Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 21:46
Static task
static1
Behavioral task
behavioral1
Sample
26e3190132770806edebee0a161d1807_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
26e3190132770806edebee0a161d1807_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
26e3190132770806edebee0a161d1807_JaffaCakes118.html
-
Size
68KB
-
MD5
26e3190132770806edebee0a161d1807
-
SHA1
764593ea49fe2546e16ed34230024b3f6e590660
-
SHA256
a10b7bd09065bf9604d7fe6bd35bb1c0fac8d078eb69d80b1f2eea2752236093
-
SHA512
809b2b3b825f3203e72623034e2a00241e24e6d8d3ccd12dcda1261b17d5e7c19ab9522b86dfba4bf4e49a93a7b6dbb669219319be28975e1a5c21da5e88dcb9
-
SSDEEP
768:JijgcMsSZ8tN99OIsUMMlVMyiJiZdiIxMxoT2aQCZkoTnMdtbBnfBgN8/oygcRWR:JVWKOLRzT5Pec0tbrga6crNnz8PJ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5E739CF1-0D84-11EF-B3A2-4205ACB4EED4} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000bd5d7058db06288b55500fcd165496f87896f21d3506cbc58239cdbbe4ffce3f000000000e8000000002000020000000953eedd53a22f584fc1a9881c32cd693d27534d28547b173d6f62ff79aaa95ca20000000f6e0dccc349d229159edca2526de41fed6af5d96c7a54bc166e723a183aeb89b400000008ce2f933dcd9011b785b8002dc7f4c86948f5c5258d40d05564a2ebf6ad4f8f2745f5c280a785ea0cf54d3104520bc32101531875989d8d24d5626babd3c307f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0600c3391a1da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421366631" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2392 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2392 iexplore.exe 2392 iexplore.exe 1632 IEXPLORE.EXE 1632 IEXPLORE.EXE 1632 IEXPLORE.EXE 1632 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2392 wrote to memory of 1632 2392 iexplore.exe 28 PID 2392 wrote to memory of 1632 2392 iexplore.exe 28 PID 2392 wrote to memory of 1632 2392 iexplore.exe 28 PID 2392 wrote to memory of 1632 2392 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\26e3190132770806edebee0a161d1807_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2392 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ed470762040f061cd838d614b9209ae
SHA15863aca1a7cfaf11ef0fa63e9edea36a8457b454
SHA256dfcc4cf7c1ea31dfff3eab25a6d1a71297ffccfac5b94fdd68b2948bd20a1f49
SHA512215f059780f6147b79d773491337031e93475e3146e33b81719fca461fbc184a479de6455f3e5093ff050828d24439a2820b499bc57b49d7d550636c1378b1e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d3444a1589a280ea79bb64e6f283acd
SHA1f0068b00d8181bf2caccf09295334071fdf81310
SHA2566274525d138d97ceec15553a0c076e6a6c78ffc68cebab65fe67a78741134378
SHA51256636a8b6f9587abd8db6041155cf9ec3b63dd207ffc76fb3c5e3b42e469bac30ac3394a5f39dd4d9824436cd48b04be0e34375fb7482ab37f0913d32906b264
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be8c6c32a51877512ec602b1556ed7c3
SHA1b32a8cf18b9e55331bca5a4d00225a0b38998c95
SHA256478595a03bbfc7f90f4167ccaa3c6ee0a89c7b2bca2f35efb42e7f99c37ff824
SHA5126c80ca5db1ea1d7f1ca7ea1dff4a9c56ea1315bfe78cc2f09da08bac237aad350930f24ab3fcb0d6361c841a79f7dbbfc32fdd2e8fb32d6644050c57ef8b5ef0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531f09d60b82692cb7a09633a7daea818
SHA1bbf1be36cdf8be4c2547b090e6b70f6acad905d3
SHA2564334b73f27032d3a2d3cb08b9f1f0ed859eae14df0777ce84703606ba39df45c
SHA5124dfaaef1a41e92b3e9fdb6dc0dedb73144b32b0c7cd861182442ffb64fa3421cd090430c900291e6f2d9379447ae5d26a1472573221fcdecaebe4a8416d1274e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d87e39c0dd1b59ba157a409e9d03f252
SHA17c301205dea85d365798514485606c8adb6393c7
SHA256cc94a14e98f412536347b6cb580c8e7c7b3e82bc5063bb5abf4dd42e91486a77
SHA51296540582abdf34dbff3e5490446978cbd9a18cb2f72aae69701034270a80794870ada545df387b0a039a4e4fd60b5fdfa4bc014c0887896aa19604e1ec9d1beb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f079ff85a7af6dd174f3fb68db1c6551
SHA152ab297bd428514db9fb8d6e33bd2290d935522b
SHA256a82332f72ffc2170c91d91a8d19ba60886b4e9dfc789a1ca5215ef1dc4f64aa8
SHA512c382d8bce3e5f83e8aa9401d799f299d41c84782887f512f7884da533717602090dfdff18750eb8c74995dcd6df568e50061a7f80675b25d44e9482940bd5518
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529d02b394a942e6d9379e751575512c5
SHA18b486121ac1a7747d55a7afcbd4b859008eea12e
SHA256d7e96d300f407121592089c99067988253598a161f08b6c159dd0e65c2744ccc
SHA5127977a7674e84f3c23265c8dae94a4ab157e8086d64c3592edd0e49e9b0993759a7ed63a7a3fa016cc581d6c1c04a096fb784ae3872838e165001a53517c227e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567ebc063ec18a1f2448f3e35f0176ee9
SHA15018bf7bd0239fc16cb5dda316d4b689d17901b4
SHA256a4a622cd1fad76a1e573e88f4281646390540c54042f2d814142e243f8434c40
SHA512f0da27337842cfb9bdeece46f01b8c34d9440cd29079661ea2db45a9ce98f497e283e193d57c454b32a782a2f232f78656005a15d64cbd165d942b8e48f684df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d0346bfc3f88776b6ea60d8ed2fb4f4
SHA17d12274743033ca7f83df73e8886552a048b9364
SHA25604195fa72cd2378200e31ff2a96d05b5198aa3c724a38fa1d0d4538be1c336aa
SHA512c4dda2e14931e0ff521e83518a705aa7a5582f785c06d3824ec11e74f21ac6d8156989778d22c423b73f760f1a6445d37f9191fd6b3a10733c57a5822e42d83a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5887166b99b32521e1e0130af26d305e6
SHA1516ce5722a1662aca6d641f3349ae9ebeffc7e55
SHA256e59961fcf10e1819ca162f6a7e8d62d4b6d17a8f1434e85dfe97f97a3c02cc1a
SHA512ba16eda87518e9ba40cf86e9df059f0fd22ff3837d21ed96ae26a1b9336270e42135a0764d8467b570f31423f3664f40d360f4583cd7bb2e8415d8d39f5a7795
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e23abdf0a46b01896b4063644962e28
SHA14d88587f7f132c53c00156608ab794d6b8c4ce76
SHA2567439bb3f45fe950f39bb231f431b7321014aca81ce96d57a000cdd63221a165f
SHA512431967d2cb3a436b7718c29dd2886f69c4c781d9d85824ea8ad15c9caf71626f80ce34b22d905670ae87768bc27a3d7cf18430b103730588be00f66506df3b46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5f001aca72e1f8f585a9b0fcaf4c015
SHA1cee65b28385e46aed406864a10a2b3f7d0a6a848
SHA256e5184aae22b4fdb2dc05e62fbdcb8bda1ee475e06ef05b637d7f02b08223b099
SHA512c20f9cb33e58d4d11ae7059864a2331d222675fcefc7225ee42f4b8bb7dda74d80e18179bdfd9a6fb069341241f46bfb4796757926bf6febdb0b2cb0e355c75f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b21af6803b4e1aa7ffc6eef385d8593a
SHA1a71670087c48e7e87ba5d77aaa8ec9dd4654d093
SHA25679e4bf94a212e0f9b775b8341ff178bd5127c1a9c415bdaf371763ec9f302a12
SHA512c18804f682485b74567f18cd7071d2bce99ebe111bffdeccd83a617d65fad1fcfe52b115bcabe500a989b9e6ce929f7df685dbb6edfa66f7d62fe320d92f3754
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3e5680e61aa12d383f0afc8cec4eeda
SHA1c098bb5838ae4deb2de751c8a2c62a1af928d36b
SHA256b8751d7a55903fbe9ef1c5743bf2127fb09dfa7289e650206df416ee78cd7b23
SHA512206debb10feb30fbeb1d6cec5b66671193519a35bd9b58c4fe9524c9ec8d050fa556cfb66f7f25f6e2866dfab388f078f09a1409ee68694cbb0e38638ab45e00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5784f676115ad6d33650c9a75376f7b8b
SHA1e40468ef190f70a3a7f97f9bd4eb4d4d4ac09967
SHA256d3aab4882322596f92feacc14af8b67e20fa55e5cd2c5c2e67c2819e0c6c94ee
SHA5127f300b84050d17cfc0065624691626ff4dbb9ccac28effc54200019e404c259dbfd4b1e37283933475258428db92f68dd82f485fd2162faf458940c89809a8e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c108a256acfc5e166d724d17d89e133
SHA1dc16bb0ff1befb714d6ecb0112d41a818b56cf6c
SHA2566383eeba9b526b727f0c6f2343eaf5df82177b606d6afc5785b1df390fe44995
SHA512f13037b577a960527c36394c031aadc4cd42111182effcb6851f7d2a66ee8b3674d3151cd437cb7b496ffb45c70b8451eebd470d8b7e24be0465d84bbee71dae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0bb8466023f17922dc2d1d481c8a945
SHA1527109efe629ed8d84fcf5db452ab70bde0fee80
SHA256643a87d72f2b1256e3ec18be3f34a000f13aa5ba7b81c3a61ebadbfefe20a89c
SHA5127f1076cffe0f6105493bcb76d3e8d8a9d9ad0f04ee91c768c0e1ba508d22c9870a5d623059ee67f8ffd0ecf39e90a4049c8799bf002689838a2f23e7f130f528
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2f29440d5cffd139f2e046645547965
SHA1cc0d552b18af00d1725242201ddc98cdec15219f
SHA2562332371e8e642f024eac22acfed3dbaa7c001396d19a5e97fe9d6dac8a8fbe63
SHA512c26854ef04b0c7cc6af23a318b8275e6d65f484e3b34b4bee831df0120d8206b031d906924ddb546fad3b19938cf6ac161292219771676ce9439e8a7cd2f2726
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5334f4f2d7d11e835325d7c85347671e8
SHA12cb24e9a7b5e36379f9841934010191422112c10
SHA256a6f761940c726f17eddfad52f1fb09ac577206c376095e6bb7080a7555e946fa
SHA512fe18d3b89042ab448891c21b1608213f84a9df00bcc0efb1dd88152090b79b688cc0902f9d0c45b4722c131a54c40e01433b581d1507ab182645420e9f5be3c5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a