Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:54
Static task
static1
Behavioral task
behavioral1
Sample
65c3f73d3509576472e2bb1266bc80b1_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
65c3f73d3509576472e2bb1266bc80b1_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65c3f73d3509576472e2bb1266bc80b1_JaffaCakes118.html
-
Size
3KB
-
MD5
65c3f73d3509576472e2bb1266bc80b1
-
SHA1
439db2819fc84f229a1257c76918cd04f8fd6fae
-
SHA256
95f232b0ffccf7512cd244e5e625eab213a2debe2bef76e90b7054c599bd8c36
-
SHA512
743e94ead499b16ac22408f7b25d0a1bb046a7f303ac8ba4de9e39c8190bda158b768da2433ea9a649e003673b946471aa240577393c641a0a766b5b085a130f
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20078168f3abda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422508323" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{93E89181-17E6-11EF-97A3-C6E8F1D2B27D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000009e51dac6149f24f3dbe1df4dc2f18854fa681f80a63ad0edc39d1aaa587c1340000000000e8000000002000020000000adf3de3ae6966f943b8f200559977bc271681ccb7b9b3b40d96efaa50ca551a1200000008ae0cc53fdd004fadc964c5cd3de0502036fcf5dba2e303b7471953adbdfc28f40000000f801dbf77369f05d1f4b864318941c69f93417616da624414ff01de6307e4c78e0b40815b2ada38117aa7cdb96fbc0da90bf1d251ab4b514ac628cb85ba7ca39 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2428 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2428 iexplore.exe 2428 iexplore.exe 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2428 wrote to memory of 2024 2428 iexplore.exe IEXPLORE.EXE PID 2428 wrote to memory of 2024 2428 iexplore.exe IEXPLORE.EXE PID 2428 wrote to memory of 2024 2428 iexplore.exe IEXPLORE.EXE PID 2428 wrote to memory of 2024 2428 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65c3f73d3509576472e2bb1266bc80b1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2428 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e87a48f9e7e7a0fe1e27cea4ea01770
SHA13f439b4b4156b430d2eacb65ec768dbafc887366
SHA25696e1f2a2eec4f4581661d94f6fc80639390e2584b15e75a365f8127c33f9f1ca
SHA512492e52beff95e3c62492923f1b2aa58e9d26f0fe63e0c91c4371e731afe8ded4811e4b03b12304e5c357567f687367104ad8f10f19427b5c7b5755f48119bf3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b396d263c4fec3d09b37273446fcb0f
SHA124f24509602d6e0a3f4609289b90fa2e9650b32a
SHA25689967664a6ce2c8156181a18c4a8d9c37f67a99d66ad7301a364043bed0591d2
SHA512a0a210493635daabd22d5c75cb5c0fc3f3cfaee30b0db4476b742c9033a19ff29af2efbd7b3914a67333b0865efd862c999355c59a700375df23c88b90015450
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b3e7b6d2521ab2184589364abfd2dcd
SHA1a1eb3092013e95486bc615bb8d8ba847bfe4d29f
SHA25639802bb12a28b26c2b811da483b7c84fa47ba3e80840a018375576cf5f9ae802
SHA5129c592c381322dfbd1850092470333a601325e5bee31aae8f33b94b1cb1fea82305a934730d0f759190e857886ac719a7d11827fc646fa12089791745bfe10738
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54cf180c0e66de1c14c4c51cb7fde2964
SHA16db3e51f5498a0b5fe2130fdb4adaf4a77ec1e6c
SHA25645520eae74431ab55f7dddb15d9e8d397bcac8d9b966d226052b9beee290d5e9
SHA5122248e8a3474254a9830178a5369ecc9f2372a0e16df7885c3e7cb8305618e900eba9cee1bfcd099a3f81dc3be684c3a83a7c1047838543fbeaa1b988f26c8c50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d371803753e4c8684b1495126d8ee0d9
SHA1cfc3c2ae92981fb18d06540d178851f758b505eb
SHA25633ed439dc0a1ce5968df225ec1adaa61ac10b73cfd0ca039dd30e665eeea9fa0
SHA512e21c8c941a297e034010724b9982ee0ef7b35a536755e8e62c1ff25af028b41418af9d6befea6d3a47705133ab4b4b0cec00e9574aeab4b2b3bfcb9a4d365e20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fe86b21370c4956d3c6245202aa8148
SHA148a3cd3d206d7be7bf81ad89efd0f1040284f2e2
SHA256e41a77267c8a349713c7b1e0186bcaf1317b07577dbb293d2a160d0c6122a2ca
SHA512e1725840287e6b4808bbe957f437df1816ec3e7a906ed30e284ccd2ca191155e63af6f6e443fd30bdd5ee8b7354d0a08bbaa6c4fca94a6c626efaa2c96e3e302
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5403ada09aaa77c3639d6001ba69f5c5b
SHA1c42e86b54f8e72c49ac8e83cd2c7b01a8da0a0af
SHA256c11e660c525f1b19f7b9f2d0cb49e363f4b82bbd9c008f37417a226846adfca3
SHA512c7abcbb3680c15fb4ef2dc91b3f646e59960952ae6236dfe4b519f3c8b0f6cf96e117e6bd574a7ede2bebdf36b2104cb292f481c855de3a23468d8088910a4af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5314f40761b0d34614780015f59e9d217
SHA195120212be4b9c9bb0f9466d4fd2dd02eee3e5a5
SHA25693edd95a38856b233634fec844a249c0cca775c098b2d35bb25142158185514f
SHA5127056da0fe2c7621b6b39f041e918cf3605f7d0f858bfc33b596902ca38ed659a616427186066d25c99adb0cafaf756d13f1e08770a402c24e29c63de05edc675
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5089603a4bab48b86feba1146fa5c95
SHA19af29cd4e509bb967c5b5f4b72dd0aab44f19477
SHA256109a7e3f7b3b15ac9d73867d07af605ed2a011cb0891e6d0256cbebc83926687
SHA512c60d7d2a203b8ac0dc42e49e00b7efbecb2b43355876196824291f926263dbf19723ebc746c795460ca332030f8b5da8be7dafa8dd601c4307192261ca632917
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5affd0c50a7b8804e780e656bd1494230
SHA1740f3eaeb4ec9d68888b0c62931e3255a002ee2d
SHA2560e2f7feebbd9e2363d38fd27745d12f435b27c80c91fd3130e5678aa7c160506
SHA5121c05a99e4c94e810a0213f9fd838031ec5966f2e314ae063afca609165e62fdbb711818edd609a63f6481b5079419c3a0b72800e02972d66906c7f2fa8e1a2a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507c913a8a2228a3c16780427e77c5e4c
SHA131bdadaf24705885460ea35c606261de217f8f41
SHA256e0357f315107d2c88f4712625dccb27e010793db6b0aa46495564c789602dee5
SHA51270d82087ef5310224d4f67e7350e9f397f102b36f30797388d0dc261540daa2a1c80814cc282c532103c4b75f6016a60559bca2d11582cdd38bf25edb9034819
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c47d75ec777b74117000984ba70f416
SHA1a510fb303a5b2d733955d775934483181d5643a7
SHA256d998f897ab57a5ffd2f85ef4fd78d62985662b1f9d385d4dfb51c78366a1fd0a
SHA512303a8c27b226b238ac9968fe2012826df03ec20eef5c8e06be1611c8632a4349000e07601b6f6c7ebd1530c983f960f155a37f7592a3f1fd9de06e3da408af1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515cad352ad4c83a0dc7c507abb68dc55
SHA18fd99b9ffc7c0725d7fbcd130f905e87cd291ba1
SHA256a91f6043e52fa3e0bdc0c8d8eb9f92c1423dfbe8131550d2795f1c787fab1653
SHA512ef2f48ca56fe41461cb7b49fee9be5412b5358a6ee81fe8c6ecc6cf07ed86f4b9232f787b65999f415b1d44db7f109e2bf9f692238f9cdebfd9da0961e354af9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a93a999e28617b45944e7963bf5b424
SHA102dc9d36692bb2d3c8cf7042f3a0c59a20bf437d
SHA256ee7d6d83f487efb28e190256f6b59cde679c9cdace959aa512f465efb786cf4d
SHA512b6a335246b1db63bb92e1a3808ae480ec02d35396ad7aab0d95117f9b281eaee54387d73aec27473519fb5cadb3634c1c652ca12fc5a1410035610e94ca40aa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5605c4cd2edda5893e479dcc347cb50f5
SHA1ffd4829b785e961c2afade8f5414935f5a0b7efe
SHA2566d56756c5a9e61e5f4175e0e18a777632df37a3db12561bd92dfd1ffd155ffd2
SHA512a9481db333507b92a30f32da4c4052af9ef80bb952b24f609b109ebbb07adf7cf3f898872c50279dbaa40f462aaef629d26fef86f2ddea981ea5df45c0dfba31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6798cda390f913ad919b29ab0aea935
SHA1fd68b65b081dda2c83226d1031ddf485c16f6379
SHA2564ecf390a687c98d4f80704cccc487d39d0c19edfc6d4df8e249727bcb17459a8
SHA5120fbd16f7ccb392d975fdfcfbcda2d7d439fdbf20498ef2c325526b6c0e6cc497b04016f0e836d20f258ef562598766e7925907ea6f0e93b222d1fc68ee6ab47a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54dfc0ade0e89f79c7aeae3bd1a614fb6
SHA14d5285578aff254b964525a5b5a11021d24f2741
SHA256b338b62103b4ec0a3e3e4a2a5ab66dc6b435c475e10291bb14aff98a37693a8f
SHA512658a43abbcfd4052e9e142ca10339d262af51ff7c77f9e675e9af8c46c204944f50fa531544b525f724229e6fe6d43ed2d86769d705da22a73aa9c6a0f4cfde7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508069d0905f0315f7225398dc09142e1
SHA16d4926200b79c0ec954c90dd31c53029e87c4beb
SHA256b92f2d6de6d04e2d50841083b5bf65a758f2197763f397e6e2f1fac78e8ba663
SHA512311b10cc1ebad0048bc7629bcf57d4d652feb222af72b4ecf110d3d872741d9b3dbc16016b0479bb89b92851749d7f6998af99c38c2a13a0e4c91f6a8b2e4c74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e2eecb8c81042560d7db040d2fa3828
SHA1647b92efc019495d9d440f05e3c674abdf2b43b6
SHA256365df75d3a9b069cb9b584985f233e71e291ba832b93cc491f3d9b11f876fb37
SHA512553ce3b9c14e802b479d1179f0298d426958d3e989748c748a49564448f503cde22791cf1b75b802a2780895428c346b8c6fed49243b9d6ea9d63e3902b4de1c
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a