Analysis
-
max time kernel
136s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 16:36
Static task
static1
Behavioral task
behavioral1
Sample
63fc287d1a848084a3ed900943bbf773_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
63fc287d1a848084a3ed900943bbf773_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63fc287d1a848084a3ed900943bbf773_JaffaCakes118.html
-
Size
351KB
-
MD5
63fc287d1a848084a3ed900943bbf773
-
SHA1
594d2369574a18c93ecbbb8030aed34a5b10ef76
-
SHA256
1b0f6a00ef8f1fefba5b54aabad849e390481c0a778103338e9c5d5a9044565f
-
SHA512
f8f8ef6643d441081f9e0e5b08ee401782d7835c861c3bc9e2aba46e515dcce48d2e22af77e93a8920b2213d58ce64712d42b61d9521f8517e1677b9b9a03eae
-
SSDEEP
6144:SdsMYod+X3oI+YjrJK2sMYod+X3oI+YAsMYod+X3oI+YQ:05d+X3F5d+X3Y5d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000003c92ef273b000e1dbea06944b4cbef3722a3e4fcb2bb6eb216ff766038835335000000000e8000000002000020000000d8de6cd05e6c9008fd905251edd614335f007c16f029807d3a2c0c3cfad37fc72000000034606658a33451d24cf73b73afd88fa7f1731fa74aaae197c48b596a0ec9372340000000b04bae8d1186853619a96e5739ea38bf1e19ff32a46ef20b58411fad4fcb337b34cb5f17aef14170d0b74c3adf3f38e5b7fc2765fac4d73cba3d8afd12b2842c iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80e1744a9dabda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{36C39EB1-1790-11EF-AB95-422D877631E1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422471230" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2188 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2188 iexplore.exe 2188 iexplore.exe 1836 IEXPLORE.EXE 1836 IEXPLORE.EXE 1836 IEXPLORE.EXE 1836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2188 wrote to memory of 1836 2188 iexplore.exe IEXPLORE.EXE PID 2188 wrote to memory of 1836 2188 iexplore.exe IEXPLORE.EXE PID 2188 wrote to memory of 1836 2188 iexplore.exe IEXPLORE.EXE PID 2188 wrote to memory of 1836 2188 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63fc287d1a848084a3ed900943bbf773_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b28597b36b3930fd3765fc360b80b9a4
SHA19f82a02492e94402c4c8aee95ea43246e67847c1
SHA256ee8148127b337466751a4b1ac1fa977a171c5a0fd1999b3f890230710c5d1077
SHA51246a8a4688fb349f73df44ddc856eb3faac3e0bd4e313bd6c55dce732b23197f4378070071fb4cf7ba70a84290bc8d1a2abdc4f8c63747ecc9ddd254af429f16f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a2a35f61dd9239c6b998b55d8e36a80
SHA1d4b63b67ce7ae81f49316efec65b585b8e1fb5ef
SHA25690b7219accb2c6857034af8d8b5edd25cac793adde78be58af97fa7f452a43e1
SHA5128c2bcd809f8fae488890d5b1bdcda00881faadc2bb5d9e2c445899f57e8185b57b374690d8721872bb2705a49ea9f0e1266faf6a159d9e58baa67cea65a90c70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a45a19d59b2f7aaf0b5575838a484779
SHA1923cb14491da2a13153e6d2b4e824c1513779c04
SHA2564f31586b121ab4638b2e55d1f0600af37d1a74500a2b89325631ed8263b039ea
SHA51281abddfe2b41c277a23d3645c6bf5a683fd13e2c00c290da1104ba73797f3dc7a69e7567594976264947ab371ab7f0c2890cb8a19a5a5373093024aec3605ad1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f36f6455f5ef9ea3751f7979f8bf9c28
SHA1f88874bd4c92e1393d4d4cfd72c8a4aeea9afde3
SHA256c27b4d1e7b0abf388dc4625bac879d0d9bda2983dcab09c2c5aa46263b8b5f25
SHA5123d4e12ab64e69eb984123d647a8865f261f229500c3b911c591a18c5fec8de6864c60100e7afb380f6f77cb99c5cf1aed8aee7b8b045823962c038521c5c4bbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524341ec5a62c13eccf584242938e5c8a
SHA119acabb4b0afeeff1ee55d8c7515376328630889
SHA25609e2840153104ebef9ba08004813f3f3337fa5c0b412639afa320041dbc7c20e
SHA512700ef2f92acf16fc5423c758fc82e8783b11c80a7c7f01b3ceb651ee029eb85f6fc7dadfb4e6d335b9a8f1b4e9d731aa684349b0a312f2f019abe66e23e903a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d0356aeacc36da20c42242e52b728af
SHA1d716f8d149051c2490106277b75815ab5e91ae0b
SHA256a9e3bc04267b2e55a4eb0b5f97dd29daffd01dc6dd5611b0889b86e4bfb86fb5
SHA512d09150589600829c8df5ff9ec02f401c5ceed2b446892990ac27af8b7468fa2cda50e86a5f76dfabb3ef64265c898fee0c0f4b496a3455d258cfdb4fa828d2d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539370acc683dea233b244fa3da16b61b
SHA1728f35d659456dc3058599c7429b74534d5339f3
SHA256c0db9f21c9334fa47173e3c11e9f79adf7181f8c48bfe8d24568b5ca721c4baa
SHA512baa487bca57d3e1d8a119d138e765900b4d576493200e8cd15b407586edf2190fb9dadaa9f98c21cfb696e94d4564004284497a85633097ccd6a990c358498cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f24ef52268660a1a46f728bee6b841cd
SHA16d12264115def96f44773d656f7945913e510a7a
SHA256e3ea911f1eb38846527e6b4d37a9718b68a4d647af60e27871d163886bc58125
SHA512db7443b2eabe44dd58057c12d17f9ca523e56a2ba90fe40ef40d7db798b03ab67b0e432e1953dfb5fee6bd8d64d1225c60a05a803848b8ea9b4e95f9ab02c7fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bb97af611a98ccb17a091b149d871e4
SHA1054587ff8dcbcd95c7e83b1451ee2bebbb77a61c
SHA2566a003e6a2ffdf9a766d3ba245968e2bde217903a35e56021dd12ee9c23d54c20
SHA5121c317c8fed7da28c9da3d54d9f7c04068b5976a3f5c5d6a006f9bf75a184a7c5e4b7a1fd26cc8ed33deef03c62d8eb415848dd136f2e6979b72d77b0d09f7b44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b5f8e89b3f26da5457e663e831f2d88
SHA12fb3ab5d2fae239da60f1551048767da83aa781f
SHA256c135279ee22bce5f86305b73e903530880686807adb93b3f39e6f8f0ae3aceb7
SHA512471816567d96e5d025ce813b53df92c0a11903451ed0b6564c20b893b4a3f8a4755af5fd8e3a032d8e71e7eb5154b4d55a7f8bb489bf13e12c2ba61811f2192b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8b73002cc577e7e86b0ada56de7258a
SHA18857925d4120bea58efe20a13ce02271f9a522a6
SHA25699334ce9917621d991f5cd083ca2a44fdc3bb45b94e43a2f301f361f41fee544
SHA512dcfab30800522497cd69ac7dad457803e9a369d0408763b1c19d7b3d53161ee59456b73056b6d0661f072ba922539fdee413ad047afb64baee4739e03e46cf6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519cae26043019ff8cd8a88324486176a
SHA1bdf564aff6e763af095f8806f9856cf3118ab83f
SHA256e5a8ef36bf0dc669f356be63ed96f097d5971ba1f13a82fcf60792bc49d50ac0
SHA512298f52cdd29b4706ef84e9390c0c893c584b8e93a114ab80dab7e6763201f851da9921691b54fefe8b391ed802365647181db759a9a793f0759c59f82aada70c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fbb112674534b9e519581e2a5ad1078
SHA1cbe46c799719bdc4e306209dc009a7f854b10753
SHA2568de36004ae5ad81a50c3338526aee7556748322843047c7d6e7ab8de62d03091
SHA512e272c91b366aabb6e546ced44ae2a5bfd193ead83abfaf8e0e2e5116f02f2a11a1ad28363a180202688395fe2564d1ac6193e125a6d967aa0551e70437f0ac4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d74c16c9749c085f519e36dfaf74f3b5
SHA187fdc1a724bc3c30b1defc89c1fcd71169d03f67
SHA256f6b6668701cb2128afc8d975cafa51d0fb4a7f25df8bf98769e21bafc6a0b118
SHA5126546925043c9268a183f209b5b25377eea92f6a2ad0df30c4c94e580c713c2dad1d44125eaabe9026c8850399e7f597663f7c316c7a64a0dacd4345a78c8e8d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3db944130eacbaa39173097cc9bf6a5
SHA13c4288d4803552e9353fba9025e8468438ff9f1b
SHA256813a8291463a36bdc1850c662ab20549646bed5cf2fe60ff100507b79bd5676c
SHA512da95d86fdab5acd65d5e54af1969cf5448a84524ad2c51f67879a9a7ec7195271e8eb7d9421d8999554bd0a712679e235a97015701114f37c7f590c8854daf74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538a89d103a53e2a7cd3b5ac002d57fe5
SHA1727ef8c1ff118d970d34e2981e67bf8e21ba2b81
SHA2560727212c137228ec3c1ca50477be99d699beeb4c375c4200a7f5a9b64482effe
SHA5122a4c718aee1ac781a6c3df7c01d0a66d08b5a70d1672d25a72bd845090843ad98852c717b3ec830082849d975a65db954d05d125d51ccba66ffcecf2e43bcd9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c996db8d39deaab7b25cbbec4082940
SHA15a958fd7118e3092ea629042e54d8c9247341c32
SHA2561b1161f0c5395c0edb6b188919e4e535fb1e483bb6e33293f888526ec4b2d9d8
SHA512fc0a1995d38b858fd9d3a4adb0b2ad83366e703f5cb3d5f86ef44c1197ff7e132842368f9348b7841d389fd52ff57384dac557cef43ab00f34efd1960eaf3f9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9463d30347a76bde8d477e181e41dc9
SHA17fec2432b57d0d40d9578cef151b31136c5485dd
SHA2565273ff99d60e03ad0ea607ce96428d3b1b71642cd7a89df872bc892396b87b9c
SHA512c89d93085735bfba6f2b29c1d0f7aac054687db8a60686c7431159243e21c7a622a38bbb5e68c01b01b7a6803ffeda2195089cc8cc44b0b47a78abefeedfc710
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5892c9d7ad80bceed12410f0f87d50742
SHA1bb04ed087b58bfd4db0d4922ae52fe3820da6d6d
SHA256f63f2cc8e2374bf1676fb1ab0450217a7d45a95f7e30f3eec75a5db0f7ad0286
SHA5120e04a7f3ef4b61545157a1d977f643de9b093b27ec488e8b8f0a55c90a8ecdec2b9e08047f906bef2af3bb1d28e80e0bc29390361a2b6649c5c22371344d34d9
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a