Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 03:54
Static task
static1
Behavioral task
behavioral1
Sample
65eb158b0f48eb0599b60c99d55437fc_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
65eb158b0f48eb0599b60c99d55437fc_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65eb158b0f48eb0599b60c99d55437fc_JaffaCakes118.html
-
Size
730KB
-
MD5
65eb158b0f48eb0599b60c99d55437fc
-
SHA1
2c288863841e5c023bce4ceca63832d69d0258fd
-
SHA256
4dd262a5b0b1daef2f1207e5d706b5bee72ccd5e0c28c2d301b4b000ceb1aeb5
-
SHA512
4913648e8e060d54deea4f9647d650eba114d614cfb0b845f8581b2da261e2f3451396c25b24857607269e9b4787f4fa36949bb52fc7a48258a0e6c62ad33340
-
SSDEEP
12288:zYfwogUGWEdUUCS1TuFQpjANq9CugNXagzHtNLg3YopGv1a6+2gs48uyI0O:zEwogUGWEdgkTueI4Cu8VhQouyQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422511962" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0C5A0F11-17EF-11EF-BF93-66356D7B1278} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0881be1fbabda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004e79e648d3103741a8c15d33ff09aa67000000000200000000001066000000010000200000001999c665139949f121f0420d66333a984c723370d24930ef93852b0776e12994000000000e8000000002000020000000aa980c0e03adb401a65eb6a42d1f19355bba7cd1c1637c590f3a324744f25bfa20000000479a809c2e512d80016700d9a45ac88a7066a6bad07dbb961c8dcf21243a5c3e40000000a00af42318b562763ab65237d3f5e219293049fdd046f4341b8b293c86baeb67e1f4675489aa608d7038901d9e61c30cfa7426520e61e1aac45b5d071c40fea2 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1636 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1636 iexplore.exe 1636 iexplore.exe 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1636 wrote to memory of 2500 1636 iexplore.exe 28 PID 1636 wrote to memory of 2500 1636 iexplore.exe 28 PID 1636 wrote to memory of 2500 1636 iexplore.exe 28 PID 1636 wrote to memory of 2500 1636 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65eb158b0f48eb0599b60c99d55437fc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1636 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554c3212a9a77feb47e671e5c1f369d4a
SHA145776596abe39aa88d9cdb77df942d7e6bb819bb
SHA2563e40823fb0e15dbc5bb898e1dc4b6caa09c7abdb135c8ee401f1011f2a506641
SHA5129085d8fbe53f4e016418a1a966586ddbff29846bfe35484cafa59b9e8647cd4689c425ebf508b74d28e1ca10d3e7686aa5f9e34138c90e61a871fdbf5a04c241
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0646a820ae88299033bc219c39db511
SHA176a67f6b3f78bcd951be8fc79665a6e4c2ca9867
SHA25686f35692cba704ef886226d8af79c7b533f50c5429b88608e06ca95a05a7ee6b
SHA51228bb9025378562b8cd29b3a08143f074cba5c62ec841c2a1384649432cc0d1e65ee203a3044a3f8e716fd4b6c0366b6c9d7c36cf84c5b0bfd42a176973c583fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591e3eded183628d17e86d4de3dbb96db
SHA192c476e2b75ce8345ae63935a6fc202037bdd54d
SHA256432506832328b1a2ea231f8d6b034a8a4ee33e21e01be734ca7fe0e8ba0e11b8
SHA5129576b3c577c588224e7c1ec4d9705d40885f09a0bbce74c409a64b18fc031dbc7329ae48178c32fc2ae0d86f94e88c25a36457e42111461db51793434b41398c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6a6f08ee5675f6e05914cca4ffdcc48
SHA1483ad3f8fff0676325432226ab5c0fb956d94e2d
SHA256d8a1fbbc6819e6b8e67b2f769436b1766fa7b4269488fecf44f3f72decb0321a
SHA5122f4b0315aafab871413259fcfbb981ffea5d2bbe575913699da00ad3a62c85562ef5e69d0f6814c26ab1878c0ca77a41b585d7104425071e8ed63686a693c1c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59eefc3ab3848b1fc42f65c12cd428296
SHA113385f4b331bb6d06e0675725a9c59e2029af26e
SHA2568b8995ea9dbe39cb265e07b4790a3f9aed540d01000f12f7a899ce82ef7190b7
SHA5122aada25d96ac005847e5fed0f2c69715b79abed1832dfe94f52ea59d6dec9739eb422cc209ac60407c3d562bd1a123fd107382907496169c1bcf8ab57ba20725
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a4acc6926fafe114a66b66fef4e6848
SHA1c2c6782a865ab053ee038224417def610ef12761
SHA256d1a6087e41b6b05c7d325834bc0784b2c0904a4cd3d15a81765c377e46241da5
SHA512ea8a8c2c209e332121d677358106846c961275550a24a11819530df1f6f65c9b1327c872b78de92526401e0610202f328ec1245843176c6a643ac4a6b24198a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2a30197650b530e812c2442f0c7cd71
SHA13b253f93705ceb4341a561afc521f3ad72a6a234
SHA256228db794e5804ca89462ce688b7f008fbba56284dd012b4722938f97bcdfedcb
SHA5120ff6e9816c594180f23e39d7a42bb538e8274a6d80b1b89d6b6f1087e52f30b6dc8824e1edd32559259539906a088412de1a9e0ecced080c6bada707b4015663
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5607f52f9eaecbc05797ab0d12eac6bca
SHA1dce699ace06ec2f5b2ac510e0bd952cc38f4def4
SHA2565aa5365a32a528c17f522a89d8d881cc0cc869aee141c07d599b5c5c04be1f4d
SHA512e149b4ba19ccee050108c77b7c371272dc58b4f76687648f9ae6fdcd4d56730bf8dc6f37fbaaee360905c4f809b1f70514dc1e33692cd0a9877cf3d7a915506a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5addceffdab11931e84ce45e0f42fc09e
SHA1469e70922e0368bbcc006a8d7874c102a6fe5059
SHA256bcbc377bcda1e566c82459b0fc97a69fcf0ddb8f717aebeeb6a7c072f4bf3574
SHA51299b79d66d75b0e5c7e245d41b640848ac78ed486b68a041a3271ae85dbd73b058456b75c39ed4d391c76f60a1b974d0864eef2079484b2d1bef5e57750fafe71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5033b9659c4ca8ca45ac718ea57cf5819
SHA16ffa2d609d51bf64dce44279e7b15e87a00fd6e4
SHA256ad20b7623f8dc1612934ff7c8f699fd30aba90e0b0a55415659c6fb1be6059cc
SHA512f24919f31761b052e61bf201e750e5d420690c2c88da57b0b17b45e8dc992f4ae24d1e327af3dead7eb4866873dcf91e7837f8ba1813ec221eaa247d75454fd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56437bfd34fc61c0cfb33c2ac51fe09dc
SHA1264258e85885aac8b6368e8c7f8f9ad1b83d5626
SHA25613c18a582c1223ea957f3eb5f0e5b00a06ecf3a304c7f7db3f7c1c908e02cb55
SHA512c150b7c37d6a842a069765a3a7e87250548dcff67f4613105e46cd1cbec7498b7071e7ac1031250235cc00688ca07ce768548799ef615712b0a8e85d1227d22a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514b6f2faa90c19234b804591a1955d63
SHA178ba1c9e17d60e690c88ce608f4bf61fd1c6d313
SHA2561e5fb8bab5acaa3455709bf4d0ecc80a96903cc82861e012dd49703d0b643960
SHA512373b90bd5acbfa99b51d0314092fa42fe277bb82340a652671648e41a7a71a65ba2003261c983c36f7487de950a387a1d6d253ea97cd6e5febdd021c4958a0a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7b34e11df8affc9c61bf512007d4435
SHA1e5c575e7b763821889e1948f9ffe10604e1f5e6b
SHA256493f64c225d53b5c773a98207e3cc299ed898eb220a1d3327889b4084db9798c
SHA512376de4b15e6488a8f60da4f25a65de3ca99597d787d4389838e8687cd1453fdb5abcb6c771c9f19c53b8bb0e4da11a66ff59885684edadac9915f9efd643bf6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558315dd37e92518b2f9639196f500529
SHA15a40b3e063698dfb628aec604cab5ba03ccb94a8
SHA256b1bb9304496f7e8eb8edcc498bd90c48fa08a890e9107528b6c64379397fa466
SHA512e2360bad8c135e992550b32f7f1d55bee9d0678eb3f57d3ac221d1629f88a0377e1894677e527205839eab136801fb897c4c308170d072d2528009d566ca84a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574d9f81733fe03b175dfae8d8b5c651d
SHA181f8b6330e80227802e7d7bc8d06e022b1d7e257
SHA256737197c2994e3fa121024ff604525a49ca6cbd9b61a2b1afd0db36bf723abb8f
SHA512b3c0353422635e04d55eac1c359159204a37229d093fbbae8191c8a501650d3e9360e96da4aa19224a3bcaf7f2a9e63681c2e232f350e63979a557d98656462e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2908ee31da5a8534ccf8468cf2edbfd
SHA1ed7fe0ef32188e7510c4a37e2bd0cae09b187c0c
SHA256294ce8e4a77d299262df225613a318f35ca9f3f5e2c43399d6d05b79a9377aed
SHA51249c05113c3a4bd41013d97fc4a818c77a92fce05060f319dced72cf2423eccfa87dc650b5953e2e6a5501733e087504f9f1e5b2b46ebcba2e55ca607f48f8174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58115e3586f9c17dcd9862b830714f99a
SHA1de78cb31f413eacfc30f9c09da6e67b832baa01c
SHA256db9ac268f18f260812eb141077bdcb9fe98f909fd0c272bc12aec810b1c77c90
SHA51227849d8e6e065d7e3f9d465b6de637e6edf0f4348d6c5ff6b85d36d0669a044a994457cda409f3d52b7d9f911c4255747798ce5ae78321c3a5c01ccde10ec15a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5948295f26dbf32e7b0a02c8822f59065
SHA19273a4d6c8002f7f2c8d0333d896e49176714243
SHA2566860f67bad8e4cdb4574a7b9a3157fbbda8846c9a82722ed5d13850fba5eda9a
SHA512e7be1dc264d49bf3178665d7886191805c226744ca33f714644fb396363b95f362d3f495381e5db5f8b013847e789cec6423e1332365d1fe9f07336f1aaee585
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585f5087b4ba22131b690cefbc0f36a86
SHA137d7bb09b9b2e8ca4790eaebb16fd4bc3b3e63eb
SHA256e648ea201b448e03ac7450cf24b7edf96a9e25589139f466ca1d585bcf430eee
SHA512cefa878c6a55cd7f1d8a3a03af14a95bcce5a0c11dac6d0876222d1b6fa3d757a908d5aede1b21d50a37e08d661dae6f8a2c1bfe6de7be3eb66ec888b67ab0b2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a