Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:01
Static task
static1
Behavioral task
behavioral1
Sample
65c9339182645a09d883ae1d6d79703d_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65c9339182645a09d883ae1d6d79703d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65c9339182645a09d883ae1d6d79703d_JaffaCakes118.html
-
Size
639B
-
MD5
65c9339182645a09d883ae1d6d79703d
-
SHA1
2df00f0fbd899d157bfe1581f1ff71acc94ed376
-
SHA256
900ee80f17b3d3a239c75d7102bbd859086ea57a6f1b74e5fe81c676dd7f8212
-
SHA512
c902b8aa1e70be1726a544340e999d8c2ceb363b511a17bdc38f618bb24456642eb1411207773d9d5c48c6271821eccdc7eedbc0915b57422e8cc058485e8b0a
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A3B418E1-17E7-11EF-A18A-FED6C5E8D4AB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422508779" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000e52e9978787dd46ba878bb087a4204373b90bce6488a963d576ee2785171e506000000000e80000000020000200000004d4b0acd45531d02a95fca8b306711e6a62d9580f3e171d17ee9917003da12b4200000009aa0a315dcc94a913c16d6ab5b52a3423493de205a6b6152555c41d0cea2f7ff400000008f93b8f66f65023ee4341a2d3769ab90ab7b293f86ce310060127129df6e63ef256cbfd8e150cfbdd394345a8dba425e68c7041f1c57a1fc51c3a76a56938c32 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0b12667f4abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2208 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2208 iexplore.exe 2208 iexplore.exe 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2208 wrote to memory of 2604 2208 iexplore.exe IEXPLORE.EXE PID 2208 wrote to memory of 2604 2208 iexplore.exe IEXPLORE.EXE PID 2208 wrote to memory of 2604 2208 iexplore.exe IEXPLORE.EXE PID 2208 wrote to memory of 2604 2208 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65c9339182645a09d883ae1d6d79703d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2208 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588a1b1a4107460a533c9deac116bf4fc
SHA1b0da1bfa952a7654477213c85b8a66f1af59d3ec
SHA256e9d31b14dded199a32be3417adc3d5e51f8b809e0e6c27a5ef80919cfa61213f
SHA5121a2930cb5bb01a0c27a089b7121f6f94812ac3b86ad1c0eab231b420b5b4a038c8522c2556b3b3b0ea9af31214a825ee45dd035450f1995fbc30e4aa617f2fab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df73aad82b878d9662a2c55b4c174d4a
SHA1b70695984fe9eeeafee2f1a35e2a1bd346a28555
SHA256fc43379e1b59da3f75a769e3a33a25bf7feb651690965419d88e5407809ff359
SHA5122a564976eb82be7afbfac08505f32eb28bf7d753ace9fe1e1c8d0b529c5c8f95a9caf076f42d160e183fbf5e7f199d5476a5336cff5348f21654761cb7941f27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3d090f49d161f6d8e9a12359706b02c
SHA172de2aca7f08dc84f01aeeacf9992e2768119980
SHA25605b84d104b8da89b9ebfeb5352a34ab0fb53774af7da48f0007246cfb2b622e5
SHA5126ac5d6a44d61bc3f1fa298a9009a2b864851c3365b25b0469fb8f311f6258259b703836bbe7c4b6535bc02af03af8b4ce807ce8b08a8e23a25671c0d78f76cc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e733e30570c8fb39af64e37e0702b5a
SHA1387b17c32ceeaa266883f22c056a8742b93fb522
SHA25664fa0b8fe281c450c8376e74999b05f2fc2a079b7d598776b8f7e24f18ddf94d
SHA51280daf78eaa2fed4c9a6cc6bac18795f0f8a4e5e03b3eb01d0fc07361fdde152e6a37739c6243963db0d57db7bd857d5cda051941e5dfe24432672c3628f0d1de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf0c74db1f4be7609cc4451c3b678c10
SHA159e7e63ead5e4333df69b413428383048532638a
SHA2562fdb1a5e08d312e6e32965a1db493915a7db0a5541ab5c4f76da9c4a9ed6697f
SHA512e92354fed63ed669c4acd67683fc36f6daf4093170059e13ba2aadfe1a69d285376f34fb578c2deb0f7ed8bae33a21482a3b19399a4fc6579038980a850fb33d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59779f46eb13a2a731537c677603b46f9
SHA13753e51f2de7ae7f98f1292733b948f9a094cd58
SHA25687d7341622c15a47e521a670f27ccdf3f81b28e6dc4163c5b9210562e59a7de1
SHA512aa8342be8ebb87ade8eb036eef13eaf53673f4f3acd40e613696b1924475f67f60526777e9e2cc69d5bf75754b2da1ef912fd9a0328951cef6679765cef72ead
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8beea8de8d53129b135d76f3d68d334
SHA1c8f1fbf62f102509cd621e2212a5eb7229c6869b
SHA256ccf77c278b2c0e899eafab687c5e9f1810939879a3e346183a0043d840374ce4
SHA51295b9d2db4bad1e45bccbd95f80d13feb4b4d3e1293b05c8d81c3651bc68a3aa57150abf30cb640dc29a07b7f2e8007e123c92d42dfd8cb56cd9393833051faef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5549588f6e1bed3b107fa6fa066339952
SHA1ea17f91463c1f3d288a9fd104fb008a3552d2174
SHA256ffaede4c828af9c7fa11501aab52a4520985525bdd81d26fc37b52585a4feac0
SHA512728317a2f2694dfe38cc563a29055bca57006c13a2315d04aaefdf4ffc9ac8bdf71296263234149a98e6486f074f738e2c90c1e9cd31b2710a2b389ff59dd51d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac7bf9adbc71561d7eaeda3367f81df6
SHA1bfceacf9944c4535e3951867048cf6a22b1bc11c
SHA2567ab489ec4c65c012dbf9df39eb02abd2e20cd26bd03b32b04bdcdaa249bfc80d
SHA51202cf8fad4d767b47959bb4f880058f457e12e9dabc63d6b2d100146fc07c7dfb14e605676a3ab978a36ecb9e105cfd999f925e48ccaf1c62eead8b8590ea923e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6da08fca27e484b921546c7a5bb8b0e
SHA1f2a3cf73fbff66a6a73bc62f480fc0b61c548cf3
SHA25608567f50fc36ed3375a7d2278bfcdff67a2b7b7ed1a68c90647b92c0b7ae8037
SHA512a13898830e3df45daadb8aa17164fb3907985c51eb264c6368676325b8354424d56ecdc495bd4095cd1f0ce1b5b8aea77d073192e472afcdc656872d836ba63a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a69a64d55b6b9cba3afd84da09b1d9c7
SHA1ae166102433f4047214f05e014ed5cfb128e74a4
SHA256cbf3b365c30188bc907080b869cb2fbc7d07aafb115dbadf6f2abccfc1a9db87
SHA512cb733d89cad99192226075e31d433d1de2639060069e6b8a72560c376c02009e9b514bd65c3e0bd92601dd435dd9bf44016f7c954b041f85af2a2caaf91ee6b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e862c0c371d5527d7005aec57d69e12
SHA1a948d3847b5ac8505a0439dd975ef271b7b2162d
SHA2568b980bdbb5bd2167d2db62790f90b1a5d4564c8c0ef0090d002fec332dff7e36
SHA51277e1d7b1bd0f37117132b31e403de1c41953fb67b9dbc7aedcfabdb98c3869f95b50a7d46de8eb47c9d86b871e87b480fc12de42344d3de693cf4a4ff7042c24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5a7dd49ce7b6ec0866893bcc72fd1d8
SHA1d4a0658613ae6f93796d99d74cb9797cea19f6a0
SHA2562fb05da8b2853acf53f21858bbaf2d951b423e8574e49e9ceb77f8b511fe86e7
SHA512c534a833651388cc0ea2551a0fbb3cac3d6389dcbdf074e81a688078bba55dd05126e48206c4d3737839c71ad0b5ed1a51bb2cbcdac2b4b99779a7676241c5bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2ac369c0c669f690b8eb6ac6848ac68
SHA1f2054ab276ec7f9056939cf7d63164ef92317526
SHA256168515e07f61c5ff5ee2cea3d08610fb435bd049f10617122be700af96e802b3
SHA5128dd55731fc223d6ffb18fac31057bb14afbb8939a115fdcb4135f3ee33deb5d757a34086e55f6ded0c12281f794df90c7f7fc30e07f1358161236bc86b8d4478
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562bf3922298f6c9de00f28eb373cd36c
SHA10d3e0dbd898430a061af469cb67f15946c956479
SHA256872b74b57e4bb89616af634fdb57945ba2d3dae04795dc18e3f35590dada836d
SHA512881e753672a6d87185e7eb426a8f2859554f9642b6ae07874864cb1eda544c7ab8039e60cb21732e634c2881d9fbdea6a87d5d757a1ebe4ed73209ba1323693f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56737ab48eace990cef1abfac04bdded4
SHA1bfba703e9ab51685f2dfee6462ea343232a71bea
SHA25636ab5e8b109a0594e8fdfcd41b6d99021aff50acbcf975960598d792b2b5e3e4
SHA512effc651e392f15c78160132f5de67ad7d2bd44109de07425a124904f3b4605dc73f4139a44d36b84d8277df1c04180502468f4e3735645b187a7d290402a5476
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ffc0ff8048d53b260800c2491df5081
SHA18db760ff70260460ffe8011aeef3b7b5a66aa4c6
SHA25659def4acda8a5d3d06ee71df86386483b6e7664c14b704a1634a9c788e511f2e
SHA512b43451674718c25416eedfa4f7297080de8e08b9d8848b65c60239ba8543856f0856c37ba7b16881003bc208810bae3374072bb4569f3cfc12a11089e6d8ea02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5377f4f8af724fe54c05c858e9d9371a9
SHA13ab235785987c32612119383ea78628bc7aeb325
SHA2567474df4b10360ae26b7aa56d8bd121a325eb3160355a2f60481c5093a9e52fbe
SHA512ea47079d909e879f3249aa05e0c09f913017e3c62cc56ab1966096a7b1a3ca51946b69d85152e8345608a74732c30cf2117a0e0aaadd15a38c94c0d0d12c5df4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5540f578be72eda9180f5f3e3668c26ae
SHA13f23d53dc4733f434b57a182f1b9b563d139b518
SHA25631170ddd17af146a13de79608d9f94c897f77842e082df0023021ccead4e07af
SHA5129297f09e89a760e1db4a45069635b00aa55b16163f8d92fdb65d0053099e4d752fd936ef32c7ebe1156583a4ea10e435a83289c3a6dcffb0c0610e38c60adb8a
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a