Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 13:59
Static task
static1
Behavioral task
behavioral1
Sample
63894d51cd5f8981ee80031cdb8981bd_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
63894d51cd5f8981ee80031cdb8981bd_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63894d51cd5f8981ee80031cdb8981bd_JaffaCakes118.html
-
Size
53KB
-
MD5
63894d51cd5f8981ee80031cdb8981bd
-
SHA1
f3a7c45ca8891288b6c8512673baabc489efef83
-
SHA256
cdd38e1989c0b90455355612a9819bdce78da07e1a6c738026fd8eb85f31634b
-
SHA512
025a0ff651654b0dea3781b332df6cc31f492a2d7bbf3a43ad0bb6e14b1f65d8d7cd27cb447450b159090faf23913a871f48a4cd46482b1efc98c7d9da9dd9d3
-
SSDEEP
384:NZFHApXITWD4GNY6GvxLms5dbwTNbWidh0JSgQXq+tY2Unfax4WW+lsWxQu+onQo:NZFYc6Gv1m1nk8eZne7nMr4nT4wNL3YG
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002fb6d15a1431b14bbc446243d68e858e000000000200000000001066000000010000200000006456869e7c14bcbf31ec08c1a2fc89a0457185c634320f407ca2da4d2ed03dfe000000000e8000000002000020000000f0529b8631805b3ca92c7d2c874925b5ef0681375a6e51453bf75d3543becad120000000aba96eed1aa76e7deac44a628e9000c04ac8c6805309820fa35d7875cddd083a40000000a5d772febf6c8fc24c97cced907a957b152d8cba6c4244f8620e430e4a751223f3bdd268868b80dbfe6e51f1923bfa70b885261e8217e8b4da5b2f145a238395 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60783c2787abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422461828" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{521A7FA1-177A-11EF-BE0C-E2E647A5CFB6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2932 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2932 iexplore.exe 2932 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2932 wrote to memory of 2560 2932 iexplore.exe IEXPLORE.EXE PID 2932 wrote to memory of 2560 2932 iexplore.exe IEXPLORE.EXE PID 2932 wrote to memory of 2560 2932 iexplore.exe IEXPLORE.EXE PID 2932 wrote to memory of 2560 2932 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63894d51cd5f8981ee80031cdb8981bd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2932 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f7dea35b12b5a092e2f142f35f61cd5
SHA1788afb47b33dd7fcb805d60650b4c5e469936748
SHA256152466dcf694e7d43c0712eb6cee7198596cbda697283b0d03ee7dbe22708324
SHA512da2ba559a0371a62c60d09ec91cf9b03a47cdfd1a13caa6b3ee8cde7c949ff76ccda1597dac8e48467a05ac07485c9b26676b25a150af4c7c7baea54546716c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b545f3ee1217cdd1719de099ab04d95
SHA1bf5d4924437f0ec0167e6702b2cc45b26f530273
SHA256d3a6b6c11e4b39c29f094520772b4b0bbe33de9ea872ab307716e9c395756435
SHA512ecee6d1c102ae13995ac8225977f890dab35365a48ad49d7d395482cd32ff53a61f8a3c96b13a85f7de6372d214378be1fcbc502430d68d712b0ff4b84f2c443
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5555bc203273ed2b0ed4b7cf8f75132a7
SHA1bff19332ca4d52795de6310af527946e3a6173e9
SHA2562949c84b50b6b3fa14163b6fb79d814a9f71f2ea780df512d5e5f3185480efa3
SHA512603c35cefadbd49874b2004cd76eb4cdabfda43005df4d81c00aa1174ee9e54d88764c1cecb03a4dd6bfd624f09987b633f039c71a9e7e4dd049e725770ff6b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5418c35cc43248db5434507d2c82621ce
SHA191f34574fbdf6b2d0008424f8499ecbded2fe5e8
SHA256f6911fa538c73461925cfcf4d323b865a95dcb1e35ef74fd3f7bc906f964e989
SHA5128d27b45578cb20068f84c425c6c9b847ee2dab8fbf7e798996895785ef0152130327978cbb8a6721d4ead08e7290a0a56ab17caa008d8d642398c735691987a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5502caf6bf3c2a30fcaabc7bd186dbba8
SHA13e3c0ae76a5ef425f272a5b67c3ef407a7348851
SHA256f70e44a7e5ac35aa6836b9c2779eb8d27af68cff05ce91a45d07af504ffa032d
SHA5127b0b6c7959c813ea4e6fa3a8bb1a771f8a5110133d87211ef35c714e5200bb74736981ac822c95e4837ede35e4f9d40ae702a3456d3279b23799541e0c210ce8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5940779179dc5b7d38c5455988ed8bac1
SHA1e71b5d0224e12cc1a59ada8ccef14176b86b4a6b
SHA256d3ac814f56f0975089a230510a7ddb51051f961b0506eb701dd45129ffc2fc5e
SHA51221250934bfffe1da721b937986e29df7ec350e0997708160987aa8659620bd3928d69f053dd6aa94747f64b59d4a278fe0e73858eb0e76d23b0a0d79a2fd3427
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522467b42145568bc0df38dd6eb3abd1e
SHA14732a24e4b713c15901043783fe2d74e8c594f04
SHA256beeee1323132891aad8b3ff41a59a578f4db00a060d1d6c8257f32d469563fed
SHA5127aa673e990ac4084736b02515dea42e5ec197746ad24b47bcdc1c1dfc30c65e3c23179b2aec18fbd44a28cc7b7ab81bd53533c43dbb1d2e73689b5b89d1e7658
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7d6f3ad195177b50ebea088d5353134
SHA1b4eea41dee55647d2d8f865577408d0757d7c67a
SHA256bc900283342e4e8bbb63b1160b5eb3618b9d9eeeec7dd61f1b36b88f960390d0
SHA512ea5ee072e6b1b38f4e7f63eb3618a78692f2cb92f58344116e944a33ce7000fd6722596b5d3c0401a5cc9a6018cfba895da6825f1d7beab3b20b99397336a041
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c204feedb9e8c8510d00e9c61ce7c047
SHA1c1f20f51f5fcdfdddc0dbf434da575baccf0986a
SHA256cac827c7f834c7fd3ab948b8c1607de68781d8d5d96629f82452f95dd4113e31
SHA51204a5468672bfe08a2b4dcecbd968a5dedbcb1cd7be6c14fe89b60f595cbfec29e4fb8666ae057d0bb6745d89cb774bf0c709628b4125a8fdd498d0f6768b70b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf92b211587ff506a420a9d793d59fae
SHA1e4e1a2ae491b0bddfc0d1bfa013dc7275d4c5558
SHA25608385a4265e8e366b6c26c5e327281f28a18d133df0dc82194828064c7e5cd0e
SHA512cef0a1e31b963bcf16e46d411eaadf6807b2b9466d1b368ad5a4ab97bbabcdc5725163c4ed422637534aebbafbfab196a68c942f6cf83a2b536826b634a01e75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bf05b6cd519380af23ea86621580301
SHA1eacee496129585c13f693c4cce23d408f92a6edc
SHA256e861c3fd411cc53f187a1a10b39243b0a8e6e60cf28283206e8df2d47f9e1e10
SHA512e92eb4a1db33f3f4123f89138d35b1807c2e537d4cd6d4fb97aad4325c2771ff53bc9d55bb37f647c06ae650476f30d96a6792061dad43d9de763e805badc22b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55939a9cd333738d38c9f5aee31b56f6e
SHA1ad3a2cd70f92f1d8922f34277700bf73ca858203
SHA256d13d0ebe63f311a61c8955bcf0aa99eff6679d24658d42be6b7b49a4a7ac4057
SHA512091b663daaaf1c9992b5ddbe90b70611d895e40c5ad570a8e8157b5fbd1a14d88033703985f5ded2755d882c2f5f0797e9cdcf4c3089f246f668691ee939b3a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aad669785538275c35f6c3a8cff9a66e
SHA1ceca645240ae151f9ffe6aa1c1bbfe33e6bb755c
SHA25613a62023f6978816cba637cc830981c2f1fecbf0ccc057d2a21655a4c754ac93
SHA5127fa0fe191c891a342de214519ff147444ee1be5fcd0b8a231f7927038ca07443ac0fd087ec11851ff549c68732071175f47d5bc5e6509590dfb100a2f84cbeec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f83e04a99eba3b075e7c315038c6c41
SHA1c6cf8c9f80545392e9706a785ff23d8b51fd59cf
SHA2564416fd7f4c087fcd7fff49787437bc1df5ec0ae9f127887770245e4966a19c01
SHA5120c9715294cce0d4e50b70edbe55c97d861a8aaa395d224f72eff81649b02ebf7733eb4d0f6e5302e924bebbc246e9e768f7f21ae4f40c42ecabeb6b7eef4b832
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ae608113529bd5af03a3ced242f90f1
SHA1fcf727840f6fc667d90beab5ed1b2b070d13c69b
SHA256d6cf56ab69ac40c06e78b16256bde0a5b18cf3921174e04497ed7dd0f1feefa8
SHA51282fbb2702a932f11e672c3b9ead119a1b982e4893f34b6d231e013d9ca25276ca813fb3f920cbfa13be122017faea93dc8635c3ba0840a8819a19c7a6ee6b66e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fcffda2dfd8f57d114c625f9f0e1a86c
SHA1638bcd4b276dd497f8cc55802e4f70c71f9ead97
SHA256e37f9f584445409bb3814af1c83eabe0a32dea06ae2d719e6fa0ddd2fb8b7ffb
SHA512a344ae3700fe2ce18a06edfd8d20506182dbd8e16886587c65bd61f9c39f0b107c530b3cf798eceb94f37f62da47c47f09441b9f8a6a4c6bdacd78fad989724e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae33b63132f2465a11914c4475c42e5f
SHA1888a5e73d6f67b13a9c1d9b97112744c8e699411
SHA25656ccec0e848edc099bf64bf194b5c553397438558f54c1ae770cb576c0f2e12e
SHA51223dae632145ae7f7a9c590d2c9f6545ea5d2a67f031847778a123447c9bd59f045a36e3147ca747f3660d4a366c6695e28cd07b218d85ef94f33e6ad99d08282
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ccc9e4e99681b15704f21d2e873e8ef
SHA1c1f78414156f514b6c94f7a0db06e18dfe814d3a
SHA25631227074cdb4a73a82988cbec6b293e5b67a303d841a252d1de4b368416032fe
SHA51247cd15905dc635a9893fcf50074508caf0239ba2e35d4f9be1bf461d644cfc38e3baec5b5c2d997901cfd61190d7f42ff0b738788e908fb1d9b7b1519f40edc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53095a096c73af59d69d12d277c8f88b8
SHA1c5165721372388b21248ed8dad1908799c6f0731
SHA2569348573b9ea2b9b9b79f7b03d01942d67bb2696f9fa57e5db16947dc61f45781
SHA5126123aa8095e137d7903557416ab48f7947a16946b35c2c8b7fc6ee94552bc6d073adea788818b9878874ba59d6c0a105e58b9f5943a20c6ecdc34a1114332751
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a