Analysis
-
max time kernel
119s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 14:39
Static task
static1
Behavioral task
behavioral1
Sample
63a63d48ea60383f188c049335175df8_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
63a63d48ea60383f188c049335175df8_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63a63d48ea60383f188c049335175df8_JaffaCakes118.html
-
Size
39KB
-
MD5
63a63d48ea60383f188c049335175df8
-
SHA1
7f4bdf0453372653bd14e1e120f5dcaaf6b252dd
-
SHA256
264124af56c775d2c3847f24056365ba56cedac97f9edc4520e47cfc2207246d
-
SHA512
78d3868836d241681e09f7803f1b7f61571c71ca55730f11eafd9076b8408b5c04d8f16fc570b23d7a74267befb7726142b81ab11033ac38749db5eab5a8ca34
-
SSDEEP
768:g7ZNHyUgId5b1xx+uF7E22wNSV7Mn26CDln4pJfBihzrGldkuA:g7ZNHtPF7E2hSV7Mn26CDln4XfBihzrb
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000002b73f24bec2b00e35502c752cc52131ff7418dd3ec448f6a6ae237cad00c3485000000000e80000000020000200000006606e0985e7e68e347ada9e9eaa3907f18c7569788ed43be10bfb4850799b045200000007ee01afb58a45710835aae1cd42e87755e860233111999c7fb9071c114da716a4000000001b687d83ab3f1d76ebec8ff0c1813a081a1e137d4cb18f1bce41ac0ba90173f1e648b1928e8d94ea4c5515c94e93d4a93941ea56ffc61fb428998b9dbdc9361 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422464242" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F19238C1-177F-11EF-A0CE-F6A29408B575} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 507cb6ea8cabda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1320 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1320 iexplore.exe 1320 iexplore.exe 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1320 wrote to memory of 2824 1320 iexplore.exe IEXPLORE.EXE PID 1320 wrote to memory of 2824 1320 iexplore.exe IEXPLORE.EXE PID 1320 wrote to memory of 2824 1320 iexplore.exe IEXPLORE.EXE PID 1320 wrote to memory of 2824 1320 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63a63d48ea60383f188c049335175df8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1320 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD500e24b49e15f804394ec1853e42f13f5
SHA1ab254bc2d601a1cf42c4930f4f79cd7963ef5e81
SHA256a73d498a0bf0d2cab62b02a0d5fd8f7c2d5ef8593c8057b23c7945b048a85ec7
SHA512facc5544230a014af0e405d5b3e2beb4a5d008f8aafb7f6874e29acd216ecc7bb638f73a8d51943b5f27d08fb3e8e516fb23a5fbdd896d076d9cac234743aef0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD556b1523286714631304425c105121a98
SHA1dd76fa4c3bf1ea0d17a612b0b51e0b617c4fe2d7
SHA2564771a988acb6c93a3233b5e26722a9dc3aac784fed5e5f06ab6a1e83b2eaf64b
SHA5121fa67f96f18f7d89a8761145046dc7f76c8fcea965895607f0d147c38fad41e2bfc4f8f71762170f711ce6cb1de38e3daeb0839d6680102925e68cfe15db3d52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59f78500e6563ac5df330b62600c7e93d
SHA1c78e2d381065be38ff7a7ee5a8325292be2de3ce
SHA256e831c6bd27d7d088694470a0c9d7a7d525e59bb8dc7c9addb5a6c2e8974acc35
SHA512aa747c1f03c328dfcdc0abf2a578fe77c20df0a94684529fb65f023e72602f1f94320dec78d491ab4f78741452d01f20dbde995104a55d823f223662a1207212
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD522e99e133819d43c12f6e86a5073be29
SHA15fdf1b78622fac45f8b0d8129e1c71e4d49b86f1
SHA25618780c63e755ce0eb9c6c9eb7b88a95d8abfda51e9ee87f267aa5c8ed8a59cf6
SHA5120e72f50c5ad9228bdd4cee4cc68455b4e75ab10d848c410e4a3926822c653a08c495af32403e65266948ee76b0f2cb31ef2d8b985a6676f08bda9688b7834747
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD58ec1cbc52f861969b17cff7aed9b2b20
SHA19d1d3036cec11d8f1abf3f44cd20aba69b3e7d06
SHA256269f8fbe0f7d86c39862ab588cb788759496fa3445ea3d2129bbca8c999edd83
SHA5126c2164fc27e7d260a20046e147ba77d0c017b04bbe8f80558e85b3ad9981c440e539c38126bcf463e03afd31fcc9b13ca1a7fd354fb71e1b7364cc8d7df06cf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f82a9e23e11641f72ba760ba2cf301d3
SHA148a91963a129dc8046d4c07a773b4613116c1ebd
SHA256ce934025b98795ddc22d6db98324ee3a3cd18206e2cc653f7ea1969ba114fbdb
SHA5127f8c4add8113fdd1687397a3466e3d91a9442b9ff794ad591bbc6b5b14d6fb82a6f16f1f244768ee29eebf49ffc63f8f98ef1c182f36d38b798fcd3a3c826ab4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD540890761305baf3732d2d67844e1630f
SHA10d86bf9a555ce0a11844aa70492e4fa4652d3da2
SHA2563936a78b3070cb4c26be5624be4a49ffcd4f85fc749c6853d46c30b2b6b2f320
SHA512b90babeca3eabd41ba4e72ae85e2301a01c5abf98da6ba2eabb45119003cf0b4b0633c9161378f4171261a861986d231c00e6431074743f7940e9c770980be2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5850319de16364248481012a387a447ea
SHA1f9928fb560f254b3ee9b942aaa450fb37f2bb875
SHA256cdd583b972713e2290f298f5121d760ea4b6c7af1f3e85c225656b808bc96e0c
SHA5126aa2afe6296596d367fb87f55c7380b113a6ad0b1e86f037c38e481b022a06cb1050cf7ad4f595f1eab35eacf5db7c01b3a3f1a70af84b728b621b50f6709e21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f024045addd8bc5fdc7476a528e31983
SHA14f389e912b6a1e8beb64b92ad478a32ac32937c4
SHA2561ce1bf1d69f71a6682cedf0b6036db4ff9ec0986e15e7ad81a07fa081213d91c
SHA512110de8f2320e797fe817ae96dbb0ca679c14332a69bfe1173f7e23e44aa9e8fb0fe2becdb0c4d73033a31e1612d28f11f2fad19b7d443eda4a161c00a0e10a20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD58a28a35570d1b33d98f57563ceb1acc8
SHA11d375bc99e67c6c7d602d706be9fad670bbfdadd
SHA25624f1a6f3509c01f0611371a31bf21bff1701c0e471431c11f7f6c419ccd36188
SHA5121c8c1253b4186c541e2dd93bc9b8842229edff2dbd064885d6d12950da22341634318ae4aba5c1c3f8f53d874317849c9667d7b2c9262430638289bdc36838d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD573bb9cbcc20a85420361bad95e901148
SHA1ff321bc787253ee8b0dd0d9075e27e0c0ed05017
SHA256a3c1bc036729d1b3bcb2d4baf876cd062296fa6f18b7da316e5c70033b978719
SHA5122fcc2bc1afb96bad82df9b686d6072fce530821211c52ae37f22319c729cc0c2c07c61e5a9fa941e66bdd50f9d648041276082657351f052867396ced755199b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5eebd7a70233e345006e1cc5858c7b0f8
SHA1b08c025cba32865062e77f4a4b97249d98bc218d
SHA25635b16605eb0e1df4a4ad7f053c0a3fe9806a42be70b2616116b09683efe65528
SHA512592b28522ee2668e22548db26927e435f9ffd9105571b5456a9b235a24bcae57c0ce8e4a7b9d30f6412ac4a4ed6130ba8a8ca1f812606ae516a1ba95a9c9c00a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD592d2765e009712e523e733c1bfaae596
SHA174a87a8be5eef4ce3ac93bcf5473545e2532c2fa
SHA256f05d4f7930fef4babfb482e5d6e009d8d4e1f44a75cbffc45aa6033b817bbc72
SHA5123313b193bea4ae8437748dbad99dffb0d09d42fe4902d45a0659c956baad962d9b2bdb656c6ec0a87c48fd4198b2946d511421f2abb3f14a58b7fadbe5c54feb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b46504db94e704b64397e1caaaabcb2c
SHA1b153cc79c66536f646c58102b90307f6f2ec553a
SHA25602b043f83b8cc37549e0e27ee0e265d7953ffe47443e807df99680a3fb8adb30
SHA512188453a39a5ee46b9424db1d99da36cb2927bf46f9a1380d5f8173e12478516ae88135e4cbb381a6ba52999342a388180cfd6f24d688be5ef407fadd604bbd4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD534ded9069ea0043263d85e0e8feaccf4
SHA14f7f863c6a0781ad141c2419775f7b8449692761
SHA256e222d53d6aeda3c48c2bfe39d6e2138963cffbb19985db4f2f4d8cab05b6525f
SHA512f396530441f16f92f6e6f23a5e3af7f0b716b2b45e99c520be3128e87540ab6b48957fb371b315bef67c784780202534601ac1dfa88772e52fae8b55b79aa407
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f8c2f0d13f14287cc2f0c35ba2a1f888
SHA1212cdc0fc22b862cd5c47d351c55c8361e33ab86
SHA256e72cfa42004291f3df2df86faf531fe17110d4b2daa52830438903dfb6f3b208
SHA5122258b4e91c2841b10cae3af6e1cb1aeea43b131d490f72f4e1bdaf3b4c687802a4ce601081164e06def7667b333035c32cb9cb80a285e7c19ed95599aa315f44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55444d04384b7a847b8b43d50ca87e9db
SHA1a8fad4edf7e1ccf5ccbb0ee1526dccf876ed0aa6
SHA256ae250e0833b600962bc45ac6ef2f84ab76c77d84cc492ce231fab6ce0229b27e
SHA5127cadd262f8491a432b667336b39fc734c8c3993d6292510db7f6de7842e4d581b18a8e6cc8addc86064753adbb03df2158f293ecddd6f8ffcf76b08f95dad3a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD572f5bda93baf96969f148b434695b513
SHA1a7fe441c6f69bc0283e8900251fce7ef332db165
SHA256aa0d571f4bdd51d50ebdacf95c6446f2e1a08d2fcdf6a72f5556e9db52fe294f
SHA5120786a772d5d69a9d7b556dc36d93be62a276228347ea4d58bfabd7c44992193543fe461a0ee6c591ac7b50c35dee2784b502fef9d3303c7c6be519bd56fc8b73
-
C:\Users\Admin\AppData\Local\Temp\Cab1B11.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\Tar1B81.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a