Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 16:14
Static task
static1
Behavioral task
behavioral1
Sample
63eb4c61b65c2e836e09da6bb70f7b21_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
63eb4c61b65c2e836e09da6bb70f7b21_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
63eb4c61b65c2e836e09da6bb70f7b21_JaffaCakes118.html
-
Size
4KB
-
MD5
63eb4c61b65c2e836e09da6bb70f7b21
-
SHA1
dcdf86fdec9184ad1c01da8456ab1620bac93ba4
-
SHA256
97ddd0955615fb90706e2d903f1c3abc895c00fd51efac5193fd6c3ea419fd04
-
SHA512
ff02746b2d60a79cae25e0a63f90a9112113ef4dcbf3ef0d62a9e5cfc9ae00ad2d92f17096bfaa5dbb55e806f6a53ce9fd63be2a1f1a8c9f75b8318fbb6c7cbf
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oLfHgd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDP
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 407edd009aabda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000d5757540704365dfc42d668872584cb54ffc3daf51868bee48de5d10036c507b000000000e80000000020000200000007767d34846c6fab92c07eb392a801dd8c8cc6e0c5c1b696f9b70ffd16f8853ad200000007acf196e9fdc6d604a0b7ea8217124b2f8f242fbd599d57d1892eac34a967b88400000007db8eec14df769566ebadbf6889b8dbb1117627f1a2ab04396cbf6b7f73cd830a6cb219b15aa7b982776e828391d6ca39575d94be0cf65ac76116872d9dc2045 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2C5AF9D1-178D-11EF-99EB-F2F7F00EEB0D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422469925" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 3056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 3056 iexplore.exe 3056 iexplore.exe 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 3056 wrote to memory of 1272 3056 iexplore.exe IEXPLORE.EXE PID 3056 wrote to memory of 1272 3056 iexplore.exe IEXPLORE.EXE PID 3056 wrote to memory of 1272 3056 iexplore.exe IEXPLORE.EXE PID 3056 wrote to memory of 1272 3056 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63eb4c61b65c2e836e09da6bb70f7b21_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3056 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1272
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5606e91dd59574b716c129b2820eeb29c
SHA11a50bd7a45ef6903282eef43bdfa71bcc9aca253
SHA2567bc7de8b0aa88f47c7c99e0cf725c786ca06512a103795f9a9132036a99f78ff
SHA51273e6b3794ee3266fb16252fb8544f43e71aff4948912f18e218743e118c152b1c6adc8af440209bcd61677ce937d16c9f0601cda810b21d46aeb06212d79f69c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3dd5d81653f27f1e0f2b10a7533dc93
SHA1e320627e6b8c23c406d892adbf6ddbac705fac8a
SHA256b626316440056ee246a93213647a3f95495d7df15a615e581906661cf9b5862a
SHA5124be220cc88fd9e8a17eca46c03af9e0248f0b46241eb63874c70743695ecfd1050c7cc338149ffac8fbbb3d04ceda44aa4aabce7fec3bd69efd1d8f6568118e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a258bf00775c6c0b69f5927819700fd
SHA1df719ae061dc001d35ebbd960695681a60e6f242
SHA2566108d679dd31431fb71f73da128f0060a067c62c4b7d1530a5b5eaa3d1617471
SHA5128934ba8fac5dda713ce2cbda6e339fe3903eac14268e4143cd19d47bf2fa7240348643679daa863a894b88f9f072016403c9f1c378cb2e6dd61935cff16e24e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c1f6be3c05b4145ba144d988abbcd8b
SHA1d6864ff9e4d8972da6657fa437de3cd79ac8312d
SHA256be6a7a9e29981e225468dd88c021e5a930eee83325fec5df2b74f69f44154137
SHA5123e6ec6dbdb9f6f45581915644930b9d8d25e4c598d89a19d65f3a7181c229646953c5bdd3837c8040ef4c0873153afbbf1d1d7303464d255a97743211cd5e735
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e87d228e0304b35cf70a22ed4b5a042
SHA190a6a50369388a1fb9d7b96fc1a544aacb3d9ac6
SHA2568292ab6888399bd6aecf087bc38c4a40e7adb144608750eff9789f14a16a165a
SHA5120142a2f39ed48a4ce250d382131775dc49c9bed5ad428ca1d1309ee61b43def29ef58781504fd927b564f37d92c0b44e24052a7aa1dcc25649c0d0c89c3b28cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555f6b79d46bca6e4e5dc7c3e563ccaae
SHA1aaa04584eda9dbf52c42e71f8c3c12ed3033e701
SHA256d13d17ebecfb8265f8a6e5c33e88e6b9f00d3c4d63883159d308f9a3bc27e28f
SHA512ee4c0a5a8a92970f4ff3e065d976639c7ee3f6782a8ba8b2370bbbc451c90a6a4cb3e86576dd2d2eeb7e7213895d830151aac2052169318b017500daafc9ce9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5399d5a9c4c1c0cfb87527c236747cc1f
SHA199fd0184639a726a965a87604b330e589e2c263c
SHA2566cc66e60f243a52035602909b55ae34881be4f5443048c0839dfae0b9da5cd08
SHA512942b00bfdb090ae4a64ee93244c8c0ade32f1a1be3f541686610adf31d13321eed6746bdfe82730c344b12e1d7711e6188481fa02096fd74adca8e507d25011f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c447a46f7c359740c87936feef431dd0
SHA16444cb483817a2e4646dc881cdf47bc24ed56d6c
SHA256eb0f1ce4d5d98a1926099ddf57c7c364e8cce9a9989b9d48255dab98969989cb
SHA512cfd9cc736b3e8f8348d5560945cda7ecdb95be689cb23c80678ccba1d36495189565c83ef322dfb3ae8bbefdf60c15883c98f7ca5a4a4cd91dc29f268b7a38d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5039ff452b7e94f9e43f16fd00f0d1d67
SHA104f7d78e0b44861111ff7e8bee1c5b3eb91ff349
SHA256f2ccbff19e15106fb0bc65dd055896c94066455f91776d6acc84839c19b7dbc9
SHA5127115e86935ca6842912bb10fdef84444c2b64fad9eedf351c9e7e5cc30ba1f45620866d74a0fd2d38ec7f99b2cbed665c3aefe40146d9f9d8463b1df9b4f85e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f06bc2130d45958230e82eb3a9798ed
SHA130b7f305fdd4e14ac435aa7c3ff0763de3b2397d
SHA256aaa52fecf6842947d56a1d65d42804d12787c3fca8f783e1a9e243126893a1e2
SHA512e771c35a265cab2989159b548a2f814679e537b6b26a2bc38ab51356874c4dd63a5b444a671306f4729cc2a22af571fc2a0937f195ad85c9240c849930289b23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547a0d15f5de385730b2ed828fe9834f9
SHA13d0cfa65fa8408ad46dfce3c2d264e5dc74bda4c
SHA256884a99f675d64b21af19c743ae3787a73d01735d9f4b08ba3d71154ba149c802
SHA51220c6472e8f1118571622b2b4aad76d7bc2885e988d3a7ed12e992f0803f1064794b6a5268551adb93c04a1547acc6cc8eac5b82e7cc2cf380bd5750e349b9cb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5208e78ca562191fcd288ef6ea360ce2d
SHA172777c67fe43665090f9a63dd92db3811c0ee877
SHA2564285d0c5f687bfb8cbed1b0a98877e3d1cffdac4de83707e7ddda3f4e3cec530
SHA5123a21ea4ac3387958eadb56672f1dd5f0737358556b5d0f61d61601a37f54bc2bc0bb490d6be4516398fdcb532990cc6ee86d0c2c80d9315c8609c668ed6dc3b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af5a06fb52dc27f58d5fc2620f6a1479
SHA171ccd86ed7a75f9665928eec814d65b247192aef
SHA256b27f1764737ff6c6e75a88d53bc0c4e72a4cb4e489a277a947c1df3bf9405fca
SHA512eecff5069f5fdd3edb809df143424f84e1356384df601f151110433d085b01f206912c9bcf14ef8ca961421c549a5bfabb756d621b8ffe5d00af7f2fe04ccab3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a94add938ca2769ce311208fcf2267d1
SHA1ca141b118232bf3b98a3f64aa16933b520521a94
SHA25693938dbce427e46d09095ad140bb2c4888d7c88f87b137e9deff640ff960f7b8
SHA512f4a6730c50fee9f53f55e9d1c6614493cdaca780b6360b97f79328f9dcab9f04530a90535c802a1baa88b9c807cab8172f80e0a439c9e14d11af121a5d8e42ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563dc509fdab66cb1a6aaf79b91073ad1
SHA1a08b74a6ec83d5a713dfc59a232c90d60b86996e
SHA2564348411c74b6a479c6d77e437f9943153d6ad24cb3bd71daf5b3d629c24a285f
SHA5129c3c7313f3c1a5e3d09c953f417e4f5aa96e67803a5f2f85909e66da809688d798151ef7748eda1d84ffebc81829c20cf0b3004290d1ead5ac87e7ef17d337b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5316817f9d7f576e9bbd443bbb1f4b43b
SHA1ad6a6a55452cb73cec11c6f32d4dabad3d32fc16
SHA2562c831d3755c14fd8cb6970547018de5acca27d5e2ef9086166c3361b703ece4f
SHA512ae57898816472596136a6781f5f23143636ea2fcd9b0ef6c7a6ff14281e0896ed720f7cd5584552443fd715e953644a052aac0b0c0b39e14080543acea92d4e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d708f01be2df15a52de73ba51e03419f
SHA1b747031de70ef8fbf04b48650253b620f5e8ea8a
SHA256683ba3cf5ac9a6177ec71b341a71c6079f8115989ad15383f3dbb06a001a2eed
SHA512d261299a69ffe14e19ceb28baa95cdf1cfae14b62d0efd54967efa57b1907439cc1ec9a135bd41fe5c07f58c8dbfebf866ffcfe6d1cf5464013d04a9b18d0ca2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5798703d46968db262d83734d3f84d6b3
SHA1d20ce9e9b2c4cc4012e258160b06a3268a53190d
SHA256972ad336448aca13ca112bef9ca86734fe8e5ede6b47a4c5068877a8766b108d
SHA5122018bba5ac66d7634b200358bd51ff625a95498d5d8ad3df757d5f478fe347147be91870e17eb2f5223c13f46fdca05dfca10a81faf38beca3f663f1db0995f3
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a