Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 18:20
Static task
static1
Behavioral task
behavioral1
Sample
6085f47709c28fc37cb083a0d9d4dce6_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6085f47709c28fc37cb083a0d9d4dce6_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6085f47709c28fc37cb083a0d9d4dce6_JaffaCakes118.html
-
Size
83KB
-
MD5
6085f47709c28fc37cb083a0d9d4dce6
-
SHA1
261f23a99eb10e46dd927d7282a470f4e1ab7a9e
-
SHA256
6424adbc92f2394594046bf3237b4e311a72b1cefaa533b8c9103cc68540f57d
-
SHA512
5ba2a78a3f2dc68a2105a4a81f9caacdb3bd07d729389ba03b540c4d58a08d53832b109cdd97a45bb425dbb03677b875b14e9e439fc7532699cd5280c3f43908
-
SSDEEP
1536:9pPMlbN6FJbTM7NbdaYxl9lSWE5/ezOlSYqKyM4WvsUWZkojNqZnR0pD:9pPMlbN+bTM7NbF/E5/ezOlSs0UC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "14" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422391129" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DOMStorage\stripe.network IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DOMStorage\m.stripe.network IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DOMStorage\stripe.network\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DOMStorage\stripe.network\Total = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DOMStorage\m.stripe.network\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B6372881-16D5-11EF-92E0-EA483E0BCDAF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DOMStorage\stripe.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DOMStorage\stripe.network\Total = "14" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DOMStorage\stripe.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DOMStorage\m.stripe.network\ = "14" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1740 iexplore.exe 1740 iexplore.exe 1584 IEXPLORE.EXE 1584 IEXPLORE.EXE 1584 IEXPLORE.EXE 1584 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1740 wrote to memory of 1584 1740 iexplore.exe 28 PID 1740 wrote to memory of 1584 1740 iexplore.exe 28 PID 1740 wrote to memory of 1584 1740 iexplore.exe 28 PID 1740 wrote to memory of 1584 1740 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6085f47709c28fc37cb083a0d9d4dce6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1740 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5029bed6d13835c4b90bc2fa4c638fc15
SHA15c0693069cc807af4c42e65f820ba23f100a5b94
SHA256d7fd561cbd3d9e754d0de9f623d255f77a3fa298806c0c0bc91c16fed601e64a
SHA512327133e5503fa7dee13fe60e3131ef076aadea6a2871bb130b7eb99d308ea5497eba63e0364425abeb5259e4dcfa094b5954badc813b90d30dbae121c31d1664
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a6033cdc63cc654e18381092476331c
SHA1ad9519fc54982187ec3f9a2233c68dba35b5d11a
SHA25687c3d00850af4b724db51770524a45b205c8a8f0fb3016b201d56c89f5573546
SHA512bf6b8dc814e0bf943eb3880fdfa538a2fc9d5a9698b54efea2d8983e5a1ada92de9f48c3a63339c0f2b0c1cc9a64ce7ddf17744140d6f7ad18764ded8180845c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e38d858b81ef797e2d96132fc3a5509a
SHA12cddf995f342ce9592124e4c86cd9cf16f9627e7
SHA256c35cde5101cc93c6bc8088011ab313ea85ec75d58dd9a829eb1e34109ae81e29
SHA51284a88a29efae644a60bc901188b9f1c9ce32ecd3c797d3f3a87999d582281ee435af021c8d5b1f37b7509a64ec78fc4b1e0335c6906ae679b9fd4ac934ea8265
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dadc11902078faa2112dd7bab843ca9e
SHA10e05f78aa296c0a5b3a334fce8e8c8b4fdff2b3e
SHA256033702987a573697d2e4795ab77e6c01066380505c8c66e9dcb260c4d2f3744d
SHA512b74c59ba28fb6f03fbc03f4cc6d42ae9f4fff4c15d626a8c3b075cf2c72826930f29044343ed386af933ca21ceebac42f0f57bbcdc55b5b2c4476544c8643fd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa54d28036c011e621f03416da3c72a5
SHA116fb7a09abfda63883827cddcba19fa944432821
SHA2562f5a8990d85fcd4d20bdbfdfa8bff6808fff4fc83e2891ba85ff9d3f8cb0b197
SHA512c5fdf55bcc71bb4e383166f82a031147ba8cc995d94cce4371829693dacec9b2524ef87b4c38ed61a2ec6bbac09b9ecc6974cc48e59be5f9b42a5de1edafee93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533db57eeff84416f83a13121ca88019f
SHA150bc28fbc8c2fce5c06643f7b4a3733e4bbcf91e
SHA256ddb62f488ceb2cf2a968a293c71c777f0a82e625ff73d33a1c153a431cc42950
SHA512e8952dc10747bda36a54173a335790fc308f74790c47543d2bb247d1df9121e75d86f9c716397463ae6ef2507932339cfcb4284ecf524de11e42ef7d02f3269d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb8b72ecbc692ab7f7e99623e771cf4a
SHA1f48e9a4006052e79e5215228dd014f4414978eac
SHA256dd3936257292722736d23f15192f31de8634cccec4fe1786babe4609d2f4a5f7
SHA512bc6ab8611a43babb58f415105fddc34ad4ae7f78f2df6983487e2fbc80bb79dd94acf44c60fa75a773a1b5bf23fdb7ad60746b285bd85bab7aa11b113fd73a1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538d2726e7eaa6324811675bcfb43be87
SHA1ef18786c591e9b054ce786fdb175925e3c5e7ca7
SHA256411bc5bfa80f043415c413174719192ebf0b1b31de3a7eeed45ff0754830b74c
SHA512f77dab17c4abc2dfc5d504714da3db6ece6db38efdb5c909bba303095bfa4df91eecfa78607ebe7c7c96a7529782e9192d218b9bc4a54f597d4ba54c4896f407
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569212788f2076157a71b9d578bb4a7ee
SHA1885d18a8bd6b7456bcb809743c443958276396d0
SHA256d8ac78039ad8ce84ce4348ceef662edeba843ae4e1f569afc00677d1f6b1e0c4
SHA51292a5cbe089e7a465306ff9e9ea7af2680001b10876bee59088ebaca45f19db2bbd50268bcd83949f50e12b54c4ef750368f2ce78b0171d04f3ec262195db0f43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbcbe27abc67a0d6122049c93286caab
SHA17e1bbf1975fae4193875d73a6409b2955111a625
SHA25634c571dbf6b3ea9dbaf2aacbd7cb49a80fff1c9dfbf03cf2eba3f754700dc428
SHA51284b18462aa20a9714d5d2e522a3e054b429d00e8abf3bd0067d994f398b9fc4090d30004c03587d4d86ad98e15e5c5d78e1cadfbdf83f819b9306adb6964f54b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578102ff15e56efec441bda084487a39d
SHA12a6dab4bb898889cf578cd0ea0d2490ebdc09c2e
SHA256e129ee673e574cb504ba90dfce6d73f401d11e21a97045836db21bfe2ff248ca
SHA512043c2f34ddd5b7d41d5cd8a8beab7443fd1421dca17bd7f85ddabc8eaa9edc06865f8122f08673804c328d43c5a7606653b788d69bc1575583ea7ed172c15af3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1cd7fea3b10801c2972448efd2dc5f6
SHA1bab5a75e2d351c46586406f7fd579aa90fae9abe
SHA2567842a9b17a47423c35d3de0522ea0addefda937275cc629f2c601bb41d9c5142
SHA512b580b625169adf33a4adf6cae0045b3e42c181413c5ad7bea157d1c3f57e08d0e66b45081080e0f5d5f2425068538187febd3424b8907df62d3d444ed32ae632
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddca5e62f32f86ca2ab7f9e97e2c1718
SHA1a63384051438288ec6a608bd953b19f1007f82e6
SHA256cd955ca61d15ad4e52bdd693be99612cae82d191096a588a88ebeace6a348b02
SHA51221cceccd4c95f4849bc95235732fe1e8f166b400b4f32be3b94c1e63f91a558c1c6c19175ac055ec68f97226193f6dba70123916287c2b74133f16379a484419
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD59f505a38e2b41247d6049e294dcd52e4
SHA12abef8f8e3aeaa8203524818d65150b78939905f
SHA256af190bf285cd72ea61c9874bc02718c329f8c7c3ac51cdd29a6e347a00a4cd31
SHA5120977fc7f150f0d394af7e41ceedb08f13f7af575d20d73fcc9c74baca9dcb94454e25dc894f90f573771c6a3233ec744eec58595e5c09a29d1ea5b214963bdd7
-
Filesize
13B
MD5c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a