Analysis
-
max time kernel
138s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 10:31
Static task
static1
Behavioral task
behavioral1
Sample
29896bbff9c3bc966399a76739077c7f_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
29896bbff9c3bc966399a76739077c7f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
29896bbff9c3bc966399a76739077c7f_JaffaCakes118.html
-
Size
25KB
-
MD5
29896bbff9c3bc966399a76739077c7f
-
SHA1
3b494f9563d191297aa2564584f745751f474698
-
SHA256
f673bcc2869140a2fc2b99e666eca4641b042cab28aa6b7743a148335790b743
-
SHA512
bf7f82b06a16f40027b66837f05ef53e03c0e150d34a02b11973a81d3fba1572e0317f1ff9d1c4fba44154348029b414521c47d570d7be2ad588a934a790c987
-
SSDEEP
384:HiA6n0YiNorQ8884HlW0/ez1zbJCE+AqZb8A05si0A/hhAjgnDoSsiIgMlch/6Yj:bdbGrl8402XA0si06hAjgnJdV6iS92
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5B5C1951-0DEF-11EF-BBEC-C662D38FA52F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40c46e6cfca1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421412582" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000006a4da549461631818d6e141945837d35e963bb1e2b987061d547df0521e604ba000000000e8000000002000020000000a030509a44ca6c522e948b869fb0f6a73e8b51dbc68ef0df6602691e0a77e59820000000d59e2ea7965b568899a6022973e7de3f4419e6bd4fe16ddf62c659c1a90e23c540000000edffb694eaeafcb917110d8e3f3368e548373f23ed578d3352c3f1a7b93e314bfcc9e7c2f54251f1eed9a065e4e7458b5a5cef13230a72e87926ea8422a70f8a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2460 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2460 iexplore.exe 2460 iexplore.exe 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2836 2460 iexplore.exe 28 PID 2460 wrote to memory of 2836 2460 iexplore.exe 28 PID 2460 wrote to memory of 2836 2460 iexplore.exe 28 PID 2460 wrote to memory of 2836 2460 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\29896bbff9c3bc966399a76739077c7f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2460 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e50ab351b4f557b7e4aa98294603920e
SHA12392bb02f391f70f7a3a2d1a1c44b1eb89cb1157
SHA256af69fec2e0cda5b7806e40b033bd572e4bcb1c1634f2b8434b219879f7a5ac36
SHA51227a6335ce686156ebd449df5826b362c6e44e97146cc9dad51dd293693af328301ceae1a5b279c3945fb56a0f8b992b4051867f37188b11c79822f63dde4a6d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efbe47485d1263575d7a2005574c81c2
SHA17daa71d226eb87a271f390ed32e5c65b40bbdeed
SHA25683efa5c8c11891f90948ec0eff82f43aec7c27a3672c502f2f9be36b13914174
SHA512590e93e7982d1e2264d96722b3ca1a23cc48f6308cc0b53e614bbb292aaeef82a14f183e93c91808bd9f21da73c526219f8636c053adeb6c0cc55d74c17688e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bf7c27478f732a13869164403cf7000
SHA108faefa84d76ff70199921b213f960218bb3aed3
SHA256ba95a5cdd60e9711d1c0830304bbf16a277975f46b63857bf7aaa84801add026
SHA51267ddc9f1a2a2a3b561bc583595583760f232e872b6451ee327fcc4e12297af549597601ccb0711b5b239ae84159520bf10c94643bd24469f2f9e7345d303950a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57aaf5f104a8c5e5463b5255e7b0b9c64
SHA1a602af1eb3cb644758f2109abe46b8914d6923fa
SHA256316ae1f1263620df261563dbceab81b82f6fd113fe920115df9903f73c62edf9
SHA512c86a04b5f9ff80cdae0b181b024aa0f386ef901663f8528db57d44f00ad1fea3b19f7da3388f8dc86b0b6b0773fbac4a8ceaf23d55d6d3711e218f3b0df771d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51798adc8f288383c77cb51f80b2e3a12
SHA1283244c4bd70ca0b3aff6f23b4dfced98eac3bbf
SHA2563becd3d41e08c98ca9f7de7233101fe2b5460278dfe77c6b08b8e08535506b88
SHA5126bfb5b63fd9f60cd6ebc8c2054447ddb7cede1aca6710bbbc462acb5d4deaf375e2b5c963313070bb181beef5a19a3a8a2e0c695877542b628824ecd5d29992b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b00da24c2c6d310521b0328e7ca97219
SHA1c26c290911d11090cdd2e4b2621a22b0a3db3ea5
SHA25645ae2157c216c947927af823324e599586bf79f35808448b2e532b21eb0c0298
SHA512a033e178e5d1775e168aa3c4f2e5b0d495d40dde845ac02418d1d133f2615fab3c03ebcea277d83abc14e622fb2db3bf4b1975dae183eb73cceba8bf461c3568
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508c1c8e9d5b42297c792961ca5b06658
SHA126818ed4037289ffa8fe93c6a4210116adaca508
SHA256715013e2cf75db0d40d86feecf2225de4fc700290da7c99a384f32a2925728b3
SHA51263c6cbd3aa7d6336f5fe0ea1309ad42870041bc6af3a2796c60f60fe3162c8660c9cc1a23b5de02a6df8a20fe8604c18ec11fa4b7c359265ad39ffd73f843c27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54467660d4835bd491ed6d510141b5684
SHA1bb557eb04b32017d0996b5337241b2e169cd589f
SHA2563609ca03c2137d7e1f5b46b9960f2e97c05b17381e44d0a06b38eefd5016c1cb
SHA512de5adc187e681221558d214fdfa1b310a0b6f5b604cf4f0b57302c2da0133d2f5e406b24bdf5bd8c49ee5f0e519d0767d256f056c48c9e0fae8d3128dfb1ab22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8c33efb2e69854fea405abdb3661a3f
SHA1bed279237ad95343fedd4683ba0964165bac6a96
SHA25628bbfda28447ae3f91c044c988513d8be55e811e89de23439c6bbd65eea57f7f
SHA5129a7f6e15d942e2e86548f338bcbcb8416d1c97d6faa3f9d343994caaa4ee323b996b53f168aada3f9ec4fb494b1a90468622adb8df332816753de3a142cc5788
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ac2d1bd28a77318cd13c8a9a6549feb
SHA18d89a1e76cd5491785eea6e93248a1cf07073038
SHA256b06b555751456e1dba10ee7796bd9fab6de611b072659775b0078346888c0b04
SHA512b372c6aa02afd084877e581576839a206d13ae01cad73a8b9916988697ee7adbaad10f1501669cfadf39c82b043b8c9fcbcd0bd91399822251596c76fea52975
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f176aac3c211370d63e66a895f3f0c7
SHA1602fdf4f08ed32edb3a396451d59a4f6571b9e07
SHA2562cbffcb1937e4971aae0ddc6851e3129235568f44f1ac0b1544b48fe85aee5ac
SHA512ffd800f6fefa23a7f7ff89f895c5e0a9cad865bb91809c942109962a7664e0a63e4847039b754b145c70d20494ad340e5130a004391de647679668b35ae1a33d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da00625ea6bde129b404963e499ecb1d
SHA1d93dcf516860749e875c5cb011b9e582dea9a645
SHA2565b9d2609e080a7a0ceaad2bfe2c01e51a6a54c441dd47f2da264bf09b8a432e9
SHA512912e057b7ea755b29b5365d7a018c732848e8450229f244479dfd11f82850601080e6c451504629d161a82c299cb96831d6f81413bb0a8f4dc6b39ada7c41e29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b44b9bdc806149a55f7c158c4463c7e2
SHA1249f2676593dd42eb34ca681db176f0716a5af23
SHA256af57c4de3014b095b25835a4f43f25a40749254c2dbe367365211f34fb1d44c6
SHA51298addb116d483344d0cc923153e8bad8791c711b0729fc44ec1dc5918154ffc079c9990b7171be2c1733be5656861fe5a4932cdae388d956e7e9c5d956e09188
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd47bc9a40eb57457b9e74f75c7b15c1
SHA121ef09e64c176a627512886255ea85f5e9550798
SHA2569c68e8b99597ac1d02f90698f9671fd2b1ab618c2e66817f90d28f48f57b3d69
SHA5128ba51f78a48b5bf5062f12d899104bc23c8931ca7072c6013e698262fc5446281c611effc94ae383e984da15d2dbff349f561e868071291878fcacf2e95025d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502fb8a7fed8becb0a42147d24747dd4e
SHA1b9c9161c256e1641bf54bfd52f2f8744346e4ac0
SHA2568f277bb6c045662fa881d13e44ee8467ef224882392550e1cf30f6c0c56a5cd2
SHA512e041c47fdecec49385e8de345945590363a5c6a41781da938f335cfaf284ddb97add3e78720c7b333ffabee8c551f8eb9c462d1ac50e434f28fbe0ecce0440cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d8700027beafeb114b7d5acae00eb19
SHA10dc8517320e47717fcb92f16f807de9a007ed6b8
SHA256b6b2cb3de0ed29013d2a5f9818864e68139ae3c352ddf3bb53741e206552cd4f
SHA512f78f041cc0090e857903bf281cf15474f8bd3d52e0e1fdf876c3782d23deaa7e6b7e25dadb826728c51858a9080161a429e748c424e19cb6b18cb19c4b39b65f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5853eb9ab1666bdd6ebd1aae367c9c2ad
SHA1402a28880029324af1e1e853261107675bba48d5
SHA256a7a3b2f2e5ea54ba573e92a66ca1ff42e20a6abc02ba0decf224232364da885d
SHA5124a4a2f45681477d0190d191050ad2b323e60833a1f964ce9f3a88e73035ef33ea669bfaf7471274658a923ebe289ffc4ad80e101d373ca1b89fa46bd54ccb65a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f140774cb060a664e4300f001a4a6f2
SHA1b76a026c7c2f84f7e9f1cc02b2e075d87d82b98e
SHA25615090cdda6ee1b225c0d8c58344c9c1939ce141e89d8235a972d956ac33607ef
SHA512ab7d6c8f3f7550bd0b0d2bc79150082284ea2f18e5580d0b0fd113bfd13bfde56f37116ac1ab7fb83811dcb8a0f94400bf07f21335244d2a12a79afb4fbfd127
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50cd7e97b4f0451e58e06c3e6f6c40378
SHA188878eb2a83205411c3af8c7e5f63d9b6413b181
SHA2566d36c5ff6aa0bde6c08d17be8b1196b2dd8b69512912c4ab2244f77caf47ad32
SHA51204aace12e187abd2f3bfffdcb3cbccb2c25df97b2bccca9f1d7f506f7df6d0d0fc1e135b95f9a7aa4a92eb27f489b3ad9d9dcadd05705a10f016deea1d35b2c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee10bd2407aee75ce9e028f5d4ea6395
SHA1ad393fe8e4b83796dc67f6fdcfaec5d0171d8e5b
SHA256b32304b0ac0040cf467927ed709efd2d136f304ad2e7e3c7a51084e8f3735cbc
SHA512504a2dbab1604272598c233e1432a7160de8d65a2c6b374c9f6f9820ff5b9363085958fde66deaebb73532ef28e5b1420d132096524606a92e429d8906473b5d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a