Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:10
Static task
static1
Behavioral task
behavioral1
Sample
65cf25a670a5da295c9762bf614a19aa_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65cf25a670a5da295c9762bf614a19aa_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65cf25a670a5da295c9762bf614a19aa_JaffaCakes118.html
-
Size
67KB
-
MD5
65cf25a670a5da295c9762bf614a19aa
-
SHA1
2b3999a41d44b97a1dfe816a44eb53362ffea8fc
-
SHA256
2a6f6389ddfe7409d27b9f2c90e486b2261e807428981a30c77d7f065a06d4ae
-
SHA512
0fdf6ce34fbd2701be2def51609c35e8d5faca776ce8341c8b13090a1579e46e89a59ce5b96a7bad4809bbb37354448353c71ec1b35669ec056846fcd9e11c23
-
SSDEEP
768:JiygcMiR3sI2PDDnX0g6ArHV6oTyJewCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8sM:JizxTk0en0tbrga94hcuNnQC
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E2972B01-17E8-11EF-93CC-729E5AF85804} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422509315" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000089776e673964844785de67696301b4f900000000020000000000106600000001000020000000e4242b971a3d02b9522976681b1957db87bb214dfc18727b26de9d94e67b226a000000000e8000000002000020000000202f393edbf1e58b6fbc629b7817afc38d667e9680b1f65807d3c9d7711e56af20000000083890e86ebb12dfecb0434fab5b2a2badec48a11bf812bfcdcb9b162199359d400000009d6adbef4fe8bc9132a14a34ae29fe38eb77f2f6bff6a9f2e645d3384ab2dd5e64fb76ce982d8472cfa5a6843724810f688795e9cf2855fbb9f415792e04a6ea iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 002a55b7f5abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1800 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1800 iexplore.exe 1800 iexplore.exe 1048 IEXPLORE.EXE 1048 IEXPLORE.EXE 1048 IEXPLORE.EXE 1048 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1800 wrote to memory of 1048 1800 iexplore.exe IEXPLORE.EXE PID 1800 wrote to memory of 1048 1800 iexplore.exe IEXPLORE.EXE PID 1800 wrote to memory of 1048 1800 iexplore.exe IEXPLORE.EXE PID 1800 wrote to memory of 1048 1800 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65cf25a670a5da295c9762bf614a19aa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1800 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502c0b370d59589245c42c5375e412bc8
SHA1f9b9e1c328bc1e7a1ed9731963807f6d6a88db17
SHA2562e97b7a86fbeec6a18ba3ea51e13dba4ca9954baf61a6ca45596011ea5849564
SHA512ca57626537adcfd4f02f1c3a7d0790e15de6ad7bc99526b9f8a0e0f027b7731b7075b3193facdb6dd3412db8135668324123e438323faf98a13fe432e91b5ce6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df89f1b3921a7e121f92bcd6bdbd8c9f
SHA1f221edb10e2ace076017890fc6a6bee749a97154
SHA2565fae9612557e722e2bda2323e52385f2f023a8542b42b6b57378149834315cf1
SHA5125b0a95ad0882d3e97077f6a46c15e965b760b41cb242d4687ee7219902aef241e23da5c735505279140b299144a249e9e4f51d5387ea46b622bb580554809f39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da0ced948a366ff7b28de0655564860d
SHA1eb85595f6bec6c729a5f40ca67d70f046f3d25d2
SHA2563209e754be5d49d4054265426d4e09903de031c59a56b9f7ddc3f2c98f16fc53
SHA512dbd863bcda3fcddbcfe982ca2c8763b5a9c4f4e5f2d92797b7f6b9927f5f334ea94f3cb04b1797bf37d5d9c6c59db5f01593c0851bdbba9df2e32910854a0bee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f66af61a44767c2903f75fcc9280747f
SHA1fb4e62d36059b100dda06ec05a8bde49f0324509
SHA25681ed9f8bd43f97249a3f9a48dc2bb8a281240aeed44c6c5da09ef55cadb88dd0
SHA512854d1928783bca86060ed995a9d8f8af4f15e76bd493c7a36531a24d9689bf6df7cac3af6468cc60d81c46b39513ddc7b5c58cd0b66f9a966958a3ef4ff01cd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b339a5ee8ccc4fd1c0dd48affcbbd64
SHA110898155900723f67bf2cc937f5646453af13f73
SHA256556a7e54d305c23eed8245c4b1640de4b4610a2a2f3ccd0772c91cdc83deea97
SHA512139ea768fdb7f08bcd8039fb0c31a3fc0d13bc76dd6974cf043f662bea15c146c1c73c10df697aea25bd1bcf7d298a8c6d40ba9191c8e201b1a605cc67f2e7a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5536fecee0ec673dfbb23ee07503d09ce
SHA197c08f60a61460b0a19156673c754606616c9fc0
SHA25665cbda64e6cf2324b811273e2a27aab37b4d035df948ed148c0b8ac6d2ee990f
SHA512feeace2b01cf25b2c1b8d33605cdb19a3235f25bb2d7b05825e67f731c672f1d5c03f62ae3bb336e98aa9961c50f4b2024502bce103b287bf4d4fa91759e1559
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2cfd50076da1c39af6d8290f957b2a2
SHA16839cd74d7422c4566999dab5e10096f716665e3
SHA256440fbe6885c4df97e6f4cb1263e6afc9b2e7831928cfe0bbabb546ce6af4f86d
SHA512d8e6b892afce92eb94f701f4b6f5fcd73d5194269c7a9fbe22faa97318c0c07c0247633bc212b50d78828e4bd2e5f42b5ca3bf428a61b5f99315ea8c01a5f9aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585e83acdf955c87131cdf9726e28cc07
SHA1d6c0f57527a05f61f235a6fabcc8b84b495b2146
SHA256ebd9054b3c36f535cc28402bd866f6c742d2490b27f18fdc88ec79937aa76275
SHA512dd7021d18e4d6856b698b198365f579ca8efc42ffbdef13e4fe5ea4aa29eeef4a4880584576dc4f8dc29fe31789a62f822201834c2e3918fe7211f9d9f7650fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5370ecf942b92216097f8ae8b7533fcba
SHA13933c1bb20a1dd89f9edbb0490cba1c0d861ba7f
SHA25629b550852423d1c03898e8a40fe17a8253b8e222f237e1c031f8bc0ec98dcb2d
SHA512631664b60180dc784bdce92c4d96a8d11f89dc52a87abad16539bad3a6da39b68b0cb0119015d2c82bfd512c5f027035307e4aa37e3baf0bfe140d62c3823868
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e36f4171ea0f797f4d7b66e612add38c
SHA1efb434ea23a39e2d4dfde8b2bac3266e91f2eb78
SHA256dfe319a3d4295af98c2695279ed887cd755c9d2c16e506136140443b1ef48b07
SHA5126d4ebe1515ecc26de098f10c3a586a8f05296718c1302f141ce25b906a765bf54bbd7da1d7e4eaee192d42ed262dc41d935881f5a6686d99c19bc38c153fcb0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe1d2f1600ce3d2bb28604ab39af1773
SHA19f2bdf6c8caa7d05fc584c4fa8d846087ac7e6b8
SHA25622d2bf7b3a509d3f40fce62106b4671a57eb99d88d811a21d87cdacad6cc4db4
SHA512a186174f047784b520d608a2a97412c92cc800de9ebb95918db86485cb74f54311500b1ae4d74039e70e76741e56c97116da06604f2044daf122366333993d98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6ecfa45d1e4e1ea87d51a5af25edfac
SHA113f45f2f565b1cdf3523b8afb51856010c2da1b1
SHA25627360127e0e1f98ca17efcf034fd72707832791c585bac492942a68bfb548a5f
SHA5126fdb8f920c06c6229de0a9094b1598dcff66b60d50bd914f7f99cfa0a443b03ec7ebc8e81a18c222705eb29768c228eb72fe99e6cede1260081bb9b20dca081d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58722bf2c010f1e9d8f2079bf2539ca7a
SHA173d3b2e4f572161d281872bbacfb7fc660ecfdc4
SHA256c61bc884cdddba250237adfaceaaeceda8b3d928b8cf6be2010d5a5de3d94970
SHA5128244eb0aef2ffc2e33cd608afbf3e12f4198c915b289503d79e1d36981e9c5ebcfb9700eabc38edeb0486804fbe6a4efe7b2640d1b059e8b6616c7665b0625b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af0689de6790e84968faa9f26cdea4f4
SHA10e77ef91360651acb1fd368a7ef87303403c505f
SHA256d5acd58e71244bc6b9537d09feb96b92fa8f54b58138e8bf894aea19e123c6ca
SHA512a4c19bcf576503525baf53f94593d22b6a87a1d8a8d0bf0f445bb300bd48554a442ee0113e81aaabfe930a47bf8b13386567d2100d097ac5ce494e36b8ba5db1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598034364b9cac75115c0e4a1d272b11e
SHA1173368cdce7c0d32cc5aa0804261e7fcb1d5ccb7
SHA256da045d7203165093806f56b722d77528d7a03a5572ca3332223b05cc6d3db4ea
SHA51225b09b7a6e7ff114af4018ac14dc82e29da862ba0632ae085aae17a5b3513634d81b1801755f4b2519f66bf280788be1d5efe90e7548e31bcf45bc32300852a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5531db64126f66782d6439b92b7035ffc
SHA157a50e155c76d1cb85ee3ed014764bbdac5bf0db
SHA25691a9fca2e74065827b6cf2c41ff1a1fbc48b3ab0d58d062d4268d9e956fa32bb
SHA51204ab50b085678804d9d4239df7696e19031b79f97df4b003c7537d26855abebcbe8156dc095ea4ca7f87f07f8250cc8095cdc07404da8f8ce90c537135b360bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5169a15225fb9545824286c86ea99112d
SHA1cd9e29f7c8114526bf9e25844d03b307e707dde7
SHA2568e423127029330bdf38251c142db25c032935b22ca14d73b595dc27c14f7797a
SHA5123d10f7fbd5ef4abeda11bdb15ca0e1ffc9b128772c3b8ad7bee4a56e88a7b4baaf8f7bad77180eb8d9e16f5753f083957c1fd0eb99dfc3e4a0f3a14ac41fec09
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a