Analysis
-
max time kernel
118s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 17:57
Static task
static1
Behavioral task
behavioral1
Sample
29167eb135c657cbd7d42c0353a40436_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
29167eb135c657cbd7d42c0353a40436_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
29167eb135c657cbd7d42c0353a40436_JaffaCakes118.html
-
Size
15KB
-
MD5
29167eb135c657cbd7d42c0353a40436
-
SHA1
5354d6dc62125ab540fd9ad1ce5846c119057cc7
-
SHA256
27af4fd4d53eea2671dba74382ae3dd183300891aa92fa8293ebd106ebf2091d
-
SHA512
1f13b458fb87e2def8371fbe98ee12115d21ec9b168f65ccec2d811bbc6628fa432c8beab141540d8822562e3ebf4569aadc3247049cd44990d0b8c10b69f42a
-
SSDEEP
384:4okUB4UCD3z89cQVwOr19gdX5hnH8Btltlk2X+Fz:4J46k9t2
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426454486" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3063576ed7cfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{73233B01-3BCA-11EF-9FC9-7AEB201C29E3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000c2f5ddabf619650fe7485fc93991160b9cd09b83573c49d6fa985b80a1d407dd000000000e8000000002000020000000934e0f79dd7f95a62f53f5d66affaf1553faeb87a3d4a3c3a910b243b08c38802000000072fd575d1e94dfafb21bc0e4044c3babeb38be0f073c97157094832041517fef4000000039bdbf75a3886c6f53a3e38ee0ee7b16f46c07785a2113debc16791507902363c2062010a2f01d16f84b9d2080fcf85a4346336f4c107d3100c579823f956cdd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f0000000002000000000010660000000100002000000033abc233c53bd902f25acc72f1a0df17c86c59d76b8e9202e71eeb6ded036e87000000000e800000000200002000000058022a354de39728f754f8545cb1a576e7959d8a61efe0f37c1c9ea4e029d66990000000770afb6f55e19657c93cc9df77be6a9e3c87241f97c12ab29df2c890924cc485e6b27642e154863569e183b1aeac44b3ed14943d90a430242a4f520b781f6f6eaf953b246851efe79a096d18815b166c2c8a619761bded3fd43f1a49d09026d3c3153b546bd9fce8511478e0f0f49d71167f0d3274ac2b5fb4d1bbf6335a9d462cbb278a7b9d88d1a924ba6f90b55cb340000000045f5c71a06df0d870270b3e65d34fb09bf51762a22151cca792290625689cdaa72f016ee4e633311eebe3ab902e093ce6b3a60b67ec97bf96f124a5a76febd3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1940 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1940 iexplore.exe 1940 iexplore.exe 2020 IEXPLORE.EXE 2020 IEXPLORE.EXE 2020 IEXPLORE.EXE 2020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2020 1940 iexplore.exe 30 PID 1940 wrote to memory of 2020 1940 iexplore.exe 30 PID 1940 wrote to memory of 2020 1940 iexplore.exe 30 PID 1940 wrote to memory of 2020 1940 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\29167eb135c657cbd7d42c0353a40436_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1940 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6408aff9041d9e1ff2debcc1828d951
SHA1bc61e1bc6f6d1c67ab8aeea7fef4610975b25ebe
SHA256cabdae1a1d084c4e3dfeb60355053c82eddacd3d6a43ef112cae19f82b416efa
SHA51292eef839c6122942aff96d1bf0f1e70d7fad5d9dd72f460c1774a3e9d50a018900e88b3c69485148817ef10dad05dec4502e6cfd69461448e050bc81bf1119ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ebd6bed0c2925601354631f3c0c283c
SHA138672bc536ae9ddd263007b920dbb079c8f29d82
SHA2566a6589bb7d56f954ab01d0c0346b91f0a0844ce08da30745a7fb700a26b9a288
SHA512af0e01c01fbab15a1636ecc4eeec6155772654332ac5bf40ffb6af1d0d3c5255a362a22f81612f51dc8112e585ff8d1d81578e84c33517eabfa20e12b6a37807
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c46e225595ffad5a71202a07809beaa5
SHA126147c961cbfb8963bf39a35eee62f5a1560c972
SHA2564a510fc7e2372d5ca065883151fc500ea70a9f6183620c0091716dda22983b3f
SHA512199158217cb55b857d92eac00b9fad43d35c8d2d819e61427e94e31aec5e90457947b2b8fff654b7b2113fe027a5313b84507a19e137f44da0ad7a5758db29c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566a03ab8b5ed4464b56e5c32a5849189
SHA1183472fecaf9ed1ae56bfd5808e6805efffec3ee
SHA256e7064c11d876768577ada8e0af6657e5c985afbd10b164f9adb1e8d1894b7cd6
SHA512df83f74302777e3d97fc1fd8dadcb20e36a65cb5729ef13d9669f0d73e9e29408d643b251c54c08404c9610d2ef40dc1303bd9d6bf15944f27216a4fa91faf63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505e4802d5c7250a5b20c879e9a8e6c66
SHA1c30e03b0de2da6ffd57a451334e8cb24f0098cf3
SHA256a42d5d9f8c2f1bedb0f95a016f500beb0ffa04885a8bd3e6645dbffcfc11a1aa
SHA512318eb4dd1db2dc00be9c949704805f8ee99f91b3fbdf2661b93858b083750fb96d3f408f9e0b662d5ca62b0aec6319f263f2c392366076468202e1ad2abe4dc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5465d472a109c7007070fb6a2f720448d
SHA1c4628fbd10ecb91453d1a8f98e0669bbc3ae79cb
SHA25616d1ebc550b10b4ca4620940df6142b528f2600a40d9116184d621611d91d913
SHA51241635e0296d942fc33e369a88184cd9bc547ebbee61728a17fca3ef41c657af9a030a5801ffc50d098a2abcd28d167c3bab72fe9c637ff4f235421908bb94b53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ee4ebe1ac1a68717b3cc6ab9d2bf8ac
SHA17e4d9f725becf326e672567e367d808539e9b3dd
SHA2564043f1ceff0381294f34ead63c7b2c6df76bb94bdd1a1eee579a0666d4f6a884
SHA512410491bc7bd3700364ebfcfe26afeb4ace0f056f92bcb35b9f411a182e278ba8b5f9456eb9032c1bfe1509b32484f34c906c5c1de444f53cb2fc93f14cdcf136
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5415d2ca48018507130fa4fe1a23cc1a9
SHA1ab04da199762e8aa94f62cac6256d9459b8b8237
SHA256ad8406bc3cbe636f883b2dd5b206acff2c96688a2fc8fd992f892def16c985dd
SHA512b1282986504350944c812bf88bf93fb75c6cf8f366a78e83f205dcb5fe9c58d6588e8bf24cd71a82f255aac8b600af9f6b5334ec3f1b14d975b57b37e767c5bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563559389387848e285044d8e67686247
SHA158ab0f2eb9ae5b779448dc07fdc961c81bdecbd9
SHA2565f70c921e5bc5583c8996b89991e19a91572a784c506a66d7595b0db3d626e4e
SHA5121f53d20466624ae99a7e24a56b2337fe98249c5cf675e07ba717c9f55862c2a4668387298cad22b1c2cb555d7ddf935d5f0051e858441f63b242631eda3ddb11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c09f07d4d423db2213ab2d4c1ae5270
SHA1b21a2068a006eca42c2bd6da316ddf4673cc84a7
SHA2569e728035794ce50ed7c00807c9f5d824d90a7c95aa592e2c1c117c3c15cb9f89
SHA512a4fe36ea49bd679852630581ae06289bf663f95035f981cf502b60d0355f7ac61b5798d4ddb22dde4efa9455448def6fce38e97664e541fa9702438da5484ab0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5776b32a96680a04b588568c7a5f40e2a
SHA1ed91f3625a1dcdb46191e245e28bb8d5fb63f677
SHA2561372687aa3c1a26c77ad9e866e91f4985e297bf9d44b58369f7bd2fd3e08dc05
SHA5128af44a2d6613caf155ac9ffa6b208fd62ae4a4bb2fb838a6bcc6303e1e1b4877ffe222caa576961de955ba0f989b73440fc93c539db55f9328d8325bac925c06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d226be7ff6f44064ed61298dbde787b2
SHA18fa59a997f102c3031be55b1956e29291edf5438
SHA256f61d9aa63004cc5095e032b1d61b3e72956930226cef368ff6c82b3f13935f20
SHA512a7827a35f17f3c4cb30a310d9a9316a770f7cd26ca888a7086d4cba57e1f4fb09561c833769b59840248fb07d3d80f14ae26cd09114efa696ebff04a5b9e9b44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50178f3886ea115caaf638f83e26e4032
SHA1cfdc01afeceb9c9d8a0225180649441c4a2c34f2
SHA256366c2e6c3c0755f3b094196c06146b76bee5624e3480498dd8636e9cb908f4ed
SHA512b091c1ae4f1330d254f092cad42d8696ee6201a6f51baf15c74c84ba5d87b545b41aa5043b2cd2f5bf367d21d4541014a195bae0dd502d3dc28e0864f1a83224
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517202451102594eee1b332db2e495141
SHA1e0c8ca37fe86dd1b4d00152c755b48e243ac2054
SHA256db5db203ac675293f4c0b00fd38f133f37d5c36394c69de79c9b3efc60f4c831
SHA512ff3bcd2d847fd89bd766efce62d8347af7a42db03faee562af4ff1d6c61c518ebbc177bb8940aab3074a5d1f7e4d4fc757d608ebeaef76c38c83484a8fb23213
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596cbd9f8d9a1efd0f32ce9fbee4cb9bb
SHA14e79fa9c4951ae2058ee05ba299d990a551300cd
SHA256f4216ab927e3774310cb04fa41ff5fc04643cc82c7ed4a97e9ae854c2319fd74
SHA5128f10d636b08d07ec2de5d0fdbde7d79554bd0a3365de038b9d3aa7a8304b9dfff50da940cebdcb3a2639df28fcf225274b42c34e5727177ee14c2ec3647fa5b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500e4c60c32431d33965a11769abc26b0
SHA11b8804bacf6ae6ad3bfaf4afe8c5f8a895774307
SHA256b3f78d4264844bc661d3832cfb7cac3c41df9e663c6e4d17af8b48b12d65976a
SHA512f7665c054044d574b05a8587ab44817d5080374aaf0b7e787bdf4765558035945df05d95764876a9324b1b0a8fa386892d7fe9117207cb2e5b7233d5c38dda5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588fb9ea05eca7648c33a7250fb486b5f
SHA187f3ec821f5b3ff4816badea0df2327bffeaab17
SHA256ee2c9dc0aefa024b07e57e5f7422bf5c39a468f20d7edc83e188477642c1b0a2
SHA51294d0c3b335da899d33071ff1aa3539eb91082158ae321e72903bea4a0e3492e588867e560703e52a0f38e0bb748da4bca3971c5f5313c4452f6aea97ec1ebb01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdc4a1ace4c8c5f338272e71bf752d21
SHA151bfb9532ffc2dd38da7cf56a6f5d24f7feb9876
SHA25668264867c42d83fc38852a68acfb1e47b3435db64dcb703d85ffd313022cfeb4
SHA5120f60e3ffa613252cb0c524e7152056bb52269918457b476045e1d6f7483354e595c3e141ef4d7bd3716908b073a7f26fa1fece0d82f4fa15990ac726d22590bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d5dd5547c4e0023574592bc716a9766
SHA17bd10fc51be2183fd0f7ccf9bb33476eacbf5c3a
SHA2566ddcf12ba7a046c2c11e283e6368bd1c28929827eda89b326f21c2a285107317
SHA5127114d69f5a588504976d958c5ce0c4169aa0de31ff379f53e7dab4538accc50f44e68e89ba40851dc00f837f13fc89f44c06fd8982c0dd8fd9011c64359f4d70
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b