Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:14
Static task
static1
Behavioral task
behavioral1
Sample
65d0ffd5413312249bc881cac9829d21_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65d0ffd5413312249bc881cac9829d21_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65d0ffd5413312249bc881cac9829d21_JaffaCakes118.html
-
Size
1KB
-
MD5
65d0ffd5413312249bc881cac9829d21
-
SHA1
43c376475a8eede1754306775152d744bd68dcda
-
SHA256
642fab68e221b2a28f98d2e4e7409566b7ab97d8f0e559d3cbe3104579a3cd40
-
SHA512
f61a69697f330d2d2b9dc2e3e944f68dc917d7e1e31f3e8115b4d1a5a5a3add6f2029fc357f0a2bc8a216aaf730aef17f828bd0fad78e5d2716e6a3d43686579
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ae137e0c381912458d6bea0683811b8e00000000020000000000106600000001000020000000570a10ea3e750660dc87515ef87697468a082eee07f3167f44f1dd8a8c6afa80000000000e80000000020000200000004f5bf9ec50d9848abaec09edd3e8d0a36ea539227bc80c960965f8ba44a5020820000000d5553021fc75be01465b499523a31ee19edf8a558fac721cee3e238a392fc4d6400000001b3f184c329e3b9d764dbf535cc5f2a4ef21e3a71d1ecce47b1cffaa2e7ea06b451e8726a3cac45deeec8d239dbce031b9eb05e910c0af315992341b0f883f60 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5CC7FDA1-17E9-11EF-8442-DE62917EBCA6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50621032f6abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422509520" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2528 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2528 iexplore.exe 2528 iexplore.exe 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2528 wrote to memory of 2404 2528 iexplore.exe IEXPLORE.EXE PID 2528 wrote to memory of 2404 2528 iexplore.exe IEXPLORE.EXE PID 2528 wrote to memory of 2404 2528 iexplore.exe IEXPLORE.EXE PID 2528 wrote to memory of 2404 2528 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65d0ffd5413312249bc881cac9829d21_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2528 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540e5a92507cc0ba744cacaedb78e1101
SHA1999d3d40717733d87bb88b99e7b65c4f397249bd
SHA256e0b48f2c0b8592c0854149fdab51aa2f9a5ce8e7421234f669f2586f8dd4b7c1
SHA5124605646a82c1d06b7808fd331d918dfc30b73c43f605d8ad3fb365aa3e804141252e30b886eb853e4ad6aa20dae01a3e6844724d10fe088931febc0935ed17a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ca0ac4aca04112ec83ab46b50c445a0
SHA102581b7d88c6022d697f1b6884f8720402eaeed0
SHA256225fcc49d788e7b8f7b574716cdefdceb74b2175a1373de513beab3152d7d049
SHA5120dff63dcce69d3152cbecb21d4e91754db8398ddf6839f99e1267f27aa1f53da13a4e101e6fc7ecaecd2f811c1ab77a44562448f5e8c72db62003153acf97c69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58357e6e73879811ca78bbf294d697820
SHA1276478748e137b9696abe7de823e8942404f9340
SHA256d4c690176d4a453f711fa9e1956afe5b31c5237d8801f4ada28d35a7519eeeee
SHA512311144f30959926393243a80614ef48ec68eb987fd18e1896295b0b6e560c7489d653626ac621449e85d1f33904b25ccfaf99b797cebe2dc3836fd695eb9fe05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54348c761a04e9170116c8251db195746
SHA128935824eed7f97f469deb6361d78a99905f18b1
SHA2569fe9c1ee11b3dd556ce3960cd95d9c8abfd85e60f298219105b34ccdea596881
SHA512a6be21944f5d4bdcc81cb59896a057aae6eec13d48d97dfd445e70069c2130c43df8cdbfe71a8642427a2579d3a36059ec361335728d24f752d7dde9d9444e46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c81d57a504022eee7078e2ac12767453
SHA16741b7342a239aa18d98f226bf11b4139ffc8963
SHA25663b7048728500fb57fc84be6372e6451667e22da078fba680ab919a4360fc6d1
SHA512b715b1a9b955a64c3f0d3a7902c21bb161af7ac3c78e655250d98eff99d13325a07f69c27b2d89fc5e9aef243519b91d182939d5cc16b14982924bd0f64913cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d1e659c243dc347fee97ed00fac121f
SHA1b4293093f3ececc7acfc891e0fc82249eb8b82eb
SHA256ce3fe4ab93fc61220b7e01a6f17042df6bb4a068cfafc13e35a9af1a0c30eb44
SHA51228aee842bf0201cd745908e13862addd4f31a762d3fadff11c60a5178d7d031674452017d04d0c858d158772e1dbddc359a11adc6d316bae71961c47f750f584
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5243ab8966e89559090323399bfc2616c
SHA1ad23d66839cd0adf7be1a756d2d959777019f419
SHA2566641c0bf9c251d86e327db23e7095e524db80701de9ceaa1451fb82a78b5c732
SHA512940fbe3c268bc5699525801b806e3086e56c7199dc2806fc41ef03c7547d9dee7a184a63085f46202b24fbba84335ae8f21f7e8b09720d898464b4b5c2d81dff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bdbfcfbbb09c6e9a52e49eade62780d
SHA18fa6d2982b54b54d9c3e33f822b1343eeb4447b3
SHA2563a97d5f4b968f50b92d99f85cccd8ba975053fb2744f9371164372da0ae0999b
SHA512aa0160d3a3d4c11128c085c5e88834e615d25b36fb7dadc9b1a592291e3d3c57a92a054cc747be43bf975e6ee709053bfd49d89cf6a3f4fb3aa859d98ce96c73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bac81180ae6ddbbb0d1dd83e0d66f8f
SHA15c1ff1f4500b0b2f961983f53c60815b1a844a97
SHA2560f06443e5c0163c14b7b01e039f8e2e246150ace4f63fbe09a12cdd977c5aeaf
SHA512f29e19acb6a6ea219530f1e5dbcc94870dbb6aad7a690971003b4ad983c7686de0145595ce35da488ed17e5ca0fdd922dfd8cc1dc8fe65f8b9a533075a4e4ba6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e848e0e37638e221c6429d01c9a4bcff
SHA143c1ac1483a2204006430714125ae3eaf164e198
SHA256101d8ca80cd35f9fd83a33c22694ca3bd03a6bfc90bbd936b4f66d2de757557d
SHA51297ac47d4654fd4748595289fef70039aa5f8de80ccafa4a35a43b8a380c1750b5f4298daf034a074029dbf8422296d021871fdbddcad9b3c43c6812112acd8f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f3f17221d26d33eee8da6ae5db49d9d
SHA1a95fd81c361c3b94b1cfb19ea5aeb2a132842727
SHA2560c098f6847b07cfd5138a63cd1441dd95f930a13fdc3e5775dd7871a62d6e3f0
SHA512770010f6835955f194efc808823d179f394ccbb3d9cb07a97c92372269241d53692a6089cc920f15dd62b7fc57fb3648932afb5c356537d8335124d1fa04d557
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5593289aa0e40c9a0b4d79bdf843234d8
SHA1bbf4297b37b963775fd1360009250d956cf32a04
SHA25646ec2e458426afe065b8399287e15dbd1db5bdb78dd7045dbf31022ec7aa5cf3
SHA512a501e6d1984c24679ef3ae0a9f24ad284ebbbfe8e33cce037f3b8ce6b51e6b1865a65f1c3ff40b3adf0d6eca080afb43cf77d7d1b2a37a861fff9f8bf0dad0e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542e566a7a73318aa333272094a4807ce
SHA1fc0eda896c5a8d183f8674438d1000c70ca1c67b
SHA2568326966193af49b8d89e2d4f32045da7431f0bf30e27a772a38f7a169dcb0037
SHA5126e935d6b04bb58663e2f61d6ed4af3b4d604fbc37f6d69004467c982aadaedcc27aaabfa0038c97a24bfe0709bf1ff6b2fc0fe8232d79f2da30da36cde2fa186
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a05333c8437ec3c43cc86f253a239492
SHA1d2870c9e572f168705e58a4a88c38490ecd0c59f
SHA256050244fe3d19b30677ee9546a7693251364f4dece374494c3c9b5d28eb88e2c2
SHA512831476c6cfb46658f9e7e36684bc19a0d38fa5cf4077478e0ad2b6a010ab316f2a2e20ef8bea0a20d3f04f278975facab515cee0f2762f74405ba6467bcef37a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530703282125b3b75e2c118e4c4b26c33
SHA1a91416b3809db9b3cc104a6ff7790681ef930d74
SHA256fb19be98925d8257301a6fe8b2d86c68b1721a1498cf16130b0eb3a914905700
SHA5123fb01b28381ddac48d0b8f096ee12b62a252c3002a81748a6dcd2d4b807f71b6d74a44bc0847291eb29e8828881fe09ce2cd80d2489d8146920bf33ce07534cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584299cef9a2e5b11cb1e9487e39d0544
SHA120dc860e34fd9098027e8a9d7342cb6642a21c63
SHA256fcdd5c98134cb0b506348f32ad8a6565008b5a9835a2c9af29520e6045ecc9f8
SHA512d0239e9d4c4d7a50e929b8b055f0e48f25a33ec7b8abe1dc2d29267734c7e1f2af4eb4fe57bfdd64b48f5397818bd495910a939b1179b246f65aefcab55701fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a974871d2b7e6ad35ef26c23bbab94d3
SHA14361a66b1136f0d5793202bb90420c5fdc146d53
SHA25662208030ca261286b907bfd7a354d9ac61393ab83a60bd388cbcfdebef88e119
SHA51237c07a3fab775c65b4f23610929a1285bc68fded13a7e3b4b6b2c25e3b06c7b5d150383b887cb2dc9c35a7e3bc3bb89ea7f80251e628b35c2efd460a681d2160
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc49292ef868662b34982d6fc599b5c5
SHA11538fedc77c83d78d5cd709015a4f80b2f053b3b
SHA2567a459f7a4a23e9b9c193bb423dc1dabfdb89dee89a62b0c4eb2ad419d0a34cfb
SHA5128afc9d5ad9016eb9d2771c9682f19abc55d651678b75ab0f22ab1b9ecd97c95d94ee8e2a909c6dc7593e9f4a339a9c1a47f0929e56543f3c9d55320d292f09aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575aa2eece8d6190bd7650989f572fb46
SHA158d646ccf065bab78aa9881605423618e810e873
SHA256eeeb57a65f5927088e01bbb739ede648876d8a327feea482b1f84282651a8809
SHA51269ee5446235c7d6ff21c54e933550df666eeeb66d3a33dac01b60ca236dcb5afff03f7f1f5b69e7b27c71d474de7f439b98bd11c99cc98ea0956adc96c746334
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a