Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 10:31
Static task
static1
Behavioral task
behavioral1
Sample
29888a60fe66686c3fbe199f77ace0e3_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
29888a60fe66686c3fbe199f77ace0e3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
29888a60fe66686c3fbe199f77ace0e3_JaffaCakes118.html
-
Size
68KB
-
MD5
29888a60fe66686c3fbe199f77ace0e3
-
SHA1
853452d7b082f6788dee14475df20dfef917154e
-
SHA256
95baf77db9b78fd37d097c283d8ed74df25ff1c3fc99479bc0d2383dd5a0e20b
-
SHA512
171cb673627a1b63ff1540f0908265b1b668cc3e55a6bcbb8c7653a7cf590672b7902fc84163fc77fce110638532bfbc1c9476666095eb36fb7a3b3abd942a7b
-
SSDEEP
768:JiECgcMiR3sI2PDDnX0g65qgNY8TD80eoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcc:JNF52YGtPTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421412535" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000024de53eb70a917936914145e4b8eaca949ee98733544d73fdfc6c4039770e64000000000e80000000020000200000000ccf1d37a707757c7204fdb992d1e0b17f9cfda228321db2514169cc27c94231200000005ba534a5280c21c7ae730defc6b1c526b599b4b6220b519b83ddeaf61083957d40000000cf8abdc585ea6ef4fa1d868b2b233055f314cc9a1158e73ba2eb7077408270040206a38a11594f20a4214142f07330823cd861627529b8c88dd3d3ddde78778c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 504faa13fca1da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3ED5DA51-0DEF-11EF-B85E-52C7B7C5B073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 112 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 112 iexplore.exe 112 iexplore.exe 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 112 wrote to memory of 3008 112 iexplore.exe 28 PID 112 wrote to memory of 3008 112 iexplore.exe 28 PID 112 wrote to memory of 3008 112 iexplore.exe 28 PID 112 wrote to memory of 3008 112 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\29888a60fe66686c3fbe199f77ace0e3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:112 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab577687933900f255211ef0934595f4
SHA190613cac5567d39bde2906fc154d0006bec2475e
SHA25611e0c92d960d7b1f16b5e5c8d89ecce04d472d532685810297425925f98ecab4
SHA5128c08dc8417cef89a980ce5fa5a60dd7e01eac2cad3ba50dc4eee9f3c21b9ebc0e5125e646971b2423e8efd9a3113a97159000b144466d468191230f95d740dd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af62a383292f931fb1bdf9ea8f730165
SHA170ac9201f4b5ec786ae358f9b123e784c5f31ce2
SHA256c302ca3accca5ae5ddefc80e94129c9d27299c6a8f0526351d313d60d656b8c6
SHA512c4f834fbbe9d765265240f4c8e6aba012c677f5a9d1db76725af8bd6c1e886a45c1db739ba6cf74fd11379a3723e8d0679194e0eb3d1145f22f52e96a87ad054
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596d21d8dcc31e78baef0daf1b20be53a
SHA17b5905d93573ebdfc00e7ea1a6117358bee46f01
SHA256eba0bce65564e85d5087d75712dfdcd083c6223b3ada023931ff3b5e6a8f0821
SHA5120716952312fc64c9a737e07468319ff73146b0b26d44a03d4cbc8e5501e3c72bbd6fa496534ae721f12d351d74e40333b01080ae58fbd4c891e645f612659bf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7397a4b8d3ffc5d866e14ec735319d9
SHA1ddf47eddbede440842003ed9c649012759f0e1fd
SHA2564bf14edc10bdfd6f5d32e33be91ba0df0abc08a29ee7cb4f477aeb903f75e22f
SHA5129083445859f71dddd256d2c6654941c615b6750a7fafa42b618456a0531c75f09525150208497df9eb9791b0e567177685e9ac4a0ff0344a857dddff410035dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52212e2b0ca4c3d5a1d66701c6a8fd804
SHA124c67d9181ca9af7e6b086515b5a46f065a331f6
SHA25626bad6299e6f809bfd2af0ff4860c072bbd2520ca02c5d369007d9006fe3dad3
SHA5126ca65a978098755aa8528afc320c9f090091320fee2114f74bd8536d22e42668698e43374b3fa24323026b712f55226e8d92fa26cc9d59ea3bc737782fd83367
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5388f810bfb15d42849bb6fc924e097ab
SHA1e344a6d8d05509bd6a2548afba0810c695674069
SHA25608bc483469d96ce0bd450a571f3ed6cb2dc5fabd90ea7148480e371cb3ed4262
SHA51245a2b95298afe666d5ec49a2aca1ebe7fcbec81949f5a9dbed3838386ddb138d2e5ed4aeb575ae9baa680f58e27d29f44a388fb7faf1d8f99db97e478a1fec4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ca01074b850bf89405a3e08ca1ab752
SHA1e0ba1b4abc007c8abf52e76427c658e6aa3d70ce
SHA256c3417adc878dc761ed5bd730fbcc2a93813c53590d0c3cd4802ca530a79f2fc3
SHA512e92c902b7e6da5d5eb2a64378e28824d34c33d899dfbd80176117c369e50d08e53a303c5167542407130e2ff756e8fefdb19ae8869d6339f4ef6985732f83fdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fc2e3a59b67011316277ab9ecd36e0a
SHA114db4ddab0aca884503c0cdd85f1b3896b484f4c
SHA256cf21fb2d4bd65ae3e5fa722e917f084a8bd1fa631b7bb0d513fabda86fbb16ab
SHA512aaa466dc0fc8deca83be15e9ece00f86550fabdd1bfb811bfd01345765ffeeb2e8c6c33f7adb28aab84f41004e0b0491b8c7c2ad91613103cc30a48b06efb294
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d19b3efd4d63f9f85a9f17d1eb1d00a
SHA11d76854b7a7ea8cd7a42c0c734d8a352fcefe01e
SHA2564879ce9c35da263da1ba04d605491847772b06b46880c46c694f4d0060c5aceb
SHA51294319906fb9473764ddd6ade0b6c3dc7345c5c9f0c795b1f62779ce7d4bc0034be5bf270917f1479ce39bb186241e1fdf2d58b239f5813d796cd167a325b344c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa9b784c369e539d4fcf9469c3c99add
SHA10a63ebcaa13151cd722f20776826d1c501afe729
SHA25618a385c59bc9d7aa3969cdd880f8e24b9f07dfa45f88706cab98d94efc49f906
SHA512a4b31832e6b88f816d06ca6c6c9e1a6965f857463fe93a7e4c3f860a0fa5272e497bd0d3e3066dbd33417c49e3eb30693789db61d4e66b682559cf9062592be6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f9990a34676c50f75f79e18e65d000b
SHA1eb8d923344e87c8efcbf2a95713445b8d2822e76
SHA2563948e83a62b3ac62abf1afef999f0db311cbd1d2c1c0501a71934c4e9e3279cf
SHA5126cad56a3928dc1135541dcca19a8daf9bed60321ff17199ae56a3891f267195e466a46e099d4c02b3a6f520e04cc67ce9327a30670f3736f3751c199974a0e5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce945983267d2b48dd6e65929264a9b4
SHA1f0d66d4cd61b97c8bb1a54ee889e3caf82b1165b
SHA2565d39564ced9c77777d45470f33c927d03de153b03ac8c91316e88db31b377631
SHA512fe8354a11ca5062589b19f43759af7d258a1f5062f876358c7b539d78b3d40db63c0a01a9355a6b6af9e88f22df1f7ea184ddb52da78a66bdd5f39b95f6a4f7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50dd4922e10d8adc9d9cb1d3010913b0e
SHA18bf5f6b767567f6d212be3970190c08fb6337c3e
SHA256d6d151e37648681bbb7128fa82151fbb64b439f935e187b63c0fbccb386d5ee7
SHA512f55149a9d49e07dcad3501016bbb5d203703490b9e66e6f266127dd3462f1238e38784f461305e4bf87941d163eed04998276d1288e04222a955c8864aaaa6f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500b30a09ef01f737ba8af8bea463d409
SHA1698098a13467b56290c3f01271e789f49cc73693
SHA256ccf36de5f455e37ff8a62370710345b0db5b2a1be07e9807cad283532a0a7657
SHA51207eede7495008d3b28a9546f05159d321a2d2ad77b1cf8b792276d6c4619c5c610b4c2173ed0a3420f4b3db036f95ee165941c5a6e8691af55b38271060a07b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5332ed7401be12a4d9ea97624f9d9eb27
SHA1792961d2ef37196047179edec3e58a8a20f5ad39
SHA256e1441c7d1c1c0ce0b1d0a994f6a4046062630b49578c7e64981ca525e5b63b99
SHA512c61e3acccb8582c31a5ee16fa4658819f9d78d575541f88980556ee594ea46cc57898737a4a3615b10d03bbc771460d51991f1429f2741500170c3d2ce10d2d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5615277530e29e3d74be7a21339c717aa
SHA1f1244e640080b779f2ed05647a83a4b8cb1115d7
SHA256e11755125a6a182b2abc5ad4fef49ce4b7e8f22e8767c98a5a8d1bc9d36fe130
SHA512d7a845ad2d644f99fa0d84a459214dcb5ca81be8147d9ae3835bd373379f9ae695969ac98b80bc88e7b80aa765716615500b51ad3bbc0632fffb65fb5d684474
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dff16792b241f5e632e3f4017e1a1919
SHA1e9b0ad9a744aa6c6401e3c7bdb51f4769a3ee48f
SHA2567c3dc1eed90063102bae9126e7c259aa79273b3bc93b7f3f382984cae3a7b19d
SHA512ba58f18ffd3bfe3486af54a935c6df9e94e22af3f49f5375a648bff2c67d27b2750f929d3bf23dda46d9d23f4fb8a49bcdc1d81679449e2d7c703e923d21d487
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535bafcdf69f59cd202c9d8c798e2f793
SHA193dccdb6b5a4f1fc7746def4befb92a99e9b8e10
SHA2569527e67f5eda67e15cb9d146021a4f3c092e467ec5799c0fee7670bb57f5d3d8
SHA5128e715ad4512a6de7bb5c96d876434668497acafb588a5b6e9ace62211e4f46aad377e3c7f2275ef664e8254b53cd8d1f2d99efba1de5e0c4d23c96527342b57c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4117593d23480688e9a61b4037de894
SHA17f535bd3548a4312556f53b9fd098552afbde6aa
SHA256bc19b85c930d6770e426238da1b2b279dc069dc2ec6f0195c6cfa297b529a4a1
SHA512e837ce22a09c82de91f4a40483fef5acd0310de9d3d5788d8d4a88e9e94224ddb7ddf7a0a6c4f240aa371a032e1abc0c321643387176402db21b463dd5433af7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a