Analysis
-
max time kernel
136s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 08:39
Static task
static1
Behavioral task
behavioral1
Sample
39397ee35f6e4791460a2d6eadba48e4_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
39397ee35f6e4791460a2d6eadba48e4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
39397ee35f6e4791460a2d6eadba48e4_JaffaCakes118.html
-
Size
15KB
-
MD5
39397ee35f6e4791460a2d6eadba48e4
-
SHA1
31d85eaab825e6efa55016bbea6250d1c6ae8729
-
SHA256
804be9199e75b5f969dc3c30788244cbc926aa6d3a58b72a0bc2ebee48fdb079
-
SHA512
a9cfdd634d5f8e78fc57fa17ccb6d7e973c26e193fd4e867f7640bf052a620ab62af475e1f88a1c07f52df74cd9f90e0827006105073f3556df5e9ed2cede7c6
-
SSDEEP
192:t+l7vFZ7vslrgIK/i+h4PgLvvSykmZ0duphlUu71FlXYlZEf1lMF19f/fXg0Juv4:ifudY8P+vvUmZeQ71kT1940yklVAXMe0
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000316e46390a83ceaddda1c55546304fd697ccebfa170875477f22a9cd3751eb21000000000e8000000002000020000000a92471b97d3b6233c045d0fa99d3142e0ba4c86d0efcfecc5183148bc921a0c62000000057aeb7cfaa5352157c99cd13b555577001159668b5ab06ad89af03c4df72d61540000000b2f5a1f643f0cd5730a3d5108e6eb60bbf6072e8faa295903f71590cb240f25d0e3908ba5f4aef7dfae237aa8659866007853257f282c38b35b948114737554e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421665061" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80cc190848a4da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{32C84FB1-103B-11EF-BF06-56D57A935C49} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2032 iexplore.exe 2032 iexplore.exe 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2060 2032 iexplore.exe 28 PID 2032 wrote to memory of 2060 2032 iexplore.exe 28 PID 2032 wrote to memory of 2060 2032 iexplore.exe 28 PID 2032 wrote to memory of 2060 2032 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\39397ee35f6e4791460a2d6eadba48e4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2032 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58568821ac5ea4825f79072d78a99d5b9
SHA14e9e460ebbb4d8a46c23793d28e28572baf60d6f
SHA256f9086cb74c788925df8fcc897d880afb56c3430576193356d4096e34604a8c72
SHA5127a8f492717c446d2184e6556fcce79a2bb40b2f4b5b2e47e24107bd0b6067a4067bd66341f8efc7a0f71f09de8c5c4d8c3ded1e60888104afdf72ad7af0720fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7ba534e9d7cabc0371c695b9eabf174
SHA1fc99e60640db27f9b4a0eecdb9a32047636084a8
SHA256a55908ea5009967d4d39e4113dc37e200f1cdde6f838bfc02b92831967ef25dc
SHA5125ee6983d7dfcc04f8f5e6a086cf7f9d8e0a8e10c2408bef5c20a3346a54596b1498ec645a4c097cb6fe722bb136d5f91a291decae453b55e73fac9f5d1b6276b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58eba81477ca1e39742eb6db87126690d
SHA1308fb6eabc914e8884506494547221d91bf7cebe
SHA256fb38d44fc5d607d908eb1a3a1f44c180e29cea5ec68b39841dd787b89573a7b1
SHA5121d81bed8ea65bcbe0ea810c62fdc25ff48dabee948259454a03f3d2bd080151034bf09f4e9b010057604ad3c5ca4e0625f2a5f2f64a10e2a1d2baaeb4911b56f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550400b92c8636ff0ed005355acb2ea04
SHA1983348762797667cfc2eeadc96b5bcf46d7e885a
SHA25696aedd01cd0cb8fc964d8cae7914a4f76b4c221fd3c159798960e6015bd23dec
SHA512664b17159ebb3e40d9346cf1b66c6a32150e4f884dadd91ad5aef55ed4265f8f60c297ef3d9120777c5d0b15ad63c1369711f94bdbf6ec66ae59490db81002a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538852ddaa00fe40124db519de8a28bf9
SHA18fec6f244cd9d4eda9eed84429b662d44ae1a5c7
SHA256d981ce9bfe048cd042a8f736e343ca6a061b73b796dade164fd0367c73514245
SHA5129ba859c5231d4c9a013076bfddf64721f744ece6193563929e027f634f3b83251f539f41ffc6880e9e0ef37b52ddfab2a5a9faf23a49c6c1d16f797c97b7644e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfa0e4c0850f1f9e4b7adbfdbd75a6b4
SHA1e983c86c77756c31850e5ba46a6c0311a1f5724b
SHA256e3b18979f3d4a3313eb29a0471eae0181f8fa8f9731e41c9b6b178800c3dfed9
SHA512741968cc11b1ee72bcdbb99cefc27789579c563c33532cf0451820136721fa16389b400a7d9d21b54bfe66f26038162b3641f6c13593665b5f492b1dcf9de9aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c7abff7b4be2630de9a01200b1a0dc6
SHA18d47b47183827518f8105518648b194ec05c4d07
SHA25652acc68a7ca69554231fcc45b2fd4216202fc4e2f0c7445e6b5ef233e8979822
SHA51286d2447a90f6c1483abc18455b7777761f6c684c5a6f889113dcc5cf235002b2554bccae5d8a3c594627784da5f41136b142e27cb34d56b926f7cbd7d5b8a694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55534c008abad9b74cde290cf95498620
SHA13aea1ddc9ac8efd15ab39ae28c2b86f5c352742f
SHA2566b994584ad4839cc11f1c08c0441674428b295e0b2308a0e0853ee32fa7bee8b
SHA51254d636c8f114dbaa5288336241eeee932a3afdff48ba3924e79875dc38f27e3cbd9591abafb3253285169e04a2d72bb662a749030b56af74e039d5fc3d4a221a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55abfc184ad3f7909ea9de57f386efc45
SHA17cb472c35ffb320e96c3fca9251449a3d03541f3
SHA2564ef2e532754a2014ad96f39208cdf395ca360eab76a0598737fa0754699f94b5
SHA512dad6b25cb2afeb44eafee8c628e8b07f3bb9bb3c79297cda381c1d170c113b622c9ac2887068f0a137b8f3c6247e73dd8c199609dd6ba749df168d623f9647f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593569adc8e3aa4516c071d64b9f300a5
SHA16790d3c58050352f70e1ab66cbbe7023311c25cb
SHA256e87489dffb18373050ba540f9192306a298614800a5710b76ed098927fc9ac98
SHA5125e089e9573a88d39c5a8e2871bdafd8623bcdec12c7daa0025cdb0beac434a0734597316aa1f3ee1bf0dceb9868374265c3be0e9cb598ce780520cd40900d51f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e42498ebe72f4b746aa4d44a967e3b1
SHA147ec11bd686dd6d95785df9da330b82a88136198
SHA25641c5b3aff3a12b90d1306af83581bc5e740d3c0dc40de6d3064812f01cda36f0
SHA512aaafc44a11022db2da9561f0419b1201b9e3e9816b7f8493f22756dc2dbe818d25d64596cb681bd4b677b5235002ae0d9d109d66beeed6f6601163e71652971d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c0049ca6d8c3c99c206f5d48188fb30
SHA18d40a72ac2d4bcb4366c206e64418be05e3e239d
SHA25609ea1caa38c4d8282074b28c51a42a8b0c3926907cfb7d28dbddac1d7bb88f33
SHA51241e84e2e83ed06d8176c3703eeed247ed40e66d79cbcbc1bf577af7a268c50fab39c281daa1208bd6f4e26e6248844d1b7ca6b6225cfa68a1693749b3d1caa38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568ade73b8acf1965c2b1e626ab986d74
SHA17f8d4682dc1da6b17fbbfca51cccbfc63fc2dbf4
SHA2569ff9863bbda61ba731e432b2d5f9cee63e886e5872f0f4cc26811347bf6d061f
SHA512aa77c91a140ab1d670af508a62a9aa410e9b1100722d461a6b6da50dcb710976b9e56a92ae9eb089bf708d19fe2c8d8570bc2f3a7dcfc8aafdd5844b49417562
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5742b00118d5dedf6ee7fed8544903481
SHA1a637161cfb5852084542f10e83cef7e8ce9848ba
SHA256b24e7a2c595642468ed6f4de13f54ec9dd1009b21f323fd4a744de0f720ecc64
SHA51219ccf0ee1e69cf8b7d7c8aba8238b83bade8befb2fb9dca2e5b3ac9fcf70a997f99ddab7a0eda5e48813f46d7ff407d354125edfe5957d802cadba712551a0fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c25234b9ec5c1d07d1cdc58f721f5aa7
SHA16bff967d7570b3c79833a9c2c3dbe4e59dd72325
SHA256afcb49713b4a04c1935bd59c119f70e11625bcc414563547808f7799b9bb5d9b
SHA51216e7109565f1706e3eb3409ff4cd8fec65c05ac48f32eb196db7a034e7bc77956cd6f13414f89c9cc943b0e648b90069fab4c1d77f9b74f49019edba9aa78d62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555f7a4bc2f17c9bcdafc744c4d9524ea
SHA1ba0c1bcf6909ac37aab2ef889cbbe912389e9f33
SHA2564c268b0a32afff1770fd65272680c00bb77589f4f98e7152e624b20cb2be5d36
SHA512f99a9df20388801dc1ea07df2e17309276d1f1f72d63d02d383af900733efd506284323261de71cf5f73c901a510efc65015dd6fac6c14bc75efb958a9128946
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579bd91ef3cf07c7697aa8cac48b20633
SHA1c20927c43e5d3d8f9b26b74fa6be26c7f800d185
SHA2569ab881b764bee445c832d603fc5dde7ca37a7bc5c7c4b30a819aab3d955e280a
SHA51261f5403f165921885e2ea837f0f92d65417899d02b087bbc23acaa6f95606b42daa85e7ebaccf7e9d7d83b9b35540a88f4585896d02633c4cf278cfb3354c02c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56840b3c45ffa19eebc6cb1832ff45092
SHA18765c6a066176b351aca93c380106d77b467afbd
SHA25612e8fc896d3be77840be5eb9d2b216001c5909dcfc5d5decdae52d20a0d08954
SHA512dc6d9c7ee070006eefa022bf34c63cab20b13da77ea43c53f9a375c1e4e03a643a332f25b93430b06de38a294b375c39d98ff691ed378d66856bf5f050acf3f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5976efe2b32abbae583c9bba6dfd13b7d
SHA113808217797393747228582553cbede39d0cf4e4
SHA2564d831c2b489217076edbe580a4961db770cbea71932b80eb95b5da16a4d9f9e6
SHA5126d7b40c4593a7e9708f54f3de3436137ee5474208dee4a9c48b228ea6e131a2a77bacefa19ba8cc0f526e84cc045376737f2b28dcce99370a220c9032f47d72e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a