Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 15:36
Static task
static1
Behavioral task
behavioral1
Sample
63cfc0db830167ce4b107f2b6ea69129_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
63cfc0db830167ce4b107f2b6ea69129_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
63cfc0db830167ce4b107f2b6ea69129_JaffaCakes118.html
-
Size
461KB
-
MD5
63cfc0db830167ce4b107f2b6ea69129
-
SHA1
5f6e28d9c82bb946aa0d327b24593cd8ad030f51
-
SHA256
25c906a201545c459d28d0f39c3d84f3d3f39ebd31d65ba9defeec9ccff1dbe4
-
SHA512
c270eaae21077619c5f1271e4e1c6854f1e69ac7129aa96aff1bb00154fd1464de892521a3f1a505f4a5bf9f40532e1ffb31bcaa84a10f7c74f7079a831d0471
-
SSDEEP
6144:SkesMYod+X3oI+YWQdsMYod+X3oI+YNsMYod+X3oI+YLsMYod+X3oI+YQ:65d+X3h5d+X3n5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EF36DA61-1787-11EF-BAEF-F2F7F00EEB0D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000b4ce131ebb8790adae82c9433b81151fea95cebdfc3055bb0898452255468517000000000e8000000002000020000000c23f29fc160ba43c4c5ffc7e8622150a25afe52cdc4b60d001bfcf1a3aaa0e76200000009363f6d6650b8af7503e16e58d0e86f88791de4f6cc84e9db8db6bd4defb7ac640000000793fb1b3b46ca351a63dc7cf71e7818064d2b427fe5602e7fe931dff5eadca06b61bae13a6d5529b1043366fef8ec36c8debe1bfa777d637d2056286b42a504d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422467674" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b050c0c794abda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1868 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1868 iexplore.exe 1868 iexplore.exe 2580 IEXPLORE.EXE 2580 IEXPLORE.EXE 2580 IEXPLORE.EXE 2580 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1868 wrote to memory of 2580 1868 iexplore.exe IEXPLORE.EXE PID 1868 wrote to memory of 2580 1868 iexplore.exe IEXPLORE.EXE PID 1868 wrote to memory of 2580 1868 iexplore.exe IEXPLORE.EXE PID 1868 wrote to memory of 2580 1868 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63cfc0db830167ce4b107f2b6ea69129_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1868 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56c6851968418a9619ee49f084194ff11
SHA1c8847e85e51a02050d5e83245dce9b5f7b0a5352
SHA256b17f4a394ebe9d24abb0c1c3bbb9c24a3ec0e9eae036adf9216f763732b45b70
SHA5124edab08a489297f67d8ad8d22f5dc625096d9e68ebd5f81b68df970050cbd4ccdacffda387240911575b144f21a977b8c98e744e616f08b06d53db62c9ceae5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD57e9f3e72805602e4dad9ae150b4348d0
SHA1a44fe7a9325fd8c1c3fa9af40d32b5a352a44822
SHA256cc6ff2dd074fbbb2a3cad3ad8f036b94d4e53551e98dce3623d4534e2c6138ae
SHA512e5d2f4435d2b84ae872315fa008bc4a5b048d6bb58d134dc7dc675e0885d96353f6701cdac93f9aaaa3a2b669fcc3193f112945ee86f906241460781e31bd631
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c68e9629d997926621b0ce4d0216a645
SHA1affecece9b92dc352c87d3915ee684e669a4cba8
SHA256f7a580552da383494a854bd60b4ea946abdb4bbf7c2b6ac2caf2f22ffb07b152
SHA5121ffeb31539cacdd4c2ca375213baed7760a254fae600885c4eb1cb134330cc31030fd93626d30fcd50caa9736ba2034304482b49a54b5d68557e12586e424c4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD561c19b5440f55d1aaf4ae45775844252
SHA1eee2a0b10ae2c9e404a6d06ec67eeffa5f6abfab
SHA256f78bdd6c23e34c8203012399a537b759520bae0a4f0dd24eac2b0aa4590fb723
SHA512294fff9d6c887245d7ab4a1030e6636b1474b675509a78fc251d02d5395767d3e25a8337d954bcd5c17eb3c80cdfc9be32da15286224f7cd57c76e81c94873ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5137f10808fe10af2124994c5e26e085d
SHA161cabb7edcc0e19fb31efe66ccb83d84444b7079
SHA25678b0a099759614475baced2867c80dc3c19ca9c17f56d25630e9642f2175b786
SHA512ed63e4d4b9dbba4d70df6a330b72935d6775fe35d3e5a87e0ecde3b1dde6702ec01b61b312ca34f46249b6b32467bc07e6ac1bc436e7ca7fbf271a99db0c7635
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5872e5b481eeae1a43add1227ae0ebec7
SHA145986353fc3aba72a47377fac996e3b8cac9db64
SHA256ad1bf93bff0ed08ddb142e71e6b954e00748b53c56dcbf054b540ffcbff2cf7c
SHA5120d509589a9078f71b76fff751922a687fe9d5deef7966e8d57c8dd9d25394c87243f1c2410529c5703b38f91848a531a3a5a0e68169439638e06ea611041bdbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b591a884aeb366597bc14b5697580eb6
SHA11059bbcf4ddc2c001e9d840e8364f5121cd34f8d
SHA256ab77e7290f1f0a3a47bafd1701d5783f254a5b357273bb7b21a567eacc83324c
SHA512e8a5f5f0f2fb72f71ed878977bcf1c8efef41c76a2aa2a8dadf895a0418d4dd467e7af7a3699ac5d2055680b49da551b3d53a25e5bb40d18c7b8d9345e35a39e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD561e6e81a48ba952f68e4f2790d3e39f2
SHA1488ae8f43fc2b7a8c4a961969e17c84c95748b4f
SHA25658b83d7661bf7b80f87f97722202b8681979efe7430988a5cff4b638a4d72702
SHA512937c848f5ddee271fdce1e66c287bace38c69f9f51aee32723b7cd07a0838169fad537e12a18dc48664233d46f27f7aa87b1a98d1c0b417b21c864b221e8d7ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD52033a4b6aea3dec9b9790c8507e2a8e8
SHA1672a9a95eeb08d9d972f117012fc345f0041f7b6
SHA2566acf039574b917c632d4b8a897454efb7be84abfaf1794d1767f80ac027415fe
SHA512059f4d8885aff5ddfbd4dcbf6bf26866ae71414243077683b56fcc87af3ecdec57b8a4d378fa9e39dcc50bbbc091f33f2b5095267f17aa57112c67a9d5d6d443
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5238c9dfe1961c56e1598e4c5a518ba03
SHA1871793d38140ef1ba71a32bad479257f37fe6c83
SHA256500c4f760312d6d6ac5380f7fb128c4a695732437c720508556b563fa10fea70
SHA5128477c863e75a530e791d6cd093ffa156ca36f6daed79eb88670c24a310924476cc4b252a06f5410dc34f94588cdaaa48e54f80145e6516aaf3f1c599f56cd63a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ae79e303ddf19fd44cf3bd7a0c8bc8d4
SHA1c9993763cf0bbd259919c964c1e9bfaabad4ebca
SHA2563b9cd622ca7261ba9ecb4a52a4d13f2ae584851dcf7a95e764c91f29dd08abd1
SHA5121f1f9d47908c16ae948a519864212018913c43e6dedc4780444f4848ef9179a56f97a4c820fd9bac7b0ae9ecd475cd75e0c5fa49bb4836843783db9aa7f9af3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5395065c4c44a375ecffca4ae3513cc9b
SHA1d1b422d1224ff1fe847cc048c9840f7c15d06009
SHA256dd5c8efd003991ef32849335afb70d33d1c8cb3d309224ea29bc762339027e31
SHA512d00712b1aa7a4f9cbf068d8a1d4dd04836ec785aeaa69affd4e8ef2df63aa45fa85ba7b5623a6d9711db666c2941d09e29b6eaa2d705587bcab62156d5ed5889
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c48a6231d46e424d582986b588ddec2c
SHA16b26c9f937ab1b3ea713c2226ad57f6e146e664b
SHA25637ac32e3a8a9beec26fdf57360a0013e5dbaa90f8f907ca4a51709411f55659c
SHA512d03f85e8d1da9f765f745a79a3e77733abf03725a00138c8284091707bf8c2e71dbac7aa0991d5f38776e9d2ceecd78974a708d4280ab1c1e16bef8e4d8ae9c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD570222f77eda13b976864c16a2d6cc519
SHA1f3fdf6dcd28f92a0a9b1ce52fd5b352e83d0a123
SHA25606e1ea8fe938a43d2bd55bcad78e28f7630cfd1c11a1bdfceec6edc1356c845f
SHA51254b2f05e60902f9698211551238746e3a65f01ee9b98068e5acc8bd4280f8781421f643604e2d64a87aa2dcc86b8520a8dc61a968e66ec5e052e8dfb62d75081
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD548e4b14718850ce0b6dc2019c847e75d
SHA1ad2659aca7fe3cdb0930572f35094725e80e11c6
SHA2568fb82f3d231423fa61642ce74a8ca559d8ea785276f07f97a007fbb65b6c31ff
SHA512a8921dc8ae9545650a308975303bf5ac714ed6bee6fe7f1cde8ec0de08cad2ca14ec07036916936f06ff3c3a37f5aa7a55a17eb1e94d1470f2ad53ab9901eab3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5657a3861c8e4fcedf9bc3ed0d06cc908
SHA15a9693ff8263134fc6cbfa8e7053d784d6c74344
SHA2563b3c4f513d8c9aec476791567d863308c60cb8e2bb88b3b557b724eac1b9daad
SHA51266be56d84a88f7465d88b4bf53e258b90ebe60d05e91298113f9f6b464c3ac8fb09cef093965aa67a9abb0838386b3f58af2d3d3005532303b09ef82c9080ec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD582051ab83358c67de3122c3e70d95df8
SHA1929563d9f016d425a85d21d84dc4b3f0065d3626
SHA2569824195595e88c1a63a40b5ac83559421855d5f4e99f998220f58de0f944e748
SHA51202670b4075e2c04fd95322ffb6f3007312c9459774024620dc7d224d93186603655dd5bd04efd6010892c47e3a30788b0d39b89a2918e170373a4bb6dafeacbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e959831fb66eaa295f2239e55d1e0978
SHA16bc0dd0b555f354a6645e4813ab5afbb6bfcd773
SHA256a7ee3915c546578a7afb7e15b11b1353e4a83f49ca5313db9a2903bdae645a99
SHA512221054a1e89f20758946d625998e75703b7dd9c6b3ae84b4966d65ec1b007e3c680bb47a09ad300bab61a9fa01239d7d7a30831644cf29eeb9c4222b7d9fecca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD542ca6999cf2ff57b0dec9ae366b4fadf
SHA15640ade3c47adc0936c66b6c0ca7d267b6eed2e3
SHA256308328b6dc2809a9df2bda2d777f4408c80fe7684a7babd27fe029bda153fc5d
SHA512ac0ef69155c8edad7f780aa91d76d8e380d605fa1b71ff1e9be401eaf6ab3e942ac0ab4d49bb7e4bef1fd63ba695d47793b52e58381bf7467f98fbd24e04db12
-
C:\Users\Admin\AppData\Local\Temp\Cab48A6.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\Tar4908.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a