Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 15:11
Static task
static1
Behavioral task
behavioral1
Sample
63bdf2380c9da59d4859d7922aee9651_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
63bdf2380c9da59d4859d7922aee9651_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63bdf2380c9da59d4859d7922aee9651_JaffaCakes118.html
-
Size
24KB
-
MD5
63bdf2380c9da59d4859d7922aee9651
-
SHA1
72113bfaf84ebc4cdf6ab39fad875ddc94114b96
-
SHA256
bbf50a877a1064db05ae6640933a17ec14b8c18c71d0c84f14c9c625ff079474
-
SHA512
7808c357e554f0da1524202635db1e90040e3f453a5342039432301032ef7b5f43ed25211e425497b417345ed7ea268d277fb4047a4b7aae5cd0899b5ea9afcd
-
SSDEEP
192:uqN7HRb5nW7unQjxn5Q/fnQieZNninQOkEntFYnQTbn75nQeCJVevo7NtIFo+Nzj:nIQ/zygcnnBw
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422466184" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7715DC51-1784-11EF-B587-FED6C5E8D4AB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000c69f743fc87105aa889c313277d37b160fdcb58820086f3696706e5bcb418038000000000e8000000002000020000000703702a722d9146dcdc2c1a32b662dcb06eda3c11e9bc821ef1c199ed2e6231c20000000e63c6ed840878edb036b6c210ec2d06bf93c3ee0d22bee16ec2f10a54e4da93a400000009e98b54c036c9c71813cb5da3668ca772e2d9b74aa8bcd7afa7d32e7ffd10703ab915c33c999f1cc8d350ffb2919dbd7b9e3dfef4380b2622b5d347c3a654434 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b00eb44b91abda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1240 iexplore.exe 1240 iexplore.exe 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1240 wrote to memory of 2168 1240 iexplore.exe IEXPLORE.EXE PID 1240 wrote to memory of 2168 1240 iexplore.exe IEXPLORE.EXE PID 1240 wrote to memory of 2168 1240 iexplore.exe IEXPLORE.EXE PID 1240 wrote to memory of 2168 1240 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63bdf2380c9da59d4859d7922aee9651_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1240 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8b446af44218bcbd59316b9d93b54ac
SHA120427ec6ea0dfdf6b01489f215d9d3f22090b395
SHA256f7f8b71d7cdc5c58224a03a56286cef7c1dadbc61884448af144892d8157639a
SHA51248cb63c56c08f243d7471b387e2f8d4da96c3bf56e71dedaaf95889df6cbdad7eb6073ed3fe724bb939f922a3b458b098a6442cb4d9c6dfa540f32a2a280b36e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c1b1758063c3acf982fb8cc94c5f4b0
SHA1421d187d8ae237c368a255ad2cfbbf9f2ae2f5b6
SHA25656bc3a3388618fc2479e38e369e39632a1fdeed737f95e65a487ed1d2e2b9dce
SHA512bf216f4834861c0674bc9152dce244c21c72866d3ad6431ad0bc644895ee975208d52f5b84561f8e0c71b77286485260dc2afe066f93b26af70bdccbb6539bac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56dc29136426f7aa08fc195732e7c596f
SHA149ab58d23021eb703a0176815370d2f9096b9038
SHA2562348d337c8465034c7cb53415f9722e8025398dcca7e4c81ec635b60f89e4f6c
SHA5129883954c2472f80b042ae38910eca948350ef280639a16cfe92270b98082447434230114dfcf6424ddee337c08bec1154cd394f369bca664cacfd112043c480b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57bc22093afde83698268cb8a87e52c4e
SHA1095c39e69b39c631300a6d04e5532a87726ab3bb
SHA25625797faab8ee4610760626de398699d47ee99dbcacf08995eb65357ad6f58649
SHA51204c1919e99b11bc7402e7e174bd8a967cf43ea7194bd2230f62223ca6ccb64daff9ea3636abf22592ed5c4b8bf9b319a7d741fc44ae2df193a711e6847389e05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582ed588b4b77ba3eaaa78696a20912de
SHA18f3491335e73c555d1a0d078cdc69b08b0ce99d7
SHA256709b20ccb739636a3e300d7038ed3df095ac91f3ff62d275bc88b976c752cb11
SHA5126f6b2eddef4073416b695f1f82ef0bb1ce38dddf0636835937aa44c45bfa593c2c37dc05afcda608512aa3e419ee0b41942f758a17eddd83c5c07c9d84bcd2ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f5b149991d450e02369769081c9a876
SHA1d3555fe1904f964d1c001f4095fcb99973868235
SHA2567df0f923efd6eeed1152aa933be91f3ccf85ffebbafbdcf4ba375b0f65dd7e9a
SHA512c12b8ee0d160ec98419ba1ff971dce5302f5fb0cd38a58d8833c8f2a54daf3e9ec323f71160475cd615771a5b9d5e7fc0e2da3314b0cb49fa8f54aa7b333b90a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7af611c95008b87b207ddaca382ce3a
SHA12383bb14ec6119b39d96ac7386c60341f96c92c9
SHA2569f894ed87d8088861ec07c1aab8400f3b1ba7b0ea3f1dff5c0971b1eabf4c7b0
SHA51245ba9ec4d6e443aba40788d7a064367859f125941817576d368a20ba7e55d170a5addacf878415151902a5b90d62a393f85afa08a3fe2660e1ccc1772354b1d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57290964aef26755577eda2b10322b160
SHA147cf15607cc856fea41adb3e14f213a20ce25f62
SHA256221ea5f75d666d49085e8a32e24e166824533c1ab9429fb14bc6da0813cee23f
SHA5122851c31a7b47801cf4d5f1668477f2328b60aa081bc0d453510e80a95ccae5d88ff3f69ecd1fde5360c9ea4f1b0635efac9fb2f87d6c099d7e5d1e42df8797a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f70b417caa2e2518413af24444d1102d
SHA1dd8e3e2ca5aef8311f5cb38ce0ff8000ac72b3a5
SHA25690085faf7f244dbfd545eac03d15149e46e1caf329e2ced2f744b5c9562b6027
SHA5124d281009f99b8c10b5773191517fe9e15d0bf4e0cf7ffa76399cface65b858acf80779baf8585bfe07d0b48d1dc713b4952d5dbd6af70b34b963b3892e372a56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525540852d25dae149755ff8d059f117c
SHA1509d40407c4b91db18f83b2976f86889f0b48ed7
SHA25666b92bb31b64136d4f950cb31fbad40c38752a053babaf532a722f9d09d3b8c1
SHA512a1202ba74fe4d564013ff03ac7bd98f6b06a830af612a8f9e62e0596316926c8655b0cf21f824cfabfc55f023b7a87413954c6d57b83dda45181ed14453b42bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b9ea55357b9810b23c3d6150608d6df
SHA1bad00d3790d8bc8c656d72833ae3001691ee6442
SHA25606a119aa981df3e7d9e03b20d7efab1272d6c42e3e39068a7217562a771d362b
SHA5122a8445859106f0943e58c4285151a9df2e0c2f3c673c2a357dd0818eeacec2f50fefcb950fa725081e7e2f7543f23aee5fd36f67fa41070619d7023e70e907ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a10465218fe1f033aca3d1b616932e1b
SHA1eb6cac0ae010f51dc53daba295aec0f796fd85d8
SHA25650b5663a1e48a856cbba8dcfcbb3fde802d87101d24391f22564c925343e1195
SHA5127bb7194e9b8943e77fb237c9fa024d667827cd807bb3e56309ec28a85706c909c02bb7d3f430e688ea4f0e4e279ca8cbc119b5ea27f1a6ca092e86720822eb5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e89791090fd0827d681b20b50691a160
SHA194ce388caa5608f7fe6c127b407035cb7330153c
SHA256c5b40a9ffa55d30fc2bdd71202cf414b33b75c2166007306435fe64e8ee4a931
SHA51287f0d721debfd3f8d98c8de68a513b017a73aacecbc548dee3934425a23a597b4dcf9cf9137606bdb31f1108cf365c490ce102ad9b94129ba1a1d4c9c4194354
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d712648ed71150b49b823baacaf8bee2
SHA1888b063a27579748bf1c96bd0e361698a2dd936a
SHA256f464175b05335a356044f514c7084df4c329038cce18bb623382b1d4c64bdbb3
SHA512ffcd43185d7a97bd9ca482836edbcb676cc4a01132c8c67c3905c261fc1877b575c67d3a5538c617f0f69fc42021540be17584c6d9a534ddc3058cc16f9425b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5327cc2c2741d3d922b5fc9874673c9d5
SHA1979919b789f3fb966c15f59c3233ccdb24aad961
SHA25657c64f5d5a142931f822b09607dc4ef0ea2c7cc417a00d46620e486251ed9d3f
SHA5123de86cb775d9e61eb1a16d0a2c5889575b8bba9bdaf32b545f0a5319fc453e672946490463677596fdcfae7bbbec9fef5542b6c4aaf64b990ba4aeee93eec065
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2f1f989aab455682cd3c2b5bfc2160b
SHA158de5a614a839beb027ef33e27ec1676ab431a85
SHA256cf29285cdd8576b374d61922fa443e39080ef6126b8ea73db4de72e827401109
SHA5125ff146b41a78e8fa64c4d8f47fe82175c651132b8c4624a2d2853955eee374d9215a7c3257e25c64341ae6876db1503c2daefd6a1b2e2878a438dc4bc8d96ad3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56189980be5037fbe6e362d590c7bdee9
SHA129989f2ac92b03d9de4d06bb0849095319d459c7
SHA2564e6c25942fff25b3d37a61c0b91c9c9184221a5d284fefe6117c44eeda0bb915
SHA512cacf9b69fc14831f15ed09ea3fb9ddb0846460680e5788ed01e96c079f701c696ffc8121aebe56cea9e6d24bd54ee2d00a352c165a1bf22e86ba75b546db4d98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d448015dd19ce2dd369cd792207b2eba
SHA12e177810ef089e5e3ad8c16eeaf750ed8106f99d
SHA2562ad99f062c80ed0948c62569de81d97d9b6c02972f4e172c435880601950b1fd
SHA512127efcb9184e7c737425a37cf8f7281fadfb251a125163b022a8cbcdd93cecf43de90d4a01e37eb7f0aa75354fd4562aedac6926e6ecfdc33ab39a1f51fa93b9
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a