Analysis
-
max time kernel
143s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 14:13
Static task
static1
Behavioral task
behavioral1
Sample
63934b15ecff304439ab0b3d7fd94467_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
63934b15ecff304439ab0b3d7fd94467_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
63934b15ecff304439ab0b3d7fd94467_JaffaCakes118.html
-
Size
70KB
-
MD5
63934b15ecff304439ab0b3d7fd94467
-
SHA1
02508d77282c14e748a72c2f2c1b36a031c6de11
-
SHA256
6e272758f51748ca7ef591574c5759e74fab0af60edce53b64d55e1c6ca367af
-
SHA512
98f010c41168659dfd8defa56e476b46a91588742f4a1d3b27791f90d6aeac475c7794ef3285036ed76b9695814f4eabfcc7dc345408cf7204cf5045d33187b4
-
SSDEEP
1536:b80DfsyEvPxxNvPxx6E3LE3d7FuExZLhz1NF95ycAKveGB8vHLWu/06C50HgSt7H:b8xnvNv6w678ExZLhz1NF95ycAKveGBk
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{594C1A71-177C-11EF-88AC-F2AB90EC9A26} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d10000000002000000000010660000000100002000000016387976a3645aa7c783396989965b8d093304ea0690adc663dc6b7b78961617000000000e8000000002000020000000954efb7d2423f06ac12dd6689df34c7f8a5b1edbe2551a47d112ba9b3407757b200000005081ec663ff81c9d844f2297e4dd27675ff012d5568977bb945d1e131c82e3df400000000cea587be43d8bd725557b0d304d02191be0c194d6117c6dcb230da3fe509df37bb6a5c6fbe3ef8781a70da69992b984b2d17e042017d33b14303505377bdbfa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 509e4f2e89abda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422462699" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2256 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2256 iexplore.exe 2256 iexplore.exe 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2256 wrote to memory of 2424 2256 iexplore.exe IEXPLORE.EXE PID 2256 wrote to memory of 2424 2256 iexplore.exe IEXPLORE.EXE PID 2256 wrote to memory of 2424 2256 iexplore.exe IEXPLORE.EXE PID 2256 wrote to memory of 2424 2256 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63934b15ecff304439ab0b3d7fd94467_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2256 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55db95cc5d44d30858af5eba5e9fffec7
SHA17434bd630dbecbe80c5266d61eca31ed833055a2
SHA256419720299a89ee47cdfb9780cc0bed67a7532cc6fd26be342fbd143346447904
SHA51288668ed0a181a44520eb8b981deab413c4bc7f6e54abb07ced20c4381c25e1c45215c61e7ed0035b3a2c195531d7624a801bec657a50a780a444e40e1e799d6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510083da3061fbe1e11784ef17923d53e
SHA167c66c6d75d293fb1345c080a4bf18d4bc63657f
SHA256a52ce6a6398f2c2cc3fc4f8f7eea8afbd9d06b844f80179425456e989ed574fa
SHA512552bb85573f1552a78646ab15221a6adb829764d8d58479b0dfb9c6601d7c0fe4faf3929b1ed5322078a7b010dac753a4ecbadc177a44b5be5bd4c39e634e65e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f66a8c4394845b2ebb7b76aecdf4820
SHA152b7f3579f8c5e92b608050e17ab657a9fc635d8
SHA25602f91c12545fa63ccf1e8b425969de19a610cc5fad24ed29cde50be33c903f7f
SHA512e99fd392d5b6c3cf95a9decdaf8ad4a2696ce3dcc8ea1f20da412fa02c2e16ef31d2587bcbc1c240b02d8b8b3d3b28cdba0221422bfe71f84b45ac93d751a727
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a858f697225374aa58149896fe53d285
SHA1b74794ce8a4d2ff76491a5b1dd9a169b5b6ff75f
SHA25691a0fcafe1faf02ec8adc178570fd09c54a78d028c8f195171d5f1f6a1487660
SHA512e5092cac98d3d62b4f69a39cdf746c8c914de1147fe846e2dca5b2b30ff8739bffef0524c3094ae46f6ee2c5b26e23df4bb8540efb5f32a271033fcad7371fe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eeceddf8d451a5ae3879763e1fab6490
SHA10608f48acd7cfc1a4def783f378009957e21dd5d
SHA2560958127c4333b0d140ac7b9c7e3ab48f46b43580af162d95eee1e89bb0eb6124
SHA512ba6973e42b6a82806747e3f2c9b16b88b9e27b0b17cc077dfbf8be05f078adf9263a64db020f1ee4b306ad38437fb5629f0de32c0cd3adc959040f67eacc98ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58350fbc158d97bf91cef39f2230644d6
SHA1e0ae1af448fbd339827d5f31aa7001f4a21b251b
SHA256a8f1d3c58d563d77b9ff9992564c7a0884a8340dd1b0f99206351e917eda282c
SHA5126b6590fab6330326fd6cca0444c8ce18d5a46641c5874ed03920f098b8fef0ef6be97ee97201db3ebb0ef2b797b44aede5b9fbbff5e8040f3c672bac8f95014a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b2574c57907c20fa9d51e6016a9d457
SHA1f142a9c8bfb62a9b19cf7c7318844f6efd7ad937
SHA2562ffbe0b4378a21b347185d75c9d2a0a2b2993492bbb5f7bc58abfc71bd90be65
SHA5122e52acc5e59072229ea0db3aa297d0676bf974d26fb85b14a9abafb4aa8956cdfcd9b85ed0a95cdd5ab30a80214e48dcd0b8e08e51f18bddc20fb06e67be5059
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50905829f14f23e6ac2270f299ce058ed
SHA1054cc3075c0d13780085b0b5dcefbf569a86f327
SHA256668b21b15fdce51daf6edddaed2e1eca2271202e2955144a4ea034a8f6e86403
SHA51218f55da736e0cc9b43501cc5774745b6c4caca4bffa728de0a4ff266dcf212de9500eb46ee05dae145bf1fde51a20c9f5a383969750b311097c1c019bd803295
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4c0aa11d79e8ebc092013c359106cd4
SHA1c16deab1008dd815371ef9d3a2ec0e3ae221f418
SHA256cbc5f38e30fe692c470d84f2cf372542ed6f309fe981d24c92e867f6afcccf23
SHA512b7640d42dd30cf940061c6af8596bd444b62eb09980c3fbdea1886f89d657e8492613611d4368ae0870c93e1900a66335bc24d259eded6d6923bd1bef8cd7c8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59001afbd8df96602708db8f421583b4c
SHA140b44763867d4833695f0d49a51150471929f9a3
SHA256aeb48f06026061a90791b656af3ee3373e7e018fe40fb013f6259c90498f401f
SHA512bdf0fc5e81068c6a60c0ec08fdc5f1c2e700286989fb2f7e545f242a54814c2419e5643e98aa1e499b65666dfb90cb9e1282560d6d9ef6eb4c22ec071817f9d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504e8df6c460f5dbc3962641ed0b12052
SHA1f84d7020e1e27bd7e02ef1992a910e97cbf40eda
SHA256aa8767389de127553ba13dcaab75cf4b05b1cf798389b352607ccdaaeb3ad7a3
SHA5125fceb450e8ee8fe78141ac54c518ce0d291c9c7fff114503720d1ff17847bf272403fd258288b9f8eb5fb473ea400e0f9733f43ee42f28503f32a82d65557e47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a68c684c6d59ef276f8a7818b272a99
SHA1248b6e39738c05cfa621b606129467581e5faf86
SHA25690dcc277f9b303d4dd73cb0e19fe1472d5b7305392781a410cfbd16e8bd44e19
SHA512de5e3e8b3677dd2f0f3d2f44223e8f213bc33bd8adb5803a84a1639862cea151d55f88e600938880dd6e9ca60e3187e43d373079a2a49ccce0d5e8f85cef0e2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7919344556cf059d7d671ad28138695
SHA10a8f485df9267da0ca42aed0f88656d802d43751
SHA2567d660799d279dcb9ff2578f5c3bfc416cd48cc72fa10d0a6a6915c385212c18e
SHA512179b389807911ed9cf2e8260a9937d8b910b5fbb551cc6c983596efeb201252a35a6e5b6a2c6d6f8e2f167ce8bc78872988decf48c6a66093bc8055d997da0ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ec9192512f5f0012c731271d0110294
SHA14151e75f959f5dd25fcbfa613524532fb8780887
SHA256b0fb68d2b4a8a0e4bebafd4099fc30915654016f446dfc0561c83eb9441c2965
SHA512151536edf6ef72d74c3197cb56286f087bd0be9881b71bf2d1d5aa9262adefb52fbfbf6a9efd26e1bc5a08fb2ea662005ff6a4c4fe13fd12eecda42daf15454b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9e8b8cccfedee53bc790918285d23cd
SHA1197af81a735091d8488092ad529bab36646267bd
SHA256033b797a229ee47e033c3a6e1e179be88a4e88d916e438c77621ee23edf0731c
SHA51270a22e4498e96c3eb6446b9f56708d7fa7bfcb801e8ddff794e9fe392797017382d7e4fb106870d78c87dfcc0645d9b2b7ec396da06a0cf27ea61c2a97549db7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5108fdf1839c931fffd753f332f63e6eb
SHA1bc46782d924212029342b6d3065b6ace45908c3d
SHA25685e110dd03f1da39f57aec0a764c5b5e9374a6f7621110c5ff5f546691b8e390
SHA512a920ae2c5d6e06e384ca434b33835b0c50614ab97076f2c351d7aa657a06638fbce4aed778e6efbce69cf512da51751ae2f47ed525f689e52b8906f5ddeac428
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a486f3143aba3ce4173a844717797a78
SHA1af48f34cbd5c3bef4cb7cd9b2a90105583ad1e88
SHA25627e5bd03cecf9e711cb82eaedeb0b0e2c705d789f137de4361e6b39f154129d6
SHA5121d0b137f6371ed2c440294fd6de1b9c57a816a6ed208823b43df3d976156a4e711db5a68dd18d5a76885975576fe6354e0b5995ae1e7c8535f0dda1939264f6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ecfae220d0158a8f6df7abbd5749f78
SHA105a9d2a4705608901ff3a702f792c2b8c6a3d31c
SHA2565c7aa9081fe13f1fdfbe92a763ad17ed6a78a567e3ac2b892ffd8e97292308c8
SHA51212e09b96eb7be4c1fbe185b1578f166d0ae30a48a73665a7ce4dff1e245af8a093dd703fe4ba4295a7b47c602aea68716bf11f7ef0057b19966b6f1e39c139e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9adb5f47150d8b5f2d34d935e70534c
SHA1f733b22d0d1c5d7199b37b6784f9ed596d7cb727
SHA2565d2e81cd4c2c5d7e457e8c63cfb7886eb996d42afc1dfe9bcfad66d2440598c6
SHA512426f12d41f214673eb37f9013c7be5ce72e9e2e255aba67b6328081d2cb88b7932a722ee2c954b236ae5a63f58d4a7b5de05ca005b5655d563ba47b08a54b40a
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a