Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 16:17
Static task
static1
Behavioral task
behavioral1
Sample
63ee57cb5df7243a9197a8a32a3785fc_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
63ee57cb5df7243a9197a8a32a3785fc_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63ee57cb5df7243a9197a8a32a3785fc_JaffaCakes118.html
-
Size
4KB
-
MD5
63ee57cb5df7243a9197a8a32a3785fc
-
SHA1
0d377349e598712a30a531462d495ec9f7d76fbf
-
SHA256
bd730127bb162b36dc3ed5c71bd842f3a2e306da4cbd2c56ddce0cae469931a2
-
SHA512
925bad6a387711de7642bc6321e46b05f7da61c4748e22227fbd860b96502cbf24add2a23501f19fce942252d21741e54921803e3c1e57fc8c534d3e8037716d
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oiRbUKd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDf
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9C5E0E21-178D-11EF-9A0E-5A3343F4B92A} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000540afca3f92423a1b7ba3ee0ef1d7b44cc35a6dfb1b9675a08a9cac5221aed67000000000e8000000002000020000000fa74de67cc21b3a258a39fc2c9916c873570c244c1f94d735794ca639b4eaef5200000003bc1c297b927ecfd1e2cd5198912e5c55a964af51015b47dd6097a4fd2b55d48400000007042922cebbf776da8c867b68e2d06373984219dfe2a4ca977ab4d7d7ec6819ebab3c7a63ba2dd06e63e3722f38f82a8795ba01fea0a009444993a867eb778d9 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0e4de709aabda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000dbe63337b63f4b9f21a25eb7f741afe6051a2bb11fbda5d5b1ce96193657310b000000000e800000000200002000000030d5fc12ea151564ca699a0b132330e70ba707fa1b0b7c222e040784804c88cb900000009c22f81718a608ae4afe62c7d90a542ef3b0b881a9d3e1753807e566b93e470d455c7bf030f2fa54c6eb027c7039d29ea9b5822cd3e87b3802469fc228b75e943641b82367df4910020231131798d1c12833de60bd5151b6c0118ce1e7e83d8d71ca64c269d8005db8f4137330c5c21e24621ba14e438fbd4109881dd0b0d43d0a3cd756cda73884915bd8702937740440000000014c28c350f8e6739fc0dc487be46d715e90c5cfd19426af49ead930f7243d53c9ae293e784cc9faf6eacab0ea96f61324e5872f8d890edb1d8162cbaff223b4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422470112" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 3000 iexplore.exe 3000 iexplore.exe 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 3000 wrote to memory of 2852 3000 iexplore.exe IEXPLORE.EXE PID 3000 wrote to memory of 2852 3000 iexplore.exe IEXPLORE.EXE PID 3000 wrote to memory of 2852 3000 iexplore.exe IEXPLORE.EXE PID 3000 wrote to memory of 2852 3000 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63ee57cb5df7243a9197a8a32a3785fc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57309d93d9b23ca0e765ee3cf22ff826b
SHA18166290fd9bf32205f4386ae3fc733f62dbfd3a1
SHA256c9f328e6292040b35c6c56da10d6649b7e14a21b635e27a62a03198521abd1b2
SHA512064310591f1814f6ed2255458d997e86b062f1088bfaf4994032d02ce255bc6ebf9f9ed16f87d10eb3f8909565911ea9daefbd510be68138c8c856a7be91ddc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545072d4176243b3f2cc090c7800d5e94
SHA1b33160b4d4bfd34b679a1455cd9a189e7344f199
SHA256d3e5f5092bb962a6ac057cfaa3b710156f3ea8bad91ae13b454c2541a510efd8
SHA512e2d427a1c948e6b216bf99797cae3bc47b1536a35377ebe325b3f24d3533a6a70750efe1b1e14223af27b351e114bc3757a26289137b704f5eb7fa870555d77e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56aa12234becfd6923fee599b9733574b
SHA10edb982808a6c3892444fad472c03be0fcbd02f9
SHA25603ad01eb8e4ed6ab2661d9282e4fbaaeb49ec376f938fd7fedfe8a62a52cd8cb
SHA512d41fa6205a8f776d5a12f3a464197166fdf18dc58b9fc461eec3a3c0ca67e3aaf70698e3c4221f11f46174f39a2bfdba6413ecb17be8d3aeca7efbc3e12fe7e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50aa39a9174129368b88ebbfa95474155
SHA1dc664f7d5bee8b56802d9aff0cbc30daad476a67
SHA256f086b376e4e54621f0c0f91cc4432af28d86d117bccf8d3199a74ed952c15cf2
SHA5123d47ce879271a2fd263d64cac6e2c883c48cc71605e751317b0f3d8874469c6354f49916ff4436c496462a7544eb5f0582781a90ead244530c390c2299225b51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59add5e4cc944ffb5a71fc0d774b80110
SHA146610bfe4983e640773b405b070af523050827f0
SHA25621843cc48542b14f03736c6b43b4762ae8edc5ed3119668d82c51b168bf6d374
SHA512d8c0615286e2db6cee2816a90e34f43997e44d46f52992e47253ddf79ac80e7a0f76721a99a2565530e7aaa5ecd6f2a1d479d70a144ea2062d53cdf9bfee5b9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fcff0fcf996e2e41c9c487e2c53fcc3
SHA102023d4e9148b4f33cabb47763173379a656ea9f
SHA2562f25c9b748c9bdcaab674b1180f862f973b174d7483f5ddc591ab016db2b4425
SHA512e6e90e994974b6603522d58b4221a7027f8b4a114474dbad5caed0de9553523465a7742fadf01bb4aeb4ccccb7d246f9149cf343dbe54a4c3f0e2a95bc2477d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a388c0c7de92e0feabf9781e0af50df3
SHA1c89697f0f2ee555d035db7d69f5bbd55778252da
SHA256f5c3ff0e68a0349f170989aa07f03a367298d91b93acee5d708a47af75230fe5
SHA5123046479f0d47d2b46de4b4d65ef21c738d78bada067fd9ca2b0c028c4350c7b9dda8eae9ad10c3f1b04ad97014e7512aad3f6791f219e7bc96b2f6576f0b116a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a481f26527f1ff21005860192eacdd3
SHA1aa1d8682cd610fc8d275525c4140d308d44741cb
SHA256680c5d7d103ddd010ff59be22237421ec52d5b5ee8f9717a60c9911d515bb898
SHA5121ac18985085e60e58618c7da1230e2f787f81b0c1bf4e9597f0b98c8afd44d0796b444a2c64d11f50e5817342556e37dcb2922357fd71e409d6ed1dea072f79d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f65dfff454cb613c8ce020e090e3e6a
SHA1352c4a2fd0078575113eb2469ede10f2140454f3
SHA2561b3649b90b03e6c3a641996154e0f0d39ca8c424419e9ab1cb7b4e1233c385a8
SHA51270fd872c6faf3dc68d193c0500cd5e568c635e8d74f4ba4d2020c40baf8be1029088c14c0025e709d5d6b041370beb31844e6aeed70dc3f9bdc79d41901a70a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5938a43edb0a7a2126ffa7af695f6bdd4
SHA1231b9387801343eaf6ed29546497557e1e5f0828
SHA2560902ee365bdb95d254a93a015bf2ed6fce2d706d6a5769b6006450877aef5547
SHA51260f8d13bfafa6e5c6843a675b9bea7cf6afe650cdcdf03777f2f04cf6544c4cc2029b297daef3645772e266045b2c2f0fef235a3793548000c5893219b6a13bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdc58454e4bdcc461b3a4099f793b4b7
SHA17da7f5bf445a777246a88e046721fce3345f0b45
SHA256e2482a66345504a2a1cc0048a167a63ceea8893e99d264d24f3719895fe621af
SHA5129c68e0644c7dd5ae6fe8c71a00b4fd53b7a8fc50d529e33146aabad3ccaca2e0f37e5684bb7ea633dd8f6fa7e9b950f2870ca5d2d36c9086c54fd6a15b200732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51eedffda81517670613faf9e9e390d8a
SHA1a274587cace3e9c9c006ac9b5b01890773feb4df
SHA25606e3d6cf90ab10ab00e3bd0aac599bfaff54b346b6015d5a4e941c7406df06e7
SHA5122c004fc58371a2b9f229968228b50a26ecf8a21bb459efacf04f69773ec50271d8bda5127edcdd9cdfbce774416bdade30ee834377b4fea147b22eaebbc6a124
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f79da937e0e398c573bd69d91a318525
SHA12563062d81472d93740f89eb999491112b09fa17
SHA256d380b10e58e858f174ffe88298c35c275f6419da79e16b4ada598699f590c32c
SHA512d0ef1f4e05b29ccb1be41d599ef373145a4b73774a7425943b0c25f94785ca77dd2f0f1802051744e1dce08e405995e9e4460932752160ecf2b2c264beffdafc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb9815b72e58715ac5138bea27d6a46d
SHA172e66b120dbc3a87c94ffcc15a4b7edd9c6596c4
SHA25679cc07f610769e5612c2cd1050aa349dd822ff6143262aba0144ac39971adc39
SHA5123e92a543a192bdb90a174f48d95b90aa51fe9fe73f43ad941137502da34ca90f04d569e3a5927c33fbc145752aa16015c0c7b626e01209aa668403c58559e445
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1e504589cfec7a860432043a51b0adf
SHA172fc84b481f00e3f92bd9318fc1d9a770edb9cbf
SHA2566294e878ec8afa5f25b5b53a67414eb7242e3d432938d5e7f98aee8b2577edec
SHA512e8c54202d82c7903d757bdba47ffc77a9f12b74945ca37d103fdb3a812bf7fcceab95b3cf57d96d2f8154aaf49c667758c8e9f79d01b42fb0df807cbd6e4ecaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e930567a7eb7685ad9782cee5f2f8d2
SHA1d93e0c6da8b2ec8ef81e4709e19215826c3f8c70
SHA25696b48c6f445b39dc11e665ec1d51cf595a86ced3760f6cc5a404a553c9669a2c
SHA512321f90730eea764a22f06ff8d1ceac18f1ef753eee9dab194b8017723cf86124f7286b1867020acfe716ccb4584691dfb77df6ca65586ced4de1366fe453501d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f50719f53c543f1bd45b568ae6d4959d
SHA10bcdd5b2301f030ed9d06ec4ccf51f503aa648a7
SHA256048f5d2f0ef30fa13e52a63a3eabc0296cefc15a3cc05f2bb81f7e72bdaa4b6f
SHA512a4d4e14a3226c75dfbd93191c18be525b4b07d8b3b02edcf3568ebefb536a6e45fb81fa2a84fc0752126e081dadd92ce6b4849d83ed31006edc8c0ba4b84f72b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a787e3414f7bd6a776d275a2bd77ddd1
SHA1d43e85df4e6a0d1243fde1e880f92ea55198fae1
SHA256d47cd4ecdc7e87ba03edded1fbbb526110ef246872049adba5ba98294a454499
SHA512ba01a71f4c02ae0e23dcb34e1eece4ed8349bc3f2fe6b242b01d72f6099d8a2c8360c123ba411db8a4e1d5a4d997d6b26d23b7c15b09588df8acf12fa9335791
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a