Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 12:24
Static task
static1
Behavioral task
behavioral1
Sample
29f4d101ad76ae8a6204940e11992e85_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
29f4d101ad76ae8a6204940e11992e85_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
29f4d101ad76ae8a6204940e11992e85_JaffaCakes118.html
-
Size
2KB
-
MD5
29f4d101ad76ae8a6204940e11992e85
-
SHA1
4ad8846672c9d57b4509659442a8146db2cba4e3
-
SHA256
f88b301632268a62b79e6db2d050b152e6d76c11747c90ab43aad7884be44a9a
-
SHA512
c63ae958d8e3109e27b9d2876d4925aba614879e552b0610698bb3519a6f956e516cff98be2c5bd1cabfe3eef28daaf50b09585d9b809e77803f544c12b62d6d
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421419327" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0f543e40ba2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000612f905dfa0fdddd98cfa40233d31dd7c5e00a9882a99ffc2c3edde450217598000000000e8000000002000020000000c209526f2353318078b2d51c550a72df784484ba3f801fa8e27039ddb34bb304200000000310566bfe3ad3d893356dcdcddbc27e992a5ccf94f1510864de3c9880decab6400000001cb05238f20151c6d5f78bcec31537866ba96f0e62cc512b2274f62926256dbb0513ad35362c7c0f7436dd130fe18877b584387a27c7d693609dce78eda9f9f2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0FAD9B41-0DFF-11EF-92D3-66DD11CD6629} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1460 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1460 iexplore.exe 1460 iexplore.exe 1448 IEXPLORE.EXE 1448 IEXPLORE.EXE 1448 IEXPLORE.EXE 1448 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1460 wrote to memory of 1448 1460 iexplore.exe 28 PID 1460 wrote to memory of 1448 1460 iexplore.exe 28 PID 1460 wrote to memory of 1448 1460 iexplore.exe 28 PID 1460 wrote to memory of 1448 1460 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\29f4d101ad76ae8a6204940e11992e85_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1460 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a71658f156a8870b106ef6c808210759
SHA13ea243dc48a5f58b9e7abfa64741bb613ca30bac
SHA256bfccec08730f166587c0d5b6893f8a42d7812bd68f14696d54754899252ed2fb
SHA51255d975792101bc39fca3df4b430fba078d4dca85e59566200348cc6e58e2d05a4bcb52ef72b1c514535b12228c0cf9769554b242ca6c4bd2297b7f7ead806cc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588202889a817f86faa426d11cc45ae98
SHA1e36e4b5c5b7697c28ec2e52090a1ef348bc4b0c7
SHA25647be867d5fa13de0120efd40561a460b6fd2b55a2e27a770870211d7f7da3e61
SHA5127dfdd8645744b2a1ce4682f987bf7a61f841cc663526c6c42163740e54273778db58224300292e477e7f37404f2dc3749ab3a52345088be587992fc134df46d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa3aac854c9f4d168279aed97fbcdd3e
SHA1dbe049766b40d2df59b6a4f732545234912f4bea
SHA256b2d212007dfc16028eeb2ff720e7c547fb58e2a5f9ae409fc18806a173e9f99e
SHA51281dbfddedec76882781dcc5b7e1e24da1c54373c88fcec3a91ca6924bad6660723afa24d10a47c80b44c622772a9aa08002000731652636f868b1d559d5a513d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4ec5a0d8edfcb4c42d2ae62e70d14c9
SHA183f385ede8b56bc86b46b6d9c83d62e8081d1226
SHA256f0521d82f1396060b92de41532027b338fae6c0ced08be49fbb14272260c94fe
SHA5125046915559db3251f9372f694fd28ba461df0c703220ece53cd6abfd1c9d35722f5732c441a4c298e2c881bf553e50b760c98ea9659674dd61e6ffed16a541b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ab084bd88583a2ee3a2df454f1beeaf
SHA1cffea22d5d9783f7bd9e36bb838b3dc61771e7e7
SHA2565abfe902ef67d56f1c7daeea22c2a081f54e099c70342f622d11e4bedc3e1aef
SHA5126580a260fa860246a3165354a43b1b1dda1a4b9badedbe3fdb27a61b11777c27c120a9f296e964f1a67b5560317191467e04011334fb623a43150f4138f37416
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c425f46db51d7782c41ff3adf21ac5f5
SHA15036f64bdd6ee70bf0f406061fdfe73a2212a373
SHA256e1853b97e35dbd538c840491e3f447beeae3b769a8dfa48ee6ad701c3196349e
SHA51246da1ed82e9c100514fe7b3a3639ac6a98cf0616535f27d3afa060c98950037920b96d403d1d7ef5a5ad41697aef930dd46f58aaa6db43e9f320727dcfe31da5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521578e6caa354e09d5ff679d1121f2cf
SHA13230fb50a471fcafd8ad9f259c99d8328d7765b9
SHA2565f0fef802019b48dc2bcaa731aef1856a36480115c4406799a7ffef910660cf7
SHA5123880f207a81905453b8d7380d59300a123138681167715e993677d40832c260605226af8e6b39609a1ddece7e12eff7bee78bc5addccf40038ba5234fcaa30d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543a1c6fd061db6672b85672d96099128
SHA166a16c2cf87fe2b3f0c97f771a7995c582e69573
SHA2564302969493bfe145104920446fc9db6137e0e23833f1014f5ea584ba1883d0ae
SHA5121e11ac35657dcc4421f6408381b1b20e0868267203e64a76e2bb572538cce1de618e687afede7097a412c299a5892026fdbd82dc052945bbda09d8a8761fb4d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59be0789dcad17ccae46be67066e2050f
SHA194ae60b5ef8fb0afb025d80114d4c1285306057c
SHA2569ada5ff7e1eaecc89fcf7867db012282b2d784bd0bbb8c084c595034e5be1666
SHA512f831ab7efc618aa44d7c2c7d9e965716c3de5461e65ac8428c77a06f06d2a302465b778910726c3812e4ca8ab9dea0727b48e6abc1863958d49a115123a1f0aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55826b22968ff55f31580ea7de60212c1
SHA17cfba18070d50013bb937ed1c6737ed329fef7ad
SHA256ca22b241c5bbdd948a7ba9282fae3351735bde20b27de35b13380478313d2291
SHA512df636c1f6a9549a1c1cf6c9330fdb45d86165e174df09fca23be4b33e261c4d3470ac91f118047c414e2a4ea31db20cf6cb20d6906fdeb2ff5bd3d8d3ceac465
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4d34c2a2ebb2946e72f17c7f92f071f
SHA1c666bf8cc7e6ff060189aeed2be1a6d998c62f16
SHA256e6666af9c2c05318d7682b14b3a400c58bb9a82874cdd9da9dbe10b41c621054
SHA512a60ef57ec0827bc00cb8a55ced58163556cf91a03a215d2c984bcc520428142182533764573a294ae2303ad427f301f69eef7d22345deb4f37c411c0d5eba932
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a27757d293e8045082bf4bc252230ae0
SHA137209e73c00e3d9d6cf31628e9514553cb47e8d8
SHA2566b219bc07631c48af69206b3db6fc1d1cf3d5fe543b8e2e264a1de07b8c1f26a
SHA5127244b9242243f97cda32268588bd5e5ca41df81fd4458b497c1116b63ca149cdca48fcf32d89d3cbb65bcd151534f0e414f79ed2b1cfa37b6f14871e7826104a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5200fdd6708d913b5d1e01b2105c8f0df
SHA168469c993a4a14e47a113a11eccc128bb1e3d8bb
SHA256b106b2800caab39f35ffc0191d3d85fbc1086d4123af5227d71f07ddc799bc39
SHA512d97cf3c55121fb50bdd75fc0625f59238377ed07be6729b0060f23067fecf3120d700420cd7392463befb652dfe301b44b8aa1c7c4164b62ba4f97eb44437c2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536af458998fd156c3c21d3c1eada8a7b
SHA131081ba5bf508d14e9305fa60af33887e71dd73e
SHA2562f3bb563648914f454a70347c3e4b09ef65aa96b11189842212bb142ea296f8c
SHA5120c8536c2ddf44e513da2a185e4b044ec641cb388078262e80dc986e3425906ccc241e495cde9fffb329ff2570ec86d62b3795ec399c77e5d4ca9b626568261c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f834b645d52818890f8f818d043acc44
SHA1b6d6b8ebbbc56a3be3e2dcf3ba84b7dd6a05d098
SHA25600e51bf2bf921a470f1916546db1206d2d8cfdbe91bebd419fd16408c5121f56
SHA5127d4c34a0df5ebfacce5f751a8dff2d092e087699d85548286d339d6dcfb9e187f7d2c1230d0947da0671d5f763609fa20224aeab32ff9d31edce94dda1e16c15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4bb5c5a12eab9e3bbebd4a5fd282d42
SHA16abfb2223c191badd68e7f587f730d82ed523af0
SHA2568d156fd8d42c6b10521179b20bb46103dee7e05f1d1c59bbfb4e8026133c7226
SHA512f2d78f8f6e5a8647a954e44aa606b3043f9e3d0a7cac4969ee993e11f13befa568c0d3b3dd5bcd3cab89c0122b522210bad7db04c235766f30385d0e6b6d19b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f12cdf8ba6414cad1000f54bb64cba7
SHA1068e73abc008227fef0ede1569f9b092bc87db8f
SHA2564d8b1b9df837d6c1a97d8497b0e14fd75bacc3a441f172a0284bdb936d5f2722
SHA51220245af5c008ea59163a1833f579c8a15bcd44d8bfa172d983fc67c5c9eef6b37f3fbf018086969d46c38da535fa1f050a884877f642f0a51f55d3d086fd7749
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a986afe8cde5e8591ccb8bf2fc622ade
SHA13056121874a1615436bda1807114925d048b33af
SHA2565beb43c33efca36a79c65f40235ae9536a24ca059d6a21d82233efe2921559bb
SHA5125f479c63614a9a6dd1bf53f2196fe5eb9dcb3ca88c1fec8786f5796671f2c90d0cce283ff773e8be9ece567cb94e308bcd60c7119f10488a034cc554c4358628
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc7c00436b9adc0079ff755475036a4b
SHA11d281a8646228af3acfecae337f72eb51cfbf46c
SHA25601a89a0443138409d32c489c1b470fed7685ac5accef4eb56a656d9e34f45a05
SHA51210fe3650bac78129b7eb1f4cd2db4f879d020848d4b055bc1b015f9819e16c2d3264718450652451615759ee3e371494da063f758e14f83baab2e359293aff32
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a