Analysis
-
max time kernel
121s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 16:05
Static task
static1
Behavioral task
behavioral1
Sample
63e5b37421ae7c729468eb979fba523b_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
63e5b37421ae7c729468eb979fba523b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
63e5b37421ae7c729468eb979fba523b_JaffaCakes118.html
-
Size
461KB
-
MD5
63e5b37421ae7c729468eb979fba523b
-
SHA1
ca6e22339e5128ef28eb992e641b3108cd356aa4
-
SHA256
e63f92235a13e7c029b4ff3824cfa1f0082b3e93976d4edd4b9d25ef7d1ac0e7
-
SHA512
26513ac58bbce6b17e1793bd4d1aea44eeb8356afb1d0562d0b348c1c021eb44f46364aaa409a5f8d15d0bcec44356591da6303b0d2d0a0abd9e9b97b4a7bf19
-
SSDEEP
6144:SLsMYod+X3oI+YC4QwsMYod+X3oI+YhcsMYod+X3oI+YLsMYod+X3oI+YQ:y5d+X3B5d+X3C5d+X315d+X3+
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F4992951-178B-11EF-ACEB-F6A72C301AFE} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d06c3ecd98abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000644338938d4d9146b31f3b2edf899afb000000000200000000001066000000010000200000005c368a8cee83bb824a848b2f3e76b5318a9fcd0abb87f9075ea98bdb5ffa9d35000000000e8000000002000020000000438f85fe3a41e0068103b2dc5536a40ed2a0315c95fe9412469c398427ed699120000000516d4fc0210d535d1073edfa7ed0c872595070d714b17eb047eb0388b408fdbe400000000b493c65a0671773993e1406901d383044b2e453b1d190dd1a66522deb8b6cff129957024dd335e30c452c1e73d2600e776e20bd46dc0bf3331f46c32b6f7c37 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422469405" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2760 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2760 iexplore.exe 2760 iexplore.exe 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2760 wrote to memory of 2252 2760 iexplore.exe IEXPLORE.EXE PID 2760 wrote to memory of 2252 2760 iexplore.exe IEXPLORE.EXE PID 2760 wrote to memory of 2252 2760 iexplore.exe IEXPLORE.EXE PID 2760 wrote to memory of 2252 2760 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63e5b37421ae7c729468eb979fba523b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2760 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2252
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c99784c4dde834c2c6c7994c91fd1c6a
SHA1d3446069af721429ae8147153e1d04c6d9589cfd
SHA256488c2fb5e2a1378e86df8966163555f1d8255e118ee10bbf0d85df0e301edd8c
SHA512cfd1141d506fde7ac6f53376b97123fe0b1b17cfdea08dea1ef6d5c3f2807e38188d9ffa41b4cb3924074b12928f468574968610351484569812c3f73d304851
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd607f7fb4a01bcc75c01c6e93cb473c
SHA1a182b18751163af4dc4e7b19134086ad296cf9c2
SHA2569b50b336d1786a3b5dedf67a428de83722b1c809d8ac103a71b8ddefa51c8208
SHA51272a42f9ce5507be92636dca727a0f3ac12577c3c602e4513919b525d03c4d0b47df9d40a6dbb52e23f6e2ea0a55ab99fd98137b4263d738325ac8618e5278c43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5052c6ead2bc1c198baeabb783fb979d0
SHA14425cac1567e9a4b2ec477791fd633f37ca02784
SHA2562ade3e0f4447b067039610cd93095ade4eccb39c6fe9eb5279a2a688aafb9ab5
SHA51268eaf6b58df7149158e807eb8c9e329d64dc9f82d65eece630db5bf01028827e48385950df0c35b90d31f2fe6f69b8429d6083c9bee7ed72ce465ff3d14bcba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556427708bb37b3f468ee37faf0011ed2
SHA1aa3070f17bb96c622b39696d74bc881c920fe5c5
SHA25632a4a2ebb7e1b0d619d13315d1822eb641e49579cc9b25a4e39c93171134240b
SHA512924832105251518d0c6a50edf8d0fb20971f89e96f2160caa22dda2bac5b0af1f0c6b4fbb4cd1a4c394bbb245e6eec758238c5b13eb97d842e3c48e39acd465f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55898e5a72578f195aafa193456f63d57
SHA1344077034806b1c8bee223e2a814ff5949416f7e
SHA256223e068617a219150e7fd9c8e9f99e21b8454f84aa3fb5b0df788a83fb835957
SHA512549366d561c7aafc5f3939fd01ec9bb42306d3d45facc23bef1ca47b05210aa841ecc8485fd7eb355b78e5ca5bc0d26a3bd03915da2b4aa76f3eaf2997f48a8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580170c2af973503402b28ec633ba7cf9
SHA11c787c4cbb152bf019a0f61577302def377a31ce
SHA256e46e45f8958ad25018078a2deb6080cfad565d3aa03a20fe85023fbb4324c361
SHA51262171c4b8cdb0be2a35f52ed42ec74d4ca2e5f95b952581a0a7461a5e835a80ecaa105240e13a21df259bfd2ae1902d29b414e1868e9acc7dc17987adce00e91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546d82438e8a882b13c351d2914752045
SHA1ee10ba94d7e40ac36c82a17f8af9c831ef8ed073
SHA256681153e05b1bf0bf380e076fc5806d42735b7b30f300c83607096000f9fa5056
SHA512440cd674538b34c9a4bc4b0deedac83c338b6c05cbe5a1e4d9d34b951b3aef65427714fa08010103c80e51678c72dfb9edc19fadd31d2b36b11a12153141d74f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50326dcabca0dbd07e7a62ed29f7abf27
SHA1aa70a2795c7bdf9c51e37cde1c9bf1b38c88783c
SHA25648e9d8108948900ea98e0cc31bfb89bee9477b2f438fd3ef83e2e27dacb79a2c
SHA512d5af745792845316c9cfd2f4eee64909545fedb964a9585739a07ee2bb8e27b40063a9e32b888e90577f761b06a3033a91b86662af0ec9b462f0d4b927cad1b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ced20e147c30a73af70058c3ef4eed7
SHA1f675235b6db16c7b402533d0dae798d3c0ed1882
SHA256cc526af0d531db8ba74c4aca3d3241fd9f46bfe1ae9ea9d28a243f181d0540f7
SHA512af878e7b9dd4e19517aac016595ac0f3e1dd1478311fe6a838bbfd125e5de2630dcc7aadd6ddbae938b18d99a10c9c31e2c8811c4c87457cf4c077afeaddb3e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da54b2bd6fa3994f530e075e8410d508
SHA1e9a3057c092d7de19c95f53903068431914ead33
SHA2565044db4b123806cc500805d63c320fe5340e271572637af9cf63492dbd9d4466
SHA512351fafb9d09cc134d016c32f4e2096061dd23ab8ac3f8e38bb1c10b89bd85f25ef2184742e39158064949ded8d8fb3b20aea0ca8aba92140a30758a8518e7b49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b042183a35d544df686e087e6aa75724
SHA1a60775a757d7d06d93daee570f9022737fa2c0b3
SHA256ff62bc8d7a32caaf6ec2582b540202ae497e61d2410a0f4e2c803ee2ebf1ee5c
SHA5121060047446f2045b109e3de07c9561b58c58d5a87581c5baeefdbcd758cd265a986eeb1cd3cd8e541808613c549f59c4d12cfdf72b34d9f223a007256e3ac9ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac82cff133dfd7e6cd90f34464316c63
SHA19fa40ec9850150ec0bb174ef67386f8a0fa6eea9
SHA2569f3a785298797909159698b8884a4237db6b2b6af2205df8395b87d80be2ce22
SHA51250309e26b858790b5e417646f1d09d1ea68d25842ece83f71ab30a511a13a68fd377f8838042d1fab598e7b8013db55c8956f31f77cf2cece87aeb5d9de725c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572a79889c40db97cdab86429fe6d9e2a
SHA1123b4aadcbf8677e31d00e545d1de1d755c4acc7
SHA256a67153df6774b3eaa6123e688d983b6f570e15efc9b888e868b77005e23cbcfb
SHA5122f8beeb8d181d4b0e3ef3de1b9acc80d16a004d0a9299059fae4e9dd0c074262f0e232de0170ff85b13168d06a444bb426e55866f39e90198816c7dc5b5a6be7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2e73acb5b638651ea5011ed2a58773d
SHA11f90300016e5ddf74b214f734a5ca268a80c97f7
SHA25629979a7af038e9309f3e92621167b7967b5c73a3c11a35e1879ac9b5b5b61b16
SHA5125792a3e61eebda07c6d992a4d1aaed01a4fed25de7053aa1a20faf6fc18fb39ab3944e70f9ee9bbe6a6fe7e303ad28dff1598138f253bd79f3bc251e12185fcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589fedd5dda740758a9b2de22792f7e31
SHA14198e64f75e7327e48ec862d9a31bec08ec06c80
SHA2562d8d5aab594cd65b6a9d42ec1d98bc3dbf23c04611fac4d4f0dd039d1260c5e2
SHA5125feb17bc516fc215608f0448cce35b12cdc955e7df8de2913b2e4f446b34e291d39e668b672fe476f9e7e1e667ab9d8e39a7bb7056a1d2e1f5843bdda215556b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505c81ea3e6456eb62b9572acc20ca0b3
SHA1670b2300dad6cb07fd34f7f9cb18b097d3e93928
SHA256055f8454203d5d5ced823c4bab549688b5ed5f500bcdee25b9f176ed1eeed006
SHA512449d5e5df39bdf62a9e8a125854ae10835a20cca814421a1632fdab3dc5a2a6adbbe576ed978fd1c5ae1b3b7152286d413ed2d33ca2c3e830ca31718fea8899e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515ad730dceb53792f68499d841c1b91b
SHA1d0d0b8466e64a7e9e8744851f1a45ea21e51790a
SHA256000e3cbe4421e426ef9b5f3f63dd73ea3af38cae3a0848c80e13fe498b42d40d
SHA512357e6901c2841f97c2548f7b5b1a2a52d3cf36c97397aa7a397947b2277374718cf3dfd21f13fc02e5f94e5c1a48b99843892154e72b52ab19f0e59ec5db9ac7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c03e2373f638be62dce106f0f375fc7
SHA1d405a3042999c14ce3ff46c3a8efd262f8f49696
SHA256852ef48473dc843b3af8666656878165a58255e93bec9b6ec0d73178ddcab539
SHA51229bcd248555ef5d2db6c31186fbeb2dc5c092a064d282f8cbb34aea68f97663b2725db77c8b8194bedf6c4c7a8a3e33723965ef785d30a29137692722fc48396
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a