Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:48
Static task
static1
Behavioral task
behavioral1
Sample
65e6bde9605663a59e29c89e82aed0ac_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
65e6bde9605663a59e29c89e82aed0ac_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
65e6bde9605663a59e29c89e82aed0ac_JaffaCakes118.html
-
Size
4KB
-
MD5
65e6bde9605663a59e29c89e82aed0ac
-
SHA1
65792c9a9a195d66ecaebedc2bf7382f34014854
-
SHA256
683f37535b93dd4f5924b486b50c5798d1cfab913b0c61cff81fe4c74f5bd831
-
SHA512
ba86587a66ec79c09db4025709b925795c2223a8c8fd03c211ecd45f8f5b8fe65f76f6cdef999d3b1c925ad90cdc7374f9e5d00012c5d782d8fd00f7a8bf1dfa
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oZR7d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDI
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422511576" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000035e0d3e067df904e9cffcf6f5d87e63d000000000200000000001066000000010000200000005aec824200f6732d0020ca759daabee6552f9f5a58060c276e43f57b6fa8d14c000000000e800000000200002000000067dbd6d2266df7106e02b6ed198493c5d0e7edba8261b70d44f38acd4014a53c20000000bf47e0a617cdd01bf6763be5b17a3961e5179b9c5bbb46898ca5b1ec856fa2b440000000fd71816aed75deaf15eaa124c0ffed6639b7e032ec1592c62d9193f2b03bea17913115197537ac85e8d82ba2b5fef2f64301e6283a66ba21462733e8eb68d9ee iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{26D65A21-17EE-11EF-A3F8-62949D229D16} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50f63afbfaabda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1992 iexplore.exe 1992 iexplore.exe 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1992 wrote to memory of 2888 1992 iexplore.exe IEXPLORE.EXE PID 1992 wrote to memory of 2888 1992 iexplore.exe IEXPLORE.EXE PID 1992 wrote to memory of 2888 1992 iexplore.exe IEXPLORE.EXE PID 1992 wrote to memory of 2888 1992 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65e6bde9605663a59e29c89e82aed0ac_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1992 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5956eb3f1aa33e0a66ef0a928858190d4
SHA1b151d39f453d0f6629d2af8c2637379658b7c168
SHA256af121c3e64e36f136988c19d25f3119d213f67f80f5d223656a0abc6b8c9c6fd
SHA512a1b64204f342eef51cbef609d2578111191ea25706ea30a3918274892bcfb1d4ffaf2750576187aaef15f8d43d98b694330a9dbd8260fb5f3e2cccb1de887eb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59686bf25ce8c4cc88fbc4c36c25a3111
SHA1742adfcb11349a4563ab97d75bbbc3f460515fa2
SHA256cc70b9cf1750b3bdabd329893d830bfeb719875dabe9791baa1ef55c0b36a60d
SHA512c56fc292af0ad62912cfadb693ad5df3b82994900a360c3bdb5e684c33cbc0ff85e533a0efec70168714041cab28ab56d03d552b5d5d8011f6aaf91fc61a592a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f57ee776afa073d0b3db947988f10600
SHA1057d4b34b367d7dbdb4c8f6bfc76f74835e3a667
SHA256ef73ae9d0e3b770a67a6da6b3f4953e223cd4105fbae436e2aad40660047a133
SHA5123c3f2aa578975c24f1290f20cfdc3c9a30f154942f5f9f61d445451f5c8a3f8d9b28b946b4b9d66d5873b42565ba017e9d97ac57e528ba50b191466872089069
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b517b5b0428db96a77c79bbf78525e34
SHA123e60e56301efa20ee73a19f3177c1090075084e
SHA25648e7de094dc9c723cdeeaf6577f26b7019a86db5c2ac82fc3861014fec68dde0
SHA5123ea2f927dc2919b0702c584c357b969cc308f11e3279f99743644a10522544e9396d3e942d8004f499bd8a8c1fa0b25d134aae60c94a5a346fb4430681b6e6c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579e4853879ff242b60a718b7c21fc653
SHA107c242a2e82d12e5186a3e23239618b91993ff01
SHA2568c714bb5113267c6833e019b1204a67609302d04b96c9423181bcae3769e3f17
SHA512c86dcc71b05eb6f8a96c92ca23f6bb94510d632e2d4293df3303fba16db03c257d3814e7503d8a54b49eef0f70fd13bcaf5f4c73ad65f93bb1d3fb38f81663bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eef1dbf5e2856116af0a41b5f7591325
SHA1898c7b5e7568632025b77d9f3b637025f3674b89
SHA25614af6af8259698ba35ccb07314c22316f5ecb4e853ed41fd3b34b4259d525e1e
SHA512f1ef9cb383877b9d582292b7fed34b9bca700d0342bbce16f7fe81189398c077ed4ee8af60f233d5b8bd1392e42b865cc64f2bb65f0123b1d56bdd2e06a728a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b97691de72efecd7c4702b6042eaec43
SHA115b5830dc6e04a87595effc566c5b967e4143822
SHA256416089ad483916b2e51c0e199704b16084eff1da8c8368cd7b4d415510c14414
SHA512c8be214d8c173ebc4ff7e5ffec601665916fab19094805c404d1058f41c36a0825eb1facba6ee4d9fa456e3af782bfba3250a34c2ef6f2fd195ecee193b0762a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b101218c32ee7b91f312ced2ce1bfea
SHA1afb79d41e3cb3134411d348b1237be6174d3a52b
SHA256a67a855fbe805f60a1091a7f63f4ab5f3cf13b2223cdf88b89140e03461923f2
SHA512821d2a3171d58bf45ff2f6f3380c80251071fbb4c0941be901bf94f8f5f06b39ab507408d05ee6046bdc7d0f1567389978064b3d39919f96bd81fd6c376cccd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f9817cf5af0e9e7a703bdc4732a5c0a
SHA105df20ea4047a3b561768a14036a3a8fb54a1448
SHA256f2e95c5f7c5a38aa2ba5510dd8a34f398abc166a961e7e7c506e8f3bb98f6175
SHA51295fcd4c2cc9fd3d342da578883e326cad8a57cb1a35925d6b04f6902fd6ed3b09ce0f60b75bc88bd749764c76099228fda967faac388f7cc969ed052284dfedc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7c2e77cfabc0f5d7ad04365e7c2e40f
SHA1af3e4ba3a799aedffe7c06be5e6b8deffb55f89a
SHA256df76586400b45e891f5da2016c106a0eecd468238f4b58a4327eea59a9800157
SHA51207628292b16e85264522c610f2229ab7afacbfb373d70c9942c13dcd75f362cfe171d3d576e1cef47c63205929361c537d9ce130a2fe79adbd10c31bdc022135
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1e0d2b1e025412faf9234ab1d16309f
SHA168b1db6fe1ec2601c26eb1c6aa5e3a95d179595d
SHA256812b4cc1a9ee60e9926f0feca5dbf83bcef8faa963706e362e859bcac182662a
SHA5120808dc893d266fedd178060a1d775e63b6ea01e70508eee92aeb569a8a2a4bb5e151aeca878d65964b1df7b077a36f65ceb49b0eade31dbfcde1a5791fcad20f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5366baf8609e1aa76acb57a5f956e1d14
SHA1631016d2bec7f4ad78d8f8be7c3b8c9dace8a934
SHA256e12019460e6d1f0789f782c0f23e00395d83c3f5a29f68735edfe96fa9b2bf32
SHA512623651e4e944c595c554ac44bc9dea370515d6f71de89e34044bd8a7b2b1048190364ef8a2fe66d9f947aaad6efd1182530433ddb1c5ff12145da2e48954c005
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1eeff19d3e22da35805e128eee5fcde
SHA16c8cb111a537015ed7a37e4d5bef89fcf6b9a573
SHA256d1f51016a7d12e0eb701693779c1dccbd539dc89a113a44cf9b67b0db87993bb
SHA51270ccab084acbd6ba8c6b44e235f18baf8dfa2e7dd4765b24df7db67102bb2fa029277c68929998433b33871784ee10d09604133f04ca7937de1a4c28f364e769
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b921555009dd97e88e3d46baef07132c
SHA1defea1e0b87252339e881c47c9d1d71d446d26b4
SHA256061855c30600ae28bce4cd2a4ab95b7d079e3a6c49e733e2f65413a4432b42dc
SHA51281e1c4b5b959257f1b1b52579843319831ce62969fd4010266ed1dcf2edab9024957aee6ea91f84de69f8c1cb5c6ab644dd6b7baf88dcf999d6075647e475590
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffa6bbc30405634b81efe426a04b0a20
SHA19f3ea39d0b0fafdab1356539fe0cb2e842759603
SHA256ecd24ed81482fc7c9e3676fe2157a92ce2179ddf8d643105ffe97959cf03b5e8
SHA512ad96c339fe2d9345c2f1f3c78d641092ae22585cd98ffa4840d1595898c9c15d081e6b02c5ba349706f20ee2119b5c161bec68ecdb9fe97c45db3d775f745b6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5647ccc8422115adeb7a26e7f5c0227c6
SHA178e8b019c958bcd46784d36a9bb221f6b960abb1
SHA256009ed5abf66aaa0fcb31bea6d5fef3428056504cfdcaeb6cbe1fcdf5ad09fdaf
SHA512d45d623a67af0b9f6665d6ab11aaf07ab19cc5b91caf5b7731c45653a564bfa16a5ad846d7a4850403d13d1aced1ae362610d2e7e2ca0a5383b7473cdbdaa5da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58778a10bea7df484d275d65a3fdd76bd
SHA10f6287ae6488b4e4a5fe2b76d18e1e9781f54836
SHA25658883c6b178ea82f5bcc430b5e7853cb4edadc0823a47e344880c8b37e3d1adf
SHA512f6b829f3882d4f73364c155b547f8dce09a56d6a886c945439407dff006c14176aa81e6e25f918a2580d0ab91a53a557f5c4fb9ff7e2319a1802e1a955e95211
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5622651b1023dbfab7f771064b1ce5465
SHA175c63dfde8e332c4664e9ead63ae59963d97fb7b
SHA2561fd35b3fd37793f6bb73ff2dd1c4de9c3173e7e6c55f3a4c7f73dccbb60e9942
SHA512cf3d52dc68f9fab9fcceda4e435466e865b50fdd844be8083542d098e937408ba84481a75e2bfae81c08e92343188e5247e06b6d3709b2ac46d4735a4742a176
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c33d61aab6a3e55614cb64304746c430
SHA106d77cacd552843be90bd7ef0791f569fec7cbb3
SHA256191ea85538b365413b22720e0b7606c9a31c98179efeb4b8cabb7593793272fd
SHA512134cd6c2ed505a2795b8ee9fba923ace84d4f8fe3968b632c7b48d486c97ecaf91297a143d51f470314ca82b5532eb8aa9005d4ffae6dbd7deaa9c3ed8732a54
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a