Analysis
-
max time kernel
118s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 18:37
Static task
static1
Behavioral task
behavioral1
Sample
262e07d80cfafdc785df23820e05876d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
262e07d80cfafdc785df23820e05876d_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
262e07d80cfafdc785df23820e05876d_JaffaCakes118.html
-
Size
220KB
-
MD5
262e07d80cfafdc785df23820e05876d
-
SHA1
85291f823b2ab347afa0dda5502e32cce9e20ca7
-
SHA256
7a4685042ef2d27784c508fa8b31b05f7b91e1cccb6a34030e7b3e7ea65510c3
-
SHA512
36d24c6b254d4c8d66369b1e8516e7c5515012bc451e61354cdfb1b5e1b30ce105acb49f84504bfc77aeda15d6a36e4a575a233ac6044cd1717052530729e982
-
SSDEEP
3072:jFeME6d2Y0/aA/vrku8EpELWADp6VvBhnwj:jFxJe/a+DkfECWADp+vDu
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000004435368ea7e3982e87ccb4de58f12cc2bb02c49387a1fde924a0dc247331cdcc000000000e8000000002000020000000626118192e36e08612182ee793c3ee39bf69197927e4c730bc16c4333caca12e2000000056345a2ad832e29a4fcfe2448c50476bcb081c02bedbe4be533074086130063540000000d672cf661d17f670dbb8d2c460ef79121871143f88a272a74647a1d14f21a9151954f720ce0b32753eb006b4e849600d76fcfecff500adba26f9b831e01b56ee iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421355326" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0A30DE61-0D6A-11EF-AFF6-E61A8C993A67} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50653adf76a1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1312 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1312 iexplore.exe 1312 iexplore.exe 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1312 wrote to memory of 2828 1312 iexplore.exe 28 PID 1312 wrote to memory of 2828 1312 iexplore.exe 28 PID 1312 wrote to memory of 2828 1312 iexplore.exe 28 PID 1312 wrote to memory of 2828 1312 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\262e07d80cfafdc785df23820e05876d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1312 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e340ee2fa0b6424ffc1513fb6bac4267
SHA1fc8c4970196acffc322e84f75faa4362d5214a71
SHA256f89c32800db6f045dbbd31de9c70e36a280c5141efd3b6b471525b5415decc36
SHA5120e0027799d6a92b64c99af2a4e70551a75ace0de1e43ced18e42d1a2174a02bf069765e517a31650893bf2cc9e82aa07da5e29cf132c22391315dac74f37dffa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a614be1a374336b20541ecd2d5c9025
SHA113ee8edc0a0b6865ef903dc69f75afb8e0926102
SHA256987fe28da3fd430eb3d907e6af60c090a800e5ca80f4979f6e96f04576462f50
SHA51243687eb62c134f5a6f948960885782dbe6983cf02a54d6f32456cace625434a7f4628928347cb2a6116d8104d4bbe25601ccd29cd763ec0360b2e2fa68906101
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5975772c01c5976a19c0361ccfa42cdf4
SHA17b20068c52638090475f495e48a5ef454411be0b
SHA2564f3df4c4aaa73c6c95be63a3e7d8fa5ec4ad031a93ee8d5d11ed54ea5ed77642
SHA512115c15b40ab1de330a512c9eb743805cab22165c5d68a43cabf97300181470e99fed4895ca2ce27d4dd6a1207afc8808e96a67ac09e935e3c1a3d19bc03bd6bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba6786d29fb2ee9de8b367988b7d4041
SHA14d9ef9d38bd8898835bc7f5fe8bb59a5a81223fc
SHA2560e9f8f7cdba55e74ffd2d597d603acc2a15fc5114867a8f7cc502b55a7e77c0e
SHA512288b633ca8f38a42638be5d966154258a259b198922c55abc97e825bc2eb731ce206f6957971a1bc0bc70314004b971acd8d8469b52eaac61e960a6f0d750a1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5baa345efd66f8a89f2d79b6e294be29a
SHA12dacc509ffa94416f49f97d368daa5159261c3b2
SHA256450cda3789641e430f6e626b55c4163d6167d9b70a30086c6f416d03cb74aefd
SHA512b66bcc5ca33bf5d310681eadc8a72558aedfe80ec30e3a4c83f91b722e7e8c64bf10e7cf68d662ad15210f8f7ae15e6ed65b1af8b86577dd96481b3c4a84abb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598d5a2b8fb93f60d3af2837692957b0c
SHA1850b1f03be6ccce885b76df34f74a74ada662556
SHA25663745604358eacd7c68e125c4327b4ec8a8e823c3bb58857c28492259a8db386
SHA51299e9d7333d093601e071801b39da7d5c93dadeb223626a3eeee478853329a321a2871f72e50b51813270c449d1e61ad3c3e6d0ce81253d60306885ad84314ee0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6178d3b93c55db94a2440f2fbd5084b
SHA103f8a1e42b3aeeb0488688b66c644e876b1ed415
SHA256e1a2ae464ba82ce41e9565b416d84a4d8c494e272500f6245834f5a24f631877
SHA5127b07118395e34a37ebcc4537e6af8cac5e259a70d125af751fa486e10db39d62d93c048541bff7dce168962bc48770a90fe67995681051488dcba4df602ae6c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd1d351a023a43ebcfe78d519f460eea
SHA1313463416aa37eeec9ea891275fda71ab44811df
SHA256b4e190a1564fc90345ae8ef213d97ec099c45b8a6712397c2e8795aba3c90dd9
SHA5127ec88ca17267a01b8ed8e942f7f97ecfc3cbaecdc46cecc3766c01f4f366155d36d59a0f5b8a5e1af0a0c20f14a02240ce97bf4d94729b17801650030de66ac7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6a9c65d11a6a608964477adcc5904ec
SHA17db355c48c6ed45fd3c1d3ce1aba4b5bf6269dad
SHA256d57260eeadc4354d24963d72bdc1e3db1188836e44ba1519924451154c82d4b1
SHA51249bdd72c9c354f34a60c2cf7acb17b8f478c65e84dadb9dbb0197b5e459855a3e3ac1486217ce68dbca7e10d23e048adb4f59a8ff4e1251c977b4ea0aa542885
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efa8fef0b8fad000139c94ea948bed49
SHA12ac7309576090dc09a00ab58dd8c6a48d0507e2e
SHA25626106d65244f6417e5bf5f02e5dc74f6ec74f341e2d3ce40e51317df3c22b01f
SHA51226f2ddb3814b1ded71dbdadcf4f45d5df5b5e0b028af2e544da73fff1d9e5bc6c3ebeab26dcec16b05ebf3ad14b758abde4469ed93249fa480d5bbbe877ea827
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad10dad68f348ee65ddbb515a337e4f6
SHA11fb55f1ba1d49f55fae00ba3db9b1a95942fb65e
SHA256fb288ab17685de0386ab18575400f287fe4d74e93b1a8e40c72dacbe4d79eeb4
SHA51215ca32724ef5548afc76ce8ee6f4cf669b613de330a472b458983f54280b4feaf3373d92f2033909afe717e4c91647658287977478847f056bbbe8014a3fbf6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577a1cb8007897b991c7389f1f4a6f2f0
SHA18273e517940ce52b39f7ea65141561975406628d
SHA256876b451ee5d1a996c806b070a0e3f395931ab2e1de6101df8c9d8b59138e9982
SHA512854cc32670547e42303b40cda281ed5af37dfe67caab57890defcc6bf99c56386707916027e9c647c01e839cce62a31d30ef83f72f0d4217ee1d750fd5e8a044
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565c8262d4b05f6384f49d7aa1f124368
SHA107fbe0f56e4109acd3028ef190369c6da3093a3a
SHA256e6633f2580b203e236ebb4775dad1638a91d04c756ca74c6c2cbd8bf1dc4b3d0
SHA512b578423c11793d4788fc249a83c95a0aaf38904deaa205e676adf772b2120f6dde16f3cd3922583e8c06a60d1fb7667c40c95dbcb2518352fecc0af74fbd8ecd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55953e55de8460b18120a0bce80a573dc
SHA1c4d9cc191d93539c942411c88b8210d00e61936c
SHA25660af7ad87598484eae2a45cfec215a33be73d811d3ddbfa599961a21070de173
SHA512934d341e220cfbe5b65a8df8a8d2a604f028bb2766945f8e46f7c53b3f54dc54f0795069d176bb325e53402bf7957ce34d87f5357314c4197b9e096f04d7aff7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555fb71040afaad8e606f090c00a46495
SHA1841db8a4c80871ce09d0b0ef44686dfd8c89c914
SHA2564bafd2092f26fa23e9a667cd08757c2c333e19be6e1caea2b99e7feccaa13a1a
SHA5120738abd08a5039b07c93bb3d8ed702ad1db4930f45f9f0b9354c0e50a2dd5977ffef40d95325e21223f18420bde045d6b818e4d245c360c3fde2305704ac2010
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f91f0b40512619f6cd7e32e6951f2a0a
SHA1739e98e74819f3e975b4163499d24de00fd950ad
SHA256637c43094034ee4b7b95fa55eb8697579410c3a1d5587efd3e686a1c42ecbd28
SHA512e7741b37ffae5deea4198ec6ac857f9f8ea6d88359ab601c3df03918d61686d76a4b162b6cb41b1a8422a14fdce57d146510e38f1e95af46e948d26930347728
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502116246546f0a1d140a5c0ee827d809
SHA114177302b88205ab44012d82ba3b6f233f488d9c
SHA256429bf21bcb579902c4f28a95dd9c0bd2be92a249102057665248cc3c349058ef
SHA512794e36170e2e861661293293a0df8190a40ead2b465c37dec86d017891c39ee71bd3eb2507485d76c658221274198b6c1532694ebd3d58ec051bcbe85de654b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524c843e4c622ac1b05112505b4c334a5
SHA153464fed12ce25c673af8037255ebffe61a89b33
SHA25682ff65e9b7fcc8dfc6e8957b4f1eb2c43e984499a4ec1cb4c269cd373fcb492c
SHA5121c3da6e5b16861156a1a79e02c42563f2018b3208b5e611b681f3e930a1d2c4c4d07d6df379595a5d21ac30c79cf01be407f59913115ba9250afbab67a32052b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c96d117d3ce95721481e5f164d8ecabc
SHA1faf92bd0b7592c8a052f07e1f4b15b69a98b71c2
SHA256a20de60de3339c13d166eb4d973c964292b7728aad4e947008c60887db43e4df
SHA512fa829f30e8545500d3c11fcaf01ab8c508609f7bedcfe8a2febb5b7e3c866d77e9ba8b6cd9b3f1d9f676dca8a65d5b8acb4ebc2d1b5bdda51ac7b26810fc822d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ebba197c59f68009075a09dd5f1fb5c
SHA1b7dd6c7d75e0eeaed0dabadf56384a0677fc7cd0
SHA256067dbecc17c8730532fb56c29a07009f81d76f41d1991dde89aa4f1af97a07b0
SHA51287f679d5e2e029c19c54563cc820899b9bcf47f1ae1c02868e2d65309c478cb33326f026ac05646f6aeeef632c7a1b3ebe7afa9bddca244f573c510ddcaea85c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a