Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 15:47
Static task
static1
Behavioral task
behavioral1
Sample
63d733b434a481c4b41fbba706aba8bd_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63d733b434a481c4b41fbba706aba8bd_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
63d733b434a481c4b41fbba706aba8bd_JaffaCakes118.html
-
Size
1KB
-
MD5
63d733b434a481c4b41fbba706aba8bd
-
SHA1
4e819a959e877a461b5aa31fee315e1d7f719cc1
-
SHA256
91b5aae95d2f1a6677c4fef0c9dc1c1e2321ebff0794554cdc95bd7a00b59368
-
SHA512
9f1bf71dcdbb1abfdeecf66c0e6f83a0dfb9ed8529b8b48c1d99fb77ef10b1c0fec45906afd7e99d1ad957f8cd7c861b7e8a863b403ef830233cffff36622903
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422468296" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{615B1BF1-1789-11EF-82E1-DE62917EBCA6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008c95e3a8512f4f4b84d5420e8c00c96d000000000200000000001066000000010000200000004ebefab5757bb2a1c6cf06e2b6959ac0e62a94761ed183ea4e9a4f459aac7b90000000000e8000000002000020000000e568137af1f063cfd5f5f08385557a80d49b9953648b6bd309b85d849bfba54c20000000beeb8eb04e7fef96241feb808e569da1784022f666bf9ab4d20ba4936534ea7940000000989ad25bae58f4b6849a23c8c31182bcd50df157cb462c292f319dbd28480ba4bee412e757bda137700f8457b9745bce8d131e505c6d8e7e6d98a19ff65e8ff9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7096fa3596abda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2168 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2168 iexplore.exe 2168 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2168 wrote to memory of 2508 2168 iexplore.exe IEXPLORE.EXE PID 2168 wrote to memory of 2508 2168 iexplore.exe IEXPLORE.EXE PID 2168 wrote to memory of 2508 2168 iexplore.exe IEXPLORE.EXE PID 2168 wrote to memory of 2508 2168 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63d733b434a481c4b41fbba706aba8bd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59759ae67591d058d14d0576aa4a9286f
SHA1aaaaeddef897e9a80f6a02c6b70b58bf968b968b
SHA2568b598ba9acc8fea7bef59bf8910a27af8f1a1612817d327db6a415fba712a659
SHA5121d45552cc4801e5089a28a6da73612c0286ba990674d62fd3fed6175c3ea34d3c2ddff25f51450e5f2f5a3fa176fa5a9fa2357098bdc7eb32e7c7088adfec1bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e278a7e86e3f53724f808045af331e19
SHA1cd970c26229dbbb4f2db085bb6b42292667f9606
SHA256095f6d1ba2616070fbe53720f615ec458d93d69a9616108f3095ba7938786ab9
SHA51208795521cc8dee6ab77f18bcd71406a407d8519d38b6293e1142cebddd729bd6e80250153a1faefd762ee1197ff04f12fc7c2dc883825f27a08db037800ffa03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59918eeb214f72cd45520c66db648a2bb
SHA1e3b53e4c00ea780ee7d185c4b7627fe4dc81caad
SHA2562a9f89d23a1f414df46b0110c60480e0b9daeacee116f83e9896e980138710fd
SHA51201a271ca4fc873eb308d28e6eb791d61ded0217cf0166f1c646a5b126e268257f9c8f298c464d5d41d346f5622a43484b30c119a433764a5047edc3ac26b48d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55745926f7f2718a3d273440fe5ae5032
SHA18083353cdc29aeaafc54df28a665659442f80ffe
SHA2569f19238e854cb31fc9e501cab06b03c8303b6176d4dbcd638c6ac0fd669c1e5f
SHA512fea10e7a7b6e3a3dbb813288ee74e3dba01646a04e380fefc44c07eafaa9f437f3627ce7fd59927a8973319be342b0e7936105a38666dcbbeb608171d8c85f66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e48c5380fe610bf1e58c3699cdf67ffc
SHA16f066014b1c32e219f7e76805a3d3d6790f61e62
SHA2569baeded34c260a046a43a1d7c0a6c50ec3e346d7d1882517cdc07c589eb0f18c
SHA512c4beb5a6d4596190afeff65fac17c92dc932a0176684a6f08fb9eb17dd51df68f0b6981ac9505c33b000e23c3927169adcf777304d4e4529a18ffe9d21bb2ca1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5592c192466eff06af691caca52012053
SHA1858e848ce4d23aa5c8a0fcb76832a99ad7dbdd23
SHA256be238d146d352fba92f6fa33e23f44cace9557d86a88965f1353deaa1d31d0af
SHA5122723e4c1127c86831cb8f6aa832a239a7b451f81082c60986573d43c9c7f262ad710ae090092799c45ec79bbcfc06271720d3f4e1b41f0c1d4671bf20a3fef10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573716dcd8cf96a7cead043695480c054
SHA12b4fd403e42cbdc4b0a8f46812585f26f8542e32
SHA25644a33bb3d6897ae77099aa10804b9b7f4dfda7a29d5fe3d6ff500fcce6edc631
SHA512d973e2c78900ad5052ecf99f7144ebea3fa17bb2b069e8063676fc329ed25e59a7f794558b4e6553f0ba32ce90c99df545a5074ccc692795cfe7621f3a983955
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54bf574ad7db53b880920bde1d3c02ffa
SHA16ce4ffac9258729cdb68dcce4127c68af169f279
SHA2561c26af4d4714b57459c3bed873755b5af775c0d479ee6058ceace7c5e628826f
SHA5128aa36e0776cbfbd601e68a4b1da8203b098ce4627e8fafc503e2fbb59778beae54b8f638cc6b16490c5b9a214ab2137997f94a90c6b2c974cc4b842c26d4a2cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b614d46605a11c37e625e8a5ccc37e0f
SHA11b94ef6ece8abee75b0ff393450064d263359ec0
SHA2564231f8bde62e6545104f3dd628db29ca3b5d50690d09d5ff6b05c6b133bcae26
SHA5128f64b6e626df801d5b23c352fc159ca5c309c65a360d61b2e1fa88469b0a0f4b4adfb4e557c2453a7eacea9b971269e113b9c070922e204ee0720be24811a357
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a7331bd6a79d378c27f1927e0a33704
SHA1dea7f2be079391d0cdc1947bb5013bfd85fdddef
SHA256868ea3e17b35a2b20a20de7c074934fef0def25e73f868a867439f31f5bdd3c3
SHA5128ce1cf55065142c83b76450e390c204531bd3a89eebd23c36de702887a4b68b99b84979683517cbfd54f79bc4a93b17038471747139d52440f69acb496a3291e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579593f2f7963af0c6c22bc5b84aa9cf0
SHA181c3b78d0715efec1b92ee320ac947eaa9185853
SHA2567437aa4df94b54a554ed6ff83a6d36ee33293c56342a58ecc7c1e4c0f61e9986
SHA512bce0afae7ad71bdee2c9a1374c5a6b01242bccd306848e3b5cbc8783b692cabdf4dded3506cd665d9e13d2fd4590f5bd88f09b03ed9992c35ae5da738608ad16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b0fcc5115294b8b3a7eea345208e39a
SHA10917b84ac2335b1a291f2960bb94b49c1bd932c1
SHA256e70c598036879f203559cc1791d90e27fd1345b828c62267a773f35c89e65ad2
SHA512e932209c3f55b585f40a0497ef7207bc3f28e2abbdde4a8fe0e2239b14c8d3f4d36c1e980687bdfaa77643a42e06549273ebd5ad53896473f6802f70b2bc53f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5707a4579af7f8e0bb5ac43fd67b980ac
SHA1698cfbd4ff18da15f80921abee328e8efc203b80
SHA256d58c0cd9c17e5db000cbdc898894ebd9c44bb400284250402ea74780a6613939
SHA5128e5dfb271aeb9f463df24afe9c84194e3f794a5fa8de2683d7bf428fd0ee18f436943221580f2d60e42793ab0b69a971d5a6ef0d54b81381e93fa5bdfe8ca681
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ea920d2e7ca95b4183930cbde9c81a7
SHA133efa327d8112d3f7d894cd6fd03aa8f07ffd87f
SHA256ee86141afc26631bbfbd2e4239269651e7f2baddab67d17fa57d10423da7e454
SHA512314c347292698907fb7c1f139c87e508278a3faf6016df4bea9a4d5ceb6e65989b333b261f5c4902e4e0791fe8b589fe63afe1748d6c96e10dd791eb3ff71bf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e529a0635dd0980282bbc80ec13203e5
SHA1730584df82b8d4867bef5550578502c9134277ee
SHA256490e268053f8329cbc79b648c6f04fc983a18d25bb6095afb60f016688f048bb
SHA512428c18c46b2e142b9aee91e902af88ad85c0571e7f2a42a15833ec8a2a97a11ac98d79b731c9e2b30de8aea0202a67496c0bdb5f0e679f295459f4a38d00a326
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e99b3923bf78e0d75d67875187b2a5eb
SHA118c11ce43a0bbf146eeb7156f9aa6cb7b2a4e88d
SHA256b6143926f9dfd7e0a7cea1609484b6d8c255094980ce83467fb25401aab0aa99
SHA512a0df63312d78840b144f6197a91f23ff00d44cf5c3c03506a128af64865ac8fdac9eb4d6f06a197e869cbd4a5dc3986b20add62900d6de0cfefd0654b957b60c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b13bcdb75f004e89c607f168bfb1e68
SHA12aa59046187c758718a232d244a0ecf79083baee
SHA256cd9648f6953a30bbadf0724ab28c78e0f939ab0dad660bb49536fbbbe8f09f69
SHA5125b619b272d283239403ed7dc1d652f33b981296912017e58cc0c2388545e8f4d7f329ec0d8d034e1714b0dee1a7ffcf12577ee4060ad2e559e680e9d6c4b6b45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b971734baedc9238ebc4a70b89da58ec
SHA15c9f58a99d5f25159bf3cf187f7e74092deb7b71
SHA256a62c78743b77ee1fbbbdc48d46ec75b62b477d6f5eba58c390906592f7821cbb
SHA512d160926a90229c32c295c39ef13ea6c75d6dc7849ba52fe7b61415faa87d82b4e924090443d33fd1b1bacf4a7be5913d656b64c6cd665ce5a76c1cccf611dc71
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a