Analysis
-
max time kernel
137s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:11
Static task
static1
Behavioral task
behavioral1
Sample
65cf42905e99bee5904c83be5e7394c7_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
65cf42905e99bee5904c83be5e7394c7_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65cf42905e99bee5904c83be5e7394c7_JaffaCakes118.html
-
Size
19KB
-
MD5
65cf42905e99bee5904c83be5e7394c7
-
SHA1
528d04c3b575435d3f1616d5a73bada6536dff14
-
SHA256
ecc1699ef21d23087e598f35c4324fac04f68478717a595c74da52cd5f8b7b20
-
SHA512
08ee294488baa945fb1fff0bbfb4701f69d80c30ad5017d6a8cf55c81304a13e47b1b0116bf00a6b7088be10327b69140da6f513d988fbb6bea648c9759bcc72
-
SSDEEP
384:zi9KhgESVVBD8c+Q3R3WF/lxJzemLEXucfIk9xhedpzVc9Gm:ziOSVgcR350gmFOIk9edhqGm
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422509330" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000d3eba5ce5df0d6d90cf9ca3b859c8de4ffd8d8f2c2f89e73bb7933d166b9bf2c000000000e8000000002000020000000a22ce79530b7ad23d77da644c8a69f836d5da1fc3719fece45fdf3288b6556f020000000c69b30a5850852e81837b37cf70561d6f927d1ed95544fc3d20947ece71a17bf40000000372d2306a5aabab111c7c8a983d964c31c85a44521ae001888bb6265365972221faea9620372509c4f88e8ee47a2e56e91f882979362dd3f0ee1d9c286e6efa7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0f515c1f5abda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EC2405D1-17E8-11EF-B944-E2C1BAF7F8C9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1996 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1996 iexplore.exe 1996 iexplore.exe 1684 IEXPLORE.EXE 1684 IEXPLORE.EXE 1684 IEXPLORE.EXE 1684 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1996 wrote to memory of 1684 1996 iexplore.exe IEXPLORE.EXE PID 1996 wrote to memory of 1684 1996 iexplore.exe IEXPLORE.EXE PID 1996 wrote to memory of 1684 1996 iexplore.exe IEXPLORE.EXE PID 1996 wrote to memory of 1684 1996 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65cf42905e99bee5904c83be5e7394c7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1996 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52cea562aa056ff9c580b847633ca94d2
SHA1e022ff760be7cbc4ce5e06573471d3fd1359b9de
SHA2562af952c56e4c4760037ed446992bf8208a0bcbcc558bff25c2e10bfaeec1f029
SHA51220c39d8bab9057289f95f63c88cb60315bbbf7177340b1c389c01049a1c9c918d929370f998a88c2808c41a1646b318200f4ac6910952d38362194e77b25c7a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52537bc4d75169b1832a992e886263160
SHA13e61bdccd77d4153049404601f7d74a5572cabc2
SHA2568bb8d88172f76ca0f6ab1f262be751f7bd6865c1061087099f6590b00011183b
SHA512e40b58e76dbaa795f26e48b1ba99a2a3329bd8db2d9822f8824ce376e58d46a6612d2cd52874c697664793c1888ccfdc8383e73716bf42927763cc9527445471
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5335aeb409773e6abe332c8cf011400
SHA1c97a5ee55a2114aa7f5233d8f82a970ae88b5445
SHA2566ae7305f30abf5b35c684b705b2b045695426081f6ad63a57e662d3135c26854
SHA5127da3f65b54fcaed5714c3c3c5b967a032ef527e0abd8a79ba4070706766a239f2f7f124512227de12b9c78d6503bc1bba09a565056b34df0b7cc08216a2bafc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586d0ff1685097858c6babe88f79b04da
SHA1defa58d85984a0eb50b3d608a9749059da87a345
SHA256ddaada95e6699bfb7884a16bfca456d66388d7e2fafbe1fdfb5092e36720e907
SHA5121409dd0a1a529046425a14d6a316f0ae88b5eb95fbab3ae8dd4b37fc38f73bdf7cb454f88705e70e8526da83694c10a5f378384ecd7a6ff0b1002ff0ee6f4b9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a08964d8bcd43608e300fa2c2d1b511c
SHA124783898a33dbcb2cc7cda9782be2b45d9cd3d2c
SHA256edca04fa103e1ba20d428858c9b3de73ea0e1c623fedc5ff51b8aa391474e06f
SHA5120d4b9e8c082164119a3d6e5cbfc58744096788e7550a7ab8f80d41aafbe5a0cf5552e7cebd657029411c1a437f8f5113256ae8ca0139b6d2c158c8bf1c655902
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d20537c664b83bd914e86503c32ad69
SHA194486f4d7ae9a3b2dc0c77343ddc6729bbc371d7
SHA256eb34ccce082fd7a143fdd97321143cfbb7f7ad21c175319dc27cbc3f652fb4c3
SHA5129be79a087c8eb67dfe3328bc415efc5422dac9480d1aff1fdc2badc67a19b39cb7ca52a3dac3149e02117d6f309f158daedd0be71bb2403b02e8b11818bf5aa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502a73f157681feada50f0704d99ee396
SHA1647d1ea5398686be022fe1254c4266627a687f78
SHA256778d0323e5a8688a7532b4f4f5ca4b7a40dbd61986b47ef0310daf45609cc633
SHA51200ebb925c020c7dc78ac2838ece325ff7e2db953b6dca892471839bd227f4f32b663dcea26b972e2c2e8028c5bc5f8245003856e18dce51e6aa6d50edcad426c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef32a476853e0c9595a2b58ec16bd0c7
SHA1343f9684759b459aca634e2784de6eb33159a25d
SHA2562d42c35f674b4730196f46cc85ae4cc9ce9c4ddea129650849082ae94c171644
SHA512f8eeda0479a0899e27f87639fc9a17f24910ae63e41697f6ce8bfd75f53ee3aaa30e293383655c46cf3e6fb2e06f58d8c865334b40e2eb009a1d78d58042ef6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f93eb1176661c0bd9c3a5490713d6b5f
SHA1b7b35d0a2e70c3a7e3664af945b387c85ed0d3bb
SHA2563b1a79b151769a95ccfbe817847735dc6b1e2e983c4a8d0fbd964003b8c05ab9
SHA512719c1928065e1aa850562a337e4766e7cc2d8d05d7be4faa8c00377dc56e62e3135725e54dfc811e2f517a03a8e265ce89423fb9ae65e3943859402b8e99f484
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569a5991a71109ae5bf8ed079b922e824
SHA1015b8e0c80d10532c2b41dc6bb822976e8071be3
SHA256b832682fb016348d83972ce0f01b2a50f92dc72c61c521b0caf3d1ef2b808995
SHA51200df8df6a66f5642c9d33830258a220780ecfb323e9499944828ff5124156d3f94f2208311cddfc5ae325bf7eacc70c8c4f8342923132eb676904bd4a55f53e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5210b50f3ee0965cbc2daf85a295724fb
SHA1693c5759e3a48c0f3b4e4546fb4077211bdbbb7f
SHA256eb56a8eddbcbc1629bd0911f0293eeb6941d842fd681d23535a5f6b10b54df56
SHA5128a99086a9a7cb0312399721cbfb5414900389977d3def54c0067f0bd3bcaced5fd5b79b0eb88439204c1e37941d35aadbd099f011cff4ac84cce523672eacbd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c5c3fba9f34ba40212f54b389f9237e
SHA12f8c77d0a60fc4905430942b292813035f82f8dd
SHA25669deb949a23a15351cb70d405be779c7af079b82fe5c4984dd20b3a00b32f131
SHA512aced4004a81b7f2cde24e188d87c388bb9e9c1cc7aecd9c430b6f47991dd7eecb107a78679d21cca231ab806a0defe42ac2b55e22447b8da5499b9a980e556eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea19244623d1fb4a88a737c2d74861af
SHA10ef02254dc3017e7b059710312477fef66b70d6c
SHA2568b22057be036482cc17d86da368be8aee45a5361b511a6418b714add82984026
SHA5120d933fac7799192279b038e4cdcf1c7a657509f831bedc2eade85de02e879651a2bfc67d4cdb3d9d0c029bf33ebdba8385a47f3d1cc3221da2ee7d63f43c8af3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fb4e0ccc5c03fb118d48498637b2e2f
SHA10e52b7b6156775e455a481801717b607aff7eb4a
SHA25624d5dc2c63a74d6b318826fc774a8ae7e5b7bf7dd3e3bd1a77aeb6026656c604
SHA512b7f279d0908b0b921e57fa8193dac79030415592aee3fd9fe6dc516c303c74c14283a54aa14092c218957cfc5c665d1c8cc4870fb63a7f11d4f4aa94df0fff54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa4d51f3f53315c7a391df048f46f372
SHA103b082f863e7851dedda405eb38b8bcd46aaa9c2
SHA256656d040bdf9e5852541063473fe22c5f79427b0affcdf3bd1df00ceea8dd1fcd
SHA512184fd5c47c5b5997c8958666b4025a736123675db0e961b1b24ee0d751ce2fb414ef84fc5d7419b0eb66429a80894bef8a5d140b6743b0cb336a4fc35a254e8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59afc20a90b62de32ae5332d2886ac8bb
SHA1d67ccb36f87d3dde306bf5b3b3a8624a507615d5
SHA256c930ff7fcc328077932508d199ca8be841df9cb6f0323749bb7ef79433ff4546
SHA51290927a12e4363287ab3f45dca70c9b156b1ae17ff6c7beedb4419a705336b79c168ebaf9099a584d90ad489cf9cc86d48bda28a4568230cfb7155098ff52c4ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56779c9a42b0591702488d8afafc92494
SHA1e9f4de2b5a7acf1dd2f8b5e0c20cfb5abe0615df
SHA256b2261b033f3ae78dda76eafca723290f2c420949aa7f7131ab9703e8a0c58b3f
SHA512a23594c2ba71ed0a5f2018642feebe8a575b5b2f903c81743d948d072537fc0c737dbcb19a3a35005426f453296e359da83d2c92607358161e2875f38711f634
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b1ce6b6f5ff6207a48b3ab046e826a3
SHA193d3b059f1bfb58d1215ce17be3e094564f2dd86
SHA2560bb5c0c8c75ef04f6a60a341e211bea002a179330b88cfaf67c3cb3e851ebfc6
SHA512fc1ac4bb4ec24aa6cb1db6e4d1914ba735ac6c421da14e738634956b85f64fffa25a5b227544c9208d7d74a8e2da2aba3e5ba75ecd5826d90c6d50bcdfc20c6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d18db0d22727c5bfc5254e21f40a13e8
SHA1208e32cb62d8c1f70b4b21123ab7de87e9114388
SHA256c6b8cf4e2382baad17f8e3b3fcc283305215c16dc68ceb53d5814463f8cbee3c
SHA51234a1c527166eefca03adb5af0f47c7d479b2ba2d81467cd973b3fb4b68592cc4df5378f4d760c5707efcfcbfcb0358024d1b874185b2d1331ef629930b95a387
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a