Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 15:20
Static task
static1
Behavioral task
behavioral1
Sample
63c47c0f423262bbc99a8c82652ad0fe_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63c47c0f423262bbc99a8c82652ad0fe_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63c47c0f423262bbc99a8c82652ad0fe_JaffaCakes118.html
-
Size
147KB
-
MD5
63c47c0f423262bbc99a8c82652ad0fe
-
SHA1
991212f227a2187f1407e4d5fbc7de0186ab4a48
-
SHA256
176012df818cff90dffbe124b3f7445bcfe66b5bc9dc90bf856a3ab2a89718b0
-
SHA512
81011652a00699bcb3fa95f1570f0290c612949b11a81359b2048817774dbde2d402933d086e9003eb1f55b5463dfe553a37f4213baf0a4ed37dba4e672009cb
-
SSDEEP
3072:TRECqbyPawsFQ/twN7hWuOGu8CY+s+jjEuvQKxivQ7zaZzlyqpCPW2bPjbUt8i5H:/EuvQKxivQ7zaZzlyqpCPW2bPjbUt8i1
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422466721" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B69B3951-1785-11EF-917A-EA263619F6CB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2884 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2884 iexplore.exe 2884 iexplore.exe 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2884 wrote to memory of 2340 2884 iexplore.exe IEXPLORE.EXE PID 2884 wrote to memory of 2340 2884 iexplore.exe IEXPLORE.EXE PID 2884 wrote to memory of 2340 2884 iexplore.exe IEXPLORE.EXE PID 2884 wrote to memory of 2340 2884 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63c47c0f423262bbc99a8c82652ad0fe_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2884 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2340
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD55e7ba396321a0f2d4741874b0640c12d
SHA19acf9b58530cf22c94672f734922ea1cdce2fd76
SHA2568afa3ed1db3df759b948a2e2e043b1e223ceecca2719a3e0abc3510c4009a989
SHA512f165ff0d0efe830f8ff7b63b74ca57daf3d7b3ecb32bed4f50930be55e594ce361342f358d70d7951b9de0c31bbb0a0683867f32fe3b63d17af22c07401a6017
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50aab197ded65331da2808ded98e359f0
SHA1a6ae7ce224422d5cb6547032c842a428c4c0ed60
SHA25670c4273c93888a809959afdc5234038b66c9a99a374ef01d2fe623ebea51b1e0
SHA512cf4ab1a77f74444677a25563cb5f9721eddaf3301e568181dad3ebd5f2f3164e22706b29124cea15bd2c5be65dd704a203e472c78cb93b3f894e63d0e68a700a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5616588c545341b9b2da7df030755dfd0
SHA1c458a7db6fc25168bfba41614c3201b2ad663748
SHA2562818efb1217e7070b4db40007f38cd0b32d00a56fb9ecf1a915e6655853ff466
SHA512f68db6718060ad5a5e96136fa2f0bad202f2781f481b736dd80171fe25a09c18a4603724f898376082b107d097c3afdc36d7d1395ae503a17d8a72e74b25550c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5f59b4993c2e3a118e091ff8c3e4a62
SHA1e190320235b1188c4b6bdbcafe36c9aaae5c203d
SHA256d2f604d916de168fe1874d81d032c199f92e0b2302fe089750e9aed7a68005f4
SHA51289ab2a5ed3cc73c036afa96e349d69eb03893879fc13fe2ba892a4cab2727747ccd8867fa371abad26a064554452e7d6acb9eba8f6c6d811b5b42a45a3bb800c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e85480586b8a1ace35c557c6264632fe
SHA12c8d87042b7e0684c14f2ead2f5ea2817b235335
SHA2564ae6af2fa84b1957947992d76ffdf73a4975f95ebe5ef9e443f07420fc4cc58e
SHA51291e04ccd6ae5fe8235cbbb64829ddb4e20ac40cbb37b9002c3030c7eedfc872c9b887db0ed5430904bf5b16845d95e0080b2aa6e97b89c369bfb937bbffee7ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d5db5c1de0cef01d48e9adf81a75d0b
SHA1ca6adf51e31a40b94e25d089bb693efb229f301e
SHA2569479f597428f3f6070e2470eb918343691f0d45d2e5f82dfca25af803eabc0e6
SHA51204264eedbf642bd75cc6341fd029ded945ca0e80d4e019ca686976b9cf477c49b8418257206e6b3ef2d961af45aa0b1fddb81502fcf4db632170cbfd9b08e29f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56928565a4d7f5225cf4ee69c18eedc83
SHA134deeca92b9fad752e3ad76081f2afe334078583
SHA25627bf26b30e940e33e47315faed262ac3b6977da0c3d86af2d424dfcd0cad569d
SHA512bf05db9fe6715baa5297526800a7e3d26c64e5cacdddaab07069a755228002258610d0a1bdefcbad065d43c0e287d7e197d35975f93566a413fdd83d7034b411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8bb2919d0c6c27db4b0fc50f9f5ca15
SHA1b46dc7ee264615079bb3349981a68c2b51d25b78
SHA25614ce4e046a9d06ea3c1532a6d90bdebcea1a5e623041313e09691a1f27e6a7a6
SHA512e5ba85bb769ccd299d3dc506c5fa7972c08300150bc286fa8a4b6add4c23e6f014535c16d49ee416aca858fd26c7d81dbf2389d2f6e48b0dd697a53eaf4d1b1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6915ca4d7b5ca43b75e48f5aedbcd27
SHA1998798b04678353357e0a6fb4030f4fd0d2434aa
SHA2569dc2880afe8af761b25af92aa94dcec096bee317653215d0c42d6376d64e5df2
SHA512b6a9663baef32d181a8a301b2097cc34dba8b976b6f8e5bbc10117abde0f4f40775f873ab1e115266b5c3fa28d6b9461ba64f8352efe5bd4e9fb6cfb781b85e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5961f3851de2f10f6a915c8b6988c3bc5
SHA1d0e0e64afd1de5f0c9327c92190b25c943b9f167
SHA2563813554c9159e134de3564b5e45fe8d37b98da9fe83054b95c95c0d7e28af89a
SHA512e148364a564b042c0b7975e8a916c1354085d8253096a9e3791415b4b82eaadee737b29f6da99482eb52c5b4db650a9b808d243f5eeb741f6dd9e5a6b86240b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e494a8aac14cc5be2ee4539dd32c269
SHA1ad5430f3096692be9c741ba1609d49bbc0236265
SHA25616ab577716ebf78e46389cc207834e6ee96fea801f768d87b164a452e14460d5
SHA5124c1354e1cd9290b59bde4ac3c0d049abbcbc2224adcc6e1b09bc5847fb61eae031cc4541aa546ccb908e83134551875259e0875ce28bde4a709b4e3e64bdde9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5307d158daa4cc7c631bcabd51bde13aa
SHA1da712aaed189085b0a248c0a8d762ee465d49294
SHA256b9d2ae78219e352577518c4c21503bf80e8baa96d058220c389e7344376fb0d3
SHA5128edecd4e528249081d7aab07eff77327ab2c6edab42814be07284de7b10fa51a34a5cd93b0f25188e419f52d78337c31b2ce853c6795efbb9f238843436ee04e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06