Analysis
-
max time kernel
120s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:44
Static task
static1
Behavioral task
behavioral1
Sample
65e495b0ff28eee8febc667939f8810b_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65e495b0ff28eee8febc667939f8810b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65e495b0ff28eee8febc667939f8810b_JaffaCakes118.html
-
Size
3KB
-
MD5
65e495b0ff28eee8febc667939f8810b
-
SHA1
f2e78f0ea1a4d9b4223747e629ea9130fa9d9ea9
-
SHA256
7bc54d6016310dc67c36e4a472786ebc5f3b7683ad1455e815f021a29d5bf1b3
-
SHA512
8edd3021ed56de3bd21d5172bee4dc1fec6b83371b94d6c7cd157a3b2774ce6182506c6ea6f1a5d1806b611019d405bc2ada6de03350707221dad0885e3bde27
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40925f7dfaabda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A899BB71-17ED-11EF-B023-6200E4292AD7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422511365" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000005cff22d2d2e96713eecdfeea5f9add64f3a86846dd70a82dcf134b80f95d7cc8000000000e80000000020000200000009f3b7cab726645473d4caeefecdd72c63222054c57cf32a502854164a34303c4200000003baea6b29779a536781d8a5d8b184532cddbc8869d9f9f4364b47d5cfe69f5d5400000002071ab3cb783d1b505e84db682ec4e6987254e8c4dfec1aec39c5e664da6d935d7d8283b5fd2eec7ca068957af8b4f2b3509941b4cd316031bcdd09dcd73a16b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1920 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1920 iexplore.exe 1920 iexplore.exe 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1920 wrote to memory of 2612 1920 iexplore.exe IEXPLORE.EXE PID 1920 wrote to memory of 2612 1920 iexplore.exe IEXPLORE.EXE PID 1920 wrote to memory of 2612 1920 iexplore.exe IEXPLORE.EXE PID 1920 wrote to memory of 2612 1920 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65e495b0ff28eee8febc667939f8810b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1920 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56471661e6e3a0ba0b7cc93afacd8c406
SHA18252d6b56b3ec0839bd761ba9060289cd8fb4ed5
SHA256830fac0bdb46ee6f5edf99e4cb4e90a34d8af3157ba5d3714408dd0b62c809d2
SHA512683d2ef0d89fc383ead60cd053236258a5555dabb887685c37b6626fedad6f55b24f9f636a54a1cc9621412c2ab6f784cac46460abc9bcbfabb2fafb5e2578d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD528c437fb063ea00cd2a419e80a6affe2
SHA1800bf3206ec840ef1e942ce7f3fa0acd4d1e8486
SHA2568225cf220c6f81454fb3dbda4f4d9670b13d62f3a3e0b13c1acfd61d62b2cfd3
SHA512f8ee07acb5c5224d03c05d3a07be7d49ac291d4ed0b06dafeac450c1e13055c7792f158a14780b422b221d9595166971a601ac80ecf16c6c1312fb51e281b1d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a51304d5641d1d6e4c2eb075d18efe08
SHA1b9e958a28d63dcf7d806a55c30f4f5b79ba6943f
SHA256b64dc3d19957b7897a9ac786cb297a342568eeba0fbe55ad5bb779008a26ec0e
SHA5127b37f8efd79a6e5fe8d78c47a567da522f434cb8293fbca9b323eb2ac2d05d3ed5526acf65474455f2e6d5e22fd59dbc81de79581bd394f094b26f1306164cd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d47513f7c6803ea1fdf6071abca87dc2
SHA1f3139c2a691a65a9d9d45aa3d80826784cb9edcb
SHA256f67748e4eccff69cc33bcb0eafc2b189fb5c966dd58d8fec691ee7de1a646066
SHA512ec18faf25acba6dfc0dd6ce84e007380908af46638a6c80e4976600fe8cd73c2d269b59f4b19b0d2dd6d0152191f324ac00db7311c9cdbf850577d0980897a0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD588c8aeab56b270388e5f21d5cdb43645
SHA16a89453addb2d96e14e9afaf37d6a79847944d32
SHA256ccd1e76d777c10ff36e7ffd8cb9eaa4749c300ac48ea13fc6c68832071554305
SHA512a79e7f124a7bfab5322ff3d0ffc866eb12fadda90367ac7679d00552c5e65d7c356ac92f7d4e9f49d4b5f7769656eabac35916c04c758887762fbdc13607f2e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55115bfbc8f0ba1dc377808932025ffa3
SHA16412520c2d111fbbf0b1b0641929c43905e02c3f
SHA2569d33e9fa232ed061e7ca96f3a13ef71cb13904e5a0313f99c3ca1e4b6848ea29
SHA512e8f3d0b432f8e82efc3f8e2c5291a026bc7e0010f980b94a2bed101839d39b5302386cc5d5766d507c64cdc48d41b10ab446432dacba50d66a79c455a20cd724
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5aca47ec826c903c60dfe99d1b26794a9
SHA1f9e62b9fe63fc4304e0843a7e81f17a10c69db0f
SHA256d4b1a67c4630c8b61510141ef55eb90feb3709b5fa212a204e5b6d4a747cc233
SHA512ab5dedcdbf72729a19ffe44186cc7f63dfbef22ff3bc303bce29bfaa544850127992875fd3d8abbdc26947bf176b4635bdb07afdf417cf243801f9840d861be2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5da2adb276c156215a8fb3bca60c0d9a9
SHA18e945c17eddf53d0257fc95cadb3f07ca9b32557
SHA2566a86968155cbe69f50cb957f0a420a1af0b6d9f3b20994be7b1437bc8bc107d2
SHA512769bddfe1ebb351acab6da6c0589737f750eb9a9352ba90f2b978c391e62cc77a4074ab270227a15bbe310fb5659d349205cd2f49d312a94b71b1aea05a47afc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53de1d043f6d77a2289bd6412db56e1f7
SHA11a40dd5dfe27b226a59ef1c1870b5031185356cb
SHA25603f5f280519bbf4e91f459185647d113b351eb37820b805a11b1236bfa75dc55
SHA512dc889956342b0e5f22781f2998b559336fa724e51cca3723c2c674e78c1d86718d772756380a8844413810e6ef97f4492561db1ceba72f07baf07f030db5d246
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD553f812142a82418b037d02b4b9323ef2
SHA15130c5fb000257076e40245b4e22e01311feca93
SHA256eae35c70ab1d6f99854a6274f45c41767793e05bfd9497151061ea050af62752
SHA5127a5b801aa6140288d8fc26b23f9a342cf9115b749a82fc403e5f1ae023ce235269b7268bde35cfe92261e535597b162c1ea89f8c0d259032b10aecd8f185e429
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59972f6f57049fbc45f31f83cd5b42b3b
SHA1d5f4944ee71e3480a181ec0e3d18ff0ff84767db
SHA256cc56a4fb4f2ea815c6e58c17d58453c7f2654d9dc0a6cc888c432b25a9ac16e6
SHA512a675d1a9a3d7c0944fd5275289fbea63057b1b37c6398c281be701c176702bbeb3551c823601b6f7ecc08bb36e7292d4ece5e587388d4047cf647b44b6dd4e1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53be1146cec30fc7fcf9c02f6fb83b655
SHA18f19d2764c71c7d8eb3f5a836ed234dfdfb7e5b8
SHA2561efff12f7d5404166ca4f67dd0186063669888b9bd9a372ee912eb1456db3787
SHA512737fcbeca9bb838bab746c660614cdf70852e6f666048fb435e548c40e7c666b1c92c4d67683734a9d33c1aff253f7c387a3b7541a4c26b7c9f31439236d2483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54085dc205bb9a0bf3a410e6f88c8ce5b
SHA1392989027a75a64b7c4d750f04bd704c93ee82d5
SHA2564736d4ac5687d9ce3762510c143944e726289d8e6404d6346f345bc68da30b0e
SHA512e20043d8068240bcc54d376bf18cee0c7d19823865b98a04afa329ae4f3aaa62b9d36448fec3fd0bd0975550c7153085b6f1fa33df7d84f0f46db803d4a3c571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD591dcbd645c449f3c60a6be7760d506e8
SHA1f3483f7302010a621cf4debfea6f2e4aa101770f
SHA2560dc17d3df2e78243abbdaac217a0cd0297034d54a54f4d3dfdc2c488a3813528
SHA5120add3cecfd25c99022d76dc2cc587dfe0cf511faa001656093a66423dd1dc0adcc09662c1b73b129581ea02ae401b5421e3c4fb2d8d30b769fbe7c02f6deb181
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD58b54b8ba8215d1238b639b9276440fd0
SHA12c7402f13c09198c2ad2a7ba003b23548f730945
SHA2567b4a340e6a5e56e344c2f1dd370457d6461fd2a7e6f2b4cd5aa7da9bb28f9837
SHA512ed2edfd8181b76bcc259a7b4fd794b955860dc4ba29fdb735860747fc000a21c72d822f6bdeb5080c52eb9e4bc4f4278040881311d0ac8dba16e785b802204d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51b54a0aa192a581ebce57e66f157d5d2
SHA197c74a90aff4bb817f0274a8c6c7251a45883f0e
SHA2560682484512f026cc9d7d87d986fef485bc5d9cc083b48ecc9fc4243260f55880
SHA5127ff3655731650423a2f82c7e5a5eb2bdf72b535ed58fa71434b5b89f19b8f308debb6d0514f2a38be32a9b4442fe348d12b17c040b956ab2d5daaf3bfd1f244a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5db7121c29658d102b50c732aadfd7f50
SHA1b27269e11096d5f48a6031128329eb398247e752
SHA2562bc8488d5f9216fa5a398df118909b11792af33f1683b88c199d49ca3b4e156a
SHA5122d7d5f1b1a457806c3537db7447eeee6191e73546877b30ec46ac59863ef0739d276abec284346a18d260b1e8e43905b53f81925d19159ca24b9551fb98e6d5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD589219eebf2b7e503509b90778ceee334
SHA10bb80902d24c1566a3fee9a5e46a018965f9f736
SHA256869f11922ab0cfbe98dd49a1ddf61dfab79e395013ba7768a2f4532640262139
SHA512996a51bb49fb63399bd0a04957de684b16a694c462bd168cd4b3fad0a59a133f8df11cd723637d111a3d0b2464f167d0e896732a811b4bdce1d1bdd6762f6fe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54be5436f7845cf2f3d4806b5f0e9e97b
SHA10171ca8817a4d0a3863743b57b289ba3791f3385
SHA256c1f0277d75a82eeb9efad22e37de7729e45de24845e730d319a03b5c0234afdd
SHA5129472cc38aebaf0d135ab7b1e6a051e98c72aa84ab33b87afdb7a620ad3b42f5c9f2330979c8f4241c58b54c89dba7c3a23b880a1271017bc8dcfdb98db74a4db
-
C:\Users\Admin\AppData\Local\Temp\Cab2E06.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\Tar2E76.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a