Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 13:32
Static task
static1
Behavioral task
behavioral1
Sample
63763c2e1971f449fd5085b1fe3f2a62_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
63763c2e1971f449fd5085b1fe3f2a62_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63763c2e1971f449fd5085b1fe3f2a62_JaffaCakes118.html
-
Size
4KB
-
MD5
63763c2e1971f449fd5085b1fe3f2a62
-
SHA1
f69d7674d4099e43da741132787268da4332f7de
-
SHA256
3209115f8da249f0862ae80a104d4a6852bf4586f7313107876004fcbcae1898
-
SHA512
3c10826239d53539ce3ece4d4749a626e2e50a3e0bd02d7d215760e065f20cd07c9f961f52aa62cbd9a5e69e02d4978830774a8d9b4c3e711eaafe2d1c281500
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oSVJzD7p:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD7
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00e0d86883abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{944E5CB1-1776-11EF-A0EE-F2EF6E19F123} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000008774453c07b1f48b261586d602479e000000000020000000000106600000001000020000000f7fea022067732f4caed3af9642ef86e1f0302f965919bab8c1ff1683b0ae052000000000e8000000002000020000000e12035b6ff455ca50aed7ec278e9326b0e9e082119b460a933656df6f0ecec8a2000000063b868767cfdcdbb073935af7d91f2f9566893614a84178b31ed25d9197040cb40000000dad41a797ac25c529cb02248e815792a0c2b26c745263c1b1a4a42c7e35aa44ffc599ef11ec4ecafc3800d1b3629948b70ffbb34fb75fc8629eb32a258e69667 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422460220" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1680 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1680 iexplore.exe 1680 iexplore.exe 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2904 1680 iexplore.exe 28 PID 1680 wrote to memory of 2904 1680 iexplore.exe 28 PID 1680 wrote to memory of 2904 1680 iexplore.exe 28 PID 1680 wrote to memory of 2904 1680 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63763c2e1971f449fd5085b1fe3f2a62_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5c77b8327799cd2143dc5621c03e75f
SHA1ac842d515570216166561ff7559b23f4ef06bcf7
SHA2563758586894dd2111871251241e46d30e1982635e0c8c30c80473a49306efeecc
SHA5123e0963a5fdf853224f6f723225c559b465a636e6237939a5efb5a8624a5b0970b36c26ba9b4e1d82692ba5a5243511628daf66f7138808c6924b5ab9551af818
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d459c8a716851ecae0344a9d2fb965d3
SHA1d4b8c9e5f4acfa13c7d3af7d09df947b50c80b73
SHA256402553d0a145a5aa4bf73581647eef3dea9f4eebcb501885df9c314ae1c0e321
SHA512d9be0032ef1eba74594db720377902e1795caa356a471183ca50f166b445527053e9eb52b4f48f0a77e5ac1f1dde43a0b58ed53f6c5c04a466aa49f3a43afce8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576201a22a5ace34248034972f217404f
SHA1fb1a6a8406b9555297e1894ed8a39991d8fc4d22
SHA2569cf31da4e0089a2f286d3dd5347cc745405fe2aaf533792a5e3ee62e07ec739c
SHA512b598ca1bc4843885781fda2b598d838e327d757642c649f7305fc84ff80d38b6cb80455dcc1c61f64f7c0e6e3982ae6fec8387ea6a6bfd5d2b13d7518dbabeca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d2e99559d2f92a2054ba55b78918ff2
SHA142f86f8c63b9662b210fbbdd20a49a01ba6b6cc1
SHA256625d5bd4266fbf10d2283ee89abc7a81b92f47fdfe971567a52f63117cf7ad78
SHA51216dd210c2533cbdad254382c9340cab9a5632614516a63710ba7d099e4e2ae40aac5daa4ba537c770763b7777b4e4d4b3453b2c378e1b7a75e2a71d139f9a180
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538bfcf9da539fccb7db3647393aafdba
SHA15ba746d121362bcb7f44092686ce36b68fb123eb
SHA256a34e5e86997644fa85788a177ead658ead3f6272577e61a365f9541f33e16a2d
SHA5126a3fd62e7dec013f60644d84549afbe77f7fd9c80ada511ba8957d63426e7cc3d3aafebcb267f595de8dea7cce93f7e50edd1421db86954842dcc343c0ea74a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3c391b5234ecd1cc1bcff300f6eec96
SHA10cc56b3f289703844041923b7cae098343d39780
SHA2563911e80f6b52f31b86a1038b3cb4f85793dbf0f07af8e64148e204a60339ca1c
SHA512873e70deba46c852cc272c96b6b30029d01c7814ed7e09b9282f8c35e611cc745748f513114563a6f6a486b3c741c5631e73f56c8dbd89fe587d93feaa999199
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca1cc2878a3b00c0e9c70791de24b2f1
SHA145117b7bb0e4751f4836befd9aaad1acd78066d9
SHA256d912efcd4939db72abab02e498f25ef3e16ae6b1a3ab3406c6c721d4f619fc25
SHA5128ff79750563a2474be94b258018470decccb5cfdcbe2070989986cb97cbddc2d69818217ec3a7831e0b2acb44b9d630d3b9b7f0a73a56e56bc61d710416364cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540582ecae895c5fa0a885c42560c7f1b
SHA10f629efcff60d89dd058588c97acd9566badfc3e
SHA256d9c7212db9cd0e07b48f0029adf7ba3dc369f02d104143c2370a9911a2742b2e
SHA5128d46e621bcf788fd332bc4ac5076abf6a1510cccca401738fbba5f6e8a95f75fde8bfcbc62180b44918346a4369add385d810d22bc2580ec77df44d8a58caa25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c90d1f0ad6b38735b4c2a9dfd949ec54
SHA1cc95a5dec369a5b5aa60c55da30df9f275af168b
SHA256d6345bddd82b4202c43905aa4cc24c1b45560a4ce5d1b4c3d0048e57e1d0c799
SHA512d8b8db445f7e13b71d0ffacf3885dbe3a8da0f469d71efa438154bd9bdd710aa65fcaeb8678ab7f0867bea0ae8ae6477093cf90b1c9244a8fa7fdc5b44535344
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b5d13016a0f9445406e06d77f58f28b
SHA12b6fb56766a5304149112618769c45abb4c14b9e
SHA2561a3c54b4c515e25e779504e6b3551731cfcfcc10644ce575930492467ab4d38d
SHA512d5125b36e5b06ebc294c6a8ab04949b1a2c4b74b1fc65ac25e783d0c3f27be217a42901baa810ecef6a38b95feffa94aa474c9d1a5058dda43859da7a22d40c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b7d676fbae4c75e74a7cfdeeafe0002
SHA10673764b5826d32ef77798ab893d94ddcf2d2014
SHA256b7954104ed742b097db78986349d37a76f3b7b26d2fbc573b064f4a2ea82ce79
SHA512245d9433cbf59bbbf50e4f2aaa82d7fa6980ca3693a7f8b8d4583714972424237c0b817e23ca9fac531394156582a7031ec1d9e902a7f77526e9453f7a869c19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53629d2723dc0dd5577964567eda61152
SHA18ac2138d71aaf7dd5a5343283a4df26141b2443d
SHA2569cf6bf6e6b920b7c054c16d31b0d953064fc476a070ddd4a671c472d25850777
SHA512217a0e3f0de6eea54e7618767cbe46f614b4e0af9a83e1d2836440b8dd356bf6311ed4d035ca3695760516d0355398638a32a5fb82d1b2a6a6013568cebb47a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4db99b428b7dce17fd0c3375be731f6
SHA17e451b4d0f88a46ad060d85021831ce8f4e9aced
SHA25636a7825a6d08d39b74b69f8c1f0c070758809f0f4bb06bc7a8a6e0ca8cecf6d2
SHA51261b4b5ffb87197ef6cd0f989846eb459558b33097d9a3e8c00cd7ee9bb587ee9d0d52bf506df33ab1f78faffac4d38c8a5f0349fa829b07190f2215d1ab7c91d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5b9e906ae23b26dbe039b0975e504da
SHA17878a5fe967de111ecd2547cdca839ca00c32e38
SHA256dface15b19e8aaa7263217dcdf298b14e1db1799309b79fa57887dc45cec3792
SHA512865c2914ee4dc6ac3c855c1be5cd9af605690e7e346133129599530fb7b1b26840763469a1da98f131e21d53fd4a7d899be977bb82ffc354e5003a40bb6a2fce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b269146688c807c4f1a5a8e45cc57c65
SHA17c538bcd087e5ba2ad6dd5e2eeafb334c7389d6e
SHA256836e987f222cf211bd10e95d97d501ccda9cfc69ffe44bb4abaa3ded5b3c9e45
SHA5120412d092ee4c37532b8a1f7c63b1e2a40848e5a29f1f38718e57b27c317344fcce43389e4766ebc202e9093fd080ffa7909f0c115fee0bff2833ef603b2191db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4637e7e11e943b9cb889f5ee2f789d2
SHA1895175b6bbaa4c2591e37a3aa5f9c614d53884ca
SHA2562d18c252d68e8c07a4fe0d86c2c8e770ad49dcb5b7f268cc6a8257de0b5eb08b
SHA5128ed3ed83601b41cf641709eead70af79df366f01f6c0a1379a6d9119ae52a8ab23b1e20f7fcd677085fc7c56424653240bd3a3a15d1b1b75eb185e4204db4246
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0a8c0d6df7b7338f3e597f543e989d9
SHA1843f1f08cb7740cf2a5320b2093f9367f2cfb758
SHA25627fbbd474e41c787f3967098ba739a70862aec0c1326baf7f774434c18468524
SHA5121219e142dcf7a32bd6f120822a90bdc9ef80cb10e89b24f8ec904d348bfcbaf875cda78e60d5275c5c8ae4f13987f21841daae6a06ec5e3a888b7a484f43254a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6d3bd0e7f5af1b7c52d6402dd725791
SHA1ea945449e458f1e9db832dd955223cc72e1369e7
SHA256237f6ea4669649b261df43730d7b825f244deaa929b6e490c38389e36f208844
SHA512f03469445a4ac9f890b826f3ca749c3710543b5cac639dc7b09b9024f482211173bd9ada36c416dbf5a10305f6a069c7b4083c71bf64335f3b9ec81e5ea5df69
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a