Analysis
-
max time kernel
141s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 16:40
Static task
static1
Behavioral task
behavioral1
Sample
63ffe2e0c08d53ede949a02bdcd89721_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63ffe2e0c08d53ede949a02bdcd89721_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
63ffe2e0c08d53ede949a02bdcd89721_JaffaCakes118.html
-
Size
36KB
-
MD5
63ffe2e0c08d53ede949a02bdcd89721
-
SHA1
5cfb4c19abf91365f8e863b9d59c49b579d0ffd7
-
SHA256
55ccedde7748dcf5c3a5bf0c68f1411e6373315a43e0a522440aa651842f1197
-
SHA512
bd8d935025c669be2b2e153d6fd75f7b8afa529cb95edaf097e374858190298e37005ed408bca43c5e913a91249b7514c62a2f5e6298828a3b82efc44414802e
-
SSDEEP
768:SNEjXvEzMNHqIMcQ+gUqIMcQ+gW/2lgb8GF/by:S2jXvEzMNHqIMcQ+gUqIMcQ+gYYM80/O
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D5C85461-1790-11EF-9FA2-EA483E0BCDAF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422471500" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9097b9d09dabda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b27d87d44dc2314aac5ead3f49d67c080000000002000000000010660000000100002000000096f1d6b777a1897e94bd413a86e01a6fe69c9149b3cc888061f1f9a5e7e31498000000000e800000000200002000000078fc1775a31646a61d25b02cc8ddec18ba0c68710921f15437f1428961a7538e200000005248fde144e6ac98762860bbb5a26dc331c06ad19faadcadfb7af74f7d7fb1fb400000008ca64e4809ce667743385eb8241db5e1fbd260b3225bf41ce5cddcd74f9d598e161d810fdeac86b2068a3745d5aa4e316193138b8a5aee9a4608399d7a65d314 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1440 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1440 iexplore.exe 1440 iexplore.exe 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1440 wrote to memory of 2696 1440 iexplore.exe IEXPLORE.EXE PID 1440 wrote to memory of 2696 1440 iexplore.exe IEXPLORE.EXE PID 1440 wrote to memory of 2696 1440 iexplore.exe IEXPLORE.EXE PID 1440 wrote to memory of 2696 1440 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63ffe2e0c08d53ede949a02bdcd89721_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1440 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5827993fe62f1f303aa0ae3817ac9f6f7
SHA15c1f4f8da0a03cf79b9af4a64ffff161fd27d31b
SHA256607e48bb91975fbafd8271939084c2f36318667777125d0e3338ce64c1798735
SHA512e98d602ae6a9ee33e2b3f6bcebf324bc38ae00144e2493a07dc2b1ae6651429fecca950eb1c6dbb765bcc1afcc9254f67e05d59d7e040842d02447b39d5abcf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51389517181f6aed7b3a4a6f959e4e23a
SHA1863194925689983d7b963816c9151bb60e39012c
SHA256b70c77849af13245595da5e086a168d597cafc5825ac173fdb672f7ec864fc10
SHA5122068ed3030d3b0b0cf342779c1f13742ac07d2c04a9047255eed1c93270eddb3c163a565e5a0b097ebfea24da4bf90264ad1e9378333160cb158673287851bbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e800b8af6638dca8fa98ece33a2fadb6
SHA125b5a20816ec1b935de44ffa2f8cf6bad52ae858
SHA2567869ee4661769f85f81b0d0a4e3fb62f0363c63d1df1d00bd5c70aa7795dacd1
SHA51237a23cece85fdade3bfe8f90e3a25d82ab6945b2be020ea7662ed7a40fd660d4c3699a6156c16d38a02cd90f4a588f252f568ea92dec5b157f5a4d7d0ddf696b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af9bf66d870dc193b5d512a522afaa71
SHA16b7e68b46220c08a0d09aad3659a7db8edb5fa92
SHA2565d26ad3247e23544de60a0f4d538b4d5e50ccedd1ef1f387c8a4d900b2cf9222
SHA5123eef1f5aa5888917a3124549f06dfadb2d0184750c2acc09a05f640a662ec6db0ce082483d53731f562e4b787ebb9ab3c0da84659e23f4b1c749b1e1d0aa9cd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0a91970a6c88a7bb0f8323dfadc6bb3
SHA163b7ea2c7e9df446f44f25089a7c6afbfb9ed76d
SHA2568fb4f078084c0372f9e401ccdc7ddd75eb46bed49d1c5bb2e2c661d0780bfd9c
SHA512dc3002371af3b205b7f8b2bcfe22f1bfc3a3748e6e1c873757a7356982c53e073e76a40d3b5a5dd4ccf84d2ea18f401c6f4a626f081b346b1ba6cc315688e4f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9fec5b43768e1b817f081f6830236d0
SHA19ad34519d25821181d0e01c223f80a432fd4f020
SHA256dcaf146cda8457cd0cc86327034e3d4cbe508aae6664a95d85221c13df55bf2f
SHA512e85e8a1cb5769a7a3cac072b6774037d605db8fb68c4410573adf2abba1ef91d2f02fd4550e0829ccb71ed730f576e99e991906b92e9fbc5ed070a3b98814654
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac0e91c8f00d801574bf99153e24694e
SHA11fc2ce00accb129b9caa947be2d67fdd6717991d
SHA256b641ea213eb3c5c09d58faa9821fbbb0e58b035473cf906a9dba1dd90a83bf61
SHA512493082cc174142c16cab92ce50cda4bd8fb7b6d7c7893ab818e5cb16af553105a625d444b3d901e4cb09aeff056e08f25f2fc30b3ee65f6b888a505ab6d47a13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5294fc4a16d6bf3f12aeed067fb5866ab
SHA1b88753249fa23387f43edbe8fad7e1105e2c0000
SHA256ceb58c151844a637e4dd7e3d8f008f0e87c9fae5c6c993922a3aad66bf185f63
SHA5129ce726d4a27b81ce263690239f798accc74445430ae6af8518dca192bcb77118f21913a596ac4044b426b6e5b1784b85124c7f070461947681920399b1bcacbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9fece832cbf0b4a8ba2f426fd69c80b
SHA1533aa29bbfbd510671ed474e75425abe4bea1264
SHA256cff4d5cde221cd183e3159a62ad22ebee899afae67fe0e2096429b0a748e0dda
SHA5121929376d0eca06a3a5b7687447602c8b0902cf9a7531918e126eefde15474c04ed8f1694005ae141ea0be6bdec69fb57c39f5296041547e9e645f0ae4ef3f460
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553c1799dae7b3423543fdc020802af4d
SHA1c11c1611276cec8ba712642ec0d827509abb2167
SHA256e7abec3f72471f421f25558f9194a83b69f959313273fa5fec631f8984983c80
SHA512212f9952624fbe20df1fbdfdd6a0112746c5cdae7062166aa7aa28b42520012cd3e2a08ae364d85547bad1b538eed5a7bb2d5ac2a80a58260bdb1183e1f736ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfd0f7a5326c8070ba58c38999350b83
SHA1fcea96cf4a113d6a51ce088e5180c756941f117c
SHA256ec5fc75c4ae2681303c71cbcd1b5eac2054c2248fe8d08259f31d36e4b454cae
SHA512acf666afa1406f87785f8606ce186d955f9c4fb0fbc474c00a6870c8f9c2c372ad4938ab9317cafe1a52e7a7e99c57709d26c166a486f33eceae356001ab18a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598acea87ba19b60022b3eeae8c0fd443
SHA1d8509a800794da931a49c6ea0bfff1b6f81c5e47
SHA256437ec1a1732aaf09524840d7c0675e96a39c0f9c27c9a21bcdbd74b80a656e65
SHA51246551007b218148fa31a44b61243e82d8bf6a8a9934f81bd181631f11266236c7e73cbea504a2689079f63260e51e6a31075950cba7c88771331e7fa31b4cfe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5afb5ac161067a017412f51e3c54a7dc0
SHA1bf7f1fb773a6e4476200ca2a546e87de975b4bae
SHA256418f5604d262f775d36574390719d3da72a180ab1b66a39780524a57fa1a0522
SHA512cbaf15317e05ec2fedf6e2978b93ec47096d09aedca47a702ac15fc1bbaf8fffb65aac527df8b654c6b3364ee01e3d5593ca45e3c9bb75010e291ed708054648
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56df3def7aa3a3f4b68ce30e2d4d3ac17
SHA177655101c8af3efce0c3fb878134a068d8654a81
SHA256efdcdcb288ac49e06ddd8bfe88324230f3938619487799b729b6178f000b8cd2
SHA51272e398e7c8163fa005cfbd7e8053eef4fe3a133a7fe4f068dd10d345c9c4098d9cfe0f8a4f3687e2149be4b10a84645f83a8a528185cb000646001448cc8e64c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f53c9b94a3da462e3e77bba73747d664
SHA196504484ed89f7a07a5faa18d8c4bed2003a5d8c
SHA256aa4af35feae330da210804735cab754c431f00a86d124d506bf75f29d2480d0d
SHA512ee78662b5226adb7ba6b1081388bf6c45348ed40b2f61043bc2f6118fb4556e3c0b7431af1ebda64c9ae3af9115164831baa9170bc46633a793b3fce74e52b37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d76b0ecdc282ba9404af5df335d7f3f1
SHA1d1394d56bc0a8a409da7a2fe71781d30f7827d34
SHA25691faf436c9cf3f8def36a436ce558730fa918a6ee08b70c472175257a2efd992
SHA512284b82d8b6d56545892bd2880f17211e8e47ab5ccf240e6907b71f4322b7dffb73f0f160c589da8d62a031b2425ef76613ef451a9b398875f9855125d32a792f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df37e04b0d7a34781c2df1a129c0487f
SHA1a2731c22e8f8d76776f0bdf41eb6e626d581e4ec
SHA25658b4900c1f6a612c740eed654aa3fed42cd084749c75a1f2e539580a3194daba
SHA512592920c9084d84340c62f9acaa6804c2ce17f59d9e49bec5f495f5720593e63b715bdf11dc15d9f5efcbe6603cbebe12398841c4ff0acaddf11cdeff220a9fcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5496304e65b0147d2093fcd43ea14f9fa
SHA17febc24fed3cf344ff11667409d27040bf7f4c3e
SHA25604f0accf58766cf96ea6a380a27e66a6515e87bcc4be8459998fe5a1b5366226
SHA512f8744e11614987aa253bb537118f223f359bdb91b867e325cb9b8d3cd0bcee7c728d23c4a5fa0a5fd4e1427a32ab5a428a8835c5c9dca63b8161fcb797a216c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f0a28c915fe47eeba0694c1288b01f9
SHA1c660aba45210a934bea933c6d9dcb77ca03c9e29
SHA256ce26b0dd4e7f1acc3a2622d322ae8a6c812035c66d5fec0686734fff59564baf
SHA512e1ed356343dd14dfe69306b10810fc65daffef5c5f846720b2886dc68e6cf5085add0b0a518299d1c21ca0e2603b5a18ff6228e7a9f10bf92462338a8a203e66
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a