Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 15:14
Static task
static1
Behavioral task
behavioral1
Sample
63c0239ab86d117b703a7c016210a971_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
63c0239ab86d117b703a7c016210a971_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63c0239ab86d117b703a7c016210a971_JaffaCakes118.html
-
Size
30KB
-
MD5
63c0239ab86d117b703a7c016210a971
-
SHA1
ec75e67d748ae9a0c782dd5f274f9d63a42a971e
-
SHA256
aa70e8410f06e9143938da91e5d6d3c999270971c0227fae31b69a4558bf2fe4
-
SHA512
fce16eba2acb9a79ec1d7ac289cbfd2cdfcfba6081020acf2b73683b6d2a480a7289961136efed68ee7d49052bcae4534cc11a322205478b12a269e5a61bd70c
-
SSDEEP
768:vfzp++TPKB4EZX26sDacmfK+MDDh4g3YYYW2HL8ODo7ebZfNy7fFRrGa0N7tez2q:vfzp++TPKB4EZTsDacmfK+MF3Esz1G23
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000714451c1d9cbe58ecc055d2deb1420e350c7a2fc8939b44ce6384a23611d6a7b000000000e80000000020000200000003ca552e21c7274a63aa7e2fe50743f2e0d6a9bd36e026d19676c12c80db66d99200000007a86a516bb81d8771794ef0fe65e5a9e7d8b0fd70efabfa1a6a20d31ba968fbf400000002ef163534137ae90abef886b144b313681b2980bf93fbde193c2f739d17719243c212239b4311e1d4bcc78292c64cdc0ab5248066de153ccb3157b62c002ae80 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 105ec0b291abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422466357" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DE384BC1-1784-11EF-B781-461900256DFE} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 3012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 3012 iexplore.exe 3012 iexplore.exe 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 3012 wrote to memory of 2984 3012 iexplore.exe IEXPLORE.EXE PID 3012 wrote to memory of 2984 3012 iexplore.exe IEXPLORE.EXE PID 3012 wrote to memory of 2984 3012 iexplore.exe IEXPLORE.EXE PID 3012 wrote to memory of 2984 3012 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63c0239ab86d117b703a7c016210a971_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3012 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50cb21ad7fa9dba2654cc4795615d1131
SHA1393f7a11df8dee0f5bb2d16531b33cc16f6d00ff
SHA2567a9ee2b7e4f95d9be35209b37c8d8f961ab104f0d83bde8c5e8b85be6ddbc48b
SHA51297408a53ac514dd234e9f8950c24ec442684f4970632653a580fd7d55468ec659432aaa31350ab1684b2e806fcf3c7badadf6105292cc05b8e316d7508bf0a0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515348e8bf4795802df57efab5aacae37
SHA12254bb374620f8a3ba628d77b3da005f36af6d0d
SHA25674b589cbf8c05a725ee639e6a8a1495430fdd669f1244df81e08026535df7a20
SHA512196a2366534cf894856452aa308191a851df6e4e2418a88e39d599a3690f4464fd084bb3c83902c9b4adfd40b6734da62d0a92415116c09c970949ba30c8ad4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5091d6ce9840c4a2e5b7440914b203aa3
SHA101701752b3ed4f0d82518826a165d3c1c8808cfc
SHA25687375470a7b49ffc5bc725f7df8d4e33fdb989d56b8b72199300096e712faf21
SHA512f8d2bd226c0fa8b8bb44081e056abec0ac35510bfbdfd4be3f30430120c94a0c13906dfaf06d633a598cedc420b132bd0754cb3a59102264d192384a6abbdd88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5176e31e3c1e03ad9c43476fa43df5473
SHA1cf3c415ab8e97199f24ca994d169d881c9d774a8
SHA256d9a6c7e2c3ca09387d109d5172cb8ec098ac5d7c18146d2436062d05500d6d8f
SHA512bbd1a44afc98886969e008c0b83a0cd9b6ceab75a8c8ef36dd970f3238b56eff1b99c7c7116ae50f649d6c0039cad6d0b1275155f6eb77f3ae262c21ab58512f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f46700ab9e75a0a4772b82574a4f425
SHA130594cb2934eeb98d457c8ab584e5b9b13071fe4
SHA256457f22d6d20a260517cd980fca2b0e9357fef6fbc883ff16b970ebc415b0e12c
SHA512f7ec9543b1d961d62ce9a492ae95588c09e6f89172ca81eff5b68177ac80a502c40d363bdd6e0e08d980e3d00373ba3c7238ab88632f05b7b1314001178fe993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5312fa56f410d80db1d2e8122408c02
SHA1487b46188dfcdf72c21dcb34e72fe5e900d1acc1
SHA256a8bbb3ded42af0eb6f8615b67163af87122a591bf376d07327c3bdb690fe4d32
SHA5122377a770c9aa52b8cb2698002e9ac6e18c94581dfbce1bb852facf86e77514575d22910e272efe2b7ee391e8406fa94687e9db115a62f4dbb3fc7a063575c906
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7f43dc81454120e182ca82998e20ecd
SHA13d4c3b4127542c669007984697d78cccd2bbed85
SHA2565f76874858a769b07212665c7c1f713bade7d9832b9d9ad411f1fba461dcdd2d
SHA512f5629f6b0e92735b76ddec3c5ff481c3bfe886aa22a37e9a9e8445397efadb95f7cf14db3325ccec9dddf79afbfa7a5849b0060fd833a4155668a0f62ed5de4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52dd12f10e4066b147f6cfef5f92ace25
SHA1fd921dd43151e53cd44dccb9988fbd21fc457afe
SHA256221a7ec2c617f4cdcbd9fe0e81faed861ec4a37f316aaa88589318b9ba3b9d69
SHA5125a26e779d0755df87c788df8e099da03b1c49c70b81aff5efc9cb7c2b0e0bf921d5f8ccf9c2fd3fad92e6ae59187fe1cf5ce6d12a056b2b20a48201fe682d841
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad4eb60f84a151b6cf8d0744e4f2c6c9
SHA12d61c49753ab28b175898349056984df9e605a41
SHA256e0f03ce0cde0f28ea2fea48adbe3c64c423b71778c4b29b90af94518f57eafb9
SHA512fc1b399ee2b703049038d93998caf2ffcf69c8ca5e8c1f5bf147a1650972151962732c68b3d2ba64fe4ea65f98e65f7a164c1ed3c7f2e18670af9bf8818f8767
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec063c00b1c4a647d62603748bde2971
SHA19598e079258b2d881c17e88474022caa4b13eedf
SHA256675e88d02d397f73b5cb939e31739ff08d5d24e6982cab3b1e3e2dd4b724bae8
SHA512cbd3872417b9b44f0ae8a0489c72df4c30475ad211b1daf0f9d8fb05c193c8d92d1df1935e474ff9b99aa88bcb0cbfffc1d8a795d0cca624e9d92cf2f16a0d71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a879022658682bf4464660604dd2f7e
SHA1461f6e12dcca69d50f2a340b405eb22f343d8a80
SHA256b78364d48f98bf876fa6331a7a75a64e78cfeda84b172d64ffc0a5d8a8454bbf
SHA5123b93a62058498db3d19c530748d4aaf742f0fa62deb6af73cfaed17b136b65608c7e8b8b30d30b4d02b69833c9f695262a95a7d2ca3d87e8b113c8a4d31a744d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557f5843cdc97b102d5e83c4f74ef6bd0
SHA1ed0006f7b90de23691471adde41686816a40aa52
SHA256861494dc18f5ea89b53f919808edebdcb2a32604e5ca825af98ad79513b44b8f
SHA512e030391d1e4714d707679632d4c6d5230075e42a341e552eb351e7d6b38686962dd5847af140b1d4f8c4598bd06dbd7ab5144ce0e66f158523eddd107d0fa1d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e29752ecb0aa4586180e14bf613776a
SHA1c7029c84d78df52c97507570fd14920d42d48d79
SHA256d250b0033e12730a7465c3e6c79468eadb77502c8aef0e527cf2044cd87f2315
SHA512cdcf0d38b0d7dc5ce4c251c402fae58959a6e27f0713e31c27842d63acaacf017e63469af585aaa291badce4797f0d1d99113c96d0c666208377e57bc3ba11a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5192ddd39502c459dc380ef5cf25ba813
SHA1bc9060de94cd55ced43469013c52559cd261ea89
SHA2569e3b6b8bb4aee9929ecb5dc863a661bdf6c070bb749f65533bc6721261a0f96b
SHA512880914dbb16a45759010a2a942a619484af1f862162e495e01696171c3e90ffac91cf8aa0e2c0abf145d1477f455547983b47f3fc398f7c77dcff9ab15be5a2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556ddf6646c01a66be95f3e74339450c8
SHA1652af45dc43fa9d57e13aa5bf81bc3c79d6f9ea1
SHA2562cd84ed77b2ae95f8d519d8b414b4e84f02605b2046b5d6337ba11af29905178
SHA512e27cd2b8ce118e57c3e966d54f06cdd053857bd31a853a77093809e7580cea5324fce4e71e4111a27892c665c3add426cdf2a99f9cbe63e4d227dab1073f7809
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552a9a07b903dd4161f842eec9d09250f
SHA142ea932d8efda3aab0397665a7f73fe212f8f9f7
SHA256f2472039f837566eaab8e7e4fd317214068e6dd148869d160bb2a87838a05468
SHA51251879601df58c59b33f7a9d0d07659c7103d77e4707845942877d9fa2cd4c83f200eef6f5ca1fce87247956bec6b8c0397c533c6dfe526864e7d3e5061a5b8bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c628b7eebaaac6e5e150375ea8a91a4b
SHA1dde25198d941db52b62a971a6c45c17cb98d64b2
SHA256637f6d88f4478cb9ab8ca4a5f272be3d71b6245d33e45e82ca937f160c757e0e
SHA5125e4597a83809908e16b5b15bdaac2ff7c9ebf41ed18163070347089b0eba0c0c370bde9f2f71e79e58184bfe337d22542194133761bd0204b2584b5955fc2ad1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d30c54b5569dfa814dcb744ae63cdf5
SHA1f5cf965943069e5740f357b984c7613907e30a87
SHA256dd637e32d21c75472dfb674173c6f071da0327cf17957915a16d3cc0eef7a0cd
SHA5122f304c1f804894e4565de9bd0f41b1bf4cebcedfc962ade54bf3b5bbb53e78be4da0e67b54affa4f8d66d8123a83fc81292b3f6e825672dced6f0e1f5f150b77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f5ea47c0302fa9e3fe1791226287a9d
SHA1bcb4f73ed97376e51bca020b24498f5a0e6e3069
SHA256c665582540e0cca1e59e76c79351b474b2e7fae187b39e3e6ab2db59baccc20d
SHA512b4eed7caeaf36949e82298595e61eb74262539e5ada58e6ade6da1e868370b8aa69d9c7d0f4a1d9bd410e9ed75be395d0f0acc1192df6d1006a7ea176ba65716
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a