Analysis
-
max time kernel
136s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 14:44
Static task
static1
Behavioral task
behavioral1
Sample
63aa14b73889b0a56299fa583d65dbfe_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63aa14b73889b0a56299fa583d65dbfe_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63aa14b73889b0a56299fa583d65dbfe_JaffaCakes118.html
-
Size
959B
-
MD5
63aa14b73889b0a56299fa583d65dbfe
-
SHA1
5e954a1e3706612bf9075621e37742ffb83696f7
-
SHA256
d6a644b7307401454f0b01177d2bc78e6af5d6c87fed1355d3c375bcc43f6bad
-
SHA512
eee776878491c635e806ee3ddc22dcc582d357cdcf84b176cd452a51a496934cdbd16cba68578cc8f0203a44e3d9c013f22c6a97d689da6e8389ae11d82c4059
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006f3c7a7cc886b040b34471e9bc341914000000000200000000001066000000010000200000007cf8788b9e69f1bb14c1cf77a9dff012c9612be48791e0f6b8a7f336969ee05a000000000e8000000002000020000000d07d9893e0c71879f86989cf0fe98bb5434dbc079a2d3dd892e87ceab4878a53200000008502f998e43ae6cccfe0cb6b7de413389aa0ca4cc89734485c1b1bf1a12f707840000000effc436eac0302fc17d02c03b80583270e9eb7f8a8d7053dd1e6ae1f37ed802a6e2fcc49da222530368ea9c62d6eacddddc88835bbdb43c4984abd4b52ad19b3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30858c768dabda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A205E9E1-1780-11EF-A635-D2EFD46A7D0E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422464542" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2304 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2304 iexplore.exe 2304 iexplore.exe 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2304 wrote to memory of 2172 2304 iexplore.exe IEXPLORE.EXE PID 2304 wrote to memory of 2172 2304 iexplore.exe IEXPLORE.EXE PID 2304 wrote to memory of 2172 2304 iexplore.exe IEXPLORE.EXE PID 2304 wrote to memory of 2172 2304 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63aa14b73889b0a56299fa583d65dbfe_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2304 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568663384b8e7ac05e9f577739170fd39
SHA1cbe034f8778a48133d06839bc9be7edaa1030fa5
SHA25683d6b4bf5d62684e43dd460cea7e06ec858034aefd3504b3e5170057ae951241
SHA5123739f7bcaa3e15a307c6f7e54b85fd764624c748ba1e00aebabfa5c4e90c6185fb28a2993e344f785011e35c90a8ff42550779522a7d76972bee088210e30dd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539495c252be890ea8b73fd4b6119754e
SHA1df4c31e45beffcb33f2186858a7bada9b1d90daf
SHA256c85b3715bd0da22c9ff01dbe2b36f176a01fcb6629b3665c1b40a5344d469a78
SHA5121dab814fecd4aa344e45135b65c671cee0759e32e878d03b70e5582f3ed7e410bfac508dbbf207f1a95fea04530df88d2d9c6496c9174229977bef4988645576
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c599edaed38c7b0d1c302b5e3d1e7b5
SHA182f49ce8b98905b95c79e7fe6ec363ea11c1936e
SHA2563f1302cc1817ca16e4d52533581baabddc01d1bd0f6f7608b2248e0f51dda297
SHA512402eb104fc79af0b72b0890b04b1962dd1afdae97b47aac1f0367620e99f6da6824a7d56c7f1819fd75c58ba7ac1bb55319c18a7fd8791ab5f40faa04d737b3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e8a3ecb0db0cd26060f5968d66d678e
SHA161cab98554c3ed9ab2f606f98c0e5b81984fb5b7
SHA256eb60494194242b13fecf91103ccd5929b9bd4e5534eee7d8c4cc30d78e79e000
SHA5127592cc00aca7cd436e8c55e3cd7a0296e3cce0152f7183cbb35d229f2bb605b4bf1e896435a311e077ed721c5f45c65aac9d34d5efced77b2364786281a3f1b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54063a8313f352ab9c379e84d11910b34
SHA1561cc19d61ba23eca6c777deaa44fa80bdb786d7
SHA256929200a237ba2031b62c9c5149c251c06fc668972f7cbac8cbdc4065b6522251
SHA51209559d50d8fc49248b0ba2679c7a1095b697d68f8258109c14d2dca86e340cc291d38303d764536410308fae05b314ce22abd199693704008c9aebf78ad9b834
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b007f49c570c4a71cead73a5cb3b778e
SHA13c55a275a24da745c6b74f6629c70f2c957bffe4
SHA25606cf8ad0d1bcfabe493b08456ba1d99fcd98ddd6853e10e978e085f430080eb8
SHA5124be9bc51eaf792e5419ab42ff2c301b7fb75ddae9248f8da1ca1088f4a750ea045e7e3242c2b3459a24c0eb99a9bc14f7d149a16c70a09a4f49265b3aba78136
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571a7276fba1d748f63e985f3db1bf014
SHA1efd7f181743eee23253356c324c3f1d3fef5e9e4
SHA2560e9854220ee0585ce8b41532b650ac8db07012bcd818f5109b6193c2a2edb609
SHA512aafc51037c72a15abd0b2cd226a55559f2267704ad3f8b994a6c882a51f12375354d90447d3bbfff7e9c8cb98cf84736769031475e9bedf033400fb2444a3b3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5555bd71a7304c4191ef927305a594d44
SHA1dbcc6947ae198a5c2c8bd95b2e07f1407bdb0fdf
SHA256980e6c1087ee68a6b26833f2c46b041b16c52fd9d4ead742f2eccfcab8bee3ab
SHA5126f3093062429bdc6ca02419d4b5a2a05fa2bf8df54ec513aba9f8f686c8f3e18fadbee75e81b6e2a08773f57512c9e8dc73b0569278eda895ad6ace33e720b85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55911a1e6515f6684b3ccda6f233a67a9
SHA17d260a5e0121a512dcb7e1943649c8c4f898d647
SHA2569423c69f618937bd56cf645cd9adcaacaf35f7fb741e5994a56b80b66a1f83a7
SHA512c16b63b86890bfdd014ca8a17527190c555789345c6589a9da92418928945fb4408d8f7166546a88d55dd91d6938f606017de468a676bdc60fd2a5409c327d21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6f8627a439afa92596b40ea5d20f1ad
SHA1c6be7c4daa75523c7c92cada00fb13a39cbbe615
SHA2567ed93844f1ca91794d2392a4cd0a8156fc0b34679e5de55a8c9790760633b21f
SHA512772308778627e673b3c16be43e318ec22921289aa18dc63458aa8900c2c3d0f07f1e68b9919ac4bac55c79979067b0fbed6f5aa1d1601e4b625392d24af117a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c24e46bce06132c1c22a98e56a535552
SHA148f7252f955c8689639a584c6dbad7c816ed342a
SHA256e689c8e21275f1062d8a7d7d3919dedd2d0bc9e787bc5240389e2f29aa2b2857
SHA5124a0c99d8a1b6119b23a30d10827ebe0e2f2d86a06724e93a7dcd7247fe8dce2f3e4ff792f005c3daaa30bd3c77f5890e4277986c249156315d7c4779ca6e919d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba6180b260b57d08e838fa949c6f993d
SHA16e15370a67ff431408927ee72187154095a48052
SHA25624b6b1d7ad534a233cb75356acebd596f9c2e8200f3ed3e81c471508b8d66198
SHA512fa4d37b8dde1525351d599a66e1c2ed85f71f9a5412e52ec0ec0d9cf50aa9860d40136e8c4f35b0836b07063f1717806b39add01d1c46230aca32bb063d97a38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abafefd66dbec22dcd5fc1e415f02262
SHA1374753615594d2401d91094705e364277e0ca980
SHA2566ba56d682300faafdf06243840af12e6a6ff81e1da2e403da5ed22ec9f13bf5c
SHA5126bbcbeddb99e148e8d17324a5faa32875c4eec0a0f57c61b2d664ac80d2af91741da7977a27d7113dd94ab8dda5575ceff198105d4d2113b90309e06fdefd9d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca34fc5e7d137f076feafa7a231efbe7
SHA1a2bb2f44c376b0a48349f23e945d61b56b26b63a
SHA256ed9a8315bf4e2d1d12001c6a52583cccb012f81b14d2ebeed42e677e5b1d3002
SHA512c30f6b98e8d9c4a4c6bdf0f510bb80006056aca7c582cfb6d047e2ebf227caa5181e668b3c234140d7b673c41cda8f9a7ca64ce028edc395f9e44ddc511118e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5e71f5d091702388da0afc1ddae2cdd
SHA1d3b01f76cc8196cc1b303926273adcee63ccfe60
SHA2569a7036f97a24eed606f0a345a47408d9c9be600f156503b2fb35bf16ee252791
SHA512cef04989951f2e77f980c5adc7d1e4bf1eef925583d91fe6bcb65a6bce9a5f93dfe6c4231e2f6b15822a54d1311ff07052505f478b248262d6835710f519690c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d828ceab3dd0236efe329346eacf275
SHA16e8074f367c9598344bcddd518bbac93ccb749fb
SHA25675eae343f42008f23c1fccb55520c94415b824d9797392a7875791bf74768c5a
SHA5129c2e0a7c4e616166050411b3110c8818f243bf2fd50c95df2fe50af366bf7946a2dea27ec6419990265be2beff9c77b38d7f23a49d785bdbbe322bf4ccd72c61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9cb7ee780b3f6c8181af96ad5815cce
SHA1f17d79fb390466a7cd4f8c6d025a8676f4256329
SHA2568ff6dd6ceb2f8641797844831a23b23e0d36e0e939869ad7f6ebdb5ebd7a14c3
SHA512d0a5ac27dc927ad96d1a611c9c5c51a1d37df24854787e44165925dfdbbaf97e17309cee50ae7c104483e73f46034e09897e76b9cd3106d1f9f1e1405ca746d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ec42e44ec5ca013ea444bdcaa44b232
SHA14e95b8d0069a5fcde19e7ac8521398362183879f
SHA2568ba8729645395ec078bf378d97721de830be50f0088014a0a530bd4343b7d073
SHA512187a91215aa3e9b0d933a5a0f37deca73030d40af6972b74ea1dd5298427e94aaf067577c9f7dfdb671a7dd87b2d7fc3225f9a11ef5cf627fa84463c1355dac1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c538bff3e5e37d42a98c917ab572591
SHA100bf1d310bf3ca705be81cfb76c902504ac10a3c
SHA2564287c0150894ff010c67a29e6cc1e324d6b1f7002fb7289f7729ddeefd2991b8
SHA512cd3b7273310cb1f44a23b80d310013b664995fa8089e1e29695760ef97d14db7f2c5f8ef817487d11f13d1aad9cc38826ee5ced23dc93747f8f6777f1d7f2454
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a