Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:25
Static task
static1
Behavioral task
behavioral1
Sample
65d871bd4a1fd34f0a56a6e4abdc166c_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65d871bd4a1fd34f0a56a6e4abdc166c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65d871bd4a1fd34f0a56a6e4abdc166c_JaffaCakes118.html
-
Size
68KB
-
MD5
65d871bd4a1fd34f0a56a6e4abdc166c
-
SHA1
cfd196a803a3a9d5ff9537596b3d6d3b1b5ac71b
-
SHA256
0522e8c32532c3818a04203d95889d903b78545b4a9d9cec8b8f12730a272933
-
SHA512
91efcf3037205ef16a7638d757a480f429b4ed8f7841c3c7cab5a1eeda6ac5d27eb738233193f4b258ea62d7738545a6b91a2541babe50c06ff2818e68058806
-
SSDEEP
768:JiAgcMiR3sI2PDDnX0g6dA6+t6l4Qg6joTyv1wCZkoTyMdtbBnfBgN8/lboi2hcc:Jmx6i6l4Qg68TcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EE878661-17EA-11EF-8E44-4635F953E0C8} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d09e1bc3f7abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000e30a856a29073eeb77a46efb19061088050638f5b056b16e19fdcc06c4cf5b48000000000e8000000002000020000000e8c95115472fdab8d1ee5d2f0727b910250dfdff1e8e90796f6e4639761f3e30200000000ec185c316bbdcdce5db188f46fa2e5bd95a8d956a98a3520e5ff6f4ee00a73640000000066f9bebf6112c1535f4e6fc82db28d4601d4b7fd5bda3602fbdf1a7d0d3eec1e9270cad820210b797caf81dd317365f6d2915517131e827a96682b03a11a7bf iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422510193" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1700 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1700 iexplore.exe 1700 iexplore.exe 2468 IEXPLORE.EXE 2468 IEXPLORE.EXE 2468 IEXPLORE.EXE 2468 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1700 wrote to memory of 2468 1700 iexplore.exe IEXPLORE.EXE PID 1700 wrote to memory of 2468 1700 iexplore.exe IEXPLORE.EXE PID 1700 wrote to memory of 2468 1700 iexplore.exe IEXPLORE.EXE PID 1700 wrote to memory of 2468 1700 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65d871bd4a1fd34f0a56a6e4abdc166c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1700 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54fb1a8cbde8d59a8fee59ab18249672a
SHA10c26ac60b601e63639fe8b178ac587f3d667de68
SHA256390b9d78bd0008b23e9373177b7c1fe4239e547e44b544009f78e51cf1c57949
SHA512abfcfcc83844149148129fd542707a49328981868e26d88a9b97b0a36dba943c82d09d3dc148b9888ddb75c4c429405a74559463e7bf2c884ac7f015d6629dc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5172fc2db494b81ceb33b01194f5b10ae
SHA12c05b49792654dd269fafd00db4e6230eec13b85
SHA256caffbe08a989ee63fe3b0b852bf1326b74a1a4f0f260ccc116a562c0705e9f9b
SHA51241258b26f9fca50a441d2e0892bb2d3cddac628223985468b1bb5475446cdededfb47bd046137e0274467aa88700a94fe18519f09fea8e3aebb4fb49bef69fc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD57228cbbfa7bf6ac37b41c0fb5173acad
SHA1de3f12614f80ba71d203760a8fba807bc32f6ecb
SHA2565370aad94553e4329d9cd1e2c2e67017d32402dc0bb540644871eaf7796bab06
SHA5124fda8e3a761ce2557b364bbb89de0a90824df803cc0e94c558fd9cbeea894440ec98569e99d1455df14e970a4a1e3f4a625064b771c6ff8ce821f316ae38b277
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54aaa710130e6148d67688fdf30947230
SHA1699765ab5d1388e1dd9051354516580c8bc0423b
SHA256f7134131bdc8cb230c169f8a9dff3298173babec8e1892e417efe4f4f08646dd
SHA512f3c57cadb1bdbbda201400a9a912727dcaffe4f9c0c3b9471782935b515998bf4e1828cdb71fcb56c301400cdf9d73c84a5ad1df835563fb2b44d98eaf9aff45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a164397c1bad9c74dfd86574957ec9df
SHA16ae40691bece45a54a7a549ed2fd333bb25c3dec
SHA25619846e9085ead9382c150f3053652554139ad15f61e16015d4e0194c852ea633
SHA512c7e9498d86f4ace9ef25b514327e96cd7d3f0664e2e4dae864a19d06c9c7ab5fb4e3f5680ad1fbb9aad6ceff48ba542c21e307a3df164d0d2c54499983593e0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5215b68a22e068186e762b4662f6176d1
SHA1e02789c246de26732f0df5056acef7c1bf18c98f
SHA25602af3a265914a91c74e2ef6a8b3a6e9cdd982a016a09d12900888949b8252886
SHA5125bf8cd29723b62569d1e2e9089480510cc2b2adbada82591b2d10df3821873bb3f1118d5337484d147ffa9251dce6cb387401eddd9eec5497a6e4a137fe63573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a0cd8104a7d1aa32e275d243c9bc5874
SHA1da59d388738b3992ba0bae8aac70fee42fe9ac12
SHA256f6bb413bc5a21e561343b43ab2ce2c478cd63c2ad9eee01d89c5b4a909f132c7
SHA512f51c945a02cfd9ea362790ee1db8592b90b3cc3b65f4488fa468093cf4c02b56016701b401f6dcd38b3ce6d62faaffabffcca9c7611be6e4cd055da6309f7789
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b0ef489459fadbaa020479b640f4af12
SHA18d706cecd398ab426fb9c9fe87d2c94c3121e215
SHA25686d5399becaeb04e525a3de48d3f97d34a0bcd3735a6122f721d074d09588dc3
SHA51200bfe58ab7068d97aae2c30c06d775e4c391619dbff3e69d06c1a1737f501a7e6f46ece1403675f0e20af96823fb81808f001785e96bc7808966a38f4c5011e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5090a272eea00bde8fdbe19db67799955
SHA11eabd957d0f6922af8d80f075d80e2df216a396e
SHA2560a6dac7b0be28c59102659d06b7c01fcf3660a7ebcc81fc39625f7a90ac7a506
SHA5128df5fc5f7ceec86a8a14030630cad4eeda92f56d501eebcc5cec49cd9c21e0a5e7cc2b9bc73abefda250e5a98db8e08b88ce5ff381b7c6ce586c63dc6161218c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD57415f3f6d858b34bdb50a9d332dc3d83
SHA18d9b43e88e6a50f9a4e2ce9cf44ed5e7e82e1e4f
SHA25632ff62139941a1dfdfea0f5c7dc5d446d5253ad71ac39baa3b2a2721b0107915
SHA512fbfa300f127d4561ffd6feba378daeab7a04160cbc76c7151905b7f05b7c77322419f33d3850879af988a1b63eeae562abd6da199e333a78599002176d10546f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59382618cfcd0f66cd8bd9f0eb661b693
SHA19c3c5f21826379ebc7c1b268bde5e07d88bb32d7
SHA25674398ed11bc49eebb66bc147b10319e3a941e33a08d18e3fd3fb1454b9610d2d
SHA512dcc23bd2e127336c3ad9c7e8c4cffdabd1a384a85080e641972a708dd76e55d6aa50f433a06fa7df5ae717eb01d83e845693e77ba51b91539357ec031195d6f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD52e8e30ea4956d96bd166dba80f7b72a4
SHA15ecf24a85d0d626e1af7fbab7cdbd87acf317302
SHA2562cc526e5150144aa4b09b8f9420e873a623e22182b01c28ac1ef85c81ec27e7e
SHA512991e9d6500610e802b1f9fdd24e7b7ef3c59573171d0079f4cbbde32fa5d57de1c22b62da53377dc9a7dcccb0a6a95fbe7accc243ea83ff085768c9c8766bb9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55eb6f22237f567eeefa2a08c1478bf3a
SHA193d5deb5b54ef1232b15e7a3133c3818457ae330
SHA25690ee0b5ed9b5d5dcca334efd652ed1acde9a162c0e9feb0b80fc141be3126015
SHA51255abdbf7e49573a02a593121693cd13ec792ba0ba6ff3762358e9ed96a26ccbfb3c6a562cbc98409e48845e66263f11fe8ea3c5f231a176dc68710709f6acb54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5242cd8a10bfd6e575f040e64dca3bfd0
SHA140a58276b3cdb149d8498ca00885f8e55d25d92b
SHA256fd11da27b683611a03602d8108085872640aca9c44b13d4830ecbc78a98e178f
SHA5120c689b29182f3988d30c525c08736023b402fc5d5ea3d725e0e51e6fb5864a59778cbd21bf5a173e31bca8e4c1daa3045367cfdeea4bd1ac544dd2f0a22e26a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51768d4816aeccd709ccd79167d50e333
SHA1595c96517131bd59f71ffe9a5dcbf3727c1f1a0a
SHA256379a6ee455217d585e8d25f3932160716a145fc937ce0da0b5da25cf9c8b495c
SHA5127f25a08c4d2520b36ab991f22ba451289da18467d1e11700904349b2612a980923f9c35af8edf2d1804205fad8f89b3d07b76c5e5c92730ff7c654d99c48e5a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d1ed37f5a62f4c2f74abc09b7eac05fe
SHA1e35b0e1861f1eec2eece13cbe849338d53a18b13
SHA2568386d342a86bf3d67122df322fadff531490c353848e6faf79a6c4bcb3db89f2
SHA5122bfc344951d26a6ddabfb8f26b952d5b4d72a81a299e8d3675acf23e7025c500e4fcd794b7e819d033987bd4a00b3a0ec741d6c5fd119240a0b9dceb5fb3a6ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f865db2ae8b02f461c5d5f9b3fb21445
SHA1e0e6bc591440171599b023a1ec85ab539b5d30b4
SHA2565e401b85d6a427f1f276d2958985b3f8c7d93fad4d9c6989744cb28474f01506
SHA512cba9eb463aa5eaf1f2aee6064fdb0e344a342846b600dc709b62c3d3e94ed4d11abdc1dddf8953ad61a5d866e14757490e5a6acc06887d837d8da63c06aa1445
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54c2867f843beae6405f6606432d69a0b
SHA178db086534963e8c7f0a3543548d545dcb5875c8
SHA2565b7458f672492e9433e2d97fd8a66bb9aa6ac579e935e0fcccdf2f04c94783d9
SHA5121eaf0cf20a7f3df6821781da349f20eb44b761c54bd4f118d58d18896fcaa06ea4dceacac619a813504cde39d4c63436fcb7471e353f6fe532f38bf3c465bde8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55deacf53587785690e27c804cbe536e5
SHA176ccfc292b25e909eefbfbab75c5ea4c798f0fd7
SHA256679aa6ad36844ec26542e64a063ff6bb292789850d81b4a71edc2cd6bdae2dd4
SHA512a098a5bbb368f2f68fe2d7ef32410e69d0abe94ace307d5f0d7cc95a6141321988b3aa22dfbe5ca8feabf27b11038597a9f4cb94593c7d6053e2be48c1fda869
-
C:\Users\Admin\AppData\Local\Temp\Cab49CD.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\Tar4A40.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a