Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:50
Static task
static1
Behavioral task
behavioral1
Sample
65c1062aefce8b82c75a375f3989d258_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
65c1062aefce8b82c75a375f3989d258_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65c1062aefce8b82c75a375f3989d258_JaffaCakes118.html
-
Size
4KB
-
MD5
65c1062aefce8b82c75a375f3989d258
-
SHA1
6f3c73062d60ba5bf06808d6db7cf821271864fa
-
SHA256
f21523ae63c10566dc99cf9c4bfa4ffb4c9133b10a24e318b4cbb391a1042ebe
-
SHA512
4b2f7b6612b712bfef89e202be562d0e7279e72d35536bfe7bd61461060011e5ef704d6285f86c407c4a0d96ede2bbda8b4362fea16b10a202df47cf2c924cf4
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oLf7tWld:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDr
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422508115" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{17E95FB1-17E6-11EF-A0CE-F6A29408B575} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f06781ecf2abda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000005a1443ef5aa4446e322fe76f0156eb9875ffc96cfbe29f5c0de2094601f31d64000000000e8000000002000020000000b89c4cdf0cfe946cfe31996e6625693f4da321dca4824438c914c3e08e00f0d620000000d817dbf763839a915f479e558fcc549b04c7925913484177db0285bb116286b040000000eb799108042588826a1f503eb765a7d543eda878efe3d9f95813dcb592f9720b0336a173d4a9d061cce8259ed80f86c3fb58566f0cabf97be0a3435131df7d7b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1320 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1320 iexplore.exe 1320 iexplore.exe 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1320 wrote to memory of 2820 1320 iexplore.exe IEXPLORE.EXE PID 1320 wrote to memory of 2820 1320 iexplore.exe IEXPLORE.EXE PID 1320 wrote to memory of 2820 1320 iexplore.exe IEXPLORE.EXE PID 1320 wrote to memory of 2820 1320 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65c1062aefce8b82c75a375f3989d258_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1320 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4a28f52d2a6d7dfcd003f28c4c005c7
SHA18db580b5f8a35325d3dda77e3f167f9734c02a22
SHA25607ba1aca16f65ce5c95677c8d03ba92610b4a4c962a0958f4d2275c388a78bf9
SHA51212694704334272d387a1c2caee7ed8c94fdf07d0ac4e76c187accaef2557d9e0f42b6f9c77a65d55ef552764a1d05378b5011ed8d357303390f2db89c8de54d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d12d9f6c3fbeb5990b2dcab806b2a00
SHA1597b053429402dc9449a2357661f0cb7ac1845c2
SHA256cfe1ca52ec30d9c80ae4b072c57c22278a54c22b0f4156521f153c3237ca7821
SHA512a78cc583a69fb7d69a5484f710289a527081be171d8cbfb39a76c1507fd3581e32146e25335ff264fc081d57a8c2e347c716c5b4b5f3d80dd683ae85b80bf81d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4e9d4728285647e7e9f5e6eaceabed6
SHA1b75b6651dcc98df1e11b6b97daff05cc5dc6b9bd
SHA256266c65368c2bc88fd99399281ada9f076054931414aafc16f1c1e5bd5625d1ed
SHA5123293582a4d36f7c61ee99fdde589fdc861fa8a5c949d95ae3ef857f195030566d35ac4d817cc7ad35cfe1cb4e1b94f20a1f0e61bb919281eea18c86f832cc6bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551dca44680bf32a7f22e8536e9967dcc
SHA1ae8d3ad81606cb5cae6198b56011e871684a6e90
SHA256aef389ae62a1e4fb0bed5677b2142bec96b10886fdd25d6d1370a267c3663a8c
SHA51206763fcd9b28225ff144cf1905fb8ae33162f4e11a93cec04468c2a0c78ac8ad5a2821f81caf5dd83c3d91fcfe99430ab0e0fe7cf3f3047a2db4fadbdda04a4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff4818ae56f2ecb2c85220e1875974a0
SHA1d596d5dc268ca89acb79d57b0ea51c0982ee3f22
SHA256853f206c4a156800b2d581973be255522eeec650bd9de0b63a85c77c8601ffb3
SHA512680b80abc9ad78c0a040e339f91016f5179de453b1cb5359bbc12fea9626dbb8b075e29214f61eb4a4e68603bda982650361d807ba43ea901dbf080bf9bdc938
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd548c9d72d83d55210056e7d2d2c435
SHA13b5b0ac59707985399d705cf88f1b181a7d8066b
SHA2563b31b69be8d5cd617c8cd99ad2857f7a84fb15b4aa1a86da5f9ec711d367d148
SHA512ea72da77b78aeb864c02cc5af9d210a3bac8c9ac035ca8eef1e8da920fff552bfbfe802c3ff38082fd7608c27b6477c949ce44e7e67b040931e55b5afe298556
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f34fcfa165290e02a8c9a69e18066ee
SHA1eb003b120aca342221242777ce89979a505c2702
SHA256625ee9a0865bea8e464e1ad0f58e1f376d7661a7fc343e81cd33ccfd31db26f2
SHA51268fd0699f74e357ade357b4532f9295a59e51079a28ba7d4174f60ecf0b5c07a4afac826a7de634fbad072fe4d400888d6029d8007cecadb7111fd8a627d358f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56989334b7c1bc0e7352fa6878c65ff7a
SHA190327df1d85fa366d016050fcca03cb5706c269a
SHA25657d50fda181132e2e4cd9317d2a859eaf2d3d989313635365a67c16e0936cca9
SHA512d0b9e8115f3f9c5c6c66bb2382586cd5d02ea2265f3ebd907a39bb9a83628bead5ae3ab69aa9a51446f2c292649d55d50cbc7cd0f5d36f9832ad525a48208262
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7a5052c122409ee21a9ee7415a0ae6c
SHA1ad086ee7d9de0cae0fc7bf601be4b49fe6d4deac
SHA2563a158b4688d63740e388ab7928967491ad4377951a5ea0d33e748bb1cfca8629
SHA51270dbdb84f1b3e3ddfdba454dfbf7e5c0391f76360422b16f068abae7c65916e7aec6d480f1774ee266e261ba0341a38fba8a64ec0d3b960ce9dda5c75f9e5a53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c796dec339580a77ddc72092e9e047be
SHA1b783f71fbb82e226f2c4e9a1963bbbc9da52d661
SHA25624b8c25c3400da6ed1f5a0bddcf59129133c270dddcd36df4a28964f673372b0
SHA51216dcaf49ea9f320df35132ea3d3d51fee515f6cb6d388f26d26aca1612f97e96ce18d867f8608dcdc9c164cc14f488d963e696fb1b224bd4ac62cc9331eab346
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f43dc1a6bfac00ee125ee3f3b2e8339
SHA113fdf694ebff6de719e9d9efeed01e12a1a55eec
SHA256a22143621ade1dab97da74a97691fd1b6b5e8ae30e8a72e85ea6b9031bb867db
SHA51265a690180aff58420578d9fbaf7a458d9ba99517b6688ab9faaad93cb2a47a0f0227c68ead76a701dfce520615dcb43de89a5c04dee29ea1c2e5a2d7fc104045
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c067503e61cee01ae7a3901d633ce1c2
SHA1bb9e08921bcefe89df5abe02151878e0d17f6256
SHA256177d555de56845ae414e589b43635479a29340854738555fac7930400f53dec2
SHA512d32f23131cf8bfb557f2f627060d9bd7ddfe7b677cb2cb66fdf87a823c7ed9c307766b19046d707af85d576bda7095591a6b32640b3854a714d1af33bc7a4071
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513b5d260cdcdede941eb7433673a6d07
SHA1994a8cc88734aa5f4912f9e772ca620230b68626
SHA256e0f677705139518a52c268fc6a8c22f0b3290a26dc40d40ec8303080df29c23f
SHA51210b272182369fe6aa7a36b18de0fe09ab0bc30bd2afa84573ff74ba36d8e47f219acc702f1575a7487c4f83f98d11e5cd71756e464b16ce5ea6590b72e577ace
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56710cfb02c1e1ecb9920d87f8d89598d
SHA15b4222446e6eedf2b69d76090eb677c184f0e3bc
SHA256e087dc58eea326fb3586c6126fd7e7707fb1c4d053671778837c3acdcf0ce48f
SHA512dc49fda4f5031859cac0937f273f209cb935465fd7b14aba33abb26f5533afb63a7b23597ab877766f38a68aaae6c4352bb3d3a61052a205744512e776e85fc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55430b465a15936d74411ed6e668ba3f4
SHA1f6fd5d51a75c981c230da42cafbb8d403f8de368
SHA2564d597752b2f2e3fa772336daa27d751d334dbd9062713cef578edc3dba67c469
SHA5122ae10952b88cf99a2146aff2c5c49bbad5629ee715079721e2fafd282e9c90afb323b53ba12e9f025dcde0c4291f216c5df60cba93a336870a21e3a2acb17d02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5962e3b26c50b4141ce3f5e3a2d7f82ab
SHA1ddc542079beac71fbc630e7271e2693797fe4b74
SHA25606eecad5a0b81b285eaafbc6a1f386b11671fce7eb152fbf505fa2e4cf5c6506
SHA5120ce9caa06c71d08c2896d73d0cd9a0e23a24a6831ac831e77f82a4045448c503883727a3e967105576c8b24965a78bb19b4de5035d4d0382ee4e58fa63118d76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591c39595da340e8ae7a42fd93cde99a2
SHA117f3212c57aca63679ed9c7d2e21112044d996fd
SHA256a91d4e252fb4a667ee8cb944c7e194c224c8e0cd6d8b6b34d8f2ca795d93b715
SHA5122b1afe7ff2a989ab8da71111fc91c60b8a66129d8030c32aa583c8d98086b2ebe7e4a59880df4df87ac9fe4ae0a391c119669281df64385d65be393ad96f14f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53afe6b1416f7ff697973388e1e341cf9
SHA1d2bd4a6a5808656be776c76b99b8606f4659d0d0
SHA256e69aabde15edefdf9c8a780afa27f8aedc834ba070f9997a66d3ab43ff024613
SHA512023a4ff70ec66f07e3c3304a93431c2640802c0dccb097acc7377920739816cc799b776348bac627fd1333bb9925e2e4fa75eba209c8f8d37650df287597116e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506349f4d08f5ab8d00ca80b14222f8a5
SHA1a19abd1830ecf57ff448e350565edc49aa66dfe3
SHA256cf361335b04b2f02fa0cfa68fcd89e5ab861a65300a22537703c4f176d083e36
SHA512dfea0e2716fbfe13649ef7462898a5ca2afa919deea0eae27812c1bdd820dc361abfb3527db34e29fdf04eb3cbd09fa9a2b36261851db0f776fd63afe7801456
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a