Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 22:04
Static task
static1
Behavioral task
behavioral1
Sample
26f30620b8ad75677e2611c7706f73c6_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
26f30620b8ad75677e2611c7706f73c6_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
26f30620b8ad75677e2611c7706f73c6_JaffaCakes118.html
-
Size
36KB
-
MD5
26f30620b8ad75677e2611c7706f73c6
-
SHA1
59fc6e2f29072446d3479de3ae1918fcb82d20b6
-
SHA256
852bc017bf948c998b35e0e4a152d8ca0597811c9aea0af71e1df01a4f726efb
-
SHA512
a4faae1d2ccdf1a0ea3a1fd702051384aafc32e7aa32985c94980311472e57e9ff4d4cebf916adddb4cb2bdb1f667e8c7853a7ddd429929abfd1a154801c6810
-
SSDEEP
384:RYG2iSPEjSFlWs+MqjIHu2BprbaZ4apqdSI14LFKun3DFgx:TRCqjIhpvaZ4gLxDFgx
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EC4E2DE1-0D86-11EF-9449-6200E4292AD7} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421367728" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000668f11d9d682a43190e3492a262ace740318700e66080b6f6691816e7000a907000000000e80000000020000200000002e661f84ada622c300d790aa3365dd6bc3cc95ada3cfbc2e14a7ac8f3223563520000000d4bfac7b06d9568d0de6a3780bd83b16bda66119ab6f283f9688142b167772a740000000c52bca21e53ec2b967d5699de9aecaa9415960ab669bd6648c2b2c1652907e1c5b3f236dbbc6f4b90b39aad41a4d39ec4ee7a6006761f4ce7cd6be7a510794e0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 903e27c193a1da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2348 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2348 iexplore.exe 2348 iexplore.exe 1744 IEXPLORE.EXE 1744 IEXPLORE.EXE 1744 IEXPLORE.EXE 1744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2348 wrote to memory of 1744 2348 iexplore.exe 28 PID 2348 wrote to memory of 1744 2348 iexplore.exe 28 PID 2348 wrote to memory of 1744 2348 iexplore.exe 28 PID 2348 wrote to memory of 1744 2348 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\26f30620b8ad75677e2611c7706f73c6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2348 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b65e5bb4d521fc37791e27d6823235e
SHA11ae15b7dd9892eed53568eef21edf45f5a9f918f
SHA256fc20d664a41e6580b3982e1a7303efc659e38318105db2ea0cdf6c7435c798d1
SHA512b5ca8a8de717b953173309fddd1c7a13da85c5b0b4648d36b845397428347b51b7dc58d2f5fed3beb0bd6dbec2641c465540ef56c0c9175644661cda4358f4fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5faab2ae16529cbbc9622d35e2775e357
SHA1a368e8217c3d0f704b9520b85685718474d2de40
SHA256db1d8c0e035b414399519b1604a4b6770ec63daad21c1c037b45cc34f8c4ff43
SHA5128f06a01b88b4a1b3bde06098af9683f34de050dc91613d00af41de5c66ee7f08ba1a2cdc65a4f4592aaba7e92a64437fe99728845e86e47008922573654f5b7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573aee6c2c4f38017b1c0aefa8df4ab3e
SHA1e417703bd68c47b57cba76f4d32e079fefb2d95d
SHA256ffb0eb29bb634da94a3bcf134d7fc23ad7af44c3979ae124c17916da313646c8
SHA512d972c66708336005d8709ab7a9d7d278d5857e0345a9f75dcdcaff251c118b8c70ac29fd4a534eee7fbc65bf32eb6b8b91c03487980f1f73aa8112ba6e0799b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2c19c8bd26e9e7f89504d61586c78f7
SHA1606c689f8d139bdb2989f4e2fecbf08dce6df44d
SHA256684864327e41fb3d14c8273ccf7dc01dafe979c0a458a795fcab4dc09cf814c0
SHA512970becb65eada4749e3d899df40298c45544dafd2990a30cd66230c034d60fee4195c555171f6791d575d1dec2b8534c40a04cb3225daa5b069dd17c227a56bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578a3d4d5064ee201e1b5c33c6c5186a2
SHA126729286d4983a194c0dc5105f0df3de37591284
SHA256df406704c8d5d64287995fc10ed03851205e51af917ed99292e380101a17363d
SHA5124bdb82c1d023dd64a87f6139da1ab96bbd3a3c1754cb689edd075d2839edebab225d714e1ddebf9fead6a6f1cea807b7c138e8be03458b4a2479e324953f755b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b954a8c7116c32295c8b57032f01be37
SHA1d0c76ffc00033598693a0e9f19f66ab9e01f7a98
SHA256828500b2dc4f70c4758cb6348144ba79dcfbeaa0d5e9c0c541093edff752d43d
SHA5129e39bf55133dd1c5fdbf6a93fb4834d9b7339412b2574f9d87f6dbb2b1a546c1373e73f3f82137f3294daae4af3f2ec09a5ab3dd18adfb6b2c5cc50d777819e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507ec158ac09bc9947ab54c45760e0fbc
SHA17f28cf07ed9b6883b3d1a695ccdf4487879966d7
SHA256b9f7a69a5a39e894c9c7840b85bff10627bc5ec032c170d29374afbf0ba697ba
SHA51264fe3e351f1070189635382a7f70b0ce87d2881810a94800b5d9baae6ddf16b4f1930a8b19d6da6014321e76eb568304f6f77d1362c7d6925a9987f612bdd001
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5668bccfc16e4097c0a15ee53a56af9ff
SHA1de2f9b83c6ed38dd847bef224a0c81133bcd3da2
SHA256a4ed84f7cc190f64a2e7d24695d3000db6c383ef9995435c07cd6da4d92b4e7e
SHA512f2f525630141b35bfd55c9032ab638ffa76d670e29185ed54e11b475ea3d690988bff7344e851954d132a01ff966ae65ffc1d2329c900c2663332a75e377c9b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5493b81d6a6c1c26db61df156c18d1478
SHA1312f5e5f4a680f12fc04433470882e098e5fe771
SHA2560f9cd99139d3f9cbe07c9c2b0cce7c4dd9c23b64d7d10d41e64ccc45f2dc2dae
SHA5126a334bf336ce1169914a2727e3a182a1288c3bd9c84f64893c8151065ae5533a965ffe64028be90bd0702a503061193ecc904ac4a06dc9debdec7c4f84f932dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf8d680224cee610b618bebdb2d086f0
SHA15161a092f709424b093d987306d679654c111616
SHA256b91905ba05d03975ba5cb192071d790bdaadf935c09abde91c1d54ab42a6888e
SHA5129dfa55c0ff95ba665364351414a9903d9bce50ac55f006c17900dd0bca676e78f88957336b77e59e11ab1c433a4feeba0b6e07de8f23f13c4b037a659eceeda8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501d0073a5515029f4aa8fb82d9390ae0
SHA1556c859cd830f8db1be5b2d3e964b5c685601f35
SHA256dbeed5df430260425d23d0c41627900de6c7141c01a2cd9ed76b2e03279a583e
SHA512f02d519ca85689b7c1eb086e25a110f6814d954a331ba7c063b5641f6aa4d7bfe404c1fc93740765d2c4c0e9fdcdf33b473e599f76a60cf48f3430630c6e5124
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534e2cea83806c2dffe67b3f41ccabf93
SHA1a81537f452d1cce65172b4fdeece184eeacc43da
SHA256e07e6b8130af06a62f1b6cd3a8a02bfe305428bce2c86ec085a108d300f4197d
SHA51213e8de64373379a8b6ebb31420e8cd68c61adc5f349a299a525a40c11b093ae78aa9deb990f83659cd25d9ee72fdff6ffe6980dd26ece2cfd78a47cc07214363
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5177cf7ba5e64d5b3287a5307e5a99c90
SHA1c8eeea909b16eb8a00e7d258a2dbc60933a1e87f
SHA25673e3eff0ad5e43d6553df4348cbedb3c07622153dffef6c0d4787ac9c8a1e29a
SHA51227dd53d1dc49b69a1a6664c4c331df2df6e9530b7ff78a030f4f9c2954fe5731356326e3b5da018b0afd3f94e62fe0c032cffa54cade27fb155717e20bdb07b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5503299f700fa4476304310fa04339a8f
SHA18b2f1db0763be5853988ea46b05ee83239ba8f4c
SHA256b008868f0102e64d7fe662faa90d1394362336bff622656c735b15ca68a7e165
SHA512f45aa1009f28f5965fcad841526249c3ffc44bbdf2537e72e028c4915b817075e3ac48c07fd5c126119aa51f955d25639cf87f1a4d55f428892fdd68e74eb5b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564b318c7122454ab1ea91eec5ed22ef9
SHA1d6140ac0227cb4e8bdc89143dac60a55d9b53f64
SHA2563d7a5e99d7bbfbfcadfab374ffec76e2a9ba862308ad29f703c523a6d171dee3
SHA5122bc7395865fca7b1986e294eac2f352355cd210071afdf5b583daa7843aecbe3b21ab9383649c88648788ce670f4bee07fb122887d90e79c9ad9d708671b72d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52355cc4462ec7bac6e63bcebb5b73468
SHA14665b7123261439b5d8d7de1dac8880feaecba8e
SHA2565d26a7fea99efb3a2aacb4bdc32efc8ab179d0e8f067074d738047cef5fb29c0
SHA5122a49b77d1f607e054e876eefac559cee0207732bdfe2ce7ef8fa78db81501d15354c334cfd8b5f1a2adfcab6dfe089c9ddc43cd78c9000c234500bf33503f118
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f9586eb7ffbf90fbd68b663275b7456
SHA1e2812cbf3242e38a26c82daee6d47993c64d2f01
SHA256fe20739521c161b16246ad093dbd50c48fd90be00691528b97a2bd4c202d3068
SHA51258e0ea215dc220d1cc8ea37184b6fb19868c9ddcc5de6228f2b9123e3708a221ae0c81815121fb80648ea82db8cb0ae81ede5df7d071731a065b86a1b1404a36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb2c388f19544320cc2f65cd530adc5a
SHA12aaf95fecde33e17e49b4ff8b06fbfa3700249de
SHA2569d6d144d5ec234d7db83378e8c45d78242d63dbecb3011516b7da400b4e1e77b
SHA512db0f8ec040d5ab349f1063733d1fae78c97a96b74536cbe726da3266d8c62ae4f4cddc54b782bca35ca47ecc4654efa4b0cfedf92efd137b8a13aadde115d6c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5498379b86c4d253f5dea566bb7e981e3
SHA118e686ed2505c056606a5cab9bef223914dd327d
SHA2566d3af6ee39e668e1b4cdc182dd6d3cec9a997703debc76df6af33943a782c6e7
SHA512a70bd9bb402373678609c8d91ab3abc55a374317d01fb97fd7caa71866aceccddea76a5d9332b7c76cd0abef32ba7a11618be79d5b2cd12ab2c55568209bc26b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f264e9c99ad7e202d1ff7d687cb0158e
SHA1f7053370d13e1482591830508498f60a167fe8d8
SHA256ee1031203ef2ef8dcbe3682f7decd1a1dc617e1516ce83d0160e1920ee3473c2
SHA5127430b995887d0dcd1eec4d86163f79b9eb9e7f337ccba4bd27928d34b61945fba082f4de098f7474b53bbaf2a9b5f735b5ec12dcce793e7e127424a20c0ac7a0
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a