Analysis
-
max time kernel
136s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 12:05
Static task
static1
Behavioral task
behavioral1
Sample
29e38f905adc115c3a5776a3f521fa15_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
29e38f905adc115c3a5776a3f521fa15_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
29e38f905adc115c3a5776a3f521fa15_JaffaCakes118.html
-
Size
70KB
-
MD5
29e38f905adc115c3a5776a3f521fa15
-
SHA1
dc95f8c81cb96673a210cba70eb0f864b26dc4dc
-
SHA256
9cc05c64a2e687d0effe12ffc2f174adc8035dfadae2fae117f88a6f19b14ff8
-
SHA512
48d4e2bf6c02c0ef30f9a7106388c745e3e5bde774eec28b5bac4780d5fbb1708f00d69bfeff974b5c8721acad856e91f5ede157cb77f03e25df039e4d93e275
-
SSDEEP
768:JixgcMiR3sI2PDDnX0g6sL6PV3ttvoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFf:JF+9+TzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421418174" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{60772F31-0DFC-11EF-9DB4-7A4B76010719} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000bf280b08b281c7a2e82eb048ec1d2b4b84549eb83e39178fcc68590f7b3c0b8e000000000e80000000020000200000001dbadaf24b1113c92316636b3ae5df4c8e253d6838563b298821cdcee170bac020000000fca60ab6adb81bc163c6d45c6719752db7597b3297f8c70f5ed4c3c38cfd3a3040000000ab00965a4529597102b6fd1773858dbc6a345807a2afc3e8eefe826ca51be77eff286e0a927e3e4f4fb1a4a3599ac93cfebd705e5228ad94d82dc0918ddaee73 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d06e183509a2da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2884 2240 iexplore.exe 28 PID 2240 wrote to memory of 2884 2240 iexplore.exe 28 PID 2240 wrote to memory of 2884 2240 iexplore.exe 28 PID 2240 wrote to memory of 2884 2240 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\29e38f905adc115c3a5776a3f521fa15_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5867dbde49176669223e5c55b01def085
SHA13b58ccd7dffd30b9cf8c137d5e5adc2b16c0b21b
SHA2566c7dc44c7f2e192f1a306926e02f6a0965f61de6a6c7dcf6fd86b085160dcc71
SHA51253513f334507daae0fd54eb5935750a6cf1c4b617024c3425d6bb0d4237067ad02fb4674245255b49397fc5c64ae3814916cb4fca721ca7503300161ccce96fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad2bc891f575410beb3a6a4fad615aea
SHA12fc4ec33b0f303d506295ea8cf1a459df4a14f28
SHA256ddcac3ec30beb5f2e75b190eff726885758e652b0eba85d40db4335ba355c72d
SHA5127b08730cac30819feb5ae4b60c295cd189fe9c3fc3d9a7949d00016cae25f82258526af714b68a4739be73a80082dc010c0d82471c09453b5ebb236eb3ed5e1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5beba1aa321c8120f98f1932f573950ca
SHA1f6158e18cb324b55308a701b458f6aaa5815d5aa
SHA2569f58d01d1cfa217b03cf62dcf6d9fd2cf8eb502f1b25947b6c6e2f115bca8268
SHA51279a6029b2ffe9432bc1531cc0578f97a543d1b195169d5c3fc9ee94ae98404a54a14b1086cd0483fc2d37b6fee68d572a4011fe2c8ac06cba09c784b49e7bedc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfc6e4ab1b9a1d1a8d4fa8de62dac201
SHA1ec5e088de6fb416ce4b336a2ae77e1f6abcd0484
SHA2566b73c067a6bda32dd449ab261bbc5c4a97ef814dc870834207141d337143fa6f
SHA5129cc95a159a887fafec184d07231285552dc3604ca1644b2011e7dc41f5231504fa3a46edea976e87d274ee993d49cad591aad9442fab644aee59cd6a05301b52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5caa17566f161138f2e36939fbed73d29
SHA1d8b0af680f9aa280a89960cf511ea7c1c62c7c0e
SHA256b5cc9aa39add73f42cf7705e81a14b85a151b87e9f27754d9f5407bf6996f4f5
SHA512f73457d83ccb9e72629635896ee55fdb90820b1ad1049cb0098784eaf8d5ead0b092f96808cbb0053cdca02ecad6faaa09f4a4ab1f9c7c417a2e52447fb3e386
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510a525a842337ce2e4eb53299cd4bbab
SHA148a56911723b20530206ce4de2b468161f1d1e0a
SHA256529afc3314ecae281a78a1f7c7050864ff8cc240c50db56af3fa89fba1101db1
SHA51227cf40d0708d0064a833cb4ac5d979c85f58ce1ad2f44edd33ab59bce345af9be61c9adce3b9537c31a7f543cca11e8d56659cbdf618009a6ac1c561a614f11e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c615e915160b39bc864164fd58d72b3
SHA1cbc70aefcd6e7ecb6c0d470eef1ecfcda65c9a47
SHA25686fcc67a6714a074ca68d1d112f6b48f2ed00703090cb25b469cf6ed24b9eabc
SHA512584f6665d9efb2dff26468fe8ccc36694024176706fc4d4f26cf4a62a5e7275a234ed45e22c21827f09297ea6df050d8a5062bb23b028372c1ebde020ee9a935
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532976716c0d696f0ffcf8ee8e8d70edd
SHA1efddaabf28a73ac8b74fd380847d057e27f7ffae
SHA2568132f85e05745cb77b6c4efbc799eb9d59b280e93ef059304ec4c2a2ec25f263
SHA51200d6b0be9de7935c2f7a432799c4dcea3abf4114883d78f937635b79d33293854c58889c6b6c7f7c233e7d77a5318ea2ae6d618046847422e8e94ab936e59078
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac7ca94b95b4c12d799a2446e058337b
SHA126a3e484f4a7bf0962e50a1ed44985f28be989dc
SHA256bc7834efda42afe5a48315e9888ecb1c56873df61e3f6d458bac76cd41fccb03
SHA51216a8a4df2c3acec750551c39c8e0ca159b4672a8b47edcfdbf5ef968fc93586b5d78f23cffc541ad7a0a02b2be16b517062da7ebb679e1abc6f4f583b105569e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52033aed59b8d30bab09cdc2c281bff7e
SHA10578a53f77e1670f35d4abdcfbccdd572ea32dcb
SHA25651db806931c34af5b89e68ff12916e90a6aacdbfe245dcdfb1332f9c08cc7ef7
SHA512021d944f783f6618dacb433157c4ccd1f29333b68d4792e9150278c5a1db943ddd3c580a90b9418307259568943b71a3f2542d3da5979376f1e1bce0e3722e30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5044de29164f9c69dfff1dd330439d9c1
SHA1f2a12de1f2fa9ea19b343e533dce1a3f089132e4
SHA2568fb8607a1cd18ee1300bc6e5374c7ff88fd48df2f65e80473f00d3b35b9e6512
SHA5123cd68fc0e6e82e7b1c39546d9198c008abc1e9d23d294239fcda021067b1a5137c75139189b4aa53793c287fff9384df497ddf399e45599fa1d347e742c40388
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ad3e4f774ff6c77bc6c0d66b1754d0c
SHA115ed484c501452e0374d9da45df9755167232368
SHA25663e271229f499b44271446f541f8f09b186d3d2687ae985ceee85f66134db2cc
SHA5120b520f710187a25d24e451c7ebd93286acdc40d4aaca3faa3520002f65d64a0bfb16fc2aadebb75cd72d7981c373e3e7a4bc9ceb4c0f921283f8b953a55cabe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce343ec0a0e60acadc7e7ad5de0cd393
SHA13aa97413919e76db7c0dbc94503f97f2a169e916
SHA2568202ac08eedbb38ffba74af7946307e59520b326cfeda665a80f83de5a89374a
SHA5124d5ccd967ad7b4e53d18f6723b530a308f413b842ad3329c0ea18b025940664f700ddb46592771f2d0c3fef7e37c3361a04a3359dc79881034f9c9e9f00372c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560e0f3b77e23cb43520d61c3db0b06cd
SHA1f6e474263f505d1e91b26227af024c1d5533c12e
SHA256525a9253d7fb212c6d9e8871289f47d56d2341ae1038d558bea42687ca286e7d
SHA51223d433531dc06c0bf7e371ba394ca141d2e10e2700adca1850fcf11b92fc36f2c62073744806294f7e05ff1c684969f703ed1e314993b58bce761fe0e2f92642
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7625ab6377c61ed0ee5487328406dae
SHA132b7325133f7212c22e6cef284c68377b55973f2
SHA25644ec2a29902e876cd46ef2160320b7532acd5afb418ad9e8ccf85c423dab12a9
SHA5126663bacb4779368542c0bd646a418f512cdac37a2357091baee207d7f299793cc1d63820d3230b8531d665cd37bb4d194deee95822bb2948b28ada33bac23e4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543e5468e9c6cf190e8eb6e1dbf0d7f52
SHA123e801ea51d8a29a8663c4bba2d33379906b592c
SHA2566e5c5427a663ebd53259b689161b16aafdd17c730797ddd8548e3dba0f7487f2
SHA5124eb583a3f506a84650f8559ac565bba3fb33b788b9f270fdfbd9c120ab2b2bb66412b8aed14171d5e27786b4a2803bd0f0a024b5709623dd4f9e8ec9bd8fa147
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531ffa7cff734ef8a2e5e0c9caa020ab9
SHA1b0e6c511c85da862a5eaa160c410b58b6c377d1c
SHA2562aedb0a70f8a67250abd456e1b28bd482b2606d3763eef43cb234ef556e73c3e
SHA51265699518d6da1f3217e4a981104184d081b3fdfc533aaf40cf017d1c50874b237b2dd595de7a62f8ea3ffcd713957827dcb2fe04f3aa70f3fb9d355d5e1a2642
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7749d4c022b1627ab30da29deba60b4
SHA1bf4c95ab8c8a95726fe967770f8f3560f103e2f0
SHA25641c6ee8bda9405bc121a006aa40d8bb775a593d28d8320b7450480b58518bf27
SHA512be6a3eeccfdc1ecf63ccb38480e6df6a964ae152c8dc8dc121ee38ab2c54cb29709869807a232a30647905d6f103dc3070cd5ab51f49dcbb8dfe93ff4a440faf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584af37cfd713d1232758104e613ddd59
SHA1a67f1396059d06ef884622e3d76e00abb5ebd774
SHA25649cdf016d94fd4b501a033f070a2c18515274f21eb8ed308713af88dc1f3b45b
SHA512ec01c4df824948ad4389eee16fa0ed83db384ea53770b6ee5d57a17fe09977325105c22671bd73638e5c73a75765d6f9db2da8715cf636f468c0e656838ab632
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a