Analysis
-
max time kernel
122s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 16:08
Static task
static1
Behavioral task
behavioral1
Sample
63e78e2c715c7f8977792e12766b45b5_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
63e78e2c715c7f8977792e12766b45b5_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63e78e2c715c7f8977792e12766b45b5_JaffaCakes118.html
-
Size
84KB
-
MD5
63e78e2c715c7f8977792e12766b45b5
-
SHA1
1adb1b3dbfc617522a9481870bad097270c1d42c
-
SHA256
10de1068d32cb459e3140171e5a03b7d5f11542c76d4e1b3e7c0f617f4625f64
-
SHA512
76d2f5ca7171589ffa6b86cc9319b9054728612783bdafc43172bfa125335d01a89ca264b85e04dd8f0da37e12976a8d5fe0b53c3b58eee03193f2b2bcf6e923
-
SSDEEP
1536:NsRQfNDxJy2GEGsVn/32QujHMQG6SKZ0ePc8SBojKGawac2QAOAQAvpWkv6dziFH:Nsef1KGeBlXxuHclQN0YHms
Malware Config
Signatures
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1476 2700 WerFault.exe IEXPLORE.EXE -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5B1CA171-178C-11EF-BA3C-D684AC6A5058} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422469573" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1088 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1088 iexplore.exe 1088 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
iexplore.exeIEXPLORE.EXEdescription pid process target process PID 1088 wrote to memory of 2700 1088 iexplore.exe IEXPLORE.EXE PID 1088 wrote to memory of 2700 1088 iexplore.exe IEXPLORE.EXE PID 1088 wrote to memory of 2700 1088 iexplore.exe IEXPLORE.EXE PID 1088 wrote to memory of 2700 1088 iexplore.exe IEXPLORE.EXE PID 2700 wrote to memory of 1476 2700 IEXPLORE.EXE WerFault.exe PID 2700 wrote to memory of 1476 2700 IEXPLORE.EXE WerFault.exe PID 2700 wrote to memory of 1476 2700 IEXPLORE.EXE WerFault.exe PID 2700 wrote to memory of 1476 2700 IEXPLORE.EXE WerFault.exe
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63e78e2c715c7f8977792e12766b45b5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1088 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 17803⤵
- Program crash
PID:1476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591a57f0d9b9312c47be8c8d1ed8ba91e
SHA1c57220ab7db6ca4c1269a7532f2b65c6edbf88c3
SHA25612a1f96007cee54a594282713a5775ee4bb786a00f1fe6cbbb16ab5e98e0673f
SHA5128a38e6e43fe100e3027781566c3849b45c1a041630daed839cc0267a55829cc2761a1bdf412cc9f960287f580cc24d38d39565cc449943186805a4e7bb2361fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e8aa95b47e0a14e745984cb6f1ce4a8
SHA12d30ec0610c320884be1de889d943554214a681b
SHA256b5b00b4ae052dda80d297f7c003b0c62b24e3dffcd45d090ddd513ce3ef94423
SHA5129cbf570bf40d60148dcc5c9244c4dbd1cf03ef7a563f07608fd8ccf112be90a40e9a5ea2f9a536a0fac001265e02e4b5ddbb7f4dd50204d44ef35ba19fe45966
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dffc6b53a436c943e496e988ae0fc8a1
SHA123bd3645da30d82b348f113cb0a89d00ba6d41e7
SHA256f4d256bc3f38edbe258c7f745a119b719e2c80fd99c0b506aec81fecd8c48706
SHA51248715f07e12a2d253d09178f8c16b8d90cfd9d6eb6b2d37f391880e7cb68a6e7c4883d29d96f0630007e0c3cf95423351687a203ee602f93ac436908daf3fb26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5acccd9ee30950477138937a278c9eb97
SHA139387f23a5ddb9a3430c99c54d364856f3366471
SHA256780b1e69ffa1af559659db32ef983a6baf848aaf60321b871b503008d2c67449
SHA512af4a85a6edbe21dfedf73b0d9809aec99dd8a78eeb19d90784d73295f5fb4b1ec596ea145e0906947dd31f14e06d4f1c0d37e5a493b0a598831e16ebf36971b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506d75887876eb40c94f60c7a89920571
SHA19c26ed15a17c6d4a2a82f6cc14f34f493d7124b0
SHA25600cc267999efa192516c36fbc44b69075063950b9d8020b381bf1a0c25006c38
SHA5122d2b41378a81184fede421b40d0564ddc760880326c957dd5a1a1b620294e55ec7dcd2501c7781b8f63927d14f5df0ebccbc33be2a743605f84fe5ba720a25e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd8b3465a3320e833d54db2a0abdde6e
SHA121c1d833d41a69371c027328c9778091e29d17f7
SHA2569a892d98d4664d7d41c6c4d4ebae92fdbe38ece29d5ad3f2e73f46a231ca95a6
SHA512ee999ee47d4ed31545063f412223559fc71bb850d0afd06af69a2104f8180ce2d8e2a3dad7e88a2f00f36ca399871f082baa381437ed97847b6446a85ad2d8a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ba6c8cadf04ba0858286fbfdab20f5a
SHA1a5537fcb150b07d8e2f7c0aa30eec9849ecd8e6c
SHA25659e939ae908184594c6b84e8d521dfc48d2eeda4a9db26da30d7fb7482157a2f
SHA512dd3f42ca2622ba11036cd3d555b9eb11742233f648793e3a32aecbd5a33b76c80b6a4911a9920e1631ef387c6601fd46d3c21d190df04d75653b96c47c2ce4e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cf60b855d067344a074b2b67a54bea6
SHA1ded1738e3274eb1f6e2b62937cf333ac1988bd95
SHA256f6c3faae8b158853c47c3827cf4ad41d3cc5948d5d9aeccb9b5909af8be3090b
SHA512912edbe4a92d9dea086b0728254ca1d9ea244fd3672c0090e537be187d05013223507d1593321d93a519147f46bc3330c4be32c0e5ac76595d7279028d749dfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d9d53b7b1a042746466bde5b4da3e34
SHA117a46cac4163bb5ca5441f0d9796608a95955232
SHA25676e7d2cc47b21ed3dc70578b11fb1ffb61ac8e55165f20f1dd4cf2175fa53ca3
SHA51247d41942459c7de701977c2c3bbe9adda4a7e0c0f7e70de69d5af4ff90542a905d61fcfdfce8d39e975747ccbe7f3f3e7782ec479ac2e49c65dddee8a16b87f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a1cfd5e4986f6029f82f76db14e4d7a
SHA15ba76a45d26261ea86ea9e1744260bbf6647562b
SHA2565d98addf8d6c686523d4c7d3133da80cd441514332f6f7e827f3954d2de4691a
SHA512a8cf46dfe3d8c90562bb0e88d4398a3ec69b2d7b6e16418d8ea392348be2890d4dab5d625f91babdb9477f49b21069656939e543368bf4ecbcba5f4fa12b3d32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52793e1d9b832f690420baa72c6e3e0ff
SHA1ba03dbecddfcf0a7b8c5920331710ca2a6f27183
SHA2568a5e34cc0e55790d97e9a505588edcca14878bf29fe75829e3ca1dfa0aedab55
SHA5127cfd920d121842c1c50372cfc731a006f863dce6a12f870fc94da26444f6467cd93cc40b5289df89dd63b355e030577c17ca8b68465eae99f08564b6e3c2bf3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596c7738b14a7557802cc572ec775cfc6
SHA126b2678afddde919225c05a6506889d1175cd3ce
SHA256c92d73feea3f5a43624515036d9c16825a363c00391637a1ce5794ce5c022476
SHA512e40433bfcd274509a05e0e5159ba6d4882c5d5c5f2dbc1e52c87a6e1183ba30f5434b82a9b98ee8417460b427f81dad89f4c1ce9cd29c956f866709796b8688f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541a0dc4ba99e8dff2b7c14230ebc313b
SHA1cbb65eb812606330872b34127ccb7912bb1ca2bc
SHA2568bb8b81933a0c375111b49a560b005e53bc682da343f9bd4a50fccaa932f8227
SHA512a372c42e3418f09a7e6755ef1d19676d77d263984aef03ea748a5167209db9f092c29fb6ee1b0b925f2b593893d2bd2ae3f07b2188ad3c91c370c8edde5f3558
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\52G8PVLC\css[1].css
Filesize225B
MD57c83a8d976c4c7ae357d9fd91348abaa
SHA1e3076c140ec7c3aa49d14cf4c668d88bc30b17df
SHA256462d5a4a422ce5b956b086c4395e0909416f316f6a9a9c23c31ab2778951578a
SHA5121725e2eb4d12c6a68f4b35a112416e8c70dcf9b26193906a5ef3ae016a3bb5e0a665ad90693f19a011395a23bae00d5227b6525275b3a5b6d6a9eacb562e07e9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\SVBQZB4R\coinhive.min[1].js
Filesize1KB
MD52ec43720699ba70c89f5adf211fc3138
SHA1798ef9a5855d7f56b51825856cd84ce0356cff0d
SHA25639f7a131d7976b1cbbf08c89727ba5c1b5c384152ed65bc83198bca315be5a88
SHA512ef8f3d359eecc4e4234e18ae38a5c2e908bf352ccbe518d35cf956d8bf38b699724ef3d673c984625c2b725640e5d3bda45e363cfddcebaec2102aad7a34c0bd
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a