Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:51
Static task
static1
Behavioral task
behavioral1
Sample
65c14d5db53e4c8d3e18e23bf8a62c3a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65c14d5db53e4c8d3e18e23bf8a62c3a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65c14d5db53e4c8d3e18e23bf8a62c3a_JaffaCakes118.html
-
Size
460KB
-
MD5
65c14d5db53e4c8d3e18e23bf8a62c3a
-
SHA1
6ef39a0b0f45749b96a36c4b35cc53347e6a8c45
-
SHA256
0f34914bde4f44aa5bf844d6a8c8925478d82d7300d7a9f05e412c66819bbaab
-
SHA512
681a61ae4fdd6e6491d1035e59fc3d396512a1c5aaa17f6e02bf9c0286a099fcf00d32e1806e9870476fc571c2661547aeebfc4eddecfcbceb95a126b77869be
-
SSDEEP
6144:S5sMYod+X3oI+YCsMYod+X3oI+YisMYod+X3oI+YLsMYod+X3oI+YQ:65d+X3e5d+X325d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000000501e03908e646702fd46307317caf5bf9a934813bc3d5bd1ed69f3a6fe3260a000000000e8000000002000020000000a28c3709a0b41dc5a31aae142314795ae3aa6b8b1d047678e7339175fafb5206200000005c9a0c136dc76d6bd81593d22bb611f54edd7962441db5249c8b676928a5f5af400000003a4b5cfcafae2dadfcb3e159535665eb18ebbb3c98df97c71aa6f152b8e2fe297c466ed40fd270a53bba20c9ea345cd0d8883ccf5fb27850a5e6d22bc4fe4be7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 307f1c04f3abda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422508148" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2B9A5411-17E6-11EF-805B-F637117826CF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2416 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2416 iexplore.exe 2416 iexplore.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2416 wrote to memory of 2372 2416 iexplore.exe IEXPLORE.EXE PID 2416 wrote to memory of 2372 2416 iexplore.exe IEXPLORE.EXE PID 2416 wrote to memory of 2372 2416 iexplore.exe IEXPLORE.EXE PID 2416 wrote to memory of 2372 2416 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65c14d5db53e4c8d3e18e23bf8a62c3a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2416 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4c660d5c3d2eb5ef41422e0a3b31aea
SHA196d0b129b034377105b26160f536b3a4b68a7e4f
SHA256675b312f3d9a0e6874adcc32ac2cca56affc3fb4cc42bab3f31152f43c668331
SHA512b61b4950db764c2bb5cf0ba6f7d33aa90a14e283d34b9a0f7c8e94f1b5ec307ebc10435e0288a6fbe86bf1caa46707569d4b82f71293944177b842fca97be1f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2bfb7fa2b436119e4f72ef1af061481
SHA16a8a062b45b9ac5e282a5a8736d89226ba9707a9
SHA256cd8acdd0a468b61c3c6adf0c88c71070bea743a4acea01616b851ea6f947c98c
SHA512ae3b398e3d4272d238bd78b2f54683e095a17f986c5f6081d8f4cb57856e70eb71f2465f590d6dcd311bcca1b9873576c4040dcb649eb36533cc971eefed2a44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa2f135c18b3e3bbd9b854b11c657bab
SHA1ee855620be06a1481c11cbffa8ed9af7cbb4b0f9
SHA2569622afaf8d76f5d7567513011cedc661644c9bfd9b8bfb57c4fab14327aec0fc
SHA51270e63787c89cc3d3f00685d3675cf9881321ab3bcda3553850165a4277db3b8bad4732e3d4a92ae687facd7d3be5ca749a721db94bf7dd593c647d05aebe35c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5faadef25a9f4e42206569787886961e4
SHA16274d228bce3f530f73559c755bb6a37d2903e05
SHA2561e1ea06c6d234015ad252ae2a5a04c99324b12f61475bc30c115193e107db5e0
SHA5127e0e3004f41e6cdc059a636f4dbdae852718010cab9808d764e5580071d13580b05116aacfe8b7ac9e83925ab948dcc36d766bb93c5653db09eb1831e4e9a529
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5926e05867f8f6fdcdb65b5df10bf9189
SHA19f75ae8ac39ae8aa1bdd8c76ca49f7345143c15a
SHA2561ad9d10b63b69e0c27a874b00ab949f951529ec8b7e3deff50ac4378a7c93109
SHA512c1348da376de5682cd1a5e42dd7162bbb3cdfae19257fe51dbc1bee9d0aff6c9a22a9ffa4f6745b7dd6caa5dd3b9188050368024cb4244f1b0040f552d7d6c9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf6937c4e16f2b03c6cae858209183b6
SHA15a702af8f45495b905bab433c5863e34c48fd5c9
SHA256c415aded8aba2ba1981250c0ef9e41bd8532a4a7859da2c0faf4386ce650be6e
SHA512e113cf41057fd90a79f862fe7f77e05e6f9ddf753f6d6f93b60eccffbdd58bf9c6ddec75a3c725ea4570edb5ebb2f62d7a6767dd4e8dd30b3491ad74124d9cd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f71817028623f41eea830b33a5fa5190
SHA13cb1143875557fec378a580bf260efea2ebcb548
SHA256e23ef67895cf315c7f1fa4290005b2a5de669d53dbbeb9b5239b1278e26c8d9a
SHA512c5993a2c3ae849c965cddb67eef5b5a26d1686169f4477dbb5d62c2223f975f9d6b3be19059033bd92d49e49e65628bfa2d9b6597c4c72107cfbb034afca1987
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df7869258b5d7805d0596d7e9f9eceb8
SHA16cdfb333729cbb5c9fc1122a34cfb84ee415bdae
SHA25667ab4a05c0c4ce548909c543be423dc152bfe2bb6bfe8b4c3e555d3f75dacfc0
SHA51278ee59d097283943c224f937d950d33e49ff5f67743da5fa50b0bc51bd113b7e4376bae848f5ae4acb505a23f0fbf15806fa0ea3427f33fd5fdb9b9dcdfa8010
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5015b02de709e015a1a4eeeeb12b303b6
SHA1285faf7ab2016cf9900a73fc8b10df36c12d0ed8
SHA256cd0f22c18926f7e4fd7e55e7b51b2fe5779ae7fe30853ded6a616746e046e8d7
SHA5120686c8acb416f2a1a2e512f5b6f771c8476b79645807684945f210865bb24de6b5f476a580149c4a03f2794d1efd6111ae6166df45677ae58fe7e84e75ac6bb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527557b06638e573567a6c4286883250d
SHA10a60be53e5a4d4e72fda93cf86f52e7bc7c11533
SHA25660fc4d50de0922b74983beca71d9dd53ff783d6a2e86d2c498e11cb86d7b19f8
SHA5128aa75e55de69f13163573b9a98b71016737d359143eb8844460abd8aea182027b3590f98a7f841583bc214ac106b62ef8765c59ef9217646f3dda462208b4ac1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514a0c465a4c134e16d34d8fd3c74e51e
SHA1c082f1c1a0ed8b225ffdacaf52230e73d6b1595d
SHA256546164456924dbc195ad60557e147cd1207105e7735ba60d4975bc3bade9529e
SHA512d43cf2e0a041253db1bc0d163eaf4288e2fcb5ef63aa5012aa37f2bd10be94fb70925b5666bb33e8d7b60ad7c8e2f791f7c4187e858251cd649d6675db35058a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e6576c5e178dc40dbc30eeae7bf7473
SHA121dd05b91826e95d94b0a0cfff50dfd4458390ca
SHA256076bca06498e9c8aad367069a4a38c5513f5d66b703d92f3ca169f4e30fc10fe
SHA512c4f12237df624a7e5339d19e9889fee3494f78677797048786cd39f2dc977e5b92b5a71eeba28c347f65193b0dcc18a7f1b0ae72a0b26b475029fcefd639e284
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5691977fb4010f487fd9e2e3b18e4cd2e
SHA1fb4d5870698229bceab0cf1b56ae256d2768f9bb
SHA256eceb13cf6739a9b10aae5cba4ba21b6c4233a6ebace8a7e5daf534f0bdeea300
SHA5122ff1e2cff6db97add8858e0701b752f4ddb3d172a2f2b96655e1351ff19bf5d2d4e2b3b84794f09c2e59863dc3496af838bb1886430c196c47c3387d326ce1ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52371329533f6d37fe85787117345c6ce
SHA1e1f79b69fd3b8f35c00930dcb3144382e6c86c83
SHA2563840281c5de206e6bafb0130dbd3a67e787b8d16cb530e34318925fbf379cb4d
SHA51261b611f8cd4bdbab7eef64e3e128d6973ba57897368401c8defa267e3a259142b8a5bd13231caf0c902291e667767243cb93c172f500d184fd6fdac024322735
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5464b6b112a59074974489240ea4dbf5d
SHA1f9e9adf9379e1766036bed9b1c48acca43575ce4
SHA256f12afdfdc888961b2310a21c28be1930c682300b2857de008ed30d250187071d
SHA512d40bef749848cace49079146c56f9365a32ddd0438f2b34003943a561b92d6f9fa12d5cad5fc38b164c78dbaa0d99e2eebf26d306ec778667991a8407a1e4a55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56894c50084532142bb220ff7fc50c727
SHA1bf05a9ca6707880f71d504f846954bb9574f4e15
SHA256bffb383a881d4751dd03233ce30165c8a7dc9cd97bed0f059721f5950ea4dd6c
SHA512ff38a9cde98dc90f90328f0af6960663ccad23b56780d0e6346230cdfd19e88145536d4d01e700627d4bfdf412ef93165dbe2c0577da7dcb94fe10a3157dbff3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc9d542a467b09140181f8a77c946042
SHA12b1664a5a5e76c3864bb947dfab29330f0c94275
SHA2563ea4da6497f0dc6bc129934dd423dced0ed3371a6d073860f9564053409f60e0
SHA51273db611049cb811b6bdb58a04e526267c5264a17f82577e96df01a5d81cd957abd522f1f8bf4395f1f8c8ba7a67fde80ac48ce956ff6cb6d10da51131cc65df4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9ef8cf4a3603b032bcbb042acb35ea8
SHA1e2b13346e5a9a52111ba3d77098968cfc725225f
SHA256e2d1a5b52e5273e61de1d057ba1c569b101da237dc57119e0d16027f6566fa73
SHA512bd890b7d6e2f37ad861364754fb8c44450db295c8068bc19ef91dd3a88b623a4828bbb38d98e0cd02f0398b1d5d0bc6292b61ed57aebbef0ac9dafabf9f67351
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f24ab6f3005c766859a9e4bcabe4ad4
SHA1fcd7ec49697181797579adc30de7844bc86734bf
SHA256383ce67596754b6e7a14c32354983a2db990d3bead18d35c67c374ce2b88770f
SHA512d0b64162be442db1e50ff4c235828d6c862946be5a2dcbcd37a174393933dae58ff4a26233a4affcca8bbfbedb64b52b007c36e57da80a857587b8dc22d4e69a
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a