Analysis
-
max time kernel
140s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 15:14
Static task
static1
Behavioral task
behavioral1
Sample
63bf7ecc9c09e71f3bd7653e31f36f3a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63bf7ecc9c09e71f3bd7653e31f36f3a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
63bf7ecc9c09e71f3bd7653e31f36f3a_JaffaCakes118.html
-
Size
69KB
-
MD5
63bf7ecc9c09e71f3bd7653e31f36f3a
-
SHA1
418495e8720c8badb6a7a202c77146ebba6b92ed
-
SHA256
1d6ed88c82c2b446bdc078e8d8a2202e1375d51185ad90ffaf44f53d8848b980
-
SHA512
a2b3f492722fc5a4db14b4234349c8df26539e5659d190f73a068492ae595d37a3087e50eebae0dcbdc0d9b8b453cfafd1fe942958ace1471b2bae866a730eae
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sB64oHP0oTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:J3eRTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CE1E9781-1784-11EF-97AC-52C7B7C5B073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000080f15749007303449935969168918aaa000000000200000000001066000000010000200000002f266e9c01e135f1772ec7355f23bea0f50576fb1db87d444f1fd96ed26e1f91000000000e8000000002000020000000aca54387928ee15ac0f8c3608aea09220a6bf6345e060d0fc2c7b2dbe7e0fba6200000007d717a361d2ca1e1271662a85e449bd7787faf3cb3c133245b1a4500cc95eba1400000006e39ece14add31eaf4a1c0f4eaab7fce8e59514edcad51a928f12da60913becc140829d89d16d5c870c51b7913515cbcdd2c26485d43838e81f1182240deeb9d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0064daa291abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422466331" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2032 iexplore.exe 2032 iexplore.exe 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2032 wrote to memory of 3052 2032 iexplore.exe 28 PID 2032 wrote to memory of 3052 2032 iexplore.exe 28 PID 2032 wrote to memory of 3052 2032 iexplore.exe 28 PID 2032 wrote to memory of 3052 2032 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63bf7ecc9c09e71f3bd7653e31f36f3a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2032 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4d1f0fd216076dc2467f34964ac2407
SHA1db6999c9db211e96b63c39c6b386ca9d7f3bfa93
SHA25627f610562ce2d8fa87af134df4e3b3c1e2b5e5e93674af1c26ba99b3ce982c63
SHA512965fc247c83d276440a6594e4fdf35d05dda6f720be71875160f975c8107c8bbd345824ced0331ba513ce2417ebf5fbe05138c6b76c0a7b202b8430cbc82f158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c63d3c065b5b318adacaf4d641ea773
SHA146c6f9084155e3a970b9348b45ad7381c820e761
SHA2562bec0f8c7b57ae435d1320781972b9801ad19128ef7ff7b3b72c6e846bfe5848
SHA5128d338f122a75419f3e998b3d558f65ac1dcbf505060129ba1952dc2d33623c2250527b6de71aeb115790050d6e802fb119aebae571b35ee23dabedbddc469ccc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5543480a2772d27f436336273af336ca5
SHA1b6ea62f7eb575cd41ccc6282cdb100bc49a7a566
SHA25654f84b9d579a5f3bb714184eb1c35d74e9ab908e93fe4d6f27d0a5caac939f00
SHA5127a987320bc27e7e2b361cb6ddbc2e09b02d9aaf2b1927e84643b05836711711ed55389b1cf60d0c397016ac03dcd6f632b3fef915fcf830f2fa5c7f38e2efa54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2d4e14fbbeaaf6aeb98082e55e8b762
SHA199a963543a54824725b80019acb84a327fa070fd
SHA256cd9f4a3c9f2d5626b75ded4523a86b9bd7f9fbc374cae30ab1c5dd3fa7141694
SHA5126e3d060c2fbf45b23d280d369618b627b3736e71fbd21892b3e34c5545cc1bc53e7a527b74283d8fdff34f02b82a08378b4e6d9037a0b2978ae657bf1b794603
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff01712e1d756f0ec41dac4f36a8b29c
SHA1d01010e03c3ee39c78e5c64ef9b685cee7f2a717
SHA256f1b648d4292dd710e3e38cbcb1245fcc447eb5793c36e1b07719414bdd38310d
SHA512e8b7f1da2381726f6487a372c6a05ba6f1eea6cfde1c87d99227084487b93c12102750fb3de1c1677b411f8e283bbfc12115367f4f32a40ef3067ada0c424672
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e7eb068f1e1dca4154fb61a645d5b79
SHA1e690e7558279c2f1e9f85470c2b11a5963bb3a6c
SHA256e0d8ae5229f8ed7e6d59d294e610c6ada83b0270ac6f276619067306add4f6be
SHA5123706ec229d20159668030b76bdf92ddbed4cd84afc1f226e87626487e1fa68c690ccedc19540368df7df0d2f9a4fc4322008973d079177dea64db58f2f436179
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba046e4d53374719d154d6f2972a95f3
SHA1d180d3d0913d52ba8468e3546fe6d3a74ce53a33
SHA256ca5dce0efb208945db9d313ab73bd7cf1059a07a5a2b854af948b24f76815c64
SHA512ac89c9c4535fbb528ce07eea65c95f553107232bde31b096c7e7818b7e65163a7ba86d4653bc5da04c5e6714f26f80ea64652ecad7cfa4f331db30662a428511
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589b95e4cec37dcdce6c25fa670382a5e
SHA1ebc698dff427137e464e46b096f6ba877e3a79d5
SHA256f2e4dc1d94cbf2e1d91d776b7b131b81d009fc27be020feddb54362b67164d0f
SHA512203d3ae1b773a935d83380b70e5c18ced623fb917dea6499fcd8a77635b16ffe26238cb812b3727ec6af4e1b279c1f8ed2c05cd8d5a8da04e4294250f0ecd906
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5276aad3d292a8811635b6099bf3dc2c5
SHA1f2e3ef621936902496dffe77e6973be3f75b7015
SHA256f0674c5355932fa9e6a028493676c2f31492767ff6370e49bbdb2ef35e6895b5
SHA5126b169c6844c58fbae8ac4e4bf3598cfefb274563444e68a274e42fb41918503bf77088850e59da45883fe90508cd6d974ad2d81ec7fc0338bbba4f267f13b355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547dff1eb3c64baa444ec7766f52b5ab2
SHA11c90e48ae0841b457a6af3cdc2ab645325b02481
SHA25608699d1a78f1d1e0956f16634c78fa64fd1e71830366e01427bc33bc1f1ed671
SHA51265b19d928bcff12fb4300c181a8e92c38feba26c1cdba7fc0bdb26a845d44baf946a80e79a9f13975ebde4f953a3583d2c7f5441c46f76fb7d486ffa479c9b11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d182e501c8dcacd482fa317ebed41e9
SHA1e040bcbd292eb4e0d5e337f829e99ab783416530
SHA25656aff7f275234a3dc5486c2439cd46b6de156379ee6edf31daf7edbb760b697a
SHA512a8a92e6ac712a5e859213590ca3d25845cfb80fc9416a4dcbf030fd8e65bc414224714db91ec8b5ad821f236b0625af5a4cd7f068ee1d72c01c25f9d3e82857e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589db0fea7ec116f03bae7402e432bdc5
SHA1000348ca553bfc421d243ebac3e0d436bb9332cb
SHA2564fee48e30e31557c7832559f04521cdd7d9616a3cb3c6dcd40fcd534f6d1e2b8
SHA5129a7f9c40b591952f35cfa1ccc1c43f28b1aff83b1a5ab2c2c4390429f0fe2f7ee68aaca7222204ba92ee12dca13fb09cab98d6e881dc288b2f0f281d7e33e208
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510f4f7c0d94922b3ce3ad49897932716
SHA182212a497bbce10be372e67b399f70a171dadb8f
SHA256c2e1f7557f1b8db161a01a8a7f394f64f2764582b78ee98fa6aa2d973c02d07b
SHA512572bd23cf7068138704a7d0a2b0d510d055122130b83619339540ea1dbc2628d7c259ae15e7fea07d1f9ff5c07d75f06c4840c6ef41c37883b9047b905dceb80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505c6dd95def222e90972ca1004c6435a
SHA141d77bad783c97128a265a50db5b89611d2d4f72
SHA256d056477c861c1ddb4d611b548c2e06a9bc39abfa3b0238ce8444c6305ce9ce48
SHA512ee9b3b48617f3a0ebe18332f04ebf1954336cce32aea8b1171c1230eab08fe18c4f3f854e2dbaf470ce8c565124be0f3435ffac7e73a77f82159dc33f7aecd07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5314eaba5b1cb30950fd98e60129a2ae2
SHA15c359d1837c8ec9b605d18e3b8cab5d641383191
SHA2565f346905850d42ba97440b3dba8a6cb9fd1e5ca8f4beeb92f981c9a500f6114f
SHA512e485e0c253854b6adbe3a95b979b4595ef1342fe4d25885ab1ac41d01231aae5be99c39588736ee198e7120b1116115509a138dd1c6c9ef720b79be88fb9713f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b37b5a5e4466fff1dbd84fa8043f2947
SHA1007b74a166056d74ee8d313d126885da58a40966
SHA25669c58843b0e10fad4dab114fca331efc5065c07f6d10441e7ce9276088462f50
SHA512e55967b41c394c5b6e4090ee6b94d7b3093ac10daba95b9218ec1b2368d51181d0334acfaf8860e39f3a961746540af297e8dfa11800376acc166d14e6305cf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9e4330204d394c065f4895162b4f154
SHA12b1d03d3b03db54702fb0cd25346ff25356e200e
SHA256e38cd0525f3173597b3ce18e4956c0cee8bfdc7d41a6dbdb117c8fc0331d0bfb
SHA51236ffd3128df42e0252896cb6f7ca8a50ebf5efa0dcac7d523bd3f70f49fae46e74d6e84313d66c31cb1fdd3f5333919b72b9766e059d140d0919c57828c747f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5823e38e70fd4aec16d34b50cb286b65b
SHA1d48dbd05461faa9dbb0aec53cf8db7e01056f513
SHA256e83d119424aa2353fda981eb81a615bdbe6d9b32d00808a85e2a6f53779b47c9
SHA512aa00b74425dd7815f0596b7593c7a45a25ddd8cc0a851b43442a0d9f86c068d5a8432a752b443b3e1492f579f652d7e017dc761103895c9d1a10d818efb70f2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57caaccbd427c8b3f80ff16493c3fec55
SHA1b6a6f49cdd59cfc0471c6d4c9a12b256767e1d86
SHA256ce97dd5622b86ff6cc66eb153e16ccd518e21d4a7dfe2f8fe4bd003fe384520f
SHA51274b45dc6a3c423dc9329cd4108dd2bbdb2b59b0150d02bc3c6601a63b89c537ebbd6b07eb5b9251719e76e8e5533d7fbbda8f9e799163397fa9bb7557e90288a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a