Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 16:39
Static task
static1
Behavioral task
behavioral1
Sample
39ee89b27b837e362791caf606c5e50b_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
39ee89b27b837e362791caf606c5e50b_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
39ee89b27b837e362791caf606c5e50b_JaffaCakes118.html
-
Size
5KB
-
MD5
39ee89b27b837e362791caf606c5e50b
-
SHA1
7f51ec5338fbcbe41f56ea79c5ebaf7ad598372b
-
SHA256
45888381d51427085e68fd2f54bd402dab583e98984481e806d2ee294448d6c8
-
SHA512
47414900c3d85648028a35674678b0e2c8540aa42b75cff96bfd012b4c874809251894dde2927ba3eed22e50c360aae33df36a1e640173e55e3127a132d2c4e3
-
SSDEEP
96:/JxnYYtEEBiTMawng8HScJ0bv8Z12XY73Y7kzddddddddddddddddddddddddddc:/ntEgiTMVPSe0bc12XA3Ak7Ju
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20ed6909b1d3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426877861" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{32E76A61-3FA4-11EF-9CB4-D238DC34531D} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000f53f1f23ad87a57d7b6e155aaa56568d9d59f6dba0e7406e50df7f8ac5443a1e000000000e80000000020000200000002f28b709a7c30a079312921061b430b2e47082169e63fd4c190d1ec4d493647d20000000e1296427c71f076f1b9b95f6af74c1e7858a5ecf4ec4d7abc9333531fd57da0b40000000385b2bfe140be30efbde4911d9fcef1067f7e287a5532021e1c61ffe757a8a851264acf1fcb1bd4e7e6fab82e06febd055c6f89b6043dc3d3fb9c69309f13b43 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2288 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2288 iexplore.exe 2288 iexplore.exe 1364 IEXPLORE.EXE 1364 IEXPLORE.EXE 1364 IEXPLORE.EXE 1364 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2288 wrote to memory of 1364 2288 iexplore.exe 31 PID 2288 wrote to memory of 1364 2288 iexplore.exe 31 PID 2288 wrote to memory of 1364 2288 iexplore.exe 31 PID 2288 wrote to memory of 1364 2288 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\39ee89b27b837e362791caf606c5e50b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2288 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57da08b04914322fbced8daffdca1a120
SHA1f5e0539f2080b21185afc8fdc75ab3bccfc17aa2
SHA256a231a454c798256da20bbfcb46bd3ea571280039bb94b18310186f89b5fe6ef4
SHA512fe868396bf76ccb445bbd85f61ad549f4627c2f33765adc535d64dbbab64013a19658c54d73baec3ebfdc872d2b9e15fab6e84e7cfe1dce1749a35a7c25be9f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50928acde88d492d0743ddaa68af7b92b
SHA1bff704527faa80196a0d244102788ca14f66f0a3
SHA256af57668611624bf4fce90e4f8fcadbb8daae41758daee3ee83ea50777f4ba8fd
SHA512a76c74df3212a6de33697eb001962b61b27d12fa18b786ddfeee5b6f08fbd01c18efd93aa7ab06d5e419558de0dc38be75e40dc165d9f5e09d08449f3d20ffd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdfdd78b7bdf8a4d51a95138f82ab6f4
SHA15fae22469590dd1dd2ffa5b2b5ce9bea1cb21eb8
SHA2568762abbb99f965d3ff6c635762f8acf35c120cc8796918eace281fe0f8586c1b
SHA51223aa2a4128bbdeab6b0c5969b2d4784a6dac31b6b63965e8ae260f6cebef360c2e3e2e4499107eb254ac936df352420e027c7f998e677f61508b3ddf603bc2c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1df3c436602bbf70c52a5017ae8bc5c
SHA1b7c154a05e8ae29bf974080eda105a49d4c560d2
SHA2565717be68b218b89bdab6c3408ee46b6e0d5dd0b0fa8c02333d732bfc5af49be0
SHA512d0cf11e3ed030b6d01735c19ed50b3d5ba21a80099a3372a7ed663b0c7251412c7f9ab0caff4cea0bbdbf6ee91d2798c8b3a5e7a06cf0688e730683c37f3e13a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0a478d5646a4c2b7e695c42c3f467b8
SHA1ad3448fd8df32ecf7ea8e34c647883aeed565b6d
SHA256da2f3c28b2a02d2606055c1c858c0b950a79c7ae19bbe193da0a8386425390fb
SHA51242bbd50f61fa509b2edd50d799b650d6e356c8fcc5a7d7245663c9796d88beb72e68ad1fa541dca0790281d7281f8f380b410a5d39b4808a1ed52758db1f67df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bc7b5aaeb21ebb4ba02e5bb88f3eea6
SHA1933c6664c61d2c65701e33af5a098f27da9e22de
SHA256758dacd28c281f15c3e807f31e6bf5c60668fc9034231fe424f5fb389b0df259
SHA51244dcc6a7af59e8a6aacff67d9e4f1d95059ce1c8640f37e3552665963744cc3c58abdcc31aabbfa78f9b9c54823ac794feeab9df5b9be6727cdc74357f762131
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5858eabaf93bc0c8997ea4c4716da7576
SHA189dbb24111310edee846150744f6a07c62014297
SHA256138f33d5d703f8ebf0cc55fae8d2823d9c74070784b2545048378fde01f72fac
SHA512b1b1d03f79800ec0e6279cd28c13e0b8adf6f58cc17e40c052b27d1b6d52355ed41916d2d20518da98cd4bf07ff1692ed1104e26285cb4c28b7ec0c634edb512
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e9843e89dafee04b9971c7a13828de3
SHA1a46ba2093fb77eacd69a594c6cf986bd77ce0676
SHA256ad867a76e0cb579314dbb29fd3807f06f4c5631049add570064dc1e93a274f7d
SHA51287d0c8b9929d396ddfe20f5621aa654c226a545338dc193df5e6a4b5b461c3401c5768210a54fae1617da4321cc29e0a6557bd2676fff8f82a0986f101b0a6f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2df38aff01f318207f21a854c086231
SHA1293daf612a4b5283971072ccfda9b35e96b25490
SHA256dd4a2c02f3725696f20fd777e1b84597725f49690df8f555b8694f0a75d4d23d
SHA51233499a043ed61c30cd0f13648ff03eacda0b395a2c026ef341b0978449251cc3a0a62d51fb04e07f8e96766de02bf5b80d98f807febd32cf9b03bb8daae8bd3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529bf89eb94bc5658ee5c0edf2ac1b0f3
SHA12d64ac7e9d7dd40a71a1d02ffb80c69b9332171c
SHA2563402087c7cdf49f21e280de8259ab492e6f79b2d27cd8386c7ca33e7af5368c8
SHA512f545bfda5afcdf198ccfbe9544f8ab262f6fdc85f1bc717e18b219412a4c26e11c40c123275e36f504139f6e898326f16d781e0c37795c5a7083e7d212cd6246
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d95eea1269df1cc4cc5c2d182319bcb7
SHA14dda816deedb122ec0f1eab5eafe2fe04a5ef871
SHA256874a73a4dc2abbbb99492724d7ec89b5fb7928c95b4a8cb52ea8e8942902015a
SHA512467219226be5ee2e72801b8b0e042fe1f2112c1bf2075bbfe11f740e58787292bc06c0977de034d118d0786af49859b7fa037f7cb76e871a4c133a9d85eb3cb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1bc46e477a15d89300919008cd503a3
SHA177576e51ca101e5e4b3347ff952f0566b390f826
SHA256b6e9dee2ce8db19b22e156f7ad6f946f3fada3796927bb7f587d62fd0955c2fd
SHA51256236665bf39f282e6123eb698f34a8e6cc5792ba1f6b1c16ea2d5f4435c8313281c89d7e711fe272f90292289890bb6969c8711910f1d42eab28c1fed5560d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505811907b92589371852455acbc7e27e
SHA1c3f280acc8c9b9bc7dc94ca6afc5c62c2284a4ab
SHA256dca25d697e98fff58a1b10cd5400b5e69c5b115782b41332e090dbfa97c35ff2
SHA5121e486b6fe5561c0e7a40bef4ccd337d39d1f04ebaa0adf844900f7b6b5be0de31ab29a72e9a683151b47d211474574e3cc4155100a40a0138ed529f8b828aac5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535a312b5e036be641e8a6010e38b55e4
SHA1bac53a3f3c58f6187fa671920e01b7021ca999fb
SHA256abffc4929c787e9f0890230414f5cb536d079a60665b92521ab65635ccbd1625
SHA5128aa194c1215828d9c865839a521cf882ebefaae11f0e8a3e38f0fd2a20df3de735117ca026cc19429ececc96d7d4fbfab35a9522515c674ebcea26921a543f35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56955f6a58530490386453ddf57199ca1
SHA1ca76b8f0b1b2cb353d7d790381fd5c0ae2e71d7b
SHA2565bec32fd10acd366febca3cfec56d86c7117f9ce7d8e02293dadde67ce80e8b6
SHA512508fbc47f58720b8422fc912f892f007a64c848c3c901103a333dcc2b457be458b659a97377bb73b791185a55423b9a2465be99634adf71ce3624cf80508e753
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b704237fc435a9a2cbbeda85cec3f2f7
SHA104111a7743c5602a2e1628207f981aa112804015
SHA256681da43a84aeac58106d463521c796d06b71245d82e4f6c97815fc492b674ff0
SHA512cded589080b496f2ee54efef1ae26d41705b63ec4696919a1b22a5f63869e9942fbc03a90f8d357a3a46f62ff1504f0228b06b965582f8d027126217bc198273
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5262a3994981c2717475a1985bb86d3fc
SHA107302a66cc9db2a62ac6cf0eba2e7400656cad41
SHA25699dd370c1f7866df9281a36dbae0e1202e63d21434f5a8c389308969edd7e44f
SHA5120afc618ba6f92936458988acc78f00c89ee0ce36e0e450058942b7710b292d2ae71dfbb667ec97e349baa2a7bbd54a5acda37844517f54da2a6ccb4c250c3d2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec4603f46c0b16b165d3120e0e30635a
SHA15f3d9f81d8be7fe38181eaea9efda53489e7ac5b
SHA2568f2d0bd6db403401a565b09365853f86b6871a8912bb6685af2bab0d50f825d0
SHA512aaa8031ded2b8d7cb5872e46bbd082e781705f47068ec6602c1c8a2b841a57cc9f5214b83f682e80064c516586ab98c6be185a6fab43d895d6c3cec68018b7ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3af8b886fa5fdec9e2f0934cad5e150
SHA1955039dabdfc19c35c03dd5170b35b2765da404c
SHA256f67bd8b46bd7efe5ba923b9715ce7d208547baf5b8f235375161ef7fceb4c500
SHA512ad457d4ca4e577de9827c4e5c35a884e064bee8518794edfd1daa249da205849c21b99e03151bf5800d9c600c1340c2f7677a338eb7724ea338ab21369a79e6f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b