Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 19:39
Static task
static1
Behavioral task
behavioral1
Sample
26676910177f876733cc57a206012491_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
26676910177f876733cc57a206012491_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
26676910177f876733cc57a206012491_JaffaCakes118.html
-
Size
460KB
-
MD5
26676910177f876733cc57a206012491
-
SHA1
37f297d3426979e9a5b8157690bae7bfee00d492
-
SHA256
48b898fe5d82186f85fa04b32f5709058abe94c7fe18fb2d7d895119da3d2dd7
-
SHA512
d9d65f743cea3a63a60fc6d97386fb9d6fd90b5be75c741669a15d2024ead71cfce9248f13c95215b3d3e8cb59bf2031562664100857980252aa044ea3be6ea3
-
SSDEEP
6144:ScsMYod+X3oI+YtQbsMYod+X3oI+YJsMYod+X3oI+YLsMYod+X3oI+YQ:X5d+X3a5d+X3f5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50f838867fa1da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a960690000000002000000000010660000000100002000000071370fdfe7f176a44dd8c5a0875359f5af11d3abfb2fc7525cd417e2b8e20d39000000000e8000000002000020000000d8b2d8dbb22fb8ce3281c4af28457edd833f9b9c36960f3c1797e12abdc00c6020000000334763bf9dd63cd26d02b6ad53b08fd1f4e899d766fd9d315449dc46b5f8be48400000006227b68002d9b3e6724363fa54c348a01f5630748212f1e65e189c2d5575ebb5f6b98ac853fe5f95e6a2611731130e88c8ef9f37dcdb87758ebd278816c38732 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421359033" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ADACF991-0D72-11EF-97AC-52C7B7C5B073} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 856 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 856 iexplore.exe 856 iexplore.exe 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 856 wrote to memory of 3052 856 iexplore.exe 28 PID 856 wrote to memory of 3052 856 iexplore.exe 28 PID 856 wrote to memory of 3052 856 iexplore.exe 28 PID 856 wrote to memory of 3052 856 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\26676910177f876733cc57a206012491_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:856 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cf5d3dd704391f6a97b89e28f634bf8
SHA1c11bdb1e3170cd8fc557352dc069b01a7988526f
SHA256e96e1d219d808bb26ab77d99460cf8a6b96aa5425c07392b57ddc128c92fa40a
SHA51274f3f85f68f1b3aea83087fd01df61375feef261be97ae4e20cc16d4d678dc5771504e1c2d4d2171982fc67ff0a79f0668a82e7c7e93f13f51f911c9aadbc3a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6c86b0346732a709d4c45c2fa950e35
SHA14cd1e40397190e5c0af0d2a2166b393d23eaf35d
SHA25655ebef9fe470f1f4a52862d2c6be04409f776ade0993a41439683acdc7fb4997
SHA5128a7ddf18b7ce8420a34b797852960f82946814254e90c598634b2fb77f32e98c36b39498e8a2264729c29c480c1f7a433cc2771772d35b756457f17b2f400632
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58eb582b309ace92b7c2c91faf942ce04
SHA17a9391a47107139f99d95702a9d0b438729418ca
SHA256fe37e462a0b13c1690cfbaa355c3b68e12ed96c4159a39a1e94e9d3651480947
SHA5123e6f7487d4acbc1152754583e5e3b0039e90e207b627c74b4e888592eefd6d13092de312f851a9f152d678c1d9696c4a3e785db3178fa6ff97eae7ddb636751c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505772ea6016be817276a03fad5ac217f
SHA16a8678cbe01804cd8258ebe31d8f742d6c60230c
SHA256017113f62c619c6e21d23c3729dc6cd086f7b554ad752c1fa0f202fce2f8194e
SHA51291e6015dc8af9866a2d6cf73b0fc117be005eb81e8269854547be9d8649cdcdbc402e4898dbd0ae6d03fbd7dc2e88bfcca5406faa906bf93d8e9a92ebba5a136
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59badc0fe57af898f838fc15d589ebc03
SHA1b1fe81299139a80c841da1af62e04b0b478a4726
SHA2560ba765267ed7a061eb7c2176139979cc95edaead0dd24047f64c7df5c4684ef6
SHA5120c24d7fea92d251e654779b99ec4f2df4126a60f397472c3f0c619fc1792909f2f2b7d3a6a96c1ee3d76cad394a18cdadd2aea583ee3eff29a23ffeb1f43e24d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5719847e75111d02ac4faaaa90f91c8ea
SHA1d1db62a6497946b50b3df36a9c7eeedc1d247693
SHA2560d0f0989209437333c0266e2cbad3f43ef7ceed99245eb5c6a2243cc5163579e
SHA51212a6910a2869f1c8c5bc6ce337c1cc715ae3a8ffbbbb8a20b18fc0d463fcc7773b32b4e59ad373a750f0bb9afde2a7c6835e38f48afa7ebd37b19482376d4c75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7bd6bb33ac8e6bd90760b1f4775657f
SHA11b7c260add51c9b8a31e4763bdc71aa2a1e2c7b9
SHA256e6db4df1f361ab1372c1b0dd46d9ef3eb325b95562062e1740246ccce1712764
SHA512e611190160441b505636421de64a718fc3b7734ae8038a9c3903c41d6bf14d1197876bca0557c708355abe6da16cc03153491ecbcabe259af7435043f2778229
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5c4053e9d035eb7e561822919221d12
SHA126648d63bceecfe02a8230b12975323290621558
SHA2562e0530c0cc0d79431412bf99f3a1cb86c992ed863bb203c82edba83554b6beef
SHA512759798c13ad71a92b6a1e0a2da2151e0339a1ce30979afd4e45051f5a182047d358d287e493f0369b1b1202acd1e04ffb1be67f9a5647b8770aa69bfce6b7b8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa2a133ad651924e297ec8ebce722127
SHA1f155c1815e7ce662f3f98d29a69f3b562a9b99ce
SHA2561b0a51680ad4bab7fcf5677416c20913a986bb7c0a0d1779137d31492175ffd9
SHA5129a8596c583baa327912e2f5cba71c9480f34f0d150eb49ea447720119a32caae52f9e0f176a0a4019454c1576aa00dea3282d987b317314f120ca972b1beacc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594f6304cb9383414cb0506ca55370cba
SHA1eefec0dc2c18c2da555dbf2bed5f31cc8abb5507
SHA2566745e926e98d9fad3e9210b57c24af2e9ee137c1c1fb2066d87a454ae2c453ea
SHA5129f2756be7d0d433ce66a99fde33e5f47633e86cfd37b34df409189ac80182ccb0c3aae2013a3929d034a98eac5779d5ee357de99857cf32fd3eab89013b5ba7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5699c1037235167344ba0d28e71fd35c6
SHA141b6edb96786d094358a63d6b16286c567aa66b9
SHA25653a5cb2aefbe6f41f152b73d9f4ab4458f9eff595f2b217936470e83290a1515
SHA512e0188f4ce291f07fb1b0d2281489e1f0147c25b5869df7f58f1d4cfab8d05ed050d01aba0140c5c30da59889b5a9cd3654871f771a7f5aaa4ed1fe7bcf835a6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50209ef9d0143920ad849f92e5de0e22b
SHA19c7d8683b7b7e839148c8d3cc4130c7710af7bd4
SHA256afdc49cb1c69a96cca9c2940170ebcfdef7ebdfd0831df36538883b36c893636
SHA51259b7bf94419252381957b7b123a28bdcd17d3816be521c827d9e8717af555c56190dd41180b3381e8f8d625d1efabaf70808c859c584f3286215a5377f95245c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de35deb8468773b188834c05c1c29b19
SHA140670c4b4f4d91e11103617fd28214bdadb02854
SHA2563e5fd8fa079378279c6364ab72e417ccb8ab935e4e5c697da4a1c17adc1fbb06
SHA51218a1e1305e41a2acd0e9769f1b3ffdc91a066219f0e44018c5abd2a8e1042f597c4e43e64a9156d70f120dbfa983163caaa52e4d8df93a5c498dbf3cc6c82e69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55578b3dba363c467c7cea0e4b59caf72
SHA19f344a1906ce4c7fb5710d338130f453c913ed00
SHA256740579d882526aa61bc0fcf67db9aaf4d06570a76d6e0d1883e17454bb680459
SHA5125372539f718718d048d640ca08a30958f0098f645b7cec16ce04f0ae403945b12442f00de464a4110824e7278c737df11383a06ea2da15bd901dbb58fc1a94b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ec6af2834a1d5e6ceccb00c1a09b7c2
SHA14371930158b02ec4f1f508100106ad7421e22883
SHA25617c17c89b5e2407b08e5d7a35e2f3f0f1095914609416edb5a2844a67f8e88f0
SHA512b3a533a134c1004f59f3da640adb1245b4438bc5bd7efb0c4b1426f69a569c1d22e3b3c8161a3b7e24078bad60025fecb6cb67e93afe8dd3b8d757a9f0aede15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fff224370348f8ea00d8779d98ecb79b
SHA1e4ca78cb84a2f5bc79ff8fe0227e338e20b1c198
SHA2568425845b9b7b00e51bc08dd18879e0c095a143839f9d28bdc118ae6c13b989fc
SHA51294d26eab77bc88f99473685f6b6ca593904521e2433da341d2c2bd4bc5b53443d29722a6dfc07820f86d5fdb9ee4b4b3b4802c1291d627f7b8075099845b1fce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2266f9d604677cdaa46ff4f9886e1c1
SHA171807cf590436d8b845819ffb88a1b70e26e4acb
SHA256520c1b3143bd382cd892058d45d6e592fbe1e35d7aea904edcd40a04f84d89ba
SHA5120df3e4db2b692ae43adc5b2ce51ba5eca52b7e0f0e860028d14929f88c9a2a610fa204b9dd92313f13867c1ace3bdfa08309094a49f87252b3d7280a8a20dccd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d308c5371c5a21a401fef29b4914f1bd
SHA183d503f54131a0e41d9c96585f19b4fad45bb142
SHA256984823da2ab9c9dd4d421bb0de9d00496d1b4c8cae5a90ea7ccbb8eb829ae3f5
SHA51258014c98db82671e137802e54a0be2802531da99cc9d118428de68e7f6178fa32c63768a5a854617d1f45ac1a14b27f11744d5dbfa982558d925103bd6072090
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4cc7722b4e4d431e4aa32ba1aa47527
SHA1c60da41569e2efba5552ec4f912e15562a5c1d10
SHA256316e2f08728d6d6ae28eb8cb55fdf7133da23902277ffd0fe08b3e0008e4ddeb
SHA51236014ffd666f48c0f68997ca2f6f145e903f71573a83d994cf7c2ca7e109e6b27949eaa67a44517b5d2d5aedc5f945dc878b77347673da6af89ccfa4427bee0f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a