Analysis
-
max time kernel
142s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 16:13
Static task
static1
Behavioral task
behavioral1
Sample
63eb08dabf7660bc879d0fafd2f9b867_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
63eb08dabf7660bc879d0fafd2f9b867_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
63eb08dabf7660bc879d0fafd2f9b867_JaffaCakes118.html
-
Size
60KB
-
MD5
63eb08dabf7660bc879d0fafd2f9b867
-
SHA1
e0bebd75d5aadbec25947f31b6fe33db8921ae8f
-
SHA256
84d0b0a12e90b9dcde51362265bd10e204ea68dcdaeae5648880740ce52d5085
-
SHA512
498c7d30f5afddb53cb7009d5047885768eb8bb9b0996a23db666534222f30f4e673641bbc2515100af6cab26c4cedde7416e1167682b2e57e2d13e417d1904a
-
SSDEEP
768:ogOriWNcaSo2FAUxMbSKOMQ1qdxBFp8m0HF/JNJOF7RKogbbB7GyVrKdktf7pMu7:frSUWbSK16Sds
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422469899" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20f68c089aabda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000002fee6abfd273d3eb669065af76653130676ece36526574953c54dc09abd61221000000000e8000000002000020000000734e5618e419f13324e109f4ac48a9de9e43410f9cd4042c8da6680733bdb57e20000000ced13d595416e4af6cfae0b857431f63cba63f84a12825253a22de70ef9059d240000000d976b1ac60d81555ad0aa02b463fd1293f5a7262797036cfb1aa2834d96eea190bd2c596df16775e3f352f9b84ce75fcbf7455602e5e8b907c04bcd44d0c00ab iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1CCEDF91-178D-11EF-AD96-EAF6CDD7B231} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1280 iexplore.exe 1280 iexplore.exe 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1280 wrote to memory of 3020 1280 iexplore.exe IEXPLORE.EXE PID 1280 wrote to memory of 3020 1280 iexplore.exe IEXPLORE.EXE PID 1280 wrote to memory of 3020 1280 iexplore.exe IEXPLORE.EXE PID 1280 wrote to memory of 3020 1280 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63eb08dabf7660bc879d0fafd2f9b867_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1280 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5df80f9ba75076db634761b6132e0d4e3
SHA107983946fb660752c7cccb2ef82d01ec4c9ecc5d
SHA256d5ff96fd8b416de93a85783192206224cf8821c240cd8ff755f2e8270153dd99
SHA5124ec734c5d29e9ce00b00e42b627253195e8c7a158433fedfcee428e692a6501981c33d7c8a39235f8b691f087145cdbe660b430493edbeedb12588c5cdd5a66a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5ac89a852c2aaa3d389b2d2dd312ad367
SHA18f421dd6493c61dbda6b839e2debb7b50a20c930
SHA2560b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45
SHA512c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_02C4C6ED250727F9B08935C0A9565568
Filesize472B
MD5d456a7204acd684da2f69c4f0c5d14c1
SHA1d9069189770d3c9e47cf4d3b1750ca48d4f2bc7b
SHA256a90ab58bc9b24fbe138bfc66a3062a01cf200fd9bbe9804fdb423fef3afcbe28
SHA512e8d9354b20bace68e8f66b2d7b45b792696caf6c1f4675864f1e4e8f2866c3e71bc4e99cdedb72b09a53d45749275d00e1b365fbe1480f18ca669f825eda8e2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD594e18794421095869df22e075418894b
SHA17827682df3c462db9a7811e2ce5cec32461c52fe
SHA25609d37610942acc734515cf68c4d0279a4f5c268fa7cbb50e9de9fd32d9349bb9
SHA512b14fcfd5bc7fa3d207200d153be9e64e09714bf2996cf8bfdaea1d1373973575998773b6ccffddc4baa19ecb0b32f1d2da823bf4d304518b1a6e127adea80b36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54004a817609113248e3a71fade99f80a
SHA1ddd863533775e3dffe7ba0904356cb80de7cd4a8
SHA256660b7de31d5990ff467b419c148e5861bb98a79693e69f8a2f08620da5ca4b1a
SHA512438381f98d1f9354c5199998a70a02fc93001f600d41f24969247f73b503a0a4fd0c5c0ee0ef9fb4de580672171f83b3d0efff0e1af3445752d90c31540205bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2ec620f83ac9c8aaca352f72ff0a827
SHA1940833a9f110d49200ded59376eb85e3092568be
SHA256d36619548ec2f6575ebdc0188f1b4139021d49ca674890af35cf96ab067d3e7b
SHA512e646343286bfc9fb2cae14393259e4134b94a2980864e45ae417f6a993144f28732b3ab4b4e6effb9920507cb3d37d9f0e065edd9aecf5f16ab96028af9725ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f11f77322f58bc44f69bd018f3be7b51
SHA155b66a83ea36e92fd263eced31da8cbe86d269fd
SHA2561e50ff6f820bd20f067e8c629430eac4928d2be708b85e569643523932cd8c08
SHA512265abc5d31fd3f576d3ce129501bf065b3fff50c4a9a2053b476022d5e1cc6e3290be4a5cd1cae4b539376334ff44590fa7fc8c2310291fb3ecc80e2a9987c1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b228e2b804e8f21a87ed034c4d67ea9
SHA12aaf9325023a1d8da142ec84b2684cd8e7050bf7
SHA2567d159a5330dec9f83c40e2a0c1a51e43678dcf9d5c17a7f664233267eb884ec5
SHA5121ff5da76315661195a05aad057e3a9dcab799ab441793fd4613f16af805c4c8751725263faae7f6a39fe10a09e61dad3de27d570372592ddf5cc2eb8611e73a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf45337f71bcf07475e0df271bde44c8
SHA1a326fa4937f265fb27423f195806793d2deed061
SHA2566ff2b66eb7ba3e61f54a84583dbc9ede35f9ae82f510323c97b87099da0f9918
SHA5125a864b8866aafebd77eb3d291b717f92e1df5cd9d8eeba8598ffd4d4a42833c8b3d85bdc2412582449d9d5b8e5e240855de7de32b00acea21a5350dca0b9c058
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5906f4064c4795660f148a547c8353666
SHA1792eac4b7da676e2e7c57ae43759460a832d1adf
SHA256d4fc978b4e5332bef92bce943316590d0bc0f5171aabefe31111a0e3be77fd45
SHA5120ab18e5196839eb4c98d983f4bed7e3597d955640e4322846a9ba08b2646190c7d0c6fc5a3f5207cf2610b22925ca51c9112f5e81735dc75fdfe7d11351b2aba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54616ca156feea4aa4b116ad01783ade7
SHA18e59893c2b45f532c14b60ea56941d9ecee229c2
SHA256265cd67a61cb00f328faaaa817861f50b25ddf6cc9ef00a30e0fa711648a4260
SHA51267406cbce632e0f2ae9a8988565c2928025d7e9afa9b42f84c94ba86c3e057d8b9e0ed496399c32a23656fa7d30d2a3800b501cf586728011c14e292961d4868
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d79d4fbf2b5ec97df59409b918fba621
SHA12b81aeb887d8ed74c86b667ff456174647b2613f
SHA25644d701d8bac81060b345925d2249c194350accf777b9cd079c1b9bb19b4d4314
SHA5121a6c508791199c9f7c42f50ffcdabb0c66dc044683ff1879a1482a8d18fdcff1a39726a809e7752fa4c5f0cce5fffa7d48f0f16bf46d7236eae92aa798536fb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5504e9eebc9d43de05e4dc396cabcb29d
SHA1fbc2b25e2965d53377e6a269ccfea090f71a5c9d
SHA2560ecb655c60647669029410cc32eacd223b3b9f4b13bd21f9a90df4bb1ea4e37d
SHA51258861c5d8b2dc457b2d4545ee2218f5940ff288c55eeb3b95913cfa357861f9dde5d35ae51897f9647737c9b36d661a5de727859c4b68441d18af2425431ac75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5883d5aec67d966689caedb8479763e11
SHA17f512940b657e6a9f9f4c0ed8d5c8e0c7fa79479
SHA256320d97e1708474ca557c8007ee1b5f23ed4bde78a2fcec47a8436c03df5979ee
SHA5126bd091a2fddf752c3a6ab492c4dde548253a3ef33c6354188fc5b12f045d81d608b192a707f89d320f269e2d50337cb401f43a27b920d7441132538d4507938d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5627a7363b612b3bb274d70fe78e1e014
SHA11d6265dcbf67ed2c70f32a2bfa540932cbc7e088
SHA256e0ff58ecbf04d854df82b454385c41df3bf3322be38983a07e012b4505672a05
SHA51250a842520310a498b6c83161e9764e689c2298f8342832d1faf258d0bd8ef9e6658f4f6e60ea96130327d7e4bbf708d53c66c6de337a7359c7856c7732cba5f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53298a7dcd6a0f0ae8b47cc743371ec23
SHA1aa7dbb391cce330cde3b26c627f8714e15330a7a
SHA256220ada66a42928baa48d3ee18ebd318c7cb4e3432e4c65fb7a93a57395386a7e
SHA51225ee0a1c0be8f8acc9f2890ab69c91e76d6dff70605e65f8cd2370fa92bca9dcb542183639c6993e9f186e93f231925f2ef3c319d78e6acdc9bcb7b4b41349f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD57e03cf8542794f79cdba25726053d0a3
SHA170d1e101dd1024c1e797cd9b7d87792d92dcebd8
SHA2561824fe0203f801ea4c56c1db94d3e256165ba0c776feaa2d62bf89ed91e6cf77
SHA512d43428e5ce3df90dcf7dcb031ce6550505063462bb1f928b0ea2b3f1442e25681e9fb8cbcef7b92a7724d66ebc6084b0c63235c03ac1d65c589d808e8bbeceb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_02C4C6ED250727F9B08935C0A9565568
Filesize406B
MD599f86f188197565ab28f1ecdacc11b6a
SHA1e03145926e2bb7ba332dc4a4109edc1a8eea3cae
SHA256f5f4cbf7f38cae6b979125c1443ae0c92d9d96555d58b1648dd2f4466d6c9ce3
SHA512a2e8ea40d1089a179f1f2b7c743d85d21dd013a9f931ac218c73b9d9827b1b9635ea67da406ceebcf0248ca1bdc92f0939baf1ee6319f6ddafb1efb6172cbf83
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\IO0LJX84\plusone[1].js
Filesize54KB
MD5fb86282646c76d835cd2e6c49b8625f7
SHA1d1b33142b0ce10c3e883e4799dcb0a2f9ddaa3d0
SHA256638374c6c6251af66fe3f5018eb3ff62b47df830a0137afb51e36ac3279d8109
SHA51207dff3229f08df2d213f24f62a4610f2736b3d1092599b8fc27602330aafbb5bd1cd9039ffee7f76958f4b75796bb75dd7cd483eaa278c9902e712c256a9b7b9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\SVBQZB4R\cb=gapi[1].js
Filesize133KB
MD54d1bd282f5a3799d4e2880cf69af9269
SHA12ede61be138a7beaa7d6214aa278479dce258adb
SHA2565e075152b65966c0c6fcd3ee7d9f62550981a7bb4ed47611f4286c16e0d79693
SHA512615556b06959aae4229b228cd023f15526256311b5e06dc3c1b122dcbe1ff2f01863e09f5b86f600bcee885f180b5148e7813fde76d877b3e4a114a73169c349
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a