Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01-06-2024 17:08
Static task
static1
Behavioral task
behavioral1
Sample
8b26d4c9ecaef1157d8ee854d96195da_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8b26d4c9ecaef1157d8ee854d96195da_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8b26d4c9ecaef1157d8ee854d96195da_JaffaCakes118.html
-
Size
57KB
-
MD5
8b26d4c9ecaef1157d8ee854d96195da
-
SHA1
a2e946f2ba5e791004cce2f33e57b7330e93919c
-
SHA256
f1b7fa91bd03269313ceebde46717c3968a0e72a7ac5e50d51db6b346873b815
-
SHA512
5ef118f7f0abd2276491e5071c7ed7c9cbce98c87c5bc16529768e522fd134a8889b08419c9ff57c8e11171023a0e867fbcd38b8b764327aa5e5b6381dbcdbc4
-
SSDEEP
1536:4LsRsDuVxI1XGQaElLYdtEdbKRb0VfrLNXXj7DAZOL0bqLmesseQeaeYeOeueUey:+sRsDuVxI1XGQaRtEdbIb0VfrLNXXj7d
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000eb24cbd78683094ea4e71077c4a0e581000000000200000000001066000000010000200000000e63e21f648e3499ef468de42c5fb1e4146f18507c69e1efac47430b2efc1a1b000000000e8000000002000020000000c1cebbbf4514c81a1885fadd9002abeb5ee4fd3e61dbed9931a03cfd90b917bc200000007245ccb0f5e4c8f5be9188d70f6ed5c84468d2cfd2a9af275e4fcb8487b2fb0d40000000eab44b6f475598a884173d30623c2bcf379c9f82e712f54f6c5d1c8ac48927b34d4c7374872754587e68ca75d58991db4c4c95b1713bec35f24bc3c8c2fae565 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423423580" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f061276946b4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9303CFE1-2039-11EF-822E-56D57A935C49} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2340 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2340 iexplore.exe 2340 iexplore.exe 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2324 2340 iexplore.exe 28 PID 2340 wrote to memory of 2324 2340 iexplore.exe 28 PID 2340 wrote to memory of 2324 2340 iexplore.exe 28 PID 2340 wrote to memory of 2324 2340 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8b26d4c9ecaef1157d8ee854d96195da_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2340 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0067df19fac7d745d16cc5fcbf43fb3
SHA1fc101fd0215fcd41284345a0687f4bbd0b9019fe
SHA2567bebb5695a831ef46d2d8752f101340707e703871f765859b2c3f5adf62a4094
SHA512cdbe40797b6bab0c3079d1ef99841d6015b93a3b00a3d53c2ee44b5039920f2f4a984ddba41508c6b3a140107312bc80770e71fd9ff0597546b6db9b210b94bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fce2d289fb186236fd4ddae201c635e
SHA1d75b74bf76dac66895182b44416df2faace16610
SHA2568e8330fdff173527d017c8dadace9f63b94c62249c616da2ca3a23fbde1ac234
SHA512926cdaf39fb1bda4cdf56655511462e71c951f6632364de9b10db720407d6318b9f8fa6dea8ba60a36af03401990d8ba059141ee4727bb0f134a30040876e0ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5d742a34ffcab0a5bdd1298ab8a11f0
SHA15dc23d3989c71d3571a47d7c58b3917e3f6238e0
SHA256d0bb4c8375184dc594730d6469f9d136aeaaa29b3d29c2346f507fa51579068b
SHA512df3a7a2181a88ca93e802e932f5a28732770fbd9e9203fc00b5750a7d1d67c118f64d76da184f69fb7d3f55b8d20e5ab851cff39a647ca69761015ca520abec6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c64d7de725ba120c42b89265969ac1cc
SHA1730a68180dc7777641f3f1c80244ad733ae935b5
SHA256fdd268c4f6b6c5165232de213ba2ea8b590e332dbdaf5405f290bead07b1247a
SHA512fdb6b63211dc2f5d384c365891843916905f99d4109f1b1acbbfb95819981278b7d75790fc187b1bf40000e58c982e053b467ef3637742419bcbd030f06741dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555b6852d09a239f55abc3602ab19a89d
SHA10869d5f45fa26e0ff3acf6061b1f82e98024833f
SHA2568e0939e4de722358ea1871347091198fd5853aa86ba6006d48a9efe387db3d83
SHA5128e9eded1468365104d034f6551c7100f135530724cfc14dc0a63e54e9c1b70fc99fd6b83929dbdcedb5a73d9dce0c82637ca6a116a940fe3dc8308a1bd36d62f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f832a40bd4d7066208f3f2d9fe1cd57
SHA19c50f2a191eb076ad0de7e64ffe3b6804b81729f
SHA256f7732a6753ef29172237f3f09aa2eeca2299c55c8694a21da7ebb9e152057d86
SHA512fbff1ccea021f224bb5d4cffe07011c9cce951922e51defba7aab579f759f528e685f69d749e38fa37765e428af70a6eb7fac22ece47a5ca1c5a9f12be9930bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a56da86a076b0406ff10c8457383a0f
SHA13692e0d22473b88e99cb606890598740b7577651
SHA2569c4d3e042f0959e175d1a3d6a729f8c284e535b2056ac00a5c8ba1c13f37400d
SHA512d7d00727e0b101d3f1d41cd87edd875b87f659d403a86f596484140220f414c6b23525818347b050428976b8a7adddb727a1b621dd0e75827f1353f0a4092894
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52606eea3e65d50d5f271dcc6db94ef8c
SHA1cd2f32a4bd431f69b971b134dd4ba4d89551b34e
SHA256fa1a8769ae2a0124dc1b42255aeb95d551df86be5c76d807d3f538dfc64310e0
SHA5127deab44062de891bc2035637379982b00fa2dd50e42fe38c1cfd72e76600f26f673abf53d8085a80793ed1229afbe116b1afbe4f8928c52242202e527f1b8b1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e85e43da40e8366391b8220ef3369a48
SHA138ccda165da9ab264339e56a662f52362ca1679d
SHA256e3a6bd4f45dea2bc6dd5349b5f5e70db53652762720a34a732df96ac0d929c2f
SHA5128555fb4b92e8ff948dcf4697667278a8c1299c182114310b4614d79210631a2e35e3fe2ae1079bca61db84816d5186807417325201552d8e7b0b533f28a3df0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfbfe864b24fd5900ea78343650f36fb
SHA103c76e9b6136663f912268520526db40874a2af9
SHA256fec24185104bc749d341f1e77a4848c7be9a5cbd875da2afa6112a0390866c75
SHA5125ce23bfa8ad42fe644160229e9e983c16fd53aad63041e2cfe6aa3591387dc060cbd81978a3b6fd3f7cf42eeb3875a2d29b0bcf579d2426124864852df966e8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5568de02842f793bcb3fc32cd95307fd6
SHA1c4340f8d7ca33af5a764bfe8f1bc91072d6983e4
SHA256b5dc7883beb7cf4c91abc7ca1527170581d4f7867e658bf420fa79cad964dec7
SHA512d80624e09996aebca8c2558b0a15038140c535bfcaacfc54a4af05923e60bbde1859d6e6f50c191258ba6cd2ce768f363688045d12707f1310a3104ce43e6ad4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5492e1fa50874aad39a0cfe8e4ce0cb57
SHA15a93002c2d04c0c80a78294b1c0df34d8731d6c9
SHA25651804c5106e4ab6deb11b98e6accea59ed5474da37c7fbe8c779412d238fd3ae
SHA512bb4f7acbc43063e7373bde01dd400528bbcb85c88d8119ec9269af41153da7b725f7c9cf7853041ab0a975e310409feab763fcc48a4c186fd21fc22705c9f9c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fe29474fc71bccc5512b90238f6826b
SHA123a9fd48d3fb54f9609e4db4825de85052b5a489
SHA2569c39b0048e90e411eedfa0af2a0917b13036073d0fa9c22cea3a79dcff11aef0
SHA51279d76e041bc35bb1623a42c277f027dbf6a761dbd4686750e4adac9a11e02ac39bcf34c3648f1db0e53fc5436db01588ecc0fc84b6437208427111fa9baf397c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab9de467804e15de80794f22bb66ce72
SHA128ecbd1b5d64588a19c74e5164c610385d2e37b8
SHA256a418d7986c753b5801bd6c430b3a36e1018cb2f05a8d2650ae6ebee8ff0c1c13
SHA512a2aed4217cd538b26161b536c4d3f3b3de3a70af020778ba3c4d1c7830c610859b842d333265e62964efdbc2bf0f535c82c4c925412243f469927bd3e4f01bcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58522963b76b2d7ae3936d90e761768ce
SHA15b6f9721d8e412d895b69b5b006dbf73eeb12c90
SHA256053bd0142d12432f3c8c5e03f976b56554263f9e87e2324f4a3f7903189ac020
SHA51290ef53b4a2bd85b25ccccfc3be033ef36892fb0728112059236d2fe6e4031393fcbe2fb627c4821dae97fbb0f12191c15042cbbcc0354e9fdfe1537a1fd060a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5367641603106e9791eec95811e845bf3
SHA1e189e7842bc8a367cc0c60fd22ee638a43c5a711
SHA25635d5338beeff11f25810428242d215e51f648d219beb85da999e1009a82dd581
SHA51281fad6908dc3ca8089aa8499d838fa6ec9a045599560cfb85a82347b4d18b39404c8bd8a72d2b0c5d409d734bb406e027efe51981d2ff25e2bac8d1c838e701c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba98cc609c21807d3753772edce7e0e9
SHA16ece994d730841048c86247e1b81687e49cf954f
SHA256c44e729874479547f767f4865f49547df3045b366932c0399d03deb5e9a434e6
SHA512f8b95cbc3dc053b680fe2083b5758301a6a7683a4e1a226dfd85bb2a234422fa5b7a3871e29edb4ea3fbaf912c0a96b954b5f649e869c35ba8b2d8a719994bce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff5a6e98bfb04e3f62c742bb1458ef24
SHA1e7a7cd92f692101d4d434e2b1ad8521a17750ff5
SHA256a8fa93ea5edd53629a95211df86ff803d76dfec577df0ae221afb7c4b4adcfce
SHA5125e75299347c588c142586e8f63bb9bd821abaf076b414a11130a9bba39fbe7975197e5dea18172f14a95c3063ad844bd7f73ce40d3c6f1f8cb48f5728f2c9f90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f940950790de077aa51b1876f013a75b
SHA1390abd604655aaf457760e45d869415202b69bca
SHA2567584f1bade842c54f6e5c10b09719339fc5d2720447de5d9b76100cf305d10ee
SHA512a10b96b8f529912e44cabe9a78aad2ea135240fb552706cae5d95401c9f9f1462243386f16b823a4ce0c784e8e413f4ce5319e4689dd579a4679acc4c7ddd395
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b