Analysis
-
max time kernel
134s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 15:52
Static task
static1
Behavioral task
behavioral1
Sample
63dbab42db7dea976bee76bdbad11569_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63dbab42db7dea976bee76bdbad11569_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
63dbab42db7dea976bee76bdbad11569_JaffaCakes118.html
-
Size
94KB
-
MD5
63dbab42db7dea976bee76bdbad11569
-
SHA1
7b5ee5bb2f1267d2f124807852d7f1dcd7812240
-
SHA256
6c11393a048f8b21f282b22b0b29751b46be4b80836c519cf997589b342c389b
-
SHA512
ab60cb1ebbc8419b1a01449ef35bd1861c85963df53ba6777a0d41a86006876989788e3be108ac291bfabd2938808e865188eac4605cdf39f62ad0fc7c9b26fb
-
SSDEEP
1536:WMLiNirUBFL+jPErvfAc477LmTueIRtmuyaZaw9BdkrY8mgHC+qpEyW:WAiPk9BdkrY8mgHC+qpEyW
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2C11BB61-178A-11EF-B85E-52C7B7C5B073} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30d3d50297abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422468636" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004dcbfaf0b1e3a849b03d9e2b5d0e482a00000000020000000000106600000001000020000000eb543498722c5ebcdf2b523c5bf732a430d7e95ebf6acb78e67e7e16c2ab62d1000000000e800000000200002000000073c771b2941fbb7b70584bf49bac8c23e71c187d3d01cddc3266f55e3130f846200000003ccebf4215f72346f3dfbab9372417f584bc046ced735754531368ebafb1947e40000000072e0416ada8afa8a1d28303962bfc97e6f3becaf9678258880e6191f06c5b3660dafca322a453ead606020622cbc6946d22d8afdb7303e65da5fd605e8198ab iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1948 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1948 iexplore.exe 1948 iexplore.exe 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2328 1948 iexplore.exe 28 PID 1948 wrote to memory of 2328 1948 iexplore.exe 28 PID 1948 wrote to memory of 2328 1948 iexplore.exe 28 PID 1948 wrote to memory of 2328 1948 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63dbab42db7dea976bee76bdbad11569_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1948 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516282fd9d7b324d4f12a906076f9b57d
SHA1cc3159bb73c235f76371b2b67933ce70ac60466b
SHA256e42701a9a979b42cf557bc6dbb41610663412e251f05596233fa02047f6d726a
SHA5122d0be2b22c00fd878f7596d5dd25fd274c02c4a095443a7b9d7c53a82f448893e6b64c6ef4e6e88d6b8ec307997b4a2dd8d1ca74fb1daa40f5612c41a4757a1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54617a3620a37b1d0312222f97578c4a6
SHA1b69e25476c5124c99fa91d9b09faff45da9ffe92
SHA256bd89418e39c9f74d22838b38f76bca5d48d84a91df2216ef10bba35b178b19da
SHA512f6e2d4251416dc2a29d75527d0f358ad5e16dc1d0474f03b0fb4e637d1e24cef47320102bb1e211a3fdb0791f478c4919384e52dd56c82b1877c35a7da9abe24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae77dbff8a7859f4b35fa60cc4215368
SHA13e2d54f9c6e59a3248eaf9f68c7048057115aaf2
SHA256b5a3f6a200a832031d39a56036cdf322da6a4437e1c0492b73af2374cf5f5015
SHA5126b0835e8be23f86a67609ea71e723738277d91532097ba2242f514554a675bc4162352e342b4a5859e9c2188a8023d01b649ab1c8312017ba1f1e762b99c4607
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585ab1463eb90f8ddf6f9361fe153341e
SHA19029c98e350f3f08d9b31e47f8be4385495fea94
SHA2561f66c172054b58fa7bd12cd8883eebd242aa25d22c760ac77394969a76c2b988
SHA512cb2d299d385ff239eb480910d6c4c226e0e082fe98e3a26503bb38b35979c9be3872c3e313b58dfaa239d492840ae802b8de980dcd75fbaab90ee85ed166c778
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e75f11fb2fe0b7aecc871446f5b8709d
SHA19e1b97338ddb40c57ed6b875295b7d8d9ec2cc26
SHA256a48c84b188839be7babaa409ab651f692b0c7bf6a1b69b68b5f67b507f210a4e
SHA51207d39b952681e8bef009611bf2caeac7c932cc30d47c3b5bf18cc39ee6da19e8842085ab4ed8e571a40aefbdb6c7e9de385590cdb6dd3f5b71baf0345e4035a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c28954e708b9f1d387048f9393e21585
SHA1c3e32351a9ab6e08e9eb0cbe69f94d6fe3149ad2
SHA2569d0a246c616da8203696584ec7aa8da2d2687d37cf70b7b07203b6397ab2b3a2
SHA5126a380ad04bb163be3283c0f8e59ae7a4a4c9104cd0d541c6a24d2f061f9056d629cdec7ad996b735275e00b36d7e43f272c068b3fcb038fbfd48f21d4e70596a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bbb5bd7847c26d892382dd34e03f7ca
SHA16adf24f99a585baf68f05927f8d9bb4c079a20d6
SHA256eac2011dae2e0ed1e1d97ab3011346ece8e7cd3457fa61459149c6f49208fd4e
SHA512c3244282e76a3991ab3a93ec0fcd21971093b22f53db8288fbcce7d3c59627efbe40876dfcde943daff8c0504665bb564b30b7949407010d2d02f34a1e99cd77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b48641ca24aeb49746a57b9b49f1c542
SHA120bed55f41ffe02512887c4ddfd038247986ab79
SHA256712792b4c0fe82ccf8ba38c7fe181421e895106cc873694c63db58c97e83d5ed
SHA512f117c953c5feb9fb20d9090fcb5c16dc8ae10488bb0ae3144b39e50dd056bfb4c08e485376370a1a53dfa12bb0eae44c8543aaa8316eb8716c8d1c989d4fa987
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6658e3143a434b2482c7d7e38938b46
SHA1cffe4a0da7270c8220739d21efa5d60254deffc5
SHA25660f4a2890af822d66a9628e562575537524489140821ee8119f5244a42252874
SHA512e2f8e5781279660a17bdb5f2177b3150febf32220c90f1e6aaab59d7aaa90f3f9de2713fad4112599474e2372f26e9e015d6b3b523f18059928b4e91284f38d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5468c57644f718f0bc8aaf98555e79a58
SHA119dc75c9cb0fe9ffd398ac183debb04807c5ea5d
SHA2565e27816266b6e957ac9a07199db0b4c11bae6f7bceb479888e597c14dcb08b29
SHA512c531c12c9be58e6597420be22102662095201cda0227a31315f7df3bd3f321564f81419ec89718fab6e7de5d30824c1412c548b9b64ac451ac0d68f8e66084dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531dbebe186d5aeede3618a011cda3a01
SHA1a294cbce1abaa8ac0883313867f014d53388422d
SHA256787ee0e938df2a8a22d4d72cea2796520a3e1bf6c7acdbd936f0a7799a7e8cb3
SHA5124ea13b0891b0ee9025f15afef303d04339088d40b1b2759f75956b14b3932f7a56c1b90fa46eb815864ecce28431d45c043f8851e6ad06b593e6bd93f04c326a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c45eaf3d5b3b39f98d80d52fe962a3e
SHA190f010a9e2ca1af209cf6407c6e7d17a5ef37399
SHA2569e72d26bb772164394d342b3e4433f87c2ea9b763f4920d68c2bee78d157815f
SHA51278fc751c32cd6e302dbd8ce50f3fc40845bffe091a9e10471f914a1b37c2c478006199a5dcb64438c0d33474ef49fb0191b25fa851a96fbd8748ad958a14c13e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570a39c724d4a7349911ab9924668e5a8
SHA195c28dbf6134d03c4e96e2545d84d1c615f4771d
SHA256376c04f216c05311231fd80fad3b5a81f353e868af4fe53de2b4fac5af67f0ea
SHA512fa1886f06d7b3edb52d7f3b42439d948f09622eeeeb1af7018b315a4a0c137918091572c63c258cbbe882c6907d7f70546c0ab8e4031b14e030a82dec78f3878
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce51a1c6d09d99b38dfac51ef8956694
SHA13ae084a00efcb08b96e1404a157edde0e2040e04
SHA2568518fbcc24a5cdb901ce96af1d56e6246ac767a3726638b8e7ee696aa008c58a
SHA51225e82e82bc6d24aa20c6b55d35e1e4836ee3173882d74e732c896751a963ae16c140f42650373126ad50ea284756456e1e45e2a02e7aa2c6c238e808b761b4ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efc3ab6da7d60e804e7d1e9fb92d7681
SHA1a189fd52681bae0341439241abc8635a17ac390f
SHA256e611b0460714c2bf7fbcdd7cc22f8d3c91bbb2ce836c776d9de76807d9d0e8fa
SHA512fa8064c66793c0c592225ab6ae6f31183f74df6f2866c90b47a608bfff8ac5923fb167309b67ee8382933832087123a154cb2c5c4770de0e2010adde122369d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c37551c2e4e1f9106a9906f8c0d50e5
SHA1f3239b707d204c11110cf91e76f371a3d4df575d
SHA25640aa9e84b436d3558c0ba9f1148419e38653412dd597a9213bf64a21bc057dda
SHA512463527f417fb90104ddf94e76b5cf191ed9c5f5cf21b6bafdfe798b5a59bed77b74d40feaf65d72a18190e24d5e5f01716cf715c64741c8e169bd7be30ddd31f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510c0eb72e97c73328e8d518e144f632f
SHA19598dc23afe0d194c34e2184668c5851d5c0c68a
SHA2560f967edd3670245a2040c1655fb777d2b91dc3a0dee9449ceb84bb86fbae26ee
SHA51227106468e120e82015e6492e82d0cf5ebab132fc1f604cc0dc1b5a96965caa40e5e361f220962d886b0f62e62d18e8afd24514798767f0eb6ff8d66111223ae5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a397107fcc9255c94414395bcce45c3
SHA18a97a030b3bc0dca6fbeb80eb36bc78abbf26a85
SHA256f2b1fa86a0faf6b8e7c971ec66dff9ca4eb3f4c8da2095c4c30695b1649c2e42
SHA512c489d118af9d4748e2109afec28b4d2a572c32452944da33bd801c16c2931229d13e6c55d504a72b0d252f3d88b0df56eabf7a2f297c5a207dd878b152d8130a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9ZQLLOZN\coming-soon[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a