Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
05-07-2024 00:08
Static task
static1
Behavioral task
behavioral1
Sample
26bf47dd42b19570452ca7d2e1178a54_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
26bf47dd42b19570452ca7d2e1178a54_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
26bf47dd42b19570452ca7d2e1178a54_JaffaCakes118.html
-
Size
19KB
-
MD5
26bf47dd42b19570452ca7d2e1178a54
-
SHA1
e0ee42cc5ddbb1456e703318625f008916532917
-
SHA256
90a99be5f7c324a0d3581a8586aee7f1c1a53c7f995ac2da1a800cd8533dd303
-
SHA512
4e25a428fba163ff2d5aad74c88a81b29b26104d10a9313e42082bd0861f3cbe00c74c701b7dc177aa8fb63d23ac80e7e0b271b11d8961059fa3b6f73825fddc
-
SSDEEP
384:4+QfPFd9QZBC7mOdMg8tKfpC5IgSnbmFe7AcB8689LAPd:Zcd9QZBC7mOdMgdpC5I9nC4nPd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d10000000002000000000010660000000100002000000024510a45136d26e71ebd8cf0e60a57b4dfa07b1c5e373646cd6627bb913d00b3000000000e80000000020000200000004d5ef1e1f5d1a589a9f680b9bd6cb0b4914b2af1e8fbe82235b62b91c602a11b20000000fa73fc09f4ee91e17ea37944134be547460c68c2533f2ed3bff68a4d45c2a13f400000009d6a19a1494aea5597cf5ab5b9b9247b920dbef605dc5041bd1282cec2b3587c32651ae65b25b00a00b312eef81511cc83ab81358c32972679f96f98c4c10a54 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b04303c1b5ceda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426330132" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EB9A4F11-3AA8-11EF-AE27-76C100907C10} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2052 iexplore.exe 2052 iexplore.exe 1800 IEXPLORE.EXE 1800 IEXPLORE.EXE 1800 IEXPLORE.EXE 1800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2052 wrote to memory of 1800 2052 iexplore.exe 28 PID 2052 wrote to memory of 1800 2052 iexplore.exe 28 PID 2052 wrote to memory of 1800 2052 iexplore.exe 28 PID 2052 wrote to memory of 1800 2052 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\26bf47dd42b19570452ca7d2e1178a54_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2052 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b08d01a92419259bc1ed9a4cd4d6ad66
SHA107827a1bd46bcd6bc73b9959b286d12436079336
SHA2565f62d3c760a089798fed57aaeff60fb10da8ea45be9d1eee5bcdfe5e2d79ccda
SHA5126322878219c9f53fa838b25f3d3fc57884d50272101213c56f3dd09eb40c83171bdcbecfe5ff92019b6836f06ee2e9ff36bf9e020396cc1c5781cddf05034470
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ebf0427806f27f9b104da87dcab30ef
SHA1cb590e55b87012dd725dbb4e5f19b8a4f94f8546
SHA2565a7ed056027052be6bba429470771c14ca7aa36a78b160a7b4deb5d63f57b6b7
SHA512989828bd9156d9666b58c513606e889eec88f411a140f1600a6a56a8d6bfb79ba2b1fc4131487ac587dd5ea6c8e04baa0baccfb990f09032e1ded941a9e7b2e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fc92a0006b3801429feb9f2f355fd3e
SHA15713ab608c63b75190c3b68b7a0ed5ffc5b4f8ad
SHA25654c0d948649a096b1a8d1172c76c4e27df437217120008f3ece2de81c21ad9f5
SHA512ed8dc040498fbfcec4bfe11863d9422552ee58c6a1b190225ba35e680c334cac496db0ddab68ff4617fcda48c923090d4ddf0e7c3acfcf0d7ae675e1289aa33b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c9c1a12486b35cad170651133e7f44d
SHA1a2767a083a5bcbe0c250fd0c5b40dc000c689f45
SHA25699949cc16c827fe8f46106458fb698f73cd6e0e191e0cbcf2d3b65c68a2635f1
SHA5124dada54c542cbd496102d9630ba3dfc070ef604417a929f59ff8ec6319e98db447952f42a1283bbefe1b89220522d4f68283789b9be71712ea3379aac26c2439
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f17a64c053ee2662a8d5f5d0c028338a
SHA1fec79cd50b08cf91e8af1f404cfe0208c61b955e
SHA25634f79dec71130fa103fd92f7406b972d26c489a8cfcf05eca75d2146e920a4b5
SHA512287575a0a7c6bce07eb08fc93ef474b5a973b4007e0687244fe2ef99aaf9c82ca4edc05a5f69a3436c5f4933b8302894b66bb712de3b92be3ec8537d89a1a5db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e13b6c6d543b0e3b96f7e724010bba2
SHA193db78375ab8515d2e2502d9efca538327cdfe41
SHA256dd077354aacda8aa364ba09e5d013f848a592f1fa0379478b0cb133f946b3f7e
SHA51206207d660ab47416e2c5f1ff6cbea1a85668275b9771b77a5919b660151bed1f91305027454c2f0fba4579acc06766e123f3b4b45019083a5d7c84ff9a32392f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56432af4b2e5fab6fd1165e740de1a3ef
SHA1e27f53789e9d9ff5f453e2610afb74c58d628f70
SHA2568d3a99bd054011a7c1d4376f3573bf6b991f143b0cea84d0140718def4553627
SHA5122907aa9f4a566619c8ba85b953de822267d2806f7cc771b4d3d5b8d0995321c26576c011161f32a1b35ad15abf1777faee1b2725973f784cda6e9d08a5d2ec5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5172e3f70445cfa18d3aaaf52e5bcd3a3
SHA1d571756bd4bba1d519773da7007aeea446855ebc
SHA256204c9b9c23fc1c83f7dafeeb937b70ae2ca24de2499bf8acabd9715570298105
SHA5124b47d4a047dc6c75e50c1dfcd6249fe233ece2989c5f49e0fe626440cd5bd490cfb0c9eae94f4ef897240a8e25f48185cefbc69c20d43eb5dc39e8363b106bdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546b07adece6514634341b264715b8695
SHA116b708bd31eba7759347fac32d23700b346161ef
SHA256169b4faef758969864d6e8c1e6e5162b2b1ea2b1242bf355e14dbb89c9d40439
SHA512493348259dc01136dd1915aacdfa9288ce497d1abc826d28c73cafcaa81cd6ca87c88d535c7d54f8a947083c9792f1af0c9f957841d946cfef93ba6ca1d23038
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5b77d5506bae12cf4db4a493fc20910
SHA12923f3699b4ec44b7298182e156ae71ccf095381
SHA25657395b18c4e68969655bb4659fdf27836363ac11d3b0c715d9a868cf78a59b8d
SHA5128711f64a1a4f63fb3fdc75749e80db7c9b398909da71423713a0dd52c172dcbe1575ac3b05b7b4b1a535957e7f55c64500010b4fc7f61106c188ff6524748353
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7485d54c9fe06fa3c0553d27d70a268
SHA15f62dbf29f297b38f566db3de41b3be217b27086
SHA256c2615273eae3d719fbb9a6203539dfd2983b3f50dafb52da6af543ae4a0b1f84
SHA512110f4b76c800a81efda0b8c05fabe5233885f9a537f28a0961e7fd5d97687bb2a421f20f87681c105092d2014d4c9d819ed0bafb18dd274f19e4fa0651d86499
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2a80c4cda1ce8f32587df640645ee39
SHA13ec6e54ab344c392cd50b15b0cd0791eb4b31a6d
SHA256481231acb9097303f45a7228e14ae08379ab3d2c61ab4c65968f4a0d7035021b
SHA512daa6ab4b796e65ff0cb614cffb551458f57c059a1e4c952254e746e324c1975c8b479de0ab9ecb2907c45f47e10d3a2f2362b6271029d2c34270f5c494258e40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0f1d53f6c5b78b90cd252905eefd046
SHA1d7345bb79212fd413d51b91e793e663063c1118b
SHA2567c590e233aff0952cedb493c0d872e1ef2371ed2f3122a1282a75c88ae54016d
SHA5125706ee05e58d35601660a1d07709402309c2f50855371c17def721c743bcf38e992fbfd5af98a2fa65833caae1f7f91bd9188d6f27a83392fcacbc8432c0118a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b90193d1c47ccaa91cbc6b0767430c9b
SHA127d930898ed1ef4880f874d38388452c3bc13f04
SHA25668fc1edb826e65e2cb99cb5fed88c52c8fd2626ab2d08448f2a0d383fd8dcae5
SHA51294cda1ee95c49c06884078a1051e297297524c1e65a549999c40cd3a1d716b22014677675ba45f7c88040b3192a523a3154343282c32c73e0b229ef17a3613fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a597c08f3df4890d549581572b3bb5e
SHA1afa46ea3a15059f5083ec948628d572bed7877d2
SHA256274cc5d2bbdfe0af19ed6a99c3d26059320071a2ee68acf9c2a6f80d5c404191
SHA512232e914ad31f9171e4290a51a98f12e259fc8fc872e0dcc3f30ed27c38f2be4994600b3f3674018117619526279b57ec989e3e5e74cc1ceea2640ce74729d1d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfce973dadbb3c57314ed8ca6215546d
SHA180c170659e90cc793aa2e507e865d0cb73e79a4b
SHA256c98f46c8f42d1381bee92c2e61c954ff2469cc55a2a883b727b7deed43ebe359
SHA512029c990ebe528cfb0f53c129c6a2449c3027b950ad24cd17850101b2faa1ca35dfdd043debf6ebf4523380e8371a8879911c3da58f7d8657d1461fd8da351328
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e39e3a508074438701df779eaa062a2
SHA1d637143c19af8d93ce2902f2f4b7b515d15b3f5f
SHA2562fe668fc5da6402e5928206abc300f4e90f9bc71a6f67645b61f194cb904ffcb
SHA512770eadafbfe67cac89c04d81206968ef9b52700d3a8b7dc81e2b08d966c12e81bc4f0c20066b5a3931c20275c3929a1d4f8f81c0801f5b40a5c41147ce36b0e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a15b2bf9f0b06b451e8944ea2adecd18
SHA1f19dc82335cd7ddef4521e78b58f77a3a304b747
SHA2567a1e9284051a1210513a36ab481b294d44b9163f1f3d5c213c79a2e03432c5ca
SHA512a022800bfdceaf0ec9dc0d1ec9dcb1e1458752e0aec44dbbd51c2f76274fbc8249062a25901256b016c6c40469abf5978ea3ffb69aacbba4231636e77a487074
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d206c171e4090f722e38e567c148965
SHA1eacd8def57452b80669973f71c6ddcc2074e311b
SHA256313295aa86fe86acc95c627e88f7a0027f336a9dd6308ea03658665576f1ce3d
SHA512894a8d1ba1e95fb40878ad3a51bd04b1f5ad5bda817b1cd83e88287b2c02566d95bfe337099f8734aa5527c7b35ea04cc6076e3c089166d84dfaea37a26e5954
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b