Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:19
Static task
static1
Behavioral task
behavioral1
Sample
65d4c56ee2eab5fca97b056f222bc9f0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65d4c56ee2eab5fca97b056f222bc9f0_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65d4c56ee2eab5fca97b056f222bc9f0_JaffaCakes118.html
-
Size
19KB
-
MD5
65d4c56ee2eab5fca97b056f222bc9f0
-
SHA1
279f0f1adb55dfc23225d8f76c457560d6509c7a
-
SHA256
418d793aa00a624426f8eedf84b87f58840d39e65d23342c37c5a81c44546a8f
-
SHA512
ffa985bc944758d44f5bd2009695965cb609457a8c42d9abca56fdf787d0942f89e799cd57c81bb328b213138c2d385313469b901def6e2956da3274f00e420b
-
SSDEEP
384:D8dA7gmDAnkmo+BLwDn4psVNTfjjv/9u11WFOaUaEbB4hNrJ4Q+G0+xx+Vy+ye+S:Dcew6Tfjb/9+1SEb0wr
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1E812161-17EA-11EF-87AA-FA8378BF1C4A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000cd4f8e41f24e3649b328b6f1081fa7e5000000000200000000001066000000010000200000002912219558425cb74dd5c0f603b9ab45c6d6e6fba924c1a029359bec14e748a9000000000e8000000002000020000000abeac9ff760375376bae131fb9962c4ca25df97d1a562473b0514160d1fb0e9720000000909ad3c9383da2d08938eba1f6223551d75d2105b47e2d7870c27ec24bbac12840000000f0c70819c31a87a8fe890644142fa6a59bb05b6635cc34c7ee925f13bfa193b2dbfeafb630648018930f1672b256e580ff430c8d0b1285751e051e8a236b6934 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20ff68f3f6abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422509845" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1688 iexplore.exe 1688 iexplore.exe 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1688 wrote to memory of 2660 1688 iexplore.exe IEXPLORE.EXE PID 1688 wrote to memory of 2660 1688 iexplore.exe IEXPLORE.EXE PID 1688 wrote to memory of 2660 1688 iexplore.exe IEXPLORE.EXE PID 1688 wrote to memory of 2660 1688 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65d4c56ee2eab5fca97b056f222bc9f0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1688 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5153e3c94534498a9dbd09c66cb9606bb
SHA15fc84794a77983386f58840c175dc13e282cde16
SHA25637163352fb57c3afcd649babbd79a84fb420de8461559ae1cee473c1d364a5b7
SHA512a2c98b25d0da3102552f2e16685b082c878c270b68896a14699222b7f42040062e037c0af689dda74bae23b2de0a3b0ca5242be529e24cc167e11d06ffff4717
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bff608e0d5aaab23f25df521fc606f57
SHA128802cc57873365bb1dea1870686ae0c36b0a31e
SHA2561c8d49f8c6580b0308c4ca7dd14324e3a1a3968465c85a2c9067095f77a7bad6
SHA512b36520526207eac2e4f5cd88dc0d70407f7d6325d66672420bad005bf8c9d016036ba88f5c0682b0eb2ee43791050511286de9a0a7b0e4973592214e2e7c0ba1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5662dbe3b9558e05df7bf2aa899cccde0
SHA1684daddba5c126102688cb27649f905cc6e7886a
SHA256ba0a348432a56878e23feff92c1f42d4c77fdf1f522183da048c853912e86693
SHA51262c1f4f8004ad0a6fd8a1a0b11e45ce95c473b4338f040833e724171b7dea47381428eb34aea35256a4596bfa111573d6b40dadcef32ecbcea6a9e37341a92d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b330ec24f34ddda5f4cfe427003f3b99
SHA1978581bb9238219777db87f6bbd7bcd1d8ceb77c
SHA25626107f40c49d53890adf0bf31992142d9e1cd78fb39592d02d8036fac060d7f2
SHA512d5b7a1797a99e566d1f17a674758b435caed5637ac8d3de4ff0440d5e95798b51f686a8ba200b907c8fb133669ae7cecfc9e6c920bac67ae989622af6cd36729
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e35ac44a1642560d3d44126513e313f9
SHA1462dd1791b703e1fb416c72a218b881d56a7fe5c
SHA256aee09ce7843b35dbc3f9cfabd06f12c69b9d810611a09ae9002a301153b6f987
SHA5125de70f80da7e067717c484d50bfacc3befae4230b8023ae179184a4afcbac84059731febf14967b35f2895ab97f22b87bb8106b70fddec1c281a2a67195fdaa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cf500ac9ca1558431f3e08d3a3f779f
SHA111cbb7d075bbfa1128a0578c4ba82fccffa3a669
SHA256560655ac134bf836560af2a5c1ce12be498b41cc4e1c9d18c860741376be3078
SHA512b6f4ec9a9fb1fa68fbd37faedf3e074a0b336b75ae55488a28eaea375e6020b6dd6847179ed746c0bba5bf86f82eabd533ae4e376382067126b48f492d182e48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5057062e24eb111dec9cb20d3ff4ee271
SHA1a03299d29c542c95929153c3514121983eaf7bb5
SHA2569532eb21bda3e411895684b121e4a04b78baa92c89b0e724455b229aa02e0905
SHA512ea9df56d3e4c43f3db8444bc237ad633c45ea9c452fd4b5db57b7277d8b6f8ee909b810f022f9aa9f99691f8b271b2e70ab50ab7ab098c5503b3f8292074aeb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5039b1a73e30aea9e27f972f374c2b4b7
SHA10f842ae825ec1357d30c6dfcb84a939e019c2110
SHA25600ec959ca374c62eef980ffa003d7774fc3b2bd9423550906733075ab54039ad
SHA5120b9078958dbbb4af9113ee4bad4c823297b89640372d36d4d1adef8268c60c495288c6b20c621886ce74d09addc2d1a51212048beab3fd4c8f1ed01580443c09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581b6736b8dc423f661c076e3c667ab97
SHA1729fe4d0bbbf5a5bbdb3ed0615406252dec96078
SHA25629296e117be65f27fa8179fef6fb8777823594fa9a241d8b842bc8fab9349471
SHA5121568723947595d1a6c67188cad7ba7456f7a5e8fb6fb495d970c3da6fb5f7c0e800bc1a8ec38000016abd37150f3896f0d0921939bc3d6da46e8dacbd7d9894a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a9239da3bda1ef1d644df7d54ec5255
SHA19183dde272f3572d022fab100f224fefc57cf1e5
SHA2562f2013c46bff8a93b0253249fec85a28dd722cf39b6806568821128fc9082c81
SHA512255a8bb94342aaf40cf6fff17563ae2a173e0d5d773979492e58efcabab9c5e5e8c23420123287847a1bd84e2d663e0cf907b726c4c3dd256f5e50a6deeea40d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4af4c9e6ea9d4089447e29c11b16824
SHA1e2932d23a5798bc5db461179eff3989e686996be
SHA256adecc0ee1080e589587d6bcd1c726137386d16943d2733304661c7f844e25523
SHA512e48904e7424aef705bddab1af79cf541ebf1ad6c57c536163f31a3816e5e30a44ec137fe611be3e8c732634875550bbde6311467b693d87b846974ea7dbdd479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c53bc29157f7417ec3675e60dbd5bc59
SHA1dd61f98814d2ca79c9a424ae352866aaac97c377
SHA2564914e8ba8dbf187fdcbfceaf3494dcc92b7a61b1d43472e65621e80e48a9d8a2
SHA5127bacda8ea2e721ce13957e11ea2465be3f2db0f946af3a502705a3454bc9594c3907901cb7b585ad96d85691f5330ba69e54e62f452bd6e0dd2572d8172f1402
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d7945c23076d0a9b3569ed0e696b61b
SHA1f4719895ae878be96aad02fdf15fbb67a86bb361
SHA25608fb9aea396d3750fb1fbc474adc392aa60f8f978dff97d80eeb2e05c687aad0
SHA51206ea4de934b3921b872a95b968c6768ea942f557677d219c1fe2fce09e3bb9535722ba78c9d570db0450d96b7173f47b5e5ea1c3863937d5f52033aea0cc9491
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56baa60c4076bf7efd7e791fbc3119790
SHA1d0f9bfb2b0002da8b1a514618a4a0020aa394a89
SHA25660c94822e04478437f2658ec838cf40ea419e09b9c27d289be8e3952969aa6f1
SHA512b7eea35a046b70d1d80a5aab23fb4aaca51d3e848e7e1d727555f229edb5de285ab6cbe947aa58a03c7ef95492eac2044628a26dde8e718ed8d5dc07278e08d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587f150ad4c41e2dad372c9e00c9a58cb
SHA11bca87cc39c477ad0d19b3f277ed9b07efe468bb
SHA2569d4669fd5966b5e280750f421785d29b0d8d55a30145dbac8a8ac58757b0520f
SHA512384a1962be765e99f7836522ea7515c9ecaff84bd392727a6e0a40abb35f85018cb26ae8fcbe2a2f87811f167eb05a7e79e7e7caf33d6cdf5045c4ae74315452
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5afb257180b46f6e517be423bfe96d327
SHA15dec9be678c5fd8eee47e347e9464668630eacf9
SHA25630282934810fe919bc0c944366047c904e25ab6b874ab303e6b0444991b7d552
SHA512d103e6584fdabae39ecc07feccfe44751cc41719bde257485d5a0488d2c03ebcf165064aa958129875d710fb2862522bea829a57514fc21c3556846e894aecdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f74428686894be0ebef4276c99adf52
SHA15801358748e8766affac88114455145f356eab60
SHA256fe6013b0c3ed609365273768b3232b31003d3e9a05ea95638a56c901d462ecc2
SHA51225618e04931e59f01f63142a6c1aa96c7f7d4afc6b24171595f2e9933f6955d236e1bfa8dffbfcd4e8ec4eefd5c149294d61f4a657b9b9edf3dae7bd7bd8d7ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e434691bdb5cc7326e22075493732a9a
SHA1486b5cec0cf7a3c3f51baf82d719f80e95759210
SHA256a83d73c9a0668ca6e4f81765620803a6ce3e3519a0937247a304f940b63c0094
SHA5127fff75610b40bfdf7db4695e5e1dbd77572d67abdc0428e24202ce30a07386a1c0d070cb418c4da62516828857ebc76ff5a5519e7a7e58f86b13bc7a871af3bf
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a