Analysis
-
max time kernel
134s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 16:38
Static task
static1
Behavioral task
behavioral1
Sample
63fda0f2a10db2cb3aa37934832a78e2_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
63fda0f2a10db2cb3aa37934832a78e2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63fda0f2a10db2cb3aa37934832a78e2_JaffaCakes118.html
-
Size
68KB
-
MD5
63fda0f2a10db2cb3aa37934832a78e2
-
SHA1
4899c1644559577b87a76f48ffe69c87afa52106
-
SHA256
6a3247b4b399fe0b29359962c709d63931624174f48f4b520d539b2b476ef03e
-
SHA512
6b5ba86d014b3794014a9bbaf2465f6c6e9109e162f7c6b58ed350124ae9e52613ffc6070a3f2b53c8646512b057b1bcdf14dfe45bc8fabd8ac29ed1e229cd70
-
SSDEEP
768:JiXgcMsSZ8tN99OIsoNNoT2aQCZkoTnMdtbBnfBgN8/oygcRWQFVGys//IjkK5nK:J1WOT5Pec0tbrga6crNnz8PJ
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000cf62e9dbee9ce064020ac77e7469cdff48db8227ead3716cae5972ef47a71ca7000000000e80000000020000200000002cc370cc9426d9e4ccbe530cd7aa4daba886d2cdfff4f33518757ab9cd34b5be20000000ecf3badc711ce608c58ccf17c7b34bff03b63e1b025c7570437203647db12cd940000000b9a272cfabe2b5d48b6511da8f523e6336554090743631371caf10f968113646d840a82c799a2e36773658b5cb9e0af3e29d46823366d3330e0711fe3f1c0ffb iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0ae68559dabda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422471355" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{80B2DDB1-1790-11EF-AD38-76E827BE66E5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2236 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2236 iexplore.exe 2236 iexplore.exe 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2236 wrote to memory of 2264 2236 iexplore.exe IEXPLORE.EXE PID 2236 wrote to memory of 2264 2236 iexplore.exe IEXPLORE.EXE PID 2236 wrote to memory of 2264 2236 iexplore.exe IEXPLORE.EXE PID 2236 wrote to memory of 2264 2236 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63fda0f2a10db2cb3aa37934832a78e2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f5f6b114fd157dbc29c785a095514289
SHA1c7512d12604558ea7b098c2961a62ce3aeae1065
SHA25616af643ba4650f6735ebc699e33179b5fecfbc35066ba289e707878b6031345a
SHA512a62599b312d22a84f1538fad7e2151720dbcfb95e413c3aa2ec7856e3eb6f7a70f8dd9c5f4debc7c6527a786e424c17b003b44d2a6bf0674735ceccd1002ddfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD588198ba29b65c8190910efd7e7b8c968
SHA19ac328b6447a440d56baac08ee589318d393ab95
SHA2565221dea71446745183b5045f1c501926d03f27121578c344cfc7feeafd6251ba
SHA5122da878ebb42d22beeaca3881f8f49f054ae0dc82a9a277319165e7b2c515ced7984898eddb697f72740c9a2684156e9ca92352daae756b21941df77ac042b066
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD567db0e0ce05ed97a5a7783711bb0ca0e
SHA1a43d460ea56a7fa6620865ff9aa68d4076231f60
SHA256f0f56d76f42da5d7fa38aee0827493d934c03281af567e41663f6d6f303943b6
SHA51294e80c1c14c70265a6a1747c0a0adb32de30132b2e642067e071683c33a00ed08c925482b98673ce04ef1633d1748abdaf05a5f4048247b23d43617cedc05b07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53ba1ba930b38258e56a2b80f67213ec2
SHA1c4d73fe977df00d96bbd717f4a2a3bb581aaed86
SHA256266dac984b1a2fe94955d2eb9f16da67acf201385482c4124d1e2ea48e918065
SHA512202626da51695a0cc05e4840a8b2b921ec1681b92f1a4cb4205388127e3679cdba98428f777687cf70c021698e785bbbf4bb6cfc0d3a44a09b9ba153f49f4330
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD50c331ce9ef9c19935d9c16d1a5783220
SHA17ea5fd5578dfba26b09e534148aae630943e7318
SHA25630839139cfb1416970ef9c53eb8d9452a4a5297aaeb2d39f8037fe67aa8632d4
SHA512cadbff1619a17c04c5d8a7045b13b3e6928a1c3788c7a521cba16997df8c7590625c5dea37f7765ba5c46dcc4793ce90fc5d81f0c585d54c172f220f170809c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c6f0819f195db97526ae6f3b7f2eb493
SHA1187ee9681d1e08c1ec085bdf729ded06aa3e36d3
SHA256d989d9eae1d326c20b48b983a3ad4df60bbfdcb07eac8562302a83e897579091
SHA51260f0b7d1ae41443ce0cb98866fabf90cfa3b4a1793a2393c6cbb1800f9a108d200f885ea1e668be98b32ae800c76e566928905dd8af5f1dfb9636c8efed6e6db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD57c5c0f022cfc20c4d8aceee1e23dfe7f
SHA19f3ebb2b538f0114c9ddcdd8568216955b7fcd67
SHA256ac8033d694ab15ff394ceb89054a2cfe7c91d602444aedc2e1ffea567af9990c
SHA51285d1c45b33d2d38b40763414284f02a2f78077dc28b6b2e638156e5e7039dfb9519b7d60b9a5ad8529f9ec0405161c5773c62899ee3d15a1bd5c817d9148c23b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f32a1dd41b6c88be83023a248749b337
SHA178d9576b5e32d747c97bc68b5d5a79147dbded75
SHA25659cdf0c581517a19b4d20b95c4e01e042facf9b2b9b8a38b02c887f40b8bf279
SHA512015c4ab8154aad363b217a6fc207022f24357e599dea2e84866c699ab0a243c7ba03dcbae0db86cb57090a94cdb561d72169e829155b6aabebe33b2c518fd36c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD575bf9301d2ecbacee3764fb22725183b
SHA143b35c8cca43d39f12e42bf457a8b91fb4838253
SHA25655928cdcfbd391e8646993c79cd8d28ba78740003016084309cb5ab139070380
SHA512323ba3956387e90f600c15eab98c805d5f258fb9c12275fe68b9436353e55ab1f3f9ca68101fe5f0f58cb05cd09da4c1924ecee4fc480dfded2eaa912912eabf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD572b0b278ac4c54e560ec029cb9b977d9
SHA1de2a08d16faf5dbe5e882f137f1707ab7af34498
SHA2567e3dd217c9ed7c8c87d8747be774f0b250b7181d58f46cccbe0c139444d4ef68
SHA512dc8f78190a9e5d3a571f21a1a29686594b68319057d80b861ba753ba9e19c0fb4ed15f6c66d0206cd8b50b208d3bb1eddc35eb693bc8ebbea949eb9a5bc85e29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5037327a1316f71854236ce63a5866688
SHA1aef97c0e9632211e857084d36babb73926e906bd
SHA2569a5a8ebed5be326230b52dc8a50cd6494b948e82495e2dca7ea09772a55c9faa
SHA5129b8ea55d9963506b9c06d5929b1b9ec53505ffbd41cd78be373b62e63cd2ade75ab262ae11a7da0e0f223eed9e22b559b206a305cbd9a9e52f60279635677c77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD52d1b52f29ff1348ad228a72bcdc211f3
SHA10dc7cc22352415276a1c77290511e0d83de6e9dd
SHA256be7758f7f92b03c62a15c54ddfc6dd416bcc51636993defa743d7a419a15ca82
SHA51211b28cfe2a7d5a81bfb2e53390324110d0eab403f210aced67b2f0259ab0d59874aa233eff3230335e5a4664947a4225f56d2507b95a022461e3750d08c50dc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ff0a5f39aebb471904fc419f5a0f32b4
SHA167c2b853820dfd067dcdd5dc75897f94f1746dc9
SHA2564bb5bc4a09a21be8d5c4784b63fa097d72584beb40df058553cccf569e3914ef
SHA51252d10dcddfb399cbf9226419b05362e609d0cc1c72c83ea8b157419cd29f3ffe26c255d33afbfc203a5a82e61f49eefb11d015dc96403b6880dbed3f98d51506
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b85978b379cda20b3fb7e9a925f6fc2c
SHA132e74171c5644beeae6c73bf590c999b942783a2
SHA2560520eaf783fb7312241e83f923624e8088e19448a0ba0c90e8ba3de852e321c7
SHA5120482884b1c0470d4b0414324d7f9734ad77e6550948e33399b1c6acdbde6e6706cf654ea9000111b18302e769b49dd26a9063d864361c9c81fb52fb810129949
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD515612661819c1224246bd1e97770608e
SHA19855d13b7e8a299456ee3f3280a52ae827e8afca
SHA25607fc792fd9f6a8d92aabce56e7e1fcbe376e7fd4346f6edcd437ad22afb8b58d
SHA5126624fcd8cf981656b50f1f865c226ae6ba7b8c782691a66fa08f77a71815b08de7801668f19a64d466a57c78a45301b34dab945e6ab4c5db265004fed702eeeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e5003971773a44cef23cd396487ea87f
SHA156f60923bddb3a20eff2c6138dcf3e096fa04a67
SHA25601162bc79ee9b8cab30bc116029ba84ca6cdd2156a4dcb27a37f99d1d9a512a8
SHA512b9d451b04bf6640f8d6c25344ca4d04273e8d6267296df989d47867d7584ad1c19c826f8afdece892596af38d7c2a0b3935b4d31dd292b60d612226eb193eb77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5042145b60c3080efc46b149ba0990136
SHA1f3709ed2a98b3618c71c2bd59aa3659eca4896af
SHA256080d3909c3bea6f730bb00c091b3b3992b081c8ee79a993e2161552d7912b852
SHA51293cfbe862ae981bd38b684732ffd432b0cd7b23ecb1f6e628e2374aa141b2f70a2e1cf042147642c976fdebe26bed3597fd16161f7f5d72dbf9dbd2f533434f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5bff88a4fe8e4e5e4315795e655334018
SHA1cfbc8f7b8e964d14991b59f7af2b624573c7e946
SHA256ddc622df405c98cba11533b7d109c860f6b4ee68fac15ca2b37f748e1e6d9b5a
SHA5122c5921fe7e52ab38fea03eeb09c894f5e8a690aafb7617d2797b038e6a7eaa69c73e937e46d6e7d7f601b197b8a86984d659f0052b3ff157c7414e32337fd728
-
C:\Users\Admin\AppData\Local\Temp\Cab1E8B.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\Tar1EFC.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a