Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 15:18
Static task
static1
Behavioral task
behavioral1
Sample
63c25c4e463b361f8bca63114394e12b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63c25c4e463b361f8bca63114394e12b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
63c25c4e463b361f8bca63114394e12b_JaffaCakes118.html
-
Size
461KB
-
MD5
63c25c4e463b361f8bca63114394e12b
-
SHA1
de4db924c8059fa17ca439f606cbfc26046ab0e9
-
SHA256
e3cfd067c394ce802200798a3be333d29716af83c386f36139d9f25fb264914d
-
SHA512
9b2a719b3bab0874cdb1efe2f6d84921ef1ec8296897679f4c99b8ee54f037ce190e866f7b358b310b7136dec4f1b2abdc9b528cfc629b74d8dfb7ed30a591be
-
SSDEEP
6144:SNsMYod+X3oI+YLQFsMYod+X3oI+YgsMYod+X3oI+YLsMYod+X3oI+YQ:U5d+X3u5d+X385d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{56A97CA1-1785-11EF-9966-EA483E0BCDAF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422466560" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e712f21c33798b45bcef117eb93131410000000002000000000010660000000100002000000025394464851cec025ba30586483ef7eaffab3b520e7f906115611b0d805f1456000000000e8000000002000020000000b192c0eedf4cb97a89170dec30b6d6b57335a6fc3df2eb6b06fb1b175a4005972000000095a9c04336dc9d4e94a809d4590f6c9ec271888d736403124986d8608e0a800940000000e1f46f48c09a48723f3e15329df80942202b0a76a49a232f1ad8b9b59539ca3a0ca049b8fb1001f2e18f9c9128ca056517c4577cf6eea582c19bda0d6945afa4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7068922f92abda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2156 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2156 iexplore.exe 2156 iexplore.exe 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2156 wrote to memory of 2528 2156 iexplore.exe IEXPLORE.EXE PID 2156 wrote to memory of 2528 2156 iexplore.exe IEXPLORE.EXE PID 2156 wrote to memory of 2528 2156 iexplore.exe IEXPLORE.EXE PID 2156 wrote to memory of 2528 2156 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63c25c4e463b361f8bca63114394e12b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c246efd38851051279c3e6ef526e543
SHA14145fd04421292033298d28e15b7147256373477
SHA256e48107333f46ed70c02adedbdb186a723bfaf40b10cd27f51588b880721f8acf
SHA512c360341afc9936f13aafbb71c6a8648c8a786850fb5c7f9f995b060e6ddbe81f7611fbee10a42c30ab630c8f41e0757e4d5955a2728d926bd3a5e4be9fb04cc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555d4a02f7bbaad17eb16008f98bc7286
SHA13befa820d5b98f3305d09a696f6cf15a52c0f392
SHA2560bbde382015e1b87e9dd1861711f9555776b6c620e9d13214e37d22731c6e383
SHA512086ee6cb030126b846bb89ebba4ea201ed453ba823ea1173ce75c8c30f716de76a10f7df84eb3a416f1e610301361fdde0b31630441574c3dfabe7861b60e76d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5325a0d48fe2bd5af5231a662ba2ae3a7
SHA14c0ee1bcf8b4f1394b8952493f09404f09d1c0bc
SHA256131c861dd898240057f657df60b6ec940dfe875985cd6e0fc2ddd736471fd749
SHA512dce56f855acc441634e4000569724faf58b3321430d7a43c4bcdcfb689c627345a9c599f25c068bd0a72ea35d7433ddcf3e3d74e1b3f10f18a6a23fe56fb30fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593c16f32e3d39947b1261e009941eb48
SHA1f9b16a108087d46a1ef8a3bfbfabd906a9861381
SHA256958ea98ac3cba67d3d812ebf97d0d247536645c911e39666b241ef7b91bad505
SHA51209759bde105618d251327468723ce15767540e8754a11f8ba847e4fb66600c95e695d6161fec48468b246584b8a5be2161edb52a0cc88e101f5ca682ea06265c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf8773a70fcd79a54b222e2544bc7567
SHA19b754fadbb59d290232fd4011d952f3e5d6f6452
SHA25641d726304e06f7051c83eeeb44ce5e9501b5fb2375ef839360d1d423993ab06e
SHA512b86b473df47ccde973f76e4bd4ad5e48cae67aafa8a1bde6096cec13fd97afc289ce1055629b8afcd39692d8dbd115fda657429195f63becfb9c94f55202b0e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526bd7340494723e2ddffbca5fec29667
SHA1b5402336e5e44507936d382fa44121343d7296ad
SHA256f08de7c5d9969cc6e557c8f2b56e7137dcb5e845050d92c5ec9f6e2dc664f105
SHA5124135cb8b5700b509bd46fba25f1877869f8c7e21e6312ebca6a47e93a75b34404946d451e6a3bd3419bf79190724a740e5f646981dc0afe514d9eac66e93ebea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b1696123767ef5f1c7a8c603f925c99
SHA1eff2086da56908c919f144e9e888cf3065d19a79
SHA2564acd19d40f9d7f229a812c37cf447f223f8217439cb30c1f404cbc36db27b808
SHA5125e8994a263f1aee52584fc9fe41ede8421b42f23b3b744848daea3ebb19e70af339e511c6ff149ef838ed984a53a703fc7c0557aa204012123ada8a9f867b636
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b0ddbb7c0e1614655146ec7e74f21f6
SHA1da24bc6fbd501f052f68c8660935fdb842a9064e
SHA256129816e0dc8acf4f69274d0752d29288ee8baec7a2f953468eb672d3e667f746
SHA512d7c7ee9fa39c9dcfe8aec3084fde7133b00a23451f090dd95ec0acfc53ee50083404c1c313e8a36b27fc988a346e83772e3c8dd8e6a82e97d563f97968889dc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ad4b383a072455add50344daec40133
SHA1dc28dd90593ae74b4331a8229395b60d666c4626
SHA256d2e874c17b2016a7200eee5a94da439945dced9344b3714243b4da59c4b3d9cf
SHA512b4c162d5efdf8f4e58b29c72e1f5c7131a7a4389150e92cd07c508ac13c54cd9992d84d287cfcd98e8f046b84b441ea44d7c28f42ad295d414d2e25b87741282
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff3601d0898eab609deb72b260c6a8ff
SHA153f2f1230ba8367cc90dda04e397db7d4b84746c
SHA25693e0438d65fa2bfc128235d98a0ff0c770b6b0c1d679824d5f23b64644d5a89d
SHA512d167961d7f3a00634a6cd48b7ef69b731432b002c6e2955de1d19be02e8afdfe3b42be4bc6229efab2e7579cd43ea3756cea52e1c153ad3d4bf080eec0d2834c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596a9f80a63130ef6a5ced2c3968f8e5e
SHA1da9d05e01f3fb6d2c0f757adb2861ebf348c411a
SHA256533a431a7f09ff76981dfa161672bef2b984f08c48a0936559773fdcb54563aa
SHA51266464adc012c826eebd03e07a1565763b6da638f897d65ac66656aecbc061b23e6b4324dfb342cfb3d437a1b521d475bb7b0aa0f7ecbc409f47f6b3f266c2b08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c27fcde92674c04186276c94a807655
SHA1d9d99e009768cd2e5923fcb974b4cc8125ca41eb
SHA256cc0cef9c162f0ed58205a56a1eaacfcdd9eee070624931de2db039f641811c4b
SHA512824e3e8470b9eefd48586a281f380ad72f872acf89a3c7ea63acbaf75278a41f4aeb918b7da8f11c93935fd5e1e91726ac4f361398933ea7bce0438022129d0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513578e011424a8d310a1c0a5c4477e1b
SHA1422ded08739023b28b32f95d4d584fa7a78e8a61
SHA2560a13ee8821e35ef0b6aee4b44a7f073bf62773276bf77257931d8a1de6182e1e
SHA512d977277d5c878860c87b8a4f3e4f809c441ea7e61bd2c23057c261929ec694978f7872d4c1ad448e3f28854178f7c3cf33cd762eb3a26edcf431c7d215ce411d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b372a59300284690fde63c99a1922ef1
SHA1f5727d97d5280776050e68e0862fcf61d44c1103
SHA2565e529e03def698079fee64ff185a27e7da27fbd51b1eb894b3647612d2356c7e
SHA512db59b00657d94e34bafa458d6cb8d9d78381221c069edd29aef70b6871e7800bf2d056f5ba0847afa0608aa56106d70337a9ec7945406f833a625062aa765758
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e28d214cafcc855da856e1167bef125
SHA168a8c5456960fec0214ca0f2fa3005b9f6c02c95
SHA2566b525b1ef8fe623079c1e4b428c15e8eccc13f33364344a2c1349792c908e1e9
SHA512e11b6ce260228ab5bbc5f55e260fee583f000456a7903463281556a9fce729981a894369d95a3680dcf913c277bbb584017fd1bf642235ebe4ddeb1a04d3519c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef584a7ba73d0ffdf24e1c1e999dd60a
SHA14b923c7f02bd8cee0eaedabec494069f5c2a72ec
SHA2560a1759de4e661287aafa388a6162574ac2c4b6a63f67fa98377f9c560ea3674b
SHA5122f1eecffbd7001438de14815780bf0593f5b5ab373a7378c953a5cad0d94fb8a1180055a4f233891385df5469cae6fc280cfc186189e7a2b9cb583458d2a420b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b6e371ccc0dfcafeea82aa3ef8d3319
SHA1dd58b08086e08e065ae97465ff98ff64a5d77a77
SHA25698c266d74fa7fecb002a6d4d9ac3c8ed3e96075b89a75ddfb2b98bab35319f30
SHA5121e791547c3b5cc1820896b6e0db782e4cdcf35636dd6493db1b921d4fed98760ed7749217edb6277659416ae2ae21d18fd6057e85ce77e60cae175991c59072f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a55d510d7163e90c028de3d46f72883
SHA1f424439baca8d633ca5bd94ca845e5e72380ccca
SHA2561e0ca7c7da41fc384d0c757da47b79cccea4483154138b96043fc9969c592c43
SHA5122da99ce8ece4dfce1de5069ca3f759ae2d066c3cfa43c69f66e899f5f0ea3f00f18a4d7b03c193e17be006ef4c287bbebd119becaaead1e4d4fa3adb351e926b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a