Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 16:31
Static task
static1
Behavioral task
behavioral1
Sample
63f89b9a5659f03c67fc66d616774eec_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
63f89b9a5659f03c67fc66d616774eec_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
63f89b9a5659f03c67fc66d616774eec_JaffaCakes118.html
-
Size
461KB
-
MD5
63f89b9a5659f03c67fc66d616774eec
-
SHA1
08389f5b551fb6c6be9ee68e1cdbf53e9afc7c83
-
SHA256
021abb0064e2f7a2e4297b86b611b4b76b262f65a7d36fc13661bf67410b67eb
-
SHA512
f541309d7768ae06bb740d0294add9ae22366e64730ea3c539fe760f4534551b83e7c16f266dedbe3fde855b8c139232f2e0019c177fbd6550058f07b4e568a0
-
SSDEEP
6144:SpsMYod+X3oI+YAsMYod+X3oI+YvsMYod+X3oI+YLsMYod+X3oI+YQ:O5d+X3E5d+X3p5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000046d21f09094dadef43fd6c7403dd4e1a2ae7b32c0159ff269e13cc7ed9d8d3dc000000000e800000000200002000000047e1b4c4345691cadfb51f76f35160ab7e19139db5de2e28f122b20764d8d003200000007b1291abaa1e52e2a0a57d451ec00433e79ec0d81c0fc4680d19be11f6fe818540000000c9913b06b4ef55f1cd4e79a4759ede6277562310a8cb1e8c7f100085a7a957174561193c75d359de5951db087d5bb0bffad5f4ae71ae18deee79efa9aafefe6a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5088626e9cabda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{95DA0C01-178F-11EF-BA8B-4EB079F7C2BA} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422470960" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 848 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 848 iexplore.exe 848 iexplore.exe 1780 IEXPLORE.EXE 1780 IEXPLORE.EXE 1780 IEXPLORE.EXE 1780 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 848 wrote to memory of 1780 848 iexplore.exe IEXPLORE.EXE PID 848 wrote to memory of 1780 848 iexplore.exe IEXPLORE.EXE PID 848 wrote to memory of 1780 848 iexplore.exe IEXPLORE.EXE PID 848 wrote to memory of 1780 848 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63f89b9a5659f03c67fc66d616774eec_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:848 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e69854fe3563c5cb3216bfee530ba7a
SHA19cbc6df71d0b606cd67182732aa6605f97b825a8
SHA256b15876142e9dc950aa46fb51bdd1f847c85e5e83b46deb61786ec37ce4afc88b
SHA512c99475585a18a132db7543bdaa355a365e05eadd714a10ed08a5ec065413cdd1dd74ea796c8f13e23699ffe20daa1b537dd4b62a4c493990458ec2c8b258f207
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0fa186213debd4b717d6428301771e6
SHA1ba9080c24cd277a8e0197eda86b189a47083e8d9
SHA25608745c974ce1505e9ad308ef5acce47fda76e6bd288e3484102cf8ef153a555f
SHA512cc17ee9d55ce02a35a6b90bf545f3f6652153535fe8a585fd5ea6cccfe852af3146d821f555fae2c595cdfbd6bb85e58ed30a93cef98503f1a4a6a67c101c8e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d45c89ff0b2976e2f94aac32949de50a
SHA1829625f9ce5fbb9856708b30c148f0ed4ca5d995
SHA2569ec64ac57cecda94ff7d9acd7f5a63d3aa5e1655de7ec1859f0fa5f81c20bf43
SHA512c7471fcf83e5fb3ec2fa0d6efedafe7f675244518f885ea8affe96fb81e5c16689c72a8d73761a8a20c1b686b824f4f5893288aad4ddda6676293c65e1752f7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569e02838e58edec6d75d94528dce45c1
SHA1bb867ff02c69b41dc84637b83eb1580fd6b8eccf
SHA256bc8cee8e2d90b9a1239acbb48563c429b40b6229eda60b150d1e729cf341e4ee
SHA512ec743e83728acd92430250b8152da2cfb4bf56512c176d906974aadd3309c247287bb1bb4c3efd7513b723b2b1ba4289c8f4bc9ece7607be385a1e2c0e67e699
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d28c15ee5bf73f20a97f6607ad1a719
SHA1695cbaa2183a947014fc5ac993376d7e837aa1dc
SHA256c34957393fcb0348e189c6b31a4e7026bfdb8177889897169d2e5989ea4a326e
SHA512a488c3bc67ded02015eb9998b9c0cb309b6354271fb040bb1fafa1c00dbdf8d5cc99b55fcdaca0919c0bf393242ed19b63b3887a1e0071ca53aed9ea8218c39e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4413ac8a9508ce4332cd6aa39e61f00
SHA12febf150229581177525c0720ac002f26321d629
SHA2560b1c7b9572bbde444034cb5ca82a870fdebda4f1b7997726fc3caae5f7319611
SHA512e7bd502ffc6c7b215a037d960e2eaede1be192bf231a04e38c9df3f19544e19be54bd0ddc3a85215f95734c6b26e3c27ef22ab95aa44865e401bb3bdbaaaf8eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa8acc05563223fbf0807edd54d8b637
SHA1ff537bb2929465727e49b25d78d66887d9361ed6
SHA2562622342230c7bab59dc257ef30a4c1a332d25360bd096519f3488b19690272ae
SHA51248748b8e55b8e4d24f79217b8ff065a9761f404104a5a7476752e83e93aece4c0b6a21e1adc9385ed6e838b4b1f0aa5c544dac8c763feb540a761ddd3d0e56a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5315b125f8fc609ce293c6db7705ceacc
SHA17b7c602dcbe54369d8343e83a2394d39e709cc16
SHA256143509e9216d6656b782a66bc93a19c2395cb74f7599d84ad6b67f06742b1bf7
SHA512cef32474328d1f34355b6f48ca7e6003c2874bf97e3fc3791b5dfaf32e9d2a74803b8f4d54b239710e767dc2eac0c807580e755da76f256de557e2334232118f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c20acaf732a64b176c987bba1928c0b
SHA1e8fb4e3f735becbbbcdfdbb17f6364bd936c74cd
SHA256a90b74e55ab64183c6449bce5e42c617f1bd4eada98db3f6719dd643821e409e
SHA5126bc242e413a47213e13ed2dad8e3f9e5f5be5b8f0920c09adab695718fafd67d5e13384adddb778aa006fa5360c2f6cf5bb4b3a6c15ddae40ade0fef9ea94c1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bddb86327fe6bcd6769bec8de0f9427b
SHA1320d33ce7fda0ee26986d995773165d877c1323f
SHA256a901e4f847f0604bd5cfee1026c7d736eef0d0d62aa2d6cd4018234f0f01a875
SHA512963e1b79380550ad5a4423c4bcc7ac9b075d100ac2e2ccb39b1a5ea15b698d633bfce1ea2cc052bdf9a6d97411b541e2b20d82c024f4cce1a268379dbe0c63ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53163a5db8d3bbee3f2e09503c945df26
SHA1daf31ffe69cd18adc48c1db28ee1379f6936bfec
SHA256dbcb89253315ab13e67050d2ec48066b172cd037ac46cdc476ced221cd6659b3
SHA512a741540c9d9fcf23a711dd3afe3cfaca26ffe5ebb0e86e1db52c45978e1d79571d3ad8894dc6aa2e1b9a8643a7676191d1019d7f5153051d0d01ac1387622e53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52aaa4a605dab2430c9b5ef3d93949263
SHA16dac16ec09d6d91a6d49fd67a2bef7cc354d9b1c
SHA2568b9990c16aa620d9097012a5f8003f75b3a23f3136b0a4144691e366ca88ff4e
SHA512bca4a3552eadd4a0adea7dda69aa47f3f6f97d65e8ff43fb3954b2baf896814d8abc05c1cc88298d3fc2d030ceed2a677582d47312a684f3dd69a43439018876
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a483f229221379018b099ff50579590
SHA1635112a2785c1af2e685b11e2fe4da1a6d298576
SHA25680a0162e156dcacc0fc29ea4e60269a49eefe72680e41308d9679e9e7aa26735
SHA512514a1ea8edc85d5ee7f9de02fe36493a085e94635edba8c57d3ef9a088449198f0ad927130cdfe904b406161a417da5afeb223f74cf2ee1f484caa1022a3a191
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54acd27f9ab6b619dab333c816e0a8ebc
SHA1db8d462ebd31a69dead3fedaad54ed8bab22898c
SHA256ae4d28b85eab882c49ca63120eb2f69693f2fad1ff4ba5d1a01df3623d509a19
SHA5128804fedc44c6bcb80ff8825b26fc9b499541b527ef999be333a4262bc9a27a159a12031c06132cd9243125ad7e4cde817b82d17431bcc55b8ee4b33d62c32eab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555859ca7314f78003aafdab3e5b1b022
SHA1ebdd60c2a7ac69df8265d5190bb5af4c00e46727
SHA2560dd7fe96ccc488d51575104a2bd73715b7896fef9b04b5698bfd7117f0d3241c
SHA5121ddf145696f251af4027dc2742ebabb51ad290ec8cc9fbf8a2b7d2fe987dbebbe4fcd0bca21ad1b3ec2feb0f942592d74ca0df8493216ff9af82bdf18db0b124
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5458746cd517bf4939a4efc162ad724ad
SHA12ab4e52868b0170f2867752421de660605beed98
SHA256c1da110b7cc4d7e4c225d4c698efc70568d07bbba02be446068f98be4f5a532a
SHA5129af6802a57e768476a98661a7a957b5cfcba6b8af91a7ffc9aaa6f60652ffd82c5e1ce7ab420b0ae05eba88c147254db79f918427230fd9bea449111452f951a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6f7257f043709b7d4cf0718142feae2
SHA1f42c3aba4690cf1375702a5df1a8325a38d4c018
SHA25636c0f2c85fbda42f59f37111bc8817e8a7624adfe7be1f2895e174c46d09d364
SHA512e886d80e47d33ad5ffed22336298de1e109ddadc34bc5f0566f676981f53cc62f42def88eeb7b73e6c91c5e4c81059b01a15deaf09883dba0a8cca85850ae628
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553dd92819d498c3a27b1ebf94d792e15
SHA1ea69177528796482ba98edc34a18636303dca806
SHA256bb10ab08c72c9d5a504a1719b054d77a8d06b3edd8b4082f24c851cd8a3466d9
SHA512f5d2435e59bb1cd0ee56f3fca795a829a03eb3e396f0bf8023571fdd5240421b9a5bca6cad4aab20b3f397c6a1c90300f356d83af09e3e4141a6593c399836f8
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a