Analysis
-
max time kernel
137s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10-07-2024 00:39
Static task
static1
Behavioral task
behavioral1
Sample
32a2f17944f176fdb118e675a719e784_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
32a2f17944f176fdb118e675a719e784_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
32a2f17944f176fdb118e675a719e784_JaffaCakes118.html
-
Size
53KB
-
MD5
32a2f17944f176fdb118e675a719e784
-
SHA1
18f6dce1f9c429fa2224ec095501aee6afbcc19c
-
SHA256
c0ad1c3c908c784e6dd01c2450ea5407c066c6e5a3e749673087716c5da6b08d
-
SHA512
fbab2d46a89344d65e4dfbf818aa54959cd9323264861af436676a077b83d1fd8db6f44119cd5a6478b452f528c4a7ca12b1908f3c2cc570623636087b2594ab
-
SSDEEP
768:lIMDfoeSpe7K6ro+uW9OZbuNeV+3VbmDC3mzVHR:WMzSpe7a+uSxNecJmzzVx
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb780000000002000000000010660000000100002000000067e3355f7d2874ad142df43668698ed0b205c290e9085de9e468adb72964219f000000000e8000000002000020000000718a8a2dc166cce40078db4caeaf450bbf991ac32f7355be9113482689d9228520000000dbccdf7383200f0c806b6f502260c226e80f6e03c9413834c1e6e40de5a3ea4640000000529d6e64df913b51b2fae14b5c887ce78444ea11350d18282c4b65a82c67870bf7bacc902bfe754f5d6899b1603edec7b22e59e99e3c243b7809ea51da2e8d84 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{629CAF81-3E56-11EF-96B0-E6BAD4272658} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426734489" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10e69d3b63d2da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2404 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2404 iexplore.exe 2404 iexplore.exe 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2404 wrote to memory of 2968 2404 iexplore.exe 31 PID 2404 wrote to memory of 2968 2404 iexplore.exe 31 PID 2404 wrote to memory of 2968 2404 iexplore.exe 31 PID 2404 wrote to memory of 2968 2404 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\32a2f17944f176fdb118e675a719e784_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2404 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7faf7832cfdc1a3984173665c42cc28
SHA16f86c14d022ae300996605d5ec98798a04368a68
SHA2561e6e07b9a0368e3a30c68678bb9a5cfa1be2a1df9b7eabc303cdb7c9cdc6b871
SHA51212fc99f5142f21118a862b53a28e9cfbc1cdd24c41a205302fb127c3e01f2df8a7e4080e5f0dc0cb6297daedf46897c4c2e3fde91115d822114b9dfdd24bac11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc0da60f402fc24e5793c175ede0b1c9
SHA1e4c5f416130ad8694df608f91df41df203ee0674
SHA2561d25ff585db0991f25f6a63e2b7bd9aecb53d3571778445f91751bd5abd94a8b
SHA5129881f07005b77720c1a5e04588749b261858dedabb541298ef34583ae1b6254edcaf2e1b516f1b94b585bcbdcadd73afabb4e9e4d9e2ba0bc7bd972a1da90289
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a944dc6816b2b0833de45c077d0cef6d
SHA1bca3e27d794c34e4696db7420892e529860fe45d
SHA256c34f1668c1947fe07f0a52eb3308c883cb5de1ad761850a07d42d7bf3b29acd5
SHA512e9c36a9e84717b5dd8986d085542574621e497f5d12747220328b3dbc23ac289a4861d626dc3c1595f3bfda7479a317a2b8efb8196fff3ed1d38417f3e5975cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd9b4ac24f913223d507cf1f7eed9b14
SHA19e098419895eaab900779fc295cffbd81e3da574
SHA256ad630fc9bb1d54700de8347684b1b2185adf13b968491a84baaec9b0ea723d4b
SHA512132a4c180c08ae49407dc58e9b6f8fa5dfc9a1cae75514eb727d4efd1a3db4668cf7d1924dfd3bd6660c1c7e85b2bba50a99d898bef2160d6098020a3f7f3617
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c568043df4a6aea93994eab7a576a451
SHA1e287914f6bb808ff5be292bb8c5d9e8108720dbc
SHA256772bf5ba9581aefe3c51b8185999a60572c2eacb43e81be8955386a5b9ba751a
SHA512630dcc6ec942e9dde07ca1cb7963dd3846618d123eaf7e61f3d52e04a745768c04b153748bf2007dedffc88e53ef4c808b5f4d4140bfffa074b522780fa7981b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d589c3175384ea439bb4e3c3a6f7bad6
SHA17fb22665dffbadbfba1f5d19e0c74cfee7806d32
SHA256e940d24e17ebf1c6cd73c5a4b72146171e3906742dd4dc3bfbd82c15130eb5ff
SHA512c999705b128d1d9096efb439a0ae16c63c5e7ddcc7b014bd02c6abd3ce29e5c3ba81cf75802b22ec3679a0d2e080cce19323ef43c0c5a8b283948e4943ec398f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a85e3931197e3a7acb2995b76c4b2b89
SHA134b0a7804a55c6f9ceb69db64430d9fb8df054f7
SHA25681b76cd9774ed098f683c9dff6b144de3dd990f8eadffcce97454c9f72ebf265
SHA5123fb5ada4b372faa039772a67769c72c9d6e5a8a50cf36c1a05cd64a5aa392e5726bb8f0026b4b4e2c9bfbe9d40cbc667bca0fbab582e953a54e7356ace462fce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552f995303d44ba58040e6c241835d704
SHA1fa7fe6eedc69d39d7cd1e2489ac48236f7888262
SHA2560f6a74562f38a7efc8e3d0f5ef898744ce648c0dc5b1bbd67791cdc9ecb514b9
SHA51221910970b6fe893e9f688650eaf11e274b38603ab8ef3b8abe133eb8e2c2b112e773832bcd5c37b59f69500c731bf25c28fd2506a9fbebb9ad3a04086d21e4de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0921e43c21be0ee869356a216fe73e8
SHA114741f1aadfeb55ff8985629306de42cbd3bb9dd
SHA2563d459480673da1e9bcaa54a930dee32298e7667fdca39a24e84886a3172c9762
SHA51238147159fd14ac5bdc4f60fea716d2b6e9f11f60c47d7a07264724afeefcbaa5abdbebe98e07a28db6793baf161975535f6292c669216e34a474e034a1d5b1a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551ad5f3f8d20b157dc5c1300f70cd3f0
SHA171aef4eadc1b60de98d53c46bbed1a042a50823f
SHA256d313132ad66ea00aa6bb6deefca43c7e6b352fe2c0e18b7939a3fcd06c8d93c1
SHA5120cf9101c031c7522e5c7509b7aff8cf7c3eacd51bc9ac2ffd5c52cac7779cb6a69e8ad0057ec3ac80efdfb1536a0c709cfd7c4722a8fcd88d2db016dc861a161
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5319179c5238dcea67e56b8144d08e028
SHA1a01982b80b1ee8cdd169fb17941b48b6d2752c21
SHA256100ada6720427821d81d6ae74676d414b08b4cd262d15cf43cc30caf7d5a2d30
SHA5122c7a6056f2930f128079604ec5d26608aff6f185c9813bbfb89e88ee0fb3408f4a2dc9e2b4f41449e703a69f69e7a419824f540993b3b354443c71f7f1f2d440
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5666b729c4400ffec69297944e64f0e73
SHA112db67843700e86bbe0fe5be581c3364a8b15f4d
SHA2569ef3f1d18e4424d1b8e9986bdde3c798900799245ca4614260958c19212003d0
SHA51258e52365e766a3d9c2d6b736c0e9cfa9339f5974b1d95dce1c8e0362c2eeef5ebda720a71a20a1b8d23e7cd0b7f78f3298838c7df356e1972a54a7691d7879d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527a8d1543d454df8cc8f604f734b22e1
SHA19d27582508e421b6e2e6c0658baafbabc113fd01
SHA2569c756dd2948a64d00e9d749ad6a5c6e2d4aa25686b2527951c48287686a648ec
SHA5128a860272ff1a95ef78489560dd102aa2ae08edcbd984a7c984ecf6689691241593b02051f8c57f6f68c9669cb7d471a2b7ce62098a6ce3135561a5c6afbfa66d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5779a9b1d8aba989ccdbe1556514bcf92
SHA19c864114997ce0f86ae7ff13f368e453784f9e24
SHA256a1b4668aa39ae01e15f97a437357fd9c0e94a36d6b7116034cabb0cb58eb50b2
SHA5121128f238e7bdb47becd9b0c5f1666f1e92cbfc297e689068224de53e1f44174aae2939d6a53b11add3dd9918a41468b4ffcc8158e5c0e64c332b6970e668560f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1fa5525db77b4fba7d075eba0e8928a
SHA18168156c761e1daadda2693f0a53c72ccdf8c6d6
SHA256f11bf9b6b4ad0a3aca8026bf144283179e5833fc2321fa58e211381c3956d43b
SHA5126b62b65bf6252d94b204004c01cc586d72a7314a0d76cdbbe8a42fd24f8cf799ce76f93342517fb34998e72b131fdc16288efc8fb6d486f83938bad29b87301f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb614aad4230a2b1977a1c5443517975
SHA121ca9edb10a078afe549879f1f329dbe431ed244
SHA256ea79cfbe0f1001eb4428599083b64d6aebeebe963e786a145ff33983f6ab98bb
SHA5128f47e01bc4679e24b9f9fc71cb1d5e6032d44f8e59b5611bc51005ea849c214abc18223364c0d87a73a9d9c98ac50cdeb6699c09d41e824b37811caa297f88b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536de205f0b7806de5b1a51ea2b7d082b
SHA1551350fff9aa14fdf2c5c07702772b2bf6c7b41b
SHA256b985db5dec977035fbb86c09eaed25a2a97a03ae9af758f279484d5d530ca71f
SHA5124eec2077206974a098387c88d66a293d539d365b3ab7c7bdfb8c9e98708e033fe7b01e882acb711b74b7cda887eae7cd452afcfeb8c5dfb1e45c5794660a5e14
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b