Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:37
Static task
static1
Behavioral task
behavioral1
Sample
65e031f9f09a00b4d1e9936456c1ee60_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65e031f9f09a00b4d1e9936456c1ee60_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65e031f9f09a00b4d1e9936456c1ee60_JaffaCakes118.html
-
Size
43KB
-
MD5
65e031f9f09a00b4d1e9936456c1ee60
-
SHA1
9458d78e1890b6d91f4c99cb6456fa9a62e9aed3
-
SHA256
e3e252495acde6b2259b9f60c22b36cae95ae1307a23529a374531a6467d67a3
-
SHA512
d3ab76b69435077622557d8069f58fcd131b61bb0097cff393abbbc7ab07eed6b596b2d5cb1711b345735b16ee218ab7bf8f7d34f5169976811fd6afe9aba9b1
-
SSDEEP
768:0oSocMO12UhaUPMqdXBPdG5mGs6fXnTts2+b3mMeYLswB1WwU2wvVbsGuzdbOkNf:0oZvOxdESxFUBT/O7octwNYjqjzO9
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20e94179f9abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{98AB69D1-17EC-11EF-A5B4-4205ACB4EED4} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000004253c1022ce794992928280f0ebcfe823d9b737b9170f8181851fee949d90eb5000000000e8000000002000020000000f066d1510294cc92acb7f16d59f1e8872a952bba83213c9dc736796a1bb87ffb200000008fd10c1144ca677fec2359627334c6b6d3e71f1ffa5791b3dfc5bb385c433a134000000084c8eb5aa6b5e2e075b8de07bd200748c6d6f45389fd2bdc6fc09ff005dedc88cf789b3b00e6ba4aa35f80660a4926cafe74d4f38ab007961f692abd0c3d856c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422510908" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2248 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2248 iexplore.exe 2248 iexplore.exe 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2248 wrote to memory of 2584 2248 iexplore.exe IEXPLORE.EXE PID 2248 wrote to memory of 2584 2248 iexplore.exe IEXPLORE.EXE PID 2248 wrote to memory of 2584 2248 iexplore.exe IEXPLORE.EXE PID 2248 wrote to memory of 2584 2248 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65e031f9f09a00b4d1e9936456c1ee60_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2248 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1e5ce6d2240ac328424918cbb5d775d
SHA1148960ebbf9aa89f5646acd93b56426b40b388ae
SHA2561422f4d6e5a9bd2c6066388d63c8228b4469ada0dc00d95416962a587046b4fa
SHA512dfdb8147347ed13cc3417da12ae2a9757e78116d78ee4d14d455e631efc18bde27e66335bb1ff605b3a9349ecdd7ac22aaef098dbdf2ad9aa6aa97f410b9e4f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eebbe5ddd0abd2cd08d9b8670b3fb262
SHA1c29efedadf8c1ee7c1a81ae55e606ef1c593a525
SHA2562dd2e1f65a05f7a091675578e0830c42294adbf60bdebb2bf032c98725a29093
SHA512b6035d80a4ba4e7d970684f8e0531eb16e26b9ae0babb01378198608a50a77f03d32d3ae5120ae18a61eb940202f8d0188e7295f620cbab7f9971a002b2ff859
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4859614ba7463b3ba54d9cfaa9f0399
SHA12207583e184f616abca4791f73ad3ea61570c8cc
SHA2561c0c60ebdaead3648563acb9cb5bf8c638bb58436bf82b7b3b6d7298d0aeb6d9
SHA512d031bf979264a3fb73854fc15104a675d0cfe340a4aa0ee15a1be7536f53c20d684aabd246d7898274866547807b3829a48f1bddcb1585890bbe03d0e768fd83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf381f14652b13315ca8c53e19a3becb
SHA18874110548593ed5512aef467ce97527084dd6c7
SHA256503faeddff41358316242c5e0a9373a0778c112d9fe73e1d942f44144cac6035
SHA51214b5efdfd9b8cf69cf7658ffc49f7fa88cc13c737591cc12e7b182786f38315da5d1c58c2ee06a1648ce653cdc3ce1ca33e427cfeb1063a05bdfc20830d31cfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a416e07cf60d310d986be0ff4aa74b7
SHA1cd7c0dc624612eda3e5b5d4b4ed5f9fade752313
SHA2565030f694b5fb166982d95f09c090fff2e6113fc4b1deb4ef01544f1c14e0309b
SHA5122f06e5fc391cf84ee0aa245de8f95b7fc3aa0ecebbafdd11b162313a0e4eefe83b64a24134c4cb081a6df15d3eda63a29c72cc5ac5f80061689fac16b6c3be53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5769ca169071888aa741012e314655461
SHA1937c11596f279782ad25f035d7409aaf554d1372
SHA256a4389108b4d25be0272e069d1ba105e15a12609f32c16410c0cb8f6945c90a37
SHA512f55592183977c75952ac10e900be3599c103d45159636a220341dd1f8c033ce4b50f279e8eb94efa7d6849922797272508779e62d0268c8ccbafc325c03f64c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea98702a397a5b3a497469889ffa7ef2
SHA1ede0b893610a860434c663dd94971d1436fb23b6
SHA2567d6e6b4d8a74cbbc4bc39a42c89d5fa7edebf0c78c68d69993bf8eb1bbdc98dd
SHA512eb44aed3a726e8e9640465d002aec0a85778639fde22d91c780656072606a6a4a97dc40dab1878b76ecc4b4ae6f56f06dcd61307979ef20dc6b561f95cc1ccbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5149666a9d6ad74e654a17ba6526f5910
SHA10072eba1ed34858b328fcabdbe4f1c98b7a70fa4
SHA25677e05906d255a29e49e8ead2a99ad4be4a0c7ac9c9c053426da325c0314f52f1
SHA512c196497a2f868deef3daad701595a86d6e90b67ebc649cf2e46adb8e084969afdede8b9eaf2c8e9845eb2cbfcfbb408e327a2065c6a51fc7e2abbd000a1a4f11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a465c3ea0d290d33ebda153586f20260
SHA1bb33a65410ca36927c278a0106e14a70d92bce8b
SHA2560ad6e26ba47a83d60fd98e8b818d7a65813aad6d3ca63975e60511116da6c4e1
SHA51232dc782728ef4fe46ff965cb7af3c3a1bde94a83ad1abc955c17e830e54af02b8f316bc740eb4e8c45c8d2791cda48a59e15b68003771a5620ca38896099d9df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bdd4556fe8fdce3a7f93fb09529e0ed2
SHA14ede8f67596e3bb4f366ce9f3b5c140d3b6bec3b
SHA2567600ccf28498fbfb9567424836962e8126406afd87e342f06a49d51570c30e91
SHA5129ae62bb4e0581eb607c62f61edb6025c355b9372639c911fd7218fe5df06b7413e970f013b92a046d84bb357df1748678a2c4ed008a70bed275d2caf341fca8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59695922cab3853a8ab914e1f5a0fc864
SHA155b42f38c6051525c73372f0ac9808a9fb9315e2
SHA256b10460ebd8616a213b0d55636524fc04df3e50f924573219982f1c548f4d2ba4
SHA5122c10e5e10c9ac01f552d210fa43b758f53d2607f4008e4a5a310f3c27071a6b5abb6a719ea667997c58addfc954c4350dfce5dd31161e5c739e642ad628e501b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572753c0e059ce6c109a9ab01c90a64f2
SHA11526079413a456eb6c8b6195a9d0dc7166b98a6c
SHA256d6141194186ce49b27bfd61eb631af5d9965d2b5632d058de87c9a69d12904b7
SHA512267cae73c7cbd47c3ebd04d4b1734e9d6095df0f0e06a70b634481595b206f37c3b64805275a8720a549f22b8f445225d1ff9cd28a2916c9a8e906208ee97e27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54117df901fcc20472bb5447910a153a7
SHA1a257ffd74c8447d00febcf9bf6746d9eb6308976
SHA2566460a19c97c7c9c81b3da9febb27544cffd4e27abea0e3734da759eb1d0634c1
SHA5125318333364419c64f71b45abefd1e532a97ec50b6e82641383b56560f7ae6a05f7befeb0cdd74aa5c56f391c3c21d2a2aa27b36361a90f029b9e5dc2ebd245ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b0166396a521633139e8414f4dd9147
SHA1e56531fdb612a27a8874b8fccc04ec278f94ad55
SHA25602d9145278a292bc5752a0b4391dd351592c302a230e83c7b2f344fca5c3a09e
SHA51247811b0797b9b65b5d617d6fcc68efe66af21506258abf91742c07980c968a7bec4f3a08883540138f1d194bc43e27cf20796b0373b82c99454d9fe975c23abe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a1801473e2fb9162cae9321424d2be7
SHA1e16073fddf06465ec54e16e9a8812d405d39d75a
SHA256c4556ca60d9442db4aa9bdb02f83cd2fe4e692db326fdd754775a159153989be
SHA51224e707afc1b862e10ba1c0a7e56037dce2a2d8be66a494f84f79f040413c801c279ec50f809006e666387bc65586213bfe2cf7ab3a22a55eae33dc393d14ee0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dad39e908d083833ea46b0c24e92c921
SHA17e81c0007ffeb5e10d300b256a17c65079d97077
SHA2562d8d177f451e4920461ee4d5c2e5210e741ad930fc56a7c5494344c6534ae2c4
SHA51251de9c301ef3b4494f3e72d5f561af100919ecb07b3ec1d20bb32c2df4eae893456bc4d988087630ed2df892e25f51c4ee2a4727679d643d490af11c40559b4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b14fce651e55af7b2048ff58227dc85
SHA1821880b01fa4dd8eafe56065a92e879e0ae213c1
SHA2568d64e64b0e5752d61c6e70b4dae9364f188fd7cc8054750c43c01da823ee5fce
SHA51249166fbf171137b53adffe43a2fa18cb00c36b966009b1e5eab8f64d6a7f4ecfe48bf6127e8dd15b8d6ae7e9bdbbb8da09054cf1a5444039733fef5a49591868
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b478d738ae82f6281234e042f150195
SHA1b75ade01075b683f256b7c2261c94a1d0966d168
SHA2563ecef81d2bb243938cfc29cdc1c9829b7adc1f81560f1b367db35847360ac171
SHA512f1259838e45c6ae95fb7e88e037044283cd5251ec831bf56372959518deb8189b0c3f1807fe51af2c5ed074c2bc435b580ead5cec820108813b734a18245d164
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b51b175173c63905dba972340268bfc1
SHA15e56d33e723ac8b215101b3dbdcaea182867b0e9
SHA256186601826e6c720aa32e4b1542f2377d3513d26565b5cd13ba8a1ad4d9025e74
SHA512b484341e7aee78ff7b62669ff58a3311cd8857ce47d97aaeeb98950dd58091b0e7915dc61a080bc8aaf61fe77946673a4ea20ecb476e1dfee95b4c5d92f90fed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5864919893581533c2d9704f3f0329e16
SHA1024168ffd38e0b0c3fc32890703e8b6439a23ba1
SHA256318aff41db9fd7af64bd50baa65ee433cba68acf093a5b26fe43eee0e1a109eb
SHA5124af82e60988630e6d52a21c3071140a95d1b1e6b898e2bd3bd0903f2d0c4fef408d530a3e67bd04ced16e979f4ca45db6f58409453f4beb139947ed9e11a9390
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a