Analysis
-
max time kernel
67s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
04-07-2024 22:33
Static task
static1
Behavioral task
behavioral1
Sample
26784f15c1b6c32213c0aa7540f38774_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
26784f15c1b6c32213c0aa7540f38774_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
26784f15c1b6c32213c0aa7540f38774_JaffaCakes118.html
-
Size
11KB
-
MD5
26784f15c1b6c32213c0aa7540f38774
-
SHA1
0f469a58f9779f70d1abc7e5576ccc725d0e899a
-
SHA256
9a9c959c168f6af651132d495867d665f54b9ea0caab7a03b0ca8684f3e812c5
-
SHA512
32d713d8a44e236f057280ea205a7ccd4406b953022540fc9cb0c550716f1d2bea65984d905397a71772ef5d5b9b10f40d79cfe2b1b379c1a63872799ce8dddc
-
SSDEEP
96:uzVs+ux71HeLLY1k9o84d12ef7CSTUBj3OlpKIoB9bRcEZ7ru7f:csz7ZeAYS/JQzb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000d148789365039f90023ca67a7b0c7126d550d6229df92aa461890a994aa4f1e8000000000e8000000002000020000000381be56dad9c3f3458a66a4dd1fd67faf95d134363005db7759a33d6215522552000000032d1a8b2a47a9f3395e8fb685c683506e8be5d2d289b751ca992a1b224dac0e040000000806fe2ff9dc16798236a61b79eb5d58843e72ff6a5b56e87773fa9cfc1777c7b9a338cc715f59b4aaa3fc1a7bfada9ec50b7fc7a3c95a6b07fced1892e962a53 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0ad3cae62ceda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D9274F71-3A55-11EF-8FA3-EA829B7A1C2A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426294454" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1140 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1140 iexplore.exe 1140 iexplore.exe 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1140 wrote to memory of 2736 1140 iexplore.exe 30 PID 1140 wrote to memory of 2736 1140 iexplore.exe 30 PID 1140 wrote to memory of 2736 1140 iexplore.exe 30 PID 1140 wrote to memory of 2736 1140 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\26784f15c1b6c32213c0aa7540f38774_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1140 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541688a7c01a21687c975c96d2f296a8e
SHA121df73e07c08febb7bcb5f3221522e8121897cf2
SHA256079431f603aeb7ce6281ee9ed61611447f532f2758096f4a8fb27aa388a352cb
SHA512c95c1fe40d357777ea84bb4fbc101477f5e4a00ff07f4d8dffef895f39cce54dbe678c1d8318accd5fce9c3cfbe65d65735b8c6cd4a2f7bdc1691f4b0496110d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6a47ee87b2499b2f4e18222c188a857
SHA1772e0404649a28ad85068d0982310baec5718d52
SHA25624e9adb8cfbb3d3b66178cce7397ed62f19647cc848232c981ae9e199dd3c02b
SHA51231bd7f0d833b3dfa5023b9348ce20a9ba1be737e3d840f3b2583696101233e7a6e05895dbcf89afc60b82344844bd0399efeda2b644c00f7d430ff974a2808d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a98fad4808f99e4f54ff5232b01b6869
SHA1a3bbe93471c58923a546bc65adfc0232c9529552
SHA256d0fe2a0a78887613947f699e8023d090b7d72e0f363b6603c38bd9adc8bdd5ac
SHA512b824baff3caf27796056b59bbea2bc799481c37a5966fcc2f4caf3e185cf6ed05caaccc458bd0be2a487fc0a7a6f7c32fd4ad82099e3b8763921862d1efe1806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561d1b62fcb50bceaf34bf60a1aed3e4c
SHA1cacc2c2a9acdff928205d489a4a71d6b81a87e56
SHA256427facce70e92bc5a1b9518e69221b3cbc39628b8de981936e698e02ddae3cfb
SHA512dd5c35ec4d1a9f96d89c0b00003af66a0a6adf6f2206597f119bdbafa1f754a73da5ef0483675522b569de615ea405816a259d735ee273b0245f0b23840bf07c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563e85124801f73a6340e0a6a5090c3de
SHA1468d9c348723f310a1b0cec756641986fd4686ec
SHA25602ce4f2f4659704cfa2c884b8a7bc5e90f55d9bb90772347b812a503e3678b4f
SHA51216e68045e9cf7a6298539b49b39663bf9da6e0ea8d7ee65113c22fc83fd3cfac4afb2022740184641390cbce17443fb94a4162e7b73ebd020eec43c1c26acaca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f104374afcc00c8d8b835d74c399264
SHA1cdd83de2f33a9cca29e00b2c9732cf4106aa676a
SHA256c526682c3a7248898fbd7efc4036949005a38120845b33f22a7b3cec5be3626c
SHA5126b16c2471e6abbc19f965789a288907a2cbc4a55e5d902542c5986b816e356b22cda31263a97179ad10d5fa93b35e8f3ed21943d42d3134041ade7da82527a7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5231a61c2bdb2b833efad0ab7390cf143
SHA1ed7c875f17f6a06d9ee6470a9482702eb9e4f73c
SHA256ab649d057031cd70e74cd6676dc770e44f4828f05ebd5340e42d56ba3fbe568a
SHA512a848d1d86d83a02f3519fef4a72477b8c5c213eef7893db5c8aa96b289ec089d43e31cbcdc6c217c6809e2e270cb1a629dc8241c73f4dbf9cbdc4dda65c684d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54afacde6a18367922fdf3453622c6783
SHA1d42c532e841829a992bb6f4e41a69665bf7d922f
SHA256217af027a3dcb3431f1bb4d18ac280b499ac30ec68676ef1373e15c1ebff0c10
SHA512dd9a0ef53ef60335f6fb828eec9d3948f1c5d1954fbcfc74998055c72940f45481e9af8f7dca3310a468a5aa4d34747a29c56d8cbbffad21b86a8d47574d502d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be8433ea9dcca56e19a5262fcc7852a8
SHA1ad0097bfede61215c31601b766b8be5efd598937
SHA256dac51180f9e013e86bfd5fcfb1544b7a348204fcb1ef7b0b9e1f52ef6300f871
SHA512b603e7bd1c81e5a2cd0f2fde8a99d254420b4ef604d5b7756fcf24087c92497fb7ea09607384f073e42a07ba65a6fc2fe2b56a58fb5dfbafae85dc9feadf4f3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a31432cf0f271760f9fcb4a3b64057ea
SHA181f300f8995afebf2822d91e18be02dec6a02408
SHA2567ae9eee3d83b67f2814102ceb56cca69edfee3287701d524ad7a1845a1d39f51
SHA51288aba9dec828dbaa53f7189b8e948dc9ccf32fa0dec9ce4a8bc5f287d63b4759b86e76e63ec1517de9cfffe2a6f382873ed37f882ff43212353c9bef8d7eace4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2e01136fad959ab7c0fe88668e43a78
SHA1e52ea0e18e1ffbe0ad4c8e5f716c764e94f34daa
SHA256d8ef88e060965f557a1ebef2e5f0b73559023d91da97a2309f4aa150fe9b3c50
SHA5121354c35ace6ec8e3be8ff3f77a50a71ff5d912569404dca7dd976461186f148672ed2b59dda201025404da9b5b726424b81b13d4908004e2b10a7ea32b898e28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3b6ba1b8084bab8245df9603527e7d6
SHA15cc398d2df95f91f03df37bc7cf66c50393e5f37
SHA2568d0f18351a5f8cb88a1f696a95ac1a289a88caffb62bb69027227e7cfb6bccbd
SHA51213fef9bcdeeedd7aecb94f9bad491540db830baca5a6b7ab56832cd9a248f5842550ceee062aeec6f91a1a8c7112970c284ffc7c007b5fd26e699e0bf741783b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5825c8b685e179b6545f1ec10afae8b27
SHA1c93744be105a064c7a4d8572e58bcab4aedebb45
SHA2569d8270d9914c8aa03cdfb1f7e9c37ab3fa015fb490be9049c51bea676746b611
SHA51222dbb1d87549698a739148d14ccbe16b20f2b247d16ef88f9489cf9384a8777edba065efe51778544e8d85cb2c9cd130cd1230fd57ff4ec3d9df5c3ca2586862
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ff962d449cb80f736fed3d01c789ca4
SHA1722c637cb364e6576bbe2b60e021fb523523df2b
SHA256ec1c172b7271afb84048a271157b80d943f6141e74faf52146274d7e92091870
SHA512b72a9f718d0c90f702139a7762f647e5ab7874acac2937e300ecf2237a0741790b6c6d2e3a17329a351b730647a907392f56cae7a55b5289396d1c18d6acf38f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54708f0fa7c94289676d93ba3efbbeb09
SHA1a1a1e10560d574ca8c1415a0aad1c5c934095da5
SHA2566b1f5edc4416c35c93a4161a68e59a63ad99d16906b653d7e0b071daabb47303
SHA5129b4f198288604ad0c9d92bb8e4153c85c37613e2e7610ed70c0149577049d90cd06c57cdb914e55926b0329cbe3bd646df8692819da665b19ab590777aeab45f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5341c0aeeaee3a15a74fe65d0f1616450
SHA12cfae9cf886f36607fc0aea05e59aec021de02e4
SHA256330bce7b244b6fca1e8b5d7df7098fd7cf6132dc2a9350de09332735a7ad3fc9
SHA512cb2e8e4ef345cc3826cfdf8a4bf4f56395356a554234ad98bcded7877c4d7e05315c950c82687fa8142bdc4a1198871b79ea8fe0a8b587e0c17f21ad0d76c676
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546e9199aa8ba027609b14fdba018942f
SHA1d82fd61d7d39bc3094f1072455118432aa4b1ee3
SHA25646ef580cf954a9b12c66d68413465f9accde3bbc75ab1c7e4fa33db782d05aec
SHA512ba7c12b18b77a836514de7b5deeb03b733c2e49bea8f7ea24fe61af3dde17689b8d254cfb50f5d100d765ab65c38623979e451d17fd25bd8a146d6d7da405fbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5f88fb901e82727cf34730524bd69aa
SHA1e80463a2470c94f79d26c4a0845db3907863e3a3
SHA25658a90ee8507e6cec56cc00d3d31c0c7c8bea6b3ebb282ba2dd3b00b813748b0d
SHA512956f784371c46eb18820e946a706ac0b2038f42c5c9705bf334a7c867868f7bc630cd63d2eceb44bf7c93485131f08a17a8267f07c17641510e51dda5bf4c2eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a87bff2636a8c2311e220a0aab7745e
SHA18bb652e3aab9de628f62feefc382acb035446e95
SHA2561e2fd7d8fafab83f1d9d9abc762667dcfd3939362e3ddbc6122304110cc05551
SHA512618152e0ab6bbba9ed8482d688c48c42c7fd0157438aca62bc54feed3c85a3aabecf151c3b1928dd5dd6d82eb47ddd6e7c5bd0e636e6a647442df6d25964c60d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b