Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:08
Static task
static1
Behavioral task
behavioral1
Sample
65cd229afda8e8df13dc893657c8237c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65cd229afda8e8df13dc893657c8237c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65cd229afda8e8df13dc893657c8237c_JaffaCakes118.html
-
Size
68KB
-
MD5
65cd229afda8e8df13dc893657c8237c
-
SHA1
edc0e4adc4fb92413b1ea919fd9f56cade78cd17
-
SHA256
10eb17d34613913905bd0ff92eeba5cbace4501417dafd1834d83d1de5a19581
-
SHA512
11999e5fbca3815021e0c4f27d1d3eeae2d50a28daa6e05d3e3acc9bd6b9dc79b7ef03bb646323fdb8b68abf0d94d44b2293453781777952e4ae0a22ff266a78
-
SSDEEP
768:JiugcMiR3sI2PDDnX0g6E4ZmnhmUoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:JwjgpTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f064ea56f5abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e7fafb795261bc46af92ed860210e060000000000200000000001066000000010000200000001bea87e47c516932f223bac9d6e009cb6e8c9425c856b6c3caf864e13e2a6779000000000e8000000002000020000000a397981d33863dd5c7b663145054cc605cb12aafdc4d4723a7a09ae004ca6eac200000004def66aeb66ecd3750f9c67243e80538dc00cf8694b40f89e66dd671aaa4334f400000007607850f69b8f93c7c8844ed242f13fc4a6b01975b2d7675f1d692ca8b24bd70d1fc5348b90f8399ced4b4aa475b7af6a75e9008c4975cadfb5eb3334766c8cc iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422509153" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{820F0A51-17E8-11EF-B85E-52C7B7C5B073} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 112 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 112 iexplore.exe 112 iexplore.exe 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 112 wrote to memory of 2476 112 iexplore.exe IEXPLORE.EXE PID 112 wrote to memory of 2476 112 iexplore.exe IEXPLORE.EXE PID 112 wrote to memory of 2476 112 iexplore.exe IEXPLORE.EXE PID 112 wrote to memory of 2476 112 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65cd229afda8e8df13dc893657c8237c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:112 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583300fd158ffa299e0b8e1b613a06f54
SHA1d3718ab6466e6394cb852fd7aa15093df4c25481
SHA25643e28a9b193ba0076a32f1483b3207181ddd4e1ab8bc9a745bda96d8a8655066
SHA512fad37d2e8c7575c37046744d7d95af4939ffb754c798aa762b5f713735010de1fa1f757c6d5c8caabe2ddf7fa04bcc66bafa64fb5dc5513e8f3f1445f5355d39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ee8cbb666c80a0638625aeed321d56d
SHA1f5632395f265bbc38e0dab679282cf9f3148e1d3
SHA2564d89de69942f2a92db5e8a9fe5e60d825c0f8a58c9ef48e011ff7f9400cc35a0
SHA51210b5a3553fad86cd22c05526766fcc0b1aca36fbad0b65c1eab240f130a1b348d6c76f7334742d4e8a922dcb95f7434e9d2700e26199b8d0dfeeaecf390140db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5689ed1a9ec21669bc6e9975c95306e63
SHA1ac805348202292ff9921540d36ceb3fb51d4f9c0
SHA25643339c20ef51eeb05d19d948e04ebd9179047775d85b080abeb33c6b96b65c50
SHA512d630d5d3ae5d56c2ec53b5b6ded996367f21557463b53e333e0ebf4b89f8952693cd1eea490731bfb7e4b6c3f7753838bad880851fcb0b20c38489d84ced4599
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f25f3695790675fd532cd095385bb15
SHA158d6d2b59872a97c375b5035cd781ce7eb3e4c05
SHA256862e23e30284b7dc5a8c3531c0cf6c18689ca224c15fdafc8183075cc62d2d09
SHA512c7222dd1379f577da7fb28c2ed812591a134c7d2c05271f02a045d76d3b1b9a021989f7da94356e000c6dbdbe781b3feca93140b8db2710f543bb62e0c24f294
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d42613074a9261f1fe9e63ac848c12a7
SHA1e18888b5e790101550a9639f6d58b4c39e6a136d
SHA256f776068aba0f653ed27b63ff37771604f34c35c0ae1b892101f2655e7eefc399
SHA5125dbf4868900de6fc7a55cc9d21a9b35205f1610c56231ea0d131c556e61854b9f65fb87cf72de81fee1f56c76c31746b30b13d4ff3a0012bd45fd0b246402d6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ed3451c4b881fbaa7be358da300215a
SHA129c13c2ccfdfce8406ce6141045b85a5571266bc
SHA2565075c73070261c56cd21dbe140ebe88d176700b023dcf971749952130b825d26
SHA5121cb926e554e91d8014b1373077d6e932d5af0ee45dae0910662ea31abf77f1287eb09aae2a1d5e0834ed7ab242eeee2f8676067451d49a6ab18ba589555e469e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569f5235782820a23014707e7d95ae739
SHA194b950074d4ec89da979e38e6da2305de385c425
SHA256307d9ed609d9d0581eb6f7d35e9189bff4e3a1aa768a208bba2eba2b400f4de5
SHA512cbea44bff75f8c85d175e59fd6a99c468224dba871ef779995eec2ac8749c8d8d740643c09eb5c8773e344a742a582a07a1f0449457188f7fe4f8d01d893317e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a9838d8ccbac154d12e351a1758daf3
SHA14009c998d341c02572a5dd96c61b9ab21f2e146b
SHA256208c47e5a7cf5771087f329b2c712f7f01fe1aa4bd99ab83562fcae30bc5cc84
SHA51282cbaecc9a9c63488db7e93ce7b3b9d08a3430fb0f7ed86d93d14ddc4d005193207996fd0fda51291a03fca2d7ffbf95be7daaf1cd1c3955eaf0bded47856155
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542329e4f3e26193469fabbc7b6820093
SHA174bbf098c73a9ccfcc2d20ca738e435d4ee8fc82
SHA2561e8a4e4ce3fa41fdf39e8667c3fea88bf40fdf81fec289f7029931a3416d562a
SHA512236b3274bf23d471b336b61497e5d229c103ddcb151d210501b57c0f5433bd57bb373681dcdf4b18bb31dd615e30087ccfb60b1f739699ea26d300108374f26f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d81ed733d7e59817bad53689b023366e
SHA18ad744a319746c4226cf0c27280fdc7b6838499d
SHA25673cd6dc0ac50af445c70f7a41f78ae617cc661bd43550cd87d3db7531b9877f0
SHA5124ee79a3df116bc54bfdc31ca5f8db96051e43d691b46946c3b2df42ce5d4cdfe198f005264ff59d5ec26b8c703c15548fdf8cfa49e0376cf43a65214d69aa742
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58762f58b38884d8ab79062f463c031e2
SHA13a604c94b2b6622d0904a5cb46daa28426efe04f
SHA25601915f75fe953c38ead35a1687614642f43cca1122fc85dc1d8ca793aab67136
SHA51229cead04cc90407ea2ed0e836dbf753f86a4334046e8b79f672eb1e1a48faa1f68477287e08c17fafaf6be64ee9f62305dfe197818d23d3812fba12a9c3d207c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535c5604df67196a46de0af8c430c2f1d
SHA14e7365663691764e2bc2ed01609b72f2e0e6b3e9
SHA2561fab0d2e67d1532ef65b47ad5cd5118fbae6f81c67bae7ab462be330dcf46e4f
SHA5120f73329a8a4cc7348a3748161a80dbf4e6fefa6e78921f10a73cf54b0ea6d35735e16fb87e48583fa0f2492224849975679aa1ee3e72f7edac6dceba1125be96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd11d8a8565ae783933f747ce9d4a78f
SHA1425bd39c6f6b5ad0f08725800a0ede4347a7aee2
SHA25633e5640608763ca6164428bf9a36b05f4d0c61a2688cf70fff509278fe969cd3
SHA512ade493c377f8df01fae8e2f165bfed171fc565a52552ea39eae2a93353592722f597fed580b96557d9145b3603b3b0c577718c8f9120d6cd9cbc563d2ee1193d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff01ab821db9dbe66755c1499480a098
SHA16005661361b42257800649731a5bf614b249fa9c
SHA2560a9b8a5241a91f3c157d0d3d71549559922be207786c3c681db3587f9aeb970e
SHA512ce1609d9d44609a60089be20df374ab9a852ab58c3355df04b1dc82647b64f683a9c74dd32cd255cbe057f1d22ebf1391790b1a9c8cacc4b02a4a31b56acbd8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cc3560bfd207e33d5a9f2a4f8c28ff3
SHA127b3f8a77b9c6a0406b86d0229e10371f91038cf
SHA25628def33405e94da7784daafd9f143010c3317c71641ad494375c959e406b1823
SHA5127f28ef3ccae77aef0ee11760c1eeb08340bf32f99eebd74aec2a492de61c63852b726dd71815953e9405307ed6ac8060c9ef57f9ede2cce328d5bf28f68993a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54584465e149468049df3bb00c100f9ca
SHA11585fc8124dfc40a3b2a2ddd9aa0dc2e427572ba
SHA256c1142f582f6a1bcb373fda6ca15a89f9bd6231e66436dc58feb2196ca097b7f9
SHA512d14084dd3941358d74d8d4982bba72c75b6e3ae1768cb562dd638289c8806f7deb864bcd01562dff6f03a7fcc24f9328efcd2bd355c941f20c1c261bf8367c99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a46e45ba165cf185c4eaa93ddaba2e5
SHA1dcd8826ea197d08b6c76938dd76dbe283fef7562
SHA256c72438b940c843cf8d862ea4dada8801169a8828da3a8a668c73bc2b87855035
SHA512f5dbc470db0e2ddeebcd4ff899ce0756ca669e541969c9886aec818b21ce0fa87a6fa501f39e2699a9309de773301c5c7a606f4f2a62ac6f2c7ef2aaef6ce8ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500e44af1e7f6d8d495760ff7ce39a49e
SHA11abab1f93a497e731c80ef947a436103873d08fd
SHA2565fabf4b31004a7e5d6ec32f94162b9e755f43004ae594de4b98de2899b89cd18
SHA512835602283c1fd3d808467a295e1f2cd914cfdbfacd9aa0cd80bd2e87586bbaacc568f5aac84f036468e567bfdf1e8bea437757e00f93c1743cecd75be95f5e68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd3e8de6ebd878cbeff0fe86b12b6210
SHA1e40bdf995338abfb2cc493548ad78c47dd8f3c7c
SHA256df52ffb7cab4d387a08a9dfe21d502108539f84a7c6e6873e7a2a3f8aabed5c4
SHA5127eba2604f2ddb85d06b45e9f5d7adf9cba37439ae8eb5ea010593677eb6bdd8d56f5089338581268e6cd6938b26de365709ec603710ede3d86e81183b35f1e5f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a