Analysis
-
max time kernel
122s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10-07-2024 01:56
Static task
static1
Behavioral task
behavioral1
Sample
32df492276816bddd5d2b3e37f063453_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
32df492276816bddd5d2b3e37f063453_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
32df492276816bddd5d2b3e37f063453_JaffaCakes118.html
-
Size
53KB
-
MD5
32df492276816bddd5d2b3e37f063453
-
SHA1
3e40278237d3631de836701858e2e34e6cb9a5df
-
SHA256
950a604643a922450351de497b1e8183e8fc26d41fdccb7cd80a52711218c4ab
-
SHA512
8608b77a5bcd98968158c22b3e878c80f325c834dddf826426ed71999f317511a3132d1de8a50d234b6ca1783cd9e8b44e051685be2f0ac27be18573671d86ab
-
SSDEEP
1536:CkgUiIakTqGivi+PyUGrunlYQ63Nj+q5VyvR0w2AzTICbb/ol/t9M/dNwIUTDmD6:CkgUiIakTqGivi+PyUGrunlYQ63Nj+qf
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ABF0A271-3E62-11EF-A669-4E18907FF899} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000000d9fdbf5b52bd91cbfe597079e09a1dc5e0862ce1f507cdd24d9aab0451fa674000000000e8000000002000020000000e2e863676448e7576470e361ee60985b8c59c4834e7adbc8d28645fc3dacdf2120000000a4f20df2db68cd5c0ae22ad179d272b1a9354283d84f9d3bab04017d0d41739e40000000b0a6d4999232fe69898f512361025940d445fe7150bf36769ebb581e3c2eefa3012df14574c0dced2887f083539801e6c51fa35fa44cf369c82e811879a3b9d6 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10dd77816fd2da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426739766" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2840 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2840 iexplore.exe 2840 iexplore.exe 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2840 wrote to memory of 2484 2840 iexplore.exe 30 PID 2840 wrote to memory of 2484 2840 iexplore.exe 30 PID 2840 wrote to memory of 2484 2840 iexplore.exe 30 PID 2840 wrote to memory of 2484 2840 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\32df492276816bddd5d2b3e37f063453_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2840 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb23334cbb3320ff79adb0c23d4ac25c
SHA140366bc9f15c3844d5f9d2c0827ca07074172829
SHA2561ea6e741dd828c36e91bd45844570fdfcfbab3beb987c92a72ee4e2e364f8ea7
SHA512306d56bd953c0c3cddd3326ad288447b8dfd913a673cdb976b43f541aa4e7686b23b75f42f5d95f6cb042ed8f22666954a9e1f93652699082212c08d81a052f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5275bbbec07eff33628c1844c5ec221f0
SHA18dddaf0505c4011dd1e516e074bfb732c5fe435b
SHA256fc8e332829ca85aebae0c9b9b3f7a027238bcb338367d99fe6ce88b68038adf1
SHA512a6947388ea0d62e6cf2d983801b1375dab0d502e0a594f2aec84327f169c720ec5f77340532aea18ce1a6b783904136783276f0fb43def5932ccfe99ef1c5992
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57863a2f86a17403c8362275afe28d189
SHA16f32687f1c6667572646ba88de130afcdd7a10ea
SHA256a112e9d04f333d9acaa701386ac39d90bf2fa10b7da444965dca38b69f2aa933
SHA512cb69ee43017149b4e91658349bc25398b1d8f01c9fc46af00fde6ffb36f9e89968bbff7bd6de47d5455d3665c24db0826a9f99c43e4862dff65e0a83baa1742d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5694a32d67cbbe5a17c06f618d1962443
SHA1d107acf46537f81d1a847aaca2f4d63bb4509caa
SHA256ca2dd373e32c3db5011c6c8b60c6275871d0413a9926962f4f0d2ba7971057be
SHA51287995c339588d649afbba96812f0796e86befa6e54560b72d7e46daab2c8d554c92dd507024efd4e568cf8ab50e6c0f8098843a9c8cdf435a89df8149ef3d4e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5916249ac5b773d1eefd649854fb82b41
SHA132c77c03bd8e33b3e5046905ed3a1ee95b6696fd
SHA256d1f0af94592f3f6fe7e55900457eb85e9ccf6ced6923783baf7920916cae3f13
SHA512278aace410e6a2343a91378186613412fb2d0ecfe4be02e42b200aeaba1b90552c5320020ddffc05c8318402b53442a0a58ad941f878a84d945de247fda853f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7c53c376b501d7fa5e9f964c2d338cd
SHA17169c4f078a0d0f55cad34b34a4049254086c124
SHA256d546071d2afb731fb816f3ce28c9504cb3fe2a7d96ea036a561a969232dc3b0c
SHA51260b47aa83759b9b21cf6f05d4b33c8cbab35b975f6f8caa3ec70675d0af777bd65757cdbab43df718d634fdb2193131d729f195b6bb706a580d1878825bf7421
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e796947a37351670c97ffd408bf3fc3
SHA1e10b5ef5a4a64196d293400a5671d119dd825fc5
SHA256935274c1e62071af85a2f5506e9ae6da94716e759042e6003654da266e05ba93
SHA512c100ac3b09000c3131109b4b863f724a193db2748805da7aa427e53c6168df0a8bf769b8a5c91e0f4f32f5acda9f5856cfb4b8ebdf7e59a8fd0ee76a3dccdbf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd0470156dc2645fb58e039ec526796f
SHA107417b065a14b1992f70b5c8aee0398150de2166
SHA2563a762b82567b8418e1476db27641d0134ac574de57ae397a27f309960d27d8d4
SHA5124eff2189cbe412a65d356b74fea527faa3f4644fdaaac58cdb37816ae52191176d7deebc541b3179749a27b70d0460ad5925ade7838c2193788e5714faceffb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d15513999621eb2c880dbe9d6ff6027e
SHA16cfced39e8e88f15c6fc3b7b76e67a4b829de761
SHA2566348fade94ba06d1775f6fe03f8582e1bccb1d0609d0d6b9933018bcea0357ea
SHA512932ca269edd36573118bf029b8b640646fcdf279bfedd8bbb66da9487992aa852560bab27ef3330d8bdd46042b49eafff7917bd4c070bb0f3d99bb1481a6fe0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed70eaf0da1df837789a32f9a5a897db
SHA17f37ce07c90d7d55f70948c0d0aa1acd2d95b4ca
SHA2562d1e8ef4974cf2fd4c9b84a8ecfbcc76d618276912ed9e98241984d2ace06ddf
SHA512eae3258ebaf7847b799f79e72b5a882818d6202db5c75137ad006b050c2fe563fa1a280941f9b10307a26f91fbb6c6fb00aa7cf9238b6cb5259f96efdae267e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5482c0d471d679ecdd6731a5b81a56f6c
SHA18f4847a65bef0b19f33ed97ec609fc4781640632
SHA2560b3beecf35b1c6bbef1037b3371ac6cf11138a860af5b44d8a97f4415315f7cd
SHA5128619043ed0197b824caf6f5f02c02faa316dd562533dfe0fb97eaafce3f2f0f077d1e634ad93ec37a2b221a79aff313b0395192e3ae9977ee4465fb2b8838143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf9cc539d39f2c08ae48edebed63c6c2
SHA16c72717458169304ac327de73250ec4698720e3a
SHA2563cd4da0ddc0c3c099e9f4e61fc5d78d6f9005417bc589f469f91694b85bcda43
SHA512d6826a024b3753a6f7ccb808fe251faf6ea12922ca3c82928d85e58901be44b2d26b373ea23d3cbfaba87e637e62b5b870004034a09109e6d50b22cf053f8fc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab16783be15ddcfde997c1147c6932f0
SHA12ba065e78ee57167df023af550ad47cacf57f23c
SHA2569f4b9c2d9aaefc26259b0440fafa6280a0ef3b503feaa34bcceca04850a839c3
SHA512bfd243d310bdd7bcec19f6f0ed6137e2032799513d2d652f83770f4cdd152244c03c68a59163279daf9addbed58506937de0693d99246f5e031097a738763cb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e362b2a96331b356967a0b851dd060a
SHA1a671798c09f56764f8ee6f1d7727ad1288c68550
SHA256f9385e89bd8cc8bbf5b7a8cec1c77bc03d180f3b6b1a503f82c7c23cc06a8ae6
SHA512cb1a620b375af3930d459d68795662d601b6658c5412307425297f5431f6ae0e396642b4288e6cb22c5e01d9cc930965198287a17f96405eea8c145eb343bfb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbd09b4a20aabedfd5ae7444b76343b5
SHA194136974ba574ffb52ab61a8efb9ee9a56c5837f
SHA25627df4c7795abaccf93e15e227d11b1d900ca0b634515b57a640644ddfb6d52e8
SHA512795f41bf6af94f7b8e4581f32d19e21bccfaca548eb54b67d76e079763383bb0b0a254b415205a666927e44d4beca5a33bf7db4fb9811609613b044f81941882
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af07ea69d3d0bbdae0aca307ee51ee4a
SHA1febcc4b5082718c461e76c5edb49f2da422fa246
SHA256db7f0d740f37879ac5849001fec03b18e1ccbd2845af0cd0ad1811f88a095cc2
SHA5129b34df0e441ba573b24bbaa473bcddd0e01fb611250c8231b0c4f82d9c5a61d89b67639b63e865abfbf30920cd414821fb1badc5d90c7085875d873d964888ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a8e877a173479dfb47570b3d9449f91
SHA137747c2e7aa63261ae3911a4ac395b65d7d9490a
SHA25639ce38d0b75856e23a6ea590425cdb7fd6fabceb5534f1d0db9fc59896b78764
SHA51298edc7aaafab6c5d5744be857483c67a26a511782dc1553f927e8c78439f8acc8173a30a4e466529a7003506d1c4160b188dea5872005435f12d0485c773a4ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5540c8bda29665c130873a27ba29cf957
SHA172329e394359f3e82aa932b937e5e015a0e9b615
SHA25667b3a688fa724175078a2bcdac6525f2fa2d98c205a0c06f437f95a701fedea6
SHA512fca3ecedc09a29769813a1e53cc9c7e164f21d8e11191020a17ac34d0b69259a42823687f8ce9f6ef8e0ab3da6a0d6ecf2cccfd158d0c1be8c970927bbedea4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b6ee123065654e26ec7672423361dba
SHA1a568822633eecce56ed1373926ef4d584fc92506
SHA256037642abe13ea27b41af97055a44ea2f29b4342706fc1fb2bedf8ac2ae8a9ccd
SHA51271af2f8a52776db6939883a808a4d936900ba4ad669711406e3fa9364c34f55186d3e3e815a880a8ef68cebb48c6cc588e01496d8150aa8fcaf094ad7f064d01
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WNZH54VQ\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b