Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
05/07/2024, 14:36
Static task
static1
Behavioral task
behavioral1
Sample
26f97aef096f277b4f8daddccd04dc98_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
26f97aef096f277b4f8daddccd04dc98_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
26f97aef096f277b4f8daddccd04dc98_JaffaCakes118.html
-
Size
17KB
-
MD5
26f97aef096f277b4f8daddccd04dc98
-
SHA1
5968e9633f43d2dabe2e6e6eb1e4ac70fca511aa
-
SHA256
e5bc41581b68f519b1968777b662c6f1344afc935187a7b3acbd75a69897df89
-
SHA512
f8d0d9069f39554f518b2f2f69d175100f38aa4106511e007c9c1b7bfb3197383d16b39de9a1836f89b560dbe99436520b9a12be59466b642fd0133e059c6e89
-
SSDEEP
192:OkclIsrCGu55tJ4IByqTGTHy9UoyPVNS6dqnX8k/w1wvqLkw1Psw8uBuLbdU8d:PclIcStJ4+jGTH8qVNSeM/gRPsw8guLZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426354866" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{81966601-3AE2-11EF-9A4D-7A846B3196C4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000971c030a8fe3644da68f410efa619e820000000002000000000010660000000100002000000049f2146917b150182d796b2bc95c91aef9f1b90484538d80d13998c220ff447d000000000e800000000200002000000079a242ba9315fcdf496409a41584dfbc0d2c14c310ea315479b081912a2faa5a20000000d186e9967f8aace2b94f10f4dd6fc85b6a1ba42a4cb00962f8f3b1eaca2cd12a400000004ce958776a64c34a691788e173042d8d8378b77335f9b3da471786545cf61ef29c2d4e1acda8170b60522d24e94ee4523ca617074dadd212bb6b8ffa623e7902 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0d5756fefceda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2280 iexplore.exe 2280 iexplore.exe 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2480 2280 iexplore.exe 28 PID 2280 wrote to memory of 2480 2280 iexplore.exe 28 PID 2280 wrote to memory of 2480 2280 iexplore.exe 28 PID 2280 wrote to memory of 2480 2280 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\26f97aef096f277b4f8daddccd04dc98_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2280 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508e5ba7f6c11a6a520b12816dddddc9b
SHA1aae3eaaaf1c977ee780a6f174dea3269f14dd19a
SHA256c37b35fe96ef8ca71fdbc9ae9f1bf9f7666bc6570968108088f383b14b1277c9
SHA512327daa0dfac107f9bd282a8f696cb792ee9e7dfcb02a7980d31b0b770dfa34cb0d70e5a89d17ecb1b3e7b162642c161c2677a49bf2cf8ff50c43bd9c34ca1ea9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5816688f1897f77be3bf1a9fb0e522c41
SHA10d4c1ee21e327cc398bad70e3d3d392dde7d2ba4
SHA256319a389c35a2e3026a70167029a9104e01598ea264dbfa0a3f497836206c1cc2
SHA5122b02634834f3204aba67850cd0fc1be69024c2f254b3280cf52cb051a00ed39208ef53bf33aea0824ab78b3514cffd159e4e45205e55cd20b464085b85b513a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ce3daf61a6507b8dc8e262945127df9
SHA1ff44618f5b7d485147becb48a3281d3b2c25c413
SHA2568b66ca1a6a11e14d825f398f3dfc53d0a3112035dd25be19fa39145ba7723574
SHA512b45ccb9bf230bcd2fc4fd48f993fbda3d6c41a6c4a4d2805adcb3e43575fa044427d1d5e3d124a860da72f64adbbc47aad9e25258a32e0e9a6929329f4bed098
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5087e0bd3cb508a9c07778a26853680df
SHA17ac55d3b72a7858678b249079d5d13d72eb69406
SHA256f01eaea82e419a8a1a8a2d132f9eaa89a2ddff7d9263aefe06ba6dc856c1f668
SHA5129ab0d7f7a61e2ad7b5cf5f32167edc620d665e1977547145c093427813540345c2ddd185ff66ae384128f53f219e0c9fb9c4cd0af59dedcdd4ff5136fe22e23d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511437ad296e5f1d324460ca44f26aa45
SHA1d8ff928e83e822e8bc93a2986b3ea5dbb21f7e00
SHA25643705cc2c40683ec89e4baa1024109156bc7e3d81e21ad0622e9c248ec33c57e
SHA51227c97576828539d06e3d10f74b0581d14c260ea937a980b3c1868391819abc9bb49dfef383dd7685e9c99c7e9ae51aea907f422a5de21bf28971f5590cc594c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504de6a47dfc579987cdb660579f298bc
SHA1e1acafddafc2a50db120884e4f701b5ef0e49fbf
SHA256846266e4c0ced49460fd16c7da34e2095d4bb6a4557fd02609eeeda0a594be7d
SHA5126bd0f85bf5aedf2534f1aa6a4908693d67d7dee88837a7ee1e75d229fadc25dd73b829124fe274e2b1e7908f774cc27f8b65d303eb94184b51148c6393421766
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54de666c5adb0739bd369b7db4b1fc29c
SHA105a3792214cc02aad5499e8cad2f7b773d6369b1
SHA256862bda07bd09b52bd81d006e4fb8a887edb71a7398dd235e54e27419552a58d8
SHA512452f16e84850e7f4d9fd34d5a1e7f515b5cad47427f01f218e907ddad1eb0c2eed8c7614560e75b9fc763541794e32b753fe0ddb1189e0d743581ab926c11889
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5066adb84f304e77cafca6442cff43e
SHA1b32dc9d9433d61a64fa825c02847d4427395357f
SHA2568a21e2925ff8643d0de719b2b431a5fc066a6291a6518e60a5d76e3277c5997b
SHA512016ccb5983a8ad7aded9bf0d839f519ddfacf662c659be6689a68f2845d6f5d5a9311ccd118bb64b56d32c88da9558dd25b20cc397dcae03d69bf2eb70948ab9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9f78e32c55c2dcf1874be6449af3748
SHA1bb7218c60bb4c2ecdc36126e060bb5be2d79b1a7
SHA25608eb6363528f86c900078f4c314eb09aa9b708d2d10b7eb908480e59ee082a7e
SHA5126623ac92513bf841cd311f1e3ec6e307c8d5c3ab9dac6578b79a6d4742e2c2fd0c88efc54ee2f9c48f0039d502cd9c817b15d483687eccbb9e6bcb572f07fdc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3089fd4f1790b84fa56224423fd6bc2
SHA113dd5bb527cc145d69afaf4d4d078970e8542797
SHA2567e7b4db7d7d1f14d0f37a6629c0de50c685ea1db34456c88284535317b571593
SHA512366362c6df5d5edfcfd43189b96d1cc1052d4bd9e1e702d9fa9cd8dc06b19f9703594f491fef6f92558fe4ac19312b3715bb9e77f3034562b368fa688be5a68d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565be766b453ecbacdcc20d374732a3b5
SHA1b02041751e592f28f63daca094f038842f75a65b
SHA2560cf6ac36e2b46d11f41c43a2bbbb7ddb01804cd98285bcf460d89b810c5cc1ec
SHA51211c660faec05d96751b50a557a4861e9ed4342f37db0dfb279147b9c81dd1d54eec631d468680ecabf6bc7dfbcdac753f44290d05c6b6c80759a4e6a42b4e3b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c33a0e1d6d134f9701972ac13f462bb
SHA1c08f173fc66d066797b8a81a2dc2db2acea9f086
SHA256f101ee2a1c22eddda097ad35ba2d6d473980a1d68dea836b17303e6cb382ceb4
SHA5121d47e74ca09e188597fe6e05d0c56d05573c1e3632d49713af52e3914e56955091595bdc326fb87089d2539bd1710668ef692b02fafca223414fd89a78cc5376
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e53fd3ebe3d17b4466cbe5731f5efd10
SHA133361d2540a84ed5fa5f132c1ee7846a89dad3e5
SHA2562d1c776cce230f438010a58569393a426fe37d076e425c6952d15c8e94c4edea
SHA5124c26c1ddcacd864acb36fba7866ed17cf7a3d0089352b7ef097bdf3655238caec8f0747ae25dc5c4cfa44f5c9939f8103ee1ae52725142e15fa41c9629beb735
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517e8725efeabc1065d4ad18c6120fc57
SHA14a4d3d4847d86d5dd285c09127d354587f43cb3f
SHA25653cd7de1fa4a667318cd040d213776a79f29d5ab00857661f1b7941c2d60d0bc
SHA51251f214a7c78f8c1c55e6bc6f56e0c073ca7aa931a27ded1152dc45b046b09e8612f7f6c34d6836d8b2fcb5784143264a3dcec54668ce3bdbd962d2d810eef03f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572a256058196cc29d17280edc6a44ddc
SHA11ca47b5ff68e502e1d113ffc441bfefc038e688d
SHA2564d2a92dccdfffbf80305e50086e0e822de747cf70f8d938e11574cbcb82813ab
SHA51228cf31ae487b7a0a93b48b4821859db04293b2313cda9d8804b8ebfac2fab65f533907457aa9b351cf1ca2f1de43e736bea3f721c62bd0263d1fd7209cb0a97d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5739d4a98b99d0efce327c691f6bf66cb
SHA1962f25a693a0463001b0110385ed893fe811f7de
SHA256ee7086a2928447274d2c9f4a704fbbd24025c19decfedd8ddb7e77ba4e9fca16
SHA51281844eda2aa2bf3179903a8e6307a70f26394623e9c99e1bf6fb0291931d71441ece14918753a05a04322ff446939f54589739f5a07835be4915ca88f67d143e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1801b9e54a60054be65dfe784c09999
SHA1674249da0262dd487badb6494accc608f84d0cf7
SHA256335e0c3b0d59d772c65b415c49c5bfe82bc6c51134614479ca82665ed465f326
SHA51218da89d2d209fffd1479edc1316fdf62f157b9e66d4bfb271789b814330d0ed173db9c36e583df4fbb1a1e055423ce4f4e1895d9e60e3c856d990602e16bccb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d20d0055e9c2559e620cef8d902cd2b5
SHA1d4ace98b4be6796eef574983560fd8eecf6bb5d3
SHA256d01f8571440ca06b19508e17fe0def9bcc0938c91f582f7f2f485a0598b33b8a
SHA5123175e3bf1445c723dec2c1f153c2ccae97ae678d55e80f5f0a957d29983add8f043a2ed30d0864ec909915e668aa27820ce5cda9553065d1abd6bad686a1b99b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5647c3d3491895b7f2f1dbbde639387d1
SHA1c4a1679cdae57fd684526242acf015ad40caaf7a
SHA256b4042a652a4b2c23f276a2ff3584f425af10f0cf57c34ab2454d2937bf0c21a4
SHA51258e78e7a0b61f7fa784e27a22c88ea1a74dda13d6339ce1fcde166d37f6d4deb2c88ecc363a40c721eea53eebabeb0bcd07c627bcd047cf9540dbc89808e1458
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b