Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 16:10
Static task
static1
Behavioral task
behavioral1
Sample
63e968547351a300a67ebd8db15a276f_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
63e968547351a300a67ebd8db15a276f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63e968547351a300a67ebd8db15a276f_JaffaCakes118.html
-
Size
6KB
-
MD5
63e968547351a300a67ebd8db15a276f
-
SHA1
ec5428c0310f9f62b75a181f94770562e6ce23e3
-
SHA256
1e546f13764e26b2c0644b7ac1275f4a6e0bf6c516982b028dad47d362ea7b35
-
SHA512
3620899a4104624c2d08f0e964656fd0e5669adb6110148fb0edad6aaab53b43b6bd9fc4fbf772bb6f0bc9d28e98a460ce9744da40c6dd42e5fadf0cab156a4c
-
SSDEEP
192:3K8JbyeUDg4QiZfxxUDOU2TSm/p1Ohpqqb+VhuKTKyuDxg:3JJbfL4JN7UaU2TSm/pgrSnvT1uD6
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AE93BA01-178C-11EF-99EB-F2F7F00EEB0D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422469713" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000c52404370a8f05850f65c17339f898a3ac0f69b7ad895ea471e27e6f3f35e62a000000000e8000000002000020000000a79b04c378a436e80181f365da080db047871cf0c5ff48c7330252bb45b4c048200000008b2a2333905721c9ab3e5565e6692148a0848f2e816cc683c468a42c18efb4f1400000000bfcdcdbf2a7c6f723301ccf51c2f004314ff21fed6d81e76c1c7b7aa2d7a22ecfb577a26bb07a7aeb94f9de4f1ef7b471c30c08700134ad5c1f4d2053d8f686 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0a21e8399abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 3068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 3068 iexplore.exe 3068 iexplore.exe 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 3068 wrote to memory of 1272 3068 iexplore.exe IEXPLORE.EXE PID 3068 wrote to memory of 1272 3068 iexplore.exe IEXPLORE.EXE PID 3068 wrote to memory of 1272 3068 iexplore.exe IEXPLORE.EXE PID 3068 wrote to memory of 1272 3068 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63e968547351a300a67ebd8db15a276f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3068 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1272
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fabefb2f94a1db2007524eaa220c358
SHA1e2a9902e9a2ec062a4f8eca09044d567aa1c378f
SHA256f26ba6ccda04f8749aadc1c6d7e900096f3b979973812eeb27df9e7a6a169060
SHA512f8cf000f9e859864965af9fa07d5fe34a856198a8cf1584a73a917a78f3c06555c18a6101759fd7242595a0fabfb4990bb80d1d5e2764bd58fa66bbd8f256998
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5983f93f439cd33af6e1321fb83a1670c
SHA1e525a4ffbcf43842364702f63939a441a281c5f2
SHA2566aa0c24884c677438ac25a648c4649f90b78fe966443e8e2ee34ddc0db24cdba
SHA512f238407537897922e84fee6bc4013d37f5970aea78178af4f5da01a8e2083d1f83c92f861d3a9d9a0dbbcda509cda36e4e68a80763945b79b9b1aa7e0e1cf0c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597479846ab717c4b128abc40b647740a
SHA14a025f8e986212159866ebc9976575f2df71baeb
SHA256851fcd646af97c8164687da0b45d589f558e65d77538681ea0ffd24a52c46c67
SHA512a26273c134a210a60ee61e4287a03d6967cf4ea53255d8f5adad28c1a9665af3463d548361972e4413d5cc49fdb73e5d81c2ac8cf6a7cc64013f7dee09c1b2db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5721d935278e451369b2313d512563f
SHA1801488f02ca568c874b53f7bb810619813bde130
SHA25677139f45bd0dbb87fe6c51fbbc6afe7519ee56dffaefa4ba5c2e3b9740993138
SHA512680e9d7a8b9acb8d14e5091d087e6bdfe5ffb83727b6dd14cff40c43ecdc3420759607ad9a7bdb085ae887d294f2bb6e5e657016fa6fc6ccdf7d40be1a50b762
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec947cd1ea41d2e7647ddee3dc0e468c
SHA11560446ccb26f352880adbb37b0463b2430d3ac7
SHA2568d1b406e8b41d8aa97d2b735509be624a0077a91728c4a1468e6a14663b8af3a
SHA5126771c41ee85d1eca5c059a1f106db1b2af600d4cae8687fb3d049ffe1c9e5c0607201557444d99db35b3d5d5717cf16c211104645202cd2161d2cc3823849dc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c82bc2e7aa91412ed19dc1532c524ca1
SHA1c5d48b2e9b6f4e0e43627cdf47f37ea50a429fcb
SHA256dfa762ce64c947e23bdf30d9dd24d2bc9c4de4bca22618930402ce426ae83457
SHA512e0ed9376ad28fe298581d08d82d2bed9b1d04b7d54d7cba256e85eb212c0b3870702e8f0bf09b65602893b60e538b6616a5e4f63d2c3a708d13abf039ac32d29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a863270003209d501f82e6222a500e27
SHA1ba93a042f7cd5047f39ec13039fa4b5c409a1655
SHA256d38531d5fd1f47b7131e81c347c30eef0b6d92d4cb6559539f1b13dcf273b4db
SHA512437879e2d8f28f4685c65a73c0946e9f96a4d06547cbadf64b079d4610554e02120e63bcc0ec9fa028f934eef8210b2cb7803bd9c129807fb1c424b825c7cf5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550094a201c84cf457e04a8091b9f3572
SHA1f071cff560038ce9310bc4b15e92098dea4963a5
SHA2569b57f1defc6080d854eaff1d59284732240789a5e2af73ea335646a071304978
SHA5121c0f49da29eecd22e5364eab67974240da563ad3b13d51f75abfc951ec76520a879cd530df8cf203ada4175b92fabdd200f2decfa7ebd032ad8dab13d8369bd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cae49f7986b291e4501d6be4f3743f2e
SHA1383566eec6ebe2f5bf656f6f8c136a6ee310ff79
SHA25615d08138188d61b0d4f28f87caf3d9865c5e37c514a572ac69d6d80a50fefe5c
SHA5127d81a0b41420db553a7461394fcabb82d52bebb328a212d9ecddac833361be7b1c67ea03637e5910f8835801b2d7b1a099ca5db6d36e6e184dd9032979121c12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f31279325a7b8bc4a9b48b8dd34300cb
SHA1dc699922819dc479c3b6b6a80f0b05477cff6e6d
SHA256d700fe21c9348a37efdb399a570f3abd4033c9843924567e6399c6dd80d7b5cb
SHA5122ed05d48ad682e416f4dfa5f6a72db08e1cda80e36e1c29c5c94070535080236643fe977133820d2131b35c823aaec9f1c41fbe56ec657bd7973651354ca5739
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c0ea0265c215984abeca6689264e094
SHA15ceddacf5e0d45a4d5ab60dc8b9eae638a98aed1
SHA256c97e6ef8169dc943fa86d91d8b7d0157dbd2c88ffc756bbc3efdc6287d72b06f
SHA5128aae62412298c198c865237399a99e2b4eba46b14f88fd0cb54bd2d0e26b56119a1d0a5919aff45ae581c218c9033bae56b9aac507ee17ca29278477b228dc8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b095c3e9c32f03ee9a9ff113b6b0c450
SHA1902002cae218dfe27e44ced0a36ef4424512773e
SHA2568c163b5296a4083fc986e81359d3f0fcb66ba5a8290d42c5f45e601f8751613c
SHA5122d6cea8747fcb9fa65dc8b1b3040ceed0c6e279edfcc3f2d70c4b5fee6f1b653c1437980aa1d0459606225c6f12648ffd02250e04c89d39c030d791d0248dce2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5725c8f483ac11ea1474857cb4cb125
SHA14fea3a9230d0814c04dddbb109d24addf86fca07
SHA256910465338b54afbdc72d4ca9e6c7b0ad39cb2030e824c275a2a4267dc4f4c743
SHA512d3eecf4e7050291be6df3fef45dd9c16055744ee309c541ae3dd03dd51b57c3d830028bdabe097405b5b0f4c3d4934041c2dde068b54cebc0296ed8d66b206b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519b657a19de6731f1f843f05e024d5d7
SHA1de9776049a54297b27cbc2607a8b2d756c09395e
SHA2561f3015ddd46bba9cf9f85cdd7da503f00334294aa1fcaa1d63a04889632e431a
SHA5121e918797c297896a057df6e23195c94a51177d545e4918bfacd5772f4b98375e5e77ee1aa8adc66406db2fdbdd4e710c247319937122aa8b4a689b82c7355192
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db8be49d56ec539ee1daf1a2db835304
SHA1c411fd85fab9d608674b92b6f59e7be1e5c4a2a3
SHA256b6c2f6c943ae9df6d112983deece48b724f08e2f28b401fb4fcf648822f7c607
SHA51217aa81eb9a9e8f82704fa15ba4de4e2c9c2e53433972f60c2c6ed9752327d66a9faff57f6db8eb74d0fb3959f35976b82fb6f4b57f091e3fc24f818613cdae4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5179d301b15d6a7aafbc5e134e85dea2f
SHA1e37dc434e0f787f8d7fc82fe53f0fedd45985cbb
SHA256ed82bb3b38f920b995e6c21941c986f28c7c964e83bf718c11c50f5b6d2a367e
SHA5125328e24929f99281ea287bb9b61e1099fb225e4d4f2c8db277fea8b9c74091ce2576b026a99549def293011088510c8f16891facc2e3dab84ab115932193ced6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f669ab76a52e31cff5f62c47a9a14160
SHA1af262589acfd37cf25429158448d694131aa902c
SHA2568beab5515f5999befca8a2beb094278817d0854797ce035d4912d200a46e2bb7
SHA5124fcda2be3f8b90b77d4662cc39381cc4c94525731785f014f6e8798dbcce8fc7f42aec285e1f23f53aeccc9c84d3dd6f5d2c1dcc5ed4793b6ba75f16d2dced4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d31f7fdae093ab704d5d392537dc2f3
SHA1af0684088af65ed0ab8966ac9e531523d99a8cb6
SHA2561ece559b640ae27ac7d17af0148ae393eff2260ae24419a2d836086344a47ab9
SHA512f90144c99a05b57f2b996d60798c937affbcea2f484b87cc634dc53f62532a41756348383f907ce124fb21deda045f0a9cb2d498a8cc7379213796de3be66b4b
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a