Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 15:40
Static task
static1
Behavioral task
behavioral1
Sample
63d305e68d46e71e05a6a6cbc368968e_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
63d305e68d46e71e05a6a6cbc368968e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
63d305e68d46e71e05a6a6cbc368968e_JaffaCakes118.html
-
Size
28KB
-
MD5
63d305e68d46e71e05a6a6cbc368968e
-
SHA1
31fea388d24bd5f0224959b51a320c16226b2487
-
SHA256
07c8980f4182bce963f825552c66046b087d18ae89633821bfcf47808b33c1fd
-
SHA512
0ae13b077cce5fb411c1f9485634dcc468b0ca9661ee7d0eb38094b1d39d05dd50bdc4c0cb9b4a7e4427b12b5497b5d4034d41ec5d011ee0a7aaa51f5cb2088e
-
SSDEEP
384:CyicdE2CphnEZshRQzLUYjLe1ejepeUje3e8e6eweIeaC1n:CyisE9hnEZsba1+ECgtuHFDLaC1n
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b0000000002000000000010660000000100002000000076eb05df31a16de36b9d0e64711881ccfe96f7302fcde02d48678b933e6c48fd000000000e80000000020000200000000f5f52c232070525e48b0e297bfd9e70baf7f8bd31c5a2626fc2b877c53590bc2000000076c4c72c34f458eabce94fada3a443892308ffbb906a2da9257c41096b2c140840000000afe15188359b7d6da1a0faf6fd3db6ecd77903a62139c5615002910d788a9998a7a9e3dada9d519b7ebee1c24f25f9095fb8bd861a1a44e6ab687b314dab3fb5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7C791D71-1788-11EF-9B71-FAB46556C0ED} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422467911" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c06d4a5195abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
IEXPLORE.EXEpid process 2928 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2428 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2428 iexplore.exe 2428 iexplore.exe 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2428 wrote to memory of 2928 2428 iexplore.exe IEXPLORE.EXE PID 2428 wrote to memory of 2928 2428 iexplore.exe IEXPLORE.EXE PID 2428 wrote to memory of 2928 2428 iexplore.exe IEXPLORE.EXE PID 2428 wrote to memory of 2928 2428 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63d305e68d46e71e05a6a6cbc368968e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2428 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547dde98bd8842ca8a87a9441f6a4db54
SHA16586fe291f32e1b2cc05101a1071a4f82afd73ff
SHA256fe66ff79d87f0177bfe49049c603abd43671691e538588938e273f94a72c9497
SHA5123aed813489c2a14019e32dd1ac7813395f8e3868383273eca7bad6f1c939c8308526fffc87ff4deea7ac19c6ebcb5d9a02185ff2be806d98be976d1214651001
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cd513f59365c6ee7cf2531a9f479ecd
SHA154b46b212edfd256770b1955011f2c64dbcc0373
SHA2569529f85c9ba16a9017c50627a583550ed8b62d55ff918e87b80aeb35ea60bbe6
SHA512b766dd22bd4248b7c6f6741862aa2b338eb339d625ce269cdb93664a55f2b0171ac7ec84bb8d5ee1ed7ec82f655c8b61795bf65ccfec477f44d784a0781aabba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8e039e912b1a6173fde8a559dba2f6b
SHA17016fdba4ac1f9ee6475ef99795d03a1b1446c9b
SHA2566a72b1158e6724832a0fde028ce67cc35e79e3c725fbbae6519df5ec9e4e0e1f
SHA512e9b0b180708ad1c94591bec8284ad2438aab82a90c09526faa129895d7e96af2132b69bf32411a76c6cf8b4e990a6d80f9cea9ec5f9f3300711109e77eb6206a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c1a2d12a3d8670d93ce49a75c2877e4
SHA1ce55b71dff16e087470f486b74ad2d1408d9aea6
SHA2562ff51c3e9bbdb6d725b26001c5bd31d5657c96be388996c6b6ecc8bed73a9cf8
SHA512de1d22334b5365be52d45ae8ff678300cee491b5b124ecc7b64faadf55786333842e549701141e5fecded2854781b0d635d7831a14fccffcf5ed1de121e5dbe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a27cb93615a73f13167cc69c4a66ea5
SHA146d90d91275c145b8caa44aa0f4ac1ba885df772
SHA2560ab6c7e755b24b1466db1736bd7716cc326b16b8a1344cecbb92334ab1a3613a
SHA5128b8a8eb14bfa0419bbd1a7fde544e1054f78c94993007733b8ffeff4b9e8d984dd3ec63ac15f7058ce2653d85edcf6b17c593c9bad86e861d7c5569916953ba9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c28a058bb07e7eb1e73baf6d4dad0344
SHA19ba168f4efc9c97f0177aebaa792c3dee52fd821
SHA2568735a0423cda0bc52d70a8f46a57c37b3d5f07171dd6a6d665efdba5a9b6b067
SHA512b65f1ceffa2715011d25cc05abbc7edd92831f4457c6cc57c6061b754acf6a1b01247c98b851327433af0156d8427ccb09fd82bc1b7bb86fc665f949784c1034
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5017db7fdd754067b321f81f487e3b64b
SHA1b46fd66b2a81cf2c97b31116a2e5844cc89fffbb
SHA256bff271cc8bd41ab03b84003bf8ae22313fbb607bdb45beaa8d21ae027d64e64c
SHA512c6b2999e8708eded35ca658ec156c765be961a0006a249fcb01ba8b3bae58aa829a62fe2317817f3a96fd52dc2f60748d2f313f5ffbbc7f4c970ce144f2d5185
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e7b440210e8b8107dc10cf236fdf14e
SHA14fec082995bc872a22641a984b52374427c2ff2d
SHA2561a56329bec5bec37c3ee759d13f057655f91c57bb5a459a199a3e591dc06e016
SHA5125e120599bfdd84faa2786c886485a3d4667d036f8416ce19f64174330ef374595e3811c86077db26c44525f8dcd69eab0b6cb19882f41366e37343f88b4f4372
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bcc8d711ce21618b720c8f9a16454321
SHA1428da46742138147337457da91bc69ca45ae8a36
SHA256a7cbca94180b3d83acb6df5912d0034cac5923f85aa970877eea541496d49c8a
SHA512c9072e653fc3cd4bd2438e3f66a2d7ee798e05183bba9960d93757c310e2317874fa0b7095fc8f4217d1adc6a77a58560e6011e4a2376250a3727087757a030b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ce7d4cb64a231b285f5c8632aade965
SHA1b06ea5a90eca8ffccf6913f4264f28a6a8f07bb4
SHA256ae89ba05ccbf05e70216f78ac8c7c31a9fc4f2872622b86b60c61a7c16f3d4cb
SHA512510421e00a870e746a269376640401bf0b68e546e434c8519aa5e44c8201bc4c9867a7af74700d799ce031850c998c9f37b16e007d315e4de44a4b7fa21cdda4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c556e4bf6a6092fccc321ffaa88c0b11
SHA13d1165ec8d8b55b62864ff257c7bbb53af27e259
SHA256f933152edf97d186c6871036e819aea45947959ebdde33442a197e7c2748a7ae
SHA512b43a70b405bfb9f87e04b961d717e7430d49c2837ec3e3f28ff84cd29260e91018585de1fe4a5cb8bd21aae2f63424a2a63404abafc0dd51a99ab4c088aa993a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50696d36559859342b27ca8e8e1a62cb5
SHA143c1aed6889fbdd57d776279a31fe4d7af54ff4c
SHA2560e94c24099d92ca808e08f31a1c04d0f55e0d8e47f4713ec242e1a3de150464d
SHA51256aa9505411e6e6a225224c578113721af192a3000d46405d6b58621cb30828c4ac092e9406aa039257cd2ae5b31c553c6f07322206d38f034a47d92ca760508
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5377f1737efed3a0323fd93dfcfef0e92
SHA15981c74bbc127ea43887e2404a28043bff55bc95
SHA25665d1e698f8e34e708ccc3b78f10a648c8bbefde508391f0d619913a98db6338b
SHA512e5fabb0876c4d0307c7efbf13fd7900cc33612bf802bfb4a1d02f07d28f4c1401705eb60e1a70c73c273c11ac4213808476194e8e7243071fc0aa36c9e5ffe88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528afb58149fe3eece64df45481150203
SHA1e3cab53dc358ca3070784f6a2d05ab63a3083d47
SHA2567927a4cf60b218eb1504d080bd1b4c4e9f34791fce03ed95933b8ec58ab8ca1d
SHA51257e017d4de694647490089e379bd0b62ceb978f8f1db2d7c1dc6064745f416336fc6593714ebe4c6e950eaacc9624ab44f0eabb84711e1022b8d60694933f5a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538e717d85d0cbcafce964fc1fcd753ed
SHA17e630df90bce4af2e8c4ee138d148322ec2f355c
SHA2565c441962eec9c196eb7e7e16b4ef49ad9050000f52fcaf2246a021196e94d9ca
SHA5125fa7186595561a3b325febcaaeb8e5bb7abc5e2efd1ef9ab5eb8ef9b0fd7d43712801ff84c624989bbfda8b15e1580779e5c34cf0828517f36e3cee43a758aa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523beac07325ec352e2cb60f60500cdac
SHA1e87ac382e73bf656b0f346c11f7ef0ff0fb5a213
SHA256287b7b4bfccf79f66c055817170dadb49e8e5ee539808922cf4d72fab23c6036
SHA5127c15f3dd713ea2ce8b605b190d5ade01b824cc9ee0254c921b1fada26fde13012fbc11a1db513a24a2e9d10e0a151785b406a8d19d120982b50e13937836f50a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b031d8c15e1806c753f472dc8635ccd6
SHA13346b0a710f4f996ec12fd20ce92c349a952e80e
SHA25685e12e856ca8196e3051fe2fcb64ae58c8a423b2a00664dfe4c0d4917d9007e5
SHA512707ebea9527a401a8f507d94e050fd1214c7a95b6065663d0e9637b61d81684438da64a356a5bebce0836d97e26fd4e3162790b717f9a2f9788b12754f374356
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9e96bc62de85ad35fb008ca80e1e10e
SHA19913b6ce5d6e52590bbe73a064873354fdf84fe4
SHA2567a96b2e48c7b15d224b73e18a1a9ba489592399ed2b6633cadca54cb778b65a5
SHA5124e65303faa56f62fc4aeb97418c9f66fb300e37108a917b8d355d8f1507e3a8209a10ab6b5c274a95c5385ba0e6496cadbba5f59225fe0f374a910d3eb9b9e82
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a