Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:15
Static task
static1
Behavioral task
behavioral1
Sample
65d1908fb412f24af0ce675ac6777537_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
65d1908fb412f24af0ce675ac6777537_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65d1908fb412f24af0ce675ac6777537_JaffaCakes118.html
-
Size
141KB
-
MD5
65d1908fb412f24af0ce675ac6777537
-
SHA1
b8742efa546365b75276d681d518958b7ee06ece
-
SHA256
08f88ffc296f2ea833218b3e2174ec6705f24089ccc9972ebe13cd919c3e5f0c
-
SHA512
709eeb08ef3d9c19da7fb5572e2ce4d1cae585effef4d4c276f959e5cd9401dc725e9c4d1f900e54b01c7c8341557187641d8569ed718c2960c8469cd1c5a0ad
-
SSDEEP
3072:SCPG+EWEKMLx7dyfkMY+BES09JXAnyrZalI+YQ:SCPXEWE1x7osMYod+X3oI+YQ
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422509575" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7D8AF421-17E9-11EF-B0F7-6EC840ECE01E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2156 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2156 iexplore.exe 2156 iexplore.exe 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2156 wrote to memory of 2548 2156 iexplore.exe IEXPLORE.EXE PID 2156 wrote to memory of 2548 2156 iexplore.exe IEXPLORE.EXE PID 2156 wrote to memory of 2548 2156 iexplore.exe IEXPLORE.EXE PID 2156 wrote to memory of 2548 2156 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65d1908fb412f24af0ce675ac6777537_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516e6f1b40cd6b75875dfbd2f758d363e
SHA14fc85b3bc1818c981c0d521b0cf1163ad143902b
SHA25688a8e238d083dcf9e88fb2efe54a581549c7ed0e892d8eac64cc0cf7fab73bed
SHA51226bdd24975a3d61e2e20189b732c80f4a5045c33fdc4c9196458312ef38bc19a262dade1120350bc10f02ad39e31f3c879ccf41b90b64f86c7a7622a40a673a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cc38626cd3beb5681847c69d8e17422
SHA192fd189c7efb0c8c67ca918377e63948a3d1e5ca
SHA25676e2ebde2af3c6afae5481be41482f969148f124ea33913175703abf97e56a0f
SHA512f796ec389854d744070924c2ac16a2feb7b4785ae8eeeb0808a77c0870783a2f436c47eac3c732fb2d54f4e1f9d2015b5714dc73985ce0cbcc599f0cb4c453da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536f659112e7d1c2c8b73218ae3ee239d
SHA1f5a459d2a5e2353a949379acd5190a259af84144
SHA256becd61f41085c7bb500b76a01d203e60f1eeeffa7b8eb820e3e917c68ef46a61
SHA5121bfe0e6836c2020584e8039d07b5cfe7d98be1dc547a6bc00ae0343e6fa4c1e0281fb1af4386d57e76de83c290ae881089de9d1e8763d1d1bb30dacceb3f420e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f65d3bd8813f8963b6f82c6bf2d8cc0c
SHA105b6d916f4ef62500af50acb96b4662a42b8b54b
SHA256891111a11611323e75e6e282dfcafec13a3b9aa9e4fa6e560ba4adbf5910a35c
SHA512c9597b3e58096fa65a5a06c5e7dde4a130f0763ec26443f3c3a310eec53cb4bb92afc4f2b840cc94983a5f95dcd84b5e1a7af576d4cf1e292f10ade186f3cace
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1097021d060465fdbd699cd87320d8b
SHA18bd538d64c6dc724ba848ad8dd11749f98f06071
SHA2562d13322d257a80e4234ab932b0272281158bd0e8fcd9a6b41a2629180012e3ce
SHA51284eea949c5635d047504b7e93540e3e909d4e2f8a83e1b7da0a80e5ae6f8431e3aea06f72d9e085451e4f879e51bf2a3781b5d62b072c99e91c62e997d072219
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5706f4303c3149bd026fe68bb000f2e42
SHA1dad16534ea354bf40ca33a13168ad6c350012b3a
SHA2565b56cf4e8cc88b7172506147c778f6bd1ca8256777054ce7127bcc3c102a2542
SHA512f8413912d5863f7961ada426ea0087f9ff7e116dcd645b84f6002e2a3408a9af5c85c461d4a5bd3773a13133f1ef3b1384660b5d723ff41f666b2aa027f7f69b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f013de2c2c0ab399e26bf0a50aee7dd
SHA10582dca4bb7a92282480bae4267810542f2bd558
SHA25686dda9c337fb9188bd38546fa2fa564b0c42abe767526d24b59381031375afa8
SHA512ff369a1ee03aee79c80dd4370f6cf30b95f6dab1e91cd12a9dd740ff2da28f72484fba61925deecb8011ed0fbeac11ffdd43a25a20a12ab0cc221134dfb096cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51eab6f60946ab9da5246e266587757eb
SHA105db9347033bcbc09855db83ec40a95886a083eb
SHA256047926f090c1e0cf024ee7e51b5a4c6fc06e87e479391a41cb6cb636793f8dfb
SHA5127756d732903d34d193252d66b3206d734b02ec51fcf3a42a88a36ddbc519fe1f751e42a4e62d3f4b7f768beb8e4e57a1ecf298bf697f9b4474dc6af67a9da574
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a