Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 15:11
Static task
static1
Behavioral task
behavioral1
Sample
39a4376e7f055191a6ab5848b534ba29_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
39a4376e7f055191a6ab5848b534ba29_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
39a4376e7f055191a6ab5848b534ba29_JaffaCakes118.html
-
Size
122KB
-
MD5
39a4376e7f055191a6ab5848b534ba29
-
SHA1
465a27807ecfc17f80e89c44ff7846149e448372
-
SHA256
62bd0338ced6cb6c29eddd3eb6b992a936151e9062ebc9f1874d957b187f52ea
-
SHA512
90f2445e55a50557b6e6abd3855882d865fc15f9b536fd9962b351cf430deab5a624b40c9fb8860ccd11782d20a1a359f65ba88578e0c580ce4ff7c8415e275b
-
SSDEEP
1536:2sC2nP7MDWivJThNewF1USDf0d7ZcsgnQ4yTmrrJH1Xcz1:2wP1ivJNPwwfZh4
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000008659626b1b0e6ca7a11c64e4c22b314cae0eb23a41aa6f76db2a0cf8dfbc7145000000000e800000000200002000000080589e4030c53bdda3933a932713f18b43f168fa7619b2c0d87787684e7b162d2000000062ad50898f96aaed8c639a970854c31d87fc03076498319aa33f9483b5bd214540000000ec9da82e2d0ed5df2cc3f4c97e558dfbd3a841c2f5afc0e8592e64eba14c8a94a08b5cb47f0c435311b378caf3b631613d98dc81dc1aa9c66876e78739334fbe iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D687A481-3F97-11EF-8BF0-428107983482} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0659ebea4d3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426872552" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1864 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1864 iexplore.exe 1864 iexplore.exe 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1864 wrote to memory of 2940 1864 iexplore.exe 30 PID 1864 wrote to memory of 2940 1864 iexplore.exe 30 PID 1864 wrote to memory of 2940 1864 iexplore.exe 30 PID 1864 wrote to memory of 2940 1864 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\39a4376e7f055191a6ab5848b534ba29_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1864 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1dfba094ba9e791937dd546a0c99e04
SHA13f4de18551f96b818fbc40b48f9668937e7a576e
SHA256b35f797aef11dbe177b0d9717f55c214ca7f54a9b8e5b28a2758003a3afd41a0
SHA51286ca9b0917d90e5c90757a8766b14ddd20253051aa349a80ad87c3158db956f8712b0e378a4752988e9f18493e4c869804b70c9463e57fd6546f71ca7c788b83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5583b7e54c374db47b6a4fcea492b5eaa
SHA12582fbdaa1ff225c7715cdccb522c75c699b1a43
SHA256685e0736ee05a3c3cf3f8754dc3051a3313a01a2e184d3c7a35db0c961f62e3f
SHA5126b8c7bcd98c0241fdb73b5a8fdfe26177b2a1b89e6c089dfc80098d8f9f66b0999e02aa2bdcc5160597d95ac7aab7533dcd36f4fc6ea0edc082baaa4619394fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ac72d26a810b49f60cf5d2272e0a70d
SHA17f547103fb42a600ae888a3c459525ceb5abe3d5
SHA256555ddfe390d5ca60080512efcfbd8136c943a502fbdb4387ead68a59f818ac64
SHA512cdff73a5cf425c6868e23e14feb3e40696e47e45f9b00d1fa107f12d754c208f3f83359f2881a39a246f65b1b0583e13a16f7419b98943abee1faf1a70c368fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bedb8fe317efc65b9dda277c273848a3
SHA1c14613b9a9a9390cad03ad12fdd52bd05f311626
SHA256332ada7e22ae0e4face7b9932a45b2480a0efa057b6871e6c1fb46051f07fa02
SHA512a136e76393ac75dcadb57fd676689bf4285bf165757d6a440bcb7273af87c7c28e625d314d6682f082685f2dc17e189574aa230e649b904e75ca3f9706eb6ddb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57168e54e6248362aeb1c5240ea191b52
SHA1c35976313061f9871ae6fe6c66f652c1c67a22c8
SHA2565764981a3197cde627ae3f90fd270e83cd80d1164fd8dd938342a4bb1b49f1fc
SHA51228a586a12953219fb48dcddef37d9a8acdbcbc623987d0c1e77028df4323b69cc73b8f108d9f260b4b5d0b08a9694511b7c8650001061fbf0ff47a5f62b24c8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544c2a7e3677df25cf54ba5dea8c680ff
SHA19e49345057e0fffbf63973fca99369ace5456967
SHA2563553ca8791fcb813725465dfb9e0b0a0bf419bc5238f597f5cfba2ff7322e9fd
SHA512438acd10eae2cbb7cd2c40d4fe7a4878b3eea3f055a182ea6105651cd4499da14a16051803ae8b3aed6a12048ade7e069c4b976db3402a56ae9a5bcde1617455
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f38eed1ec1e09f8e37ad6d4596fde82e
SHA1ce4c8ede8eddc374ce753dcf7ce05cac3dd437bc
SHA2562b34fd4e4dd6545d01a032ac32abefb0251b82b3ce2009304fa7fd9b3a0377fb
SHA5121ed61c0c00d40c39c42110ff7103de48b87ff38b319dc1633b32bfd1808eb5cbb690db7a0f84446111ff0fe91f99c5373260c71995f93a855584e2310c8f2a6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9c21ce3cae6b04d6c7f7b2d2a4ff833
SHA104da2bbba36f3ff78eb2d819a8770e379b886d3b
SHA256020edd5af420614b0ff2d7b1b3c0784bbbbde373f9872eb86ff2dd61129fbf26
SHA51249a500e002ce39f26c7b13359f596ed634a9b5e0feff25e6ef60187b00dc31102d9bc2c087f141aaf37186479d01cbb8ac9548742ba4f942265db105197483fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6f2dfd689faa5a49cca23a6cad8fd12
SHA1fb855ceb298bf9b346a56523853911cb13342759
SHA256ff4ec8f419b0e0248713320869f4c9311082baed836718a468081692de858ee9
SHA512a74a60742aa95b3a3b77a45b77386803697c80a1beb9bb9183474582dcd4c4363511a731f3265d2a1147034b83fe7f9e232d586bc28f7a033dfc8e3a5907f243
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55abeaaf9ecde8f7f60924ddcfc6d6e65
SHA1b1898ce07b40487a2383fdacfb0e2a2eaa98ac90
SHA256de500f355001f7e7e832050ab05851cc7d585c21935a2b1aa32ee810acc5bd51
SHA51221d4468e7cd42aabf8b7ebafe6623fcc060ce281e761711d4fcf9e299127e619cc39889198d0015ed6d947b9583b50b20667ea726688c6e9d05b26fbc48e01af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ab20b5cc94cadaa29652272e549a71e
SHA1feffb935c4835a35fde0a34e0cb9279b6aa26097
SHA256b5d707e220e6531b6a00ebb4587951be45a0d9f80cfbc251cc156a4a74b3cd0c
SHA512c6d116bbe6527c4331e141265a159dda19317f14fc01019bcaf98a8aadaaa2c135eaf83b3be29d2e3d4854ef57eec384164b046ff9744d75c143348df8210db7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c230c140349f26ae17aefb1c764c1321
SHA1ee0844549485be579f33ed43582a66057bca1d2b
SHA256e47f86b584cd79bcd082943be01365373e539439c97f2e99ec379e4bb534c08b
SHA51274f635a62d700c42c4a28384d50457b035e4ba50da2897867d9ca4b6abb0b5e323441541be5a99d63a66f3fff6536d2880b40c53ce0ea718860caaf7e1b8cf26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5719f993e4d20fcdaf2252a8f3ff5ea91
SHA1390bffde66acc3b1efb09dfc4c7f0e7e4fdd5f63
SHA25641dc23d67fd69f0abec1ae7385649b683bfe63dc4c059f8bd57f8bcb56f38625
SHA512741aa2fb6af238c8bb1f36b6c07e2840d9479f3c1e3a900f4b62657bad85254b8053fef8e0f6c24af7942f8476871f8c92d4a39b0e2cbdc01d8db631037e66ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503297ce9bafce2977703e722edf8af4a
SHA199475ad1515e17f56d35c20856ad1b05ee6e413d
SHA2563298b74f26290fe040053671d2cf7a1be9d44474893de3af5e4e751ca62f85a4
SHA51241a9afb9e26e90baed80786e42d8c72b8a83419596f1bccf020d2d48ef68e8fd9d697ba3b7265503526bb45efe2f704c109750b6f22711566f05c28899846371
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d64638259d568762db6a4238b1922cd9
SHA11b307e30515a2d483255b28691beb7d60ece6c2f
SHA256ebcec330e4349b1b5580f9b8720f2eb1e95a5451720abd134ea392080b7c0ac0
SHA512ef7c3357952a5b72fc29ff70a4291c749858e3021bef42dee14aafde6075895e97b2a112e7c71227316ae6f320a993303680025457b345ad0ffa288e7949ebb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584d0158bf650aa76d82f6b2b2f254bfe
SHA1e873d304a6a0a6f01614a1e9f60a6da564d70440
SHA25665ad4a291e85607834a5416ad889ee7bb919e30cc3e6a603c1a0109cc815bc1a
SHA5125870cc61103bd79e273585e63d8896255363c32b20c3b6095475495ae8e969a0b0a9a2e66141dda2a304f4b652aaab73e1dae70de97859925ebef18bb453aa07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e1b0b08d840c7d861990daed8c98381
SHA17f60ebe9edf3ad10089ab4a35d1a9a64f01e3b9a
SHA256ff6565b6ef913977144bec9fd7f629c8f021490f0f2a75e906f35ffbbc5b171e
SHA5129dc8dfa8282b9c7d21e6260835332e7b125871e08649a47160976ce1d325dbc8b3073ecbe05049fcbbdb9d0c1e2bfc8e3d6a46a5403a3c7c6c9e27b1e0a7df1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df276790293f48e374ae3cb8c924a7bd
SHA14c229658bf300fe91437797f82f1df9456b7a7d0
SHA2566b6464246ab935a893f5999faa50925845cc9a1d848ecab97b206ae41d2af0a8
SHA5126a4ae461aade983f3c3bf9d9f23288119b860e677d7bf8a09038173bae329b338473d4ede31321127212f7265850ea1c18433697de1235925f536804887f9907
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561b3728b101f4c7c797517ef00d12557
SHA1271e63cdd89e2e6d07abd40fd10b5561b20ddae4
SHA25616816dc4a5761b8861f8b6a108ed88fe463cbbc642adb1e9cc528b6bf889ec75
SHA512ec5d6415ab858038014ac42f0df0a0316bd8c45b5f3a5f16e1afb2a0771f54fcfe0af9a12b8e45385e74cde3d3cd5a26f8222ef984d89156fc4b25cdd9b74f2c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b