Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 22:44
Static task
static1
Behavioral task
behavioral1
Sample
718c283022cd885c07ba7432c8b81df9_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
718c283022cd885c07ba7432c8b81df9_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
718c283022cd885c07ba7432c8b81df9_JaffaCakes118.html
-
Size
10KB
-
MD5
718c283022cd885c07ba7432c8b81df9
-
SHA1
36fd08faa469d83db9ea11cebda36f29c0129cfb
-
SHA256
40770f6c63a17b4b7f4d04a95d18aba568ec09b6b9e1bf0c0721fee93edd1a84
-
SHA512
e3941ec9541aec6699c38885fa1d2fc29d4242622c381fa4f5ddc939a847d72a8f0a2c8cd094e716625490d25f0d2d1c6a7f5302cd5e9d48370d2f9bbba26657
-
SSDEEP
192:csz7/VJAYS/zIpaWwV0whwWwV0wcxMWwV0wNPHb76f:cWJAY8zIpaWm0MwWm0aWm0oHS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E7BCD3F1-4AD8-11EF-9D58-7EBFE1D0DDB4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000002ab36dfb31b4d7faeacbac5a16fbf8d066a7d5ad568d6ea2dcec2cbe5d7e68a8000000000e8000000002000020000000721df8eca52c44471ba807110bd55f95b470aa5371da6069233b93e491005a21200000008d55060ce5d008c9a1729c943e205d7d68b59e1bd006366dd6377ef29e744def40000000063aa01d24a162263b70d571e1aa11c11698f9bd87747b9b418535123add58a242f4949a2073b29a8b71753f808d5a302f951974ab1aa16f02b604e99535a542 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60c84abee5deda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428109961" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2688 iexplore.exe 2688 iexplore.exe 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2376 2688 iexplore.exe 30 PID 2688 wrote to memory of 2376 2688 iexplore.exe 30 PID 2688 wrote to memory of 2376 2688 iexplore.exe 30 PID 2688 wrote to memory of 2376 2688 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\718c283022cd885c07ba7432c8b81df9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2688 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0c831c541bb870642a36865deae4f47
SHA1900e2c1d737506617229ffb81c747c24636c34d7
SHA2567fb86cbabce37bc41070c984c10d29d348d022b0149ef6490cf37f6c3d051dc1
SHA51271f8acb21156eef6ad80f026ebc773f800046508aa778c9fc22ded44a85ead5b9f0f7349c240776010a3969b2a789d59f8c7122296efec8dd560d69409d3a3b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc5e567cadeb4599373715fe8da906d5
SHA13a20b812c826867107a8cfb3ed86ca2339c49ec5
SHA2561aa51c8c7e8d85cfa064fc2fac3c51f48acc8e72a15aee7ce6cde4d08b46d8b3
SHA5122e52ecd4aaf35fbb58d66f2d2c98b0f412f290bbe8075fe88a0c6d4c833330bdf19fb3a98db36f4752cfb9b9c3fde7bc40999182073cbbf8d4a1c815682b8ae1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b90dc63628de3488eddeeab9ce29217e
SHA1e178f8a7d62abfa2f178d81a12455364478361e0
SHA256d2ebf4ac2594794f14ebb671c0d87ff873bef305b71c6e814e9c5dbfc9a25d87
SHA5128c1eab972d2eb8cfe8c4d1e1cf363226f64d0116e88c5b4fd27d0f16b216b6ebab1c7a9d78eed5de3fe90c482760b50ef1717bf638e0ec53ea888c4b29b74d61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f871bd95004fee167cc5a8772070d2e
SHA11fbf16abab2c88a714e36e1295a021c7e4b8b254
SHA2565a09b77952aa2a522144b5db061b8d32113ad93d690552b5909f0e305986d825
SHA512242798a85521e6fb7061cb1d710ab6ccd6b846ee59025d4c9a8a27a8a14f83d4aae304804b7c3a68f96f918b339e8fdaeaa963d092fb61f2f734ff90b050374f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c4b1fc6a8f291ee76ee9c7773292e09
SHA146d2f5bbbbe247d7b3023140fc8da2897b502f18
SHA2560b21647c61580eb3bb3af78c235d4d19e409d0b402f0340fea1352db31da7c5d
SHA51260b659fc1a8b53cfbbe20b3f6815b49d49bc061c1f920965dbe339a4854ab88d0db3ca645b99e4239f6134eb0132e7c4776b281fc3eb4151449e7e578f642d56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5637c8778b359501c9b890619fc444c2c
SHA157b0d59fb7d18758f84bb482797829f0a0308d10
SHA256d8dcfb4d25f824071009b5cff2540d8f299b54666616e49fafd1a9078573b427
SHA512beb55743636ec6bc99b37949a317d57b912f1ec6ceaa7f8e53ae0d1b53fd0cfb3be2450cf9c546368717cdb86547c447d3ec977c06156401078b5b7e5ca4f480
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5478eb3da4a39a725feb1750f35e73dc1
SHA1318b1ae71e399fac801088dd727e9c20006bfb8f
SHA2562f6fa424fa81dce37d921c9b132337ca6f692e609d240a22818247d343aacccc
SHA512bcafe6f6be878a68f1beada33d05907a187eba3f7ed56d38e68e2fe4c63b2670d488f514636db7b68d826443abb0cbb09971a571dd8e395ebbd773e1bb3a1c6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524bce77f7bb6b7650d97f167619e8207
SHA182ab858e0c01cb2a1ade2f79264719c69a0a57da
SHA256c4f0b6b51e8f39c5323fd6b7d673260faf5e1013031ab7f940e9d65144e83b8b
SHA5120017628d726b018ff5ea5df7df19c6fdf0be55c307e9775d6106cc26f56064927019838d6bf63c9e49fe6bc30dea817b4aa92b0ea2f1e82e42111b62facc00d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce7b29dbe71ac76afb87741835e5e4e8
SHA1b7bea30345cb87a9287680784cf0ceffdb844ddb
SHA2560e27b2d277997d22d54ce32b7aa300e7aa639030b2e3884279c7d29ad74d8a07
SHA512e88aa8ec1d913f8986659c803d874a7e05b79d41cde5a484150f240701ee034b5f1d84f5e33ee3bce9c1c966d18cc3aa2e5d76894a430c90fb9b210bfdceb445
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b3c84188daa63f0f916c1a8adb3da37
SHA13a1db890901365ef1afcfa041e53901c68265721
SHA25664e13ee61c69003ad794776d8d3b00dddf4d72c89439ed9aa1dd27604b76eda8
SHA51261d048f53d46c0f779a0d3c082e41960ebbc00afbd4c66dde984963dab677aff100f478a395f059ac6d0ebaf5ba6a036c9178fa87e117945ddd0f7c9c771f043
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e6a8235d6c685e0fb9816d4bb87f9e8
SHA1e32ae3625e6af6841a60912af6802cf03dc9b6da
SHA2566053e1d439a0d604a28edf8305eb7f815b946dec738361f3061aec33a48453b8
SHA51229cc87e5d2ef1be80534d8e7ceb53e2306f4d502e1f4677def8a161f4756003abe29c8aaf4a847f041ae5f724d99bd3b14b409805fa3836c005578de4849aca8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e6bce6e4f9de8c5d6e5c257dfcc900b
SHA128826d7d2327e9b0c8c4eb983d193c78a7032029
SHA2564b2632242a4b26fe69b1a55cbeae4941c3acd17135f3f7dacfdafc1fc724cbbd
SHA5128bf0366bfac41dc7ad4d33096cc37828e14eb321f24ae84bc26d1c3c5e52204d2b460edfed3f94769ee6240e85f3cec34e53bbbf272e7f2db9cf43e859c97cc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab98f2278f954140f7d5e2e7d88c498b
SHA1eed2425d0280b6d7deaf472f0c5cf8abd5f534e7
SHA25612d6fa1b4b0fe9b0c3df245c2cd53488e9082ba0bf71972d65b2e8e35dc2706d
SHA512782b805da8dccb640068c0f96f6ecab508109c733bfc01347c884b18ad0e1935a903b6846c387625e8a269cadcfbd0cbdcd740742822d22a0c92ffbf564aa8cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57506663018823889ad55d969caa5e10e
SHA1ed5bf433f05516d0aae183b5e0d9098af56e6136
SHA256dd0d6807dd51bd7f0760e33b73d663ec95eae1ac01077e9063d656654b384fc0
SHA512d281677e40ecb8455109e8d84b5b8d4ee4cf6424d3941c4548e2ec81a4dde1c3cfaa58e157bfcc5586d5979baa6b67b9f5b103789c324a6d1e5027eb817e8985
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54897cea7b94236cd4c925eca3322f99e
SHA1ed880785d709eedd6510b3d517f714f37237a92b
SHA256ca38ae52383c01c542d3709a06e2cd9d95b9ec03db8085c3e9b6766a5d594ef4
SHA5128a42865f4845c0a8456689f193e21f4e88c2841a4a2e8d586a4da8d56b8d48d9eab9a0488293cdc317ecef3fd55a5b35893af5fe7230b9a716dbaf5defe40591
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d5357e55128ced3abefdec277a80df0
SHA196e6bf6be2e786b804e9b8f43bb5d9782503c345
SHA256c1e1fa163e64fc2d21ad2d602a1b29964b8b976c27ebb99290647f39703c32b2
SHA512fc6929b9532ab10e803fce83a22306c55f0576c99215f2504d3c2e7e608d8ec44446d654a5fd00d62d626bfba1e2c877ef4f57bf9afeefb373f22b585a0ae094
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fa57953d29db997f742c3914a0409b6
SHA1c6d5c7a3fa9ae60f0eb49839f6b75537493a5901
SHA2562187fff69ffa9a13274af5eb84adc90848b99196b37b6fb29eebb237ee43c372
SHA51213c2cffe5a394c26a062413196b2585264386f5ff757e69b85ccd3abfc23576318fc0945c9bac0a855210e508d6e04648e341d16d64a09e404559951831f893e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccf8a4f2b5738797f431a8b458a94e93
SHA1e8bef0835fadd4a4ec4d1486ec44c9c2b3e66117
SHA2564fe3a762210b454642698751a9e02c4183ea0b90e2cdc8b8af8c607e14ad702e
SHA51285472cf6239665a626d3a5de098c8c384cb012776804a001c095880ffd6b4c6c46aa1f2ec9d9f9c0d78206e5323cd135df9647fe54ecbc5fe1f7e14380833139
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522e4ad7416a63865deda5d9b25ccd5ed
SHA17abde60c161c312e18fa6a567dfadc37bfa2b5a2
SHA2560222d9406a70b65bb74dc0b6ed39c03222cedbb644e593c28d02a05da1a6fbe1
SHA512b7c1c72febe56b18ac540ec2ddebff6303517e390a308b1cebc7a69139a4bec3f714fdb55eca08e1624d23d60508f6baa0f499176d788efccab8859d3ec600eb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b