Analysis
-
max time kernel
136s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 14:50
Static task
static1
Behavioral task
behavioral1
Sample
63ae2a200004fd53420e23fa21501a79_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63ae2a200004fd53420e23fa21501a79_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63ae2a200004fd53420e23fa21501a79_JaffaCakes118.html
-
Size
4KB
-
MD5
63ae2a200004fd53420e23fa21501a79
-
SHA1
8e2516356d1d3d3423fc0eeaebb354e0d6fcd76c
-
SHA256
aa83a33c958f016c45f5daf33f35ed842d56eb1c4838ec8c5438af864ce315bd
-
SHA512
3d9f0674c94f079f8093ceb5f02db32cd92d4ae60523bd0706fd71b7503a88a3605cacd20c7a0f3a6718cd216b7e2a88018b8c7c871c85a29021e54b90ce1343
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oZ0S21NH:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDj
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7F9C81B1-1781-11EF-8D50-4A4F109F65B0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b06174548eabda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000533901b0c05d10e11df3286718d5c3dbeb9e7a02472f7d2c2b5228574f04a88d000000000e8000000002000020000000f22493645a8cb46da6f2edfedd7ef20a7585906f11bf5b1a654693155b318ac120000000b33408e018b2a05b96e7ab32f9502a58d3904eedc22a81655517023aedae474f40000000ef7146ea8f35d6a44008193493db8afaead3991c41eacfe3bae4dbf7263d666dfe8cbf73d948798d6c3798487f91a7b524d762f38ac2f94c50eba7ac5cebd04d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422464913" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2240 iexplore.exe 2240 iexplore.exe 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2240 wrote to memory of 2340 2240 iexplore.exe IEXPLORE.EXE PID 2240 wrote to memory of 2340 2240 iexplore.exe IEXPLORE.EXE PID 2240 wrote to memory of 2340 2240 iexplore.exe IEXPLORE.EXE PID 2240 wrote to memory of 2340 2240 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63ae2a200004fd53420e23fa21501a79_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c54b50ec0de7bd156a4da570cbbf2e61
SHA1c6932657f2f19f1a80a6f91f251bc59dfa48c1c8
SHA2566a71382e905ed3752be50aabf4638519df85f05a1828e937c2d2d73bae3b0981
SHA512ef4bc102df194032b798f9dfbd9716e7a568ff2792f529e8ec1235787265e5854dc549d252a61134a86703eef3967696063188fa2254a45c82325d05fced22de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5004935a942dd7922272e809480b675c9
SHA1f360219df7006e7d92126967928c9643da4db076
SHA2568240fd5947b7db91b837451f8946ccd04d30e4cfa7ad955fda968e0e89d53e16
SHA5126e4f8b90ce9fadc9f69ede179a2ea7742bec944930cc2ed0547cf234d0c7c81a077fef7e593640a2cfd25e8fc0cf087df9330b12d95e89bf88d78ccc68f3bf9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5019a25d7cb637d4bd9c060bf3da4b467
SHA1c3493f8f262e6dee369fbc8e9afb958c8257eef0
SHA256b65e452cfc028feaf5646d8821f52dfe3de1e2e55dd56b26800a60e0c8770bf0
SHA51208ba0dfbde1d68827000306147cfd9ee1ace1886e139fbc39a9c21a3f516e8bb256eba2c48d21fe47f7c4c0cd0a061dd1aa3802a7981070e948c25d855b5fba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8fb0a5f6d315e7c3d5a6318075d0995
SHA1e5a2e6081b2bf53236466e66488329161d02d04b
SHA256b9eb90f70a52006ddfe0305cdfd2e4fa3cad741c30e172865cabf1722452cd66
SHA51228d72ed76490620564fa822283db201ff17fd88fc7fb9719388ab26da2d9534a047a95209cd034170b7fbaec6833a1be337d0127de67c5052d9f1ac76f032329
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53571f25bf06e1608869a94fb746987d5
SHA164290d1479d48a7253ab45c8588d1a53eed57ee1
SHA2563ecbbd9ef8713f05e815629e90e342c56b22de7cbc4a6f4397e8dbb33789f3ea
SHA51230567d10147bf1b8147a03303635d5105043771d3935e33dce39732b17f71fff02a06b5ad9422dcad37cf4aa48b7f640452c40e091561e2f119ae866b501d87e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54dda6678dd1471496db4aad7b552b571
SHA1f6c5c6e31bace21e54d2d3ff5198f86ed4260f91
SHA2569152fc565db4fa81ad825505621cbd1e5e86b7a5139a28b4a0d7638c5a78e0cb
SHA512c0664a29cd69048584f37354635f69a8c9bf86b855475cfdbb25431aad0bbfd73639627701e322ec82c59fe894f115329d97eeda721f92c677d9da380be0c398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c020841e6c5fa11ec08c56ea67510235
SHA150ccd06c7287a0fbfca08d163b84cd8cdaf058a8
SHA256d049bfb3f97a889a81f187afc125ebd804f4d0dc84f9d860ff6965f2590782a8
SHA5124492fe104d9b9ca4e2880f4696fad22f321da3e309ab79504f558c98f71ab3d1efac72ff2d7061e57b923ebf7b0526c7813d22bd3cd1c4a280783a4c35a47085
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5644cdca3fcf43e8f58fbc08e1cdb4723
SHA1d7102dcb63e4968ec78a5e6ac13f42e54feda652
SHA256bf4bfe640704837191fb6edc6f7077ee9ee414a0b650d8c5c85a005dea50bfca
SHA51248ce26158ac54fcdfdb6e92b059d7d222d6b6f1d5a68b028bb477f17b648cc8486f1cc5ecbf280509bed19608047bd9b0c373f25ac8ce1b6541f29a9ab63886e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd5b70d161cb82a59b617425409b76d8
SHA12b8b1a6797b29dddd4a3131f1443a17b415c2b2d
SHA2560f06506711d63101d31ef9204c0583d11f6b581f8ecce06050ea2554211f8479
SHA5123e0a86a63e1316be5b91ddade43fd8f668c6ca7c89e019d3b26aef3754e57263ccbfe7551ce00a384a94b7606dd08e013a4ff7c8e7e468a99e717b5fd0084d32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564d4ef4020712abf6b6ebda308782732
SHA199ebd52405754298df0c1431c75fabfedc48fe07
SHA2568d50e95267ce6c08544ddfd685ffd2bb8300bda67cd9711875ab43e392702239
SHA5125b52c12cb2c1c5880ee7f77615706e3076a067df020449209c8fc588ee0467168e4a6a911eccb414c4083e349ad910e5098403f03e084c2b8a059ac2b3e1d08f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6892fad0dd24430696f368e19d0b82b
SHA103e954edad61725f5da08b2189f5ecdc7adb07e4
SHA256a633398ca5c86bb7a63ef725015d22a6a2f1fc82f09c04beced8b80333d48b5e
SHA512f00912c4b1107aa5bc42ec88aef751edb3e7b7828142efd20df760f3b7d83645ea500519c343368d5f96423a2e88492aeaca7ab3f3a4c31a0a1a597ba96ea8ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e05c8e4769354b4a6b6c9704416133b
SHA1237317ca75a02babbff4fcad312e2139cf139ed7
SHA256932801a76f84012789765846b22828339a1cfbe4a8f8f825860f812a2e32ed2e
SHA5122ec778b4e40e954608d59a400339dd39a9c47bc71aa4f12edbe03fd7de1ef679143d009139d63a138c2e7175868d6d045a343179d32ac704640ab9b3c9816ef7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfc92f9c0c789ea5ac2944cc4fdd4b70
SHA118cf63746cbe8d673f78ff9eee4b546e6cd2513c
SHA2566bab49ce04389f302c7f1cac300323cdc3fff0fbcfdc4713aa96c4cc8d726c98
SHA512d63c60624806f5a5f9ebf95d85d74e6b461d70b6e605c827b41d8f384403d71e17fa3334c6292e211003cbc7ae8086034678c394f1477465708470a29a34b86a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b2f3c1a26ca330cb657a3e6d224eaeb
SHA1641c8ac44d156b045dc58346bef30bc2f2c10a34
SHA25639dab8f6884fadd9eeca116adf49d7ed3511228049e870aca64a2c62445e6428
SHA5126ae70b0680f664f8881fcd8b301b5413f41716eaf063fcb53e6b13275bb61c4149d0b2c024d07a1178e256f0e39fe08bb2b7dd3e69119ab9d752514bffa16f2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e467d9f6e612447b0e0a4b29af61168
SHA11c71d2a0ccde3eb94acaf51ed3ff580cd3fccbcb
SHA25629a1a67d1a1e5ba56c5d7dcad4aa13014579c4f72f9b3e6d59423e608430fee1
SHA512f624af749e12b1c92f043ff4977ae125ea5d11ec4e08b960113000553fd74b482d5995d5ae596789366503685cd430a48c818c10064059bbd9521c5222b4087e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522a7b36c8bd86ac9782a79fbd8112258
SHA10472a64aa18bf86268b1dd3f8234907baa31f6e6
SHA256bfa4ff65bc3d8b8ac0837e82f8c194597e584e870ab63e717cf1ec3c7ef565a0
SHA512a825af02e8feec1dfa64799d2e59f7e733f04150a4d165fa60ad4c45f13226d9dfab39ea2d01c7bc3130ea804233fe9d1d66c46883054e8cf9fbef0ac78ec262
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6c7915d77cfe7c837fba5f84a125042
SHA1c7e6494efcb31b6ca955d2ae6be20286fd2de9b8
SHA256cd26d9fbdfcf7b923be1a49174587e14492fbf78a0b593420e0d612c90bd2bed
SHA512697eff9fbcc8701030818f80083acc7bc7b154ccd4079c5b72b393efe1f142b532b528533c1901d34155c5ff92d61125e1e3458fb235ac123eb588cdfe02e37d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf1ec35e01aef1ef65b95156d2666f27
SHA1de2170218be0e359399b18e988dd3b0c1f77ed71
SHA256b321b7f58ca358becd92b065eb15689c78070d54eac276628b02dfe4c63b4b85
SHA51220a60ec7c0a2953bd8e074e37c955ea6cbd9b14d8ae69a0092c673b61dddfc5a4ef4d594ec024a821a422cea33f0de83cd1ff15592339bca96edaf15208b3812
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5202963da56f4dffb93eb5e1616c6b0b7
SHA15595a266d2498a4d954ce2355cb6c629a975fb46
SHA2566b55de44e2cc31b1a35d85eb34fcb16d08018ceffe9cebd1314723eea2c7d034
SHA5124fff32d738a24aa11f64a3d6ede01089159437086fcc98c7613c6b02c0c86ba1d5cc88edc50abdc2c122c703ba199136f7b316c2464ac2b415e177dc6b3afabe
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a