Analysis
-
max time kernel
117s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 14:33
Static task
static1
Behavioral task
behavioral1
Sample
63a23d4a5ad5c36532f22a81cb175f91_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63a23d4a5ad5c36532f22a81cb175f91_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63a23d4a5ad5c36532f22a81cb175f91_JaffaCakes118.html
-
Size
28KB
-
MD5
63a23d4a5ad5c36532f22a81cb175f91
-
SHA1
957b77556f822fdfc0cd06be97e29189fa7eba81
-
SHA256
137abb450feca7e20a488abae55fe5721b46237c027e84af8367f772287b3be1
-
SHA512
a79e705177c657c3895a844eabe1f993490ed0875cd39551ad40a3bc9f11cfca0d9d736ab7ec29810ecc91f6414dc4991cfc7ebfe2359543dfbdb345ed2cbbe5
-
SSDEEP
384:EpUVf1l+8y1PFVNByrT5bK3PNU1hJhNKIFRhfhMNBR3BrfjCCP5H+SaPPrTGbkua:EpUJ0XiT5bKfN6hQy4BRxrtN+jTtcj1+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40bb39028cabda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2CCB30F1-177F-11EF-9F3E-D2EFD46A7D0E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422463916" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000004eb6f43f72abe8cc9b18d92db76ea00def8d700e0034fbfad65a56d4a9bdbd84000000000e8000000002000020000000e1038873ccb4bedc871d93e3730d6f6810bf131c2e3012d451c8299853527994900000003d26f61c4230a178970da226feded86bbb1133afbb2355c7d3a37a5b9e26f9e0259354bef07c449cc663debf19bfc96682f06dbb03b8e02c2e0b649a2b69635dac925f07b426484ea4ee67de43c0e28539e4e6bd63b3e5d0ad598786547153eb701d91c365af734fef08bf8952d01d9904a23e3bf19c4ee24140487f72d67ea914c36dff0524946a0c42f881f67633a2400000004500be6015a561c4fb3b293ea5019e722402524104050cabaafddacb2259c7f7a08e6522fb04aca18e7ba9e86beac0e0256c48a8d67b44717463bd71c4b24deb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000006d780567ccf2f4452b57898bcbc6acd4fdab3df50408b0ce21dc7330c8e4eb3b000000000e80000000020000200000006afbc3436798a7e212efef19ad36e757ab1cf1223356e6562fa40c4e18370e5a20000000976ed4a0ea13bed290ff6991c89cfeb504f837a41c4e244e9c0a272b93d653b24000000056f5fe9306a5dbb4afa7587b9d53b018656375907d38c1fb22c36c34eacaafe0f41cf1519c85e6df0a0be48539734c5e0bb6011fa79231793a3fe74b827eda82 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1544 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1544 iexplore.exe 1544 iexplore.exe 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1544 wrote to memory of 2856 1544 iexplore.exe IEXPLORE.EXE PID 1544 wrote to memory of 2856 1544 iexplore.exe IEXPLORE.EXE PID 1544 wrote to memory of 2856 1544 iexplore.exe IEXPLORE.EXE PID 1544 wrote to memory of 2856 1544 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63a23d4a5ad5c36532f22a81cb175f91_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1544 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59dbf3eba7301a826c8360a2af27aafb2
SHA14405fa16f1d949b53fc7ef3a20e8a3674eae386e
SHA256409d8128dc101a60d4dd8c95fc8404adaf998d53fc10685ee8b3eb44116ba5ae
SHA512fe7475b6465e90a5bd28307b272feb704c06ae1f3b82038155566564ed21ae0ec129c4b8d735c85eb73e5fb21c1c8abfff31f14612f94b4f8f95ebdba6acf863
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56fc0adb6d506abc95da7fb9ac1cd4532
SHA154d3033f0d811a79032dcdce2e9587cd2aaf5551
SHA25611697a31c6a319c4ae9b30d2a9f2ef9c2b7fc053265a3765527b98efe1e836bd
SHA51226e4b8d7357236e5a813ca2113749cd632f8bb936b576ebf79130bfdbccd8fb3ee1f92b3d2bdb60aec831d5f8c3997f18b65249547e951b64b53dfcc4a757cfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c07a9e862561048cbd3817d38b10a82a
SHA137bc745514f14fe92bdc9b3ec7ea9e3d18b7c821
SHA256b9bb9f200f917e8640d98f487cc744f656a62f72e8782d155c045972d472bb7f
SHA512854f132ebbc1be0dae19a17db1260fd24b66b741bdf776ab602c8bee5fbbd1d8580182729572dd28881f76505a7ad6ef5fa6e8e32b89440ea67bb749d3e08dad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58edae19dd23beec2b36c1442ce6937dc
SHA1a1b5ba9e70c7cca54268c69b60c774a407a2b503
SHA256189edd3c24f1f93941137eea80dd54f02603437632c2c0845f98af92484ab180
SHA512ee07ed924ef9fbc1e1bf15b481a41a6b6f62a6bdfda4d2e1d9b92cb24c7606b62c0f0c8c924167bbc4132a5b2bd8ada566803bd23447589d3634c88da511e40c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5619a715a7c09309362e24b3e44e91c27
SHA16431d7812088738eecef3949c3c1fe8967efdc9c
SHA256863a50b84cf0dd6785353128411343e87e71f2e36276153a8718b33ff41f5d8f
SHA5120ed0a584a6321c0769699b85cfdaa484786abfdeb085b5e4f304e91d7076dbdada2a2b2d1d96439fc6ed74a3462c75442c17e36bbfaee4d62fac1d4b89015ff8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a502210d95459d3c847b35686860005
SHA1958d8433713e32ea638d6d2556b2f248d8ff0078
SHA25623dc9787feb062100a886de4618707beed9259657a3ed1faf89ef9a13e88f500
SHA512731396633f37d4bde31ac7d5cab4a75efa9ab7b88bfc2fef5cf78554a28e51a4664bbc3589ee9bd290aee832c904179088280d5e6bcacf2e3e6ab4cef4f2c434
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5638792020cf293973d00b4eeda29f43d
SHA176c449033e483cb7978b4d3b7b17e5e58f4e0462
SHA25660a6900ea1d4e2c8b2c1169cf55b6811e8769fd13b5dbb5dc47a94ef9152fe7d
SHA512d91180ff87453db068809df3b002394d7d462b0d90f439a1d00b8c83c99e446830cb38f0c6ece77d96a9f450502fcd7d77f61f131480486236c67796853133e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7cffd343c5bed12c0599b97b6da9e0e
SHA11fc7dc2c05219ca4772e32596e9d6e9648f36ed9
SHA256b2f5dbb05ff82b044a9f05c4877a281474993079ecd50cc953bdf0f2984d7af6
SHA5122194a81173bbeb79a1b6396099a5df608cb13db2adfce715c7a6fae872e0691a2e4cf906192c832341d15bb111282426c433624471371673c8aedcd8a869ae6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5538bff2228909797617fda56e9ee7f45
SHA1e620f14afc37f7692f94b24a3343df2fead71897
SHA256aac246af16dba4ab1fd6056e5276daa47b2d89f965c11759266a2c24959eb55e
SHA512a4111cc4c4b879a0377f33397c00d5f79bbbbaf919d78779943bedc5a6a0f72339b0934420ccee94997cc8738979bd674114093debed857137e728d7e49c32ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572e6c431df84a90db3a37b4e3415209b
SHA1b734143fff7030355d27d3cd581d54c043bba14e
SHA2566459d2dd624a5246e970816a2849ba11791d93592fd4f0277d1d24fcf41917a9
SHA512b44f49fe11b0da11286a1fb515fcc1e8e1a0527b918f24ef4237fe5971cd3336bc42acf8fab7c74b90843155f4d0dfabb84d5f9b00c23942dd7e3309fd4a3383
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5769ff97fbf05ab113241434e7848d0ad
SHA1aa60be6a1212b1da13958fb5823165fb2d76f2f6
SHA256835e7cd362227b10cc92e9a5ab16d207e1ae53794aa18637f221616d8c3b2d20
SHA512675086ba2a5471553f31814f3341d821f4183ecf83a87b3a002d22c99abd2c281d95bee4a8f6d688359cb37ada26affeb270013f57a7f2c143fae45810845aff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502499424d8f6336a6a78ef9e38423812
SHA192d55a1425e69b024d95063637773cbf5fdd1a4a
SHA256edc0003a1310de7a78cc92270bf7132b801c2fec5b45ea70f59d53a5beb23434
SHA512f41c2428fa219fd902c7237fbdc0384763c8b34836ec4be4ead839e176a8988edf8e724a22547d5fd41bd910e4de5326eb4b9194ed5692e93d6c9d0fa3e81f21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54656dce870ea6c9e999116a4347865f3
SHA1ced61300a0e339d700e8292b1bd9987bf914b398
SHA25669cd4a765d1e59c6c95a4a4ec1b9a35a599a6c64d20f5319376bd495da2b1219
SHA5129101c0951edb8b060343a98fcc26e4601173b1c4bcfffcd88f20e908d6d1e076220b0f6428b1f437bb0056fa88b3d339c052fb215b6cd79f4ef5782166d66caf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5347da156c70a6494ed2cb59c31915cb3
SHA12ba9d01dab72fc97b2808ca7d29686763d38e227
SHA2568fa2944d568d79f8c2156edaad8c16d8e65e6b73b5a57f94a4fd7cee5950c12b
SHA512888137bc090ed62bd856e177f1d91babaee096da15b15d42b7c5717125df87e056867a605fd57a9828d11e09cb825346f5e0481cd5b5b2c4811c3afa5beabf2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58616cd48033294170dd2b4e7a377e933
SHA140a01a16a65d4865bfaa58546352b528c5e87c42
SHA2563a111b64585ecb64eb05fcf0405a418ffd47b03a5e0cd707a086d668c9149159
SHA512bf3dd51a12ebf29bd3a006e23774eff65ab4730e8936b319f4c9c88ca082e402b5cf9a64cb627fcb90639cb9750defc9371f7077538662c4eab3ab561dda99c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590c65ebde58a8b81299e313c9b14deb5
SHA160618f58080732b4ec746c3945d2f71675737240
SHA25613376ae2fb5cd8db2ecb3e606cbfc141a5f6155fa6979fae22b7c0a7eef5a5d8
SHA512fbb46579380845fe9b73621519f6eac448c4169ea795369f28e17ebb4f5d791474456588c0b72ea4c49ce86628eee887fd730c73a3614426e81e80cdfff6dacd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ef404eed80196d8c220421f93767dd8
SHA1d5ab7cc01014c2752e94c3b645c74b59a35f27c4
SHA256a4e156373374f1deb2c9f7b92842b78998e51eecc09e6b301fbc6155ac8ac527
SHA512daf7affe20a1ba5fc5b9c28bbb57a0faf57e95082b5f84232ac6a7de32016df1fae6d0e883303bd1e106e175991d5e34254601f83ba4ff708deb7d7f16254518
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a