Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:46
Static task
static1
Behavioral task
behavioral1
Sample
65e594fd5102298dfd3a32d94bb5eaec_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65e594fd5102298dfd3a32d94bb5eaec_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
65e594fd5102298dfd3a32d94bb5eaec_JaffaCakes118.html
-
Size
69KB
-
MD5
65e594fd5102298dfd3a32d94bb5eaec
-
SHA1
30bbc59ed6629e92d9aa70299c71a030cde33d44
-
SHA256
5edb932612aa4af967117667023a40d7cda17b5beee0f7b59fb20d28fd5478fa
-
SHA512
0b7ba9cb43d43c747b4ddcd297c41e4ed0e2fe27cfe7bcf20e970630cd4de33494895b11e1a2c1fe078ee3b61800e93b23c61c8c227ac8883d6bff8cf216fa66
-
SSDEEP
768:JiFgcMWR3sI2PDDnd0g6scuJfoTyZ1wCZkoTyMdtbBnfBgN8/lboiGhcRoQFVG8o:J9GTSNen0tbrga90hcJNnspv
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 903739aefaabda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D9647471-17ED-11EF-822E-56D57A935C49} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422511447" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000dbba24e278c2904399f733f43556295400000000020000000000106600000001000020000000c28407049be75d7ed3d397375daae180ed34b39fae572687cda27f2f96345e65000000000e800000000200002000000004edea530626c0ad6a5e77e865c3fa0e43dbda28aa145f8a61df4b7e3e4e988e2000000032bd2abf8aebc7253fd7ac7cc87142b17bbed17f6c05980e1f81a91551cbc78e4000000045574ba2c8d2eee75e5d57921352185c6118e0476ff970cfc166720b120d6d5ebeca6da6afb4ec778ebb79196006423ec7034168a6a8bf2d51928bf817d0d23c iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1676 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1676 iexplore.exe 1676 iexplore.exe 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1676 wrote to memory of 2324 1676 iexplore.exe IEXPLORE.EXE PID 1676 wrote to memory of 2324 1676 iexplore.exe IEXPLORE.EXE PID 1676 wrote to memory of 2324 1676 iexplore.exe IEXPLORE.EXE PID 1676 wrote to memory of 2324 1676 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65e594fd5102298dfd3a32d94bb5eaec_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1676 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551d1430e544b61f9da946e708cdcbb2f
SHA11a45033cfab24513edc46e19d7df68e004320189
SHA256a374163e96bb639d5fe56555c0b1a722a1e89a6712fda32d6b7f73136062dbfe
SHA51218a3919be3f9781490bc955f19c770893e94202fe0a504bc919995114621d9b6a9139a559f6f5e9c5d1a76b1f9e17dd3974ded3d50720ad3f8a19bce95a37810
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5480d2344158b42b14045ca5917886ee2
SHA1165a7092dc1fe62a7e486cc09b2f262fd2a221bc
SHA2565c2548e115d95d9e59550fd405cb04f5ba80ddc6e82d572bb8b42fc9fe952601
SHA5124ee3f64b707970526944acb6157dffd556aac56b678c5e7c678cae4db444b092ddcc7ceda50d654661c0d91982a381a78457422c0c42ab4bda0ff110f8847ba0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5777a75f276c53da0ac92a98de6279d00
SHA10fca0b8c6c4ece7245728dc6ca9399b1b2c3275a
SHA256f6625ba7b82de50e5c91f1078b7a16c56c54adb32ec43bd57cb20a948c841c17
SHA512802664d7c8aa3cdab9224c715cb76c8419fceac65d827d9e8954782ef04ebeb72b3f29619124a61c49ac1e7927950a0046993c78c47bfa6e61b238d29a854ff6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db1c51cc9192bbd5ae0594dcb33e1ff5
SHA1bc1f3b2ce8a78e0bf6875aa5b9219459931a3798
SHA25606c6f346d71899e913d213231702aff3f8a198a68770e1530652b05d8d067cc1
SHA512684529df8d9599258c6a718c014f99fc36c6c0e5a55dc037917427a08f2953630fc95f33de25407bfaca9e411aa547ccdfa79e72f58cc7a5b6f334ea168bf513
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa97720199ab7d1dcddaa05c23a14cc1
SHA1b05ca49bf1646da2ecde179f28c75466af19e93c
SHA256298b8993d1df4a6ca49099d6361420de2cb563c2749d01ac5ebe28ba2dc45297
SHA512f8b88131bb6d29041f575d28fe382798f404c31faac30eb8f2701178930708a1caa9fd03132e92f03abb1adcdfc9cb0fc2804919c6b84ea498b3fe56dff0c300
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52eefa30bc744c7d7a7841918a545b813
SHA13e64fcfeff18618a1c11aba329a497bd5d748ff9
SHA256f3d79ca0b5ec3fd8cbabc6b97fdb190e21dc0809fe32c2a6bc5f6aec7c490e3f
SHA512b48cb0bea00dd15779d7d5ac038e1d8bc69263075f094d9508de3ff48f0a2e6485ead9c1485717ca959368ee8fc7dd1de506613b9ea74a12d68dbfa945d4b4e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546f86e847c90e61e0b65d8fef41fb9b3
SHA1fb41cc3c6af7b9257654508af58eff6dbb868bf3
SHA25659cba81a73b9bcd507396dd9b10ffb8e745c831eda8409901f180b3d0fc8b65e
SHA5124d1e8358f63372b005a1ce5c522e746348c34722e84331d8fd6c0b31f4b05ea071044730e073163d1b66aa5be33a41896b0b55ad4b9b5450402df01ef116a34f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53227adb8bca2c3d07d333c418354975a
SHA146f3ec863a469c8f55bb0ca3db75c693639fe706
SHA2569d80e8127107a43be928420960527a778bdd7f2d5e049422f918abc8918a1d52
SHA512ad696dd5bd8f6176afe35bc42fbd7e54058d14b32bc8ea4c685ac64b58bfa427ba4b8f6b0186d8fe4323e417013f29237f188fbae49978b0ea26572f30dbd6d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ae07f40340470d598f9191c3d4f4381
SHA1056308b38dc487974c094884acf426d80584f49e
SHA25614c324907a4abfbddb4d8026bc2ef09721f69d437becf82966253e7dcd70b2a8
SHA512a7f64704fd9518e704c24e0a46bee531e44eead8c839ea7bd117c87e693cb36697a91acd6ac5d68d670b48b8ff66e9ddd225d7e4058a6a4a1fa7be0fecab478b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d301e60a60679246a5fc686e309a2daf
SHA1f3ce64bdb0b7509ddaab8f9c2e8c8dca87d5e226
SHA256fc09fe402532bfe83c73e2391506a96dc23d062cde665c5c3b0bca33c1c1aab8
SHA51215d586ff472580f43e2e2521b35c640cb986337d7b125a6105dc7102bc7724ca6a53d0b7945005a883d4354df5ff1bbe2f2cb3b5331030f804a69fa67c694854
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514d6dc24914577eb3aa2093ab2407322
SHA1728cb2fb98b1ccd4d471f98262c4bd717c2ae8da
SHA2569ca24945613391b36fe2cde8d69a8afc09c969193289b05a37ead7188424205f
SHA512ce2d0d22439b373553a22d91137de0f247740aeca563d646e55fd9a20ab4dd9535728eb51e9ad4ae3c12b87240896dd8f4eeb9f1c59197c0540115f1082d8bb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5449db1570217a7f07e1da4a7cc30742d
SHA17e0ac23ba7e67eaf7ed87822f538bad4fa352627
SHA2567722340773376ce5d98b10f6b4c9ce6d583bea7bfc3ce82ab300871ae15f978c
SHA51261c3963a8481b7a8768af0862abb94cc5c9e3df4e44342c72119fc4c01492e5a771c7e3bb5e58b67f7af6ef74f25b365c103b81217885f2f3886c54f65d25ebe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a35963057cacb4882ed711a3ead84dc
SHA1808be9915bb6a5302f5995c2308b9ecad553bb9d
SHA2566cef464a7b84169d53075fcebf5ceb42efb09ff593e3a3f72c030538ef2848dc
SHA512332ac587e7c3cc381470048e319522440a9d01a24a19afbc89a1d3c81d29eec4369599752e1ce9f3ca700422342c765b92452480d5e93f2b6d9e7a3fe880f07c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525d304c53babd87cbf079027031bbe30
SHA155498c7f3b0176ae3b016b6e4c6916ca737aeb12
SHA256ec4c5b999c2a62af65351c6b14209b680a709e9e8ae863ed31b09fffa6a8c3c1
SHA512eb7a61da85b9872e677c12bf0e3682f5265345ad975a50e1a8c78fe621eabedec4165b918f77174ee494094c1a8652a54ca174dfeee975771c0c44776caab0e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e8e58e79e11587975e00656d2cef602
SHA134816cfdc8779281f8e9126012eebdffd7895fc5
SHA256a21ddd6a4fdcfabc17351f86c5d39e77c0a7cd4e1903d587500f989cf7e60b48
SHA5125166727045e400010155005feb6e5efcfa2685a466a08b676cedf92a0fb8af8d17e2069b1768787a474b2a76395705a097220e0e1d73a045a2eb36fe7c51dd90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51936a5fb935badead0fb80f9fba47506
SHA17422bc1376057ea1c962a69164a56ab73b64adc7
SHA256c9f688cc4dc4fd632e28c408132a155db01a530df80f5d0826b1be78d5462b17
SHA5122dfbb2b4e096b2fec4a931769507020cea75a463e0b8a2482457f99b3d7dd85f30513335691a0540bff924912a22487b4d813d7b2d6c4e1fc6fdb617cbf319a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5ae4e5147631cba11694a97df03898b
SHA199326e2e26e467e30be592ba68a6609119bfaee6
SHA256f133ef60fc4f9821950201021a109c87e8e995e5767324f05ad521fc7161af31
SHA5123696c1eb842e6302db9e83f8f0377fa474d25828797fe2873045d4ba4cd3caece4b18a8baa20e4d8702fd890afb17eef3844b3bd9fd31d736f02ca7d17ad7a1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589e6eb58aa2d06436dbb1b8a68f5b6bf
SHA1e02f5d0c9dc39debc60628dd9615583f10b26d66
SHA25674043bfb1fd7bd1d2c0a0d9173f6ae028c7dd78d3b8f397e775efb6351a2f633
SHA51222f8e404dc6a3692260960e3fc483cf1ac652b2314fb2f8db14b87edd57c8afea91b7bd719c6fd61b5271a6ae731c87f7c72e0bf16162a46e1c2f07f64e010e6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a