Analysis
-
max time kernel
118s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 16:15
Static task
static1
Behavioral task
behavioral1
Sample
63ec21eb8398ba596ac27d3821de9ecf_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63ec21eb8398ba596ac27d3821de9ecf_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
63ec21eb8398ba596ac27d3821de9ecf_JaffaCakes118.html
-
Size
55KB
-
MD5
63ec21eb8398ba596ac27d3821de9ecf
-
SHA1
25e7fc7a4bd7fc38d8d631977cfb463a61214e3d
-
SHA256
cf0bb3e7c4f335d1d73de18317d08c600ebc77dd87a6ae1753ac51438f9e0956
-
SHA512
8413e5ba1c60ddbea541bb4abf6a1896da9a2ba31af13bd6e3afbf581d1f66389b6c555fa9b85903d55628d9d14cf9c09f9e7df7657a91a91b7e52733bb8f7b0
-
SSDEEP
1536:hesIgSyEZd9E7reguFuR2h9EKwFrJwXgaHNkoRP:hYgSymPRP
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004b25d3cac77fa445afc2d6fd981b8845000000000200000000001066000000010000200000008dfbc14b3a72e57ae8995e162afcd9224fa702c0d101677cd6e813903b9ed13d000000000e80000000020000200000001ebc3ce9dcbc66791bec7ed5911ec4e55798ede4c00c06edf04bd5418a5dd09e2000000054667bbe900d99f7ffe970f590dfa16837899763f9099ef4aa645bb6bbc7b5cd40000000d165867a1e993cff919e074571ce05b4a4560b2e85bddf9ab224e5f7f9042426bff5b19565062a2e4c40c71f6608a1572e027783024d5e1fbcf067073a92bfe1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4D9AB1D1-178D-11EF-8859-DE62917EBCA6} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004b25d3cac77fa445afc2d6fd981b8845000000000200000000001066000000010000200000000b0ca6d948a0d79640ee95a80d6057becd83857340e86cbf42b97c5129791e92000000000e8000000002000020000000eef49b22396601d86fa628b0db22921bd54e8c02dcb3bd947b505eaa0e69e095900000000a635c949c3baa24153cd6006663e5d47d119245ed6c9ccd5e9c5443cbd1596aa967eaef9299a41872077ceff6f11069cd41bec50238fbdba28ea7807217411ac4337510554e6d0b63bd1405b6b36a8da0760e56828c320ea80819842e631b0c30c31af76e8e1d945e673f84985d95ad835b703ca3a17d4c7b41c34dea9166ea3b1dcd3dd021e936cbb5735a6d2d847b40000000b047bc1d9f687cb847d312678c0d027071cb17b92ea0caed491b566d5e575318b880e3f284fe0666a5387b8dda368879ccb8c808c69a6c826515f1fef29c6937 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 300404239aabda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422469982" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1772 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1772 iexplore.exe 1772 iexplore.exe 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1772 wrote to memory of 2812 1772 iexplore.exe IEXPLORE.EXE PID 1772 wrote to memory of 2812 1772 iexplore.exe IEXPLORE.EXE PID 1772 wrote to memory of 2812 1772 iexplore.exe IEXPLORE.EXE PID 1772 wrote to memory of 2812 1772 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63ec21eb8398ba596ac27d3821de9ecf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1772 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a059a622beba546ed8fa12f4ba896e51
SHA19d15154d94e83fc7d373bc68b87ff6035c383786
SHA25623d4f2522fe44a5573200cfbad27fad4e7eb17d5262b4e45410db8ce4665add9
SHA512751111536ed8d7ab6bdde93862ebdc3c719e8a4bfd1573cf31a412adf2dab83e120c5bd4ff134a669e0155bf2bcb16289daef59588a346d393642c032e59c94e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591d6915abb92e6828687ed0114a1dc26
SHA1ac33ef08535b01e8044ba516fb2634024accf67c
SHA256c5bcbd40d92904cc23b3aa1b7660b42da8a12672a0370a568dd34d2f5e2261b1
SHA512c425afba4593538f1f069477496a8a4f0de19e2ca38c4abc0ea9ee87485c3ed2d56818296face4319656cfb8d754bdc09cade3db735b4df46b51dbfa7ad32545
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa4c96c9622da41c4e14e8623778af92
SHA1fd2d445621bab48a64e57f2f3a4546fc5b94c80d
SHA256a5140cc41023106811b695d69c2b1810687146a9f7f2cccd2f5f2c3137c7f30a
SHA51203c323506fb373e83641b9bd8b68ee081111363692ffe99ab47b3a7547258ea8558c94b2aedb82091b9ed6c0659048310d87fe13dc34ac9a8ed181256e927305
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584de87d165fdf6529539da4ba7b13e20
SHA1bca83274c14c08c26aa05382cdbcc3b9a59d1aa6
SHA256d2fdff6907dab2f1aba9d32466b6338fa1e769e6aeba8718eec74d877e7af721
SHA5123b71bfee85d82de788607f3b5744a531a0216f82c597a850e9af82a4b6a759c8c22a5ac5bbb0695529f3398b03f38357d73eb8f478ec26ee991a1afa2945543c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2021c727737e8a023bd8b60a65ddefb
SHA1b4b3d4876944d1c43dfdadd0e6f9477b89bc6ddb
SHA25692ebaa590c0a4913f649f897330f5a902718e6b26598359470f10701d80da3f6
SHA512a6d9fd5e26c7ceb7485b9240d043a6fc57368490a17735ac180ef40750aaa5818f97cb34ec6367c93850df6fc8db1178100f7d8f4f28cff13caaab6ec46829cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f54248cd17f7028f8697cca3034f4a9b
SHA133e85a085c5f66581b656f3decd3842970780b36
SHA25625644d7c74aa3466a02a1533d43cd065b481a22739b1e4d9ff9095a69a7c3e33
SHA51202846a4dac9e82b3d363e214cc6bd0410418ba2068e543fac3ad8ff5cdbdb310e2ee4814a2a05454e902eb5091659a454cce4105f0a015c4dfe22d78f995ffd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507ae15342deaa74751bb9f2a4ce531fe
SHA19f6844be9e363fb0f70f107a3905b00a28ca6193
SHA2564a5b5b906f6a11fca1f4f69e41ad49856c8e99ca26b73979a5bb109948d60f62
SHA512d3d91e9390cfb57455f75b07aab6fb9f116a15d718481dd474a93bc6486d2faca72d38411c738b4043ce48b0c08a2d94cfa06a8ef65da20e0da66655a3682c50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5496394714edfe39dc1cb7928d29443a1
SHA1667ffabc05ad7d56a4e5b41e6a2439966279be63
SHA256d6bed797e96c2f58726ff83b11f99dde8301e04d01ff51813852c3e746e71a6c
SHA512f23c0715333fdecaad92221cb2fecddc385cd027f44aa5591154c1d7ebb7cdc898c4516b47db4951cd0442d2cfd557987a79c831c488b495c6e905df36c988be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e694ee8ca8b38404a9f1112227a42f5
SHA1187c7db46ca30a9c71d5137cc02aa38687058ae9
SHA256d158b1837c9465cef5fa3c6ef3130daf8ef567bd6148ebdac2187cfefd3f70e2
SHA512419956dc7a6958c813b53196058b93433623a2b3b4e6120da1b22630f1ef9290a91aca04f94c2bbf069b025b532d25e3db561fc34e03e92e2a71af52db74078b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5991e7843ad387befab3e9d4afa667e13
SHA119e6846c50fb852502512ce756b30d4395733abb
SHA256bcf0658a37ae81819426b95d1b3314fe61532f0bd624b1db0012dfcfecc1e4e0
SHA512bfb629837931a19d0adbc03b5e4f37a339502f06bde406a63f3bdbe615880e8510e8428f8a8f1fcf10266417df057dc4f227275acf56d4b80ddb21f77a54ff5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bd3f100a110f5ffeb45056c76aa5b81
SHA194d6193ccc511024227b5ff864fb2e1261ce1bd9
SHA256c00d61f5ec4179c4fc12fd1b149f82faa37d312bdfa17057630115670a9be55b
SHA512433df190ef6990a910efccb65773be4976065bf5d303d107826b44ebc12f856ef78ba81e07e17c871159b5b0b420b851d5a8bd8a8d800e245756508fefed90b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c2c2378d5a84cb75d12c35362de3d11
SHA1e5a4994915406e6fba3e7b461285f311a11162cf
SHA256a480ab2cd270ebbbf7ce35b574f94c8b5648b2703a810868050727c44529c6c9
SHA512620c14d8b6e3a7dbd21269cc65f01e044ecc9b4191a51b51e294a44d125b8953bafe41ba5bba9c8fe0edc92fc9d62c9e72fdde87c57e17c0aa465341647eeff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e6bb4b42fe6728ba1c08ce2288f1a29
SHA171c39ad7a828b3613f6b3ca7f89d25d30004b6c0
SHA2567d0ce7542e4a592f7435180c14db6374b07b3b31a99ddffe3f12d18f89a27224
SHA512ff49dca9d2dfcad18b3c9deb084495521062ce3b18454ef9c491e5f026c7693d9c21b5fcb6e722d22fa8e354a8b588899b6b1b43671cdedda6c0c1b525ddd343
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f3f27fb7ff9399ed8fe07af142c39de
SHA10a347f1cdf72297bce022aff3409222cf1510b50
SHA256c3e80f49e1c813b1fd5478f523abc87b09bd80ef9b8f1aa541daca52d4f49e11
SHA512c3f543741ac8b8c0d76366d3c02b920bafa6bb32ba0744b95bc5d5d16ea1c6890a98e2526bb37bf7eac653c9e688999b02daf3b2323c4dc0d002ad36d7b336a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5125bec0266e93fe935708aa54613fb16
SHA11513dafe5a6ca10a883c44854952177994193743
SHA256c8cbabda5700c93da547124099fb436f74a569ce65a3aaeee244b20bd67ddfbc
SHA5127e6c1f94cf164857dedc065faa3a093ef41db571d870ab113f93aa55f92de77c4b5df81cab603b9bf367c2e156da3d2490182f62c6ada5a0c8ca3fd6887205a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c83a71cc556927392ec2eb5d50ea266
SHA13cb1253b96b977df863f17510108ac918e9fcf1a
SHA256e5f4bc44550ebcc11d9de3cefa80ce73529fe722e8858af2b1bc2dc6092204f8
SHA5121b93772b6e0a5b879a5f5cbf597062d22d7ee5c8428840baaab20344e8076916fb742db07cdfd880767a57890ad468d0b871d4bb2bf82c4738bf17d3b3363968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561a8ebcbb9864f918ed9fb5c4fa2a873
SHA134decc3c15b6d6935ce93c34df0b818639486683
SHA256819f5bb219077d5c5bd706e08a1215f2d8694b734af057f26bd4c76963a3516c
SHA512ccfc63729e534ac6a8b509d7ccad05cc996b29bc1c7813d9c3a7361fc09a7e397f9a129d7cea01fc3378859fec15169535074764009c8e37f31ce046fed8fc0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbe9bb19d312593885b71d9d393b50ee
SHA177004e3107ace1baa6d1a4dfab9317d1a96c3dca
SHA256a200ad94f184451166759be1e37ce2b79dd6e040eefd6b2ef93fe8b593412636
SHA512044a733d3cc669682f090cd945fad95d95fc721b5903af27a4a4ffd7c0c6f5818fcb8d29667f5938e958474957957ef613a90d2872ea68a969c135bcb31ea9bd
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a