Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:41
Static task
static1
Behavioral task
behavioral1
Sample
65e298f5380c2a887c457fde1d7c385c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65e298f5380c2a887c457fde1d7c385c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65e298f5380c2a887c457fde1d7c385c_JaffaCakes118.html
-
Size
460KB
-
MD5
65e298f5380c2a887c457fde1d7c385c
-
SHA1
b0222f4aaa595fe2f28920e5f8f258bfc8aed618
-
SHA256
f9293de1ed823086078e13d0cd18a45d9af87b036f1cccaef1b5fc4bab904e46
-
SHA512
181dfa07188e7622eb130281505f332eeceb410097add48e29876024fed417e42985a55c198bab82a823c164774dd57db06d4782c2d50e71ec7d181690bd23a3
-
SSDEEP
6144:S5sMYod+X3oI+YvsMYod+X3oI+YnsMYod+X3oI+YLsMYod+X3oI+YQ:+5d+X3d5d+X3t5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7773acb7de76847a9d8e254bed99020000000000200000000001066000000010000200000008dcefae990d752f5ec18a1bb098a1eb9020af9921ff7b718e5731c8d332688bd000000000e8000000002000020000000cc83b08f0473b4843a7f946484206dfb906589894e2175b5b2dae6d0fbcc8ae72000000017bad270cfd30d54798c2a8c4c31859f55040694d137896ce70e986a6319f58a4000000012ffa57ac468233b683f140d233ba127acbc2b45fe9390f02a379c02f7037a8d67e0b4bdf0d08cdc90cb3434f408aed31bbe3d245bfd4ea0481b8ebad9466390 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422511180" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3A3CC5A1-17ED-11EF-B85E-52C7B7C5B073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a06bdc12faabda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2132 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2132 iexplore.exe 2132 iexplore.exe 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2132 wrote to memory of 2908 2132 iexplore.exe IEXPLORE.EXE PID 2132 wrote to memory of 2908 2132 iexplore.exe IEXPLORE.EXE PID 2132 wrote to memory of 2908 2132 iexplore.exe IEXPLORE.EXE PID 2132 wrote to memory of 2908 2132 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65e298f5380c2a887c457fde1d7c385c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2132 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3acb370821c53cca259ab3b0474a02e
SHA105204c967e000abfed4dfaa11b5d9e199e25dab8
SHA256805c0ac8305ff9f47bae1d4e397768a34e1c497169d315472d14fc6dccedd35d
SHA512753c2b6622b2710d290ca0f3bd89a78d89811c0a2516781c94e9c8e363c57bc15e698f71d3fffd3d1543a9b4b89f70bdddc60736bddf4a3b72f9137c3d8e2653
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56732702785f0935d912c011706f219b6
SHA14fa1285ffcbb748db4d946e90bbe0e5bc251cba1
SHA256b1f3db0c5ad3b12322fb873e6954a0bdacf1b2fc139a4be1da1a9a9e315c645b
SHA5123809152c434a715312261a3849a363b69e0514f97916a46e47a04364d66ee55edfeececa97fcb1c77545bc35667d3ab4af70c399f9a14b2a6753cb2b6ab79158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506423f81cd028ac2444c86728503e3e0
SHA13f1f4264c706f07a943574f1cf40dd4a949d3afc
SHA256a0c50f4263623acee1419e90a849d6c094005ba50cf13b1880fabcc71ffdd731
SHA5120ed96af7ab10b3c3eeaada1853c3aa886ddaee4c0e4f60ee34026007f659cd6cad5c07d93be60b5bf71993ae9f94535c10eed6b35fbb3a520c1d7ae770b65511
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519aa12e5e994a025aee55b202f0e392d
SHA111ec242de1b4c23eb6d8af6d3c40df5c1f088eed
SHA25675cb792eeafcdb5f9df894c09310b08bb08573971db8ba7a8d76dc029423c8d2
SHA5121c7a76a13b302899ec07bf99037a6ac5867af0541abbcddd67869454904c907132d1a5cf8710b856f7e12414860857743d65189143a05172212735d179cb1575
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8bd8fe3787bc0b21f8ad113225a88f8
SHA18b1a309d6c32bffa53ef04ba13b3ce02bc86882e
SHA2568653ad8575cd712da60a911ecc0dee3c20a3a91d79688c64e00e26170af5d110
SHA512df3ad78340aaaf11522912dea339927295497fd594a372622c38e24da2a7380d4c578dff3707dbfcbc9174cef1b668681c985e0089c98265b88ffd119a09ce20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546c7062175c8d3c9f0064b4b3e32ac77
SHA15cec64a6cd1b39f4ac968bc416a64ada382b5c21
SHA2561a954db3075a19ff84ed36b593a9e19eea16a65a131e31aeb7b9e7f5dc3e1a37
SHA5126c8d2bd2a24f87736920fa2ece964232d930100960c1f3b4d1d151ce96bbff575ebf1cc11bd803f85a4aca444841e952bde64b6ab55e468930e0a5d77cc1da3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593bf14b49ea23024af94db70521ee293
SHA1390e85274c10969abf7173ae1c78c3c90686b580
SHA25635f329eb7eb6e8d69fe5dce24315ebeff5b1eaac72675ee64102352352ec144d
SHA51205334635adb1ac0b85e65dca1cd1faccd6956303f4a6c6277995a7688b9c4c454d5f88bfb33fc1957025dca148b652df4ddc90a8554706aabe415a5e1ba6e8ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3849f582a3e417d455abb2bba282293
SHA1ec4db033b74be42e8659684c9813aca3d3522813
SHA2561c5be9084ee5e80103fa825e726e4c91a351a779e012fcce4c5beb908e9d509b
SHA51252f18c6cd3bb30b210938509728f1179e12f5c15986dc4a49609cb19f536a670593fe0a6b0506826d64c2426f3f8e2015e74437f9ddaa01761ee0f9ce02c1e37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b47c546d3b9778121c37eae70087a4d
SHA1e7aa0a54718e9180716b6919a162676d72c92f81
SHA256d5f4c894669ff77220fc7814752b085d839dee4835bdea1fb81446f2d1c1ae89
SHA512c8c287322f7c4f6a88c75adf52a99fd0870926b5dccd82e1e37e29d0bb261d91be141a3c107a9ed02b4978c4e5a3baee4aba945a2ea03b8409007bea6a6ca32a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5516048aee0f474268845ef76c2b38bd0
SHA19d63bc0d96afadbe70837479e3370b862035c5bf
SHA256102ca3b4604210dd544a1a94ca117c1f6bc202b32a3d9a1851b21a04cc8153ed
SHA512cf9f585b002bbbfa5fe3a27fca63d22208b2e429633264b950c14cd766f15638cbfe2bcde115972b702b30eaed87ecc7ccbeb6ef3db5e62218637c7a00c16420
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a467370c0e41d2e1e669126e2ce2d6c6
SHA127f0b88f2dfec873056e79f5ea778a16962c88ef
SHA2562549aaaf19d0ae09ab89227a2250d441f0b71dfb7f5319071f0aad6e47dc27c9
SHA5121807b9638bd92baed6c8c34bd6cb89cf65384ee9bd9df1ffeaacd4e9f6e9f3c41ce419406e080d1807f43728121e81eb59336bc0977fe5d2dbf68bfa7d451bff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1547387eea8df5c13aecafec0851939
SHA1341b9323c9eb7e33496925cba62388ed6ebfdc35
SHA25665b9a94870d2bfe16579b4abbda8c25204f64390693aa0a0449a6e95f523e88f
SHA512ce3ac3149c996233017ab66346acd3d9b14aaab9b8d09b496634205f8598e1eba4ea9583b39ca8417ce86e8d935408c22266c767f7915a12a5582e47dbcd19e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56011ed7c36496f0f51a96b4b481b40db
SHA1b75d1351ccc2e053f303159f69894d8d23ae65a8
SHA256006dc08342821edbe89fc9cd90ce830c0c4046e391b0658660b0ed7f896ff0cb
SHA512a51bd46215b6c2e1f866687b8fb0249b0265cad537e8334b1d6ce9eaff1f9e983905adfee13e2ee02ee963d98380075eccff9d9a5db1c6c3155fdb19089fdc6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9d2b90827abda8e8c256d3c52c43b5f
SHA123e936a852f74e595129a9a6d13bf62b308ea110
SHA256c5ec96c8740f8aa17b17f9e44a3178189ccd3774550167d12438d26064c4b6d3
SHA512881391b6bc2d62c267cfe7406c2e12c2d4ad18da783c49a16fc54c40b7baa70a4b9974f1ee184e4b3b65f56027b77dc1e92bdf249d81889eb0d792c714eca45d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5779cc8f09bb1453c78b6bfd6912bce46
SHA10e945902cce97852a2a9d4df5e3143269b643bb8
SHA2569c23c566b59485cd2a1418c3788af3bc172af949b3f3d92837697c2288ffd582
SHA512f95b79e5ac0ab66e0efdc49cb737c5295d950d759d26ec18080c099f74394aec08fdbf571217bf0a01f6eb78d417099c32430a9c0ae49194b399bb07478e65a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5537d4efc92cb967945c6346fc629b6f2
SHA1203d771b1a56442160ee7f5dfdb249a71f64080d
SHA2567312811d06aa158696b2905d8bc9985026fce46f88fdfe1e50610d16d10f7c31
SHA5120cf70557b71aae258e4e4bfa23fbdc19b036e0853650d772592af425f70fbfbd0bbd04eb1c078c3e954288a9535a8d59d9082013076b7b04a3c774ca651e7bd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511b70182cb78a05d5e4d047c4cc7b522
SHA1b69a12648061b0cf3881e445f9e6f01629f71f7a
SHA256a25932da6a8215f146c2cf5ab8d0ddfbd674474a05247a630f00c639ef431a09
SHA5125e4ce23880b45eacac354366a2306bc6d05e6c324535136ad0d2548c82ffdc800f7d0bca81566f33e4fff5eea0e624cf601111d2a07ae3fd52a4aa553437a302
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512d746e8fcb6e42dc0b67c98fb2f5d68
SHA18c12ee1b98152c2a313352e50f2a99e8cba24b18
SHA256b97b38cff8051337646d7a602b9c7ae1d0b55e7c9b4a3167cd7e63ca9f8f7a14
SHA512b95c2aaa11ca0b6503d789d759b1b5ef4e4457cd95d95ad75a53f9695a6d706c19a364aa6da64abe7c672c21a1c5181f30d2f7907fa79ac1add7d30434627742
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b77b6b8dcf536953eacdb8caf65bb8e7
SHA1392867bfda76e1450f817f1186c8902d32ca5799
SHA256b118c260b4dc0e6571604b7e40311978fa0409bf8d66b275c045fdfae27def10
SHA512b4966255369eae7d983dc725fd717af222b791bc0505addada4099a8dc49d9fac2c5978b89d75828646c2d230d8479dbc071a176c85d6c552deccf5b97724873
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a