Analysis
-
max time kernel
134s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
05/07/2024, 10:13
Static task
static1
Behavioral task
behavioral1
Sample
26d82af6a31ba6877be1c8be80cef7e3_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
26d82af6a31ba6877be1c8be80cef7e3_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
26d82af6a31ba6877be1c8be80cef7e3_JaffaCakes118.html
-
Size
2KB
-
MD5
26d82af6a31ba6877be1c8be80cef7e3
-
SHA1
c2bf2bdf14cedd1d709240f8236f44eaa8ab6899
-
SHA256
f117fdf2e097316d42b5bd872216a14e0e9d3aa05a84f75d08fecdee5ed0a397
-
SHA512
fd3400e1b0b05f8eafbc9c53b387cc3ceb585490b23a6b811a787a91e9844749ebcc12f2cf2970761d5c5fd6b40a37808a3e838a9641e6cfe26ac305c4cdc7e1
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426337038" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7095bed4c5ceda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FF8E92F1-3AB8-11EF-9FEE-EA42E82B8F01} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008c429d12b957bd4999ba79d3472cf64000000000020000000000106600000001000020000000835a7b884bbdb1350c394bb0ccd13195b8157c28426d97bede44e07d8f445ab8000000000e8000000002000020000000184c23223af4ef58567cfb6e6084a24f025ea823f9be8eec0f1d84ec97bbd8d7200000009b78d68711b2348a938fac7addb3126b74a8d17027470be3c1da9047ddf5e6b540000000e292a87e3574ff3aa4de6b282fcbd503ed84847bc9d69c0a3c72a869aff989e7a8f3977264a34b224d487b53754efd983f9227cef77f760148bd79e5684972c4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2856 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2856 iexplore.exe 2856 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2856 wrote to memory of 3024 2856 iexplore.exe 28 PID 2856 wrote to memory of 3024 2856 iexplore.exe 28 PID 2856 wrote to memory of 3024 2856 iexplore.exe 28 PID 2856 wrote to memory of 3024 2856 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\26d82af6a31ba6877be1c8be80cef7e3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2856 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c3e9db899953db2bc8d71945ee181328
SHA12f3d73f4a2bf5e962c1be5e7eee06026d54b0c07
SHA2561f66ef1c3b3f2ac3622a3e23049da38fc70345a5774d0bbe01cab95080b00fb9
SHA5129bd607dd09809313d0f3c1cd3c1ab77e58bbe20cc3852f7c16f17f295b34b50cd03a075eba7db0eaa1297b2f0db526c3928296bb2ed6cd0ce6aa4b10617cd535
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5844e7b08c105baf27f9c121678fa650c
SHA103262bc17355e46dc5ae154453bcca3332add7ba
SHA2561dca0d411f2f6e6a49a0f4d422849e664b776d13c5be17dd1ba3f42d60117812
SHA5129c17a67c9198ae2c906bd1b44550f8096a3815e1974bd70629252bf653433f11e4cae832c99515ae7b0f22dadd9a201701e01e2feaad8d7c5396eb64f5654d8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD595455ad7937bbb292ef66991b54feb61
SHA1c9f124511829087ba23aaf007a0c39dab7ef5047
SHA2568d402afd2a77fa99734327dd19667a393493f787c96e844c2acd5ea1b12b358b
SHA5124ccda28aeb993abf28c37ffb0b195a5f7c5f543060f72119921d05ff382c5eb851aecf8472c108dff21617e158ea1b8dbaf20d4d295d077b09c9f9b27fe85381
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5318f4bf27d9e8957bf949756c35a4229
SHA18dd5012cf9503a198232cfeb283f8f066555be9e
SHA256447f70dbed43eb4f8d2bb68963b14356326db177f1fea8e2726f447f2b5ebab1
SHA5120730a57b6c1570bfa7be2e9f3d44b705d699bfc64098966971e35f5897e55790ee8cbc589ef37ed6e4432d8d29cba9b77ad397ffb525bc644863c83d5f4a8623
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD501ddc3352c4c02214ef461e489a663ff
SHA12e0085666ba413e2c531b2adc1095b551f569d21
SHA256d3cd14822d72cea07e620f50b485b45eb168274819539bfed2e733dddbd158af
SHA51273801b537399fca272d9b956469a0096c4b051d3eaa7b5999ae7ee6f4d8c01e5acd184454870406479bc8547b830d82da9e06d076297dc6ceeea2c01a20471a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a36777a28f7315b0232bfa60ba953471
SHA1749374d26ca8f57ac5c004e83a570e147b6bd187
SHA256c469222c37dcf0c34e4ea18ea9607e4145813bcd70e1633ca9b705f05b5625f0
SHA512792bebc15a4a35cdf1b674a0fbc8909aa08201d6433f83c8eecc22c237b631cd6ca6fca503ed4edea590b71321611ce62995ef52bafa91657db6af51ea154442
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ac16150f2d66b0f92503131bb3e2c9b1
SHA14bde5156870faf9a24b768ba3cb0503ea6569696
SHA25660dcce9330361a8061a52bbdb3a71de63e3fb4ae9005b9e57563cad5d1699c59
SHA5120571b3680723c51a3911b04882b5d24c11ad4a8708aed9c9a726ad805a9baf35ce9eb27ab2516de90c742f898fab98a8339570fdd2150c8aef2b2f5afae50705
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5399d26bbb4424d48f9d643e493e79285
SHA1bca7b719bccf97a19c157aa7b2f4aeb5710c1dbd
SHA256174a12d0309680ac4ab0799053a35762582128f3d89af69166d1e406deb664bd
SHA5122e24ee5817e9114b6293d4538d32dc5c704e8274562686c75f628c989841fd26aec53af9a04769f29387881e4b1e2d382652a4183d82bef1bc5aaa64ec4d7bb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dbeba94009277784b9a8ae9e1f4d28f4
SHA1de05a521fd90801246237edd34e9be606093fc22
SHA2562c85e0e0c56040a00a5ef67aafd170e8d314a185f897a3ab705f378701209be6
SHA5127b74a3a53f1e0f887158ad8d62fff573459bf419e0faaac6678469991b3d36057e137d4bfb0031595517bd33ee44d64fe4d979bd5a6809259ca388d92d0abd56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e9c3c7d0d7081cd2054a41331f54b467
SHA1da0c3a9930d16e3aadb7e4be0be111413b4e047c
SHA2565559c42e84a566dec0d147e127c41a127f70c08dc7207cc218cdb52c24336315
SHA512c07a1715fa8c1602a1e4f367136c590d5124da24d2244bf3e95d422efe31d99ce92acc59c9026260500f28d3321776739d88f563fc0555ad88613a44e731f614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55bd0e5d2a4e75d082a1e556bbe7f7a46
SHA1f0a7776a12c8a9176cbbe203f9614e0ce6976819
SHA2560be59623ce4ef4e81052b9f2eb68f59169ff9a34ccd3828f2d85639fc28f53ff
SHA512f6fc2a99190e82812ba49a7a65654adc8f873c791398bb8d0cc1f36752787b737de910715c421a366e50958b1f314c911073439dda4ad4869d9afda41d712646
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD548dcf44599474eefe1fd081e09d84fb3
SHA176e855fdfb31034048583246cf2f90114f72fa3e
SHA25648f5c57f0abbfe718546b994629a665fbb75d18ee1170075e468ece7ab55b326
SHA512bbb5c7e2030421db7b1d4692715d5f116f959932bc97e27fd87641f1e026e266cd05012c023cc68de56528a9daaae4eaba48f01828664a33153a6dfdc5862b6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51c649649d39b3e1a062690bdab29c97a
SHA1bda5b7f1a279dd4328b31c4b446c2a5e7b4c15ac
SHA256c3899226f63afdae6c2aeb726994d172bab4b1d43e2f9b3f6b1cfdcbd37e5e43
SHA512c1be0909d38e798e04ab42fda6ede774b4140d209e8621c4e87b4305d9af1ab267b23df627fddc6b6159e2434e06ab150fa3e302853acfc56d7ac7e01370c37f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD542cf9ae72249baeb3d7ca7eb84505614
SHA1fee7e42a6d83e588cb1af910ae4ac9ca624a954f
SHA256f72ce257991117dd671180001ec7742f068db85a936b106c58f3dcadec185ffd
SHA512999f07077cc9c4beee1348a6c45207711a05404971200a5930050e6de5f7e2123844d184d99756fdd6d97b61d0221def4f473a63fe4ab8cd05219a464d5de59a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5aa0a5816b7284311ce79fdef762020aa
SHA1d310ef0e7f81f5fc1c74e9994397c05edc705f37
SHA256d6588c1925ea94cc5bfe5560ab22facefe4da6ebaa34b57ba34aefe4798c64d4
SHA512a68048a90382cb73f376a9a4bd0967a4b9b5f80c737af4082dd5ef5da00c81d15ec2f3b2948fd7036c3b3405b0e924ff7af9095296d2977eedb202d190c393d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD569505aa517557364a6c9a7859247a6fc
SHA1df60880f4a41cf228c0f46a71ab98dd32560fabb
SHA256e71b767d88fda48e83f87af94567d24fffedeeaed5219a6665bf5eebc0c6130f
SHA512c45694f5a06c0bd6cbfa22755e28c0575da40ffa888a8aea336f523a74ead72f848c08745180bfd811042a8b39d8446ed2b026dbe8c6629cfb4d537daa596ed2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58b56346055de6b33bc4b0ea6da68af4d
SHA19ed13100cc53104f99efac78f6f8590ad3fab0b6
SHA2567cfbd3634f4adba7d6f47566c89bf1e3cf5ead42586d8fb5c4d85a196232064c
SHA512dab2703be6739045c21d60e74b11317607ec3ddca45c02c03b4b3f4c545c3a41b83d86807be2941b7ba8dbd3fdc4016849db5d9833ff3ae236f37f8299007deb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58029f0813387e207691a7b82dd4f64c9
SHA1686d2af393de80102bbbde22651ab00e9851c018
SHA25690153c322fe0987e4cb04e30bc22b4e8f53f8562b9b95035c405494455ea5f37
SHA512c1129ac3f31d8fb2e773d1cbb412981a3e07cff636558e5339826b690f8e4c282544add15d88d0806debfc7f2e55cd6ea7bf4840091fa55005f7c41a80bc2cb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD593de8be81632676fb7137e187c6abd57
SHA1537f4ecd5bb44ee24057089236518518023e8674
SHA256c9807aeec44972cdbcd50f3f6150dc65656b733d9578cb5560487cbe925f9548
SHA512c77ef81750cb4be873baca72b7933fa553160725a7468545c4f8d5403795d08135b0bfc529c1a7537ffa72d3df6eb1bdbb9bee32f73b2ef77ef257fefccb1ad7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b