Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
12-05-2024 07:03
Static task
static1
Behavioral task
behavioral1
Sample
38da927688e13f5d2a7bdd2d6ffb4fea_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
38da927688e13f5d2a7bdd2d6ffb4fea_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
38da927688e13f5d2a7bdd2d6ffb4fea_JaffaCakes118.html
-
Size
63KB
-
MD5
38da927688e13f5d2a7bdd2d6ffb4fea
-
SHA1
b5cc2721672ab31a837a9fb489025f7fe77c4c34
-
SHA256
6b021cc93c91f56bc0418be2dacab76887e3c8fa02a7bdc0fe9f6f938af2d33d
-
SHA512
7efab7dca45ba013f11f8cacd1840ec19256a1462aac6394843101cc1323e7cb1b0613545431a2e9c01e3db8a426037e32d21bf8fc83cfc1802c3077322dbc4f
-
SSDEEP
768:JiQ0gcMiz3sI2PDDZf0glJS6yvoTykyCZkoTnMdtbBnfBgN8/oi2c8QFVGys//I+:JRjTTFec0tbrgaMc7NndC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CF7F83E1-102D-11EF-A499-62A279F6AF31} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000000331e3d6c3e5953e53264b7c2e026e3286cc9d2acc7128d7374e469108764ec0000000000e80000000020000200000004df33ff145d9edfb8021da3e405bb774c1155f48c0c228e8bf4e764d9005a47120000000731146ac3f94db1a3b371cb5f03ffd850c2fb66cd1e68b656e781a8186bb30794000000000177f45b7918b4c3ff72a0a3cb141795aa53fefc1475a4985567096f40b78742cb2a01e5591502c403cdaece8d1c689f79b91e6f7f61347a42d3c16405ec0db iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60ac7fa43aa4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421659309" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2868 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2868 iexplore.exe 2868 iexplore.exe 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2556 2868 iexplore.exe 28 PID 2868 wrote to memory of 2556 2868 iexplore.exe 28 PID 2868 wrote to memory of 2556 2868 iexplore.exe 28 PID 2868 wrote to memory of 2556 2868 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\38da927688e13f5d2a7bdd2d6ffb4fea_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2868 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffb29d575f1a23f341f838567edf5eed
SHA179489cf745339e4acfc81ac22610c1e68b0ea971
SHA256a8ca6dc921e755dec9eb67f3af5445899b836355f377add85b4fe80e39f75c71
SHA512fae9a0e4e623b6680aa7cf256805d6eb8c1ff9259980d0d29b0c145882828588239714402bd97bef3ddfb461af0ca9ff09694f5a930c34fe20e6c9b3581aa2a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58dca9167e5a70e26ee727f73fb9426f0
SHA162ea920ce190394feb77a5a864b414048967b48e
SHA2562f61f0afacd089eca220bd1425272c218404059e809a795375f367230a1136af
SHA5125385d16ef7bfc928e756bc1952d6747db619adae5d086fbcb5bbc4c246462101ed80b1969f1e44d0f2b69163b260681950ab37e1d3c4f463969b93b4c303d443
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58942548becf2a7debcf349b22f594003
SHA12ab22f74b38a425da10aa5dbbd40177e357ca553
SHA256e8b593f9a7aa02072c5a822e40b9893fad85460848ba6a16545b06c935253504
SHA512a89214e795e7dce01d472c67057535bbaaecff972d623a1ecd1c26698c7916eb8184b568f7813dcc0df4bb62b1bf6fd61c62aeac6dcf359b656c1199650601b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cf61828a9ce120cf8b8a664d2192f31
SHA10ae9a402e0aa5392af9c61248bde558ece8bb39b
SHA2568247e6d8a5c705e10d04fc9975640dcb9a8092449979e16e2a7625a2731dd13e
SHA512198a755547b0d26a1200940eeb7dd9ad768004607618793bd8e9d3a7d2241c043cb7ec8296dfea7087eda52af60d5573c7f645b4be3c622e35390219032e9781
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2efda3c91acf19a3717b9ac106b6eff
SHA1730c545605e8b7342ff0e87c8fc575b547a2866f
SHA2568830ab3044ebe3be355e10ef253dd69db8b417378531d394a872597b5c2c16da
SHA512ec81339cbe1e9970f10ac5a5534d3671258629bf1fca0bbf209794831bfc24869efa06b55af09f4e5052244db2f8c76fb2ae3edaf8b93b77506dd4342f03699a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5f2a9f9824c1d089852eb750a7b8d2e
SHA1da4f077fe191a55c922b2677a0879f6368da4c77
SHA256538e3f4169c39c697e6287d004c59d1764b691e308e6808e208e67726ea716b2
SHA51282cea2e1fa8ea928d02b9c355b669eb3fe0f43a1811d88ba325951dc9c02fa1e2a44e67530b0e8436356d30ccac277e42588a30d2d89ac847a64e77296b89830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ca8074a11e9dbc4a74fcb3bcea69467
SHA189ab6fa6c3d0137a3346c1dd1b8601c83d88ae58
SHA25612d981157cc0bb59c51dc8fcce5adcd5bd2c3b6a0d6e38dea9c32b2de3308879
SHA512da3e04a134fa85b4c73efe257e63c6f2ca273d946471801c1fde4fae11132dda63b7c5e13ec1db6ebe5ffac9c40d06d7a57984beca686f1a729b80d0a08b722b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b50e9c6b78a704807f5dd4b852ad98da
SHA19f4a4ff7f71e56b4f7ff81d83c54445b66f5e585
SHA256e968fad812761d9d7d586195d97d8a1fa81e01ade04338a63cfea0776491df93
SHA512734113d1e47cee7c9bb5d3a2751b2856544df0bbe34c2a7335bb27eda3a52ac277092ca72582c7786dee63fb8ad68bd7fc012feae7a36cf7abb807b95313b532
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff5922b2f07ec6b6839423b3d227451f
SHA1dead6de6ae189ed1a4c89d6d8b78960c4b8490a1
SHA256febf400659986335169a9c75602c1d13a01461cfb137ce1890c6585e3da7c239
SHA51273414b594d9796cec1146baa0c764b2916e8b639bd1f9f230656aff2df7725d55de0d08c62965a06cc43debb733d299b3950ca269ab69b0f6af35144feb31365
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5293d8e41eab2c8deb827f422f08041ab
SHA18d6198437f97452b3c4443fdea97a8600b77b66e
SHA256209b1cf7bdcc3adec429808c4264a321db71600f7cc347cc762046a4e75e8832
SHA512bc6f75332065dd3ed25ca25ccc5da568f0c021513864001f09a196845ef465232e5797476c6bdca9879d812164c03919edd287ce78de211212805157053afdbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528bfda599b37bb0174804df05d30a007
SHA1d88dd8bf4c750f56acd182f5968d41a792a0602f
SHA256e3fd482fc4bd686428c7ac44b0f8c85e8226232e2bb4f1732aff02080ef8eecc
SHA512ca1603a6fc285573115cc8914d032b1d7473f2e2dae3a463c6df4b3e127b1f2f61d3c267d47be9eb4efee2038f5e4ec605a7b44df8698d5422cba9ef7ae06e3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502cb42d19a550f41a2d35e64e0115d05
SHA1e3bd916ff0cc4f6d15aaad4b13bb98b485490169
SHA2560b58345ea13c4fe02edb73093b83958c71730e9d018bcfc426436c0beaa10bdd
SHA512d3634cfe014ae51bb530726c52ca8f22129ca5c90347757850d6cfd47f607560eef6c93351c8b0d2bd7af0dd2a9be0a5fe797af0cf269916a5f499fd7550ce5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55aabb201448193b67a4eaf086f3611a7
SHA1873bfc90d6bafa87a12ea0b5bd1b9b5eeae6584c
SHA256167b43e4ab205ae374b9e8bca2b400b17ee3687fc235e70727e329dfe8c4f712
SHA512f54b5d72db2ecac535861ea8ab1afe64daa33867710896cf2ce96dc219514f53d50793d7b42e4083e76050a49f1c6cbc582307d3763f90565b079487df43eaf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df802fa5c758a2e8207153a623ba527d
SHA17ad1f3c2115e6d8aae6acc5250eae6242d47d626
SHA256295a86528379b7656147cddd05124ee66352accb82c4a4186639c420acb29efb
SHA512a7d571831d9a3d3c87e29b67963cfb6c20f7f8cf4c216f09d7efbf741ea39cdf32a7509c558f43679fffe9498674208c80972a5aa3b1f49b92e7e365d1674906
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5248c770b640b9d8d38737b4aa35d41ca
SHA1a97938210460657266535f0a9f14d90cd2eb0167
SHA25630145dfd72e6fed66d6d930ab23a936ba3eb7333f6f317711c4c3dfea2a45670
SHA5122dfb501584bcc79c0f538d2bea3e5e4bc6386ed9be1a819952810dc1aef8ccb575d7da512440bb6c00d2d1bcc06edebb23f52c24087f27cfa0fa49d8c0f0e520
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5563617c5cbe6852fdb84dffa219ff72e
SHA1843b579c6cde3937067f6ceb8bbc2a62f07f6728
SHA2569dce26cd2cbaf645f2cf15ae60e11b1c51fee1b55b58007cd4107f35629c37fd
SHA512c91a0d135ce37528068229249640d3f98b2e34c6cceb4e2a4d3b9f78eaa54fce7d6fb5f8ad2534f47251c11840fc274d362b88edc9924a8f86fe0d66a382b604
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d30d2f9c93c358d0e9e84fd6a1be7071
SHA150748bc2a29429c1d6377f9306dda34383bd880e
SHA256a8fed2964465e7976a815009e90ba16064df558180dd08a96ea6ca8caa92f6da
SHA512aa8e5befbc3c6240cdcf34950d9f900d1c8dd397e8423e7d55fe5f946909a41a9f191204b3fbea6a142a0a6aba2df70a036debf95d57d51e3b1e6e9beecab46b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fd431e4e756c314b82da8611304eee3
SHA104154c8ea55def3a5002b069e7c0d1551e870bc4
SHA25622fdc283150b523d0b94d4f9f6c2af0471d61fdfdb4e41c5298995ad012beb25
SHA51224676005dd76dfea958c7c911c2ef3150148c85a27550b55d698c7837d0deee3c0a93905307575e708bacef5b75190a39d5c6c3e1fc24c42da486d91eb8bb03c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ec2da62bbc707b307ec7f8b6ea04eb4
SHA1c274c8e59e0c1ceb4dadf0539ad3e7494e159e4e
SHA2564deb7877a4888bf3a96964a8e1239b844ed68afd10e9ce23f878595a786f00dd
SHA512bb1582f02172f665dd42b6269cdd549248fa8f854dc3ec4e38c3d650295570122c117d579f2a238faf2544110343b4e51c257c916ec0cb85db774e4a85f94f7c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a