Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 03:57
Static task
static1
Behavioral task
behavioral1
Sample
65ecc775c5a853ee49d4ed2c59ebee2d_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
65ecc775c5a853ee49d4ed2c59ebee2d_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65ecc775c5a853ee49d4ed2c59ebee2d_JaffaCakes118.html
-
Size
72KB
-
MD5
65ecc775c5a853ee49d4ed2c59ebee2d
-
SHA1
e73b99670a630de684e99460d44e67701920b1c1
-
SHA256
8551013ddcaecd7612a267c8256c5ff6a3a6d20509a5676e2d9cb76487727191
-
SHA512
3ddb8dfe7c069f3c8ae7c68056d1542e35fd2b2efa0f1f4ee533c0972f6cf4124627ff955aa08bf774edd36ccad09412f5f25822d0732cc09a938da0fc14e660
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6s26voM9DkM9PioTyS1wCZkoTyMdtbBnfBgN8/lboi2hX:J3oMSMpTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{69E60E91-17EF-11EF-9A72-56DE4A60B18F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000e2d76d165172645977514224a641ed50000000002000000000010660000000100002000000044e55924bb0037f2b3eb661a26139649243122dac49e1847851b18bc2f624920000000000e8000000002000020000000359747c4eb95072a54449f2820f54466313f89155c63887bfea46b8d5adbd40a200000009da84c05c5e3904d49dc2906f79e9f554a624895748d31f53d86bed842f757ac4000000056414aa1d333c88f22673d4e2e492d2d20758a18ead1c3416d40b925d923996433c97cb2fda314bd5226a54e51ff6788befde35554e7a03cede9d2eb68d4bbe5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422512118" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40a9a83efcabda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 840 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 840 iexplore.exe 840 iexplore.exe 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 840 wrote to memory of 2744 840 iexplore.exe 28 PID 840 wrote to memory of 2744 840 iexplore.exe 28 PID 840 wrote to memory of 2744 840 iexplore.exe 28 PID 840 wrote to memory of 2744 840 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65ecc775c5a853ee49d4ed2c59ebee2d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:840 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51012cda36f5780083d4a80f6c52f2d29
SHA1a329b7b36c06b0d61e67e57716a5099d747fa7db
SHA25640d40b7032594b3782498197861af8ac497e79505ade155721da29c8e842c135
SHA5123610282ce16367c0276c20c284099bc0964be2ded945c51056c81e384910e44883400373239a6624272ff0fe14fc4358b7335ac8e3d84667a73dfa776bb215d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1cec1cd7e178fb2a14e85531752a509
SHA1a4dcca309356d558dd4cbaf2bb27c36004740f0d
SHA2565e85c94163a1675730a0425a17f41d146bc57d16ac36bb2340fc82cdb559d68a
SHA512dd8bc54cc6d8a5a4c73746d3b8dbdc89917e87d8f81875475b1201151e79963f518da6913060c35e25a285696016117a7fa5c620aad4ce2a1bf951e83d78a1c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5201700bd8b65c07a4fb9fadab0755a07
SHA103f860733c27bbcc773ef6df5a57d5ac075443b3
SHA25658053b82d90ae18e166d9b61e1ce42e15976c9ac112f8b313ba48aae8725ad52
SHA5125ea39282ab657dc52bb5c068860bfd5b83fac9688a29242a06e0f6662fec16d7ce6948e497b29d4597be73e05b26a199a6f903c1bcf1bdfea23cd17ab009f3ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52db5fc0eac756fc9ae5d84ccc78a3e83
SHA169016d1cefacd37e2b610dff7df6ce703e4b815b
SHA2569198c0f00908731f710397c5072a65f0553ddd0575db0b7c9a36ea0c19f67dfd
SHA512b4ff55b9b1e1c82a7f98241ebafeed73b27b3f2d17b5d42663b6845bd5a24fe2cc21b01945d0e3b8ad06448743da1a50c27b087e3aa90a8207fa9babb64dd35e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c5dd8baccfb6553b69ba2ec7783a9b0
SHA189ab20142ddc3f645d453fd2941585c7577c1539
SHA256010a19b5bfae8debe27050c83cd9bc3ef683f87178da526783b4491b401af885
SHA512faa5ebacd04efdbfd7ae1bcfcfc891fa655694545494292d5c996f1512bf14de6b4c36b31cc97994628f6f75dc59f34eba1a1de7f9ec2cd15467925813e420de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd06f184b692c3aa60f6b03b95629788
SHA17e52f89248d96577de55d7d012461da641b9c199
SHA25612ed98ffe755c2c3b89bfe78ca4d42a844f08146b5009533730ea9ffbfb714db
SHA51256cb83d87396e4843e86025bef54398c3e432755c07a121d81fe50642e017dfae0111ef74df0bd7ca09cd0ed919740c754a6becea78d74c9ce9566c80334e7f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531cc9bd985265c209c5d8fc0e8467648
SHA18167b610060e598a024bfea9edf4ad6a5eb10a5f
SHA2568b6014fe6c4e19d22d30927e43dca36989a4e9d97214e98f34170aa263a39bb7
SHA512be2d017688309930bcc6777aa80f57451656348976eeb2b4c6e84234f300f9d330c0dbd2b7479a61a0129d84dae1677098ae73ecc01732c28e4e310ccc4a771e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51eff6becba6207eaaaa639321bba682f
SHA1c77aa0d3e37e4ff8c56d3be4594727faafdac01c
SHA256f18b19b644bc8572c0914b6a4f369b5ec04d29e79cc4465dde7b15b2ad61a2d5
SHA51262a13fb8f660c257c4d2d537543d48bd5d05983ac68168a28ce39c9e624195e9832d237ca700be1395239f1e3c0e0e8db6720062b65eb6f857f9d2feb956d45a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5195edc3be76161e13d4b136f93dc04dc
SHA1e13fa9627a7aecfe9bc50426376a6c3c37fcb0c7
SHA2567badc92522657cf66d79e162a0604be38b1d95398479fdddad67c769fbf3a195
SHA512343168096c234758730615fa8259fe44c2e088d7e80654e4e9f367ce0a5a2f484e4d92a3ed4795539b0f2457feb3d08630df5eb47a063066de336a35dccd9fac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcda3e5d88ca68ef85bb6cbf5440cde5
SHA148a955c9a8d51045d657b29dc066995b8d8320ff
SHA2564650136d85490cbd3e82fb39e2df206321933431aa8f9ea7606e7042b4bb15d0
SHA51227895746ef3dd19e49ab060c8830f50a4001eeec9572ddbe755ba68a437fbca4d360359a7a0c0c737cbf0664febfb5f16e2989ae3c6a56362f0506ddaffd9141
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56364c4a4c3e4186ef4d237335e3f8f21
SHA16cfc407bf9cc5691ba1c1b2de48810d8153d7d7b
SHA256f90977f62f37621f7b20ee229e3507fc3dedb431ac3dff423efdb36927c1e888
SHA512bce51d1d8ff80675fd6749c79d6e1413ab4b90bdf3cf118603cc5795083c6de1859e297e2f95d3840420bd30acb201009b3ba5c33b70a3c2a4194d0d34bf7bfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544d3b5523e4851a20f0769c18b75750b
SHA1bc271b070adfa0249e32f686d29c4b62b430defd
SHA256435d98f94f156cd3a6860858f7bb3212e7d5beca3c5f08f2ab5ba035f0ca5b4e
SHA5121540e73792e6dec6fab7c11371757cb3e247c02e9e5b32c627938e2340a4d284013f90f65afb926bfecdc1c7c51eb49f56d893be66bdc38fd570819944a20a72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53397e21af080151ed115e91d96389f20
SHA1dfee50ace36d2f80f5969e44ce3841faae02fee1
SHA25698e7c1b7840eb9891ae51bfa7e53fee9f2f65cd12fb3ccb72b47e9eb6711aaa3
SHA5127187df0df3342cef1b8aa0fec7e9401bbe1ffde2120bfbf37a5a47eccac6c9ea1f64a24ce4e8071693bf9d171fc91964473b801c3f507d798d8253695e110209
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563bb44b201f4db3e4d45fa32e2ed3047
SHA10b6dfe3d292616f41872095ae324f2cd264d47ae
SHA2568127497f45254c254446d1ca5a832b64431ac5d849fb5cd93cd2b051c9985fd6
SHA512ee7599ba795a1e27203be6d488027f7727799a3fa9a382f31e708fd92cdabde7173d706a5d443efc0b188136000780e48e59a9d6df44b6e9131db7b3af5b4cb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538d040a59a21af5de96593d4e0dcfa0e
SHA15af3598948c99be55fd4edebe8226b55058eccc2
SHA25613db37a7848fee544daa4f9cc7a14f6d293f39d4a59ef77bd1a680534514fa20
SHA51266f357095ec5a1fc88993922f331dabb034027f80f189ab873d5f5f8b4eebea38fc4ca7efcb04cfba7d80e09cf6e600eb6b17c5ace99108f4cd2e2803537afb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5729ce56db9b74d87cbb18e4b5189f152
SHA14ab9705d9d47e309327bc7bb75bb7d79f8e315a0
SHA2565d2eeca483e67a6c3d63f4817000a99b0608db64e0c10a37ea00d52d6b1c399a
SHA512ff93ea79eb3102378e3ee365f18cf050d9159cd377190ed57005d7e876d4daa83b73751d686e36d7a4f1a2192c507d7bec3cef5489bdd0a1c8814a70ccbaae95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a906d17a5ea23c64b218040ffb56e14d
SHA11381a3735f2bd35034ae6e4d78d7ba07d7240da2
SHA256520fb459f98d6c01fc95126ca7d0e95f97cbb3644dde4047cdf2dab85517bd4c
SHA512a64643fd177dbd41c7e2ebe43829f89ac87307c7059c3299073725987c7b8325eef4d64e153d8f7974dad08ba4f74ef2e388ebb71ed51d4d6e7a3ea66c593551
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524a19a4c5c06505dee32a75b17a447a3
SHA165c7cde3cb3e4b43df50b925bde6134b5cd88e19
SHA25691a09f48ca11bda5212116b83f18164e645a53c24183e9226c7a41dd205e579a
SHA512d20f400fcb1130cccaca4b494ba54fc92176a7984fd33e378c6c48e71f106f459155cda5816e6545b3f89b6ff30d8e30ae3939f43b7eb3eb20aa677b0e2ee305
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57caedf4f3820229698c338ded73dcfb4
SHA1af6b019ac3cdfac9ae8dd38b1c82aea2d801b3e0
SHA25692a49092154435404656c06a3f2c5337c1319634ffe06d8d5f7b4618e76f8d09
SHA5124ec77ab83ffe07a580724f60dae21e0ec074b6bc0e7fff56293bc1cf9363b03c520e793393ce50e066963955345423b36b94472d9feb098e6eb511e42edfae0a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a