Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 02:06
Static task
static1
Behavioral task
behavioral1
Sample
32e78d45661ff9f4a4dee12f334bf482_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
32e78d45661ff9f4a4dee12f334bf482_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
32e78d45661ff9f4a4dee12f334bf482_JaffaCakes118.html
-
Size
22KB
-
MD5
32e78d45661ff9f4a4dee12f334bf482
-
SHA1
64c8cacb07d5c12d30b5796a0a0e25c1d9a5093c
-
SHA256
28c5d6a458e85e7f26452b100205f792bf7002eb425364020e9808d5cca20a51
-
SHA512
bd12d2e1f377058ee6459d735092e050ed9f77d1988f005501b09358fc1dae2eb4fdc35ec9f439dd8cf2c4c9f454817c71ebce5f6d5519a349e58ef61ed4edd5
-
SSDEEP
192:rarn5yCr4p1qfaPeqG27vAJyTG2X70+9e3rL1xwRJr0:C5yCkpF2
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FDE3F451-3E63-11EF-B961-D22B03723C32} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70ce4cd270d2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000002e5bfcc5300efbd87e2ac2cf76171f1009ec03d07463e7fc062f8af6fee955c1000000000e80000000020000200000000056fd438f76b4245eddc3b33aa13b91cff493deadd7daca14285c95e33a4c9120000000ac7f3841617516d65775e9c100dd8276dc9954830d56d9309ecb5efc52b7b575400000001b03606d5203b180f86782f6fe0f077b995e57f219b41c6b1b264ad851e1dc49dcb100ec7620452e214bd3ae054c1fddd720ffa0bbb723c7a8649aeb096fbe00 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426740333" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 784 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 784 iexplore.exe 784 iexplore.exe 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 784 wrote to memory of 2440 784 iexplore.exe 31 PID 784 wrote to memory of 2440 784 iexplore.exe 31 PID 784 wrote to memory of 2440 784 iexplore.exe 31 PID 784 wrote to memory of 2440 784 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\32e78d45661ff9f4a4dee12f334bf482_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:784 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c4bc0ef385c1c0be3248034f07b8d2b
SHA14f2a5908bd98a0df4f62beb61fd596974a614eac
SHA2563b5c7e08c064a03d337ba00b1871ed99a23251318e8cc8a7769c2bdb02786c91
SHA512e8eb6393ab1ffc85e50f3bdb3dde0b5e1893d7f6ae1bb617c04f396525c07fd9f81c19af516b1d803b2bdd5c862120bed35d12d04d2cedba5ab54ea9cc9f8ae9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4f34a4108bb197683d73cefae68f5eb
SHA175e6036c881e27e2aa19f369abd3e06e7d8d6d2e
SHA256934cc612d71529b45737f68368d9d9ee477af6eee6d84d98d5cea033606d8178
SHA5124da40c8bbee831166b5f66afc0f0feffd95f80986fe096ffdd60e8d5bc93253be775bf328c7e00fcbd192ad88284fb48792f06d035fb631c50dd97a9732ff7bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5807d220874cebfee9ab061e1777a4ff5
SHA1bca1187c4879810d5e923058ac4fc966c23ff652
SHA25681be25603258dc601a0e666dc8c3ec9773b619b50f71b9aa75a17a81221abd54
SHA512681530c6d7da8e0c4b298b7030d14bf799943d4d5e2151145dc620fdf469a34f7fbc55d74c0f12b936d8348468d884850667ae8ff5a2055de72ecf620960d872
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb98d426bfb0e93bc8f7feb594eb9328
SHA1f95ba4160c45fc22e6f1bbd245cd1ae0f20c1105
SHA2564a4774ef6912d16bc26206d3b67db201c8c862fc1632dd7d94911bb0341f21f2
SHA512fffbfe45d774ec42e484b096eec4c2b988d2971a9e8c37929ca40c301c4f4b0db46e53722f9f265a746fe06de03682a844efdbe607391e6a0e34dd56d9cf25cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529c3d700dbeeaf99a2b6874d296b2a41
SHA11d7db3b3b3461907518acb4cc1968c606ef07063
SHA2568b1eb2c5c32b676401de22c1f5a5a8e07383a8084eda756c37597ca3d36532af
SHA5128b6c07ff140ac51606b4b3a83eba021e0b7813aa12f762ca922d74e95357dbc69a039fa7d5d490d56733ec43e2f289f1bd8cacb2c02a25e6a664138addb9a115
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550bd6d0177c613924b3992b2b30424c6
SHA18804c0a6893e905cb2965ad5277a1c7b1dc9a2cc
SHA256c089832d4daf73cbd04c65084219a78d7b39f5c805682dd6ea1a32e0017e5a3d
SHA51252854251139c812e14fb1b430f187471e1096514d14105342f88fbed8c8e12bc1ff1b50b436551b47895e0c982a41ce82414525244c9b6b1ea5408898d4e7d1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4828f62c823e693675630ced0afd802
SHA18ba3e29863f2605139298e70e8618efc1c902256
SHA25693afa9f459120ed9ba3cee1cc764b4c12638a2bd986e999bd122876e3fce0fde
SHA512c5a2bf37c33a270f1dfb97a940378dbf5d80440b05a05d3e086eb8214b108f4815778c08785816a3b9702bc678843d6bee83554c0b109768e08b380555c6b621
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57176589432adb1ab25248f9acbc548d2
SHA187cb1432f171b1300d5fb1e383cf02c6ee44ebd4
SHA256b7f68f3647e2bbb933a0832580c05c522e644ba697324860bc54fb7573c6efe7
SHA51208fe6e31c6a8aa48d0c89c0c2b6e7bd30e0580a41292d6642aa82f20f0edbb3778a5105f9f49dbb07af41c5053af4577c30ca9c481cbc3db776b617518fd7396
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c18b830838ead907039a313c5fd100c3
SHA1cc30f674c285d64c60bdea92c2a2fc707ebabbe1
SHA256d7c49ce9ac091de4a011bf37f1b529719046614d4a7c774b20842c8c52dc2109
SHA512aded4f59cf1d3be06cea6fcc9180d6f15ba0d7b2d59754a7bf7c4a930fec2a4cc954dc9b50e2eec39647cc66a6f1d7d17bbe1f28209b62f55afcd3b2e018adb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53344647d7163629e19d4a55b114f48f9
SHA15556710d21a67c3f4ee5781734188f1d3ef21f8b
SHA256e571d32f33255ebeee87a4460617ada49eca90d811e2f81de9199ea36ce79b64
SHA512243aa3c962b1b0ae644b3dedf9b31ed95683ed5cd3e0de09595aabdd07646b3766ac5796f0d1c457c7438af8a006173a0741ef4b96a38fbf23a9c1d818e7d91a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdcdd1b24858e7458c70d1036ef567b4
SHA10c97aa3675c778df67288bbfb1fd4f2ea560d7ad
SHA256b5d0905e09149f43f804a26d14caeed675ce5cb2b3518474d72decfbd483b310
SHA5122f8cb98e7754ca0c8cee0880465396bd379a91924afbf24bc8e494a089438a8a699e9a3d6f84ace8aba633616a69c92af643b07824f6b08eb6c55e60cfbe72fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e500acbf496b110f8eb008e7b43b3c01
SHA1ea807f682fe9a09605018b8a3c143428efa7fce1
SHA256d7954fb78ad1e86b391a6aeda06f7dfb0e9ead199082ab1267a76d3e1106051a
SHA512129bc9b0ec90da6adcdbd2b4c235b21f1e3c565899885906e57a084c3869dd5408e49c1a2a68b50d46c82276cb25f3bab3e50452c2a0095bd66ed9e217f0f14a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a943fc5bb76499d4c884372007eb6f2b
SHA1cf2d458723facb52a7a7f56fa6e2a60cf63b539e
SHA256cceccb488b77260fac4fe678d6d1b3734e4782e10dbefb9c3ab6156a71ea1ad9
SHA512fbde8893e491026e23d76594b72878eefc23d85f1d40629e853f5ea0822c2274cbfde2cb3dbe56b8b50a52653c2e9eeb52fae2ebf3e793a7d3d945e200addafa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e71eb2ffe01c591d9cf01fa27722198
SHA192ff3fd8c16ad74418f4d4daedae856e1be908a9
SHA25648552b5c7f41f3059a7e72cd9dc218dddb8786268c20e3fdde5c73cad49d6367
SHA51230c2093149a9b831ae75ad115fde16f882977e871b6bc3d9e552abe54ed8185a078c811c4a956504513abb8c350c3221a9983baf613a935bb5a3047c93a3f3ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f986e88a5ad1299371bcacbe88bae6c
SHA143ae5b3551df60877685b8823a7fc707d8d8284e
SHA256820f5887860bb4a356f13573dd39e47102fe158d2bccb11d2d0ef3cf76ae5072
SHA5123b6f87af975cfe2d6bebc43e052160598f5c03eccdffaf893684f71d2708337478a3f611d48a7e71ec87a8e322a02025f894361d8f9fcb0cf4cbcf5108bfb36f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd98f60136d1d6bb0e3d1891d9c624fe
SHA14f1bd6e377a057e181791e3246cc2e75f80caa9c
SHA2566c2aa8bf85098e7de02dfa14500cc48a99300c4e580eb4c87c35da51b5d8a4a7
SHA512851f1448cb96d7ff6872b2906b482f4b2ca41b301ba0523915c7ab0d924cde1abf0e719cfc538ea596a168b4ce2f68823ad9604df96adae0e0507c3eaa1c542e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cb20df72c39ccb16312683362f5b6ce
SHA155bf74910e4c4e6c83dc95e88a8839275a0e24c5
SHA256ede5734bc6005203dd8b63226f25c13f16437a3941d044b5b0a6f25e7ecaf7fe
SHA5127780b920a5d338624c7ce7120f9715c3945801bce8ce688131dbaa69f0505d3705605130e6d685e21f3321282e70352bb3c68f4828ab9ef5738c797391c8c26f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f63b7147e40d89e3c5a500f742401cd3
SHA1ee5e65c19dda0336a57a9abdb5263b3e1ea4d5bd
SHA256d31bf25a3e57bf7496af32b840e523e1c826bcad80f1226b06ec7a837412899c
SHA512e2610919032ece54ff8ffb04cca0d101bb9ead04ca9ab6e91f89edeff978974336317c3aa3361b61ec81b1b8da5f2cce44cd1cd7cea6be46d416d1fa8dcc8853
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559ccceb72cb96339e4b24dbc6d56977f
SHA1a9ad4842ef3b3b1898a68a390a0d8a1b60b67a68
SHA25690b753446ca1ffd2a6036dd0ab1151f23a5190be10ccd91f803b775a02c15b97
SHA5125228d518de23d3a4cb82b0ef588b5f2f45caf94b3fbdecea46ad4ac65033e58442cafc9a8ba9233db1a2c9ebbf1adf671304b95b95993cebe6164e25236db859
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b