Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 16:33
Static task
static1
Behavioral task
behavioral1
Sample
63fa893418c385c242e1a4d98d59a7f4_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
63fa893418c385c242e1a4d98d59a7f4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
63fa893418c385c242e1a4d98d59a7f4_JaffaCakes118.html
-
Size
19KB
-
MD5
63fa893418c385c242e1a4d98d59a7f4
-
SHA1
99b2fa9ce83a1347004a18b4b514c96b8bc5fe86
-
SHA256
7ecf6bdb11dc38e38ab6bc640e329dcc7576fa9225a070d3ff4555ecc1eb48ff
-
SHA512
04c7ab72afc281ff7495ef2e408fb38f00c3afb96d1db60badf9a6e78119c60343e8aa54922f0635fbca533352da7f028584fecbfaef35241611e2d266be20a0
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIA4CzUnjBhGY82qDB8:SIMd0I5nvHnsvGrxDB8
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000d0473ec909e1dce89b879484c51efe2e9d95eba2f72166bb0daf36a2e86653ef000000000e80000000020000200000001cb9bfcb5284fe1988728a498ad1187dc162f172d1195c05d43de13d9c486b2c20000000aa78b921e830d6a25344a478c959682cae2a48b6d920ab2bd9fe137b9dd6a5ed4000000062e32a02efe86ae94bee298941c3c4d7c630dedd5c473260dd5249102c132f62feac76486e3f91baf0c285b03b74b1f8a1038af770be3d70a5798e4acabaf0ae iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422471071" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D8009E01-178F-11EF-A1BA-6AD47596CE83} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0c3ddca9cabda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2916 iexplore.exe 2916 iexplore.exe 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2916 wrote to memory of 2928 2916 iexplore.exe IEXPLORE.EXE PID 2916 wrote to memory of 2928 2916 iexplore.exe IEXPLORE.EXE PID 2916 wrote to memory of 2928 2916 iexplore.exe IEXPLORE.EXE PID 2916 wrote to memory of 2928 2916 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63fa893418c385c242e1a4d98d59a7f4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2916 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b704d69a31dc8867e74792ba896bb383
SHA1549e795fd51ec86980db90eb38b07c7e97990593
SHA25629307de240a3d86eadf41ad270a4c4a080794d66e6cbc688e290ec63556425cb
SHA512ed0272d880328e58ff51846ca3d8612d2b13afcee3b92698496823a0ff90bf93c0de20ddc302b324ff4b167e6f55a0f0aae4e1754d56491c627dcd07ac6db06c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52bd78ca01d2cd3e2eb97da57a4ebd4bf
SHA1e636e7f4f329368c49eecc7fe53ce2b4f40b64c5
SHA256865e216da37533600099aab87e4175d357a02d135f79c66ed046c10e2576fe0f
SHA512f7d3320ae4234d529478e850e2b0812d1ad485e85cf616f3b63c679997c3e1d120307058540fee4dd3ed55a32ae5056569080c30c319aa880cbb82209f6022f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598892d0cb8fbefb26b486fdec29b1792
SHA1fc14572e1849355f66da223dfb3afc4072e37941
SHA25634b3e4bc87add681b3fd6e8c6297fbbf5a38b564a83f5b1f4469f08d7968085f
SHA5129a3916bf4f998e03a69a84f67d30f5e9b0ccf6252057044f7b71977f48f097483378754d7d6a0303952d6e6542709a44bcb2df1ab223247b7efb85212fb8d20d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad3e2c8c7b5b8683a7a33ab424b7f767
SHA1a233cd19fd29c47ba3be9d6b917a1075363dabfc
SHA2562dd5a598af9a7ab3f7488b67331a3cca690a70baad83134f68608490ae4596c0
SHA512a2dedceb0bbc349cdc945c3ac5357298b45740fb0d45416ebd2a5e3900caf25d9efdc2441c3e7f2004551b36845f08a01c1170612a5bed8c9629ef9555ba1553
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1d6cf0b00a2dcb0aee67d4b5c519ead
SHA1c2ee674f81d2210ea5618bfa24e4826bf83f53de
SHA25624b6c98dc2f8c428cbeef463043fbafbc7e2f4cb4ebdb1c878268792031965bf
SHA512f2390e4566a6653569670ae0a1996f1d4eaf2df1b825b1e71b59ee6b5529b346a86ef82702bc2cc50bbfb51098729fe4db1783fd0de3fa800244a5a9d7d50455
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b47f24110cd2e686ca65c6f55a762f7
SHA189f7ca3f71a72bfae64c6abbe58f145be4f27a73
SHA2568836874680193223f40afa8c71feaa93354783f18dd4ba7d62cd78ab9ca9be65
SHA5129f05325c1a6266bab99f8d16ab6e6526d6cb4dbd317e61457513708250b582a13ef34bbf02f619a657473166d668209abcc4c17a86806a97d2fbc5abe2475938
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6c84fa393feb9c6639d06b1177be798
SHA16424a30502e3b25e4bb12334c30f2fd76569cdcb
SHA2563545dde0f9eac232fc10978871f427749c5940c2d2d744310f2ba739c3e2cf94
SHA5125fc0ac263dae9bd56994a7f5f7c60b1a2166df85ee5860011d9554005637889ece9f91a706ce7981c8f8568664f600137633311a4537ccbb2f4705fedac50c10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558227b3ee51cd1a9e8683519e8e0b267
SHA14c687943fc01dc96eb6b73004374838c5ee22264
SHA256d72003ebfd51d2d00cada7fdf8fa5e89428e0ff72b2971984f94c333bd0633e3
SHA5123c32e81244a43e32325d89218109e73f9e97ece9fa8b3fee92b35f779ec7132f165af04a4720b7e7b2afd3d95b428b0e45c4f1d90330d78e3b6619c7bd98d8d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5626cddc56a15306f46223fed2d96a3
SHA1656c7540a2cf59a42ea9583a579c554ab9a70df2
SHA256243d5f0f0e656b0c1fd85ceb02e6a42645e737285c1b957fe4c0bd16e4c8cccd
SHA5123f1923ef07b6f870b7fad10c55f092e6d5405d2f5efa87e5c367c3072c2fc48b2164ec7b16a287f20f40540154fa806b2758f28f229f19d20763416937b9caff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527220896ad13ed6f395a3a648528913a
SHA1237366fc81b54ddccae35514b5b59c34b1c52e16
SHA2563ae46bbb6e1ee5b7b611f28c4549f13624ebff5fa5a02dd574757a26663d22de
SHA5129c15a09832435094930da712cafe0b4189b67e9fd36f91eedd55389fe8953a5b196e72a0f097b1f00b8542dd968c86c3fc8386e7e96394437f4430f05afe36d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5653a54236a8a74731605e39cee59e1b2
SHA15e0c2cc0ca2e28a1b97a03b952632405e9ee85c9
SHA256ed34bee88f370983a7783e3f8ed917bfbf279a33cfb9caac96b605009ba74d51
SHA512747380dbcf210fc76e82483d9951082b67a8bc13ca0d1acfc2472bbc45524a86df3b4764582ad194adb75deb4ad4c3f29704eb5fdaa91c4a1481bd62d397b3eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56254cf8443c8d2ce5f0c9926a8ae0655
SHA154a67fcac0fa7ab83e91ba6817aaec38ebfbe258
SHA256e8c40b17714ffd1d1114859b8c8d3cdb2642daedc4d7eac6b8061dbde1264d04
SHA5124f66e80ac506aab1bbfd14d8318d56647ca6ed7d0bebd0da32f594a214a7b293764070d65a9bd6fde616e0fb64f058c0e5b287a9ba2d93b8e09291850c72ac03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5533be50c04ec4d840df26461f0146f77
SHA109abe5978f16afb6e760f1aede10dfb0ee48784e
SHA256f4e0db4550574b28d5c11b17808aa34cb27234ba131c12f5defc3dc379197b44
SHA51227909645461dd68e5a4fc230f5b17ba22534d4b7fe8cb900e10cc515ba7207072b562e6a2196e103a04aeeeeaed7d946ad0bca8630f1772da37e51c578c659a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511f469f7234c8c766a8fd58c07ba2ccd
SHA1f7d037a4feaffdf4c7bf7edfbff703500071b2f2
SHA2566cbbe464ca9b8a1a558c48774963bd4e1e621ac4303514df3c1731f04e6419fd
SHA512bcf79d3cc1613fbc7b12e91651af1ca725216035c35ac4cfc0c3c53fc651a6665eaca9623a869c01d80379a3b7bb421699054e5cc5315a59eb5096d0233f56f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589499214ee28bc04a3eb756f93a4ca02
SHA166314b7b9992107e96b6135c272cf49f3072fd7f
SHA2567f5b1cb3d744a7077333b39d387859e40bd5d7bc09a40623a49d93c27238e5e3
SHA5120abd72b0194a91c5b621f3a269a6e2ae8d82a8396734c6f06027ff39985863fd5d5c4bbfb8469cac7c2064756d3e5313feaf26dea49ce58c255ed55637c2d40a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5242f9f46c1c64d4569c5a9a11d8f1629
SHA11d7bf0e6fdaddcaeed9ee5a6b3dd9dbbf2e651be
SHA256b3f4680cb88c8da4ac7cea44d88c6fe71e3bbaf44029921fa68072c9355b2b3f
SHA512817f83999870ec72a8619bbf5874a2887dbaf115219bc6ed757086eb60da5f07b928a08b2ca9526449d74f7e7415b187e88ef86b3cea7c1c4d76670193d6aa43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c06e0d18df382c21fd1d0ec4c92b1bcb
SHA17eb64d708809fcd14df0dd035e74bfa811d90bcc
SHA25684473c7dbee0d9692c7dc257728b5dee9fdd8a78efaddba8fe936ea53df3dc9b
SHA512d1e3175c96b96ed4e066f4ecdcb7aa05f2b6f82d7b6ff740175ed26bfad769b7d5be7874b63ab500119341bfc654c21ce3166ff5a294831e1fe0c5c438ba2520
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f11585509d8cd1e6a1c025b3d6c2a1f
SHA1656562073d4e1a06da1dee12cf52737cfbb37742
SHA256b5b62baf83c14cbc59a1bbb541685c9fede477db71366fee752b6daeeacec5c2
SHA5126ed71983f5f7cb1aa516a01db26869d986ac6e160940d88f8a98e4ee8a69a905441ae03f6f1c20a7871a36d4450f499c54c617676e73548410ad11bf66df4d85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfaa8414e72e3e1bafa39f3a7ce6a055
SHA1049bcbe6fb7adc8fe1d72ed0879e953bcee883b8
SHA2560d04508aa78e274e75369b261cf3c850cc7e4a79dedca5a5d15fc902b46b02fa
SHA512efae740df2ad7a6782a13eb2573020ce19e6bed83bdadee65384a22adf8e72b242654704c68a9d24caa69bd8bbda82aa0ed6ac5976d94a7dfc8c894758ad6125
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e7759ce5f44b189a5d0073e0ca9bf41
SHA180cd4518889db8658eb311539d762c15308f7722
SHA256d939befba6cc929cb61760bc2242bf647d1ac39a7d8020966495855082730134
SHA512ca89039142b4b33dadfe65b906f83929adcd1d7af79c651574da819614cfa3fe020747f58bb724578a423baa53c0d452303fc9ad84e564308a3cb4b235e66077
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a