ccd88f1bf0240cb46c28fd7be388e1f19f16b73d20b56b3f74b3ebb1ee0bddfb0f63dfe27c1f5fcf57ac38a22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9e49e3777a3dd0d7aff850cec085a49
SHA1774841e31493e0c887b5d19ad8848525ebdc23bd
SHA256ab33a8beba9ce085d5f1e8c33c29eb7cf72154324b17afbbea871639648b58d4
SHA5128c6b1a60310afbfd8bbfcf5f0b80145e24834c6c747cee22215085db588e6c173cb3c8d9e1057a85cffbd5415c3040b452a3273a4cca71647f541d38d53b629f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a