Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 04:52
Static task
static1
Behavioral task
behavioral1
Sample
32d1c708e997b2c3529738a57c7dcf02_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
32d1c708e997b2c3529738a57c7dcf02_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
32d1c708e997b2c3529738a57c7dcf02_JaffaCakes118.html
-
Size
62KB
-
MD5
32d1c708e997b2c3529738a57c7dcf02
-
SHA1
d46dc304f1ccecb2755bf60a9358a23102eb1f2d
-
SHA256
499536ca924fa5a2abca118fad25209cd9e8d9462789b9ac4ef8b07495a6b358
-
SHA512
74a550dc765b74db9b68157820ba7dcfc44761e4127424930a1289654cacca48f76ef72037ffa7e0e9723eb172cd3814854b0fe7bf8113a54ba415c6c61a86ab
-
SSDEEP
768:Jijngc86pGrbXWLS5kl7oTyTC8koTnMdzbBnfBgN8ZKa64QFAG/scL/Ijky/Ijkc:Jbw660T/pc0zbrga6vbNniK
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000001749d07ee785dd1d4aaea389cbafb7deff072d7b27f8f74ac28c5e49bad9ce9d000000000e8000000002000020000000400f5c6297bbcdeded57f2c4a3d3cd1d4b1751e8f95fe9030034e4ae5d2c056920000000ac6f8576510e1eaf4bc725fb91c08b3aa6cb04342cf8327c1518913f9cbab61440000000be3bfa7829eff9853d13be875d7c107826d0774a922369ffdaa77d319c1519dbc0286e430e0af99cfe7a0e227527bf67ca1b185c59784d325ab9aac39673c036 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421565011" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{418B8BF1-0F52-11EF-9B89-EA263619F6CB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a07b2b165fa3da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2068 iexplore.exe 2068 iexplore.exe 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2916 2068 iexplore.exe 28 PID 2068 wrote to memory of 2916 2068 iexplore.exe 28 PID 2068 wrote to memory of 2916 2068 iexplore.exe 28 PID 2068 wrote to memory of 2916 2068 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\32d1c708e997b2c3529738a57c7dcf02_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf1d459be53a6d3849ae96625d7bed21
SHA105af60a99b8b498e71d2f957761993eee2f6c0d5
SHA25606c76f807dd5e39f13e66ed43618a64480501a89942b12e4d0bb2d2551b2b48a
SHA5121a5c73d7d15a7e900eb1912595ede61508301b5fad346d34ced148d375b991a5d2e14bfd4fb264528031c85281a80ce4dc58b9a17d9fcbeb3dc2ceafa1be028f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590ceb393c0b2453acb5158378afef267
SHA1696afbe6a66723d5b9d7a10d1996bb936cd20b18
SHA256e48f863a55e58319c82cb00112783925c5b7f95957fa4c762a4a16c55b790d41
SHA5123cb1c8d352ac151310e6123b34765b2c980d1bb3ec2374cacba794076fc4a5d03c6819b79ae90fdd92886dbf46416ef9be3e1bf2a61d4aa79e90017a076d8592
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c39a88f7be59c0d79f1e1d9b71396cd8
SHA174a818fada443b5d75ec70a0c063c33e7f85d46e
SHA256fae82bc40d07dbe6711fbfdf6dd24732a0b0c1b6315f7b5cd8f394c9236bebf8
SHA512fc4a6855d2cbaa583f24994a7885ae8e467f241ecf7091c74a87ba30bb4ea8e6d05c337d7c91d80fd474245236be6ee499482492f9215fb214951f3cdde549cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577d34d7264b0375762131e632859d5cf
SHA10ba73912218bc8278a0b1a9e7ffbb8faddcb4177
SHA256ec2f2e8d2066fafec56b713acb9deb41439364202832cb44b39e6440af12a3c0
SHA51273bae37bb98e67e19103fd8ce9448d771da849be8622011ae10a35d805f1739aabd294e819c7bfc742c2217c8b89dd29064614b2dba93dce15d91064423b63fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f3d1d0db861ba4541cdd6ca24024622
SHA1ea1c0f763cd6752503bfb90599bcec9370898e60
SHA256e1c6286904660dfea202adc181e9525f8550315faa545cbd8c22a7b5467e90d3
SHA512cbb5e66e6f964730e4fd7052c99b2a75304939cec57c40291820b589492cc82791d2af7b0c3036148025df7fff45b4e4d8401d7d5c85c08ba804d4e9cb719ecd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51112c98a24f6a4158f3dd9133d0cf687
SHA18ae09b9ab27b3b18014d8e67a36bfbb5e9d9ed65
SHA256c5282db326751b7621ce8bb65e85e11b1a4431be582d0d61fc71182276c20ea7
SHA5124fec5052568878535ab2b7ba6eec3e3053a678c1968f1e00c9cca8e18a34072cf3856590d65866a41ef9480aa7c5539c63e7ad5f97850b195ab69946db65b413
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ad8c08343771f78d6f626f3c3287a18
SHA190346d76a175239207e30ae41516528b4f429bd9
SHA2560eed28c5ded0b0767837cd13cf4e27fdffad7e7d5ad0cc85ec946f32b208ed50
SHA5128e406e46da316da6f195d44313a7886fd67ccece4ade621a9ced88c318330433fcfc60e9c6b78118f8a11e150906247fd0a1a155da84e6d1f828f2e65d9db82a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587f240965192adec968f0ea8093c6f50
SHA1ba628c83f1f9b131545cc5f01de292749202c5b7
SHA256f9c0fbe5f28c4dcc1e28a67b0438638b2f6017a053313db143422f3c3cd3a1ec
SHA512fb2c17ad0cfe3fbfd211bd9932be8ca38a1fcd5b3e2727ba128fb8c23ca6c843c40c5935e307f552b8743ee6d2f1b29aaba690c590b3195b7fdde701819ad228
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b675007f831202d7c2928b1d69b2cd6
SHA145624249acd7cb99e8e386c4427c4f2a290448f4
SHA25689506362e490c4a593aa7973820fb604854032350b1c833fe113b5ca2fb5eb33
SHA512d7ba2a86ecbf5c3e626db8a8feec6a79303531cef7d4fccf9357bc6a483d7c9478274e428e71eccbc3daa38875fc26673312452cf2b61144e49f69d33646abb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543b81d8a4f199af1f21dc292f4471319
SHA1f63a03c36497f39272bb759d00fea8ac90c04e23
SHA25613240516446b7ab56f77838e6c4586bed9fc5e9caf6742e15b2db2a3cadc9a6d
SHA51204372cdb472baf27101bf52affdb740e3f39d79710c1a514e0619689863ef26254b870677caf2aff4284417dde5505f9cd16caf4eac4d9197e68391939c4e231
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597191cda886f0e5491521e9ed6a519b3
SHA1b66324e6416e19e1340e487c75a7173cd6d7c5c5
SHA256b57c3acf825b204d1ce5df7b4025f2ba798205fbf2fc74c0063a029047c47167
SHA512fb34dd9572f748d29265c75ca584b1cf71168ec67c10afd5644dc5ec6a2ae2571767b25af8578b13685efaa826c584ea03edaa8b2eabcd4a50a07cb4cfd84a00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f0d19dcde797ea3f9c4b3aa3de4ef84
SHA1ebfdcc091029312dbc546d22c52adc60d1d805f8
SHA256e251913fad9d9e8b98e41cdfe11b5d52293cfb2f354b2ddadf80510a3b395934
SHA51249f15d3122b784b9686c5a64bdb7db49500bb6ef1a22fb9453c29616c2b00ed2df9a719d12753d3aa3b5cb0a454a8a7196fa8f11434cc3186acc7c66845d5f54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527d6b2f38a3bb45cee1318e26bfc1382
SHA17d089b6c63b0fb46fc84d2cffe5b69a0250a9c54
SHA256c75b710d5f9b42a9e8e2d13695da2fa1b3d48c8c949e0f224cb1f340a2b2725c
SHA512a9c4ed12e404f442016261ef1286d4b051d0259fb27f86ccbc35c152c71ec1ac54c75ae984c3e012c167c006ef4c47dd8f295f63f5e82eeacb92252fa0b0fef1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eefbf005042cb7735e3c020d44802904
SHA1e98291070b9bf577d8729ecc0abf22aada61c9ca
SHA2569af76cd0cda972f6c168de04fad78eb84eb8ab500dd08a430a5c37cfcfb25cc2
SHA512c0d5ca416396db00b5c0ddb1863108368f9ef426475a0fbc38ae6f0fee9b531daefda1219966c3cfa541f4fcb1ebc0b3358e57926799c2ee5a297a7b0b9ac72b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5124eac75de9adeb806f40ab28b76d715
SHA1a963c8d8be206c49c096e9152b5cf4ac4302b6fc
SHA256380a4b65667562e15226dc1949fd4751519b7e74623c3846b506db5693ef1634
SHA5126c8bd71a9a15bf863d68d4e594d263c361c3f7913370abc3b8b060e47f09fa5aa96344241bb24567152eb9c123db58ac1a6e436c818cdd97b68f9f34fc24e1b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5105465fadb7aa595022d095cf1e15ecb
SHA110e3a8049fb5d60e82f01d52f9b5114fc52df1cd
SHA25697fdeaebab855a8dabc3e3d925c9173cd9ecc0908aa753fa9c88f06670d2d15f
SHA512bf85de4ac74f27a09fd11b30bf240e93543c9697a97601ad6d7aa531932391a0927e1ab4ba89cc8354a387bb8c88b1b8aecf9c0539b32622b6e3bbdc40063a36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510464bcf85cc6efca617f144cdc3e70a
SHA1846c28f082fa4d378fa6b1b8ca6ecfd902fd2da7
SHA256f5f7b894d9ec153b5464e7e794e643ad0ee8a5d73617d26fb2b60d8adc86b058
SHA512b07fae15b7856c7fe5879fd2c941e33c99c0aa2975b36dcd707806abdc669863290b8006016a85018b4404fe62a09a826217fa6f19f9b7c7f539901a95fe36f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df7a58274cb2c671c947cacfb7abab79
SHA10b2cb3b74459e3846cefc700862ba8c3cea75157
SHA256221100944b69ff952172ee51648c5232b3e92c51241acef08006a2aacdd4afa4
SHA512afd120a3a6aee5d0dacfb9e172f741c3e019b602f39d6ee663fa207d86dc72338bf37f14a35d47842d088cda54a31148cee273e05199e5a79e00e72d14588e59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4477adbf209d586e8edc23eed1d3432
SHA1f5abd939affa6e045391288aa54f67c0027b95a2
SHA2561377c55306da939f2fa15b6a3e72860300ff11429ba46cde10fa70f970160c22
SHA51261f829f1709a810c58ee3c0d195a4854ee73ef00e40e1b9e173a8b35de7b6b9ccb8b8f8ecda0f81d6d23e2c755058416b3061c1ac78dc592b216d648b4765cda
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a