Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:56
Static task
static1
Behavioral task
behavioral1
Sample
65c50bbc5b6cf91a51884157d9ec031c_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65c50bbc5b6cf91a51884157d9ec031c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65c50bbc5b6cf91a51884157d9ec031c_JaffaCakes118.html
-
Size
3KB
-
MD5
65c50bbc5b6cf91a51884157d9ec031c
-
SHA1
e169ad26a08a8f666dfe3ba760d5a498618a8d53
-
SHA256
7e7dfe99494757920341766f18adb55de2b3cd954f6c8ba9cf591d49941820aa
-
SHA512
84eabcc5a4820d71e2e1c51e836175ca075b2690c26b661fc2274e3984ca229186e76b60541076df9b9e5f1e7716adfeb5a065199f27e8dff1a6ffc13fdc1fb3
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0c79fa7f3abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D31F3F21-17E6-11EF-99EB-F2F7F00EEB0D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422508429" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000006620f939d0896b8736461430220d53b2d1fc4a51be90b339d8de9a9788a3edf5000000000e800000000200002000000050c5d810f58b889af8de986fc08ab96d5f8449807e72cc77408b3aa45e606bef200000000c74920e699f101737b876240ba4c14a72eda17cec72e2797ff131e564cbd4774000000060538d7773a5860690c46dbbe78cb3aaf4a797217315ff7b0d1e5f64d3dbab1791fc5bde87389a351706b25762f4bc82865d0993ba3c1452fcef90dda1ed0949 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 3056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 3056 iexplore.exe 3056 iexplore.exe 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 3056 wrote to memory of 2460 3056 iexplore.exe IEXPLORE.EXE PID 3056 wrote to memory of 2460 3056 iexplore.exe IEXPLORE.EXE PID 3056 wrote to memory of 2460 3056 iexplore.exe IEXPLORE.EXE PID 3056 wrote to memory of 2460 3056 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65c50bbc5b6cf91a51884157d9ec031c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3056 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517aad8d66c2c858ac75a661b3d3549ab
SHA1fcf07c2b8d2d478e002d736dac39109bb4980fc6
SHA256f362bc9c851d106e79df013a39df320acaf1e3e69ba0373489ea00a78136db2b
SHA512f662b59f058fd3ae5e4000c1bce7ccd613501c5e3bd73e9d7699e5e78d827976688ff5ab63ab86e9179661705a8d4d697f5ff52dd52a1970e46f9e18a5429ae3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528ab0c1e3cd042f382cd0f8ef3182ab2
SHA1690efd1c0da34ea2fa318d35d5943b74a9297972
SHA2562426e79dadbf444ef1da63af6e45e63aa9b435242e5d5af29493fdc8c1325ad1
SHA5122025539a231db71daf72173c0de9eac3bde294ca747b74ed2e63004e3a973642862160c8b19330c6a9df49bf86a6a63ba21e7876210a6cc9879d6ca71c4a2199
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b1cd4310cb9394c2090f34d1c75b11c
SHA125e8773c63ecc0d3a9efd83f558f1cef56c56626
SHA2567c6075b6ee22452d089325b776268809b7babd0f1a82edc8d4e9d0a25ff9d6cd
SHA5122170b9f47baed83e1503aa1e179dd30d29e8a701c79e1b7f8e831cbedc1caffbecf40d0bced079e47b3061b109dec8290d487779bd55d727b25ff9d97cce2f82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c217afe42099ef21b466844de854a79
SHA178a0d3ac886f91e93cff3da2a859909230ee1665
SHA25687b7e001e4b0ed8b956218867dbadd4961c665508a667b87c2969e83222efbd7
SHA512e58559842ce5b4243476595f10cd1127a5645276203891884598496f89eb9ae30d3e2e3d849beba3f468b821c9c23ce97f3ce9d312f0a51592eb166a50356298
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5faf7d407d2ae924bd4cbc7d9d9c09dde
SHA1074363d0b7bbb7ea16ae363c13cdc188a6371f97
SHA256dfe77e77d5138ff72652720dafee6d6d25076ada259323ed46943c2385777db6
SHA5125e95c28aa3f6d4a097c99a847ce17f6ac5f84f96f2f467c2ba977264aff4904579accffc007a44ea3a421e6af58398467776c47014da861eaaf9ae222856375c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e8f585cebacd75f11060940a02fe73b
SHA1475b5841d4e31bf2f5d59f05803a4960f37c273d
SHA2567e3afe33510bddf27f24976ad7afe5794f45b23cf05fb4776a2f5a43a5ade112
SHA5122055e27632a8a901a63ec0df22a9589cb4ecf688ba8e32b9fcfd14d497623eb8b93769ebf7e5e7fa7111765a706c3e3edacea4b04886b25bd8ae7456b692f567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5282652fb09a4f490e0a9ea0c78b0ec9a
SHA1df91cc9fe42fe7475ce82a8102d428eaa134ca3e
SHA256df88741e830ea2037ebac8e78da097e19fefe636be8fc1baf38d5a001bc59ba1
SHA5125d82b166ac7f341dcc3ff62d47fe02e97234fa054413b0be62c56b8c6c2938f87a2f7ef399c9d68479eb434fe82e9fa5da1d73dd11c382cc9c0966e55cfc741f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c562c649cb31391efbda7dab159a760e
SHA1f03f08507aa717b532c26937179b6e5ad594169c
SHA256858260b0abc57ad3b0d4d56c2dfdf84fb072509c5e2ec65c1d1dfff971c157ba
SHA512ec704842ebb5b86a0b0e87a65d0380e45a543c5579546201d496dce68cf5d287b36016b5397f5f7d53f0617a6136ed754a3e9cd59b06e9c9b52f54ae6abdc9a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2ac20a231b4bf09069859b6d26cf510
SHA117c0e65c7478204446b596202972e5b1d6b5e550
SHA2567dd97292fd31385a1a49c660b03a0e9ec28f2fe55505925ff21962abd6d948a2
SHA5129ad35119f1af8f0b818f8dcd1efc5efdd66c25d8bfd04053cdc87451f11b0411e44ebc7562b13e14ce3622bb3dffe3da7e1a7b0fde129ffd062e4e76348f41df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b60e4f22dd8652f89400c13b780735cb
SHA186adc6decbae927364301ec499a6ac5755eeed21
SHA256300aa06fca523e0224b4a9263dd56dfd849a7226b19d8617f25f6a28e9ae4e79
SHA5127e16b329945e0feffe1ee0299a1628a677aaa68b7cb0968b6fa6fc678c44f6e347c87bcf9f45a953abaa3303170cf9fe81c55172963b9a7d30ae570b78df7cb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e25ffad8f72844aa36a14e30f4d62d4
SHA1f8eed463065e4e706f13e0d2f66a10fbcde9a1f0
SHA256ff00de290689a71201d28480f58132c01fd5ae57553704a5f0036e2df2cb860d
SHA51292886a5c587e3fbea07796f6aac7ff951ed1505978a69aff3bc358499e25a8f5eeea5ad1993993c5115c10d413abf9c8b67fabdb5cd79cf8422bf27e11f1b7ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3d9448b8d3eeda0a429a35b7b683a90
SHA1745bf42b129e0536018e1656bf690de15a4e7165
SHA25606946e1294feaf60dd92d184332fb14854a1568d1d9bcb597e2af1398a2fa546
SHA51299d25012a8443ca48e5d4bfffceed13b0b75347002bc6c6333195449c11f1c9e1b076a9bc481323b50c8ee51b231e436e86e7d50f6415ee15071865655852230
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9cc5ace8afeea55a4ebde38f3129006
SHA15d6e3ac6f3939333d7792e04b6451c38ff843f25
SHA2567224802b653306d999f3163950df10a9fa5bd89a284496f9a94fe7c026812e26
SHA51201436c3f27633b1718a2bdfef55a534d2226077c44c6f8fefa33b18b26a1f99b6d92715ef9752c44213331d9c37f016df15ed29ac9b76b07afaac88b43775005
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec716db0b215ce47f7e7d6a478df84cf
SHA187ffa3655b58318d98cfba514a44c6920e3c3ddc
SHA2564af2aa829f22a5a5d7cab85153a6883b3055ae303e25631359989fbaed9fd029
SHA51298c623812c56dc60d7d3440a5dc300440fd6fb3b576a43cb6690afe78fe46a8cde8f7281a3082ee44dc535f2bd970589d5c862d74384d47aab9cbd81e1db29d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f7e55b583e64f39ecf7601785267b7f
SHA14a3e4096f4bcc5eda9681787579d00b1fbd50daf
SHA256fadac5c18dceb1aed0fea7dea60849b00f03eb6abd79e27068ad6be29d2f5740
SHA512ce4507738d97a900cc450d3fc7952fc047a0e742bb9bb7165dcff067b29cfd5023e111f2c7141a94a8c8e6843e82dc9eeb1bd72a571866bbdecb1a7e6a8689b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a13c22b096595286cff9964422b5ea5
SHA14fdb508798106b90b8075d563bbd7546f61ac4e4
SHA256512838cbbcbffa56d5038c3d1a2abdf5a6c92c6a274f9dc2765cb56f13f222a3
SHA512b9ff26af05337e33ffd29cd3a38dabd6d668ceffc0a21e45cbc8ab1095cb6208ad767118cb319660293962918fd0ea5916dc3daddf66bb808573d19871af1b61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5667817b49d0091f4159606d8a9a2359a
SHA142cf3f93765daa56bff690b3f19ac9797c457d21
SHA2569e47eabf64809d5d9b71b87e04af6825fd93ad19255e6faa679dc24db5426ef4
SHA5122ba603419da280f161aabf4c5ff717dbba0e9cae1bdd766d519c9a657699c53c66d98b501de4a6cecfbbac99fc9a2e0260fb2e4025ba51aadaba551a75fb78cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57884355fcfd2a7d02f76e972889612bd
SHA1e630955ffa2567cba1ea946431d78c063c5883e8
SHA2566872f6e631a35c2a39a044d4ca865afdea9a5e704e8ac645b9bb23b9f0f30a92
SHA512dbb90028a6d0e8217ebeda72e2f8eda010e74a63942e3a8dd21709ec4566cda62e2d60847b17ae8c6d02cda577919f9d79c5e6513b6cb36bfd80660929182d88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0a57173eb723bc285f93568a88f0164
SHA100bc43fca233eb45f283e16ab6d89600e7c51dcd
SHA2564c784bff69cd4a3821c95785d5da2bd6cb812fe21fb0d3beb67cdf2fd621acc9
SHA512780e871a8a05989543c5c6c97707cb23aba4ebf7d2809a94266136ef95e340d8ebe9ef4649812f68fe08a7384c6728c14786e5f9f32fa6766c3ab894a0732ce3
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a