Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 11:32
Static task
static1
Behavioral task
behavioral1
Sample
39e0eb9d458d003bbc45cff18afe3ce7_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
39e0eb9d458d003bbc45cff18afe3ce7_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
39e0eb9d458d003bbc45cff18afe3ce7_JaffaCakes118.html
-
Size
69KB
-
MD5
39e0eb9d458d003bbc45cff18afe3ce7
-
SHA1
c2c37d5ee81c368b49ac50297b15a2c270c8c18e
-
SHA256
31fda3666c9c484f6a8f4c08b16624a30e5c69edf9a5b2fff12a69a4cc30a361
-
SHA512
e8e6a7ccfa0bac2ea05e4911f47de7749747d3cadf5d6cb3b7ac96e48eff8fb9415ca26e68b3d2df05b90b45fc6a81ba67a1427e788f5e536f75cac3b33f94f1
-
SSDEEP
768:Ji9gcMWR3sI2PDDnd0g6CEc1KBNqvf+oT2e1wCZkoTyMdtbBnfBgN8/lboiGhcR6:JDjTTNen0tbrga90hc+NnhV3
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421675388" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3FEED751-1053-11EF-8A04-E6AC171B5DA5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000000387772ab7c5a0c34b8cad63da16dc49a0e40bff97d251513865e2aed7c2c459000000000e800000000200002000000004751c6e745a2c81d1dfcac6eff9c8e1f00755a180995b0414677bfe2d8216a320000000778791b886d3949376f983948a20585d3898062729a9b6f1c46b34cbaa79ba5540000000691b9aaa5b444b376799f67746bb6361da835c2e865366e0b6376bb27748559c43d48990a7f0c89770f477c164dac445629411c83176f0fe184a4dae2c3a16ea iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0f1901460a4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2008 iexplore.exe 2008 iexplore.exe 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2008 wrote to memory of 2984 2008 iexplore.exe 28 PID 2008 wrote to memory of 2984 2008 iexplore.exe 28 PID 2008 wrote to memory of 2984 2008 iexplore.exe 28 PID 2008 wrote to memory of 2984 2008 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\39e0eb9d458d003bbc45cff18afe3ce7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2008 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cd8c55b409c7e6b8bab6170b475a47eb
SHA15c0a8b75acb54acf4bcbfad2c5b5ea644e64f61d
SHA256ed186719bb2efc907966faf6d62d4d8a1ecf9e2112fbe03e7772ad8a347d0c2f
SHA51264876db1725a70529b2328355798f79747942e7e9e2967a27a87a2bf001ccb374e4a76e1ce728302159542a8177a2d3bca39cf1cb783d9a4827c0c7006d7a56e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52f4a116ac0606e1b483874648656eb6b
SHA1a9d8d3cb2978597fd71a69a5a72dcd87e842c7e6
SHA2562cb76fee3baebcf99f2ca80a86fab9bad1ef47c410862567672b043df02522ed
SHA512991e10e490c2928f435768348458c5e936fcf4e7792a10ebb924709e652fbc623252900ec1bbbd5a729d46fd98c5cbe644b68596084e6973ceb4d3435e761bea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d833a1e1c2960f2c872c2789c86e6421
SHA14b17ba37bd39f5de3cc66c3db48153c22fdaf1cf
SHA256495ea7e57e2e5de713456c19fc907c86d3530e971f0984b83e4ad8c114a3d8a8
SHA5126735c30b494481bb23c3b306abfedeaec58edaba8bcca15e0f6559d28bf9ee6ad2c83dfa7722f5bc3a8cdae1b2f2293990a36f8dc9c2c4e2786676bf1462ce83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d007c4f851bc8ec68ddc9764c32a3c53
SHA1ce4509f28566f39d255b7d136263df8af1d10567
SHA2560ef624a907bdb84f205e2cd467beeaa37e0c1fba3664e74134cce537ec40d238
SHA512302d680f94f37662e26cdceacfb8743efbb219021d71a9ff2721b9df11984d86cbc5a5071a720e109fe821775f1e764a56f9e0e8b4cdc48dbe08fabfda6beb5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e16759b8f3703238eeed158133f59088
SHA1d18d8b51ae2eb3de2739746d3a8b4f315dad0db7
SHA256b5f2e9a993c979f2770030c1cb9aa6e756fbb26359a51e576c3236fab5307741
SHA512809a9a6a5df20d1bfb725d1bedfcf48da820603d42332178b494f463d56448c724c5f2573b9b7d0ce442fd37797590eedad3f95153e6c6dc0913e3e676f3ce1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5268acc76308d99960c11979c5809e3c2
SHA10c7a0bf569aa42fa2e5f34e394a48929c4f89e21
SHA2560cac00fc621cb338a876dbdce876f16d4e2f71d766767980a418d70a809b3a65
SHA5124ed88bad8da11efd06c479f973ce9a0ac340ca7b2936ffb688833134678cbf315cf8a9c5b55bb322bc66ea1ead13893c96c3d2912345fa90f15dd3ea7b613222
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59606c066ebc80d0e01f049a54823326a
SHA14ef4321495cf8614838d00168e244f54a0a775c7
SHA256cd01072f0a9c73895defef5558e3463653ed0f7a4d2a4d62d3774e0ac4a1770a
SHA512b578052a4f5dc42017e585f9cca7d3bdef30f34c8489e4bbc83b5603fdb665263c74310bd954ac625b8c5a2e757f3a7f841e9af963a7f103a4847f54efb9ba59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5371ea81593f85a480273bd91cd96371e
SHA141875cc92a1fb0b2694833de3bcfee213b45a16e
SHA25666fa6f3af6812c0a0061e256cd20500073e3a2ff41869ab3b65a8ce4dace6ccc
SHA51281acdf145c8c3a4a6979bef1a3f5371ae6d535f99dd1ad4b4267b276c6e0df80b6443f154d6adc63a065b6b2112a1d9f4968fc105202bbaf48b834827b50167e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51f7f169c56a3a5f291c5dca2ae336134
SHA139f8b5276ad5eef91d06cdd5d925600aa5eed3cb
SHA256d88c8933735c3ac07fb3f659dcbe34689bda825e936035d563d700fc2e768a89
SHA512fe564acb0b2c050e3e68c056a05332a89692b4fcf41734d880af18db8b6ac668299ee0bba626958644eb070a3e4ba8bbe693a9fa35c1cb2616a46e53e0f04d8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f2eb65998e3adb08c713ece29bd55b25
SHA19f19effa37aac66f34b89fca737c7dad9c40071c
SHA2566677c9bdfd2b4c13a9702bac4a5fafcb5e0c5fe42c0d89b0391be49480f535e0
SHA5126057fc08e4c2b88261a5d293614391a3a5871354cee9f7f19086a5ed2a171ab214dd06479d347984ed47715eaa6fa5d19bf1fe11a87c003a44d930b1556fb368
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5243ccada6e4040610bac77588fb12961
SHA155bdfb791fab152002b75b527f7fadac22b95e04
SHA2566f50ff560a32bb5c7326fb11ba453ececf9f7629b4cb2b390cc26bcdd9e2b76a
SHA5122777de9a3867a65f128669d9264f106bfa68f412b90c1211054b9cecdcc6d9f08a8553ffe2941677325ea717d9917204d61079c1e255e1263dc75c3fa8422cf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e1f716e9c6dd893310250312fd498937
SHA11ca6de3b0a22c363cd958625099ef494fad66952
SHA2568679b4663ba6f0514ea93331605c225dd6209b04df59760d119c43f42254bef9
SHA5120e58ac0d22270f7b51a77927a9b2cd26aef7a6d95dac00e2e66ace6d4451bfda4d310640876e44638f77a9ab9dc429101a77361705b53a4dac7b5aa9e321f7e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58ab0bfe9435118f0c1f6b8a273bb9e13
SHA1936648f424733c1c5605d812cd7e998f8f79e951
SHA2567bbe5f8fe6a0a20604fe82e0c044b1f0558fd7de08364acc38ab92f36cb7f5d1
SHA512db68a4291f65e987eaf444a19045e9db93537a5316285402ff354cc8642fc36689a4dbdcdd024b32531dfe9bc16c81f048babddf5d291b7f7d3e053c46e230dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d83fe2a987c76c98f61eef5780fb6dbd
SHA14d0da2a6ea9ac63e5fccf2e3577ddf90c2cc70ad
SHA2566aae55eb0e0f7b9b72e3f305d5d0c2b8a68bdc636f67999c8014dfa37b5f504d
SHA512de6207fe77bae8f38f71eecb86390f25f579a8c652e2f0895fd84ff5ab8336fb674c1020d3c44984594d468d4a7d30473327ca0fd601081a5c22231dbd59ab00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e92d845bef4a22c0a3f736954ba77189
SHA1b28909c428c6b8064ba1d5b4035773ab0282cc42
SHA256834b6f1f548cb0d402a9f9ba8a2fc73bad7de598e65005b8205a1d10ab2c0eb6
SHA5127c60708d0486ad896f1af3b43c3392975e11bfac9b8da674a20ae156fe37f3bc58bce57d31e7bf2654112f18228a7b5e9d4edd7d8c8864f2e53381fd3acbbe29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5395ffc334f1c35cd077885c7d27cb69a
SHA1dfebb51e838e56c47ef21dc78d4089fed4431037
SHA2567bd963ef781cc7e7f5bddf6135bf5e6cfb79a92f35fd5f6e003c63c13209f5ac
SHA512316b94275c01b926d6e3b9d7686fa6399a7558ba4f6a3b5f7c9cfce6a26fa7a45c05e2ead7b955b58668897c386ed89b9c038245560ff10761d9ea4adea90b47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a401a876d6d7943997f6867d063b7b81
SHA135459776ca29011aadc996d774a091109e1d5180
SHA256b180f1f95417a9216d88d593465c7c9ea0c5f2834c8f8f252fd3e06a46fa3c10
SHA512dfc4112d4a54f26d50e26b67844adbc489bb18ed58898894508ef50962c8dea287359f776dc9afb68ada7bc6639c2b0ebfe82e4fd5873ecd1079feedea24389a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD546f90ddfa4465a986c0f52a819879135
SHA148fa1fa6c6a3134d7c987647ae63f608e2195f9a
SHA256bc7193521e1a6bcc01a8bb4e8b845dd937fe30cf289204ae874541787a5f2249
SHA512d884edaf72073b23aaeb384a7ae0b9d164092e3330247726d6ccb5cfe6b8c76e27ff62296c320a21f77674e58637cf83e0e1abd04a96389a0b9b262369b895c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c4e06106a3e5727b9fc6bbac3cce0720
SHA107bf1a2da7553488b7ae1d7e2137397d64ea057b
SHA256a97cda66b3903c5ac6f42a4acbf4f25c691f1c107555fa63dd0657495f3fbfb8
SHA512666fb523516c631e341034b20a37f08ec19278c033f0173cdddc48e39b483f52e73dcc9c8e4ba66e0f8df2d8823ed9d8deca5d18449347b3acb3f38e862c7304
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a