Analysis
-
max time kernel
138s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:14
Static task
static1
Behavioral task
behavioral1
Sample
65d1283e7cd1bb8837396c903744d214_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65d1283e7cd1bb8837396c903744d214_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65d1283e7cd1bb8837396c903744d214_JaffaCakes118.html
-
Size
19KB
-
MD5
65d1283e7cd1bb8837396c903744d214
-
SHA1
396e487d8abae05e879dc39b6b497a56d8007680
-
SHA256
6dd95fcfef5b645f22ae2f30863ea0b8d576d56931497508247eb3e65c1fb4e6
-
SHA512
7117cfe38f1edb6d04f62eaa8b8d1740150eed2816c9c6d2d72dd1952f872e21cded55e63266353b262cadd32cd53dc6dab6e1813c6cca95370e726f2edc4b8b
-
SSDEEP
384:ziMKhgESiVBD8c4Q3R+CScBjmLxXucfBk99heizVc9tj:zilSigcb3wCSEmQOBk9SEqtj
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422509529" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000007e82d9039f0834a84d7a4dc0dacf201ec7032c1b31788c11b8bc8c1f62dde918000000000e80000000020000200000009d03a58dc72f1ecda40fced1d2f2c738d486148a2350dcaedd5ed9d3a3afc3b620000000eaf45b3501e0e6b1a0c35ee46da7d8a26b1539931a01727df5bf6e85c06388c3400000001619f32f03c6caf06371a6bb6453b1e363b263265c7f9127888d67e07d9ad875fa5cc9427868694bd23a6d1712c2ed360851f05fecfb01506a433850a798a5b7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{62BA3CF1-17E9-11EF-A5B4-4205ACB4EED4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00b3be37f6abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2040 iexplore.exe 2040 iexplore.exe 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2040 wrote to memory of 2924 2040 iexplore.exe IEXPLORE.EXE PID 2040 wrote to memory of 2924 2040 iexplore.exe IEXPLORE.EXE PID 2040 wrote to memory of 2924 2040 iexplore.exe IEXPLORE.EXE PID 2040 wrote to memory of 2924 2040 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65d1283e7cd1bb8837396c903744d214_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2040 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579d2476df42d3a5f297f7510bfe6bff0
SHA1052d451e4729915f2c9d5841e0ee97e348d28094
SHA256fe5e426ccfe3d8478c87bde598d131167437e4bab5fc7f23ab0151bce817fad3
SHA5128c328701bf74e634ac2983388c8c9f4e0d3d61061d8bf9e230f8e31d6a35f3b10825dc4d3a82b7b32064c9aa592eaeb24acf27f2183c29ae338b25e7031ae90f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b0f66c05e850510713d7b12313b720c
SHA1be13129c8b58fa097262cb5eea7e6b4107d57c67
SHA256020a4cda18335e68bf7a55a701cdf5681a2366262c79544e8b9125c363bdf061
SHA512687e0d966978345b83644d43f0e76429ff63c4fcd251500cefbce642e62704f603d3f3d604f25cc6a976df71f947536485ed1d56d02433b25050c7e231a25b82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52236669c70efd9e4c1de94270807f10b
SHA10910a47158f64e1fa55bc3883e68dbe6c6abf68c
SHA25681f335e8427f7738fbad0cf49a419a8aa3555bf3dc78a9666cbb83783c085d55
SHA51227aee44e21ccf0a0c861f1874937445e0d00ba0796c30dee15a455e4ab5e5f0d65a8abe2af86f240cd53b2bf4b8f2e19b6db91c224ed0cd7d9f460cc8fdb2123
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc604adfb8d0c55672b195ad9b72f04f
SHA1e7604d5d8460c4d6fffd3dc3aaa564ee5fed8794
SHA25669b8c28f85e13a765a9b22794964ff1e10ca6933cc30e3a7bbc908d5cd4554fb
SHA5122324ebe28678248a49124fb09c91fd6c6e6e5c0bee25fd85532ee0940a8679ff77a2d89eadfea59c3dd99a804bba26d0cba9042d9908b7ff9bed99c6e915298a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59af66b675a66700e94bc03f18b9eccdf
SHA175de2c7eacb97aca8f3eec1961cde4e7b2ea561e
SHA25621e0e20eca318bf3d69224e582000a73cf716754ff848366f28db3372aea8a0b
SHA5127e2010b55282b99d9b294d4b5925746c8f5b36fefb6882b96067f3c46a84a8a03af0d27ad5e1f0265335109d4c6579a38023b5d81e6a663a58f4c44846b0c2b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529dfa66d773166f9ed100adb79675710
SHA1edde5382c811ccdf7b2a9f167b6c84d6a466d8fb
SHA256cd76a94c30c875ad3f5b2e11b212370e091f3690ea2025d3688b8cc06d32a08c
SHA5125e862ef657489d45826309f19eba1e20278ffc00d23277c4269c6b818ab34f6b27fcd546631d7d397225180fc9adb896151adec63e22de8811c2e9fabefb2916
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56aec3f6cf68e307644f8a6aa37919447
SHA1ae0febeaacf84522b7a4baf217c3cbaa11f64cca
SHA256b2cb0e7035249294e6f02e5b3a7a6b54d927b541f1f31797990a11f0f9398a50
SHA5122e29626aa2f93ac710d60ee9d60dca7eca662a8250b3934c2805838fbfd0da7a648305738ec68dac909d7dca8681776451520563fff183c14573d97c8b33db3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51149f9a9fbc8baaceb577c04c6ef45c9
SHA1dc83eb54989ec0c95b5bec64c0b0afe7ab8746a9
SHA256969f9ce0ea6be1c1d446c397667a89b2a2ad6afd44fdcce78839023b79ed1401
SHA512d210c8b9d40eb78a2fae648727582902759c592b694a9db819a2e0e8211fddd9542928b1b061c40d3e53db0ef29ea25973e06199b74e1e8bbd0de3ee1cd6501e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0e32b07330f658e4150bc0557effdd2
SHA1d027cb49d99deaf5fdf4c24bef1e1894540cb119
SHA2568d53b4565e1573a385b4d978b9117b33cb6712feb7c2d5aef4027a5907096e1b
SHA512e480b6351c53ad4003f4a379e6d98c9a6abd7a231611838a0c463545126e965aad9f1988e74f1f1fdedc8ac08feed5704f54e3654665f4742c91cf390901d952
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b81614aa3aac926c1937c4e78ca1ed6e
SHA17215cb57b21e1f90662d0690d0684827d7085fe7
SHA2565b66b68397ee7f1a1c6f7ff44a6f915932d49f629c0bf5039975648685583674
SHA512a79a92726e502da9f5791c915b76899e14ee526da68db6e2c0880fcc008f06f4a532601fc1ded7e4cb9a07c5ab0f53307531801e8802ea28c4eb5a5f050dbd82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4781a6a29ac9ae73630cc6e5d5c6bca
SHA1543cf4bcfb0afce63ffb282b45c2b0a07f549b51
SHA2560804bf087b8d8a777221b2bf5300fe3de40667a25507be577fe3154327cb8a67
SHA5122fa7067e862fd22680ed4bb344713f8ae3ad9314d981a349b2c48e54c2d378766ee352727515a3108f99b6b150efe605385aec64017cd93b3ce46e599abdfe0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d478ed8de1486a41d21dba14faec76f8
SHA19d0d1a92c75e91279f6d171639ffb062315083e4
SHA25686204c5a35d58549c5f15ec4435ad939b62bc916b41de7791a25de35458e6fab
SHA5126023c9b75178188e10f00be2e34b0dce53720a8821970b74bbdbf896224e05f00fb6876b2285fc545c5ef412afb4ff6bbc59d4837d8992eb01a675d9d26053b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbbfd83a64a19420ea80648ff9959ab5
SHA1eb00ca57fb448ec4bf2c0e8b277d70d1ef3fae60
SHA25681ed8f615cfd847c7b28ac22c105ae88e6d0002fffefb5c82eb57ea1a22c1506
SHA51281716e1d0ce1b14a7463763f461f51ced7329b93485ef0e79fc1ea09dfe6c77d9cb83397bb5fd4a062c7bc299bb9f72386bd8ead6304a4d14ab85f4f3b55ce25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572066f2e9b5e2a2d420a1bc6f481b9c6
SHA1472e6b07360ec4ec5d9a21c44778b85b6dce1f1d
SHA2560e263b1667e369c3982867a4be0d792e1d1f6aedd03362012e986ef37dc749d0
SHA512690ec0e9351feb615a3c4fbd10d0915b534e76cc0ff09324deb0e2c189770a0bb5769ee21c2274732951d57ffdd12c78da4c3a2056964b5338ca966919b52fb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537877bc64d2a0a611460ce42033e462e
SHA13af9716ad9ea6a4004df728abd00041cb11d0a72
SHA25673c1a644ef431218a0faddc7ab35ac8f38716106eebcc16aa3c2f6b2ee95c708
SHA512609c439598b9c53a911eeb5110d97c2d2493ca1df4682da116e71283c6fe08ee1b73b09946522bee1d0b1dc4c01fd8f72567e6d9a6436676ad4fd0ca1ef2b568
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520712c6ff8763b1664baec8c43b2f539
SHA1b1eb2e5834cfe7c52a7084e597b3909832231094
SHA2560a257105b783aad5f724a39a71813ac2d60635ca426063e459a3313afedb620b
SHA5123539f23dd249acf765067971840ee4d2e31c4b3e44999f6c816a0bbd2c89896d869649c81b09bc6c0a89e311966f783bfe65b45d97b023e1a61321d2b4497fdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5757ae84c6cb57be605de306dc1658a61
SHA1c61b518f6021851123d166cf38ca49337d74a19e
SHA2561f58ed26b43ba5f13284cec003e11faae15762c0e311f1236c99f68038546165
SHA512352b812efd7b1fbb1ee41e1d49599eacda005c1874e5308be1b4a331c33310cd8bcffe42f9975d31c4308ea4d31df0934c9008543c547f2ebbf096d88ca9a135
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0cfc204c4298bc6072a9545f209b9c8
SHA12f1cdfb6461dbc091570f6d6f73f37f3a355ef8e
SHA2566fda0aecc833d2f35b02bc3277b0b1d330fa7a46405b71d43ba7a66e513c7acd
SHA512a7e97d77de4536f963c765fe1a2bd8c8835930be3782d381dcb9450b109a077999dd5645c35449f0598bebbdbea6b0bd4e367be0e5ab39bf35b04c2ecaf203b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558687be909507411d3c8b79454257071
SHA1f759cb600a631265c893c48eb40b4a2951e6ff2f
SHA256e7050120fea6545ac15e7e86848277c39c0a955b09788db79bbe055bfda391fe
SHA5122103b1a86978655d0cbafaff053efcfa47202c1097c2c8bb90ac9d912002e533f4c76e2a81c223031067502a93cb474efd0a131fc141f183daf7d18fe662f64c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cf36b9a3f8d2324f52b3fdac6684490
SHA10ce03098f0b9028f689c6dd4ffefb1daafa46858
SHA2562f73c4ff88b36fdd13a47cf31e8a9eaa64aab6525118783d03f8afa779f6171b
SHA512d5ad067c134db8c7d99deeaa98b152dc612ee6d666bcafde45598acf50d86288ed17a0af39751aaf4ba8be3a2d7bdf3343e29ad09d92b869bca021ba8192e6ed
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a