Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 16:11
Static task
static1
Behavioral task
behavioral1
Sample
63e9a9f6fb71d69a18d24c4e2e34ed1b_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
63e9a9f6fb71d69a18d24c4e2e34ed1b_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
63e9a9f6fb71d69a18d24c4e2e34ed1b_JaffaCakes118.html
-
Size
4KB
-
MD5
63e9a9f6fb71d69a18d24c4e2e34ed1b
-
SHA1
f6041ac915121921782aa05e940d6c877504c432
-
SHA256
0e47a3b126dada33671da88aea51776202b2753b1d49b85caea9a23d15456283
-
SHA512
0e26dacbed22f35eb9175f646c6fb1129925758ea7122fd21ab008931acfbacb21833dcf3fe3e2b66b452e872a6f959f9a19488a2bbacceececc10a44db47f9d
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o0Xma9d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDJ
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000d55df182844b73730639743c50581371e0fe420289ac0512f106f051d6fe9562000000000e800000000200002000000090e7c240fb97c65c3166cd52645b6d919c9cf3335b2eeba3a5da041c1e131f632000000051bbeae6f6ea0c9ee147d5c131086a4f57b05532702318e0f303db4e6b44b85c40000000bf19dc7551bbcc960ab16982b38ffdd67f4381c172b330ada625ebe85a0cc13d5c18a49773fb31520be9042ef52847e18f3aabfeefe0fe72c06d7ebe921acb79 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422469731" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B94175F1-178C-11EF-A4F7-5A451966104F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1043c18d99abda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1252 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1252 iexplore.exe 1252 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1252 wrote to memory of 2080 1252 iexplore.exe IEXPLORE.EXE PID 1252 wrote to memory of 2080 1252 iexplore.exe IEXPLORE.EXE PID 1252 wrote to memory of 2080 1252 iexplore.exe IEXPLORE.EXE PID 1252 wrote to memory of 2080 1252 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63e9a9f6fb71d69a18d24c4e2e34ed1b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1252 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c0f3c7425498fc21a36cdac3cf05095
SHA1abaa52a9e44feedd284334895bc203daf6b7111c
SHA25664191026d43f7fc53ca97c286933cdb6eb96174961e1ec399ec49ba25d325fbc
SHA5126b02034f406c8fb2f4af8d78955ea10820de9bcf05914c42e88fd3a0dcbda991840e2c4e227045e7bfdba38e2ddd748c91e0776ac7089351578b5c8fad677913
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6715c870a4c9edc43619b507a9a5e25
SHA1d0a1b31bd01456649d4880047f36b9a431ae77bb
SHA2568b8528a24eb82351fbbbff66ae5f2ad47615d281c5a90f79c48c4f1b46a70958
SHA512d2a7c80a4ec4bd03ffa52bd220f30deb9f9fc4f692171e5ba45c75c2696a3947369a650012f92694bc8a76abd0c8719ea207912947ec314daa9d990bc355112c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a834551204bfe2fa580b884b5104b777
SHA1c15835eed03a6303e72efa179b72f35d20d8af07
SHA256c71e43d2d3e2c417986c9e0764539e41e9f81f3976766027ccd470db5c6d2c47
SHA512412432c94e4e16ea15824174679d628665df5ae6f52572fecaa0f56517ac4a596e29b17be7b830cb640ae2e1b1a2933daae483583564eaa264a0d131b883a5b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a8c0b0dbabdb6bdfc2ea9d13dc23fa8
SHA1bffdee89469139ca3709fdced0cabd3552d94061
SHA256b9050bdb4d88e8bcccffd6206e039507edb3f5f418220befb6fc06f6b592c134
SHA51295ad24bcb6f33b8dee4664a10f9a47c7d131f1c4b8d08ed2ff8d5b1fe67e7a9d969b46d20490faca467d5cf3d1fe389d40beab11bd53b95983a29e3a40c06731
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573d0b5d5704484dbad24b9712096bd7a
SHA1ea972e2d4929383c73671330c46189e8a48b7b2c
SHA256d6f6495ad5a5cc2a3577bbc19c519c8648bab4fc440e285436d10d33f7955f7b
SHA512ee66f2c6ff3124808aabaf5c323ffaa692abb35000725573e83ee178499f647e1f04682b42ae2c51e2e98d3a0142aea24c1f9e18e175f30db37986112112c0d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550ec1b67b5f90bc3384bb82fd5afd78a
SHA15e1a397f5d54e00140c8443804c78248f09f851b
SHA256e9f9d19861e2079fba850d563026e84cf40e354ec0d415fc717b2f7122ca1728
SHA51236cf031114b542931224a4f32efcc7ff9fd62ec8094efb3607133a4f68bfd3bf82ae5b8c9cd5fb40a100f90c1489e9d2641074f79e9b8888b13040ffde9165e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5328bcf26f4919216163f35028704ad27
SHA1635b21c8daa900ad6c40b9b49557633dbbf860db
SHA256cec9e505e5e880a902f1ab12483b506353751a5a2eea5f43294720ee2f77ccd8
SHA5120262766958216f9d9b23270f07222c1db6fb081a815ff099174122ed37a0bbf7d73b560ab21e8b92a8113a3f19c8ea089056e602b5b318892df76a05442fb0d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500c0327a53e607f8371f80e697d1a976
SHA17ba251e91042c3dec226a437e7937f4e81513cb4
SHA256d8fecaf4627f59ccd9adad3fde000401977107569dd56f4ffe3828835a8d451d
SHA512f6bda6b2d7d25733f5d13e5e8a254bb12fa243f185d005507e44c1c70d3643c6bde5ce374b474638f0daa6241208d4469c5301bb6811563bec8fbe36c39c1fee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f31c50ee98e223a5b95bcc32edb260f1
SHA1d6b9ae1b176fa76896bb96ab09168ebb853da1a5
SHA256056cf4c5c3c4975d52e1ad9ee252b4eed5c0bb0af4685cc96fea8834958ddee4
SHA5127287b2634c9046094a8eef47217afca436db5a6d68ad416c28fe1077118a2b4a7ad6dc801ede5dbda59c380f34cb162c45dc2a3686050ee1774f6c48dd9b5c5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587870e04fe87d21f7dc1268cc0bbbd98
SHA18d3158d124f2e6313a77509d73fde1c50826ef81
SHA256e6859c8325e6299a41476dbaa5c6a563f32309c35b3e420f771cf57ffcb57a91
SHA5129db8bea4682e60825a6a827c71f8f979f39d18edb683592f5da3e7c57e57120730773d5177721bed5c5bc1d9c61e0145bd5baf4184b4fb46370df87ca078bfd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b136dfea5871e8099e188386e61f437
SHA1e449cc16bbaa2e52b4ae6f4d53e9b64aa1964030
SHA25623f4cf1d33413ec5fd5996072b94e88eca4f90e0370929d07f208f159e731a6e
SHA512af64f30d2e990092896176999be0ffe798df35e3a7b5fd3f14d3e3535cba5d0f7f878e22354d3c3c1e32616d11218d6e2a9f45b0d13dd28820676d5cb0488cda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d923301ad6a83cda7e777c67665eced
SHA176ca8adca9b0f08c7b850676a00edb06c9a05461
SHA256070fb5140d1e0b28285f1ab9135087829ee7565ab2379f444a5aaea2d19aa057
SHA512940fcb2ac831b632c7e5bdfc6f08a0ff2873bf8ee3c1191ac65bd475d4cedf4d3d9de3675fe0f48278b523ab47b02cd90d4aab13ce2e2d4f47c9bf6fb8f81a20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1f74945fc40d7d59dcc1b8982599d92
SHA13b4cdf2e15c8c89fcb6de55e0e22d035fcd42904
SHA25601131866771d338694fd8862c1c937cb289e4047474969761089f3654d4af996
SHA512c3c3f6719d2e3e97abcdc2cbf7cabe3539f90025dd50457d8d125a79442a4f61ab22368c4ea48c9aadd7de2fd52b7a81f710b9517f1a4437e5a795f089e26726
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9a64b905bc3f5b7be22d4a8317063eb
SHA1a2cc7db95ec51e981ab83ca477fb68a9a17b1e3d
SHA25652c1209559d9d75d717848be1bec52344e1fa3dabddf57aa28239ede60f437ca
SHA51262d7753255028fef1dd26ea14f7f4372049bf1217cd23cef9df74fdd3ec1ea79aef4096e85c6d992835a0f4d34e27fe3b06fdc68dd775f5454cbc00173f9aeed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a2d907cb69564ef713db9fdfbad7499
SHA1b146cd1fe8eb97189f6ae31a89a0e8a87a289aac
SHA256860eb29a064ce42b28559a28ce186f2a8e1fe0b2ac511ae0eb9730b9728011f9
SHA5126e69375409bc6c1ae6a0d4adf0b43b01be1b5353713b9aedf56958fe70f006bfc72be29739aafaee6a2b452da6a561efb90adc1bbaa7c5d69e856bfa8929eff9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576a3eccc5bf912845eca05848387b5c0
SHA186cca2d2a341b564976e14107f0e90f9cacda990
SHA256d8c03f05072cf6888aeaf3563e3d957e1ab62e52f1204033a44cf5207b00b984
SHA512b4be1db24869c182ee039c65c797748e11d9fcf4c0eade5126c217e1e2fc8cc399452092fbac22349a72b01e0d7b8ab7f8fc099b7a6a9c543c89f9f52bf2b29d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fab53afa7d5b61e6f4c16a700858cf2a
SHA1b4abcf6827617cf54ea1f86cb6f2a02e826431ab
SHA256283e9b1940af6b0124c27fc4f42d6684b5d10842f61defb09a0f7580b2f90917
SHA512a8144aafa55341fb4e804ed1208d19ef47fde78cf517bc15c67214150b9d8beb3d8b2e1d104e635e86ca325c53de0ecf0cde50205b575139e7483db68523462a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cdde7af1aabc537d9ee3fcbb6051d90
SHA1be450e5e69d07a2d34567d654ec43f300f7433a2
SHA256b8b951d1240931c02f3adf35db9b53b12b828c9d210f1745d0fc5fc3c1cc10f8
SHA512eecb12d908ab0fc11023f0586cad95799042d1982afa9d3e42cf842cd0f96d54d5d112ab9aaee430467b2f2de16078eb5dc24c43b29bf512049b68e5433f1594
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5645a19fa3ec64cb705c1c53573ae3486
SHA1bf175a50f707934eefc0623ff91a37c4eaac725b
SHA256b04b9feede4aaa4d075230377775c36ec4541a538fe8d0855ad785a60a19927a
SHA5125f20c5ead05ae4320eca071571fa90abf8a477db5e08cdacb0745f55747bf1d66d283f9e2e0c31eca80d8fc68320e1d05bb0e83127183c741e032fd8acac7249
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566a0a49f8eca4feef0da6e9f5bc6df70
SHA131f7a12db6ae6f7f7602034e67a095492cd6521c
SHA2566b1fa8af8a55fb073f414e37049bb45f217efc6ae1beb9860de02896be6f7f8b
SHA51212845ac110c684d574ea4a78af54ed9bf7d5c5c2083002a97a86c00454efc044105489bda830ee4999f7b09e30eea5586efd0a601c4af9b260d2174de664a83a
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a