Analysis
-
max time kernel
134s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 16:36
Static task
static1
Behavioral task
behavioral1
Sample
63fcf8081218eb8723cb60cba98cdb96_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63fcf8081218eb8723cb60cba98cdb96_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63fcf8081218eb8723cb60cba98cdb96_JaffaCakes118.html
-
Size
94KB
-
MD5
63fcf8081218eb8723cb60cba98cdb96
-
SHA1
c3fe0a2133bdcc1950dc86916590b37795608377
-
SHA256
a5f35db213db93414364b0d1007e182b3eb289b8493f2313917f467c51c1d2ee
-
SHA512
1e1199733c0b161f1195978b394b165261cc3ef0ed6934c356eec82b0cfa151aef92aa7f188a4de68d9077141b71e65f59fe8f97e146fd4ff189d75e8a1b5bf9
-
SSDEEP
1536:WMLiNf/FL5yAk2jrcnCfn47LT2ErRTP3yEJZ2gPBdkrY8mgHC+qpEyW:WAiQTPBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422471272" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001102f1ade5d27a48a06155d97e05ce1d00000000020000000000106600000001000020000000bdbb8baf3578e45623533bc3dc656030fafbf167f3e2bc5462b459d462d37953000000000e8000000002000020000000e05a94af40701b0cac0dbc00fbba00112201a437c3930866d9d80e78d88bc9d620000000363debbb4890721e578edc804deffb8ec440de797f43c847df2b724b9aa5d06c400000003f41c25e6f733eedf2c78942287d6080ac50887ddf20d75793af804553218b9f333f380237aecffade4de22fdf8fd8f9e5ffbf78f4a21615efe19ee2e62326ab iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4E708871-1790-11EF-8698-5E73522EB9B5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0ccc7249dabda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2808 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2808 iexplore.exe 2808 iexplore.exe 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2808 wrote to memory of 2204 2808 iexplore.exe IEXPLORE.EXE PID 2808 wrote to memory of 2204 2808 iexplore.exe IEXPLORE.EXE PID 2808 wrote to memory of 2204 2808 iexplore.exe IEXPLORE.EXE PID 2808 wrote to memory of 2204 2808 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63fcf8081218eb8723cb60cba98cdb96_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2808 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a26e4dd91b8da6dad88c1cb24ed25af9
SHA1865c5518608fc7f8928612934c90c3e1104b9a3c
SHA256e5e477c904250b8fa9608f4338e39484d1343d57883cfb754fa0e32f9d25369b
SHA512781836ff66c98975bb419f86455c3b21956997f1c76a125cc0e0d331a5fb1fac85c9814237c20cefdf22ac9b590353888ab7e3dfe328ff07410f332c1422c0a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5555fe1d2b9512bce5aeb498573b1eb64
SHA1e7aa5a96c6df4901358c6b5754dcc7a7c3a1ef59
SHA25621b2a7bb6edeece5f7418822897bb73423e13033bdafb71a947cb3a90dd63ea8
SHA5120c78fde62bc11515f62583ec824928224c1cd05c915497ca704a5f751d3e7a877ec3a4baac868328eb9b51b913558c9598a8536247fd89f867069a6295e58428
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d67faee0076ae9a18d1d33736578b595
SHA1834a16195ac847d6430c4a320534e00d234b1a18
SHA256b181d72348696a96c1812f374ae695233d4e15f2082038877d09e50fa991170a
SHA512b3427a3c3bc5e6e23a67169dd9c871bca99e9acb95370a3cbec812577b617b3c19a9e9dec7cf8a31ccb4e2c4126bfb4b2433ca00988e7cac12a253f889fef1c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5571949739fa04e23c12424bc21cd0598
SHA1970665e53f46ab21fc9dab457d4ee3bffd996c31
SHA2567fa714bee7b0a6e4013bd5fdccd163abf1390fccf3e9560d67c3d7557dd28898
SHA51291c04c4d1e072f0be237d67b47e55ef44e4a738ffd06fd35869ee3e2dfdc826c0f26f002e207f25e3f320bb066639bc917f8ee256360f585e9f96de1e25b6e14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568dee880b0e22dd87de3de8f91d8a92c
SHA1524ec9aeee5e8b1480715d69232989680fc6ffa4
SHA2568b6fda421ca4d4dd3e6a99d888fefbc19a1b905a120bb704cf08132035ea6a73
SHA5129f207da3195aaa0732fc94d18a1e886744ed766e34dc4b9b47c90f9d14bdb0dabc48e4f95cecb125df2c4983c5cf962c905891a7280592a3429b34842e813f08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c5a95efe1b032ae46c59a002ae66f5d
SHA1a89cbad76fa4a198f016d409043f87723d77af1b
SHA256c6e47f31f4b107cf6cefbc8bdfd9c87409e120c80adc4b1d2fbed94a1ca3a4ab
SHA51294b923571043d3e1fb0b23bd06a1463986971a101594ce1fdbad6e2cbfb8e6973ec9dac44b34bae71084ca356572b5d53254df71590a3fe60d0b49d27113afef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3e62df55d67ed1cd6edd95b43a1d89f
SHA1caeaabf8a91bbe80bfbf422c5ceac51b12808bc1
SHA256b77623c844ab987c51011f1b5f839252ad35c92da3dd4b7b8ab85436c36c274d
SHA512084b83c27ba0b2885fb1a52e3526a44d4cd380d19f1e4f65b8dedf159a230920c352108ecee0479878f66abfd66a36a00b7ab1d24217cea355141bd28de5e0f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a011b47f78678ac11bbf3f6865ce99e
SHA13bf45bff8dd98243615a4e6da25af712445d9d51
SHA2561f7e6989c3a8b37ad86752a2e1ef74634bf57e239776b92867e0d5abe1088ccc
SHA5124f0bcd02cdd4f88babd7084a0e6af1eae329e5843b1acf2b15e5357bfc4052d5c1e20eb8e3ff4750b2ed56cb6d69fb5b42ef5a21968b75a73f6e91ea2070a3c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5674eab05702b44a003fd041320a8e0d8
SHA1e73af01abf0288b86fcd4706de3be6b24c2b5d4e
SHA25661d9d35c5b0d5235ad5baa84f4620e3c3b74f739d852e0a9648807a22780431d
SHA51274e63531283bc8201c25fed688b2e16674f78f01fae9fb3a9ea83875d59fc506bf69f36b45c5b395a7ee81f40724626e82271e67f452907a44ed0d60939ba4aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505a238bcfeb5f6a706f24a0e5ad30777
SHA1a529371a2c49d78a42104ded1f4719c936f1809d
SHA2560768868c9489c13d24bb387d7c5d07b31d0562e2244959d42eca163515fc8e29
SHA512a744d94e95ea692ebf9f955f1819f758ba7c000239c1819c0a974e134ea8d25da90df2e4ebc07a29f4470240d95a35998977e2547bea6e6da316d1ced824be95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6380cd2a4aeebf75c94cccd0cb45061
SHA1774c5537dcf56d7c846f15f7d4e6c4d1728fc5ad
SHA2561e4e6a0b1a3c61656279508870226af2910bc322667fd2a33993d3767cb60222
SHA512f0e80286af441b443a23b490c2e0a9c9dbba422dfd2013fc0c243e7604b2861377697fd9eabdeabeb7e5f904b6f96109a3bbd662f2d972f2ed96c1d198d63140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e80d9479c9e40c770015b9841f5c837
SHA10e05458b73b40f0db11210062ae6ffb850e6c2f5
SHA256e5920ac29ea556f4ac38914c36f5740e418314a8434cb40597d271ea135ef129
SHA512630231c4d4e3fee4449b161c40fe5f52459129cb5799338f73d5d925c74e638164cb8376ab4611d020cc247fcac91bbe6d48bbeafec6bed46cd7d0b80947ace9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4a8b0e9534d4186e9b0cc9db01b56a1
SHA15636a4004849df84bc80bb108798a951acc98203
SHA256088d058fc0538ff11db60e089c3bf4389a533222392731d020038a98a7b67855
SHA51254faf13443e33dc4faf703f99ee52142dfdfcc9ba9cd3c0497d592985e72fd87f0b1b52c9cd6a89b8d9c74475ac261e79af68b92996e1d16c9cfabba64482a24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512f2221e96b7e818af25bd2aa1e04318
SHA1a3f04243a3cc3888641534bbbadf896f506879b6
SHA2561083f0f9d5642efdf4eefb77ed215b1ce256bc7c446db454dfa01cbe4dcfd3d4
SHA512ee1bb7a2c087b2a72c514a9e20dcacfeca95cce301db303202cf509c2c4e64e7afc921e9095bcbc6eb57daeef30f77382ef6968c1f1433bdd7ad2365dd410f05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d647ff7433fa8a1ae4a14aa4cf9c872
SHA1c75b2e3911063829b790aeee4ded48a988746edc
SHA256524d2c5d5ae481ab90188921f03d85dc1d1c756bc7c2b7b9c54532fdb8020737
SHA512de9961947abb1c79f6b111d8f1dd1dbde438e840c25197d4f060101d0e7bbfcfd562d6c161d0987a0f47fdc3025f0983cf2145a541a52798ea0f28fcbbaef133
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58430590989b89e4b97011fc88cf6f676
SHA1c3fe043e8ffaff9dfd5d991c2ef99cf511356c78
SHA256900bf5a9544e970bde732a16a41c38f2eaec5922378d9952484785f42670b667
SHA512924e462468144fa2be391239e9d229d33f5dafd0291a7e6bc7cc01f61b53fb01125744e11e9d660506ac697ae3cf02f580c3dc65f2812561e3383c28eff318b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5787eb5791513dfc109e85e9c329e2a20
SHA1b589a61f4ac821aaf07f8488b7ffd4531f98f41e
SHA256bad334bf0ecf50620aa8ad057db6f8d52d8955984887aee109e15eca5898b89e
SHA512e256598e2c76693a2f762526d660c6bb732f5a815a8261e916716b07f4933601ee0fe148b2b1a2b156213de99802efb9f97b981a1d212e5150e00c5695266099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57fd52cc56d631fd6f0a799603f687e11
SHA128bdf91f1b8502d1debd2bcca859b646c0f6fdad
SHA2569428a05d6bc06bd9a930512f455999416a8ce6c57f9840b102b4e10bd450492f
SHA51293916e5ca0c098793e9ce8c06969b6e897167568fee748d73f3b5106a05febd1902d61218b0b8d49d2bf732ca54789e8f3b9cbcd66402b5b44d21061c31d0ec4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L9PN2QMY\jquery[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a