Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:20
Static task
static1
Behavioral task
behavioral1
Sample
65d50ef7058b47dee286862100c653b1_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
65d50ef7058b47dee286862100c653b1_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65d50ef7058b47dee286862100c653b1_JaffaCakes118.html
-
Size
20KB
-
MD5
65d50ef7058b47dee286862100c653b1
-
SHA1
e46dc630d93f9f816ecb25d61f1dc9f1ac4050de
-
SHA256
8686e694d632144ed972c6d54efcb35e7f4d5b2fbfdfc9719128d335770f2959
-
SHA512
4f02b8b8b09ffaf68127f9edd576bc4800cc8c6f7be08223add126b1728459ffbce4cd5ea578c6cfc2e21f271e21cc80a44abe4dd96f4840bf521af177e13b8c
-
SSDEEP
384:wfIpaQ5yz9zWWDfHXzhFCZ8DCQJ8U3OfpDSB3:wfyaQ5yz9zWWDf3HCZ8OQJ8Wwi
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{36F79CB1-17EA-11EF-831B-46E11F8BECEB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000234c82ba17946b40b5b14be6ad6c118900000000020000000000106600000001000020000000d702b50d26fe827b7df4095f97cc6288d505b2f67645d9545f374716cb7339d5000000000e8000000002000020000000449da1862c54b3113d5fa81d4b16da71ce717c844f3845b075d205f3a2aeb00b2000000054a7891db8438c31e29248b3b667d91f047c1afa62954f311b90fa58cc0b873a40000000db8cfb1b9264ad6aad414226bae9fd29d22c0ccb89d6b904bc158e613283d75733b301e8f2078fe2253dbd88e5253028e13cb8a461a10b3ac8e126016f7c38e4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0039570ef7abda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422509886" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 3040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 3040 iexplore.exe 3040 iexplore.exe 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 3040 wrote to memory of 2988 3040 iexplore.exe IEXPLORE.EXE PID 3040 wrote to memory of 2988 3040 iexplore.exe IEXPLORE.EXE PID 3040 wrote to memory of 2988 3040 iexplore.exe IEXPLORE.EXE PID 3040 wrote to memory of 2988 3040 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65d50ef7058b47dee286862100c653b1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3040 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547f20ffe029745314d096c77b553e6cd
SHA12431fe4d63590808c45f9841a7c407f979aa4a5b
SHA256c0f331e5c7402249163beb395794a8e6e75a2398c52a972f71bbe9099b9255f4
SHA51267ad0f8a271b9d920e5a5179d86b71e2a323b68c24461424980302daa64efb4d0e6c022e6f238d36dc092394fe44ea9e61633141d69b4f78d797ed66fcc8f273
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568441a41d0edef3923575c6d7c79b26d
SHA1ff677e17cd552c9a27698c5d9e5dab30249c0c37
SHA256faf03e98345d4cadd75dbe27ad7546f719e6dc6dce67503f146c16eb184a4e64
SHA512049f7eb5aeafcfc172e049d2965eb379f1f19420fd414dd72e964ef2f1e014fc1cd4ad05d3236ff513e386ce67cb1299be3368f334195b0de8b4165a038bfd7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf15e1f1fd390d591b47e9898302669f
SHA11d68a895e11aeac1460538a1a4f3afb142d084a9
SHA25689440922e5225db541d4f030833085fd01bfaf4833dfa4303269d7bd2547e8c3
SHA512e73f53439efcd80b4cf2649b615302f61e348c66323b806281b0e9bd3c091cc253a1fe9548f38fd360143b4b1ed3a77f7d57679ae4dec9b59ece74e09de40a44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e56908e008daf60c27fffcb5440df69
SHA13a0f2f34576929b8f15aea7878ed3f9e48337e09
SHA256563f6d75dff28f81c74fbf8c98d27e52dbe3161ac1dad9be4230adef2357543c
SHA512a21d7f57c1ab356451771fc086a35fb9256a694631320f739a386ae80c7f5ddff784e151696070b86777a1dc951be8358989287b8ffb682e09f9c16dfda62d5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d064f3772a48e2b02c52763bd19e9ac
SHA17bb50e1f4afcb039ee2ee6fe945ed252253d0915
SHA256ebb4e43b7b5ee5e53c3fca6b446e8fefacbef62e1725930fb13c969653d5f919
SHA51269a0f6c040bce8b3d412a1287c93e4e6c8ee609f6686acf4fb0c16164976fbb9adb67eac6a92bba59df432a22eb3413c960d32d7b9511c524f83ac770e1845fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557ce2676bc577abf5bd220c664d4c80c
SHA14e1d7351f7b9c2bd08556ac1c450cc55ec42dd4e
SHA256b4656eb3a795eee972c2675cfd31a1619879d50cd417d2895e1ececf82bbbf9c
SHA512899eb4d68cee5ab4d68eff9b76e418d59e9db7283b4da120286e9887f5561728664414258c50931925e48b91d094d59fad53e279b612a398a1cee863fa98953a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529965ed2b87da79b36a47f2b165bbe2f
SHA14fbd8c5391d3ed25b4430fcc6e4cbb1c4a477d18
SHA2562397fb955a9bb181c498adc4c05c699a16344ccf10ce5362d85b962057964419
SHA5121ff12889011da6f271837f26df69eb25b627b22302f69b4cfd69fc8a9240e258b9698742a9e64074f4ee537d8689baa4ccbefdeb94dc5703cae759b084466529
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5340d7925aaa265cb728ad205cc8cc7d1
SHA1b2dac16ad25c4bdf41aa7faf49924b1cdd4611de
SHA256b882af0369196028903290510ed7b73741bb2849d467ad32eb3a268c32a3beec
SHA512201e6835b1a9a07d3a9d4676689cb8982d4d7e046f7968f52e0b1af3264e57373d92c56f518358eec3fc74bcbc6d359b0f01eab3a60c7bf2a85e80fa3ef4e6d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b20eb0d5c9584f11bd86f4f7d5aee89
SHA162e9ddc16e3495ebbb07a9c368bc0f7508b9f564
SHA25652b592fd66d04c307421b4dd127ac555ea38f21326d4cd2b45eb3ccaee2e425b
SHA5120a9b42eea4ff0c0d8321904855fd39fc92a9c1742205c979e408b2000741740ee8c476ed4d4f00cb58158938b1f6d6e415a99a76d66d9103f62c7d7d4340b8be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0d5577fb357a473829363d5687c67f3
SHA17ed6166f48e1bb78161d7137df045cd95399b34c
SHA25683b0c1c22c66a1a56d1f97118a3de54dbe1dc4c284f485f8a63e4006195e42d2
SHA512781f4ba4dceaadb77f8e210db56b3f1c973e49b882af532c78649de8102bec522283fd7b343a84f4db77d5b46d2c8e7351ab6dd63d6a50eace5b564542664871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f80ae7a99bb7d895a63dabbbe53dc10
SHA168803d75884b3a7c279fe19d209c5064ddd4df42
SHA2561d6d18401a893938594d7b451cc93e70223abac243e8aacf921e791533bd5d16
SHA512aa42f85df4f9d503913f65f1ed084f280d00d4a31031766aac0613587011f8ccd33c927d64fe8f03a25d6484e830104b112bfa68bfcdebf0cd7ea81358281dcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbc57f67e9ae2bc1944db1aa7cbda939
SHA1d7b82fd7f165d071bcfc380049003f7e3e2f87dd
SHA256f85117eb2423dab514a4a6e50c85b4cd49d9f52a66fa85f777008101dceaf018
SHA512880d35fc2d3832938efe062530dfcdc10c928f95805e885f0c2e62adafbec191997e21f15d2706ca21352e100c99919f738650ef205333c5bc48fdbff531e7ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6a3043cc1654157cdf346f21cde7b4f
SHA14c1f9614815192fa6a1d7fe648c4fa6652180ffa
SHA256f3b1654b6f4d4d641506744f30a51223847e44571432c778a8422f37142946db
SHA512400c0b2b6746983b05a39c759034d9efcd5a74f176dde97d1c2be1a44c503e4ab84bd7cbde2592659f3a7fa393ef02db64cc9f45792f74a87e7a6191ab42293c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a70f65e980267676d34c9a71dc2b10f
SHA119cf4dd92131eec86afd798aad1c212c17fbd674
SHA256cd2c519fe0fb876c6f1355dd25551b625541f89345c834c1dd2a2634681ea357
SHA51295609a09ee41af9cf1ba153c56778446cb1c0794fe7a8fbf669d30890f8985430ceb710db8c03af0703f71ec2d2cae894ac144423b4a5ac30ad26e2d64744d03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e943f02d8f9020c45594fa782f8ddb32
SHA1db8bd169d00e0a95af0b455d5c2b58095a460e96
SHA2566b931cb53f19cec1f251d0ba7e17e51de56b04d2d90b0d11d8e09917d2ea0e26
SHA5129e70b6627d52726a82e81cf5543156a615a49f80e183646e318899523a3274e0ae7cd1162f5a11f8cd7d3e7ce50c91cd21707a47915c2180fae931c006f4913f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539db730a7aefb36f6707ed91bea17cd1
SHA114d0be2ffb48c8c0da7c81424f438b14b94b76ac
SHA256548d41d1ef3f4410478b2a4e540b8f2194e1f7c73bad386299e9a6cff128d814
SHA5128fe61c0e32e1a9a3991246483b3a6f67ba5ecea886a5de4e428f9ed5811eea26e130d092d89a1ea73a0ef88d1c8086c3b9cbccb4947b92ec8f335786aead5d25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522be5b31a37e77f8fd8c90094b69ee42
SHA10157f8b6a9f3a03df0769da73bcfcd3a4c88a2c5
SHA2563a6317a96f392b19758b3cdcfc1149e392840182ce8e119edc32880d4820ffbf
SHA512c73585a3df8cb5af589997b933bca254a8ca1f006f58d24d30a6877b5a99281c555ffa91b3723eb97cd21c1aee694375f065e4e6a8510ad65609c5669e26c754
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57166ee598fc7fb86a2ec77795a40ad53
SHA122ddf13f1eb0a91e74e0a605859cd7ddea66ccbf
SHA256ac9915719a1c1259cb5290dccb9aa1ab7ce0d73dc89c20714df4d9e58927cee6
SHA512b46459f6fd92786341e9737cf7966aca515f3bbca1d311054296f84edfe6d9f4a03be8a92a3fafd2434dbd7afa39aa5523bac126c08a5b3a100f6592a5b14661
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ff356c09dda0c1016494f27a48c3861
SHA1951e4d3c3c35dbdb508f7027cdfd49b99c6b6422
SHA256552222ff4cf1f1c6f424611eae057abb1541dd085f69735563eef23b454fd374
SHA512d9c22656aabae60173b945979d02c1a247fd7b25c6c4283cad6e7df80e86886feb3448e02a134a661cf8a00f1dfb43b6fd85220b7584b72076f1e093819e3523
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a