Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:52
Static task
static1
Behavioral task
behavioral1
Sample
65c23c9dad60cb9c48ab62097f5270a5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65c23c9dad60cb9c48ab62097f5270a5_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65c23c9dad60cb9c48ab62097f5270a5_JaffaCakes118.html
-
Size
460KB
-
MD5
65c23c9dad60cb9c48ab62097f5270a5
-
SHA1
b9eb603d5b7513de1274c4dc1a6bd99d6609eba3
-
SHA256
a2e42e64911f11ae74777cfad032a55d8e78546988c11ed0c91e33d76478af99
-
SHA512
0d37bf91d1a2ed2208a446d1df4874645c5d4d9e0f7cf983a6c0815064729f65b08764aa683ebdb57d7a22ece75e06e7a7ebe42dc9b72319d134f84bc70e2d12
-
SSDEEP
6144:SYsMYod+X3oI+YkQjsMYod+X3oI+Y0sMYod+X3oI+YLsMYod+X3oI+YQ:55d+X3N5d+X3g5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5D128B21-17E6-11EF-A38F-E61A8C993A67} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000214b3d6ff6e3b149b0e7e9edfe15ac2e00000000020000000000106600000001000020000000c28120682486fcd7477cd1a3fed5ff4937d090a4be74a73d7e014db681c26667000000000e8000000002000020000000f044b4f7eb48e98ff7a27d5adefabf8370c87fbc120a9a8b31b665513ddaf9ea20000000153024c9f98a5e820bf9cd413d459cef7433a4a3e32493c4823c504eedb804884000000064531ea5834936760a144f9b5801598b88bfa2898f978ea4aa83b720d8f4ec70b8f283573f66b8450fde66f4b4092aaa26ccadaa54b397a5742e6b88a9af1643 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422508232" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90b9b435f3abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 3028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 3028 iexplore.exe 3028 iexplore.exe 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 3028 wrote to memory of 2184 3028 iexplore.exe IEXPLORE.EXE PID 3028 wrote to memory of 2184 3028 iexplore.exe IEXPLORE.EXE PID 3028 wrote to memory of 2184 3028 iexplore.exe IEXPLORE.EXE PID 3028 wrote to memory of 2184 3028 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65c23c9dad60cb9c48ab62097f5270a5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2184
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7bcc1f9ccafe3b4a53b320b99a65a43
SHA1a31b547e671a3292109728a40db07f846365b679
SHA256fccdba2df04bdaea5be448943bfbd6e992c5cdafc999a09f5ae8705da3012255
SHA51266caf917529e756ff5fdf34a1e17fd7f5ae465d2f6609c4717024dbddf35e77f95cbe9c70e5d74ddae9ca1f6e2a9a915c8b717d8698d89c0f9723826274c3e1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536b3aabd28489c763a073cd8a34a7f6e
SHA15bea12a529bd23662aa01213effd080bf123fd18
SHA2560a56ac7683bb4113051c59673847737da707867ba11aa547aa3911c633f99558
SHA512c7469f7fd968a7a6de524cf857aeddbc07175bfd632625add674bf012f219a4535861863fd3c942c59696b7a6d0207affb940ab3d39ddd95b8cdbca62221f1fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53bb84a9a1877457d1ba1df235cb6053c
SHA1c643a5afa21ee8b41772d4a10a3b1c565672eb0a
SHA256ddd493a5cf959919e5bb142f2ab92589a782d3855c1352ee148d6ed44871de6d
SHA512b0770ecd96d034bae170a6045fdc4272e887d43af5a8f3e2742cb14fc91a2873eb393ac418dfd2c44f0b2e379f778ff0459b5b599a34e533835b1ba297b8da9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da998c174dc9408687eebf7b45f5db53
SHA1c9d8f897576eade07952e8f4ce0229cc4d1581de
SHA25652e93845c816823f868565211e0d5545f99b2f948075684eb92aa7f4a9d27a25
SHA5120b2b9dfecfdedd092d85527ea0cfd325f2782e52e09677586d99523b77790778144422a6cd891a42267658b3bf031579d961f7a2fe440e49dfbee000f8289dc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507338f9d0a8c10174bc5ab70b2f07bef
SHA13e0fac95464396f018d275fbf4534474d6be763a
SHA2560d3f928c5684c5bade9a24895aef1d5f51ade6a74550bc1d2ae9212b26a72103
SHA51218f0e10900ed97dfaae46f0736ed9980c755b029c5b3f28bed317a466abc49027dfaa64691d817264aa346d98015b2bdbe9068838e1cff5f23753eebc27b4e81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffbaf8e20350c7224638c9a120690bc4
SHA19eeba87ab81c441318120f14d879b75eea1e7482
SHA256803d1ce40abe8e973a65f4327703933cad39ef5354b2fd008f0c513da89756f9
SHA512614235308a68337740042732399bc5a316857d7cdf78a9f199457862bdc5c11945a773e659486a39de134420c2cdb09d718e638a726a934a74dd153d441748a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51af301ae7ddefaafeaa68a02d44c1098
SHA1d65193e0819fad525cd307b0d051c4601e8e43d1
SHA256b5dfff1287f294c07a8dfed37d75712da21f00d6f298139fa9b4965fc744f489
SHA512c977e515344e50a2c5266751dd6e543e6b7890691b7e4dd2ef05d1a5f8575c64501594b491e434913ac65fb5746abed4a610cee6f9d3006b34445620a96f5ceb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fda0f9ce96895640987f29106b9a43ee
SHA10e52aa38b1af44829124eeb34d854c4290fc76bb
SHA256ec6feba37fdaac146ef6468d5170b0b418b27afa80b349578648d97adbe0e7a3
SHA51294ffe53dcaaf4d758a0311b65625a68e63a9b081e3686ebb3a8b781e91c946c09befbe17e48030723d62d9bb01f5a7963987b88bb0f2db994f5687693820af08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5052e5b15722cefdae23cd261147ec099
SHA15d88cb62250911fb1c7e601a09a6a87ec4eeb428
SHA256ecddb10bd68d9b359e5d8ef52cdf3b56b3190c7265f9655cb655334279fdbdd9
SHA512fc491bf606314e308e6c7d71c0ea0c83e5690fe460e2f86751b12773ccf881b97cdf00d00f708fef27b2fbbbdacaa0b15b9c174ff3f18d0587fb671f2a85de05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5842828114d983a67df1157a36d945d77
SHA105052d09cf781a19a9625f4642faf464a54e14db
SHA256f819bb4ff1350c1fe8d298d43b7ef25048e77130572a1f849ec5d05920a7c888
SHA512eb04570667fbd2e3081253bfeb0202c58d0194167187fce162d19596823acf5e9c77f620f5a5882bec3b5c064629f9475e2030cb25108758cb89669c9655bd45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b324e5989c75b3e40c39a5099288577
SHA155eaa079ca654c76d98382d42190967cf3885072
SHA256a53f0bdc676b24a39ac95d2b2eb6094280fcbb967255919e9b2875f3db848ef4
SHA5122df2e487cf00fbbbe6df10115c8d6807de93a2f0f39f005e017e67e23ffa2aff52576f4a500100da4c07e4b5b8b6eae094fb23538ebe720580d32ca065d41ecd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523bf3cb0b2f1b992af954862a3da56d8
SHA15b226a3ce40c588ee53f88b08571b8a918fb8427
SHA2562358af255ec331309403b440cc63f3099315cc64fa7afbcdf95db219ebd0f337
SHA512988117a6c90de12231204a2926eac7774deb5a863265872c35fdfd862a3073e5e3583e8300157bd6a60c52c480fe4d38cdf7b39665e917d91b697143d3715688
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56100b017ef4e3afab645eb14838f3bac
SHA1ba258a879e1740973c10ee73acac474bb67e20bf
SHA2566596ef122cc395e37f40a4b530ad7b41d24a28eb8f98498e78125617de5f6853
SHA51279ededa69dc2e369c2c7704aee995d8d822e0ee9966095f057967c64626418aca7e267600694f7a9881467fb8a6d7dbb18c67043f1dbb7eae39b645ce4880e54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bd308c66e775860915cb14068aa062b
SHA1e9809239741bc8a949c520e9defb1d39604f08cf
SHA256b038a762796140e0790231be8c2591f0d28c333f06df82448ad73e7a91b3fcc1
SHA5128229c46653af33d4d32c8b8292c66391db232781410438273a009da77ad4856cae7cc50a6339f31d1128f64cdbef8795dba1529519900b5a268c9831206e1bd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555de13244b064517faeb900f71886559
SHA1e567be4de495a29d21b3da141d800c6644773456
SHA2566ad9d56165c27f59e8d6a422beac58c3d31492e4e31ca68e1aab33da367a1f29
SHA512e054c4b23f80a62f64527fbc6fa07eabc6f9ed2666e43426a203e2201549e41849c7be24aa88cd0a8320422cafe7887ef38541ef7d2b1c6c4433da41a49e197b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51820b9aa8693110ee33f63998cca9f13
SHA161cab8ff343066e763e3e8fcd87ee4d1b1ed2d4a
SHA2565efc649fb153fb36f981dcb3eb9f402a6e6ad59e836dbd5a25e7412b353f7de8
SHA51268325d59282a1350cd12d8eed0f613c81213a77a3a82bcb8e395e9f3d3a181ecd0d9351f6744d8aa3dca33276b0d90586f89f0055f326a79ccadb9e1b6f90f81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53929488705c9d9065d49fd7ead89c1ce
SHA12b3f17711392bce0a666308912d3ca6566088779
SHA2564602e53082f86f5f113d3d5138d966c80ab6408007bc0e52cd636ed480bf59ea
SHA5126a5f5ea868ec121a836a5d18deca472a26ad27e0432af35f8a70fd625ec3d511fff5d9b6cdb7f1688cfa8e4a51dc46623c6d0043558973e559795483d0ee4ea0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce621142666821eb9665f953bb8a4765
SHA191ff4d5fd66b3033134ad1ce9df1939958a996ac
SHA256c8e6719bdbc9a4d3cc6c7fcd2fdc1d08e8beed493054ca013480f277dee0d88c
SHA512a036fe2243f147d30e9d2c9ad0cf0eff3aeb2e428e76fbbf4a04be6e2af5b7d219b73dcd0a85b5c19944058428d643597b4d1447f674b7eecf0e6b80940efd6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f338ce5cebe38b96e2b58222618300d
SHA11ef6706ce54b0c59b6ebd969582512c6da441d1b
SHA256b9e65d092f3834d2e3be3046202a704c2169974c72111ad2f788d27695a37e2b
SHA5129cabacaaa33c21dad8c5e36b6be19e09bb26dbf12da20b97e233d6ea57bef20c6701e3fabb77fef9d27f2c058e5fb52004c88663d641bfdb6e602c7fefb792b7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a