Analysis
-
max time kernel
118s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 15:47
Static task
static1
Behavioral task
behavioral1
Sample
63d73631f8fb43dd526261d879717e1d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63d73631f8fb43dd526261d879717e1d_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63d73631f8fb43dd526261d879717e1d_JaffaCakes118.html
-
Size
461KB
-
MD5
63d73631f8fb43dd526261d879717e1d
-
SHA1
b9eb564f06368b6e0aedf2a1bb2aaab2355eee4d
-
SHA256
f24758acc10e5406ad28ba376f2d3d6df33dc3918b8453a337d040d0aa78f3d0
-
SHA512
29629f6422e5a484ed584953424f8fbdbef54d4e477a53c7742e6c8871faea871737415fa89dc6a568db3b02c047144a33ffbf3f2ce793bc7046d03ac76720e1
-
SSDEEP
6144:SBsMYod+X3oI+YvsMYod+X3oI+YksMYod+X3oI+YLsMYod+X3oI+YQ:m5d+X3N5d+X3A5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422468306" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{661BA1A1-1789-11EF-9CBB-52ADCDCA366E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000022f3a8666a16e949814267ec446bb83d000000000200000000001066000000010000200000006fb7b1b2075adcb11b7cbdc33a353302c9e9a0a080b9e0d528c58dd0ce558a1d000000000e8000000002000020000000e8955f00797082acdb0669122530925e5ad243d96fff8abae58501702bdf6d8120000000fa722189856db84a5516dcce5a7ea0c9c6b704cd0c93060546aec621763c7a8d40000000f9cd6fe6fb6ebe6c4258e948ca1ae28d5fa7dd770b39d2d2e6385afb75aa9feff9bfb80d215126fd05a3987ee294ff8fb796681db5bb498963e800703aa85c3b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90bb333f96abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1308 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1308 iexplore.exe 1308 iexplore.exe 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1308 wrote to memory of 2516 1308 iexplore.exe IEXPLORE.EXE PID 1308 wrote to memory of 2516 1308 iexplore.exe IEXPLORE.EXE PID 1308 wrote to memory of 2516 1308 iexplore.exe IEXPLORE.EXE PID 1308 wrote to memory of 2516 1308 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63d73631f8fb43dd526261d879717e1d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1308 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52feb581064cf2c1dcd1c4ae3be1202c2
SHA11445e9348d5dfe6092a7cdc4d1e47bd6a472772b
SHA256cf882203858ad5c866c246eeccbbb5a250d9af776bbc056be3baf8160b051147
SHA51262fa4bb4ea015c4f81206b8d7ab80f0e07012262962410054e4429f21f32a1fa426e1bcd024444b8c7047e5942db7b3440f31ba14cb2484e0c93e05302e4f8d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d6977f786acb5b54622281789ba2361
SHA1111ec14a652f7a3087af905e1078860e561233ba
SHA25676819b12118bfc6e8aa8c808702789a34ffd76337cfff4dd236de63d68099932
SHA512d5e549f91e4f1378c0d372cb5fb6baad018f75c302074f2a013d22fbd31664101e8afc685230174a3de0a95bb9d79ee01cc2b9cc316c98770c59da2681c4d345
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a483805eca1105b158e541e855b1790
SHA1a9c583251db176b0ccd622f4b23b03312559382f
SHA256b72965229fb83ebe12859ba26c64fe29ea3ff75edd3e111c7ff6ab36c4574fbb
SHA5126fe34f1349b89736494fdf3085fd81f760f0f91e4b1b1df0301f631927f1eec1fa43abc40cb0ee714c0069409b3cbfc710986b24adf8a6a436b12a053b8b8ed4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5576ebf4766e69b32c5733f3f9febb918
SHA1993a148f20ae078d19b9c9e2f888b069677b4ca8
SHA256bc4eb91fa38ed7bd62c004527e4ad1a7bd32f7c02d01df062a1bfa6d37990dfe
SHA512368f8c8ea09640124257b8cc124e6b2bf848f86aeeab5399bb8267f4aab78e2c0c99eac57bae48a2a9340635485b78102ef7e631276c37f0788e91185ef875c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f2dc1ebc826c6e1081190dfe0534e88
SHA1b60561849ad83b806271172151827ac2044dfdcf
SHA25602ed1c91a8db3539c4de4084d90a75e3f3f9f11970683d95f5b654e17502d443
SHA512dc3ec732184800b689f5d1c4534c104431cd62a8aff4d4fbb3c28072e3212bfe7ee8a3d430cff485a9eb03e48d52dd2d386ce2996ced4eaaa9d11a8ead46001e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57811d4b9cd6dd224f7f8670829cc767b
SHA16b933d3c9f561f6ecb42692d662576c5baccbde5
SHA2567c8bb177640f71bc9e3b0090b49e5f892fa00788acd8391efa76997592431697
SHA512d2a74329eba589fa5c962404f1090e22155775b687bbfd5c57de2cd496a8b10efb6b4596eb1031a0e9e8314c80412ba56315f26880cc7fb061116f7fbce795a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564afd30b51fd2b2a6aba689968dc6a8b
SHA1b5e6f87f3e21d165e41818decf1c4d6e649ee47b
SHA256c85a9bb2be00512b8e3eac0f6ac8341504dcd9abce39b7ac9c74282b98bdc167
SHA5123cb4ac2d78c72e972675333b016227f8cb8446c6f270bdbda9e8fd4c5de61b4e70477c1de9343d51b530a8df3d56066097879c0ffba7b0d83bc19dd755b9fcc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f683c48222323eacd730baf6fc920cbf
SHA1e9482606dae41068a6cb0c2ae0978a9f5cf46135
SHA256476a06f27039e961c64642fef49ed9bfd85032ce1f32dbf05d1b880810075d2e
SHA51286533450b6e5b9d16d1808e2e7a81327cf005da2d4be661bf2e3a6705db6edf7051454b2ff2dd0231055ca8f58a24531bb99ebabd2f2b7427717cd98aa445fb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e23d4e891eeb7602fc0b7c357f84e9cf
SHA1c7f70049937a236df8e87c4229479f1561179960
SHA256eb1b5c1e2fcdc44095fe73dc7c57b2daab14a42b3dda8b96be60e4420589309f
SHA5129812b0f95ee17950d4ba9a3f681c5eed0bdffde807ea8271f4837d18ee06eb07a037b54ceb489ebb83f2670c7ccc3d0209e3e57554f8b8eb70663099a80d88c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8c9a4196a67435bb4ee5244cd5fd0a3
SHA1d8d8318526acd3ae3dbd5fbb917468d21468a55b
SHA256e7d08e8168809d90f29a21dca9c921bd318df1a0f31b113886ad8013b590d3b8
SHA512e8f372b2050064f53d9f2de39b142fb84206b60261978b430751012d7bdff62060c9345c030e189cda428754ceed52e33c80c60c1198bb8ba299607fb2ed395d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bdedb088f0020266423f20251074d0e5
SHA1365c5a254e12e8abeebeccb474fdf25b9682dbf4
SHA2567830def42ec3fa09b98b5d2dcd95810f65ee4ed3166248c6f7a52876b31a5011
SHA51249a68cacf6c6350ebcaf972ea7da3bc7b8fc06ab1521a15f243ede19d9d3c6039dbbf66fe498fb55c1c88ab4ae38c9994149fe0b1a610a295ff7fd4d8416e39d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d83a1ff732a5805da58cdc0e7b6b1b3
SHA11e25ce243d5ded43220353c6e2a50ee9e40fa997
SHA2561e1c1a259883ac8f6bbb0e10051905914305e8cb41d02a2debb14b76c6535785
SHA512adef4752e99a5a109e416e8c52830cf55773b5c2d4625e0ceed527ab0718628858dfc57b779841db3aefa5a8ec206c91139083fb01a8f3d859c03af76c04d48f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5627934c788cc43a59843ace52f3f2f31
SHA197dd6c3a3ccd025ad08658f45101a1aed671d8df
SHA25687b572a9e3de13f4d8c8fa876951f308b6a7dfbfc10d9cc2e0630513155dcd41
SHA512e197891a774081625e6296a9c3b9a8383999dd261f65d69cf48b3f2c9e18a4d480abb8b4a52713a518eed6c223362bcd46db1dee8bcd1df69b8cc0d0b0c8b8a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507944f6b1e84d6025ddb5cfb0fbc60a6
SHA1bb21a2fe2e22f5c920864d908a7c9f44ae36f330
SHA256c56144bbc7535c07027eb8bbdd53cd5cb23a2e6b680c8855269b4e840ecba005
SHA512bcea64d9974808267772088a2b720bfaa5cdebc658afaa20490b13aa708a3e977335f91a91bda274542237664dc467cefe86ac3bf182ef92b23983047d3c7f08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502e334549e6f032d3c0f63081fcfdde1
SHA1196c7d6139f95a01bb378d1ef4fdb94e5131d7d8
SHA256804ea0db4e151af5959d0ef9db7b80f9b6b94981d0aadfc121ddafb685b288b2
SHA5127a50510274a9353ac7024af9c1e03044963b98fc449a34d696d8db4d1275eed2a48e1ee8b14b68767221d178e1400adf4a59abad3ab3af84661e23866b7ce9be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccbd554a17d41f478aa04a7b95751761
SHA12e8e527adfc63c9aea436f62c552fbab10afa8a3
SHA2562b426a0cd36944adf423d53973d082b55093e793292df498ae1a125f8a8e8ce2
SHA5120b876afb5f50b4b008ab75bf8fec80936cec7f05d4dfae1ede31bd2515726022d12a15c9fef7043723105e09a6117664839a043901ead5f5dd073f1cdc6e8215
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5485e80880317c293d7d1bbee7ca18447
SHA1574bd0308e8f58cf7568aafe0cea9a29ce70606f
SHA2565385fba5444461f87e6483e4d0cebbfd0313de60da9d4e6d7f6bebe61376c718
SHA5122dcf105678f90357a664e7c60339abe4418dc1bde22f466303c0c5f90531c2eb58618316c70a1530e3613339f85f83fb3cd6404104df2af31465f6c3bc2de02d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f055d061c7607064ce8148c1580f970
SHA16363eeb5de035d8786650737976a976bfbbc0a9e
SHA256011c8e7253b4befdd0675f16b28456045688e84647706cc6e9097f99a1361ed6
SHA512fdc4a4c16ee52d4ee83a6a9cc6e6b0237cd9d59df0b29575042289d9e685677e3fb0c9a9f817c8cf435ace92fe7bcef58b06fa0786ad988a422f3d05fd8b1eac
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a