Analysis
-
max time kernel
134s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:54
Static task
static1
Behavioral task
behavioral1
Sample
65c3da89160de7779507d2deab725fc1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65c3da89160de7779507d2deab725fc1_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65c3da89160de7779507d2deab725fc1_JaffaCakes118.html
-
Size
213KB
-
MD5
65c3da89160de7779507d2deab725fc1
-
SHA1
d47b6241f0cf580aa1eec48899fc4e40a6dd71aa
-
SHA256
fb5db1a2d7131bf9103dcb9dfbd5bb728ebaa63f42e5f64de21be0048c01f006
-
SHA512
b9d9f059f6d4580badf52a6c4d8245c7fbcd507eb1dfaeaeb3f848978e2e3185b6283fe20b427a3e984b22639c993cffe8c7d8c13d46a341569d4ff3c84e8b45
-
SSDEEP
3072:SjNVnPmnvfYyfkMY+BES09JXAnyrZalI+YQ:Sjj2VsMYod+X3oI+YQ
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8E86D261-17E6-11EF-A304-E60682B688C9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422508315" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1812 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1812 iexplore.exe 1812 iexplore.exe 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1812 wrote to memory of 3004 1812 iexplore.exe IEXPLORE.EXE PID 1812 wrote to memory of 3004 1812 iexplore.exe IEXPLORE.EXE PID 1812 wrote to memory of 3004 1812 iexplore.exe IEXPLORE.EXE PID 1812 wrote to memory of 3004 1812 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65c3da89160de7779507d2deab725fc1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1812 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537541d264411494f1833e3631a40f7b3
SHA1858bb74423fd3c670e72c36cc1575fba3427f261
SHA25691657ec2936577dda85d9c255a8d6072228584364e9878e1500f68ead1f9b9c3
SHA5125e861bce2835b18579ac8ebcc9a751f3ef06f0a335dab0277f6b960b249d41b14d58a888c9bf4bbc648cd1b9b0ea99380e043a397c9935af94a1d3f28e8043d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed176b2d9162766dc5d80864d5ec21b6
SHA19c84002e1e8635f7ef8a6ad7fb24e59beeb474ad
SHA2560b36ed21acaa4d1f85d66bea894eed083c996b3b043a32b8e7c098a9cfe0ba14
SHA512085db6ea7422e5e17e848d5cf26a8a08a3d7f027dd260ec9800aee0df1b896924b6da35f45d39958ee5f6f72320fdee1338ee7a00d6fa7e9e4ad1825890633ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5194efccea0cba6d47aa4713c66ef5c24
SHA11c3b94ed7d21c6b424d89491c07716d707c21872
SHA2566c887e1a8a6003104dcb23d65251b2ff9dd887ab53f649c69091b1820053a440
SHA512001cc1277f34e1b58e9ff0db525fdcb18a487c6ef207c2e6e81bf6a11df09b5b3058630cb0f1d99f9931a35e36fca3e671b6625901eb480c7e605849e9753e1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59962537c8663d1554e7611afd61b43eb
SHA1c78ac0abb21b1b7a04bcfae2675d5029b1bc34bb
SHA25646f9af2d3bec52ef345e8c19133f0a9dcd9c0eebaa00a3cf55b8d59526e17743
SHA512bb304413225473343aa7fedd3305abadc47fa3356137b3979fac7b58035ff6d4874fd70d0cfa6715db20cf4c586f21c83f7f6dd4b9e5a9a4dd72bab5488bf792
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b597577e50963580ef4fc114c2a2a4ac
SHA1ff695a3930b0e78f503aa650236586682aa0fb94
SHA256134f1eb1b09d3c0d214e9d4fabe0550e232fa80040ce8b6cc93c9300074e224f
SHA512507413ad06fc15c300431756d876b9bd4174f6c0a8d9385b32c244a4244644f23cc72be038ae56950adcf479a92a58885e7ba801d47a2af4dd9493d548029dc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578a20d37d4eb3fad285b0be0f910e0a9
SHA12bf4a1e1826ee5925fcc4558207a2846518e7c3d
SHA256e2e62809dd3bbb6ada1c328a5d687271ccd018c4f4075684dffb79d1f9a7dc77
SHA5128858b146a43f2a1069d27e208a83f96547c1eb8c2229d2f6c6a8b1b85172eda2ae8def14f6f67c1637eb187671088ebe50608f9a8dcfba05895cb933b05a6698
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9d1e7f59408b731f470432f5263abbf
SHA1c971a900d70bfdde9cbc33a355ad10cb2253fcbe
SHA2561c1ac91409febdd04957c214e1b8f1016b95719a837dedfa707427577b4a9553
SHA512856bad6005fa77c1531faaeef873fe28514dae057ed286ad0ee29d87472de6dd5fe6db77275adf7ac03fe2adddc3267aab5e932886d9be6565cc4dd667c5cab2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae0f99f9b90e6431863fd75a0e80e00f
SHA11a0f92a95d567a2e6b5f44d9579722c1ec187413
SHA256c50e07ba22136515ecee2f92a8e3f7aaea353671b8e0ee97783bbdf512ecb2c5
SHA5124168ef8847256f5cbe58ff01fcbd18c8759c6b030a9c0b96f2d5cbfad41e8f512bfd7d463d6e3bf356cb1d0dde6859d60f1744f928d83711b9cc9c6b218be872
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5991e659bde09254252a3fe65acd9bc4d
SHA105ef990df7bb362cc12f2327e25e46b913145aa4
SHA256386027da7d00bc3f502c312a6edbc8b0a5c33c55d5c0056fadd5a4184d7897ea
SHA5129d218b8a3da77ff3baca541b86a3824473fce52502857025e14bfb12a36166939b6284dbdbd9d8a8fbc61bcb75c0a18dc0861e7b4d4cdcb7a8ff6952d9827f33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580b25a0859a0a4ce7fc0e7a004c49da0
SHA11828a8ee78bc4ced201b7cdeac88ea19a6b13c78
SHA256695c246f98231247836282454e050fa3bc41ec28670d1827cc1d0ec94f77f2ff
SHA512bff48f89d72d1b74491475bd4cb1f91051d50171dcf17ba080a89111c66d614c70db43174c7751a9b1347ad02beca54796a52caf279ca9c469f432005bfcc13c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588cf376c4438462372f2ca038f61fb92
SHA1efa2cfa7abc28bda331890b642e5de1857117994
SHA2560b73f5ea491e6bc3f1e4995485b14255f9d984f2c35280f1bdd449407a671a63
SHA5127d36bfdee2ec32910f89907b5ce0a304a4c58bcc9d231eb86fe9e5dc2dd3a82c02f6c55f1b310f9f29de551a1d1360baaafc5cc5cdc141e3c3f649c808f3335b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597503f5c541c3af9a09c88cd060a7a77
SHA10db5b3b30084bcf7eefec8b33f9264621aa2b53b
SHA256eafd40584f2f1853a8bee463843e41a535151920bed4cb1674db6b66dcb841ba
SHA512d4f1220361c5fcbc321d75e658ad4dd8cb9d08be2ebc0c53f3e256f11312bc4badac83bc05b609446c65bce373c2007f58e2413589b134403136d9c683f7a0a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a6653f7c4221f7d5d4ebf079c750a27
SHA1c0fcbd58ed84d3fe046744fc7d1da527705b495e
SHA2565a3aa21b06695f3af445ad17a9d6d46443a2720083e5886dfea2de9b9c81bcff
SHA5127a42b94262fc82287865f244dece67ddac1a6157675f5f68fff364776db1d3dfeb302c92156b2dd1b265d1ee45ce64e3283c6ee5e03c5121cb2845feb4b2d16a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5546941f1ca82d9b930bd959943ca9304
SHA1b737485d8ea403d04b1209b2c3d815f48433311b
SHA2564c977143854fbe246b70d7d67894a874defeecdd9d18a6d553308a230f91856a
SHA512f7b3d336860596acaf9f6b9a662fcd5f10f39c01e3c308b3c473bc181fcdeb749e73e159dfbb355959c4d2e22833eef08d6d97dfe330b35b5173c156ec0e3883
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a333539076a0c9d9232e3aedc6723edd
SHA1fac6ad00a713200432e91d70847ce69938c25a59
SHA25676b128358f2f23d8fd5df5a4cf94f7944f9064ab6828fc56d27714ca71329796
SHA5126a1526bfdb95d67cec87cef7f7a78c886271401e944cb7275b88403b3d6828e06f349633c1feb7d613623c04112f9d7788649ed2b047f492c141bc8ce9a17ca6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537237d1fb5743f59931f684156e521ea
SHA12621d6f82fe7d3e63a22b2526b1b784578ee2213
SHA2560144cb03f3c11537dcf1e7f44b8a36a7560f4b9b2a978d4f4dc08de3be9d645c
SHA5122e49d126470750c0bd8207e80a0602daeb6ac6d7bedbd25d16a9941b2db035a6e329980170449194d5e039588d50f61f2c730a02b98c2f474fc1ce28650e397a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e437b0354914c7a128ec7a2f742c3d5
SHA11c7e6cae3528fb35548f96a76071ee145d4279e4
SHA2567c2e2419e54f85510caeb6d974ea81cf60b307531d5d5b280e334fae1cce5858
SHA51270ffb661f82ce9660bc3e96e366a37f54d26146b22b9c70daa008b9e28b2db5f133e1a6f1759936bc56ef6f59035a5d3f3617ce07c8ce340405c1f8bc6bafc5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cb1f4c2e9f51875cf17d2ff84408253
SHA15336e2936b590e6c3e518dc2eefda40aeaddd17f
SHA256b038797869829f851eeb28847d5a4b1db854dae8625fdafe4402e77fa2c7ec12
SHA51231e34591d2fde6a6bb51812ee81a8ef0657e0b1f6f4a23de6118480718117fff9869215d464a76cada372c1630508f094128d7787b42f6a0b899c0440bfb6650
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531d8a49c4663ac869c05eb88e78ac361
SHA13852ba0c03d2f1f657c65c5998d07a5f26822c6d
SHA256b6ed6f7d5357d46070aeccee83e58b1ca7378c208758d7ab356c1059a86fdd4f
SHA5128434a63fa75f4337b4447be766b1c05a105eac48c0fd8013e1b7d3f8d5c752e0e1514beb996b99bf5f6670768cdc8c49f640e47779ee6abc214400ff3c39e015
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a