Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:11
Static task
static1
Behavioral task
behavioral1
Sample
65cf9de38280f3ba8e869b56ddfa6042_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65cf9de38280f3ba8e869b56ddfa6042_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65cf9de38280f3ba8e869b56ddfa6042_JaffaCakes118.html
-
Size
158KB
-
MD5
65cf9de38280f3ba8e869b56ddfa6042
-
SHA1
0f1caa3e0056d7f5a8d9627d1fecdf054d3ada1b
-
SHA256
377a07ccd7da1c295154974a8a2609f35c64c3be4405f5c74875edeb62392fbf
-
SHA512
e6703a5a0093b9462cdddb3ffecc670d8d4ec69febd75aba3972d71b678983fefd69c3da60ac870412e40f03c39607f33b85c14d6b7b3301e3031fcb0d414c55
-
SSDEEP
3072:SpSlrtNEHyj5QwZ2JbhGmAZ6qh8DJ4uZrqFEJ5a9DZAs8Kp1FAmtp5ggj3Q09+N9:SpqrtNEHyj5QwZ2JbhGmAZ6qh8V4uZr3
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422509341" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000078e657b3c97c3de7a2eeee9225200cfa89220abea9b7851afd73a6c307698a05000000000e800000000200002000000086bec234b0956e7148c09c4ea3d84fe05c120ce7f1897deab0bde9625ef32e772000000006823546aeccc27c7da8e6f664a9036da5b1730b62cf87c002683feb0efbdf9f400000007de8f8e9ef6f83bd2dbb3f510a00cc6bae1cdf98654cbb5065ba89bfca6eee65202cdddfbbd7e7692305014094a91e0824c819b19de6ba4a04292c7320459941 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0c89cf9f5abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F2ACA921-17E8-11EF-B97B-5630532AF2EE} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1716 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1716 iexplore.exe 1716 iexplore.exe 2196 IEXPLORE.EXE 2196 IEXPLORE.EXE 2196 IEXPLORE.EXE 2196 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1716 wrote to memory of 2196 1716 iexplore.exe IEXPLORE.EXE PID 1716 wrote to memory of 2196 1716 iexplore.exe IEXPLORE.EXE PID 1716 wrote to memory of 2196 1716 iexplore.exe IEXPLORE.EXE PID 1716 wrote to memory of 2196 1716 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65cf9de38280f3ba8e869b56ddfa6042_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1716 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1fceea4956ce6561c6b3403aa0cf4e0
SHA1a64ffde931db5c2663916c3808869b42638892eb
SHA25637b854b2843e09b5694ba38bb9024f8bcb12c6f5d37675560bdfa331be9ec470
SHA51242820477b1aea3f8886d696ec36efe8cc02e3de9748caff67b7150a7fc9a1b8945a54d59a529aa46afed3cf901eea6c9b1acf048775309579389b5c530c66fc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eabee895b8d58113b1c833d2e3dfc750
SHA1bb28806d55ac5c27977a54cee42a5ee64225e0c8
SHA256d3c0e7add318751ccbbc8319bb6ddba9782a19901ddf9ce0e360280a611e22f8
SHA512f49b8680c1dc8602f9d391dab43209b08001465d5d64205dfc47255523c15e1519a6c127ae650415921a6e1f2c39f3ea9c9c079b5c116bdc28ef97032196e8c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9b9de51168fdb9e3b5fff573ca6d175
SHA17eb68dce335b3a5d426315be6ac9d9186d485c26
SHA25635b6897d224d1e92adb1b4fabd26fcd9f63040c0399eb07275ad6b42cadf3424
SHA5124f2ef52aa40853a34a40809e6d7417e8284172e23b9e8c7f2b3af08225ea7c69b648a98e71b4f46fd4350568b698e221b2691d208125cce178ad69940ca2ffe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558894c2cfcc0530a0251d1b02c4c6694
SHA192580ad6f9b3643a02aa10dff5bf49ce070040bb
SHA2569d88311e48c75980fe6c41b72c88135c47cf5491becfec4339decab097aad622
SHA512ef70ab2e6eade4fb1a8cdfafe8a17b55291ee51f5318fb2e932b6280b171dc70d2cea88bc12d5b87150d410cafbcc6830b3e5de9dabe5bc505ddf42687f91876
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f5f9dd8f78077828172ad3bcda0fa18
SHA1c3dda0e6195c4b772a5af76f4d7aa52e51e48f91
SHA256ba2a2f8ecb054559efb9c310f4d7d0b8be976d3ec667f8cfa042a4d9e4d98eaf
SHA512266723f56f48f5e3d771f1dee42597d4b72829840805f6cde244026f535d3138a1ce071cd24f0eba67e770b50f5691caeed538c453642f29ba0c5ce5aa9ba03a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7b692ef08f6a788cc42b677705d0839
SHA1d077036b8000bd281fd97b6aeb7e13a2f1cc7b6f
SHA256c1c7c805916d8d7a5a43ec25b919065b7dddb1734e6714b12e6c4a3879a04ef5
SHA512daa9df55c042f1fb0361f8aa6964cec2c8442adf798e71a79eb16cf68dae7dc4c34ddbaafdba5e0a4c90d9e0ba8fa60af98354f78fd97b6b040f611e72898cfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59754f8a286187dee52435b041cef8042
SHA120748af5b0f7e51a22b227cc6d511db4cf975a98
SHA25638b51261e69fb9fadb7535c06dc06d200b1eb3c39685a5cf6f5284d038bc939c
SHA512abd055c31a09d2507da3d1dc2659352a624a7da06c8acdebcb738404faee16c260aacb4df59bd3dfae5a3413c243c15f2714558c6ce87310748c02094efb4952
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514c0ea5b43b5cd6aad41c1e5702b1637
SHA14d9dee1f1f85a343f4ec9746bb74376dbe40bc8f
SHA256616ff410fb35154ff39d9f0a00882498615406ce2f05167afe3ebd281e7c3aea
SHA5121394390643b6f566f36b821708fd19610663e196b93dc7d714719601abb3a96d64e8e12ba121bb840dd28faa2830fbb0fc6c260f5a242db7726c4fb47bbcb6eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540e09c23742379add6287172bfbd0ea7
SHA1e0f266b73ffde341c6145c4d21df599dfd97951a
SHA2562865333dbd121d25fff2bac4873ac8e12f9135560463d73fc79844c4300a612d
SHA51220b488f041e59d7b8af62b7d75c2971e121bda4732cb487e0a8e1fb6c8138ee14d99cfdf5fa19d96449a620f221c52b60ac22cf5da99d5bc81639c8049111870
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e47ce106a9035110616d160931e7384d
SHA15eb73b8114f8b78bcf63337727a3b64e4af496e4
SHA256e3e13f0eb929f7caf057f71145a16aedde3c3654637efc6e9410535f63aa10ea
SHA5127fa92b3087ebdf603723f31af73cb77b8add074b9cf8e927c8ba53c2adea0b68ebe312039f5aa188752380a244743aaaa4cea8aa2b5afcd9cbe7b6b3e3b68bd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5beef35ead1db5e9dc727bc5e3eb78e7b
SHA1ffba08995cdff2f39e61fbaa4969484fe4124257
SHA256d09d64bfde2442268bbae51a4083f010998d18306830c993016a952f882ef343
SHA5120416f2fdebf07fbc76ef6e72c926c595f100f166033872282d510172bf4da814abf0020504e5c6466721ac79ee449dfc6582467c13cde7d0c1ebc06bd61cd04e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fd3ae3f8328ac0944a861fef93b1d92
SHA1c5138e14cb7524a1d561a6c4852b3d300d5fa6e0
SHA256a2515eb4afb77cc5e57e89b89411eacff19bb579c7834f8112242ed7321d3a90
SHA512550cc68984518601504c6fb6bb5bb490c036106601998b8e975eae5e64c6c1a10e1e7aaebce7ff28b514de850beba5f2aa2eff1bc2368be671b0b3ebeb0cacb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b9515312ca19b41e17fd94fea26fd12
SHA18a568792b4acbbb57c4888b3d33d199a42d4f8b9
SHA256b964f059e7e0f0baae397aa0e899af2f4a081e16d526d88e4685f2e755f186c9
SHA51201095cf14c5b8a7bd252fde70f5e8d402e9e756badb4c9eeabffc3fef632b34f9e2c18c3f3fb61999f436d3821df7d968d6105ed7543459801a895362bf0d16f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fe8ebd2b99e99371c893e72f91970a4
SHA10474566d9555a1f7c172c0137d435d62c2effe13
SHA256b277fa8a72028384908dfd1fbdfc0d714dd1093a8ea1b4d2998ec7a55b04c3c1
SHA512b314d002e33041a1003222e06ba71cbbe828b4e390e59cfd9ae7e8fdd88a2d137a8e8cf8716ed84a5d6e509650f2352a1d3197e972652b8ccf7cb2062b6f0f4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fd87a8bead36da1dade44013ead83e2
SHA13c053e57ab4b0d018e35502b897a8f616656a522
SHA2561929a15ac09455faa811b4c2509f07b0218699d771328c58bd46999b6977ce49
SHA512409698da2caa03021e393110abea990d59c8727e7ad405efe735df8e6d59dbab8747b16b0f1660fc88a339e007353ab87ade56c9bca68e88f46a6410f8cb8379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d88ee54a0a7341c7077571e000c078ef
SHA11f3e6f5d40e3c74d6c4c58cfaf409894494d3ce7
SHA2560eb8c082f082122cb2e07c18b9f0c79cef86751fa1de1da950065d019a6432b5
SHA512212affe7ece4fbd083938299bd910325dd2d8d9c149fbcf4b68cd230f8766cbaf107bb0f827686ae62dbf25d7fbd6b0557213e209be7c4e9eed7672be8f4892e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5039f6704152c136ca04b9066e03e9a0a
SHA1b6f1b38831dfa566e8fb9dff818dd2dc28fcf880
SHA25677fc616368f99ce173b3be032a0282c72ad7997660b0b2e1c96102cd29e8e1c7
SHA51206855e2194f885fb5a9d8c6844d93f76bf756b2875c316da7c43525a24833da7e41c4c6b0cc36b9e75c4af61db3333bda769f9920dac63151e33efc2e14a41b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597c86123fac75630ef55169455ec0462
SHA19c7397cf4a449388d8323170b32ff58733b8c4e7
SHA256784e9584ad71f864814d9388833672620f104ee6b6fdc06ed55f070ed30b314a
SHA5120822e0bc0d7a73cefd590ae5e521d086011622b9595acafc632e353ad7f21a6d21e5b6c07fa0aa9f1f329ba9e3c771594941ca50599d8ebc169f5c8e88122312
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a