Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:25
Static task
static1
Behavioral task
behavioral1
Sample
65d8df7c015c73494dc2e3f62f222b2a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65d8df7c015c73494dc2e3f62f222b2a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65d8df7c015c73494dc2e3f62f222b2a_JaffaCakes118.html
-
Size
60KB
-
MD5
65d8df7c015c73494dc2e3f62f222b2a
-
SHA1
8cd76c60bf60eccd3e33fddd32dc22005e20165b
-
SHA256
02c6485a56b64083ecac5e0e75b83e9f6977d778b2ce003bca4eec2a9eaba7fc
-
SHA512
522da2cb2c09ea49b78b5458f95a02a914256446b21d6210d1ce16b2b0bbd68b2bb4b92d2dc2d2d35c8c6ce43c250108b52b1ecf781ce96d9ac34f3f8e04fdee
-
SSDEEP
1536:SE8+9z9BXhLemjvQq+uDBQreJL+6h58OIoX+lXSmXTUxIfWIsIbGr6712gNkeEcC:SE1aGr3X6Er
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000007c061c2432583baa263cb6f4dfa74e1f287483bc50d3f31c2cb5442c5e7be35e000000000e80000000020000200000005fa60176a10f9f7fd1f4bcf320c3af899ba54c06b29d81484fa7eb468f26d93f2000000095ebf8bc05d4222c3adfbc53c8161a3a818834f9f4c2a8974b509b3caff376b940000000fa4826ec5bbfd7f52a8147204b1c967e22a0ad29c9614fccaa201ded122888d066867d397972e389893d61a74d1caed250cc6d9684a8d0ec9328dd33b65649c8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90dbf2e9f7abda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422510224" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{00FAAB61-17EB-11EF-BADF-D62CE60191A1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 3056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 3056 iexplore.exe 3056 iexplore.exe 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 3056 wrote to memory of 2164 3056 iexplore.exe IEXPLORE.EXE PID 3056 wrote to memory of 2164 3056 iexplore.exe IEXPLORE.EXE PID 3056 wrote to memory of 2164 3056 iexplore.exe IEXPLORE.EXE PID 3056 wrote to memory of 2164 3056 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65d8df7c015c73494dc2e3f62f222b2a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3056 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2164
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a77780f78f1a574d9c5a4e9dfe9d80e7
SHA1a177e087145afb6db9d298b6836fe55156f3404b
SHA2568dc670bb9e28200ae272c56b7d371589035cee4854a1d80b1ff69aae4f80c781
SHA51259285798d4faf4d4121404356802582f4110dc5fa6052c9fba1860624e2eaad4a351aeba752265d931bc3214660c33d43bd0c6fb69e6723f310559e49a12edb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b20adb8d8dc20ec4c4412378fb18ecc
SHA13d557daa7540fa4b407982a3814c0fd1d07014fc
SHA2564dcaea707a46bc1b44f8290b06bb65eb6f3bc01f8e6c0902d86f3ac77bd1ee7f
SHA51278dd64ebaa66ccd06d1d611466f575f2207223db7ad47f696f6d578bd82e509630ea437907223647fd6b2cc34488be54c43c6c50d08ecc340e8102c63de259b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57aa2803bcd537a99e27297214ed22811
SHA1ea3e1c2c953ec7c2ca07503a198950f84884fb24
SHA2562e033e7bb79b571c6cf1b450dcf68cb41f6a8fe6ab914fb64f2a07372af5f099
SHA5126672448940760f41288a6d97016f934abfd58d91f34d7a281ee1bb1025c6295f3c4799e1ec7f7e79aec19cf107982f7fe149714885cc605e06d2bbfe3c1465c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5963b678add3792597f1b4b1a355cf6b2
SHA1ff19016cbb301b9a8554ec2b776b3df48cef2160
SHA2561a42373f1c6c8fd04ee50dce711276d147b8dcda3482c447c7493739158dfb5e
SHA5120eb1c1b5430dd03318e5c275bf04ed340618447b8ff53ac9850d9befb4f0a99c752d67e2d9551453dcc06b3224c826356ce0bae94a1132ca412f361389e7e56d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4e568a74f533ad79bf04085f2324a9f
SHA1a3734aa5ae16d639f25d98080e70cadbc1ee5b10
SHA256baee84e833bca1cd5f3a83d5cb5d51409a1d2a63ddf6259a347bdad952ec4229
SHA512a5d0f4b2c7221ce254572a61ce9909f262d7f71796bedcb0a4acce66e5b32601176c25ca494266c05221b3c5df731a7f12058ac7a76bf72c18fd2eb4f4e91e63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561b09d8bf7c83d68f3ef1a522e137404
SHA18bb7ce195781ccea8a6ac72c1aa8b69f5620f0da
SHA2566b5f761bb4b85749a06f85e156415f0afe56403b8b7cee047f85fb05ab7d573f
SHA512378ed021ee67ee83d6eb56669e1a03fba09aec947e69f86fdc372b491564ab6931a8b34ae7693c287300ea14936fb5d88331e53ad7508d594eb49a1fdd0f4298
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e0635fa48956d777404c6659b477e6a
SHA13b658afe3ca714e772f44adeb9baf9d22a6d113a
SHA2566efef93d7039f5f43d8126adc9e74b56574d01f31d4a8e9d651587ac465ec55a
SHA512674829f2ad2aab33617552ff438042d9c93ea38457152cabd79336e0c86c9253090dcb4b35ea2350e9824131da777c5d13d4a4909c26ebefa3192eebcd891de3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57fa32ad4d9d5046db497a0047fd1be29
SHA196da47f72b7e9471c71c60bcf4237a19a811d5a2
SHA2569865cb33aa0f5959398400dd02dc37185950725ac0957797f78d16c7bb34a088
SHA5122ac1aa9a7c3e9f5c52f57358c432e14ae12c1eb97ad796f1665c4a5069577b51fe1b93a8e512ee294a28bfa32210c091835e27858a324ee4831e65e5f5cddce7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568439c62f9ae676e11052dfae269ad47
SHA1250c258ed67ce2fb3d609858ead52197b7486077
SHA256cf1f40d51bbc71ccb216ee4697c6d514a2bac9ac5c9a8e4bb95e00a723b86390
SHA512570528cff4791b9c7693384acd6c86acc799f14fbebad06d014e4dc40da1ba1655e8c9dbfe94c0737ef10d2d8ba90291018f5ce61f84bd4ed84c0fda36df2cd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5118a898e922f6620711083635d0a3781
SHA1c14835d7621f9d75497a4ff552c3ec11b3ee2f14
SHA256bc7e97924260e46b9fb0dec93dcf1f2af29a841903250ddda442ea83f3ec4fef
SHA5123d735cb71da46680f9e76412368b27210c6a3da114dd37535b9da4cfee53c54bee567f21d25c7f040605225aef90c8faaec0866c1c8ce9f4024eebec154db92d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524bc225bf43f9a0bdebe6d0efc87d20e
SHA12b8d762f5cacc36c8be9d5394173baa01fb67727
SHA256ffeec5aee633b98cfe21ff9781619acf4d79ec9f8954063957958caf0551d7f2
SHA512c256a545314d94771acd76417671df0c997a1dcc2a3983d9e12b682381887f44139af518a668f60ac869e5865ca90f9a576d684cb12ca48369bb0954e10f6111
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea622cd85e1b2c23fd41226b1a5ee8d9
SHA14648661e2fd86dd649a6fbde2856f8b1461a4b7d
SHA256605c20c3ab23cd533cd23fa3898126ec75d64c62e81cc973be9a29035802abe8
SHA512a57997c2e0a36645c3eb9a1be936ccfab24c96d45125d934c7245651a1bb6d113390952e68670b2b0dc1d8eafcce244d32f51350f48f6ab2e135021843495152
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa86e4180aece417acde1ad516f0b0ea
SHA1e8855bab878acbbbf7b418d2a174496e2c9f237b
SHA256b7f31db4bfa44c6355c0c087105a57c7bf55808a2612a52e9de4fc09c5f10feb
SHA512d4074b4709ecc3c715cb00cbe70c710e00a3021b3d4ca1a1c69050a0629833cee6923707a061f0702e6525e1e6c3a59f490a5d1f7d8b9a4f16b8685ac6a52dd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d4d9f6e315c224063c0747c74341d55
SHA19d37ce27ed9544a36099a1ec3c86aa70fb728647
SHA2563062ed4ebaaeef62c90e684d1d457ae14b5919b9c0bcfc354390211f3d85dbe7
SHA512440be786d94aea68e61398a1d8f3d8f71767211c04e2765da13a16bbe06190e453628701d3ec187cc4e2efd56c719eb5acf9704f4d8c7e83a48b56dc6fcf9942
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d562a882b92ba9f3dc7f7217bca921e9
SHA1faaf0e7cad80da50a766bc1ed09ae2d2435e452e
SHA25672884ac6dda8a87532e1a45d1bc1a7eef0b6bae88b9d4cc9bee8cac1ba90e515
SHA512ffb89b14f587e9934293a14e8b6eed4e62715e13a1dea448ab82de843dee49dd2aef174d5a2157ddae8b8f2f8864648b345c5fa33dbc63b15694d2f7bc504c86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fb935c3ef65db47e600880c2b96bad5
SHA15cc332a31b8e061e934a6e9e1af3dc3032a626ed
SHA2566511cc53e57ddfc781e474f9914b73e0cce35dcb86390e01b6f3c510e71b571e
SHA5123efedf245b96f31d7a189b822d28856d3c6bdcdf81d8db00721100fd71c0a64eab312e4db87a7481ce0ee7663bdc3a95d9d0edaf95ebeb7ff472009ba14decaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597645b772463e5627b0c0114133a3733
SHA1845f295a3a8abb758abc544f6333537132cc8736
SHA256915fc0c12a5d701f48dcfaa3ef1eaf684fd28939dea2c1bb8bcaf9704614b048
SHA512595f455bcf9677c0a5d73baaf103726995a65cce05054b0ef75b0852627efbffd3b3eaee842e85c0614ed59353f54e8e7fc7b5ce88adf49400c560b3813b9bb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c694e76841e5801a81a5c974e43bfe6
SHA19ce4f64e998115b016ea277a983f24295b74dbaf
SHA2567a7c4e76c50f8b2b986e5ce41893ce4fa3e18ae430ecf72e2e95ca323ada7d74
SHA5129eea989dc2ac388ec1429f3c6cea16da623f6798a39277a9530a5576bb3800f18261e8f1b12c4d97b41fc3c52742e18cdd847748a3b4eb914439f85b68b5f2ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5531c2f64a40f2a5fdfa8f9011427efa7
SHA138593ade5e516a585ade375a239fd9c6f12344f7
SHA2568bf97d744a4f5e074223af7624bcc1090cd17ea76880500e7998747a06b25a85
SHA512121fba38dd6abefa350ed57abbe1d3820a9332d0539a1f0047f8737ab9d93c8bbb522ae68d5bb5315af4fde5cc0e40d6d9793f69370c495d0fb2f7a968f5a09b
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a