Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:51
Static task
static1
Behavioral task
behavioral1
Sample
65c149aa13cce94f8f2d78b8ad08afd2_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
65c149aa13cce94f8f2d78b8ad08afd2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65c149aa13cce94f8f2d78b8ad08afd2_JaffaCakes118.html
-
Size
224KB
-
MD5
65c149aa13cce94f8f2d78b8ad08afd2
-
SHA1
5feb57693472c77f7ca4850193a04a4527489192
-
SHA256
356af46e674b72b4b6eaadd40f98c4f605171ec5a7cc2e47fa73e64b9f084c79
-
SHA512
052aaef998c4db678fce5bdd961f69ed9def1b4344a114531ca0d6c4c628212860bec1d25ee25279a70ba7b3d8945430226141d2236c21bfc34db4368ad7763a
-
SSDEEP
6144:STb4f+aLkHw8LsMYod+X3oI+Yn86/U9jFiM:df+auf5d+X3R8mU9jF3
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000bd38c14f53fc0c999282f19229791b6672e42cb0b5dca2acf7c9122065f0153f000000000e80000000020000200000004c4c99c7eba67834f7ba386fad7c0a326831e595e8ebe8cbe676a12796aa8cbd20000000a6d9e86fcd7dd89094876ec2be2998e38ad031ba2b612e3e3d412def5280d3444000000036f4d50ed6225c45bbead16d560b39da0f11a7d277dd2ae9a9f9394139648d895ca7924a99a778ff9cbc9f07588868463a56f62697798758eda9367e9bfae63a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{289885C1-17E6-11EF-BBEC-C662D38FA52F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422508143" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7043ce16f3abda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2460 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2460 iexplore.exe 2460 iexplore.exe 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2460 wrote to memory of 3048 2460 iexplore.exe IEXPLORE.EXE PID 2460 wrote to memory of 3048 2460 iexplore.exe IEXPLORE.EXE PID 2460 wrote to memory of 3048 2460 iexplore.exe IEXPLORE.EXE PID 2460 wrote to memory of 3048 2460 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65c149aa13cce94f8f2d78b8ad08afd2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2460 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ca31a47aaee5007649b9fd4a2e91771
SHA1951919e81f88344310ab52352efa5504c3ee0faa
SHA2562fc0ca0c5da816c1e5be832cdb59030daef299b97a8bef5fe06dd7ef414ba2e0
SHA5128202b4a6531f2327d49dbe5856d6e2f5921608b6c3683905be76d5357e7d3a6655e27a5f0c9b082a52f840e8d86f047d8bc8f1dc68c9d8b1e15db3a8de0ae32f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f895e3eeb9ded63d3ba137cd4bdcaf3a
SHA1d93ef7cdb40aaea8b19b7a9d2cd7e6939cce0273
SHA25624c02afdb4f076ada1a42fcaefbf47279c4288283733d84a45c4dc831172edea
SHA512f140b330a826a038d4241402d1d5543f1bdc9bb5fe6db731645fdc5efc7bb1a67e7c7bf4b072fb2cdc036af2c106eaa8a217dedd350a9ddbca06efbd96b501f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b050cc5d51e54bc307a28010806899c
SHA19f68722df9d50783c75453808ebcc9ebd4b7e632
SHA2561a1b9799d95d5c2abf5af939a478c803de35fc33cb5951990c1266ed2196b5c4
SHA51284e46dfd274ae4ae9b37bb7ba1a6c07c61346fc197482e77fca83dec2a6a41c84c7ef4bcea3ca76812b05db074a6b663778b819a222b806f28dc61937a6f5441
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a9a770997380c1772f6f007ed88b627
SHA16b40f72ae95e208e4964969284811af7e92c8d7d
SHA256e81ad1cc9b0bbccec850e2e83d4c350b6762617bbfa7f1325d22495994ab1141
SHA51279833ca2aca6d9df3d62f2ad3bffd29f41b350ea094f7364469651b76b326edceed44f8cbcaaa763e1cb4e739c1cf63cbec970683cc702996314742aa6288bfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54992472d9a05db18ad7a0f93e963996e
SHA1e5cc1d0b71798cac7ce2cf75ed78d73fe075563d
SHA256d0b81f8a966d6843fc82d15f738a1de502ecac054158682fb9ad31420bd11e5d
SHA51255fbfd8f37a4991ff0942dc3d1a7822b5facaa5ebed32d66d2bce2b87cea972c3ee8d2c6aaeef155411d571eb3fa19078eec2308e554f6a61009f80f75c7ffe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c5d92a48362abee258850b31f747406
SHA14d1259c25a66520fa8f07a093b6a767e14472da4
SHA2567b58fb21ec8a4890f58b7d94e7ff8c3482115b17aa91016d674d21cea1a56d47
SHA5125358dcac3a63b91899e4fdcce2ab276d9b727ff3d112fdb6fcfdaa99db5ea4ebedf1da075489a7cbf058d2b56c914116bb798c00d88e2cab1242f88ef043ee94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ff55fe81a491d99feaf128c838047c2
SHA1272dbbffd0f31a2aad7861ca8a5f2b768d5a4c4a
SHA256e8f8e4d5059ecf0308e52af71cc1bcfafae5375d870dc89f582a623065d4d759
SHA512dd8434aac121e93120c4861b00b82dceba28fa84179c718c6768b0bb22cf269dac71adf580c51f3711badd3d96f32f02d5cd00778a70d10d10bb31c38ac60f37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3fb81caa21fafa33168b792b1d43dd2
SHA1ccb12c705c9069bfd0c51a8aafb241755815c0f2
SHA25644361f73397f04ababbd8a325a9a741ddcaaadb28c1f80ce1515ac5a2644b3ea
SHA5121ad6b8eff6a34f534e1e7ab31fba52b475a684572799148901e928653fa880322d79ef7b77327827a03cea9609d978469ecbdf2c1471c00090bc19f4fd9af6d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7c57bf3bc5f6cce992435f9ef247d1a
SHA158d441d84dedaceb5f2d6b9b8bacfda6c2fe3949
SHA256c173e59752e2ef17b43126a8fd38f7c85b58b96c5da0472aa6775eaeacec35eb
SHA512f169b9fb5f937bf7c1a4650db92721017ef523bf1869aeb474d7717b6c34045ded9f22278eddd546ef965a662f502390889ec07deece7287650141012b81f5f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f10bfee95d648161dbc41b9b0a3be850
SHA1992e25600a8cea464201856f67cbdf406aa9520f
SHA25689a12d46dbf038f3dd87d093fe426e00bb883aa6747e7fff9ee6f93b6318e029
SHA5122a06635dee412a6e6f30bfb1dc36e93e0922a51cadaeb4494072062adbe83553a00e94f18888f58caf3ff438e78c53f8a6cf48a6352b8048b06785f0075caff3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4655af89a61263598c706e62d1ae9c3
SHA18bb23937a92b35b390fefcd07a1c75b67b39d521
SHA2560fd3622a9392ac59f721d79ab9baa34d0f306d02d4e1a5e62c602a92e2f10302
SHA512ce36255908c098e44fe78a7a4bcb04886543016f442d20fbff932911b6834cf4c9061797752f444303b9e06580a5ff918ae4997aafe3568b6738f6b6eb232778
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560e28557a8728b7e5b564a1250ed2f1b
SHA1953dc08271db6dfe026fcde158aa9f8ade5755d4
SHA256c07c55cbbe7630f71c416128f8d63393a5c9586ee0b4dbbf4fa50d54e5ee74f5
SHA512457aafc37eb1c85bda3dc30da8760a28a3d4dff29cef4c5bb3de7716a5fe31ab2964ba13bd818234a24cfa5a21c16de6ab7f4e5a9216c9c361db758dec925a4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592c1d2471068c7df112bd0df9f8545f8
SHA12ccea602cac5ecda16bd6e38890b286050f567c8
SHA256b5ccb0b17d0296940a3288b0527ce86f58a53b70cd83243b413902332be6c119
SHA512676d514e3dbeec69d2f3d415d371e33f3850b3b52a1b8556f858d626c2e8da0d1c569134a168964143ec0329f39ddc57f126444e01a4c28e5bf71c6269111f1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4fbcc9105c8afda2a782d27fb12f1eb
SHA1fbc5cc2c33a7edd59263aee443480e731b78da25
SHA25641db446bebaba8ce41722150ac5cb13ec544fbaec418ad8a8f526d74640ccf64
SHA512d9544ac212f631cac48733c4b855c08e46cd0d024666968bee9dcbb40d876ca4e5d8348098b760fa6e410c84c5bae8a85e90d01e639375fbb23bc01ada8946bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f6f7a2e6ef5196f6f4e1546fc0f09f3
SHA188f6b0e47b748cb71259544bb2f9fc133236c25e
SHA25680f019ecc01621768a4e4170ac41f72ddf60224f5f70cf7aa61bd091f018bd23
SHA5123f60b4a1d645cb4f2b1fb2c3aff47a501dae136d40877f5f8c78ea453ec92baec8b4184c840f3f028fd36987e41f3cc71fdfd245e47534e507e73c66587aada7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561d074d062e2d11213bdf24fb9364dd7
SHA1a4b72e4c9eb6797ae5c6e27cf8096a97fab5c237
SHA25604f58362f10ff46fe88ce472df24a6c4b1d8936402d297020c1442a9581fbafe
SHA512cc8aa4971b684690726f6d1287053d4685860d248444ddbfb1a968e93ef8a03d9cddb1071f419367aed9731c1727f277438f91cb8b3cc984901e32f460e36dee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5676b277a17ae58f42b40de538edfdc71
SHA1e30f61782aa14986daa4312509caa282f6bfc7f1
SHA25624105fdd5d0ddabceec508a0f889d9769029f535656cfa9a0fd6710899cb2078
SHA5126973ce66569f3fd0f1fdb08284924e69251296647098f937836aee87ed0da0d1585a52df7e8f14c4b440c11719a12005bd796ca77707a4b0cd791fdbc9f511e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca81d39e73b1142cae2f86c5cb36ed21
SHA136366e4171fd5d8e1451c231b2e59a1ca7c98c9a
SHA25664096796bb9c3d9f2a7c4eb208637deb2bccb258fdd4db06be4060e6ad857c6a
SHA51208c80ae803df55b5edcd8adbd024426c937590a98453079bfe21bbc28b762f7e328f79d81482ad665c20ebea5186d94c0352f2e8e931909028cb697a3fc4d407
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b0bcf8f234e73c3c0606140be3e4c42
SHA10d508deef7885814b04b433f41b509fc6a1d6e6e
SHA256bf810096816dc8c85a32fc6c3c550ae22f224ed1c9fd6135ddb3ef1cadae566a
SHA512165d8ab6645ea035b9c72c5549913f1623f3151a20b30f2440de0c97ae366aba281e6ce13b779576f110a649a479cc6f96269f6bda6f1e47dba7462448af5723
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a