Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 09:34
Static task
static1
Behavioral task
behavioral1
Sample
97c29786fdc79292876c8c435402d189_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
97c29786fdc79292876c8c435402d189_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
97c29786fdc79292876c8c435402d189_JaffaCakes118.html
-
Size
462KB
-
MD5
97c29786fdc79292876c8c435402d189
-
SHA1
e6d7ba2fc211167d76dfddd3ec7531837cfa554c
-
SHA256
2c3a9c99a78688d90f8885e5bf3b7fef786953db4b37de74d9f94165f765d479
-
SHA512
35ca1b81b5f69cc13c5f5229f24467e136c2493a29a4abb089f5356bef0609dff064fdaf19059100fcb8b1f687a238f765f05853e804d66a50704c83a3e771d9
-
SSDEEP
6144:SbsMYod+X3oI+YsagL0sMYod+X3oI+YVsMYod+X3oI+YLsMYod+X3oI+YQ:A5d+X3r5d+X3X5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D6E6DDA1-231E-11EF-8840-6600925E2846} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b06f7baf2bb7da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423741951" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000143acdb96a6e23459af10cfe762150cb000000000200000000001066000000010000200000006916e2dc18c3a389456f84a2408dc1e7a5f9c93047f18e2a7a60650944793b36000000000e80000000020000200000005545c79624ad2afe9f8a669a4099aba671952cb1b2d4c8c168588dbad170b82720000000317bf6be6f9383e6886c318d5d380c272a157dbee88ac6dd05aa7f7462bebb484000000075c554f8e25d694b642ae6d344da82d6ea47567a22326ecb7fd9eb3152485e6ba6d8e098a9a632e0abf310ad2ef9b1d234a29ddca9662251ddbdf449592c456c iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1268 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1268 iexplore.exe 1268 iexplore.exe 1668 IEXPLORE.EXE 1668 IEXPLORE.EXE 1668 IEXPLORE.EXE 1668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1268 wrote to memory of 1668 1268 iexplore.exe 28 PID 1268 wrote to memory of 1668 1268 iexplore.exe 28 PID 1268 wrote to memory of 1668 1268 iexplore.exe 28 PID 1268 wrote to memory of 1668 1268 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\97c29786fdc79292876c8c435402d189_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1268 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581a0d7d28920937c336e15a0dae98301
SHA13db31869c1a5e661afa4a04edf44816e1ad86ba3
SHA256c5da0ceee96e42bd59b772128e56e0565771adc7fec57ba64883c4e1e3673543
SHA5124b717730e02c03c76ad9d588fbfffa12e26c4b2c5b24ec9d0cf82723c643ca43804b5e9473d8fe4d698d4c628c602864d02ba3c9362fee60885dd72b4ab8d349
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0e77ca64564f814090eb03c0d1551fb
SHA1ee292452b23f7f4663dbf27a4f41e14d348833c2
SHA256360b53516c19286adedad7a9d5e2a6dfe8387a01e45b0286b7c93c43d74f9a17
SHA512ad184fb561b50461d6f76261d07a3dd16815abab92e2b39be87a8c47f1abe9cb0d8188e740a3816915f9580a4540eb5906d9a6b4e14f4746619a6a4eb14633bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b53e80d813b03562f8bf04acf5defdbb
SHA19d7d2169bfecdcefebe3a8cc7da5929a8f36b976
SHA256f76ea11a7be270eb61d96b782a70bfd37db55ea53d66cca420aa02c6ec5e9b42
SHA512534fc9417a8ba2a8837ce9be2a8b1d99b4462288d78b5b6b5d50658002d749b17b7de6206795fd25c49feba96bf896e34387b956370216e98b33f45d1e0567d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7b0135a910c5efa8801eba05b181db7
SHA1842bf493aedd66f981687a9573301f8d64f693f1
SHA256bfcbe71cc064b50ad44d05d91dfc74137cba7c5231d31d9078507b6950b75e22
SHA5126187d6c6e14fd072e3c700deba3fa7c1af1f567b4176ec97c4ccb0b5b6377a9afcf91a93f0e01b0b7cedd8181334fca6bc50672a12ef7b267bb8bffd614bdd47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e26b686ed7d99e5d67790ef96376d3ac
SHA10022827a1620478de020db1318463a5dcf24b7b8
SHA2564ab1bfbaae0a2108993d0e58e30fcb881df4c6c508433313c45de1b263fb0e41
SHA51256c43091f662c4e580e122025041db5cc9eae6505950598919caf8df8b998ab234f6c8e4a63fa67136996f55205a35881eeb7548f69172a58a2542f92ef7231e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd33eb83286aa7f77cc092160c46054b
SHA13c42d1057f1484348c3804e8c3ff2a7b9b991a27
SHA256044000ccc19cd30499962299a1d0604eeb23cdeaf79e22421b89ecac97257a5a
SHA512ce1993ad67014d4c17b763279d204e0cb7999bf40504f7ddfe77f7b1bb4f84d59a424163756d0f4d91faea92dff7f67f8a0bd2db90d8fab2bb4d3acba6db7584
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee1df54b7ccde04c8ec4ecbfc532a2b4
SHA164ac39ad28c0bfd67a4f80f49ad978c7e958732a
SHA256c2b71d2894c10d22624b6370cbb8316306c1cfacbb11f43f35e8f02d19cd1ddf
SHA5128c9a3c926db514970121d955b4ccca6d5ba0b20cae6e8fd5284cd360ad93b19e2c198a40e005b70f622aeab95293e1d4d0f556ce1884eb0d8498a7e5f0f232ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e170550b19f628246dd3e738dd5c70d1
SHA189162261cce38596576558ea40c86e2437016f51
SHA256a2dc849f6d8609dd49cd17f32035fac297ab2e7b23783fbe0013f49a61be5d25
SHA512e042bec46310965ea6687b167a8700473e1b6bb7edd8c7ea023dbca8d3a064413c936bc138f86d1646d1c898569bbfcfbe0930066a1b9f0f764c8464221b6455
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53edb4551485b7b08f26f820ded91732b
SHA1c78337fe55100fd4c6c804757502dfd4f8bba39c
SHA25698e23592c08c51ca9ae57204c39d11c41f0a0e8fec194403ff3bfdaa2f5c26cd
SHA51215ee4e1c79bbc0b2a9cd73692cea073269249178313fd38a68269462baa144e0829edfdd65a2dd7ab97eec16f802590b87608f6418a9db5dca39bc8e47a88171
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5b73c8543f2787843eb889a1e7da6b2
SHA15e059809b63efc1103a65984e77e01cb7a4709e5
SHA256f061bb1c46955a30d786e12aebb82a0bf0a7b7551f95f36744bcf1b1814927af
SHA512a2efa83c5a57ce09fcabd36dcc8e7f0af526e08e30a484c1cf5a63e10471683b846a8b539083ff5e9249591da4c1a64103132e23cca8518084c53be4134ffbf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b473db8c0945dc6dd87877a8d46b8905
SHA197b0f7d670be7934b0fdc62d7055efc8373bfa5f
SHA25649fd369f4bb2f54d9b5992284bbe067de69a31f6db75d2d6d25954cc7ae9931f
SHA512b13fdf033bf1d83ab161e72a4e14d4e4aabc2dffd4efdd406a95f5efabb5f8f56c731d4b135f9fe1db47a96e7e00a49c75dc9ffddafff01ea4351dc3d3c85052
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5141daec95d74ff31aa84c87fa660da81
SHA18c7f6c76c4810f4a6b6cfc874d33c7b5cc991f5f
SHA2562e43c2c241a4bfb1cdc4c697ceeda9cc25ca2b23b2c897c2e04b97164aa038eb
SHA51207305ccffb9cd809716111c6ce49581b5bdbe3d252b6f3ff7f8005ba3f2aadb5758f6d52cdb2d05415326307bd4a9f86150ebb4b4ab4bfa9eb8e04ba957a9291
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d3406f4fd24c9d6ecef014dbc9c4760
SHA1dc7206b091379d2fd0e0ca1d5b787dc92ae3b74b
SHA2563efd3cdcd6a52eb837f978bd8b9a6b5aec656c7bce2af6a9c310177e68329e91
SHA512668c68ad097affa15aa3ac5cbf27b7d683224df4fb7aa0fb668f407bf6002c64986a61ce8325b580767d6d8001b163927eef5efbfa0b232c5470ffc8a19986bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6ebd4b1b02fd41c48bf43f8292596cb
SHA1f9d13f3e830efabb05471cb5f05e3ed9c3b144d5
SHA256f622c40ca9b2236c086abbac9dc911bd8d3815cd0fdbf374181db08018f441fa
SHA512717a44d2f0a2d470682dd6edb4ed0c07efb7a8908b45439fe080321241febb8ca53ae3ce364eed07de16d54ad076f9eca92469e3528de0d1e40626e0c119a2da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d8f2473199d3a55171233ea999a2b08
SHA1f68f6a1d3e74d19e9855ef698ef9ccd50ae3308e
SHA256e5cdfcc8e59a7bdfcb1619520337ef697748bc3c8f5d75c26f30f24ce43b4465
SHA512f65a2b0c8675d1614a18a7ac4accb5fafeb578ed4f268452892825aaef75cd735bcde3463c445074aca88768198f2467d14e6dde213f94fe646c0ec86f61925f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ca57e093c2923a2877386f8970172a8
SHA1ed4779caa84691a1bb109017552e41777119df56
SHA2564c9701f465d4f6fc054ae73b79f6d76aeb29efd466806221cb649e6bc82aa991
SHA512414510aa66aabf143292e5210a4dc077b18844050ad2ce0d83e72d4ddc16dd98168a6d8b682891134d4ab23a53362245fc896ea430326c3b45fdad1d094e7cea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e4877dd7d7f06657076ee4bd4d37204
SHA1a686fd43871c6633a2923f42a9bb5170a0751d92
SHA256d404a915cf5ef47c6606c7da2593de04e215f911ac76cda24a7be9cf97681d77
SHA51279dca36a9e7d46f1de2c3ff2806cd4f622b1fcea01d9977adaf838941911c54f3c738269bc14bcf794f5efe1bb364c69d669c6ebf953637f9655c1b7474d2ef5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cd7f0745239aebe09e1173f00a42e83
SHA1d7bcab2ca2a21fd66b6b6a105180f8dbba89ffc7
SHA25620439779af3f1b3b6690828eea0aa2f1005fd7b075552490416f9bfc936884d7
SHA51249e68dfabf10f446643289a61787af6936d8fd4318f02ae661f28a40017a27ff4a15bc28536c72e4d8c085a779a7eaddf66bb0e46eb7adbda6af1426dcf09bf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2a8167e46b6167f3d593281dc60d286
SHA16e7a93a23085dfd46fcd8d6df76055b3e3b3d1ef
SHA2563aaef5378335f173fe001609023f31bf9e40f827440bec45ef568bbff581a283
SHA512098491c926b1de9675d267055c3723127a82d32c90378a41d317595022613a3b59563858597718ee52d8b2cc1a71286da2faa4c714bb4d850a6fe1028f365b40
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b