Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:41
Static task
static1
Behavioral task
behavioral1
Sample
65e25d3f3239c4b76dd298d126cbce2e_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65e25d3f3239c4b76dd298d126cbce2e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65e25d3f3239c4b76dd298d126cbce2e_JaffaCakes118.html
-
Size
32KB
-
MD5
65e25d3f3239c4b76dd298d126cbce2e
-
SHA1
62343bec7b4af948ba3e08057c63da606d8d03e6
-
SHA256
7a06360bd360a52e2a5ac64bc356ddc2946c9c1b775e60a25ea02c09090d51bd
-
SHA512
f087793b7c12475a3f92ad05ac7acbaaa36b5d2b15df030d53dcdd3a288bef27cf4453f96aafcdcd41889e1ee2a4204440e58aeb15ff2cb53cdb6bb99e7eb4bd
-
SSDEEP
768:djhLDJOHE4qEETu7PId8ZAtDqCQl1GzGEe9zfK5ApUcOHwQBYvK55+ViCpub2wVN:djhLDJOHE4qEETu7mqAtGnrGzGEe9zfC
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0e5ce05faabda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000b4f0350952069e957104e24f46fcd7c3d00c5dd50abeb5f5c2a383b886f99c71000000000e80000000020000200000006bbb09c635a278f8e88ba178b3bd4abcd7dad9dd4ee51c6b8967573d0cbfc8962000000052577a2cb98147e21a4ebd3182249a658a3341d443ccf69fefc488058a456ea540000000e477ed20fa889c07db720513a16f358891a16aa2a7f4cdbd98996ea438aa7c1063e8b736491e4f7d9ef52f02d031125ea6c631af0e283b7aa6419f163f202446 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422511159" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2E433861-17ED-11EF-ACD5-4635F953E0C8} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2136 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2136 iexplore.exe 2136 iexplore.exe 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2136 wrote to memory of 2924 2136 iexplore.exe IEXPLORE.EXE PID 2136 wrote to memory of 2924 2136 iexplore.exe IEXPLORE.EXE PID 2136 wrote to memory of 2924 2136 iexplore.exe IEXPLORE.EXE PID 2136 wrote to memory of 2924 2136 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65e25d3f3239c4b76dd298d126cbce2e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2136 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548c2654701b8b54acc42ff68080d630d
SHA167fe5a7f7edb2092fbcf9fef6f60591709a81f13
SHA256a87219e7855d3d5c233a8f04ca2a140aa38c08904ea61b36e96c20a398bea11a
SHA51232f4dff79d7f1d5ee9ebaa39f20d9529fef8457da46792249cec2d9b8b1ac23c1cc556cf27341ddf982084855a3dc45b54a8a6ebd0b9b6370593c0568f52cf39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501c412e5c47b5247ef7ee7f6db15e774
SHA10065895033cf7b0a55f54777c1face1a244fccf0
SHA2565a2b317ce2115de514f036d5cdc37f960f89cb50464e39ac095d398314e55ec2
SHA51268682f8d6e0cd65d268b5f0c3387fcd6903ba35089461cce83a939c0550830dde052e89bb3b20a4f58fc183035e4f3e772916f41a2429ed7b3fb7614bc8df0ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50619b4730be9407d70197c7d82619474
SHA1cc685f722aecd090534548bce6d711370c3078dc
SHA25627e721cda63cdd650c0fc1e3070a697df6551c1f6713c3f2f2b812c138ad9196
SHA5128d6eafb74423f0fd915c484e9659be17a4b5a51b54ec2e5baa4cd812099e6dd2f65c181d2564c91507990cdd071ea682886b7850f7a109ce4fe36d457ae07a27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b20902c2bb8f91b88ee9fb2cae34064f
SHA1e57395a5088054f6469d430e5fe4e8be5cf0701d
SHA256a8c222f3aacf5afc36c23bb0ed1e6000fe2e6eed6d7d4073bbb8d7d5b8112704
SHA512a2092088f97d08248c89257a21d2dae4205d1807d636d9e4705e84570918d9e37085c2e97854fb5cc0c4b4399c90687fa00647e30e0481eea5e3e65ad71c686f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56510edd362ca154040bfd44334e308be
SHA1817abf720c3942d7055bb5f49326f581002ad49a
SHA2563b5b615611b470ea04cdd4b5b1055cb8f60db0f58cb21d9f78d729f8d32792b6
SHA512a0acc2d55591c236970bc01d15ee5eb479e960e5c01032e987d8bc8ee2f9695b7559386402db9c6d85bd19575061ad9ca5bf138242099d70f3a4da0f25d9b3be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557b7577c5324f0feb938708d275ba722
SHA129d9673bdfe8db153adfad8c2b5d5fc89a5c8e1b
SHA2560eda4853eac069a8119aed55af8daaabf45226ae92612c8dab0cdd6ea84b44d3
SHA5120a4b31313d026268a0acbd50bcec703eadde6d0f5e8c0cd43c8dc0d5bbcb27fc2f71d390f52d3e22f979e06f0f0f3ffbb1a4a8930d5d9138405e0ffcd6498fa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e14407e23b92fa1d7941d7cefd992f3f
SHA1c6225fee8c091bb90921b029f77d392e96c7816a
SHA256845d2d984d71a9894c2932472e826118448ebe2d86d62b116a4e12d2944f11e3
SHA5120387ea53be07ffe282146cd3e9bdd93f664644611238966867cf7b27a06a338844241205bba34de8fe1b21e3d20b13c51f054f523ebc26f24a01341c9156f0dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ef4d6a24f3d05804532c6285d992036
SHA19c8618570cdfb8ac9ebeaaa0871dcc2e007439a2
SHA256f0212da37efd7cfc9a3867b59599e0536253369460783fe70ed7aaa04184d2af
SHA51231e4b43e4940ccc190823f7af34536b2bd5339022f1f4621dc2e4a0a2d39bf174b05b4df62763359a72755faac723f02517f2249fec734c25196985a6be11007
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541da7dbdb2a7a07071c06540f7d397cb
SHA1bf79f18048e187d4554594db567d5df76164d545
SHA256f65a1256bfd3335bf5b97b5298ceb17618d675c4a656067cfa5e5c882ba863f4
SHA512442dc4f5659ad7bb173f2f0b0ab952c0f85f77eca401112155851239205437d8bf6d32b22e783df4473dd3fe9b6810c5d767477837be88c48242255478e0ac8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdf6212ca462959e5deb736346fb95de
SHA1b1653e7c1c5fd6ec744d0b5f99978f127531e440
SHA2566346038dbd1622b1ce10fe5a896b9278982920912e3c3453d10f9ece2c3a0287
SHA51286b639f7ba8b985a7e0e6827b53fe55a38520bb0d2770082dd6ca5ecf39f543a750bfabe5d92f23c5d20c8dba3b7106e673fba823d0ca0a4eced2d1fd2720831
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53888c0d721c6151c09d85f7eaf51e63a
SHA1ae0de9c8194e23c89aca25e52d17efb4e492eb6f
SHA256b7552d6a0878e99ec06e201318122c72f01c6c73bfa8f91eab6e30f4e29b5f4f
SHA51269cc8dcc011ccd7a7c93724a6c14e0ec0284e45ee30771969255b128abac09fc1102f3072782b0b32879e0a60a0ccf26ccba8d284f22533e6092962d3b01d9f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ddee2409da4875f64bbb30926ac9cda
SHA19a440c1b0760b28641f3777733b773e3a8611990
SHA25681d8d4bd12fc057169fce0360032db79b3a2209ba4505bad9c6eecae682bae90
SHA512bc523724c03ccd74891599bde2308f0ff0ffadf78d50ddbd14203cd8527d22cd9a57fd5b3087e6384aa4eaeffa6cffc96af0890205598a29cf0ca998ead0a890
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3826cb7ebb96f0f811c4e527874f584
SHA1b4b1df55509cdb880e2d88537c2ff6fdb455e30d
SHA2563caac669ecd38553d047e7b464d28364d3e5de37c15ab8f9ffbcc326fbff7ebc
SHA5127e343f8a77d5d43ad56f5bedcdc83fb84cd7ff48065eb80debe3ff0f33714b724839d84fae3ea3b878a74879850ab5dbcf9368313e0ad36e81796aee24a7a8d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b7d879979895cbc2097e59c3617d0f5
SHA19ba790f81e55ba05d523f8d4550174bf9e998fab
SHA256b1021658cae0b99dcd0d9ff36c7aedf5d16723f5722e9e906a6c2784f8a2e6a1
SHA51222769273f2e58b7eec8c4697f439d667f91e3e9d94743f572eaeea3305b5256ef8e8f37c776386a6a70eb31470401b5a8e5f69d94d11a72f76418b95d8f58f66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52175e1e8537adfc47b981aa45f1439cb
SHA186715fa190efee1ad5993b0a764b473b50726661
SHA256d305428475aacbe32675ea6e116eb7f4372164f515002552056b9e36b4cd1c9d
SHA512f466ee624953e787530b258072cac4bf289c04224710f16d2dcafded2b8f7e744ec626b6b86cf47465102bd65890318f562ccbf2c56d02fa3abc6fc5873a24d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c4ccde71b6aa2196a6eaa8d9f5c0b4f
SHA1f8407818e6158754192f12720a245e3e2b168352
SHA256ba0907dd7e166dd4fc02dd63056d0dead1d0ba12915cbebcc25552b94436b3d6
SHA512cb93b93a4dd2174202988797f613409f9f3b445d2c46f3664515b191f4cec5cb32c53b8493fa59b239d08be6738fdc3fb29956d813389535aea02bc4836c57a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596da01d6235b3852343964898b53ba77
SHA1714d59fd4f0b75016474e7dfd11ec881ff46fd37
SHA256f4a20e86a87d4f39d75c5f779d40fdca6bdedda05e43242802dac80909b941c4
SHA512e367135638af39e44931b792d3884abc306199924725edb09beaab23cedab85dbcfe54e21e8d546d4896dbb9c8123c945809dd86b191583ae511e0e6a55b8b29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59732bce4ebffde2c1fa8ec3c608dc4b8
SHA10e3a97dfce32783147ceda1f2c2be709f1a94ade
SHA2563226f38be28cc2e54062be208328d4da5db1a1226cb8f12dc5d971aa07ead5c3
SHA512f093650a2b41c6197672eda62c0ef015aafa134e3615c6d334522926dd6ba5cee5bcca938f3e33fb69577a3e81629bea72875a0f080dc4231b45504d596d6f8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f64a46851c0de9d87cb1e43601d0034
SHA1274c6e46a1e0a9781523139cddc4eb7bfa9da9a4
SHA256fafaa0f3b358f5044a4364bc191e50f6aa558819a618b0de970674d2d7c16591
SHA51268074ad189a3ecf9026b46d96c4cbce5f1189a2e7766e868992cfa9f3b152df183bbde000ae5e7ab441b326d8ceb728acc8424a90cb058e565b5dde9710e8131
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a78393016f14f38d1564d492d21138f
SHA13f9fb9c4471185ad2d088e6244fa903f40f72a2e
SHA256e06327ef34ba855a57341de2c75f53600784b81beea676d2eacaefbb90d7ba05
SHA5127b54c5c3b8b6c92b815647cc7a37d4094597e9bc979e319789c2f214d33e880e31481d57813338ef0ff4ba686cdbef925d9861616641d4ceffd0b512e9a6fd13
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a