Analysis
-
max time kernel
143s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12-05-2024 09:54
Static task
static1
Behavioral task
behavioral1
Sample
39810e3dd981b04635644bfe130882e4_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
39810e3dd981b04635644bfe130882e4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
39810e3dd981b04635644bfe130882e4_JaffaCakes118.html
-
Size
79KB
-
MD5
39810e3dd981b04635644bfe130882e4
-
SHA1
4c752f55c7ea85ea5c2fe4780d3c01f9e56b93cb
-
SHA256
8245335d01cc0a1ee25fab8b8fb7fceb4f7d4ff5d5de967d84682bf618369f69
-
SHA512
dd7c959f8b75dec17bb4a1bb0581e9d7ad8d034f05bb455d024af81f8ad2251b2242cd648f80ff195ba0df854b0f4595932fbb53a03068b2ebc73cf7d920f438
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sq6bjNwOBonzKt80MJoTyS1wCZkoTyMdtbBnfBgN8/lQ:J3XRw280MeTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421669540" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3081eb7652a4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000018cb80ff94c79ee1c7f3bd14062e31bbfc7a0360f9d45361c75dda12a9ef1870000000000e8000000002000020000000e5a43826a44cf849a0640ff2a9947467bcb60d4677c250de96afc31b0f45e87a200000007b46ad0b21721a3caae350973009750b0f9c73f02b45375b0c108c410fcf31c4400000004d3d39ef5c561306208e91216674a56157ec46b93c723f79249e7390e66844b192c484ff10f56f0e274a09cefe9145a3a5ff4adb6a147af8f70cdd27fe636ce6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A249EBA1-1045-11EF-9F86-7EEA931DE775} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2188 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2188 iexplore.exe 2188 iexplore.exe 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 3036 2188 iexplore.exe 28 PID 2188 wrote to memory of 3036 2188 iexplore.exe 28 PID 2188 wrote to memory of 3036 2188 iexplore.exe 28 PID 2188 wrote to memory of 3036 2188 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\39810e3dd981b04635644bfe130882e4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51750e4386ddc855e3417575bf3a495b9
SHA1f35b6a4c46d8b8a60c73899e7ee5fb1375f57303
SHA2560fa502e71fa94655ce4219f3d284b363d7c48751e1b6c6d270772b77139fe5f9
SHA5127fccdb98bf2441494e4fcb14d250c2fefb0eccbe2cad90e43342fd0f13ec5fea86d568187a790e473de343b94c280c728a40964b0295cdd7ca734b41ecd78047
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1bbfb026380308204da4085a2802c90
SHA199a4e18d83ae26530fde87c5c193d31faf8ebbfe
SHA256ab3eb89c09b5158d6b26bef039977e93eedfa2875aa49c82f3e30de280658858
SHA5128d54661e3971a60f960422fbcacc480d86667b768dd6bd119e445f583e4767f33b4b9b453efa8a0917886d76b5d49598f080161ab946277904187211f00c2074
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e4de7842fb15ad35cc65c4a43e71104
SHA1cbdeba712c5854b9c28ead5f0cb04ade4d2cc7cf
SHA2568801eb472676d9359621ec4ced44972cddc2a57ac3edd95b3f3956bc73cfd963
SHA5129246063b20e22bf028a2a9dc5847a725c696d083284178b38c25897a817df1ec7a66c5e07fddbe3eefdc6c19c47136665234b5fa018dfb0f5e8f4d217d4caccc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e518be7d01d1a83927c9b5851543ee20
SHA1c23fd3508b8db652ccf00756d062b7cc07f6a34f
SHA256d57b56ba3d5b1ab1fca41a56c69a2d0346f2ce3ef8ca8bb117aa60414226089a
SHA51293ba12bb97c6a619463638b1a1aeea3beef449609a5de0d4496ad718546bd37385a2d31cda3e4671633e04a1c32b3618ca9b2d17af8b207d5d7f2a0a4a36551a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e31bfd23be253ed33c45967c395163f
SHA19f02cfd8e4f9a5737022d26b3592bb36a7e6c34f
SHA256c03141c74c9ddfed0928ee47d58b6c471f3b993e26ca3c5475fe4262869a92a9
SHA5121af4ad62daf7340e629dd23ede5cfaed3d30a4927023b6aceca9fc190f2a5fad336a3db7eaaef59433c451a48f198fbe057ec4b07983b2f4429d443bf00b649e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e0d92928e58c23989f5b3a7f7c2cbcc
SHA1b53756123ce6e0ccd0c8cbbdeb57e9c0f3d77f9c
SHA2560cb009cc14805285c54a492a838996ad2bc20748bbb93cb0578b91ddddf2c0f9
SHA5123b58db21799cebbd8691ccfb191e5114989266d25fbbbec22ea8812704f78035b3bd5ab9407dd2aa63989584deafe7897cf2ebfd834a5f4204cd81a8e2de6d7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4d96f8b6f4b13c8463eba1b41e34d3d
SHA10029026c9b5fe859f1bbe3bf516f1010e97dab90
SHA256b3ee5fc78fc65a20ab7d76e4988009d78b1b31c7848dd737ab76e61d7c65e32a
SHA512480ed3481366d470f1bd0cd53fbeec0e4f1ab203055340b59dc73511ce86fa9d0cce33b907d96af9f540d16fe7eba6f8a974a9843fa1231d9c530fdd94d8f040
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe7db93146a1c701bc5bc54cef2e05c8
SHA10f40974f7647665ec750d5d0afd51c13010450e2
SHA256aff3cfcc5fc3af72af9ad3ce50726d5d0db7eafc12255e020de23116059065e7
SHA512fcfc0b210b808f98f5e98f4f41c565c81a7ba318b47fcd835e2ce7609757218cc8b75aca330c9552efb9662c6ce50a8a934849dfc9fabb2e0828821214dc8d83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591fe25152e7dd87b3350d0b913c44f15
SHA1ef8a07d3c77f1fb9d51c60ac321eb99cdccba565
SHA256e00dcaeb0b2821c0cb6801b9662696a4749ab746ab48c5fd35c2ebac6dd91ba6
SHA512a8b4570015604710579bd405f8ae620bdb7523f801b5502ead5027e87fd6ceda52dbea20eb99e8cd058aae7e331e2f1d3afbe3299bb45cb24f230ec3c9ef7e4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f1ca3552ece859da5e42d2cd638e620
SHA16bf327a0e2a7ad3514a6f3d042d44b8c28a62fa7
SHA256db25e4f283bbfe567dfc3a23e0f8eb25adbbbf22d70cde1abb8fd99f35cd55f1
SHA512810bf6b7cef3f0e11b1b9c4b61d41b4e127731ae0af68ce7eb98bcca8d33a1e36d13d6014e5ea32fae59c8ffbe18546d1bde9167a91bc8f65a63c7e71b834764
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f9ff810bdfd9d7ae7ebad0c09a8b535
SHA1fa99dce7c43ee8125ef317e939f2ea27fe2b5b5d
SHA2560f035f001ab4b913f184769a4952e7d7b898b8869b7a96c642ec794e44ae6627
SHA51233a833231ff395f5ae202539636f7776cc5d4e9b562a23ccb3ca0919400fdb88a1b71ff50038ffc62ba78db5c9357511920bf6d77d08083b65b8ba578ce08f71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a169adc1054241fe5997fe1d421c688
SHA103edba86e1a0ee4f94279fcfa1c6a96b0e0fd218
SHA256b2a064f3b7d0631bdf0c025e74acee95fb58cfabe6416fc818959a169378c272
SHA512ff7468d67c5b3bf479fc772aa97ed37f6bf9f9d2e29563b8a19fc5a2b6e4e1e698a915fcc25af1177b760415055760f1fd4c3a3d9b0d3dd11cf325382626cbfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a40690e73c01d14a7923732269c317c6
SHA1e56d60d77e40ab59b048dd55eb1962b642560320
SHA256a75aa9bbcb3e30ef3e3e29a135a34b314bd79ff286485c66efde8c46a1ec131e
SHA512958a5b34c46bbd907d0c847b005da9997b1a413dbcfddd3b71d2d3aa75d38e0cf8fb50cc15c84e3bcca6098398e535ccc86db7dc6d79cd2ec84be8da75df125f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff71200cc7c42f57d0a4ab833988941d
SHA14110449de8fd7e66a47390bdcf3b937bd57c4743
SHA25662633bf9da0c00bda1bfd9841513a2a7e9b901aa7ad28c4cf8cec033520f8268
SHA5122145bec1eb851d8b0a0fdfa45100577f8338e47725430d72f18a55b4b225433d0c8c1a06ec84cc24f8c22977716e21c9480000242d72adf6dfbbdb39e6bfb933
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b5cb89a65a1ad511970807e7424dec0
SHA1c202d5c9fd7b169ff4e0fb292278132f0c0d44dd
SHA256df06b4ace161ef8d4fd37a2aef50466c82d359d4354162853298811a3cbd7d5b
SHA51205d93e1b4623425f2014717cbaae931dad933dcf715524e0760c3d909e55ef516dbf67eb690ec23c9be03d008f79a2b87b4ad232a111c559f13cb648d462a66c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5159cafeeb967c3cb8ba007834ff237f9
SHA151ef97ed7b5917fa8380b1d0b46ba25558adc220
SHA25667bba708c88a5c4e0fc00a76e1fab8bb74fe47032c4865ec480f64482ac72719
SHA512699d41cb5cf875830de2b23acc6cefeeacd1cf6ee48f4080ececa66aa2ebbb5018e201999245bb7b3f149e447efc8ddc88b2e79431b8278cadc2150e47a26d9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52571eea6e7d6e5fd199778efbe88dadd
SHA12444ed23667f2eec92d502eaf72e3595bca352f2
SHA2565448ef059057fabefd839cb41239d9eb4f5210850bbe309dcb27af1a295f283a
SHA5124ac8af545253d3269def4ae65a3d130818fcf8cae9795e10d27d844dc6c29ab7d5df08fb0d19b1f566814a4defa807d1b646824eb0c2b05c1928d8cfed8915ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592fa43668d169cbea74e2df8c95d8af0
SHA14f85c403dcabfb60ca21746c0b983df40a35d2e3
SHA25656bb0d82e2cb5029ab4d6d9973cbdb8f09dceda90b28fb8de7e5b991a937cf8b
SHA5120aea2d0235f922113e74311489952cfbf08cbd8472da5a4379614c5b17d4f6202332b8141703e1c55a8797f856211333c62367b75e971d1f1e8c8b1a7945e0fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55728980d48e6e4508982ac48f826ac43
SHA1aa4cc92b850b4386bc4eb8f1c5501a0106f296fd
SHA256a1a4a7c37c97587ba7123da3d9bf00779e006386492d47571bb3aa473c397c18
SHA512ec17c6e403d9eafd01e3a16ae5a0234073d2386d1d400c1b9676c952dffab465d00400fb10f8e21a72176ed3ce1accbb4a1621e0f25aa46d7cfc33af8d490f1a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a