Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:15
Static task
static1
Behavioral task
behavioral1
Sample
65d21cb8c7c22e8fe93c99f40eae9cf5_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65d21cb8c7c22e8fe93c99f40eae9cf5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65d21cb8c7c22e8fe93c99f40eae9cf5_JaffaCakes118.html
-
Size
7KB
-
MD5
65d21cb8c7c22e8fe93c99f40eae9cf5
-
SHA1
0362ec45a2edd2cd5170b68aa8c4085ffc3fc152
-
SHA256
0042b2aae91d2631246341fbe6b31f6ae6f94a8cb25345252c30086e94b3bfc9
-
SHA512
380025c6407a9b3e826a2da8d580229a277af39134ee27adca11a3053c3f4848be7151cbecc34f26777d6269d6d06eeb91556a1e59b8b351b59a4ef4c0af45ca
-
SSDEEP
192:SIzPUTweRYI+b9nv0UYgCwavXR8MvXbqPgj7Qj+L:SIzPUTwEYI+b9ncYYBrrqonQjA
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{93047B51-17E9-11EF-8E44-4635F953E0C8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d030af67f6abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000046bfe901664f76c67c27a6aaecca5115bd680876d6b55a0560f55b45b33ee694000000000e80000000020000200000009e243aaf3ce9694561e5da94a8359e8b6eb378520b3d8da510a25ba62448891220000000abb516080eedd5fae14949d6ba52181c99ddec8f4b984ac5f3c9f983f5d776474000000009f9bf2e864925e9efd9c34078be1cffaaadf15f58fa636a2ecf2d5fbf9d12762fc275637a3df7331c9a241f8bd13ecf6ad188908d9581656547863adc5b0299 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422509610" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2988 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2988 iexplore.exe 2988 iexplore.exe 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2988 wrote to memory of 2148 2988 iexplore.exe IEXPLORE.EXE PID 2988 wrote to memory of 2148 2988 iexplore.exe IEXPLORE.EXE PID 2988 wrote to memory of 2148 2988 iexplore.exe IEXPLORE.EXE PID 2988 wrote to memory of 2148 2988 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65d21cb8c7c22e8fe93c99f40eae9cf5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2988 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea53aa8fb136c86d5bb5f91fd5183c96
SHA1f56818d15bed7ba6eb5225343b47e1656389c66c
SHA25694d89352613fba4dccf7703f36fe8764dc93a8e0183145a9e0d1b7bb06d2b5a7
SHA5125a794cf27a4d4e80c90c68153cf721045aa7aba1652fa0d06c986ee9c87fb75a692e081f09d4b96866dc7c43766a8b4367e9555a9a864698486fb8941d340ddf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cceceaab7f708c138a3007e66d1f1d4
SHA1bab17e215f45e0f1da15e339b787b702eab55615
SHA2562af0bc8878e805f2ab0929e2cbafa34a792d659d0c7371f3ec175194c0f04f86
SHA51287412bb0b2ce607a477273b17f41c4a66212a846597293dc9af90023d973eeedb3bb45a69f4aecabd9e63604471e679767fa58bfa9c8e0e7f74d580c111c764b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a11915de07de4308c7c8d68f0507571
SHA11efa804014a62b5e8ae54855cbc8021128e2d97f
SHA2564deacc58ede86f950fa0ed2a4806a0f87001454d2b07115c51e4f55a7844fcc3
SHA512638285ed3277e4c82a3d99d6b70028dc2f7f5c357a095df981c932e9ea14ce527066294ff9b6aec4dbc20d49664c654c8018856509fe1a213ce0b3be4bf2770b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c82bb9e0c4226e9d19ed7706f0298153
SHA12bafff195f26f51b850cfe2995746bd171b774e0
SHA25617d4fff4eedf5e8ed8c83dda56e44aa2ab91511425b7b31d01d8e72545707926
SHA5123a6d37796863171b805a07c348735d3e17e376eb21015f07e6b0e20dcc466bcadb856efb5b34de92d0988377552dfeb7e1e817745b804a742dcd59d3cccf840e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5303217270ec9727cf64404d07f8377d1
SHA17bb55a849e84e0363316220f1079bf8b373e5f22
SHA2561a8404785caf4a5c4df43e3509aac040d50e3686db36234ca4f96c0d79e3a7a6
SHA5127e4d86c891ae7b2810ca56def1972610cd3d08f5754d840a9b8ec9a8f16974d6f11682c3af78c114401bdf32769bfc1ea27a7fd467b2716e7cf68c9ecf8a05ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bcdcd599d767c8991d265bf23e24ec65
SHA191c7beedcccb2c325db9554a6c05feb1a37edf5e
SHA2566d21c91419627fb13a35a414dc0272cf2f174c1d5699598894aa5714ed31b149
SHA512f641ef5a6a79983c382769489990856a79709fb038f05cd2f6dc6f945b766b4c00a2de914e1a2697fce67a3d6e10b0caf9b44e611f0781b41216fe5289274304
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fe4336aaa8300530bf2e719c6221fd5
SHA16f962194a46d4230a94c670f90a1120e11a25ea1
SHA256b2c5438087a47a44a4efccc44cdb0ae2f3e86a6ee983f450777b1ed63c558e8b
SHA512f1b05af30d36b648ac645542c55b5c1430b499bf43552c2e76f947c981b9d4ba7a10567b9e760bd49f56c08c82ae6c5d48b5b8ba0a59704c9854611b459ecea8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3f6dcc4199dbf98886bfc56e60681f7
SHA1ff1722c5f9d14b9502b1b5d19b5a67b120d47e7b
SHA2564f3da316d5e497f0d6cdbc1871d4546af91e011adc22879da19a176807db2b2b
SHA512d0015a85bd944de80fc142ff29ee498fd227071e3c03edb17d22f3e906d3fa42da4b1b4eb5599d1412c6fc494c5909f57d4f8002265e6bdd22f2ae4f8e968a80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f04ee36ad6082886ea6ffb4e966f13a
SHA1d1993e05fa461fbf584bef57640eac9dfe6879df
SHA256d03298bdeb08b3627a846e8ae40141e9d4e0f0b7b7abbbe915575c31f41830de
SHA512ba1f7b317a64a24b1d6e5791c19dc00373c2210400c5db19a066dbf3f2a4643f23cf931287e97fa7dcca6494de3f706ae76d0e2d458d4d8e9e6842ad3321fe32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8479b00a0d4fac5eddb7195394b6332
SHA135239c5737d25ca91daa644dddc34324f9dd5fda
SHA2562d32385a1887660d083ef310e3aff40f55635d6bfe4236a97f6cf3c46dbf5bb3
SHA512344abe599a367b41fc77eb3b2ceaf560b2583632388b3f64da1074c149e6e19860735a9e1fda2e6c3b084ffc10b93922651edad23a1608ce42d0e087688961f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d12e5795f19485ed7e7a98c8b8addcc1
SHA1dfe7f8a43eb7d4e5985380520702549dbfd23665
SHA2569960bdc56013d239389d4f7e8588c52adda31d1d10a317547968034b26da3544
SHA512b39f0e0a9faa1a3e6d285aa0908934ee901326865d4989b465bfb40f467f0f13f0f546f7194021b0360f625aad3bc40a20f51b8e019ee113a68bc6bb2e7612c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595dcabca8982299228f8628ac17e09a8
SHA15d7fef8335c6322d1cb1c214bcc8ba220aab12b5
SHA256df0d4b5d4b6d377b56f295684df85b1ab6f98317171e1bc6fbc8e2c007c16d88
SHA5124061acabf9dcce17ce2e82ca345098f8c6e7885659dd9bcd50964533c98f9ee6a23a5167e75c4deb7b64f93fb48775081e51aa657fc0940b6e39fdf4b3e9a78f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5946e4c49b32b11d4c66322226a1f693e
SHA14a19042cc6949a4cc5f83de49c3608662c4eeb62
SHA256befce7f4f52f5be4eb419d5b31191acff4105761c54660f138b2115a85b35a6c
SHA512e16954092d2fb63c18470a83f54e8c93d37a5e0c1871008ab27369e7f1fef098c20ef195cc46bedd5ecd71c21d0f4fb06978db265b00486791ca9f772d88038e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51756dcc1ddc74a7f22cb3a6825996959
SHA1df52a4d08f47c3e1f253e048f25eef1e5f615010
SHA25660efbab27dd4fd95882f842130ec33c464730a7f6c8e9a4b4402af43fa5ac076
SHA512f67aa12a0e3b2c42793a4d1bf81da006524d802eb962b0dea368412f4e7bebcd07aac7a3ce0b068999ca0cd6585cbe124ef5727387435d5b524424fbfbe0b5a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5344d5b5ed65ee4998c4fbcf63167f5f8
SHA1340c6fbd6bf7c9dc72058091905b8761d31fcf85
SHA256b9c1129af01cb4acdff406e410f162ecfb14ce43f6132ef39f16dad86809a6f3
SHA5121c2a95f722059ab927a6e76e74cf4e4622b2d7db83050d4fcbaf30007f98823bbc58fa4c0f503fd176481a1c82371e18474b7ce54d685462019d31e935cbddac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5510edc5886a4290ce9ea22b7e122dd67
SHA10a46a947dfc42c94872377c61ef18a3393535169
SHA2568ed3ee87f31d4d4a04cd32580aeab274f409b3157d0c0a3a3835d107f43d62f6
SHA51226bed2c9909a68199c5e1b54757adad9b71aaf837c3320cfe239c0e9aa91007978a61bd91acf012160bc3005ad35d297475eea4895eb1cf55c2c2832f14e765f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8291a6f413304b14026c574fc0fe8cd
SHA14cc595e2bb0522c1ecb742e6756b4596e9c1d707
SHA2562da5c256c89289d83b6289c006cad1db8602a202ecaa20ee17e20227332719ec
SHA5129ccc1b6a6ffdbe032ca1aef91068304279b4a9aa289d4c72c10772c3148651ae98ef0e8fba159f3494326fed7bce928f9c60efa21722e314ea16a821b93aa284
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b5365ed42d4222a5c2675258669453a
SHA1e79ab43e99b2c7dd4ef1474065cbe5f4d11055d7
SHA256c9979b22d708a8a0adb0d0e1545f3c3a6515f315a6fa7245a32afde6179eeb22
SHA512ebbfd5aa6caca73c593fd94ee103ef19d21f5957c9d28cdacdab401b36c118c1d7661436dc412ba32ba8f48b88ab2dc0f87a784f5d0f2994cb47170a7ab036b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d98cb4972efe9c0c8564cc8d46c7f8f0
SHA133f31bd091c6cd0a3501e9275e22aefd4c078331
SHA256957239ef9c1e8c113ecb1b28901bb86e37e263690eba55ec4514897ca132484d
SHA5126b4df46f0025effbaf67b9dd45f90b36163675687a1dac552a4ae24a3a4e427fc84084c7ddf6de77db717fbf599f9d1f82fbcb53d306c41c56f4fdd330839c1d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a