Analysis
-
max time kernel
121s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/07/2024, 09:23
Static task
static1
Behavioral task
behavioral1
Sample
29e28804c8445419eb3c16eb20bc08b9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
29e28804c8445419eb3c16eb20bc08b9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
29e28804c8445419eb3c16eb20bc08b9_JaffaCakes118.html
-
Size
91KB
-
MD5
29e28804c8445419eb3c16eb20bc08b9
-
SHA1
094e53ddaf480d420b140368d52fd8e368b34bca
-
SHA256
137693d973184d6fc8ada551f6f9c38fa53232681bf50e9b97e6f35bd00ffe55
-
SHA512
4761cf652d7e97d97c27fea60296958a8fb55d61aabd1813d375b1c3315f90443af01ac229bd15ec8bc58d9c623c4ab1fc3213863f6112a0af312a6598686fb1
-
SSDEEP
1536:cVcbHGxC61rHSeiMOC37RmVR85Gd18ImVHovdDq/fUBv2lUs:wczz/gHcDq08lUs
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B9D03E71-3C99-11EF-91A4-56D57A935C49} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20bb148fa6d0da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426543509" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000df86bbff016e344cbe74bf3afe450cf100000000020000000000106600000001000020000000175c1f19253911f69674867ac1c694f29dc5696676283570f9bc4276ea66a3b8000000000e8000000002000020000000ef4270d7b3038c223876efa35d87dcfbc99745eda74f75fc2318e7f3c0c1df9f20000000213f47dad22283c95a8f609f901e32877e15e04353c27df06f2864c4adbd9647400000001135f86c6a0a0647d98dc3274a78dd002167e981d48ae40315ab214a090a4eb8b2c6e65cca57b8b83f03b1e5163e1724ebabfd2af9e91194e8bd3eea32b47811 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2944 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2944 iexplore.exe 2944 iexplore.exe 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2944 wrote to memory of 2820 2944 iexplore.exe 28 PID 2944 wrote to memory of 2820 2944 iexplore.exe 28 PID 2944 wrote to memory of 2820 2944 iexplore.exe 28 PID 2944 wrote to memory of 2820 2944 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\29e28804c8445419eb3c16eb20bc08b9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2944 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d84522b131a8edb7b650aa84ae180bdc
SHA1c742fa2f7d8fd5f3d5bf38f43b60c07794c57f04
SHA256759fc3bc7616129308b264a47b8ee417f6afdb78149462775ae9821af96b6b77
SHA512ededfdf26f35baad3d6085b9fb8e890ead335482dfd844370132da9e8a7f83dc1bc7da9381d8aae25215ea70c6b151b364397b702243a72c4bbb8f53e584843f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4e57d1d3c62fbf909254cd95a195025
SHA1148ae03924db0f4bca01e69c68908bdcb7dced23
SHA2567e548d0dcd23629d6da608e5d80c75c7f963404b6f5612b85d937fe0e901e240
SHA512b0c930c0d1335eb5270b65e66c1ba5d217e62a03abde321b8bb9ddbd96fd27ea7ca20f5ec4f0c5015d2c768e9b6cd32156cfe360662e9787839e876b91690548
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580ff28a495d368d76fc8f3b6133ee038
SHA1c3aa28ffcfb55f5956bf6d50474e9269353a430a
SHA2567644d0d0bde8b505a9f45e261cfd768a622ab854b8f1366833f84d99f85822b8
SHA5122bdd395f4a30b163d918be7bd937a4dc61aef5184b4946921ee31001d98586464fd05469dce0ee186655b23e47676296e965bffc4362e491faf89c2af2d4e650
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5421c462bb8fd0bda4c4b8719b5605737
SHA1b5921390f003ea8166d033316ebbb4e6ed4a22da
SHA256c863d3c0ae60483d20b483eda859dd97c29748708901dc2c98c109ed5e162874
SHA512026cde3044b433381043e376c069471fa7b6067a758b57cd83867988c0ec333fedde1d8310111e9bd9c9d3149a6c410e00d7a2528778f1dd8467d81ee456854a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596ea6ed80177e270f28c7799476d9c32
SHA12dfb9825303f628d613358629cce293c6f94b223
SHA256edc6180eb5cd06ce5e4f3c38543b09a260c3d4ad0e0b1f583e5f59b2c4247799
SHA512ad4c46de3a9168625d08caafd6a17604ac47b8e84b86e60cadb75f75a3047907fc16c63014b741856e042def71b05a50482fb19389dac9f431d24916edbe2bfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5291db17a17c52a9111fbd8dad14e1929
SHA14ecac9d69edb3771c0d405c9dd373c86652ebbc7
SHA2562acf01735bf2e4ee2a93cf123ef1b61e327ce310e116cdc9fe6cba2dc5fff68f
SHA51236db2d9c1732f52e0b7df197c6eb5f9c649a14612badc992c527263555fa2e7d091693a26e3de78778c871d3fc43827423dce8c3c35e1c9f3eb6e375468fe255
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548704dee26df40ca88537f5f2b7eb776
SHA11e5f818c80a7f5378e1faf830002227d5e1c727c
SHA2563d87dd9eab4389dbc769bfdc842d45335f345c12f3528e25cfce7361a2e13f65
SHA51240cb96a2e8dc8e459c5fd0749a95df0a3160886c20783576004b254b56837779b41c62b3a7e671498b8b40a597ebc3512745c399dbb02b6fc1ff8d9a2d89775f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1737d60052db60b00f8430bddae487e
SHA1bc311c544a7902530b21979b2c68693fde1dd03d
SHA256d325bf8c75d30f66a8344b2e5f4ff0f92bbf5076b3a2513f7efa5839dc3b8552
SHA512385ff9ef9b92a5ef87a99e23c5be6d42f39a39a74b6ef56e9345b414b5582300b1f82652bcf3214dec3cce08f8b6af9271f168207373006791235b0581c144ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5456e13b2b178e4fcd276435f382830c4
SHA1d9975477e861ffc9017a3fbb0d6bd1ea464e5dab
SHA2568edd9e646a2265996e5d17cc7a1ba79c96000d94705041bf7a5a282672b61bf9
SHA512385003150869f90907013ac765e4a1955365129d996bc4266101fab6178cae5eb57636bcef3cb3cac8a0578c18c35f206daf4859b72529555e0bf0c41c905a8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523a5a876e90a07ce18ac29b4be460274
SHA140daafd01f4a2a2ea59ae9424d072e66091b78eb
SHA256b0c8f73859439abf8dcfacf7741094baefa2d0e92e168177822668dbbb49991d
SHA5121f71addd2a43e5227e57c14b3482c6a873e8198d8f9af3f2bfa1ca9d2d4872e18e65740ca3f175a58b55b530dd5211a0b0c842ee085379bf827d95238d399c9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542412e4fe7d55f9ca518473019f883a2
SHA104401ac35544aa1731de5026e275e5b7788c8170
SHA2569351a66b93f751e171d801ea96b5e64cbdd6cc5b5bacd9fdf920aa13754ccf13
SHA5129256be8951f09d2f3f005e072c0ff1bba47331edf6758bc8cdb970043636fbf7aa7e5613b2d22b836a5b4218e93aeedfc9cfb68715855a32a93e3a6b7ff7a39b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cdb8fd7f146bd9670a13b2d7494fa3f
SHA1f830fb71dee93d40b71af15e38cff87604917a0d
SHA2561ab3c2c93561b9b0bc00916c467de621f2845b704d7426293dfa1a4dbd01d252
SHA512c78c57950c6503e2b2aebcfb65be086f747adda46dda784c79d8e59e27388d1eee5cce7683b0ff047d69bca85db21f2d94a5ed4f554d4db7264dcc2c9df102d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae9f31c3684e14fc63bd455fa664409f
SHA1a43773a9ec21470b1a725668d0b479fb4f2212f7
SHA25643eb184a7a85901fd6137faa3e947dddf17ca04a879a094bc741598ce2b1394a
SHA5124d74a736efbb13f18f16aaa7e92ec9ef973beb3985aada48a693ecb425cce19d89a158f1ffa56dfcadb67655ebb6ddec2ac9e051e0fc642d8eb584b8c9e72f2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5184636fcf5e0ae2ea3c85dba9da92e87
SHA1af31402cd81781f18bd285f46096d0f24dccaf76
SHA25689343618adc7eed86a2e9afd0408e56ca633c0eea34ccafc30c91a41b6755bb1
SHA512c523535f2570563500d8e4ee37128d944bc38803d012c65a0ec4730bf593d765781e158f65a242a0074e5f2ce9f94b0e3b2c319dfa9de8f8ae6e9d0a2b13ee84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58da868b996bc71ca17fd7068914b7d19
SHA1231a4078db72b392e9f8826eccdda7cc14514fa5
SHA256c9d7e6acab40a3e85501c5c07590dfba2a45a8b78fcefed2c638f81a14921235
SHA51203c62a52e78dc0227e4bf20e3f093d0ae01a72e48bc4f17c958d2b8a9277083186f88bb4ff790b0e7965c2d83085ddb2711556e00dcc3204ffa0a9c324040414
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e970d7677accc6f38d48a2083a8a127
SHA18aa909d1889de44e82a85ab9333fa351d96242be
SHA256298c4757e38421b01b68f159462358271268401e58699515a56914b1c03e567f
SHA512e1d7f4573c01be48ec13d3806a39f9127cf05ede102893e9dc53a0fee7e0d03f3fe5f26af378995f68edff54dddf3d310155652b5d79bf38cde4c94db0e7786f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ae2d39094758c55392056ad282400c3
SHA18ec4f035445cabac38d4443f0450d3b2256e2462
SHA256f03dab411f0987690305d1f33f675faab967cfa2309e014829b85f1120d547d1
SHA5121e200502365f654de128ab307a19ea7347f97da96ee020e9ae1ea65787250c66b3c46515defeb2c39811cc206c5bcfcfa34a9383b884fbb9e40bd4d794b528b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54de694356c3bdfb0dea49281467e540d
SHA1cdcee72f69de77fbd490484fd3648e804d979b4e
SHA256f1e49f1ea18bf85f10cee094c15a4262e729f4bf970ad50c3e0b6358601b6f42
SHA51293b1aef9945e449784a93d1d78abed433dbdc9e3137b4ee20f63736c10363163e076806b484d46dff75a398da219f8416f6b3803c2fc64f5922544af0b743678
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59029541ae945bc4d4bd27ee7c379d377
SHA11a7247d567821aafbd3ce16c18067fcfbf9f2173
SHA25677958c6dcfb306c661c9d50f1dad1ca88a00bce30091624c8610ea0e05bc6e38
SHA51256715b5533a60cb8b9ea1abcf4f4882873e69ddd4717e8390809e6527d004c8cfcc52c906261921a94a1ad2183368640cd23d6478a8be6c616065007c8fcb98f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b