Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:53
Static task
static1
Behavioral task
behavioral1
Sample
65c330f160c4bc4074eb45188c374e59_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
65c330f160c4bc4074eb45188c374e59_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
65c330f160c4bc4074eb45188c374e59_JaffaCakes118.html
-
Size
43KB
-
MD5
65c330f160c4bc4074eb45188c374e59
-
SHA1
5c6b6cb5502adc879972266f945e06b003b8027c
-
SHA256
6e981a6e6bca6276046f1b367009ddbfe9e6ef2ca00d0cd06747be1931967b54
-
SHA512
67c98857ecd9eb6304ef5ef11aa8194e1cbc69fad9651efac1467a46e47ec10014a3621ae5c3ed67057bf8333ddbcbd8059ce2e46ea23e98ef580b4151029872
-
SSDEEP
768:1I+vbG2+0MGi+vZGIikHhGRGXiOgOeGBGlGslstwFOs/wOenV:K+vt+0U+v5ikH/iOgOkFnYOm
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000cc40579a586dd0248e40ceaa2ef574b8b5267746814eb00c28b04f8347111ec6000000000e800000000200002000000027ec662a880c4cd44b5784861824382965197353429b5bbf1593b661ad098e3190000000e855f080cd9f8d895c08d2b658f13846215a51f9b8b9fbf3bf1aa8ac221358df1b5f0f12254d8c8892349d170cd08fc51e03f6191bd88b50259dbe08d13bc29b16e97e9411daa742e65442698cf7025e0927e8bfefef4e5b594b484b006ee5a03aed8e3bd9b574f6360d2f453109f0fa9bccafb821ab948cb13f0f8142baa0391ff7778f9f659310702c1dc3c825409e40000000bc55854a5358ebd52eed7d6339a5fa9bf448b9fab40f9bc2b7f60c52d4c4a820d759f03de7495c6366071bc934d8e637cc9e7213452b8adcd77a4d85d408e7d9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8466F6C1-17E6-11EF-AD38-76E827BE66E5} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0411759f3abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000382c45f3f93d6397e23563570f4f8c58d4a3ecd7844549a4b3198a849c406271000000000e800000000200002000000065099a31a3a162d85e79b6de54496c1fa45042ac872ba8f45fc414adc28a3708200000009f992bb276e301c23e1e93debd5891d9b55d7886c8e23189d0b162c30810f37e40000000e7c9043f14723c6991bf7563e777f8b64c7d540287014d9c80d99958c255fcebbc4ca1340afaff650b7a7c327204f9d82b2a11d23190dc8ab400df22550c165c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422508297" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1732 iexplore.exe 1732 iexplore.exe 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1732 wrote to memory of 2140 1732 iexplore.exe IEXPLORE.EXE PID 1732 wrote to memory of 2140 1732 iexplore.exe IEXPLORE.EXE PID 1732 wrote to memory of 2140 1732 iexplore.exe IEXPLORE.EXE PID 1732 wrote to memory of 2140 1732 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65c330f160c4bc4074eb45188c374e59_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecff3a0e9e1bdfc0d9c6a3ba241195fe
SHA1529f672867506c10968597adf8b79f977c4e363d
SHA2569738f7cea12ce7f6b70f42f9a164095bfaa23c7c6cbf049da42d0ce0da4ca548
SHA512dcd43eb67c936be08e320dba76c21719655a361376f5488d4c35d298dda4b43a2f04f0f96b5344a30e0e6f0576c499c9d350adf78ef36c219a9758195addaaeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebaae2aef2a9aa0b70d020e42469cf10
SHA1dcd9e3e0382af6e87123acc509174b9b0d361265
SHA256dd2b9f1af45cf1947718f27454a996a7853795299842c9021aefda193fe3b433
SHA512dec513bea9210f39805ea82c45c462e27e148776a530708bbdf3e19fe91a644979891e0c51839518ff9d76912bd0cb7d9c427c0ae0366febb82c7c643c7461f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bbe28246c14a842ba31c4d1343acb0e
SHA14216776314b2322a42aa53f34974ab98f808ca25
SHA256de7a6a532b0ad992f34626553b06edb55ba5bbdfe53fd0b0210ab0961c26db29
SHA51249162fdb150ed3169ca32088f89fa68b6a8202b9f93cec2fef1e370f6227ab63c74c3df56b472a42b9c088bb2d11f3620bda434c251c1dd55b5b4c73831ebf7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e05d9d303ad5dda0493051732b8142d
SHA12a4df52dc82f030167d04c94d50e0302018c620f
SHA2564ee168972f29fea3014057cc94c650f185c451d41bd11ab7a194c1146e30c3ea
SHA51283a8f7bdd36aaaf1ba3081a647d2c264bd51aa1a9f244aa970427eb21ad74c3fb01d7197990d4f676412ec788a9fe79a0a2cbb282ed5faa127cffd317db3a069
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd7e00e996ddb45fa8656dfd808929a7
SHA1c5068720d1ff20ad78e1ca96cf49018c0b4e1dce
SHA256fc8550edc5603f8339b625e87259ac30b9fc82a5a64856fbc525f1e919a41d0b
SHA5122a7e20dacaee430d962037661c1ec278bc342e7f723f7e70c35ba39fd0367e7e32076fc178d67294947baf2454db2d529c8b13477f0781a7e8754ec11ed33ac5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586df3eb39112fcf5bb608126bcaadeea
SHA185a8a09d7229b309b4d61e8f681d91693679a8bc
SHA256b1aa0a2ad47885ff086440fbea1a033629d20db4e2539fae183fda9aa97e019e
SHA5129b42f672af4e0a1569227ed4996c7f3efdb1691599cd2ae18c1a702aefc36349924f7b22b09e44b9640553ca233bbcb1de4af8789946038aa942f900546ddd01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd9e5390bdff856b6820f44fba570020
SHA1a80a439653180d0858e50bcf4025a4fb156b710a
SHA256f17ca2249a4197555aa07fa94e8eb249d69b4e4eda4de6ae4e071d56f05b89f0
SHA5121177bd17aba24b69e425c1fc906f737b01ab3b305e3c778998fcd846869b470b29048635264e75d9d9dcb4cdec6cef4571af7194bd06cd79e7b384aef32cadd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e99403c149b18eb4c03824fb51f71f3b
SHA128316ac653a148833e4b38a5af0e0cb681c82c9c
SHA25654a163bab28e8b7d4cfd256888aa9c7f2067b9478ded4467341f6249c932a4d1
SHA5127701485ea955fe6a7a0e8538b161a9362c1d703d2e69f575a5d434d0323868c65f2d73d74aa29c135d3f229a3adb3454bab46238e2be62f34f22a726d8430a14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515188605c39194ff465781771037e2c8
SHA139363b3516a1114b2d7cdf28c91422cdbd42d06d
SHA2564b97b1174bb73ba7def7e994903e683bfaa06d64a710cd5d414c3afc21f020d7
SHA512302188be30696c5bc6c61b30c237ab143047e9fd003acde6647278317ba66867d4b1b974fb3663c1681612e45f92f69839ff95ffd4d6da030992ac53f0a084b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a82784bbce50683e28c1a6b26b4f809b
SHA1210695fac12cb86d5497e940482084850a362c7b
SHA256408291ac58b6d62ddd05ab73af1e2429977146167c8a86c3af80fa68ed0af65b
SHA5128b50a17f841ce617113740973e65f4d3bf3bf6a3dafc64a48d2202d2f37be13617bc5100d46b1421a8461e519f6ef60329dc01e12532a4c46f3c19638123926d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba228b4cb62023c8081a24136f875ac0
SHA179788ae45a0ba511e79e0aece8b110b54e162057
SHA256112e0514ba5e10403ba2867d553e53aba5a6ed91498927027e6527a6dcf75201
SHA512c8f2d0b25608871c67091a08a206031bad32097368ca592d4be5614c2b18eb982ca4511b197b32d3bbdf7e608cfc73e3993dda106637d7699829ee70b17f6796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5ad3333bae87301a7838ead92e706cd
SHA17eefe00ec75accb46cee7c5c10ed4cc61f2f85f1
SHA256e761227f9cd2ead1cc389a8b59924b0437fd971bde2f20721dd0452e34f6e84f
SHA5127597f584ba5b09673aaad7e8797e4a068f0b0e36add550071899aefd3c2a484800a0980d15a11c66876ccfa2b8d991257051045ae2701fdffaeefc5f644a75c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54bf26234dcb4e3bf0e9f784da8082b40
SHA1e5975a451ba725c9b7d83bc65a40fcc10ee72901
SHA256368166e85c7f1719b860f7aae40dc83f2d9b8699f51aa61181c5f492eaaa9b56
SHA512737bd36a58679fcc2fe1efb3ff65f98bba989ad9e5904f2640851b4ea878179d0e2824e4bf25c896f4ad7186ea450c1fa2b716d367ded8fe0b7bf041b0f8f246
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f596e52b8f4bacacff68da3b259ca33
SHA151f4de74c97c63b26623e177b7bcb54a862f600a
SHA2561bfe3253619e8388336efbba1acea5017dd8e67d5d984b4bc9c18906920ee1a2
SHA51240f4779e9340fa853937bd4716bf7993f4e3194a5c2b20810c4982395b95b40b6fd422732816d6941e4d8dfbb190a5042ec2c44fced880d3b49276b603640699
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a16b1e05a4cb1f9fd3c0b68b0f0b3b12
SHA1f91367784166f9fce6f29ccc3d0a0924914273ce
SHA25647f1eeff7b59e0e0d8a188a18b439206ac8c236ee3ae458e1f124b3286ca50cf
SHA512eff0a2e3e617aefe52555cc6013f46d25958bc59cf885f4dac97f4e47b4bc98a7bb9de5c1c4489db644ee36de9f753e6abf9d302b1d02fde7cf17d20a9714fee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f260764f1aa6ed83089bb2326b5a4899
SHA1cb606cbe875685b80de8c40b94cd1ddfe0f1ef76
SHA2560225d3cac23e5767eabae16ce6d45443c7a75162c284ae36a14ec1817c6e6ed3
SHA5127a5d6ec1d7ec961fe42fb4735a5a875de93b380b8447c0056bc3cc39b33f02519b6092876ddf9592755e1e0703ec3ccc9cb3c3bfd049a793921faf1d4389f817
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5c11168b1b512ba9ee751a78e7a0817
SHA1cd563049fb8fa9cb48fa09baedb1c5355cb76dd5
SHA256f83624c700f5fda90e14738cb253daba78b8dd18c79cab3b63576a7937929364
SHA5128ee5f77f3c040b027ce4a0c6b5935db8012f39c5430f0fdb946350b6240ecfe6976fb5223fc98419f2015dadc5216eaf8a6d1ec333addf76ef0008aaace8150a
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a