Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 16:26
Static task
static1
Behavioral task
behavioral1
Sample
63f4cb808e2fc36a5c0ed72dd30ca8b7_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
63f4cb808e2fc36a5c0ed72dd30ca8b7_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
63f4cb808e2fc36a5c0ed72dd30ca8b7_JaffaCakes118.html
-
Size
41KB
-
MD5
63f4cb808e2fc36a5c0ed72dd30ca8b7
-
SHA1
644f97d90fe7044b4ad9c0800000f3121495377d
-
SHA256
6593c63855f43a4f43083f0a32ce3eb172b9610387f83c74efd6a303be61464c
-
SHA512
246f9650ee5e0d170a37f641549d00fe84596ee6893ac72e311dcb63fa153f6ba2fde82acfc021e28eaea88cc4f7b370aad436b8954dde1fea923a557722d764
-
SSDEEP
768:5zzKHZcKzX/m0bh9wBvZmQ+7Db/1axHnSXJJBjgtUwNtbf:5zzKHZcKz+i9wBvZmQ+7Db/1axHnSXJA
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422470672" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000a8a6842a9911791dccac0c5b5f2cd3f6c1acc7d3491d0f183b7df3e3c76b6e31000000000e8000000002000020000000eeb5efb6e4ba459a5bcdbed7d1b866285edefa39f846c5d383fe7456383864c5200000004039cabe04dfa8c932bb2f3f4544afe2b17b5872675b559351e3bc048a827bed40000000f018f70c41435880fbafb962b10974e82abe038a8c3069b0daea383f2d1f635d3f888a1c81cb89808d3e8b50cf3874a0b6235c14684b9c0fffa8ded748ef8a52 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60f03ecf9babda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E99239E1-178E-11EF-9BF1-5630532AF2EE} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2108 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2108 iexplore.exe 2108 iexplore.exe 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2108 wrote to memory of 1664 2108 iexplore.exe IEXPLORE.EXE PID 2108 wrote to memory of 1664 2108 iexplore.exe IEXPLORE.EXE PID 2108 wrote to memory of 1664 2108 iexplore.exe IEXPLORE.EXE PID 2108 wrote to memory of 1664 2108 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63f4cb808e2fc36a5c0ed72dd30ca8b7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2108 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD57f382b8dc504381df6f108bc9724546a
SHA1830d0265cc1a239c472f178a5afa590292780f75
SHA256b1d4a778cd2fab3e77da78a553615518bd74ea4a26089f2ca4804f3fb13c3d18
SHA512ee13a38174aed37b96bd8ff8fe7ecea9f1fdfb28081c8aefb380f538c2849c1ddc6a7fa2f3bbee1894b2660bf00d0c23d3edfbb9fbfee26ba5a0119c0a17490a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5647e72a860d785f4c4e38c741b2e751d
SHA13e22d33ff7d924c0e3af8fa79bf9ea933a9257d2
SHA256af5cf948dabe295e6bf0f200e67468abaeccef5f086eb690c13dbb129dd276e9
SHA512297d136d349de1ee11c197c8376948849509b94ee598ade49dc0d271594a71c716f0211c7faa461ccf99a55dce0ed875277219c80802db85acfdce3c6b2478ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD58d6b2cc3836d524d68b7e66a53f52902
SHA10130ee62ba713c845010c8baf9889ad4163e7ccd
SHA256711f7051a6c44b1685d22d1231dbcf57765e64cda5affa6cae53f60686578df0
SHA5126e642217c0fac5bc89b0fa5c2c028036669352cf5d71aa461a5ded1ff2b42aceac7440076a768bab7081e9e86f3f86b825828ef33e81393c7b23b236718f0c07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f3b190b538f6fe734e0ea9efb1c0adf6
SHA185a79c538630fb5d8597a56658af2722f0c26bab
SHA2564d419a7a20295ef5234139d7a7f486fa50535116d20f5e49aaca11bf32813baf
SHA5128bdea4e0eda7f3edc1572342b55826ab31619fe42f1060c7b238ef8be24fb8cea49a2ddd33451cd9a6bfff4d35592fd9f48787991cc9ce9874f8cf6581a54a17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD570bb32253059550027c15f4af8d901f2
SHA19919c247e1d5122958a16c4f8913984c0e32c430
SHA25670f932ba5f584b46e895180f7c7d53a9272b97c75311f675dad30218df42159d
SHA512d48480f2979736b663388c82780fd45366a1cd5062b7d910ba574c918ddc9f9ef0674acb45f9a0d03c99ff99770e7c67c5dbf5952be0a01239d70e0fa8c82c63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD532e5aac4b80464b16501307c9c39ab94
SHA1e9b93ea203257d0a2fac04a41745b4d039e70130
SHA256605ca1096ed86e6b2b9905d421e83c325b96a084b7d1a62c224d4f3673ca5eef
SHA512308992ad26624002e88bf8952867ee750e252ce49fc798c3109be1b798150eab111eb5ca501860561f73f86be3cfd0e7376e1dc5a6ad72dcceb14359ff539117
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD543e239f84f7011de03d06e0e1a04bad3
SHA148d909a1c1409afee1355cae8d79f2b434602501
SHA256d17a476179879a5ef9da1deae531cb3e7646c862974a25ea49a2b84f8c3318ff
SHA5124a84b64f56a3c52f942a09ef3979fd90aaa909cc7f992ec3db39ecb314c8442a439cd39d4a84644d27ff90f0322e0a40b6b66b4e7c2102960573385e6faa1756
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56cc13818f98d5abfc738fbccdcb66ad2
SHA1e351f4f46e6d25a2c1587b8bc9b87c435ed0dafb
SHA2569a45b5a24de3915221ef1cb15220b4c4075c95bb94d248b6d65dcf245b408d34
SHA512a5284066c572c314d68eecee41b5e2a622762e18f3a236334aa3b466f3416ffcf923991e044b651c26eab63e22d029d6e18809cfa37e4196e63b7ab35eac74a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51d123f0513253690561f6d81587c679f
SHA16c2771797e77c71d6129266f2fd5602f7bcfa85d
SHA256f05391cc9790960e1277c7b167c9e7ade21b7fd06a266734dc6e59668dd4d58f
SHA512d44acb91cb205a52dc5c1b4e6bfd6e01b37530cbaef55fd8e727c34248314af8b7727c6a942f7e01f4db9bc638a16d2db4122919d14af07e65e17363b5aaae3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD547da6265d9180b8b1431402c701caf14
SHA156a2b4066571663b750d65f7a342c056e9e93ae5
SHA2567fa644c1065d814ef7291a8a3da6e1fddba7219b9db26297fb71a50333478f00
SHA512b760813cae5dda7bcd990b3168ae0d799ac747b531f84a1bd31bb997e7c4e8340d5df210a7e87a6644b9caf55cbf24cce2f0738f68ae5ae591a63ae18486ba99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD50ef8f3d11890313c42a5e02ab621e2dd
SHA1b08f645665223d08adfb10fec79eecf555a9769a
SHA256e9251e331de0b83a321dccc487c969e4ed0b86c4a31f0219771679ee23a507eb
SHA51213c2c8aab570cbd0c978c15e223d22f88715be2c1e3a5da6b8092ae29318499b3fdc3f8377e2a898316b229da30a72d3ecd35a1e30061831fa34fc10071cd9fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD587517da9c4869b94af0a48228fcf5036
SHA1231b28f595f589096375e3a3d0e7c837bf1bfc8b
SHA2565032f01c577a31a753f2dd0b3286592153d7738c8d061cfe30cb5b5fd01d2665
SHA512259ddab023d42dd99fef9405ae7ac2e679a361846bce35b3e4476121f84f5b81c41a6c93c4131b8d554ce7563d8e9921bf70aa8d9bc71bf528c70716438f5395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5560fa2252306f70e3536e7ffbc9bddd7
SHA1c20f66b595980037668e35a5375419c0e37ae10a
SHA256749e7b05669ccec4db5a0dbcdbca7a0c8d3e1971dfa21d11b9abe06286a04d82
SHA5128aac7d45e369e03c2545bc79cb4d866d5203ed4e676fc77eb944b9f9749bbe5ae349f515ff232b4562fd89252a4a840414a110c6062d0c998d04f281069cae07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ee0f9abc1f65d45aec4e10ac4dcd2b75
SHA1830f98ed3fbd09b5e7e46e9b3b710c08f6ff6b0e
SHA256fcfd6b12b94187bafad8a655d6f8ab80672ec00d55e85c13cfc1569a982f1a7a
SHA512ba8ee6f7c1828774b211b9c44a9eaff7807b4e5b133b9e4b4630decd71524cff3bdd3865c98fae60a887c92e3392b7f60cb3191a3b23030771aabeb1729d9650
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56957f120eb43d2ac0d0a88d27446500a
SHA1137b298d6f97831e3538108de2f90dfe70f21ec9
SHA25623077aec870ff40d7106c3d2f64e389c1b12fb935fd54b0fb8b1ef5628e4b8fa
SHA51282228295a5184afb96bf14a02da1d8d20732a913cc5ab5e69a01078295423120964834a9200de41c433d198235f9796579319e25ceedffd788fbecc5ab7510ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d02943fa4e858fc2508f08357b6ab7e3
SHA1ca6961ab58f55bc29bfae9e2e84a010179e34e69
SHA2569ae566b5de9613f05414427097898404d4487a95556bd08d593f87883c3a565b
SHA512e371e37dda41c580e933345ad75a8b5ab1fa2b4f828c23f55c5989d57a43050054b9637b85336350477a1c752187d5c2e0972b4ec71f8722735467b79dd531a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51ea33a25b1680a34c8e212f638bf5446
SHA1c43bdf06aacb185f2379a4fec1f86c4f7b0fb5db
SHA256cb6f7bb8353a3b5c03aebaf82105445c515a74dca6ddaaf8ee1afafe4ff18408
SHA5120e60e02864b423e71cf1c87a0c6981c48aadfbc65dd559baaa6d56c249d2f2b21186e1dd3563a24285887f93062ef73cff3661b6a78b91a2e34a2be29fa08366
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ad90beae0968b744851db644f299646c
SHA1ac93f701995607386986695e6d6c24ec98833a7f
SHA256a60f691aab9c0eb4d8ffaacfa09daf3721155a831a3121697b75ef10915dc953
SHA512bd6e4a04b7d3f9c4fa35e64d6b2ad612505ca8dda66d91d57d15d4a5ea3942c74ce3a7333ef186b6fec6527fefb8ba29d6ce20763c0664e41169d12509de5a75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5bff15945d2084f528030857e48cbcbad
SHA1265ab60d039df39469fd0bfb3859848c03b77d05
SHA2566bde8db2fa5b3408a68ea0e05e3b24566ee88ebfa0e3d046ac2f87ea64cca27f
SHA5128e3f713fc4e6e37ccc51478c4e0ae201e4fe3d83d7bdfb403e94dda9fbb95e0365556975e51ac1a8429ef7fefccff964b5df18a6f65bd28a82fa8638b46edc9a
-
C:\Users\Admin\AppData\Local\Temp\Cab9C51.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\Tar9CA3.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a