Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 15:40
Static task
static1
Behavioral task
behavioral1
Sample
63d2693f10025721fdd68c7eacbb0741_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63d2693f10025721fdd68c7eacbb0741_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63d2693f10025721fdd68c7eacbb0741_JaffaCakes118.html
-
Size
23KB
-
MD5
63d2693f10025721fdd68c7eacbb0741
-
SHA1
c271a388e7a2f17195fed650eecf4e5f15de2543
-
SHA256
7c36a303394e749a25ba368f943c68706ebb4b772a6e1b3803dac55f72326fe4
-
SHA512
0e2a96d39eaf494df5c75c33bdbde6584987330af0186b7c569dd84da8f37c361b4333f93f8fe3481b7c8aec3a8c809c3df7f07468a0cb97c2fc5a0fd0bf5213
-
SSDEEP
384:SIl6Ro9mVM2dJO+dRezdScG96xdrsbGMZuIKtnQjYinBQgt1+ZsJVw6c1ivM1bSp:Sg9mM2vpRezdScK28DR
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{66679C01-1788-11EF-8F9A-6A55B5C6A64E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000225fe8a9f1faf7469cdcf5d995024ea600000000020000000000106600000001000020000000ea38c78d5b0b36f2b639cca983a0da7a259fca3c770bf1f75fbde051c1e26380000000000e8000000002000020000000242db498c529354a9552ffc16dc3774477d40fc04a3a7fd2fe8ef53834dcab3520000000d878a80661a601dd610aae3850484768f2ae846d44948e73e40c44376465cd2840000000ea1166bfb16de0fdc29902ecdce04a1b660cc5ca77c8fc5a19673c5da2958bc19f06430673fdaa9d795a653173f2594121ab680de90c3aeba020cd88e1486b2d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0d0b83d95abda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422467875" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1676 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1676 iexplore.exe 1676 iexplore.exe 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1676 wrote to memory of 2944 1676 iexplore.exe IEXPLORE.EXE PID 1676 wrote to memory of 2944 1676 iexplore.exe IEXPLORE.EXE PID 1676 wrote to memory of 2944 1676 iexplore.exe IEXPLORE.EXE PID 1676 wrote to memory of 2944 1676 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63d2693f10025721fdd68c7eacbb0741_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1676 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5361c17f882f19a529f61c27d5b515d67
SHA191feaa60ee5669ff39f18c79cc2fe97b268fadac
SHA2569b3bf1b48e2ca6090cf4e300e41838efccc1cab663b47997cb92faa98bd3eadd
SHA51296a8c472536de8e3ac6a642d59460821042c31dbef41b513d5fce6313b8dcc8a99e155e11b99ac75a276a59c1d1fe3efc6d8f74ce5eb8fc83d09aab924da3634
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1614b7e151efa70421fb2cb82fd379b
SHA142cc91c31bebc96f95d19bc21800c4017fa923da
SHA2561f693194f8d923440ced834c1b50e4880016afc4e0b4919831023970955712fc
SHA5125f26ce37ea84375f7ef06a9391d0670c94d2887af226bc132f9abd6286646325d48e14486b553f53eb9ff968a93f56e5d365c6e89dd55cfeedd634647ad73f17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0a4c818b005ddc3d2b6d9f0b4ec923c
SHA11c50e59f001f13ea83513d739833e926722396d5
SHA25665d6a23d0c86193c606afe566966577106b1c2c91a4a74cabd5de3581668231b
SHA5122241b785856bdc124f0039cad890c40e2bb9aa303280fac8e7909e876cad09fd849e477b09c6f2f1b40e199e5411778b6a428b1fa49a5e18771ce8aeffe696b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec59a207b09a447f6105592c04208c85
SHA1e118d7dbb670a6743fa7245cca199c1c2a02d168
SHA256130645cd0395281407dee510e30baee59dce50f3211544152b121d6939e87871
SHA512ce2de86b7043e7309d403979d326cca3c8880aa1d0bd0e7dea8a69845175fb8f7f639f0715cc8dbaa1b00f06469f865addd9a5067f8b32408c16e56b6de56c90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5537e894a226f39d2787cd536874b6f56
SHA12bb4c1960cc9e205e1211cd85015783f1b94129f
SHA256ab7291872590b17df7ff675f1a9cb8246c31faf27b0512d44b87f09de7ab7308
SHA512923de07efe1bcb161d9fdd7820d96c0ac439a371ad64d31c1392da3efe03bdaae1d2b5d6c2d8f59350d1443ae2e5532869b7c15553f1e643b269f532eecee6e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c32a111302a2748ba4cec806261deec9
SHA1a4c85b4711fe84f27fa02001de5568e6bd05ed33
SHA25674cb19772b9fdc0f6f8f3301c216a6fec6d149a48619912ca9513dfd3e07b1a0
SHA5122b5ef2441d9df2bb8be260fa998c042432846ec7d13f5ea9d09757a4ad430cf819123e3dc6185d5f1e63dc0719f82f0e7a72e812b874dca83ae048ed0e0e4c23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524ce9e29095c74f640c5f6a7087a7b90
SHA129ba0f9a67014d3c53d46722db2445a51d0df563
SHA256fa587ac594aaf3168dbf9d585691a6dd9a37c5e958bee37c526847c4fe44c848
SHA51237049c6cd7ba74d394a164ae7d1ca6cd7cab24b9a086f496cdb60cd6abdf5442d0b1a6153b6262f79f48e2823a977c92faa267c499d34e6f43096d9571d71ce2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5864307370012157ca43f8accba2c7ef0
SHA1f240e7eb62ecbcd5920c48900d9a7220e1f9f8d4
SHA256785cf69a851bed1841ee866b113912c0439d2852b742a751266066d9f2fe0cb6
SHA5127e7f58dbd112937afa95b0b6df51931025557f1c9ae42ac317cb551f87c3cb81cb8ddc423fe9d97c16b9cffec80f27226ac6b5f728b40a87f649c38ea2b159af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59313b5d18d3c7140f8adb2fdb899e9e9
SHA1067585224681c052fe109d6e6be844574923ba6a
SHA25698f4b8df1554786e10183f7c9242a80abb7d54bb67d99da99f9dbbe428439bd5
SHA512e4fbe524124a49c2afbe081b95352b08daf16429c4687290329dd82f35717feb64bfcb3ec78143f397f85c303a0ea395938b9c411eeaf53ae371f2a82e4b9d3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c333805c76d5be16af443b1f864837e
SHA11197aef00a556f21042e48748494657532a38ce7
SHA2560beaf3351a60f2df40e8d9df132483d3215fd3be81aad61752443ed2a8fb7981
SHA51298677c34f0d3820c8037e00997b6ec1d716abfb9573e209d4745c1ddd59b3a263045a56ffa60179c624d0bebef2249fddaa1ead591f9a38ceb7c89529a771491
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cb58d5a1744b4874763ac8f6da72cff
SHA163095cfbf961239843b50fc7d42c8733b82b46dc
SHA256150bf7c2c52a21346ae66791cf8770afabbfd0487104d1683c766b2ec329a9a4
SHA5123fc938f6d75f0169362cbf17b1a5cb09b4cee91b0ad7c3735cf8d1af573a87aec00185f8342bd6972685b947087532d2647d179233cbc697a468b657b00761d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb1b7bf0291af4a7544578415b6190b2
SHA13839e911d025fd9b3d670d482488a57a1144823e
SHA256b7dca75816b7da61617bd04a734d471e4b6e7a55120d28ffca27d69ad624896a
SHA512c26f308b0a7165e2f23e57d55c453c97cc062075e77297fd6953304de74df6d37d9c661ccc74e8df994ccc7ec452b187459f2dd86cf962bf051c0c9d2c32cc08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f214bec87378bab06b584b2a6d33957
SHA132843f06f0b9e98c81a3687254df84fd26c14d63
SHA256e28a71d51939776b19b6631bc5098d81fe0a770f4dc79b9dfaeb3d7f5acc8722
SHA512fcfe609c4c1e288aea07b55f8a4322c2528edb3b7814f9b07c2ee0adabf1f56879c128aa7200fa7b888c9d1567b45120af208f1d6d9ccf05df0aee0e3f376d51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509d05e4588524f3a20d7fc9b1e695726
SHA1e6d952148bc2870012952b7c870b68ce753d02af
SHA25658e165092b2ac91ac06b63c0c4e5175f366956c4824527bb85f11325bf7412ba
SHA51286d2812b0e363fdbbb7e495c5403aadf50c8e78d4467ad77eb9f90ebba6b01b3372a0b47113ee7a8acf847b36c1d80411460c518823b0fa68b9a09f47d4f58d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530f3f9815ef02b1b1b4562e67cbbbca4
SHA1488db9ca92597c1dbbdead120b0c92b946146df0
SHA2564bd1b785f4228b0dfa9df227c11f14a079972ae867b80decec3c5942ed88ef41
SHA512f9ebe1be3595570e0b79abdda945e4de87ef1e0047675e44531424ae97d8422f905bade182f775607e2bb8e69a9d45e2dc579532f3646abdd586ebe492692b09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ec531bab1805df0a07168d94c3a2243
SHA1133614fcbd270f4238aad5390013cefbf6eb7220
SHA2568cd8573f8efa0bf30d3e41b0a24f3c5cff1f9f0453ce1acc63f4a33100779f94
SHA512ed77673b97a4701339cd5df723fffebee5d67795a6d80574a34ed39b244d128dbc92275d777e67ba624a99ad84c2f31a4219c85cf586a02a2a854587863b3e36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfe081bb4cb45ab288e2878e57ab8e61
SHA12ef54db1b7efc9ebe25392234776542031396f88
SHA256acff5af20a418274ceec972feb71e486be6d05e4ce1b8a53f44641706b3d0538
SHA512fc88608620432721716eba89dcd78dc0b9201cd997f4e9eeb63d9c83e145885a072f4b1eff2f6d612c29013bb12ca882f4a5ee4eb5c51dee3411c9b25b6e3b20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e02d736ba6f15d109f06e356d7bd8e7a
SHA16a8599d253e8fbaadef3b8766faa5a5667af9385
SHA25671f27ce507d33039d369a07fee01c9a5dacb8ecd0d505ae79588837896b25357
SHA51231a6553142fd267130928ce1424053c37e67b074d175f7fe856e06a636de333900b433bbc11bcb2bf7d85e0621204ff0624e102ea2745e3ea5563a395a346110
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1b39a879f48d3d1069a3150f646e3ed
SHA108c3d5759906b9fc560bbe8b1fef39d94e51aafa
SHA2562c82167543f350a9ec1d86d960828c5df284811eac09252e415b026ae19636c2
SHA512aa64a01ddad2a998ff0f911eddd70a77f07f1f9f55d6381946da9992fe5860fc8a41cd1032b0850ce9c9e6591ef9e62ff4f5ac6983c5155bf62eb228d1ce6c10
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a