Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 14:39
Static task
static1
Behavioral task
behavioral1
Sample
63a5fba226355d572d9245446c306d09_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63a5fba226355d572d9245446c306d09_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
63a5fba226355d572d9245446c306d09_JaffaCakes118.html
-
Size
70KB
-
MD5
63a5fba226355d572d9245446c306d09
-
SHA1
d3edb78efee7318d391e6645be60232e8524c11d
-
SHA256
49e3b41d2644d9ea2ba2c9de8e9ff5326dd8d1cbf0bd8bae5f408e7460d3adb5
-
SHA512
c5240dd248ca93f74e97b05ba542246fd2892948883447fd7b048ffcfe67fd83345d95c27a2b05dd8bb7c75b8d3a63d0d5bbed190a30cffc7e36488e072d29dd
-
SSDEEP
768:JifgcMiR3sI2PDDnX0g6sM6hsTZT7oTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFf:JTYTZT0TzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422464222" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10dc3bb98cabda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000cab5064d4ff68c8c651c5b432eec1d9e0e1bf411ebed08816d9099abd30e1293000000000e800000000200002000000045f6b57c6238e44836ee4868e20da179ee301cfae2a0baa335b60d630d13840c200000002ed1c84e8e1c5d8589b038078f86ffa6cfd2a7bbaa32628bdfb2f11f2b469e5b400000007040f9733c42d1a194f4977401e85b42578e6d6644f3a42138050be8f06966db806696c66ed6165cd9c6a2f2cbe470758eb611e43d28935649c3037f2231e9b2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E3AF2331-177F-11EF-B671-4AE872E97954} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2456 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2456 iexplore.exe 2456 iexplore.exe 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2456 wrote to memory of 2884 2456 iexplore.exe IEXPLORE.EXE PID 2456 wrote to memory of 2884 2456 iexplore.exe IEXPLORE.EXE PID 2456 wrote to memory of 2884 2456 iexplore.exe IEXPLORE.EXE PID 2456 wrote to memory of 2884 2456 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63a5fba226355d572d9245446c306d09_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2456 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5f6ded646e638a51b8f94a1b5831a53
SHA1258f579395a790ba3b1e26635920650d27dedee1
SHA256279c9d9fe7d48dd15bb176c0d8b37ff06b5ebe15c5496cb62a8f7143908b13b7
SHA5124e81264a24e5c50d1345895ef611aa79b1be16e6872cfa39f677f79f57e07bd646e0cd983104d5b3c7586acbf0851aef8ed558168cc010dcbed40c55f5eac8e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534d73b5df7465e8117ddb16035f99492
SHA1b3332bcae4100af027e88a6580325d36aebc7a34
SHA2569294928d4408eca2670c71b585c7d1e007bc7d5dada4ea34fdfb08b7555b8e2c
SHA512f5fd84356726f933a0e03bd5bbfca1cd6c5829c64073ff90017f30c3d01ef18865c98c6736f94b65614fa18446e0ce6dbf3afe7190fb5eb4e57cd6f0bb5cd6e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e31da7637d22b636d26c14ff77edb771
SHA1e93340a1d5197ba3bf50af9355a6204a77f88211
SHA2565e007e2b9707777e32cf27fddba084a45ba0fb42203cd388eb7554904f94952c
SHA51210595ce898f92f55017602af62bfe774d3ea316dd276d52b49b4eedda28a11e88b9dfe3f9befff5e9ccafa223ecb90a1942866b15caff6210765ccca29a242af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ca57acb706e4625940b1f889b74e809
SHA1935df863183d3dba41bb8f46a17acb397fc5ad79
SHA25682032269757631fcb27b53b245bce08255ce53f82810fd1bd618b4be625ebd5b
SHA512b7debf1b1a0b2bab83e594833cd2dd302458b7a8e5d57d99e2c45dd109f426cf6a8627a023d13f09ff273d8b6ebcfde8cc5b3d5536632ab2a5515e8748a788d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c46390abac638cd0ff92bf934916d577
SHA123b9ba00b33aa100d7d10c313219f473882671ae
SHA256f86a750540d74b4d12b879aae46ef65940fcee6e5488b85283fb62ea9743d96d
SHA51289822c8fd8a11b5c88ccaf61bdb38c6515c4a422b99d951a754a5a9196d27197b755f07c5c789834fedbc29ce1f83921982e5fd83d3cf9301cd3ee599a6fd03e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e54f75ce932e468a7c366d471e051b9
SHA1d781b4497dcc4c886be94b31de060c39dde542fc
SHA2564f648b12cf04c0153789130376654cf9625889c9d8d2bb4ccc5f25ecf4bc2316
SHA512aead21d06d592906a51a31072e76303802d1a5735a81931691d41aa774fa6119a3855e33a6f87a5d758024bbb3a996fec3b16ccbec04573d02164e2fc8ff013d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6019cb89a3cce8108ab308d692b6cdc
SHA1f3430dd224a663994c9f52267099a88198616f07
SHA2569e13d23f6885be52e5db40af0a39230cb5ceb77cf5a5a94cbabdc904f9557833
SHA51272cb55f52e52a2c46c7657970eb3820f3fca020712209d63fe8b012aacae658973ac388096bdd6ac6d960eea64b12e1685cf6768369d0316c61f3bc67d5db6d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5463e6446cca88c618ed7a685f0c47c3f
SHA14b8bc4710468e328ed546bd23d8c5c24e799f745
SHA25612c5223b2bd97f4816a79976727fdcfe94015167c902ea52b08ba311503b0e78
SHA512b6458929d39edcc99229a31b4713041233fcc76de37c4c923ba91416078ef8cc45965136e4d07bd6815c4c1bd40abe98d9b049eee97be1d50a355ecb97d0fbdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521e1e7f927f9b79e197dfc3442cdb7a4
SHA1fb3b2e3d3e5e6037f8856e24b4e6b1e3a70d30bb
SHA256ec5f5d2dd468eda2ac0ed16959ed63d7eb9565cf2ed94f0110d10313c9f8a7c5
SHA512d512719a70d994bc992006cd634f33f5834edfdf0913ededb3086d820a35ffca1136a4e3b5db47bc0d066964a9a67f36eeaa317a6f7e085bd4960119a2d6187f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526d77a3e4f29c21744abf7a9c3f7a6fe
SHA11891135c1094e9aa5a810dc001c804ebae15f6c0
SHA256ae472eeaf9fcd361b25d7b9723ee22344c442c345f364808cffec69042019596
SHA512a1d037960a0310e7e9a75fca16a385d199339a8ad32f4c5dc003468e61362eb556b4229ba707d8961ea48dd0c9ad1a77621dfbd64a5bcd885c9c9e3cd8838a50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577bf2ab578d7beb94f2932fa1d6230dd
SHA12b0041bcf9781e02b8348914a5eecb5de6c38ef2
SHA256575ca734a90c0f1b37430e5e5f3d8c0a12617f7cce5a4000e5365049ec48b57a
SHA512e0d7e7e86a46c9687af98458d311463581dc4d6a03b1889713f3efb447887b571717b66240c6b98c419b87771a5b0e2015e240460b90fc7cdc095d41d43d9b66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e5094db1f1cb3371388428dfca55fd8
SHA1fd2ed28d4709db98b8ee25fe789896305f03d49d
SHA2564b0d408052ab83417a028b0e05e125427615c871b044f03018ea31b15654e76b
SHA5120cfa6787a3edbe9ea67e3574e6530653346ed5ddd71254e066eb6134a76ec39d4ecb7ee6b5102e67eb5363e64eed672a35ab51d101394a0c2a62487319065076
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f45576614149ed6e9e1a654f7f0855f
SHA18788e46fca3e45916f67c3a7ad43533c4f2d457a
SHA256012205ef943171817e4a52edc451cbdf48dc59f15a9b615da3c097dc18672e22
SHA512e3503a10f9e55a122bd9ec2a3c3af29aa0f829951f109b2f43d9fdb2b8e054318f0cdb3832a432e8c4b3e73f1184346aff546e479e49ced201a621153460485e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599725cf9386b1a49073f57b44512c6ad
SHA1003fc5070aee3aadcc86cd30e185d4926edc2234
SHA2562e7607648c93ac225ca0df30b0774c6428cb391886f753e5c9cd1be22fbce237
SHA51228ad9ed86dec8ed97566baa5a47d8981c61b8a9b68a04084b8c4af862db5ef8831636ec959a1094d246f43f53932aac62b933b71e15a9f1e8b1248cf3a28b46e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb0432759459f13821334f7048400746
SHA11b8cf4f5011ad40f94ee603c4f1f5655f999f041
SHA256f5397832f2725cbae38e6a7d7d2853127c679807668561e99ef5efb566ba93b4
SHA512b214124b7a26f2df87ce5cedd57014d7e322a032b2c1c36cdf693344ec2bf24f9893eb6a77e3ce0602dacf1928113d4517d5f938f594839558eabf773e5a62e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fb577590d876545f23013983c3246a6
SHA164d10df94d3483416938d2e8700aa1caa9496041
SHA256e50f18c20f08cb0ac73799d207a83010956ba6b8f6ff96db73ebc2cd16d76c95
SHA512294fa6c5669b6c7650fe5ff1210afc33496339ebbfff21f30febd3485dfa83f4291117278f119420ac435ef11fea88f46ab6b590c2416a5412a69e6e7f6a6ef7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5548049d19c6a55529ee74b05ebbe0613
SHA1cd0d0b80686076382b2e27db437c49beb6f2344b
SHA25674f4a6ec66fe39a0f24b846bbd1613075a6a7f0312395b4e338c620cd525d1ac
SHA512e0d4e6f9d5d669e9002ec70a38c006c53683a9f00759d1fff50df35107f107c746c488f9981988b54c6321c56d3770e97f9f569713ba290cbb567d780caec128
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a