Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:52
Static task
static1
Behavioral task
behavioral1
Sample
65c1d49c0a3d0f7cde07286fd0a74db8_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65c1d49c0a3d0f7cde07286fd0a74db8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65c1d49c0a3d0f7cde07286fd0a74db8_JaffaCakes118.html
-
Size
17KB
-
MD5
65c1d49c0a3d0f7cde07286fd0a74db8
-
SHA1
012b5410875edd5211624240e4c311a6f9034e3a
-
SHA256
ce46961ec189d9d914c0d81b4d062c243fc081dc55c2887278592c24ba9b2af7
-
SHA512
34a32d7b50c4d8c6f9778ae62d30e2f6fa65eee755f205cdcb92ea1835e4213ae3a08b14becfa102882f9e737c876bdbbe5daca737191c8cf31650bb0f2f6640
-
SSDEEP
384:RvyO6Pxgsb8ySXEkCp9li5aOZ4f+JhCsSXS27QLKo:Rvyhxgsb8ySXEkCrli5aOZ4GCk
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422508215" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e6f90836a747474ab4136390aab5ae5a00000000020000000000106600000001000020000000eee455ac7de9ccbc81085a8f998ea3afe6a816eb8d1444d6d82f42da287285e9000000000e8000000002000020000000b4d0422e52475a1c232ae52d173a6e062e1573c636b569960b1b62a83c5229c7200000000af796a5ae62f93b6581377b67878feb0d3a6036929d3eec6f834049253129c140000000955633ce691bf2c0a4ffbca81c4dbc1ed420f299c6bd6cac654c7383fa4d47a6da27950e5444a320866b05a9e6ac8f43fd2402906e45834f93ead135bae379b1 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0d16927f3abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{52EC1FD1-17E6-11EF-8E23-7EEA931DE775} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2864 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2864 iexplore.exe 2864 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2864 wrote to memory of 2800 2864 iexplore.exe IEXPLORE.EXE PID 2864 wrote to memory of 2800 2864 iexplore.exe IEXPLORE.EXE PID 2864 wrote to memory of 2800 2864 iexplore.exe IEXPLORE.EXE PID 2864 wrote to memory of 2800 2864 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65c1d49c0a3d0f7cde07286fd0a74db8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2864 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d75588e4dd95bcb5685c796b65bb5124
SHA12a324769269fee3da2a154deb71606e1bcacfcf2
SHA25684ba232207a4cfd05f731fdea58ecd5183a5340c832ee45c0e9a2a27e3e59547
SHA51208d5941e6265acd30380fa6a20c63829314af90b0ae5afc8118ccba7a33b296b7cdf7a8313558e7270b8b328287feaa7ad381def0b51e1491131a130c7f786f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592a28ca2817b6e8b0dcf020cad917c82
SHA13f152af95a9fd4fdbed68d3fcf2396b6c52e48e5
SHA2568eae58335e28ccdcdd5951efe98836c5ef8908954408e4fc149b5eb83541d374
SHA5126274947353d43e00bf45b39dbbb3d1920134306779af21930d154f286d54aade379bed878cc67af8af786cb939f2e264251be10b0f329803fc3347928d40d424
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ddd05c591ade3511210798407646281
SHA1ade9bdaed8b8dc72f45f20b052da2e238dbf44cf
SHA2565712f5d11043997707b5f2780d83208e85929af7ce6483ffd222fcad2cef8fe0
SHA51240ac40930b36f3596179090738bf77d39bf685e122075dda0f42308c7e3236a6033221b54e29c1598aa61507a3f05706323f293aeb5b26904d085f29d7a6f611
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fa20e6235e8a725283895a224757b71
SHA1256e8d88532760ebaf730c2ccb7684bb38542ea4
SHA256009547faad409d841e0451ba44f7d6eb5d461353444083f7be7be3386132d353
SHA5128e65f4a60042ac2639bc1a31aba61cb22f89211f64af4a309cf6964c97fc817d85b71a424df11f1ca3b4c6a7f1a56cd5269d8951a250e147754ab40246e626cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5188a56c3ce3af78f137dc11e4c43e3c9
SHA170715e10a544d8b79e3e7fac4e4d1e35f9d06488
SHA2565be2c07dd80177b7c2b2a9073bec49796ada8ffac2cf697d5b5b44e74b56b26d
SHA51269655922faf2ef729394654b8c4085871f9b6fafe668ce83bb3c76d03bd89941242225cd07457f6da588cced09a877a7ea31cda48ecd1ddb9765aabc417073ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543cc9ccd4cc2e57f5d292621deec99f1
SHA1e07a95786a424698ec2bf02570d8e6a856775e48
SHA256e8206003928b6447ec4646b0e7403b5939528de26fc5aefac03dc89e2d75b677
SHA512ce90e57a27597751e37e30655cb63bcd5525da85fc625550be6c8705cb809fcbfc3ea9b4285dc11429db5322356677d0024f3667ea17bffb3118cb2e4ea56e70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559dba4feaf910b1fe7e6d0a49391fa87
SHA121775d91e8274e4a54a067356b3afb20dfaefdcd
SHA256bb3579d4be76bcb8aa070b299792e6b900e0ce1fc9608840f04a301f990517e8
SHA5120b7c6ef08bae4f8ebed32e3bb0dabfbbf6f6ab739ccb3bee69e49ee07cb21f57cc34241c98ce89954ffb0a801321781b9a02f0d7da95996afe1576bac72ec84c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54afceb103103906380427b588e4f3ec1
SHA1c53e2745f94b7676749d86195698cdf0d47f82ce
SHA256679c0efd52b897b3836d29624cf670ea02952db810e76bffdbb71e4e12f9a8a1
SHA512816af2ac96924af1afed65dd3d50960ef091ae63bbe6fe3af70b74c9430e2d28e7a398eba30b9cee828b9dd63a36b3f18fd5b5ee9363d4ea2358cb86d8e1a380
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddec4f0d83f7f46a809eb45d35564663
SHA1ded1e4d7bfc5dd3b9b14821daa9c7f47092006f3
SHA2568d52a05d95dd79152bb26cf6e685e71c7c94d97596b537818a0c07c21c22764c
SHA512e71101c9df18b8fe98d4e9219fe764a58f2dce61c0b654316c41113e4fb8fd2a0f2b3790c21778ca7698ea7a22752d01a57fad31d21ec00d45549f317dc640d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ec3d060c09b5ee9f15213c1f9d1567b
SHA175ed5bae4cbaed2a401dd47c3ea0ff907cd47d31
SHA256511aa87528d121ef1c3a6282634660da570536834b298e2d1116692a2c91f41a
SHA512921e44489074204b431f82d1537f11b4cfd265b24959fa4f0ef827c1c29478a2b936453577d4727a82833857ac043b9bd1057326a87de34b1f469bc3c2c84dc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fba010dfabb2fbfd372323890e5e1f58
SHA13ea255f137360670afcfc96dd2be7db8c48fd008
SHA2563d3a7809cb083d75561f86c7a6a6399bb75674f6667a84cf6fc1748537a78832
SHA51200fc46e467aff9199cbc3f5936a1ebbf27667bf6d2416929869312d71eba4a208743baca1c1bbb127ed568440ad628609e37ba8b8932915801ec0d1ac8a4c99b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a3ea48342fb9b16d40597e6d849bbe9
SHA1b5e836fc1ed391fae8b3b3eb7f0402224c2b1d56
SHA256b215ec1db9ed9a650070f32ad2c674cb91b83285bb1f5c03e3d6cba840a90228
SHA51246f1fb62ebcd5b1cf128f81a16a91ab7f1a24fc34ece783c72e0026eff94fbd2d150471e570dd73752de7d10e0969f027632a5f64319e4d3e22dc09a3122fc9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7e9c8c2cc67136ec02983e0f9f15072
SHA1e3b7a4b78acff9783e3d73072438177e80b9be2d
SHA256f4ee460bf885af7cd355dd6f0dfa502e6a239f7bc9fadfbae6517087703ee7a2
SHA51292d28da2697e589da080a3143cf576f3df450f6c7728955a97e7f37507f5a20eba449a59e4ae23519f57721dd1d6cad10195d92f4e4334008171d4791a32a461
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548ef52fd63e44fdbdf131f933d5266e0
SHA1f55bba68e16d248bcd445abd9951b2fb6ecabb52
SHA256ad24a0389be3ec1bcedca4ee2150ae8f8073d8dc9452fbb0726d670db69a1374
SHA5129879a0db6b8086081308fdfca61b9ded114d4c9b29bc1a1ccd0074ba417edaec78e993365f614f6c046708cb647c3968ee7f1702a3d139ca94685907172cdf32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5257d496b34c10aa6d802b737457eb7a5
SHA1024a2608ffa938b747071599fb1a2e26c7541e64
SHA256444d4993ae6c54128f2788f13ea830d3e588d7dafd70e8c4df00f2638cd2ce6b
SHA5123040d094b5e1af4146ebcd07326244a79b32c8215fdb86a618147afc2c93de5d588ec49ed5f873f5a08bc9b2de36d2cdd7fdc3501a8b8532e90731833aaf2e11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b10af387ff2d4fa26f6f06c45fdee19a
SHA1dd2afd56109b4b9421aad5fc7d85fa80c896afca
SHA25682bea4e2fc0e0dd8f88ba9d3b382f91f175f227c8bb689270ab6fc83675e276b
SHA512219be62016dd34acb0a41f0b2a8de4d874a78c0c3062e26d6875d20d3c89295f2c0b3cc23fdcc287cdfb68699d5e01db5c706aa81ab0fa7a02bf2ea11bfc697b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb3bcbc1b9d5ec84d891f639b2c9be12
SHA1278b24aa32a4561030cd89a26a170c61b88abc5c
SHA2562987b048313cea2722dfd4f0cdad1e21f2ba08b730b2d60fdaf8f54ba580a067
SHA512b706ea37327f1d9e66248295ad785b4109d24272631fec11821e3e72c2aa104c29113c842b05a3996f112d89a784d1e6f87af968a56bc25a98e84a1a6c4fb2ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ff3f00214fce7507cf740fe1c0e77f7
SHA1fec1c5b9c19673fab07bd809ce8b4946a17a328d
SHA256eee01662e957e7e918b2e4440e713183c6fd108b2bf0ad8b78a4c0f43646e190
SHA5129264f5d8b038aeb751fbe631808fb6da9a6b3d1a3b74da2b898b1ca6545ecaf186c91592fc7d4a0214c14abaa0f7877c9b2beda0d4e701824ff8b4b947b520ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546c3f9c02a6125819076ada5271f2fd3
SHA186a33cd642ef7fabf4b9d1a4b24466503f3d7f87
SHA2563c18370073a265ca185fe3d4c5f963786fb21b7a53fede911a74d1c8b39e8f35
SHA512ef6cd9af65a44a7b17be84698fef8767b0a0ff810da2faad575dd5bb334ca8226e8a61158980a4ab5bb2d1238b29186c220f769dddc8c3193d6648c52b172883
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a