Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
09-05-2024 10:11
Static task
static1
Behavioral task
behavioral1
Sample
29781f0ba8ae422bdfe6ca4b22f945a5_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
29781f0ba8ae422bdfe6ca4b22f945a5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
29781f0ba8ae422bdfe6ca4b22f945a5_JaffaCakes118.html
-
Size
143KB
-
MD5
29781f0ba8ae422bdfe6ca4b22f945a5
-
SHA1
0a3cbe8cc6043ce4f884209f438570d1ad12cd8b
-
SHA256
18157a31ef9a70b8a7bafabeb6d6b932dde99e23468fcbcb95ba486ccef03f10
-
SHA512
6ac619fed985364215f15ebdf6ccf3c268deff69ff19c4929bef6d384f333fb4179122392bd7abb8f89a310939b250eb6e6c043b462c9c77a84b6b036da60e8e
-
SSDEEP
3072:S955SNEVHrx7dyfkMY+BES09JXAnyrZalI+YQ:S9TSNEVHrx7osMYod+X3oI+YQ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{74B059A1-0DEC-11EF-9FEE-EA42E82B8F01} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421411337" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2856 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2856 iexplore.exe 2856 iexplore.exe 2952 IEXPLORE.EXE 2952 IEXPLORE.EXE 2952 IEXPLORE.EXE 2952 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2856 wrote to memory of 2952 2856 iexplore.exe 28 PID 2856 wrote to memory of 2952 2856 iexplore.exe 28 PID 2856 wrote to memory of 2952 2856 iexplore.exe 28 PID 2856 wrote to memory of 2952 2856 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\29781f0ba8ae422bdfe6ca4b22f945a5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2856 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54df65d53a67d18673455f87b5e188794
SHA10e720d895b8ea1db4a26c0f7b698cb74885792bf
SHA256a6418c782fd976e5032c6573583fbecb8986dc89591fed33d9fea707b9651419
SHA5125d31817906f87b1efb37d39b78d293d08e811720589173a14300edee99140cac38e8beed6c3f43ac3c1914cadc0fd741dbbca7a296179c629fcf1fc996109ab3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8aaef19881dc62a90c9d0c5b7c2f01c
SHA199034afcd02eb584de56c9bd7f0633072e956ebc
SHA2563f08b9a1bf69976e3a370cf37c74d2057f177f6db9c2b5338968e99db9b5ebe0
SHA512996f1247a785d115674efcae6dddd6f8f0badce69d023c3606e581ff8c20f639c618ef4104aae5f2cfa12d9e94359b342b01bcb6ec5dd78855834f54087acb73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50dd8953a59eae4f0185cdeb825b0b835
SHA161cdfb0e11c1782f268a0ab2fa59a82537f3f375
SHA2569079ce160ee39d701e96b4e2f408634b311d88813fbff977c114c4300b8e8d04
SHA512c4eda667ae1d3c447e93ae874c1761dc5a828b3df33f9ce95e122a4d0aa66de1e4ecc0a0b238a7e4b2489f9277a8ee1f714a3cdfabf5bdc828014ad086706003
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b6f3709fb1d478221464b34bcfef4b0
SHA103633141e4b10ffe778965533075f7e440830964
SHA2560022c941ac4c5c071b4533a76747f369aa359fd942f7621233111bc21751c606
SHA512abc7b520c82342290eb870ea9dec674e9923aef105620f15abc554975e31c2360607b5790e8cac79256d88c079c5ae3d0351ceec8fa303aabb5b5e2e4757f5fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bedf1797819e24fe8a2615610dd6f67
SHA134e525471fbd73c4a73ac4fa36a11affcc4fb472
SHA256fc9f2e0968875947c6f6b2636a0769ff8fee6321d653f5f7cf3cd38240c3800d
SHA5128b9b89ab67d70bc55622f26aa953b570e47a82d460ab2effc68446c1900b838171d389c45ab3f3c3c967c374bd9726e8aa96530a32083c3bdb58ad9942d7053c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5836f44313bf28247653ad2e909e15faa
SHA17dbedafdc5a7e1d3e57b8184fa6f67c7bda65d83
SHA256daa322c4380aa857b5bc0de287b3d9d010c0df9a54254b6c905cf9e2d317f2a0
SHA512e8ebd41ee0e83d9b4933086c2c779a18a84d905c6f3a87a4f49c4db74be5c029973a2db6e7c74632ecd316f7fbc904efc211f7745e3fc749b67119a4c1166f34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55850ef3e91cdfe0aa4acb73c2accb2b0
SHA19b94ccec971d3cfb236474cf60146ec0813bc45f
SHA2562f8004adb5ceccb6404a4029f7b8ee8d8eb14eba92cb2a7ceac22258b86e011a
SHA5125814cabf5d31fc23ca568963d40fb8a61a920b0e053bff4072e487cd282062880f24c807cab65fb2bc59f261b7a8334cf14c1704d6c42d4c1181ff36d024edec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594f51c9d1667b9f5320032a1ec03a35d
SHA1a32439abe7eb03f9775eac3c62b2d6f67400a316
SHA2569bc67a299d29b60dba0dbd30739bae8ff0ceb85c358d73060c9b18e9c26cb9ac
SHA512fb06e3b3a0493f8483eb690961b099864887e3ed4bba6a2e050245db28bf9b2e4e05a970013fefbcfad5b818f98a548ba902071e31b43c919d0437b1913deb47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db845675b59e2e4d3fcc66cd916bb574
SHA15550fd373477b6fa8b615583c49e12d218a59172
SHA25600014a6531932a0b2a1939c1d6306b025685dd68ec60c8184c8f8c4440f6ae56
SHA512240abd9b6afdf2d4a0adc492149e3de40a78b753b21558106ac7137dbb93f4310283c6e595c30a31c31157c1e9fd5fee0547cd0bc66ab7f31886abb49142e9e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ee14b5165158ddc5d7ddef63d7f0865
SHA1b4c8d7e412f77b6ae935d2359e181b3928482900
SHA2563307b5a5eb854a97ad5893f21734fab37e9230f2489a6dbfa90b8d3f002a3c33
SHA512cbc111d5742722334cbc15e05cd757c3d22af0b41a63c893a9a15e10ab9d77d33a32cc5fe50215603acddaf99a40dcec16a185d66556d3dc8c7770ba23101eaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5419a04aa53caf7899e0b41ee6b94e097
SHA12261ab6a4d76f222cd4dbd049d0b0ccbd17c0fba
SHA25615569f8e9bfcc21020630f3c28f83ccd80284d8eee0eb17b4cfe83ad22e1e20a
SHA512c80dfcce441b3a89f74e8a18e337b2e32566a5dca293bee0ebc3d2e76922f63dc9e0c4852ea1432e2f8bd2df45e70ba23420eca585e11b15914d0209d5a403ff
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a