Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 00:48
Static task
static1
Behavioral task
behavioral1
Sample
32aa1162f4fc0c437397a8f8d7ec18de_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
32aa1162f4fc0c437397a8f8d7ec18de_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
32aa1162f4fc0c437397a8f8d7ec18de_JaffaCakes118.html
-
Size
118KB
-
MD5
32aa1162f4fc0c437397a8f8d7ec18de
-
SHA1
21b9fb44503a2a65d2c7133d457535ce9979d79b
-
SHA256
3c40a431400a7180a95b4dda914b908e9067845f6c6353ac2ecc37141e1f0f65
-
SHA512
187fa34846eb4c9870996a5d43569f69468019308e0a8fc2ea6ff7551c04f4b79b9c7dbc8694610f5b689916ebd629c1f1d42c2379867969e95378b63f605c77
-
SSDEEP
768:9xKOkcThw0v7fwvQovv1qjxq4pQdSqgbhZngYo6tWUgNvKX0nU8BqnXC/osZk7:9Qz8TwvQoCxqltgbvX0d/oyc
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426734895" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{548D06A1-3E57-11EF-A173-7667FF076EE4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c000000000200000000001066000000010000200000003c2990cfa1f23d6e992f673a7a557a3e5820d8bc80222733f854eae0c6fc7781000000000e8000000002000020000000645100ed6b899eff555c82645f4e9a7df495d8e66bd7fa0d25c545ff205471ef200000006dd404c5bf98f4ad72c4771d847133003a7f0074b4f48510995eb1742fe25e30400000003ab83c43803cdcea14827fa213683e00b691f104f99337fa5a33df2675b50c70bdd368c84fb28b5cbde404ae1860f3f481106734b3f098ef2868b966cbff1214 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 807ea93a64d2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1604 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1604 iexplore.exe 1604 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1604 wrote to memory of 2508 1604 iexplore.exe 30 PID 1604 wrote to memory of 2508 1604 iexplore.exe 30 PID 1604 wrote to memory of 2508 1604 iexplore.exe 30 PID 1604 wrote to memory of 2508 1604 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\32aa1162f4fc0c437397a8f8d7ec18de_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1604 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD526698ef409e6b1641dab13453743ca2c
SHA1a399ea40a862c50dff507a484a5c64f84f45bb0a
SHA256a50a56d74f93853c0e1da38921660c599c326f98409202d8562c3057e8ce5cd8
SHA512501a0c7a1242bff9fa65d9965be0b8065b75ef8ed113d89dae8c5e424fb99a9d3f21f13a9ad9756a69ccf0afa24fe3c50ddc3b76a3eb4c2ee5fa2684604ff559
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD542a62b2726ba3d2c49ffcb7c9d80f895
SHA1f4ef51eff512b8113fe0bed7a74c2a3962a5f3da
SHA256bb649c7a7bd5ad23d25c522ab1021c89ee21c9c710fe513a6b33c84df78a4415
SHA5121d341b00d8edd73879ba2adc03f2ffe5d346b797fc6a5157017b206ed6dfa341c4c0638f0547d4c2fe5132dbf8527a86f7092cba3b38c8cf5ac72a9bab8b38bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58b6da896381a0a065081faaa890d939f
SHA165acc80660d9d692388950e2e69bfc9619fef0d2
SHA256fcdd41d357a7dcc42a7db153023df68e8027d86d35f1b97074a6c96d78314588
SHA51236e0f4a7cfdd4e9f61b7aadd6767103af8148ef87e4981cf3fd7698ccb3d7c3146256e37e391a97f1a313e9c91ef656093cca2ff0b8025202f3e0190a2558bc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5937aac4f71e851bfd7aaa22ad8749d70
SHA15c684adcd910e3c0dbca22a0d29d6e977b29b7ba
SHA2560dda5f84774ee85da4a5248026c0d345c0bedf585c98d5f0a2fb961bbac6ecea
SHA512c785ae90b3f56e1ccac2dddca027276825a8efbb449db65c3513891df0f403f7d582ae18e1ae8800509e32908a4ad6fd00d79373421a764a63c8654d1003bab3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bcf37b957a784f7b2cc6c36621f4f891
SHA15236eaa08a61077043c1b85bd011b08d1047bc58
SHA25698818e5ad365ab2dfe8d2321876a069cabd81d6a01e772c4d069c3c7fb627043
SHA512652c4ff7292be16df39e57d79742346dc46b226183658f407f03be65e2fa6b1410b30128771cb3046638dba0865586d424bb75d791f0f21eac004785c23f0873
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f42520dd55bcbd95c521a1b17cd6ba31
SHA1f865e024908f0a90148ec4f0336cf86ef03c8a8e
SHA256f0ae1f1b3e2f669bace783136b4556976f0f12174700c15ab7790ad17b579cea
SHA512090115212e5ead7bede7fa6bf726db62bace9a281439b95e671415d26cedd29cef8a96f6a09588d2a28e35f38a86daed9d54774ae0078555b198830cc809445e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5781db92eeac905e0ccd644f584b81679
SHA1c89b921b35feb2d3a7bfff2bb12dd57ccc8993da
SHA2562ba8dc4149b1c41a158b8583cbad2306d2229e8a9a16aa7545925787afe23c81
SHA512ad667d18beeb1ed880dddc5ca095ceee60a722134f2ff519f9eb679afa3d7e84a85d371075d8b4e3b2bcc40b4e0c0df01a90e2f3df20c2014ae04cb91988a255
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD545b76f5e220b0ac7fdb2be254ebb552f
SHA12862920a009300e6c0114d80a51f62aacaf06e38
SHA256c4c2388478550b4c9c498ef19904486e472754c94ad8af3427a7744ea3873596
SHA512654ea97b678fd22d35bbe5a9dff5f5adaebd1bb7a9c8616782d53866b13e4e49ebd1e2fd0f3016d4205de7c601e7b476e8dd95b94b1c3b3c4e797207a8d1e2f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d7d16b1ff9e4beeec66307bc92dfc83d
SHA1563b62365c4f024ead82188aedf1e2303057b60f
SHA25681f9a05ce3e870723574c16932338d6fb00efb90348f75622f7022ed6688dddc
SHA512b92990be385e5f8a9702f74c341ab79e1752685446e4648c97e3e10bfbb2af06c8807a7299d3f0ff4ae27d3b8a5103bfdd9cbff4f2b503fcc4620114fbde0aa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50023bf1e455862a5119fb6d8b93b8c15
SHA1c7105824e664c44059035a96c5c5142cd88ff0ca
SHA25623f59fc8e00b9ba64a08315866c44ff5ecc88be5e32c17780411bf2b484274a1
SHA512dcec5abb950f255b717a660192eeca90f86832231dc97c13227bce08611e6633f0fcc53b8222b1ea5ebe832e76f85ced54f3926923d4d3cba0bcf9183c72b166
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD504d7f3cbaab6ee93cc59781421d2344e
SHA148826a9b5df265e0cf9e423f0d265b23bfdb7d21
SHA2564ac4850cc0a4241cf9bbb8612e37b55f56c31eb5860af38dfa3b33d653507148
SHA5123e9c2113f81d75e3fca4f30c9ea16876c029dc4726564d4d028c595ff4fbc980c2e4b8f665c4a261401670166151eae5783d0821142593a15d1e7920815a8c44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a6658944912eb97c0a08a0183f0f0ec4
SHA1c5a07f86515a6dd4249fe3ad3893cd4770337d2c
SHA25671df3c6915e77c29795d996742e9e7cb8868873138bcce4ec8ba497faf64efd1
SHA512a5e0800ebcaa5f3e142717e6e90ec1a3e937fe8db528d230616252b528045846c982a31426f0345fb6492056d3e99bba30c69886a45e8c75ae66805918723a60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52e3d15c3daa67edb5e2e8c795129448f
SHA1d58d81eadb66a09ebd0bdb32cecfa154c13ee8a8
SHA256ed8b268b45aaeb873128b36adab5229e41aafea941606d71e18828da18b83129
SHA512dbb8af65b2843f80576fb4e4ef61c707f083d984a6c3e6693e9e2a11a15e01a147209c6e98f8146b56adc29284a31f447a27b4ac82834a7ca3796d57dd973f4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD570ab13af0cc550dd5b4c0d1f1fb24356
SHA14ee960b9ebe47f7f6c7b1c4bd5ea3519bd066489
SHA2562e1220770a43578311900363da10c36f0973e5996821ca9a3538c253c8669b49
SHA51242e65c6d775c1cada3f7e1c10b6214012277216f18e65d0c3dea24eb27544212b3e12bdee33692b2e1984d817551a8e4edaf5a70533f1ac72f81e769178edf3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD511c2c810f5ed6c4da0dde04a10f4e55d
SHA176ee440a22a7eba21a2acf93dfd80ae38fed9bbc
SHA25652c7622eefaebdab8d34b2c62ce083bb9eed49627fb6f6284abc582b80ac5fab
SHA512d1a5dac81b00b5b74d341c624a79956320299d7ddd5fd8894be5128979c22182e14181b712562430a7138668e560933ba5acbcaa927d26ac911994abf7d81f66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5beba61041559f19cbdaca22198974ac4
SHA17d402c73ee703a5599def67f4221f01bf01a110b
SHA2567bb4cafa51c83813d9792a8eb9f999125341febf4aa6922b95d5dcec901bb692
SHA5126449859f4afdc5dce6fd3f0876fc7b0bd1ed694b48e01a951f603c351426a7e29e8a6786f8970beb80bac0ce6cae8d8a42bb1f5926ef19efdeed07b485b45e96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57f1e22c637a4b4b4c324fa652fdf6487
SHA15e1348f9190b6187f8f0b3ec2feee6dde0cf74aa
SHA25625f706263bf2e33a3d3911c8234e536ecfa4addf1bb9e5c90060636d0671af2b
SHA51201d80936f33e73caf0566ec9b74919ad6686a8f2f3c8cd3a69f24eacf008c64c4851477e7504b94d08dcd964ff59c68caa3840f06473321a1d15e537ef753c2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD524ab5aabdd3be25eb36166faf82f4e18
SHA10a9fe75204e1e9def29a2018cbaca1701629fe1c
SHA2561b18be06dd6858f5f443a4d9ce2c8d7c610c5475851271a7d127774bcb43bd6e
SHA51235e86b2e9ebc72d3fefdf7ed2e2bfce7b7482f44cd184669a1f7bb461825f12d55e5e280ee208ad4512f7cf757fdcde22bf97543375b819888df278466a98493
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e34d523a06b7cc03a9a27907d3b04cb5
SHA1bf36733ae817c633c6c0ced8decda2cd2a8e8a3a
SHA256830dd210f85df2babc38f5cd19b140806bb46382474dd7381b28ec6e3f0a06ef
SHA512baa2979cf9e9215a2ef76f32c0fbd5bb3b4336f5c1eb2418852cf78a7705c66a31e81afdba712432398f0d4c74518b9daeaeb3babaf932e9ef5fdc6246774678
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b