Analysis
-
max time kernel
74s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09-07-2024 21:36
Static task
static1
Behavioral task
behavioral1
Sample
32111aa916d5ebe347f4851d9baa53f5_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
32111aa916d5ebe347f4851d9baa53f5_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
32111aa916d5ebe347f4851d9baa53f5_JaffaCakes118.html
-
Size
6KB
-
MD5
32111aa916d5ebe347f4851d9baa53f5
-
SHA1
948212fcf4fa452e74f1ec8f256d09b6f7cc1669
-
SHA256
cfeebf1bbe092194017131df89e052040c7f77bc11420acfb457fda25bec8a47
-
SHA512
37630a9f86c5d8426da6035751b1f24af4325bb79a2e45d5737b32dcf1ce9f554f0a5403c9b8ccbda1036a68604d6c8cdcbd2200a1f75f4ab26126cb85d01df5
-
SSDEEP
96:uzVs+ux744LLY1k9o84d12ef7CSTUsp/6/NcEZ7ru7f:csz744AYS/n4Nb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426723686" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000af15cbde99b5590d3bbe2137e4e48bb615f49748fbca41b05e8ff397ab80293a000000000e8000000002000020000000ff89cfe5dffe8d2d38e40171bc73927a31d446766a721b515269eabdddbdc73520000000cade5d79e0abf0950d826a24a3148914039e091c729f25ca23515b28d5d04c0e40000000d003b22daffd86bec44883a202ac66f96fae0d2ddf2261d84c0bb8c92d669d9fdf146bc94bd2ed9adaa6d4521352a8ae90eefe50611f40ec780303957420b562 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3AE4B141-3E3D-11EF-B8DF-E649859EC46C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10bff0284ad2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 560 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 560 iexplore.exe 560 iexplore.exe 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 560 wrote to memory of 2016 560 iexplore.exe 29 PID 560 wrote to memory of 2016 560 iexplore.exe 29 PID 560 wrote to memory of 2016 560 iexplore.exe 29 PID 560 wrote to memory of 2016 560 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\32111aa916d5ebe347f4851d9baa53f5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:560 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57626f7f217151e6db04aa23b4240b87c
SHA1f7f540aca804938b07d4ba3223f65d7980ea3a9a
SHA25678328becbb10dd310bbd14bdc45405bc123303438a1aaec0de71a54fbd55b472
SHA5126b5987d4a83c8b547127d8f09bf487c868b4694ea3f6a7e0c54459492350caf7807401c3a508a2100f84b22b5e783c5dde5a67599d1bd2fd1805d246b78bd135
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533970ea2187c33f9b31f9507c67ff2ed
SHA1eb9bd91296321a2a65005cde938ae07be9b4cccb
SHA25645105a1cdaeeae1dc7eb17b29073fec1e3681706c28a94741a6ca387d1626b10
SHA512cbb8c17a7210f8e65cddc7780dfb40b2769052043a90508ec498fe673040dc610c9152e632ec45a0f8f2eaaa9aca0c6d02c91bd7de31c5ccabdb7fec85b73564
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a7baa6835bebeddd61ca4a9ffecd627
SHA1d840d8b794b3ad1ebdc7e32492efc6748dc823eb
SHA25609f78d466ec05427cef09cb54d4fe7876e4b270d17d7ccd1b524c1afc47f95ec
SHA512dddc0f7baeb49e5ab72e05c7ac3a0cd70a11e0040de188824f8b84c32531bc3a18b0251137e4c047ca2bf89eaa2788cf3abd6ef2cb1e8ea21cf12b84d2499c02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5643174aadd23842622ba32fbeec524da
SHA1a84be1526b2be1e075cb131c0741ad49a4c67b8e
SHA256e3a58acae7821f313e69b805d2dfa0a02896ad9a1ab0beb153f85b2d164b8f94
SHA5120eca65d2605db8698d4d214847b4ae9a12077ed74ccf5dd78888346e8190c655b5a93b27ee936bde69b261b0126cf0e1a73545169e1f31ec408241355a42de60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55644408a83aeac50e6c834cf0385e6f3
SHA1a865975057eb2f2c03eb2706bcf07c2125edb459
SHA2567fae1aa82aa12280cb75ef76d688224eb0ba57623825482e0b10d04351f7e37a
SHA512c9f0d39fffc5a2efc12172149709a5b02eb6ad93a72bc824d93b9c514dfbd4aaeb8eb612c998c4d597c7dda319289595475fa4e068cffb458e5388a569d85118
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c57524da4556acf626cc4180166f4d06
SHA1b2ec9718c023643d1e918e5d52edba7844f1f1f6
SHA2565ab79f7932766c6f96b88467010b63b6d646bb9b219e299cdba51481548d8d4e
SHA512764500d6c9dc3e4c354452382db135d73d0b989d6e67da258b19922fbc0efdc876d4358a748140b204b75e162c6efd079449a3175a539b0b396ab8b15ed6f389
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d65ab0d0f7710c00bd818a1128ad8cf
SHA10289070902bcafd146177b8f0aa0487f6cfa38aa
SHA256b66b906b0418527249f97c7718ebd8e6233831c2e788d7f09b24ef5e2e57b2b8
SHA512275be3d74da69d006f08e6ada666792f8d109c6fd3d9a9421a745c3aaf87c128f00f90e98d54fcf06093982daaa1c8a1e1d35c420cb310b277837e9d1b7d3bfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca2c815de1c69a376b2db12e7e3a221b
SHA1cca6c08a869ad15aa8d04f624e593df7eaef9dba
SHA256352f7be30369471db6332c38d3ef62a27bd3a6006ff1264c995f46cd4ac574af
SHA51269554b33a4138bc212c1d3567b87622b257cd7de861a7c19d312c16440eeb314b469136d46a5cddf0a96d81c15d13f93c2f4e7e10c581e00d66d5e05a3791d76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58537b8bddb50760f2bc4ff20144b0b28
SHA1bd152efaafff30de569aae41b9848c072e7d4603
SHA2561ff8a472c0bba1a8b764ba7962ec65c0f2fadab2a01c0d21128c1741978c2ab5
SHA512f152580ccc219709dac56b496fef5a21c0dae568004549f865628b3aee4cf599c43ef60dbc9300e8c764d28ad06105c46aa4b96b8735961e8ac1d0b66572190b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54764b9a0f32eb01d82c691c78e3976d6
SHA167e887af8358905a6dade06da01e9b57213f44cc
SHA256133acab1ee0cfd4070e3c6b69064d67174bef8678172f1fe903e3962cfb173a0
SHA512f816a7635755b497c0b3e05e2be2e4ce9b55fbe5d3224ff4e1895d6870ea60f7417de07ba037adfb920a31547d9012cf5037fba7cfcec470870c4d8227a04453
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575266d2c13d3adc4ffa84abf0c006643
SHA14b23ee45b77c8d684237cf6ea4beaf69a5b161b4
SHA25645c520f212befd0c277a5512c159031ad55ca740ce4fe4724a12c54f4d7f68e4
SHA5126d84abe5f4ea7bad2c2f5d65f6dff4f444de04623246509bbdcd58c0c6b07ddc63338ce6d861ee366c1d88f34e1a589965f611a65daea1c7d763191882def25c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc5397ff42a614fac33e27937d45580c
SHA15c13116be8dc9c0a8b2df516d4c567cdd6b04908
SHA2567f623d44f698f371b9aae6d6963c7c57741ed0b0ff13061512f233291e446f13
SHA512b6d765f43602c9b4c89eff499a4a9d3523aaeea76a89fc05c40300d3805b4855d4df98326883016192d74d94382e45bd00f487ba2d763d5d169ccf6497c55f40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ead9906fea05e35ef1b9a79e1d6fa9f
SHA10293a5d4ebaba64ba1e5132f39e909955d61bc41
SHA25674724873537dbd2f248a4baf125d2c4a799a381682bc18978714119d2aaf33b4
SHA512664d0cca983eeb0c6953bfa347e935c3081579dc2819b6fe854e7779f5527610a7a30b8f92b8f24de0b7a5c39892e45fdcca447f710b21dd1475d01a2646b8fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5331276cd219cafcbd69b77b73251c9ff
SHA159599f7eb436c77b8c60685cd522ebd123e57eef
SHA256b8d62227e12f045ed9356807e27aa37cd3b649a9584b89a050d2d3a4b6c0587b
SHA5129c361e2f4e2d19bfd018b729144e9ed727dce74814cb39d5f0812b6bf608ae3f45d3198dba250bb1f7de3c938d7de638854b46f563a5babb40d6f0d8810001c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a05c1c57ed0ce96d0a0e51e4ca3521ff
SHA1f569a6412aca25dd2691431eb8fb4849f2a30150
SHA2564e760832aeca9922104ce3d9e33095c840f25557929eed30b53153c283b224e1
SHA512ea95786e803eef73481563c0fd9b508897b8d3992adcbe21a54e5d4809b93e6a9cac48fdec4e56f1e0bd48b2dd5e1b1ba64fca599bf086c4208d388ec7985814
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55eee00e1d560fbcff65e7823556f2eaa
SHA16f09e77eae00856543626279f10332dcefde51b6
SHA25669e8b6b914494391be6f5434b405f8a14145051a46e50e139e64dad5c84ed347
SHA512347f84fe883700284981fad70cc9ea2bfe8d9f097f19ba82e41147a8917c67b7ae7d4817b5a2b3e9ab409b058325d0aa26a2d91af3df2b129833a164f8e8d4ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9a1b9e357f80f6a72cf68569e411313
SHA19d68b4b5f4613328a860625e5867c8bb1d9a0ae0
SHA2568169102d3babaaeaa06a4e3a7873339a3bcd35d91611a33791efc79731f28078
SHA512d2c58c0cfe52f9edbccca82aaf998b0680017377fd8c30765a01f008df9ae308b9758620f8e50a710da38f65220fb26bc006d1a3484e679a74ae5b43aa22d008
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a49a8cbfd215188e30b08dee98bc660d
SHA112f269955e95aeea687d8d6395150d4ee365f7e6
SHA256f3aed32b85a385c6d4818d3810df17a17815772293200502543af311d111dd06
SHA51276c82156573a12c1267f6e8c4c4183991b0418d5f8dc7fd90d1a374c427546b0bd466552f2d70dc2021e6c247c2d34ebf89dbb42c272c8b488a6fa549bc38ff0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5025b82013f534e0a351dc1288b712150
SHA11f772517b13e8e95d2bfbad82bea6e0e090e4ed8
SHA25608d92b502e20019cb1785d95f6820d08fe80cb357dea4ef1bafdf727f58ecc13
SHA512140840390cb856ea763fdb2ce29591aeed31e78a5232646f01e767f4db5139f3801e5773c59ccaab19f1408036c8b684ee4b8ee812c1dfd2220f9f1c0eedbf59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd51b3e20c419acf2eafca7d7599b064
SHA1484d14647d12dce74dab240425804e9f161a6a08
SHA256a1a0318b10b3bc4b33af93c814dcac2f02a545778460d66ca35a6ba9277834bf
SHA512b6dc44cbe58bf4238e1392dcb0726e6ca912ffc03f3aa020c982ed2ef4af59e9334bcafa92bf898a0d6a767d7ee2672248ce6116ae1fce637d407e429d6807be
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b