Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07-07-2024 22:30
Static task
static1
Behavioral task
behavioral1
Sample
29fe8c51139336be33adcf8890b1ff83_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
29fe8c51139336be33adcf8890b1ff83_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
29fe8c51139336be33adcf8890b1ff83_JaffaCakes118.html
-
Size
53KB
-
MD5
29fe8c51139336be33adcf8890b1ff83
-
SHA1
924201ff724e226aaf11e42cb82d7f7a55ffd4df
-
SHA256
15efa2866747b5b6202896ed5bdb1edcf3ac1b6f84653001ecf8c26031a8602a
-
SHA512
5d2f73ed03028f29abdda3f08ee8edf3fdbfb3504c497f83ef32cab50e0691a76796569997da6698b6ed64ab7bd8feb98dd9fafb95b0b9dfe46a34a836e20795
-
SSDEEP
1536:CkgUiIakTqGivi+PyUcrunlYr63Nj+q5Vy0R0w2AzTICbbKoY/t9M/dNwIUTDmDN:CkgUiIakTqGivi+PyUcrunlYr63Nj+qh
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7B6889F1-3CB0-11EF-B19F-6A8D92A4B8D0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000b015178e1951f7d5b00e32ba21d7837df5d8a509c47263fcf696b5970ef716b6000000000e8000000002000020000000ef35a70ac49fc1da7bbdd1098ca6ba06bca5742dc161d19ba83a277471da44a720000000c25e795cc1ee4f44983367a3545ac97b7db3ae40a2b61ce3f6f43822b0e77811400000002456439bd33bd825bb517ec50f188b3116c94ae984b48d6cbad584910533f2df19ef558a4f8904799cc021daac6996decec3dd37867f6622c498a8ac450cd6cb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426553283" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3004e850bdd0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2696 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2696 iexplore.exe 2696 iexplore.exe 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2784 2696 iexplore.exe 30 PID 2696 wrote to memory of 2784 2696 iexplore.exe 30 PID 2696 wrote to memory of 2784 2696 iexplore.exe 30 PID 2696 wrote to memory of 2784 2696 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\29fe8c51139336be33adcf8890b1ff83_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2696 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fee055215fc4bfcc575ac63784a01d0
SHA17f143f9a719742b2cc10d35d8eaae004d3732f5e
SHA256e8c7cc11f92c9e40c9b26c10e6835bd2069c41eb94d9bfdb831369a0ef7a4437
SHA512fe42048671f1cdcdc24e40c6aef7b85e160de099ea153f7480038624b8c4b05f6d78b3c19bb977ca7818240b25f6cf24047645f84cc9e862aefb523bd4b62d7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56386aa25b33f94ccac7abe067d2765db
SHA15c67f0cbdf0f8d47e0852418bf3c3b03ca8fad6f
SHA2564aa56fee89286e1b713cbceeb25839d0bfdced0e8ca88820de0548042353b058
SHA5124ae4b463e9643eb03ca5bf6ae99619f21cc2c5dffbc74db629778a69934d4418c4675e12936b9473269da63f41d76828dc3aaa817f99d9fa287beceb7dd2ec29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56484d00115988f714becce4d20c4e9bc
SHA17513c914085c4c732a2ab9550622300b831f87c2
SHA256d36448512ff36561f960e827aa29e10278826cc3e69b71ef04ab7bb08b2d50a8
SHA512609c3ee07ddb653e3860c21ac623252df17cdabba3dfe1dfd6a2f780709835df80fa977545f10e619ea00b4ed0ce6dec1a29a4590fab7efa6dc6e2366daa5512
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b43ce32309bbf43ee47f9d0b4b72c5ef
SHA18188dbf20d352f8f309536f676e8f59bd877d7a7
SHA2564f27ea56ef6fb29fcd5d4c60850b6f3aafac412d2abcbf09cd0fad1e4546f17d
SHA5129ba95a568a54f09e961372f33d41670ffde1430a26074926631e6e9967473b7b65f86974f3ba15cee7b66ac4725f2ee37db76dcd850d7fbf6af98ea490c724e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc56453ed4de5d3a9e31a49e9b62ce7d
SHA1534f7d1e422b283ca3bb7b63f45fa5946dfaa13a
SHA25691fe3747440efa97fda833136144d88776b8344c441540303d9c0c232c39bffd
SHA51256d4a53c6d8ed73d156246d38bdf40e40462426a05321bd9789f95d3d81e3a4db1037d41092ad2c442f8bce8f35f52828f30eda337a04c5a2360eba6c20c0ada
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f15490e67401da39d3d43e54ef3bdb8
SHA1e52b18afe0f87a772b562c54aa3516c958413ef9
SHA2563d927b0003a47d7e2e2ae8a09214e06eea8aff1beb4a348efc7914f1eaa55e1f
SHA5124d1b6c7e712e011ced65017e9e87f3906c985736a72bbf2106fab0532000c98f1b0010e7c54dbe4c84852b2f0e5a307351286a70bd9cd26e34e3b1422e39f067
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5647828d7f79a6a0590118b03b047fd46
SHA1826e85c2da4d42f22e696ca52854371bd8505403
SHA2562c4ede9b121d9f62621c25c990577ba8e15d0c3be6a90f2d1909685bb9eeff4a
SHA5124d0967e1042d664fc1ec22ec2d8f47512c0b0ef459098d3a45a0f5f50ccca7beef49a37e090843e28ae021192757206a5a0cc117d2faa5bcfcd2418793558533
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4e226f7e34936f1fe320568419a5cc0
SHA14b6be3d247518e5a57685e1d25428827a8da1a0f
SHA256dd81969e89ed608b0a9c4eb4b26038a1b92cc3243f29f0c63155fbea884c327e
SHA51288dfb161006078c91e85c01ce443075d577b9cdcb217c57e64fbb5e83b7de83611950cbdb066128a14f6781d48a76823b9eadddbaa2f3e2bf6cb862422e05f2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3a85e49b19e76c4f7ac38549713861b
SHA116e34d962454725a6ed29a6885053eefdaf09703
SHA25605bf78c8357d46199225eca6d653909c6ed1dd827b7f5e07b840f73cced53218
SHA512b5bfda3937d52f2586787c910542cb1ad4832e9beeb420933cdde9be5f104136aa0052f60e4e10dc2abbdb6fb56644ef83b548438709a41e7de5a9fb4a283fd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580a4ae81d46f35370d4237e7c8e72876
SHA15bbd3845c4e07b1626fbe481b9e930f876a114f2
SHA2563876e9cccc8c3c736801e50e13dc29edc926ab6e980a8a2336b93aabb74e66b9
SHA51270a45b36be7dabee03881574bd4e32018ea708501c7675326f3f6f6c3423aa281b837737219948f8c0cc09eade37251fd4897bf2cf26bdc264d3e308e4b09bed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50273757dfcdc47e1e4be2f2a425f3ceb
SHA119c503f5bfbf75b23b8d1149de6c43392dcfb6d4
SHA256dff81bc525879ee58ddcbce338c6b4328a69f576e0e445905aa2921d2b3a2266
SHA5129dc7037655f871cc50feaaa3fbc7829a75b7f11f267e5308cc0b918e0a0175a2f78884500bd88170bff36229dd8526872b293df4cef3f667f0a604ec860de88c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59be988d55d525451545411bad4f7fd72
SHA1c0772964c7764f6e1c09e1885154b949c1e7c79f
SHA256210dbffd53b1a1fc68f6ae889a84f1920817c56a3a95006853a94eebf6ac414b
SHA51208bdd23dbc6603174c228696f8a23c42a85c2950e9eaf3335267808443bb948e75f4909295e17fb09a794655f5fedb7d10721cb4446b5d9bf3cfbf1ea846d13f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b62d0fea0092e5ee232e1089e6b70e7
SHA11febfe6071147f1683e27e573cd17f3813ba89df
SHA25606f81c8c26038aaee58ed34c980e009a625338354d0d27eb0daaedbecf5b5373
SHA512e35cf21b06ffd5ee847bd8252a81992cb2a2f8bf19edc5c22dffdf2a8322bfa01f1d94f440ab07e72db483d0935e3fea9b8c6442df858494f45df841e85df16a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565f89239a17543804401b67d82d14fe5
SHA1fca476eb6067d8f00a750246f66a3c65a8991b78
SHA256671c5eecf9038709086c4790fb806e9382f655f0b33cd4da8403043d1b1dcbc9
SHA51267ffad8e2136b694971a21dd78d70c2aa29713817c8803533ea8c90f7a566067af30c4ba52eaa46fd3053a5bf2003109a174707e3024fa0c4b575363ac693861
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e87d17c805969978ac70240fe24733db
SHA10ae802ca04f3312c7b426eb19f8bfc05509582a9
SHA256ee6c9070070709609685c0953d3a93ee18a1d90c3811115166284032e37b1b01
SHA512a6e64c788ba7da9a99b02df114ed72d9e41172e17f265f86bbde4804c19be9d5f40260500a794c7fe7cf36fad52530a305123922993d305ae5a21bdc94fb65ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2f22a806af42a02f3d4d98c1b04df37
SHA1977667dd222071b3da06280daf17d7f3f8820d9e
SHA25641ef9137e94cd4bb4af78a0b32a46e50a9594cee6106322513caa8ef04992fdf
SHA5122e560d5b839576a8d2a6bfd8bea543bb48997b01e3bd6799a6e5fbdc0a70a0da0c581f779eac147f04e916f65adc580ae32f414e9e08c125227a637adb4b76f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cb061ad6aef0af3f032669be453224c
SHA144502a32b602fd09740187185b691110384a55d7
SHA256884812206e7b0a904f5f5a67eb0e24a49d8418da11bfc2aff2471274b47572a3
SHA512e1164a59ff318e50f3a3b7c11bfdba80a753b5ee4eb6df70ed7ffc6e65cde90b32a438225a32ca6aa82ea9c7529fb70625c4eb3d9b5fd64fba2f8f1126c8689c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57595ee5afd6fe3c16e8e0e20a3b58af3
SHA151377eeea354228cdfa9bd47d717466e176d73c4
SHA256a7b4c2a94b91fcc4a54032794fce1bff3af68f54162240d9475d1fb978c0a66f
SHA5125bbc71541b1570ca26ddbf23fcf6b936acbc94c0b634f9ce62b0bab23e082c319101520edf670a0590272e57ee7fcf502407c357ebe2b1d044645de570373423
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52041d65a22c22c955d81f0aa3dd25915
SHA1c7d7707ab0169af799d779768110471e82dd84ec
SHA256748092f9554dc12d5ec8da0e7c16af99581a6d820e09b1c236400def334027fb
SHA512969394bc6651624fecc0bea812ec52502d45375b358e004f822c087974167b413bfca2576e8c5bbdb0538dc47f6439ad0ae43eeb322f93e501d3a6b7083124f4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WNZH54VQ\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b