Analysis
-
max time kernel
121s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23-07-2024 14:45
Static task
static1
Behavioral task
behavioral1
Sample
67ff102f37da0cf51e9d2cd69d08f925_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
67ff102f37da0cf51e9d2cd69d08f925_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
67ff102f37da0cf51e9d2cd69d08f925_JaffaCakes118.html
-
Size
21KB
-
MD5
67ff102f37da0cf51e9d2cd69d08f925
-
SHA1
1a76d00feca14a07fe6a9de083a5a7416ea6b2de
-
SHA256
12c599fea54afac63bfa0770af50a7092873013a079e4462efcff821bda3d0ce
-
SHA512
8ff6e16260512af8dc33162f16834f17256341fe890c2c72d6469ef63eca368d6a0b80641baf19e8c3c5b13606e552aa0c33b22f0a9c45a0c3abf5e4138eaa71
-
SSDEEP
384:FAwyuVE0CztfHmUjUt1EKycvKJb8kQ751tHSJ7AfXLmOP2uZ+n5N8Mn8SH7j6G:FRV8pfjpKrCJo/bxS1AfXLtP2LkaXbX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427907823" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b080551a0fddda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{44219AF1-4902-11EF-96B0-E6BAD4272658} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb780000000002000000000010660000000100002000000008391527bf2cdd4f182d3407122ebb93044e33f6ec1e9fea1497cf292c9e8c47000000000e8000000002000020000000fbccdc5f2a2b49c8b7f6e09174c0bd117fcbef8d1546b5b6f0520128b90ba80a200000006f0fb0a2c263d8fcf589e6282ae1bdb844492dbd47a229a4c6348993afa5522f4000000032fa86db3faaf44b8712c5a473f35fc3fb35c86c2798fa22469a225e8192cd80d3a01adbee55e748bd5adfb49c8a8394ec72cc2c982a383736b66dae793e38c4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1968 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1968 iexplore.exe 1968 iexplore.exe 584 IEXPLORE.EXE 584 IEXPLORE.EXE 584 IEXPLORE.EXE 584 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1968 wrote to memory of 584 1968 iexplore.exe 31 PID 1968 wrote to memory of 584 1968 iexplore.exe 31 PID 1968 wrote to memory of 584 1968 iexplore.exe 31 PID 1968 wrote to memory of 584 1968 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\67ff102f37da0cf51e9d2cd69d08f925_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1968 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f84df6318d0686675bac311e87883cc
SHA12ae8f60f4114c4bd8c760aa5a116041be69bdcb5
SHA2566fda3558d5ddbce19fd0eb1382ee0d87780eef8cd9033c7e089c940408fcbc02
SHA512f435e50b951a194e81080c7919d80990254b521730cf1f28f5f2fd20ea031ebd6ac46cae9718975dadd9de4f9d71dc233d9751a2a31467b135a58b7256a73473
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cce1e6e90a08a0bde6c49ba6757e4f47
SHA1415c3420b7d9a560a45e8971048fda75a7368fca
SHA256bb9d814ccb7b117bd6c611143969489a8f5c78df4b7a526074cb7a546cd97395
SHA512c57849ce7d62a430eef924f9356f0e9bf75419f9c52ebae897317315a602a457071d987da86494392daf09f1fbfe0f24df31373bf9ad911c6cb285a3f09dc541
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508ab20dc87c37023ef15923152756771
SHA13aad29174a19ca56bd6b6f40d7f45ec30185cb1c
SHA256630a3a0183c5fdcfbc10c70b5fb67545311e138f117f7a12fab94e5b7db90706
SHA512409cb329ef211805f410322b859aa6ae4371bc362aac77fc2c21a744eb49d499276b6169e5b818e2b28b19c0afb4e263487a6de3343bb932b22d9fa36e8af7fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521ce5e2d3015fcc43c0e2ad4a281ad29
SHA1359d4a6583dc92a894a451a9f994a22f8a479000
SHA256542d6820dc593224e0f7984f2a5ff5f6b1538bd802ba877909c0937eb0cb664b
SHA5121088af5d4bbe79949dac51ec266ddd13bc57fc87a5d25a1c3f56018c68784b99d2882039db3a8b0706fe22be74f1d79c1e4ef0b1db12b57f9825d2bb1afb2bba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fbb7e29f93a949c666bc5a3ec3ff2df
SHA15d45abe3599477eea6b3b5a393a7c1c2050962e1
SHA256047c7225ea0b84e8f8cf5a9681642e3117d19fbeb97d5fe77a4a69c2e05f3867
SHA5129386505b2e8bfe2b5617c4423e9f90e4ee2309dbcd3e2a6b5be499ea577c3ab2e0d2e2f7e339d2ccdf3200dc4bef1f2caa23f5ac821d93d6de965483f76cb5ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa31e6c07c0eb8d7c2309973fdd26233
SHA19aefd231cb55309b16e815786eb9c2ef841d7ede
SHA25619ff88ce7d58361e569201c0311f9977c37fb36617ba852ad8b6400d8d480873
SHA5122dc05b80a2c12bc5d79bbfaf634b9f8ae5218c5888662d5b43df21a1911ff52d37d436b455a8c7364e67dc0da6a9dd90c4f10b913be77d1a14815d9360a08f77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51600bf23ca7119f2dfba3663f76b82c2
SHA1af53ccd9c01b5f41d95ad3c838a3ed0f5cc3c4fb
SHA256b8293e39c80b530505872d3f9088ee5ca7cac25a7be383120efa37b911371977
SHA5123b91af3071684f59d691470d399a0612b4fa14259b3bec52aeea53b08f02de2b685b23ef396c9d758deaf827e2a56112bc8c46db95d01b0fdecf1276a357e444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b11b8420e244d7f71a33e202141c6c0
SHA143d6525518b4cb2404237ef50402870b49be5432
SHA256aca94b021f421039b32e19ecca9c245b6e7f2931c0582a97f0f51d3640cf072e
SHA5128a899b3c4ca9e95751ab62cdc9b2a67e344101ca645b8beea3a38a301f4d098c487f7e812e286d4e82a7b84bd61388bb956304631269dc3a3ae817cf1ba2220e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5142a85bfbe37d97557a046b59194d609
SHA13c87ece236f80d7154424e244e527fe33ff2822b
SHA256c4c937ab9e91f3be2f7814709339acf1e31b435903a3793ca8254ada5ea6ef0f
SHA5127f8510f592cae7056808d105f75eab947d68be27a7cb14e5614cd8bcad33b52aa52dac7f760e33008d56d1fe779219f983ed66f46890952b30c148593c7de154
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc596a1b7a404eea626c4d611bc36303
SHA1b8235b07820086320bce04301a6a664bdf6df0c0
SHA25666b801b44b5d0ddafaced6e576371a13560eaacf3b9885eb1de108f8f668318a
SHA5120cb2c369919bdb49d8b06a42ebd5859652dec244d7e8f8042f2cd760d3afc486262c8d8feea91260cdf0516d38251500dfa3130ec642b62658f72a7b88899d38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5681d8772f663ee3559fba2965f4cd47b
SHA1283a17ccf07f1ce0c30f9fa55214013cb6155ae8
SHA256764c8b45ea8a6245ef8a72c360f8b82c49dcd9713ac2cefd2456fbf691add0bf
SHA512390f8ae691df97b8b65d4471f3581442d0bd77a3b145d7bebb36743ca0a4a6146b8452f27c70acf1d6962c70d28f6ac0b79e141cc1c944e32bb7df71dd674277
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d0ffbe0c3ec5affd29d3956cd71e140
SHA1ac5a4e357f581a80300472b4503ea78e68e7a505
SHA2565358d109a5f54cc324c4f695c5b4a98403dd117083def55040e6a6af3915f197
SHA512cf28e92601d145396581961f966b9751455b3a8afb5e86a6c381b36bdfe87c0cbcf6ec377c380c853be58201e99671fc9e0fd214c7b452aea1872e1c841f9b02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50201ab321a4bb00a8e9959b3f35554ae
SHA13dcae981a59aacb9209a234ed3d37f09a959c365
SHA2568721aef249eea4658b96d92169f97b93faf23f2e694d8a26622c02a89bcd6fe5
SHA512f1874ad78437999b7a2b1578fc8ed91d85142be9ffa98350d9c5e8c90d219e44a0446236688eab5479a45b2e522cc06cf19aff1ae12b25c6f2fca0d5a3af8389
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d1641f2e78a0cacced8c4b0943520bc
SHA18f3b0effe7f896eebd62f2f2d520c6ab516daca2
SHA256bc3c4a19edfa6dec9cbd4ef1f3555a7e2894f910de7d0947895c70340e91bf67
SHA5129a7bc03bba2cf89669ce4fbe292301254ef9bd9c3250dceaf9f80fd5d4eba91669d32392ad8609fde56cbfd64aabc942b1cc19102aabe5f714111d85ae1f9902
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5831ddcaeb843b8fb9fbfac4c9ecb81e3
SHA14a57f4a2c850a1d528b39a8f79dbb2cadf58cf1b
SHA25620777580eb9c4a707c122fa3fc4da408d77977dbdb4319a564f258d4a4a4f1af
SHA512c6ce706d2ffc85f97186f1e4d232b35d62af3f1659360a6198eba46685b1a337758c2f855dffa99f2992f804fa2322cbb7dc2b55f7dc8e9c7940c7c372e63deb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e919babd3d9aa4b90620050c7ddcaeb
SHA1dbfad14000d8f3282074a2718a88da0040d25800
SHA256465126f4d88eb6f53c8441734c4ebeae07bbb228d24ee080644ca1b3e3fa466e
SHA5121680101707838074e1c4f1cb1fbd2a53d637fcf3633a46ecc091a82efea2e30b971c7b2204dd2ad3cf1e742143e9e993e13f7ca6335f99d853eb91247d0bfcb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b85a074c230f18bf990fb735cf04f368
SHA1cf15dfd07ad371b778594b347ca081d881ef90a8
SHA256a79f824df89401ce0c04e3f552cd7766a452861ee9c14ae118e476c4dd5ef10e
SHA51228756165719f9f204a4dbd43940243687b3db2356ccec4b58ee33aff789cd26da8d2a9eecc19b60a7ff71a47b8d7eaa8651d36fbd7d1a58ab8d41adac484ded3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2f23745a86d23c09c8b84189577a37a
SHA1c98e2d26cd02402a788eb4fa7d7782a8ade997bb
SHA2565c4f0f759fc1cc3d3e8c8b68370b518e75d29b115260ec54ba79e70fed918a8a
SHA5124a41ae0085e83cfddc53407a7c68cfa41a4435e0ff10a5cc961f3294cab22b8f057e1132c57efb7664f268fcc376d0723d32196002cc96e3a0eb36d8e6518ab5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54488bf60a393e81624d67680f7854b11
SHA107873454b1776c31d8d0e2501e6bb06054642393
SHA25628e72dfb92a62bc84d5ef339fb42c3c042982512dcae0f1a7af6160018f5a302
SHA512d296ab050e6eed44990ed50f680dcd2fd2c4efe9a4481c480993986e447b323a3290f750cca43b31e8d630ae05bf8e385a6e21017ab5b8b9dbb1d2f22e5ca818
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b