Analysis
-
max time kernel
121s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 15:13
Static task
static1
Behavioral task
behavioral1
Sample
63beefdd8ba45cea879fadb0d39bbd86_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
63beefdd8ba45cea879fadb0d39bbd86_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
63beefdd8ba45cea879fadb0d39bbd86_JaffaCakes118.html
-
Size
3KB
-
MD5
63beefdd8ba45cea879fadb0d39bbd86
-
SHA1
d6af004248715657c4170bf4a87e17ae3f5dc37c
-
SHA256
a7fe549d4a3729a029aca7dbe773f097851d3e87c9e8d4827c94b7d86ca5b9e7
-
SHA512
004c8dff8dab0b966006fbf0db60186e1ebddc7f2e178119588d9f64cf5f21da7aa2071d5c4519301a015dba4761c926f9ae0cd7979136505653303ba1dd8743
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B77D3221-1784-11EF-9DB4-7A4B76010719} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000000eeb4c302534431f98922157fc5cd91dd1b5acd0e513a597b725ed834a12d1f9000000000e8000000002000020000000f44b87698bf6c2fc757f6c2ffa84cf2089e087f6c184bd04844e2210da8ffd48200000008fc722da38e8544527e214de24b09145d8b0b2fed9efa49e3ba0f398e422bd8d400000003fdc16e6d26f65ad72dc07cf0a9101409ed41880d2e1a13ddba50e63f3b6619547c751e8aff7bb82d99c0d923135c857f5549e4ee686c4edde7a5d635c7aaf85 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 502a268c91abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422466293" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1224 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1224 iexplore.exe 1224 iexplore.exe 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1224 wrote to memory of 2916 1224 iexplore.exe IEXPLORE.EXE PID 1224 wrote to memory of 2916 1224 iexplore.exe IEXPLORE.EXE PID 1224 wrote to memory of 2916 1224 iexplore.exe IEXPLORE.EXE PID 1224 wrote to memory of 2916 1224 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63beefdd8ba45cea879fadb0d39bbd86_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1224 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5317ef18e13464e7d04e3647197f55b1a
SHA1b5f128131546dd05b74384399d1cc96b6095eaaa
SHA256e4382e13fac8ebb1cd6d0ce1325887a3e801ae352606e31249e550ff1d09b046
SHA512993bf449b5e390f87eff7e72c4f97940e971d399b555f9d0f4ae359281dcdbbb29bca83fd56cbc414c788a1b72f2ad82502627896eaee6b9bc5cbca1cfb0433d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ad8f044ab57f9d1b8af3322fb5d6fe0
SHA13a89d5b96c8ac1bae8fdd4352b98cdc58d6dab55
SHA2568eaa23333e2332642c8270f2431cf60cd90a0810dcc2c7033ea7e51814063abf
SHA5122d60f26fa182a74e515c6f670e0851b3d0f2511b93b6760fadab8e30ee890a069c62ad5441ee9e13fedf9a4b7b289f52db924c712d8a272b698e51cb3fb76e6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591b4467967a5c3f3bef4e62795822277
SHA152027bfe6d1ddbfc0e571ae19f4c84e9b5302b18
SHA2565fd25b9ac3b1b2ecb76fde8d9f1c91b99791f2c1942ea5cbb125f109f71e25a9
SHA51292d398773ddbefce29065d5a732b68f39770f070f2d946f3c209bb22ed59be2401ecfe200e97b36dc2e2cfa44ed4e294e95f156616073f3937a6acd477949cb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b1c3324ac6b7b841f3d7f7252d2e255
SHA1650e1740905148be82c479c9f4c4cf5ea610adb5
SHA256fbfacf86e841836ec42426caecb3b7524e40cddebb935df02f4ea012ac4b6359
SHA5127559ec2f84606b0b40e270dee242f5a8eca5e2d0ef8a241de61499ebadf42df9e2c912d0c4f2c7d8d538e90c652e9238037c39f547ef968f3985c34526e5e914
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536e41331f24c64b8ed380489319c66a8
SHA14096a8c1c353c522525cdd5e96243b584a229b78
SHA256bd7ac80b051976cd926c5f52a46e85bfb87d2d998e58013818fdfd9ed1d32594
SHA512d0cddd29b78645ff5b544cf4924a5b60a525c8033f0417de57ecf421686657670ec2dae251edecb827d0dd79341e0d02c8d8872c6958f2239a627e452f98a2c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfe4599407b83bff3e37fca15ed5fc2f
SHA183a024b750968735a87d1c63896462c389685cec
SHA256c07558d48c76e488b7678313a545643277d4d7421b1a7db338bb0774a5a9756e
SHA5128fcae047541a4b1b396d47ec39fea95e63d608ca360cca7de0d36e29ee6767947219936bac1da87da5532ea4c6f65753d1fc40685a3d1a050cd5f951b9ca9920
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523863c39813ec53cacb678b166f3616d
SHA17c9107d2560a107c5b0b158b49a5ecf6d98dde04
SHA256eeb26c02f32a6e149539e084ce826d6008ede5f4d79bd0bb086980891afda8d6
SHA512c503e366af2a55406410414c0b30e34850d5f6beda508f962641787e39d78908ecfdf838f5262b137a59c51036d41ef9d5323957cbbdfad820ad2129e4ce5861
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54eb267e7ebeae36af2effbc94bb65c43
SHA1e814bf6cd93196420091a21ae75ac1745e4e0edd
SHA256bee82d4a885bce6ca00b928bff3d1eccb4cfa8bcdc2a146cb45f7c2d7d48c94d
SHA51283f124e8dc31c270f2b2640bd3e9c0030d8204781702630910b3cb35c704c43992992b3ff461b6dade307a07d5a5558abafebc579ec4739306da6e0e890db656
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51136733b2c767eec16b3573aaabf715b
SHA1562f5abe6f384a13414c1843dff0a45c93247735
SHA25617266f818cd8cb4e454d308981ee3b6f3f329e58242581d5e951f3e6e49d9bfc
SHA5127839d8665acfee0303ddaf9f43afd855e0c81957cf627b3f71587d741c098f99092af7efc4da700d04507fe3fe56edf7d241395b5932d6d57c0254afa1c6b3bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aaef29c72b18135d8a72fbc61401cbee
SHA154d534b0d041488e8d1c6883b2a31a623880680d
SHA2568a1b0fc7399a36f97ab5942dab5bd9484afe12b2d08e9c91e40f621845bf610f
SHA512a917c8d86544323caf933213404fbe44092927bf22ae96f75c590b01c889bbfc1a6814ca635257dc11084efe748881026c099866fc5458c2887f3550a0345a3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6056bf775b5b9499245553f0725ae99
SHA1bec653b013d8048d046bda3e86b7bb4624b3d069
SHA25688a73bb7d2aad793cd2c2a6c80d7de630d9de3a01dbb09466550eb534e0be8f9
SHA5127292b7181b0348132711399d664c7ced2ee328ae72a7e98f7ecaa831efcbd94da612f4234f8b7fb3032289445f30458968d0c50a55ef29a5b5948344f06ab80f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52688f1de22367fa3d5a172559a6b53d4
SHA1d8200039d4bc6e372af56b3b7a27a02659cec97d
SHA256239ca1466cb4d2b573da5ae829bd1784a8b430875da3314cdc7cfc09c4663f0e
SHA512281255af066d4eb08452fd442ec65a9af8823364303f861bf2617147f892388961b35b05cbe33fc0393238811d91d725098e22412eafdf24b7775c8cf0640abf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6ae83a692e9981f2748b83af913540c
SHA17ee339d1efb20c08741888716f5f73edc6e2c880
SHA256c75360d10173de2157ec381e8b78d67b5dc8e0d639b21460669b36c3cadc3f01
SHA51229be2c71e6efc01021f22bdaa5ac4a37ac2711017b7af33e1f67a40aaf0da54d30b3fba4cf1bc299e0ee6000b7f436f02da0b64d2ecfc416ff7e6995356c340a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef9faaa323e2df9e6f1437400101e019
SHA1e38937af6b606fc7867d3623a628829dd85e20d9
SHA256e38ccd6b5fd525607713ff7ecfe75e51cee0482f8cc939e70fe6ac9b542ef0df
SHA512792a43c190fdb2b704112f8df50e2f7a4d8600cbea28160d0efcc83f0499c81eed1fa04cbd92619ee53bd2202a6ce2d8f19db515d17b8e9c6c77dd98fa0b33b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5531a469c4597c11d8c8e3a997b4c0715
SHA161ee230ca171b5021afaac19f17e0023028915ea
SHA2566013f10d2630dcddde3a9549b08f3901eb8944c7bf3cf76c5dba9b8a63b9a151
SHA5127e086d1caf2244cb4750c7c7d2a5c7cda0f9a16d5c930032aa5bfc3dd1628804dfc5709702071e78781f7fc11e5d2d869fd47fd97a54875234b979b331aaf332
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0ed87dc431bc759b94dd446897686db
SHA1f70354e2c573cf58b25d9ea0148f6c65678f188e
SHA256e478aa05425cdf6f3b1c4be47d9a452a2f3f4bf78c891b9ff410ad1ebad5c6c9
SHA5121bc244c594b890462cbb72aaf384a9937cbd9fd33410212a501fadd533dded7b2e6fe5bdea442dcb760a60239525d03f5a7e837a67820001f2ed650171b513ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f382446e7246466e37255208a8da4fac
SHA1298a942a7837ba476baf4cefbf4ccd3766e61ec1
SHA256f8c6f986eedeeebb4a0ec608eaac4a42b1636dfa9f58d0204bcf0442208ee3ca
SHA512dcb78ceeac1f7bfd83c254eb3eb0b6e7a865aff86a6b9f33ad5396cc31b9c10380c816960c025666c4f71013a9e3f81e38c98314a883511e134565d6e8995308
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c63d55b07513f370e508b335ead5d68a
SHA1fee0ff57a9c670c6e917291ed71a57a3dfc979a6
SHA2569cf4e954feda93ef08652a3419fabce412a6e3497c53bb538045f4dc674fa92a
SHA51249cb0066ef6bfeb117a3ea1d715dead42ab91be2ed7f776d622646f7392096e074e648f18eea34e7c545de6e24343e8915b0d34f601c9c71110866c7596f5eca
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a