Analysis
-
max time kernel
122s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 02:16
Static task
static1
Behavioral task
behavioral1
Sample
32f019d5a4f074e05fe3a1bc773ac062_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
32f019d5a4f074e05fe3a1bc773ac062_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
32f019d5a4f074e05fe3a1bc773ac062_JaffaCakes118.html
-
Size
53KB
-
MD5
32f019d5a4f074e05fe3a1bc773ac062
-
SHA1
52ee21c1709a038772a8a328f99c41e9150ec84e
-
SHA256
15fe23998b3c4a61eea821181b075dc84996a7bac8b49f4a95ba65893aafe197
-
SHA512
e0d264588f494aee3ace00b1b31f708bba860795b1f2d6ffb31074266a289da6ab6b054a515b4b685f354f232d2eda0ca77d2a80230ded7da4a080fb8e0ff806
-
SSDEEP
1536:CkgUiIakTqGivi+PyUjrunlYN63Nj+q5Vy0R0w2AzTICbbDoe/t9M/dNwIUTDmDy:CkgUiIakTqGivi+PyUjrunlYN63Nj+qj
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b700000000002000000000010660000000100002000000078ffc00f239edce966cc60f43e80221e92fef762e5a79b6a93068005bb6ccfe6000000000e80000000020000200000006ba43fb2e108a0c6c961c7b2144ba1758f0abd65f1736ccc43292d7df5d9a29e200000006f6dbbac5ad6ad911ccb9130bacd2d3434e050e039b3b176a0b356487817c95f400000009ae7fd8d1c95166c9b6d2b4cf63ffa5369ccf948aaf4192bfcd32e482e396c00eb8ea0c46e9937321ac10db6966cf098fb9c523104b58a22876270182fc27421 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E54B1711-3E64-11EF-80D8-CEBD2182E735} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20623bc271d2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426740722" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2296 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2296 iexplore.exe 2296 iexplore.exe 1800 IEXPLORE.EXE 1800 IEXPLORE.EXE 1800 IEXPLORE.EXE 1800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2296 wrote to memory of 1800 2296 iexplore.exe 30 PID 2296 wrote to memory of 1800 2296 iexplore.exe 30 PID 2296 wrote to memory of 1800 2296 iexplore.exe 30 PID 2296 wrote to memory of 1800 2296 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\32f019d5a4f074e05fe3a1bc773ac062_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2296 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7d3c0982aea5ce4eedf04894e78d198
SHA1f47724fef3d3fbf6beffe7b53fea958664722ea3
SHA256f4853309d6b6071592956569c97fe2d26e8fdcfeef00cce1de5fec7d58702f5f
SHA5120bd2e73f5aa489df555840ec5d2496b7babb7e6406b0ff167a507352eb3f6458c58c086dc07186383afdf45e37c436d28a0cf1fc3d849ef6f6a5afa2b79c96a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519d277f250ce6da79233333d5aff5ab5
SHA10da030397f4551168fd16a41d08137d83738a589
SHA2567cfc4e4a00a327f336a2bb35f4431a66c1d5463af9b8cb794bb85c2fb51d29ba
SHA5121ae4b62534c7ec53eaf0bb8e69202a9c0c7f7fccbfd8fb5515e957dcfaae635bf73889823219ee4114a7982c6bf9080e833fb9d7f807ad6af2b9c5da3a15e857
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b8e9d082738bd605e947d5b050cf037
SHA194ba725c59436e53df0b1724012da42b2112f404
SHA2567463c10016027b4c5c80297cb695af978e792d6e78f1645626e0de66b66f6fb4
SHA51211675be54cd1d1b3e9491918b71fb4378f62175acba99e48240ebd885d5c43abe7659f7c2ed00ae862b363bfa1417c6296789fd36501289d13ffa0cf73d61d6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c21c4f6c6bc5c7ae520cf4c58e391dd1
SHA1968b49753244a83aa54af1a77ba31b6831f5b87d
SHA2562fbe0a2774821a1ab1dc0a95a82f8910e7150c3ef4413ada2a9c48fbec41d0cc
SHA51221a82db2d8d98f619ddf2818bd9f4a98479afd78de81c6d346bf6d4643494d192bd4ab1ec19ebce7534463f082c604b363d9e3793b914fe5b5dd2be250acfdc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534050e85a4ff86b2771cbdca3f2c98a3
SHA14b6d939f47ac73840cd4995f6b95e499b01ce3b6
SHA256bf00654251e519e2b97a89a0183a73f7b2aadad87bef132d5b9fa1337bed1cca
SHA512cf351711aaee3fe22527f7872cb47c24eaa3ddd7e3b164a12b829ac6e00b72935719d335e886a683f0531eaf2e66d2ca32760b9b4ed33fcf2d65dad6abdcb570
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c668d606e2ce98a35b688e4202bdf07
SHA1fb31e4283557a655c33e3d2240baa91d405311d7
SHA256bd9c80a6bf2b265b0387dbbd56650e8c1f84323b5905b2a7e04acaf5d93fefe2
SHA512b39429763336b80e00c5182742a0448a886b024aa5e389941186e216b7af9f987a17bf572394c3cfe2ee48074023622ca13427c03019afcf59635819160928e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5687d277d5620595df007df1fa89de49f
SHA195186203df2165f51cd76897f8491e49bdc22ed2
SHA2566f15ed2048c2dd610442bc8e88d497a5fcde3d38ceed55a9cf84af4d45b8a481
SHA512f1640267a10d7b03e460d0a2285b8f93cb8c13bdf5217de5af6752835598b359941064ee3388f8770535a508cec772d9e11ba70f271f26a7cc907064b563c139
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522fbd68f55976072606a882d08d1b4ba
SHA1d16c845758deaa3f16913cf00cd570982ae4cef2
SHA256ab89f8c1d8da87ba4152215e8304129ba21e00e07897f81ea9433dc742842371
SHA512b0a9b84bc9a327f4f8138dd4bb84bc6c9b70346daf35c42a51abae3b739376d6fc31a99adf791b51501861aae916c45ffb073ac75ce2203c121d4e785def7f51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535cd3527153021458522a6999bcf720f
SHA145ceb07f23c4cf340c17589129e3bd17e7ee9884
SHA2561df7309640747cf52e102444b8548dded275fda4292acf5f34aeba789d9e2908
SHA5128849ba8ac4d128ae21632a2cb51e7ed23b5dcdee690b4b6e3d031da111d1d949659d129bf9e7117456ded7e9bd93da96c634d04a1c0ffe514927d81593205818
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518312f356ed01d44ab3e463353ad8c39
SHA152e1fb6de488df81331426ea0bb21c6434fdb026
SHA25617877a07f9c772ce8eec3dc348f64107a0b2d4dd9af6fa156efeeb7d2b178da3
SHA5125466e9eb96c3d9b9ae97650d99439a9d630b2191c21d41ade51683f796392c5265c25fd0995781d1c9e115baeaa3ef0891da8dcc7165614fb55126ffafdc998d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5127ff5abee1285f8324d9ee1bff5cbb8
SHA11a7f60ec0dc965940e102b120e7d3a912f440b55
SHA256a0280bbe5e09db0c5bf114eaeec35e28d8dcede9e4a10735e3d5fa47946799d8
SHA51260236b8c1687911ed1898ea2f70b095a4c29c2cb4fe3eb5b8e7aba36a6f121391625968b157c089c38885d95917212bb0ddf7c1c81be4a4b070788fae0d501c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532644da984c2628a25e07b9712368f22
SHA1b307b229dfaeb904db09e158cdc92156b66614cf
SHA25657665f091363b263a1f378aea0d4e7d9f4eb109be5d890b3e613e235759b6910
SHA512317f61f3629a1e907b63487618618e33536ae3eb77d730b13e4817116542b50ea431cdb5e8d74f4234d84b945505ee0721f6a45f1625b168696191b17fd1aab9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcc937573f1ca343d53505f18e50f5e3
SHA11ac098ecd55db178e10eea99deb77218ab16cb07
SHA2569ec804f002f06e0b4ad03adad69ec971a1d05ffb93226b84a73ab450b93db5bb
SHA5124a53fd26035f8279677032f06135e78d77623a53e5dbf0cbe65bf1bf6b850b720b8f5986b310ccd6f7e977e6f8284a66d0de93f626a61e781f8871d7be052b73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d6256c64f815633f1166e77e4b421e5
SHA114121d2f5ae38c0b7ff01b24a6f4cf2544dd9d3a
SHA2560e12b3601eef4ebc32957e273ebdac7c2e3dbd3bc623988d7d4b7f642783cd6b
SHA512de7edfd2b8d11170f8e252ff6513c5f530a1810e0a986ca4a4848b9c81c1aa00150cdad518ee3ed1ba82c8f34f30de4444a8890e572c2bd0db08c6860c292165
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589396ad48b9e7bcbf096c29d6510a481
SHA17aa604586fe6d7b0ca14ed60a49f37a1c4ec429e
SHA256761b0d09cafc9c503fa8792e2e46911e28ab47dafc117979484315156078a9be
SHA5125b1f4ec3bdf68e493e80c56e53bf5f3f478a57df5f3f31f954a569fa6a5da49857f668640d9c8e49561ce876655c6fd0e4b8da3b0b7b69d8615684159c51adca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58af708c904a10399e878d3ba1a1fc3b5
SHA14830732bfd1911dbc07af156ee8faf3475595aa9
SHA256f2b16f610c82b159e36ea52a02e879faa04e5e1bb6aed2592b0b2882341924bf
SHA512596a7dc8095e99cbd20f6294c33daf0197b543af38d7500a53b060c0300a25dfc1de70bf6b258a4c8f5d4186ef3e3c06fd3c5e4cf03cb2239a177bc89baa481b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5546b244db96b73c6b7847794a0172b
SHA1ff856f481f84f3b83544224d68dfd0ba0f4de590
SHA256e10763b8ca88eccab45f25285b17d8fb8096f2144a3a456d7d9f0f2860a1a787
SHA51203405729a90032a06889e432dcb392623651fbf23d449eb53d0cc86d8906ebda5942292549a8ab66e79117f4bfb68804a81059848d19a5c33191d258cad98180
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3574e9371625432cb058f17c3aa7c2a
SHA15fe4797d14dac32264057389ef7effcc7396ce44
SHA25626588bf076227896ab6a6229181de42e9f2cbf8120386a7e391020c276c5b984
SHA512f5a5d71d78448c46876f3f9daa48e2bcae28ddfcb54a5e4170131051e396f87e955b645029564c1dc174575731240ab60ebdf40a21336057c1bdc590e2c8e715
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NFAY0EOS\glossar-js[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b