Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 01:52
Static task
static1
Behavioral task
behavioral1
Sample
6cfc15b66b98f274ed80a6694b90d7fc_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6cfc15b66b98f274ed80a6694b90d7fc_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6cfc15b66b98f274ed80a6694b90d7fc_JaffaCakes118.html
-
Size
81KB
-
MD5
6cfc15b66b98f274ed80a6694b90d7fc
-
SHA1
d4defea1f03320ebaddd80f0af8290d9b3d81a58
-
SHA256
dbbd6f9198d51545415dfa8e8b4ec2f6f24e177b4928a8bfae71204a78a22b21
-
SHA512
74dabb05ee5e70c02827405cd62dc37a1a075cd1295ad57dd1b6fa299f66cfeec51141fe936c7d3e20c914264057b4be62c7c8d1d9b698bdd18ece0f41a4d233
-
SSDEEP
1536:cpPMlbN6FJbTM7NbGxq1lSWE5/ezOlSYqKyM4WvsUWZkojNqZnR0pD:cpPMlbN+bTM7Nb64E5/ezOlSs0UC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5C8CD621-1970-11EF-BCB4-4AADDC6219DF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DOMStorage\stripe.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DOMStorage\stripe.network IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DOMStorage\stripe.network\Total = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DOMStorage\stripe.network\Total = "14" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DOMStorage\m.stripe.network\ = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422677454" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DOMStorage\m.stripe.network\ = "14" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DOMStorage\stripe.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DOMStorage\stripe.network\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "14" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DOMStorage\m.stripe.network IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1704 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1704 iexplore.exe 1704 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1704 wrote to memory of 3024 1704 iexplore.exe 28 PID 1704 wrote to memory of 3024 1704 iexplore.exe 28 PID 1704 wrote to memory of 3024 1704 iexplore.exe 28 PID 1704 wrote to memory of 3024 1704 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6cfc15b66b98f274ed80a6694b90d7fc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD56431516408f5bc74e241eb16d896855e
SHA1fe0d2ede0280147975e842f58abd18ce6873f4b9
SHA256b8d7d2150895251c7231567f609ac82a6049e385d064d101bcbf307db2a4ceff
SHA512bff24ab1ce1768cf877e53369bb63d0deff5c3fc156444a35833c71ea1cbd5e7228cfc6e96ec4e0f8305566b52a976519226cb3d6c8d71b4e2dbb60797c07c60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0dcaba1448490f6ae1090d6a52a4ce7
SHA1ab17d83055e1af67eb0b45068d66cc800aec97b1
SHA256b3c66a531e734110c199d51da41fa7ab11fc56cbaec811b2b5e43997e71a03b9
SHA512e2f6c979cb89eb95366c75ef0edec1580f4d1eb498d8685fd813aeb38afabb8716adc14002378086cc2065f28569f3e1ca025ec98be155cfce0e73e5296a8fc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5436ceb6825c20ef106402436baf3bb5a
SHA13af294be076526681e04d7b26f3dff1c8dab90ee
SHA25633355627eaa68b2b4e7874dc04b1c59ea8998328a482fadaf4697481a0aef4a5
SHA512de31ec7d532e9ed763f2d6aa9f5d26eccb142844a06aec22a17c303916920666af620f6423c9114041d520cc3cc6dc6bcf8537ebacf689c07575ef14669f8145
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57efa97b92093b73f9abe63949c354df1
SHA172aeab2015bbb1beb84216bebf21b29db2690fcd
SHA256dc3c824519eb3773dd90c07f54a7e209a0db7e8958ee9d65e784c4b8bba9ae6c
SHA5124075e559c583942c432bfb1edcbe2f4afc003cbbdeefd1715b0b75913a5c0448d570320d011068d5431667bf6808869720199300965476377282d578a65fef63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56612599bcc7c4a14704a5bc0457b3f87
SHA13abcc050781bac5e966c8ff6807532a94acaad04
SHA25698248bb38156d07f7b91ccea2885f0b1f1c0db2a82726114bd4110358f1144a6
SHA512f02eb7893544588c0cc91c33029ebabf3f6d0f29d557a5dcee2ef3bb65d23c990a7aa0ae5fe0e8abb64d98b76cfac65d11c143ccc2ddde956447ed08cbc313f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6ef8fb3865598a3fabf3710982e4920
SHA1b244eed8a0457c151e2339272a8c6021da7b2ed6
SHA256be16bea127c3086b609f7acaf440cf013dc2fed24db8785d1d30d7fcff8bcbe1
SHA512587e1580aa451c856524be7656900a86d75d0d07a551f267516780d89ddcc3bd4766c08972aa5cb6308a3343889b14222a0e7119074e9cc21fcb04eee76056d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9a6f1ecb84f9d2ee9b31c16738c3a01
SHA10c40031bfe39e35c6ff9ee14fadcc3cdaaefe109
SHA256c62c2d4f7969b74c4ab04024b32aeea89573b5d254e01e1db5b6f52678b716c0
SHA5120d58cd98228211769611306776e3815e96b971b46c3dc9890661a9b6778265281768e2612aa021f0019b27ad67a92cc7fdc9756e9948c081dfcceb6a641a0de3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbc880eae72f63c8fb6ce4b7d433890a
SHA1bae5535abb242295d25f4f8943df0593e2b1c244
SHA25661aa795f7cdca3419e38ad97ff13ea8c616a61492715d2355232401ca768b1af
SHA512fcf57d5ad33bd6ba9de29b7fab882b611c934019939dfc9c50da099e48f0ced1539d1f7cd6f0261ec27219f443a7d26e43af6b204a7e3783762f2aa5a82bc16e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ea66203064b55ad175a0dae535c0849
SHA167538ff1cfd08d75f0e6060d21ea9efd0902cc91
SHA2563928ab80ed30c789d3be420f5b35dd46bd72c4ebde8e1db8c6f477f60ac43744
SHA512511f91a4c0d33f4776c55cf73260f293700cf5d9b34ec7c5a592b7b9cd44262f332762b6adc9da56949a2a534bf4a90776b7bb28bf03695716fff7f77c1810b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54643850142ba1bee66c6a0f0d58f5ab8
SHA12df5e7226bef79b8f1327db15e5b84e4b395585e
SHA2564f2d504bd533d8ed0ba2897ac596eae7ee4cb63cce417f8a0e593d3b299cf80d
SHA5129b27b9e16c520ade6943796168016576fd95c25c1014f2561f69ab46300fd33e1ee6bc2f058dda2015c5a1371718baa5de36a5f8fb8bbd42cc50b7140b96615c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f21db02dd6353ebd004545dbbef4d234
SHA1ed12033dc2a3e930f9890f6af62c07b7eb8c6e6d
SHA256e4f941eaa090fa588afa02a56fc565d339791a29734957050695e254961d95b5
SHA5120257e535eaf9b534cde63ef9a0f5357434c52b83c42c692798bd8f8a9a2b176466d6803b96e00c6645077b1e38884379d2dc13a6c70ce4d9eec2ec6a013b72f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ffc54df4b7914c08050f5b2260e6b92
SHA1894699839c265e4b46c523d6d605bff3947751d9
SHA2561bc181b421e6fad50bc39d1e47d373896fc95016d681bcbe79cd57e3d5cefc68
SHA51257d9de2836200c2692d09d44e54a5bf33b2f5566c482352e249b754b194a87f44a398ffd0fce7ba8156360902a361bf2e6ba6265103cafd3f28cc59d9c6c175f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5e230aa64059f011b6e4a522ad68ef3
SHA12f28604b86a538ab9aa905ba91e055a5da73edc5
SHA2568b044a877ccfeba0baeb5e4163f8f56f1608600cce71c884f2b2bddd07b22386
SHA51221cb3738877c91a0f0adf657a913ced78237bec3e26da6c5008ec3ac3dc49448451b0661d65525e11a144ce0b9c86f521913e95127f781d0c95171d1c95927b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5bd70689efe0737424aa6298c42495b91
SHA1f1dd3df7fbae9ca00d88fa7b7a680426b7018290
SHA2569dad7c2ab3ab822c6d32fbfb0cb1cd0ca503dc14c15b562b1f656f45312b4e14
SHA512d0cf7b4598f29e327fbaa5737cebbd53241edee551c984e8329b69ed00ad9934c7c4f2969c27b469ed0ec1a06338bd9f34ba15e20a7a90492108ca4051af76cd
-
Filesize
13B
MD5c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a