Analysis
-
max time kernel
120s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 15:11
Static task
static1
Behavioral task
behavioral1
Sample
63bdd9214b5c34dcd52c1cb95d3abc32_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63bdd9214b5c34dcd52c1cb95d3abc32_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63bdd9214b5c34dcd52c1cb95d3abc32_JaffaCakes118.html
-
Size
300B
-
MD5
63bdd9214b5c34dcd52c1cb95d3abc32
-
SHA1
dc26dd9b001ff4e02030f3f7d4302f2cf8da9138
-
SHA256
db54c56b430775ad543e85bd7f516b39227f86131ae45a0861796b5154516c60
-
SHA512
9abf5e11deb893e59f7e421fb35fcf78dccafe262944a4266ff824615f38f319cf0125833d06e8225d9d4fc21b2f3f3ce9c36547e524285d3510d086e75b1353
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422466186" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{76DEBEF1-1784-11EF-B35F-5267BFD3BAD1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007ab7c6eadf8b9b40b7ca2e74783ee227000000000200000000001066000000010000200000006299ab5018bc3140f6004c3767c024a22c8e97b4de956210274e00b71d2b8fcb000000000e80000000020000200000001766a184e265f2c1b3ce824c160af6cc75e2ac3406617fc6e8f7bdf1923a43c820000000aea0e54b325ba308419df632c4566a1d5a09d315eed7a7cb38477ccba4f00e2d4000000076461c0e208905ae052539e777397c96b3bd23194539d7d3287b53002af00baa0b3ab52366390b6272e03bf6b233eff4bee5c8eee68a78cfb8a1a21a77d0dc36 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0edcc4b91abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 3048 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 3048 iexplore.exe 3048 iexplore.exe 1268 IEXPLORE.EXE 1268 IEXPLORE.EXE 1268 IEXPLORE.EXE 1268 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 3048 wrote to memory of 1268 3048 iexplore.exe IEXPLORE.EXE PID 3048 wrote to memory of 1268 3048 iexplore.exe IEXPLORE.EXE PID 3048 wrote to memory of 1268 3048 iexplore.exe IEXPLORE.EXE PID 3048 wrote to memory of 1268 3048 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63bdd9214b5c34dcd52c1cb95d3abc32_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3048 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597dfa1da248ef5bf7ab9b9f9c270ad13
SHA16b37b9cbd7bca5cf21acbebf043088f00da906d7
SHA25655cf0d56abddb10b568a28a105c1981349b4844651054cac28d5115eea0fd25f
SHA512ead627a7e9e402b754770a3e389a7265e4a1570e95c0abb71491da1b7e82a2a56188d6fc46f68f619d7ccdd3e83dadeeb07c17d9d0f4c67df82e5b56805ed0a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526894f17e4d00c07c1d0e3d8e88d6109
SHA1866b059b5a437ef9c4be5c333741a9064afb672d
SHA2562c62d0205dcb4766a15ee2ff0d252db5b5db1e6068a195d239c2374e5725a6b5
SHA51251fe17ae8c2ba2d2f05b718a39bd189c01c7543176d87a3522a0f324ea17aac28a863a2d4bb2b25ec3c53ed492adb4a233a75a0a65729ce52db3e4033c666951
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f932b5513e2d23033fc51c04e0625539
SHA11b73dfecc23d30d2446f0a5afb8b28a504e917dc
SHA256efb1f2ba79293f05499f14a20ff7449af0085634c0e2a559fe17995b434fdcab
SHA512bfe38f0aadf9cf47cf4769bcc3355fa511fe9b589cc59d314046c6009ebef5c0e11754f610d0fafd970dbc0190365696b91bfe4a14b3fe7176ec522a46ef419b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eac894b4cf58345a315a5ecbf75c84e2
SHA1dd8ff45d55095a960db52cd5a6c4a83b92e88338
SHA2565e10e27e0982c499bd08a7b37dd11b66a0efdbd5530c3d2031ec3c543f8e88ed
SHA512afbe6c05a65845ae685c1aaaa7c0da7f9d62b9156bade54edc9790c2e854a23a1a7bd25147ed4f0514b504b97def9833057736017563fad25ae5931b2937719f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fafc9683e500ac4954c4413b3a89083
SHA16d5e8230d62e724307e0f095b3ce482b51d7d613
SHA256b2387a61b9e6ae2b1a91fad16b216df0f73d53ec782a7664c830ae4ae3128a42
SHA512ff90f26289c3a56536c0f32aa289d8c352e73fca78c9303d51ed9e420444fcddc2e38612fe44289ea6307898a2bdce0d3404b9b874fbb4cb4f81d370901aa842
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5568db7c43c8d6f2e15d382bd4db3b984
SHA1163f165c002750b7591eb795e5b872586d0fe73d
SHA256b12e1009067c830c77a2b22e2b2ae16e9551af7dbf46693a902e6e661ccee1f7
SHA512689454de23fd5f281d3ae421e12476cf2d9cc727491376563239dd8d1c23225a6175275a2d23c78fea7ca11dd36bc9b06eab6eebcc4353985ec81af604140ea8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2ec1523803243abb24f5d56aab25940
SHA12309e9c89744c2ab460e4c2f3d69a8771afbac08
SHA256b6c8588994e0cb046d19d35dbe18e74a8a5ed3044cfa0b6f79f82671a9a25160
SHA51232962b1cf501690f685f84ec17d3fd38ddb131d0fb298e25bb961fa27da0fdd2d4da974a5412cd2c9f1d1163e79e9b45d8b45684b1e6e49e17af6354b53c1aeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5216c749da1e40b4b9f838802d7e32ecb
SHA1b9c3cf1d3e1e6a9c0c40869e7a028c80af542d5f
SHA2565277a9ac5c1bac34c1670fe8766b7d2d1980047ebe27e780b1d83a7aaad702b1
SHA512816c37def9b45207eb04b4266c77756d7c86bc46626cc02de4a92029ec70e5dcfb6504de43946534150d36678fa31d9e530968a49af7376012731506f088bb37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f54689e64813366bef26b583c0dbbce
SHA1d339525adb2ac4d5f04c95c27dac36bb703f32ef
SHA256893488eaa402330c4cc584a154f2c54da24357de6641ba69812472dc1ad9d6ea
SHA512a55926ef3307b59a142490925b0fd5abd472dd9b4079241a13c228a4fcb63cbb9bfe12845bf34276cbac5c9bb72449d956853c5edc34858663a0d364a1fb28e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba739bc582bbcf134e7f8070d8273a7f
SHA1476063713b5910c34ea6781f3f04d19b82deda93
SHA256223f2bcecb9732b65550ebdb6e0023ecc27df12aff30b6e036760c9e0d9a3c84
SHA51271dcff82c92adef22d14f08c140d44dffa8de27895257fdcea5022242cb03dccc646df0e572bc2aff84cefc6b5b16536cf316794784c669b8169cbb8e3aef30e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d14b1d7d999a332d43ccf370771dab77
SHA1002cfbced6311181ba9b406989aa904140d9adc0
SHA2568cec2f9ffebec3378919994cd0ea006adae124c05db47980aff552b4d1918190
SHA51267049df75257d355f74129bdc69f4e076c52c856ec3979db78fa90d75e2596c50186890282d58d606955526e8726d33a821e38ae51092879f346dfc146bfa5c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a185eb145e787c6d9728e13b455748c6
SHA1eda9cc5a3af6e75fd79af12f6e499bf7bb426a91
SHA256b561454194b5a62b8dc01b904753564b358ea6d2d65e3fe14c76d57eb4b646d6
SHA5128ffa1d3488632fdb5f6e8e0ed2ca56337a3a8e5501d95458e70690f2d76045e4f0f74246b3e59f2c927be73ccb6fa8dee39efc57b2482736680e4fde7fc9b1b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddfc433dd680885530f637a897c6fb97
SHA128d335b27d6bc2904fc4f809f4b15a6b18e083ba
SHA2563baf07373e52081c96264e4077aaababb0c04b1c3c709e9ebbca29b7f5440098
SHA5122776db2f1053c3d54e3bcfc1fafaf3e3a963aa4722ae207751e6031a3073bea9720c2f141e575c13c20553fa21506157977ff78f329ae3cafa5a4d8a857fe19b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5999ee8ccdc3d109e582b514bc8fa7713
SHA189068089dde8e5bd457b5f98f1ddd7a06f10425d
SHA256a62eab7a778a5cba235beb840dfc33461eaa04173ef38330dabcf089ccc69221
SHA512da6f942fe62076c2b73c54b91048fcb04e7fca7872ba71c86292036e4b6dd7953dc106b7049bc6fcb60d0428a347cd58cdbfa922890691064be8ca1c3bb51d7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583495ccedc543254a3339a2ef20e88a5
SHA1e508dc16a027b2e3901b5b51278f96dfc90c3800
SHA25612ac928fb3a7ee42fc9a1e79c85a6ce8dcbc502e2705d39471b8b20895298d5b
SHA512ec4d5eb21c5f3a06849e054e531053ffc7160515114ef9ecdffe9c77c59a402bd9d278504fb0dd6190cf44b3b87a1c1e7500bab30b5cd4fbed9cabf157fdafe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d91e405898ee8ef07fb4a238dfaf8d6
SHA1c31cdf243915d88fc872bfcca3adce1d74924087
SHA256458d950fa618937e399d4d8fb65196881f284ca5eea0dafaefcc331966bc6ce4
SHA51220ec6df8dd371e804f9966a9160471629aa1e8932970a40c4dc95941a81238bf38482f2751b7f633091c90c22c5419811960f4b1988a6fb412d97a778955b2b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7857cf2c6285ea738fd24975dbd42d4
SHA18e3f19bd3ef93571901129e6f9eaf4ab71bd2f4d
SHA25615878df058459420feaa54d47585ff916b4f9f62a3303ccf127b5a26e8d46a0c
SHA51295fb27b2111a56b45094f0a9ce2a10ea6adceef5ecf303c3ec6ed0eafb365ae376122f0011bdff6375b4bc60530d020311bafaaddb74046c4bee0d456575fb0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51408dc2e1a757410717c4a4dab56bb01
SHA1a00bd1888938d4f45e7ca2c0ad8e9f13ed55b877
SHA256c996d96505d33803589b08b76b400cdadadeb8e4c6454ea6ab2203997a928012
SHA512ee85db934effe3ab831365a17aa7c6e5a58a6d2fbe3b99e92036f3d186f42501fa32ef867333e2682d09a3cb3bb09b6c6fe28ef534b2c65f5f93c6f97d49db7f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a