Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 16:25
Static task
static1
Behavioral task
behavioral1
Sample
63f3ce7553b792d8c24eb05f652d2f5c_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
63f3ce7553b792d8c24eb05f652d2f5c_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
63f3ce7553b792d8c24eb05f652d2f5c_JaffaCakes118.html
-
Size
94KB
-
MD5
63f3ce7553b792d8c24eb05f652d2f5c
-
SHA1
982227a2557461668b091c89970c78e4e9ec9ed9
-
SHA256
eb5acf83f82a443069adad53e6ae0774cd8bcaf2ea54f4427300b270d7228d87
-
SHA512
c7dc3c53d799d047b810bd6d1803cc4025530aae1e7c7dcd950d49d22727d4677f6a8c65c583ac068c9a7734a43e45fe9ec4f10de011766549ab06b29e442d37
-
SSDEEP
1536:WMLiNV+ZbB7Lp4SAC4T4FLfQ4EhFL4tLPIZOy4NBdkrY8mgHC+qpEyW:WAi81hBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 403a70929babda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422470597" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BCE2F4C1-178E-11EF-99EB-F2F7F00EEB0D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000007906a17c19cfb9acf43943b4043a0ae086270a688c6d588a0396c533f35ac70000000000e800000000200002000000052de59fc49afd0c045488f4d5f6c32e981fada910b23df859bb5179b5898f374200000009597347a03b4d3bb7a1ea43d1446b28c202ba1df3f44c3e66ce0cefc453c100e40000000812d01b64d94c1f488da803d7f224c0eadab5f41e69a00004d8190761e8bcd6cd232d42f9ab093acdeaa8bb1659680af632eb1dd23abf32afc5e4b0419e02b91 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 3052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 3052 iexplore.exe 3052 iexplore.exe 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 3052 wrote to memory of 1272 3052 iexplore.exe IEXPLORE.EXE PID 3052 wrote to memory of 1272 3052 iexplore.exe IEXPLORE.EXE PID 3052 wrote to memory of 1272 3052 iexplore.exe IEXPLORE.EXE PID 3052 wrote to memory of 1272 3052 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63f3ce7553b792d8c24eb05f652d2f5c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3052 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1272
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4691672b46192e4308b542cbebadb5f
SHA1b2455961fc72939dbf37980f3bf455f27ba13b98
SHA2564b3698bd2b5d12840545ce81550c3ef31459b859994b9bcca7d88e63b2013a47
SHA51271e19aec0ec10d2d2061b1c9aff6cdbbe97aa9d93e21eeb0afe9c44521de1e870002109f389e695b2c8f679949c1a894d3af4aa315c509eb1cb025811ff746e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573b378579fb3c50624bbae6fce0fd9f9
SHA1d36f34b636448416cf69e4903ed72f1f28857986
SHA2562a61bf95186da274d13cb6eb6970eeed19c855ad450f55267270e64e7e22ab0d
SHA5125dc51176be4838b6efb19e8cb8f7f8deddd05b3f9cde09d92b913de60eb63d039214733fcb6f96bb3599ffc464b6885091cb9d1e53fed142215da8d8549af321
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c34b741352e8e2f6da82e33ee00c978
SHA1ce2281cacac6e6bf3ab4791f88db290b70ded927
SHA2564d9f96487a233fc6fa79239eae461d1eb2823df2a7425386d5568b0e3baba297
SHA51282bfc48a233063262eb00c2ff5ebf72dda452f1f9e0ebeadc2639ff7c6703423552f068163a5a0194b2403e5d1964ccff83e33c2c17828bf23441c103672387b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5becac10c9a81d4dc35dce999c487dcc8
SHA195da9624071f454b027f1bd86d29324cbfa32715
SHA256fe3ada6d2388bd0943c25b70da9df45bbe8f4e53e0290d6588770e646751fd86
SHA512a9b1f4e12f28b895ac7c27977950b9177d14e7500993d212f8adc3334827cc903dde6644b303f38efb31f557e0820b2c25f9cbc5ef129c024946a10faee15bf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599d6a42eed705888467740e1fe79defa
SHA1ce2f184dd24806e7a441713c081851cdd02c1f8f
SHA2561c111c7eb46050bad6c3558c9e980623bbb1015f76549649467d35edf399064b
SHA5129a1b5c02d347867dd4dac8b3655e9d63837a63f3f3ea5462f7bad32edbe9d3733a6d7d915b599218ca9d4b815549b5e921016f415066d4dcbe1261eb213cf9e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a29bcdaf57af840d07686fff4cbe08d3
SHA1a4eff7eef8abac560cd383890ce6b175ccbdcdbd
SHA2568e0e85ec12784aa2c244aad706683dd79170a7199c6076fc0806fb233f70a0f0
SHA512a4253d9eafc7ce738c6562c24ca9c8c39292f04b546509593e3f0a462b2894ee4dc49cc3a6315a2fb74a30886c4ef2e10f45a36861866aecd7b0e6dd96d91975
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae475cde43076745e436f0c2ad64f840
SHA1e051dab55d2cab2685cc891199d5a7737ccee4af
SHA256bf8fc358ea9c3930ed613f132e59d43d5e66786b837d3831601586de4da461c6
SHA5125dbc8fd048e05de120f423933dfbf07a4963c980c406c051c830f78e1ceb777707244fec72d6603232b15e4856a90893e77f38c7ef7b87f13cf92092675d5fb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504bb8babc1d99fe737077344ebc4abcf
SHA1e5c1a1955003ed0d8d009a28d6b962bb4964f5cd
SHA256b7b93cb26599062ca64722ccce48d7e97d393b2120b6bd5c2a328df1ee009bca
SHA5127f198428b7c80f651f80a0110c4a5fe8f696882c509486e6917b4601e7bab478a39447b32f76ad27952d7ee600bc00f4e1b11ff3f4dd04a697dc53e9e2806635
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b14b3f29572e8234ae6c9c0b34fc8bfe
SHA1887e65271536bbbed9eb6ce88bbca6670a1c5663
SHA256d9be488d1cae9c514d5a3c9c5e89f2e3b7739c9765563b33eaca26a6f9adb6ce
SHA512d54a29a2d60d1ddc05ec3d7282eb9be1a92889b9ff0b87629175fd46a0e2301606301c08861d07772ec212ebf771ddf6f253810168c1f5f77370809fc72cf1db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5554e3d000402694210dc120b0125fafd
SHA1bc63333a2ca3605233d5e7aca78bab2adc36de5d
SHA256a25d5f4e4203f7ea7e267074cf1cd0935e7d976ba87e885aab57fdbf2c3a847f
SHA5126ffa9e891fa610c985575c542bc7668df50f0532576a87f36a75ad08e5e667fb1346e74f400a3b29266b3d927c7aeeddf389e918c63be197fc8d3f6aa3a49c1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505155ea2e52588a80fc5a32e152347dd
SHA1291dea86cc086adb2a550694eb477c0956221867
SHA25679013fa716b31e37176d6620b74ab761e89df3d2e74be1c5e8a6c52b5d573245
SHA512f26f6821f42452dd1c0d55c10c6c886557ce6aee8b6a8ca662530becd3737405e8f548b4b7b47fb8aff936db13247df4e53ea39d828358b4fb96f1a121353d82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540d889e04ad7ae6cf76e66349103ff9a
SHA17bed62de6840a2c2626f6b27411ba12caed369c5
SHA256d15241a39fb809aecfece5f175c272e8ed18a7c7a1aed6325c5867529c09aa4a
SHA512cfcce80ce7f2f53eb618e47e7b79a53b8b51a4fc196e2dbbbcb5ded73c96766a64b02f676627b8b3d97dbcd416895b9244d693d57ed8958141b67a832e175bbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58643042d068544428e795a9c0e680b95
SHA1f8f3ee8dc8b6d70c4d4886cc883f3b5ca1431a7a
SHA256bc0f1b9089a689463358083a24a4ff686266b053096f71fef133f846c00a73db
SHA51206577914e6588cc745cec95ae606c49288d3e16bfba546b2242c276fca05a47771f5c6ee0f5c6b103fde9a9201c10cc05374148898a35ceeb912a1c95243f15b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ea16bd73aee68a48d6d3116dc52caf2
SHA162685cf0de18c7b0f7f7e48a328586fe943e7563
SHA256f107f4e20976742ef0c70ed55c3096c868013580fda4d886fe4792b4b55262d8
SHA5120f98eb266619b377d37b32460499b6bfd0202cbd04460fd6c30c14afae88fa5c552fe07ed094f9f38b549c2acb747f5785737b5c182ab38da0723bdf2e485632
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a809cb17e4c0f2eb59c916d8f42075db
SHA10b3a171b5b61d62fab03d626f7b15a3997f642e8
SHA256a93f23f531db13dafbd0455c44597c6890a29771e791deda254032f9b7c2a52e
SHA512068ec0156f17b7610deb3c2cb9d6715cb8dc6c2733d8e4452b4fb9be7a551a827c3dc14165528123db6bf5ba6cfc5c66f3cb6371ddf70da4a2e500b12c090089
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bb2ad7f23139fe45f5fb79d2fbd2aa6
SHA1cb742492d466f2eaad31a70ec62665aa1599e15f
SHA2568a479e14dcb7f61e46078c5ffcb851d142cb0e2e17f99ed423c2335ee752a84d
SHA5129bf54eddfbd2d3fe9acada439200c30e7a374e24195049739c5046f8c74a25853f151836954b18464dbe1afdc428e71348f8001bb93d01e72436fad78bc9a95d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2XHJXO3H\styles[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a