Analysis
-
max time kernel
117s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:27
Static task
static1
Behavioral task
behavioral1
Sample
65d9d056031e30c31bda7dacbb275dd8_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65d9d056031e30c31bda7dacbb275dd8_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65d9d056031e30c31bda7dacbb275dd8_JaffaCakes118.html
-
Size
69KB
-
MD5
65d9d056031e30c31bda7dacbb275dd8
-
SHA1
44d3433a2d9a58ba1abb674f880c9cb70f586e7f
-
SHA256
333b89a389e90252385b4dd6c313a2dcfb35f4958f653627550ee07e7e3aa93e
-
SHA512
9a7eda5a6e90b49a164d22d31f3d2064c0bffb7e829802434ada58d963a6772d3cc9c8e5553766fadc64020ffb3b67bef5b78da25c09000a845fa09e62f1e2d1
-
SSDEEP
768:JidgcMWR3sI2PDDnd0g6wnb8nbYdYBbioTye1wCZkoTyMdtbBnfBgN8/lboiGhc8:JjFglrTvNen0tbrga90hcJNnspv
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{29840CC1-17EB-11EF-9667-569FD5A164C1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bea666ab125e2d42b5fedf2bfadb25a100000000020000000000106600000001000020000000cd7f0e4d0d654d176ecfb603b1be58e758ad5273c173e3767ff1449bde00a63f000000000e80000000020000200000006a24541db99e95e566487caedd5829c5197ea620f192029ee48596f88de32dd620000000ecaf89547d0b14c9ae7f7d933ab6ec982c8f3896ace47d6f6b9fa95e97d687de400000006aa7729d338848a8dc5e055a68cfc7aaadb30d3a73040c262f785e2fdefa2d80101b9b902009dc25defd625cb0af8e380366e190a533835db297c95e3b78cd79 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30dbcafef7abda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422510294" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2284 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2284 iexplore.exe 2284 iexplore.exe 940 IEXPLORE.EXE 940 IEXPLORE.EXE 940 IEXPLORE.EXE 940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2284 wrote to memory of 940 2284 iexplore.exe IEXPLORE.EXE PID 2284 wrote to memory of 940 2284 iexplore.exe IEXPLORE.EXE PID 2284 wrote to memory of 940 2284 iexplore.exe IEXPLORE.EXE PID 2284 wrote to memory of 940 2284 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65d9d056031e30c31bda7dacbb275dd8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2284 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:940
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532274b3e235d64a0776142d612e3ae5c
SHA15aeee934f33607e962628b492649d3c776bb8096
SHA2568b25960368d0f854dd9dbf0a6aa9255b728c4d06fa69cf8f69d4eaeedd51d60c
SHA512ed59d8cf06ebad23cc5779a6b973f8ee36129935ee6d8c56fcdeae7186d49990b072d56217d1065b963854d6d286985113ff95cf328c169eea64196f48423e5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5312c0cd52d6014bcdac975f7c4a13c21
SHA124412da6a40cce542da822117e9f22805ca4adec
SHA256552c5eed74ee773b8de9b9bd7f9971ae75c79bee57a985ae047a8fe735a198f1
SHA5129ebf60b1a805cdd8d23f7f0ce8a789b4758a335ae0b8a4bb213810b2a0c20618e0a5b393fcf506c4c3717a194a015a10d4d595e75b96ce0763a42de51e5eb2be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c06dfa027567be1a9ac924639fc8ac42
SHA148fbf51bf4faf498ba859884fbca2458501f3f61
SHA2567b7a305039c5ad8aaabd2cb273edc5e21037bcb2f951f08d1dead35a85364376
SHA512107dd2c5b535830291668f80b6bb6356ecd1f858b4a757ed416b633cdd884f2fb34302f1a00d93b2c2ed3ddf67dc88e4f97c3801e74470d559c5ed950408cb33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a6d35b30a7089e7775979a8c22411e6
SHA1b2fcff85e208dc407c5b127f08de1ab52d02a3da
SHA25667e49e408780c5341387e988e2298f163d588f876980311cf72012ccf60315a7
SHA51286ebb0fb9194da82e43eb1f77123617d10fed66c3ea1eb0fa497159ce7cfc61bc0b416b53bbef62e9a09fb2a373178a5143489b8a0448686ce139204b15153e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5378a9484dc5cb5690e971a5dc2e45335
SHA1353ad0716e2548f16f3c92cf8d79c35168f72db0
SHA256e266de42bfc0c11e2a6441e5823e695c1b7516605b403904a99307155daab81f
SHA5126f4efeeb3d7f40728d52362a322dfdc1197d35ba77e80f7d2df3be1aeb7cbbce9c9255d0030cd270e921b633b079e5295687424e8afd6d5c500365a1ce6416f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528fd49aa7a14db5caa04b8b49e9591b3
SHA1eec94b7795aaa2a911deb7074645bccd47dfd1ef
SHA2567bdfe6d3d9be92e8385b89292012fb6ae1ef75e92905c727bb61e71beae543d2
SHA51200c9356d27e100559e1e50694cbfe3f2e829144d67b57f19e0989b91727fccc4817c9c814c60791d3e7531e3b29ef39c739afe650452d665cc6a4baef213c121
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51535d505568835eaf02268c8583def33
SHA1a0ec70331079ac0fa6c86f4af616e6d6e6b97d53
SHA256f58ec8ff1a383d8ac45bfbf3a93c83b6676a012ffd8f4c50e2ac5d79b80151d0
SHA5122a095762e8a73a42cf2cb3c0beed27c6b79715aad8ea2ee94e0c5cecb4ae26f3791c2d1629a8251076a828736ffe82b69a43332aab5a585c94a04a4ca151e04f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506734b759fed22a7c025e7731c7acbda
SHA17aaff2ad2fe5cf0cee18d5033e70b861acea08b0
SHA2567d739bab2b2bb447dc785099025e8f4b79d28515f97d09d3f8b0a02f1540197b
SHA5120e262b626270ae03617e2b686fccb31d1c6d9ff301c07d4c72a10f782bb56a62e3a44aa7292f58e95764de5f27e176acc28782a0641d58bd7a5c299b4c8b6026
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595ea7444dbcaeb35ba81967441aea229
SHA16a2d39fdcd3760b1a6a2274e58df40c38c3dcabe
SHA256fcae1648cb02a039640d90a02fa46674cb5056897e51d45633e34ce5e0b5566d
SHA51245917c55a9c948c61f4eff9b988e87dd838a2e0b906aabd212f2d3abc2d3b0b70bd1f1e2421a88c9e9de256b1518107c7427edeba4725abf5a1fdeffc25c6877
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ba38fa0ca347dcfc65d6c77ec4861ac
SHA1f95594b8b1ef27ee1e1fee586ec96f341977a22e
SHA2566c75ea1521e2423dbaec1d7e7b72ff5ea4316956c97a7c5815807e5c412df4ad
SHA51254927a398212b89df6b2dfdb5a8ba5e4126837d4e02a738f2ebfa8cd51e1fc01dc657248687077d3fc2d9d59fbc45292e2b1a9ea9b4e9fa2c5ee4f838a5dd84a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d330d8e1509799725d62b7f3474653fb
SHA1a1ad010eda9ffd0a9402c8a97e123bb7bfce7423
SHA2567c7cc8a758663a5a68bbd5093708d0c070a948e747736b8a1cb1b5105dc39991
SHA5120403296697c979db38a37a49ffe274ffe52154ee64c251df21f6149fcb183fe38eb8f6216f25d5de25b7f2a0d88876f6a83723e9aa5ea65bc7ecf5fc8f6a18b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b7d95f95dade4cd8f221a9a8bf8adc0
SHA148698c54a40a1d22849b39671f4eb1f6fd68f83b
SHA2567bb456f8edeb167c8caab2e911c554f571c07a0fda38576435e39f026a7b36e0
SHA51296d540ddaf024d1662b1ca5b6c55f130733608228f826c6ebd3409e5055636b901fd3b98cf765ce93b3baa2282f4c670f79e6e9bf86c940ef46a73ec1f616da9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb134d21b2867794ab5bcaeba33139e6
SHA1e2e272caaaa4667b38f546d5e044125f3d5900c9
SHA2568304f991f9397dd82abf39144ee1ebbb8a9cd197cbda9795f1586c877cdf2d93
SHA5123aabc80f24ff4b047cbd57f0caae5d33e89b61b0820087b9c0e7620cfe41b696273bb09f214c1afaceb775ff8da8c78955e9d5aa56aa2321ab928f1efb7e5dad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1636ccc41115822035e24f2f8a58e7d
SHA1e2f91c6999e8ed8a9314067ed93e819d176f22c1
SHA2564153b830052c103b11a00cb231844b9c60124b07d88dde7bc7c794aa35115a01
SHA5122cffd523710aec99bb19d3d0873335315025c39a9fb18057722061d4164d2b54bd4a77757b794ec1bfdf0fff78508d1726b05c2bc70b4bda2e2143cd4f72e797
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db81a71c40ce8bdc6f60b4c09251c88b
SHA1cf6a479c7acca76954128de3e1498a50e2085a82
SHA25634e184ce4174a8c3b3ddc570ddafbe932023429636f78c971f6bcc6f3630b82f
SHA512ba6a6b32219ed20227aa424a0da58423e3d0c989206885846009210b7efa06e9fd8ae780c6c42cd723eb542757b529a64783c128a97646f70b189d43052aba84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b932fa4fb6df44c516ea28a2680c074
SHA1ebb0bcf4e820acc2641d7e91a4b75394cad2394e
SHA256798c75d074bffdc2b3682bf54ea43d075415013913bb434890abe31e12c8b1e7
SHA51296efce91669546741efa78f18df7a3e18863c91e52bdbc3d877e276b5246bf811d95e359365d00804810e9b4a3c4dab04b4738bff78722de8507f9280546b155
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591cc7d3f259c7b038a50852c591ae6e1
SHA11f25a01fd0d53a4cc19d71d1f47d7f8914a23184
SHA256ea964c2ace7f860a5a177cf1c186ec5b4692647e66d9e46154ecb6f814e8f279
SHA512489d44f4deb6fa0119b21a552abdce13f17216c9a98f5cc5b7165b97dad6d54aa32bad905034e7c901d06b4bfbb64afd6d91a821cd57e6b58e435851977d5f6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ae0b97592cf9fbdede8759437ea7fdb
SHA11aab8a2cb6e738e48f9d50528739940901126994
SHA256cbe47a1dd20dfb193b0269e375300be300a300922f89b3a208babf3d3525922f
SHA512adb3bf6b8ced3a318db017e016da1df9527a64ba25737523ae25cfd096a0f8b2ffc37674dd2060f43c7b8a3116a40cae03fed067ac762346733f2df1133941e5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a