Analysis
-
max time kernel
118s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 18:22
Static task
static1
Behavioral task
behavioral1
Sample
70b903f204dbf84eb5dc4cc7ef2408ff_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
70b903f204dbf84eb5dc4cc7ef2408ff_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
70b903f204dbf84eb5dc4cc7ef2408ff_JaffaCakes118.html
-
Size
6KB
-
MD5
70b903f204dbf84eb5dc4cc7ef2408ff
-
SHA1
bca7dde66735cd4c6ea65a1812f66c322eaaa9c9
-
SHA256
d0908e637cb180450556d973b282badb03d87f00d4a7bd0b20790ba19ea3370f
-
SHA512
8855e51e9d74ae74db13aeec1eed57bf982f727538c6994024772f11167ff3755b82cab09fb5e6832f01065013d2bccf1af8093264f8da129faba3770c76685b
-
SSDEEP
96:uzVs+ux7VTLLY1k9o84d12ef7CSTUAZcEZ7ru7f:csz7VTAYS/Xb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 000aee40c0deda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000a91ed3eb500af6caff2a94f2b1b3135730eb5673d6a7f7e337bf553650502c1f000000000e8000000002000020000000051636ae987783a2d0c6f8465f2f90893f0b6d9a4a6b95085a59d658aa1db186200000004562452da5f7afea17b98ff946e24213a39bd60e0586b366a0d47a44b2f7f534400000009305486421651dbab9a68edc707053dc678132efd6a6682d77fe225c15f2e1862f3b160cf7e8459729eb2e8d56f12e46b8697ef70554ebbc8b0bb7db06f2f04a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428093860" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6A39EFF1-4AB3-11EF-98DB-E29800E22076} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1924 iexplore.exe 1924 iexplore.exe 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2108 1924 iexplore.exe 30 PID 1924 wrote to memory of 2108 1924 iexplore.exe 30 PID 1924 wrote to memory of 2108 1924 iexplore.exe 30 PID 1924 wrote to memory of 2108 1924 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\70b903f204dbf84eb5dc4cc7ef2408ff_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1924 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d12975125e68ff33917227efdbcba5a4
SHA1e4572d29c0a940e5156c4f05782b5c92f671b039
SHA2564085e88ef50b2cb6bbe5ed1867224b066ecff318cceb7251685be753cc9fe3d3
SHA51234defe95d69af45b54eafba6b6ae7e4e4601289123d7a19e99a9a7a5bcc663eaa98299b3ee906501684a39ed26771f5fef9bd858f4b0226c4c04eec2aee7f03e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502b525e5b54dbc925b892d51dbf33f09
SHA1c6328d9365529ddaf0c1d22e8211b1f489909a00
SHA256669161ff5ed2b3cd50cd3cca3e631cb8535152dfe7a31a73b6d16399d01edb71
SHA5127c5c0424fbb27b21f693c6d9f26fd44cc945d81290df5c766d49063c2c155a10b8dfdb9532236fe2bc16c6cd80ba3eaee060a881583d3a223de4047a4f03cd50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc89049de73891c843fa793b9c803011
SHA1a5d51001e9b50b7739719da9f3de1fb5b21cc1dd
SHA2564fe3a257b0c50976dbb96e58c5527413cadf038a329ef6ee2feea851bc5fc0e3
SHA512656614253e54f9681361447be13fea33dd4861ddf90afcc8bb4a5d4d3680b615fd3f9b95c53b5a7353eea290e042d3f69538612868c2b6717efbd86b632e20bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e4d9f9b491c1270a717473ee97a820a
SHA174264173cd3d1e52ed702982585d9642dea0268d
SHA25669e86aab3201baaeea963a48c03c620bcf2dfc689dffa5d02234b7ccdd37df6f
SHA5128b549a4e27ab30a60361834abe57111a972c24db4e6a5f9d95bb23c44898282930fddcadd3ba95a342aadf04dcbd385024716bdf402a4982c21a3be265a741e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562781cf23f54fc2aba11b84bd749c819
SHA1ffff9b52e80ce70ce614cf5adecc93afb7ded9f7
SHA2568af3c32b0b175557518996d7936dcd602c8b9f1b308c3b8a6854dc40118f149f
SHA51206f407c3c4fcb235a8872374807261482095e3ca268d61a42e813487e0ca0ca3dfd00e0a0e0d45f66241c34dd455444ea7fe8dc2fb91e8fb93a6b43f39ddaec3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d944186026d1d445ea64bcd65f180d71
SHA13e35b1df2c92b402d0c3264fbfc2dcc78082d20d
SHA25651ec8f56fbecbdf4426301bfa88fc4c2a9c024bf8afe0914ed3d00a8bb03a928
SHA512cd6c3b146a106040a9bad3255bbc20ac4d647bcfe40a28c0a4433fa1e3bb92a8e2a2d0782424c774932534d20f490e1cc9310bea415a4bc69743e85421fa5047
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5783b66490f503506ec86c0c0e9315580
SHA1e9e8040e3272fc5ebe1b6f0fe996925911234b44
SHA256fecff8ce094486728970bb341ca7b998211cbf673ddced4fcd504bf8f6c53ed0
SHA5122fb86829ea53db725a6e6e53a45c530765559e659ee2ad871fb385ffdf693375d46403e065f017ddadfb0d477c16da4193684f8fa8a432d083941f5657095347
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccb26abad4f7991c9eca0d45f00f73f7
SHA1302a763bf000cc23903b93f1e0fc7276f455c348
SHA256b99033aff592d99265a147356f4bd570fab9708751bde9e6b999c5a4309ca876
SHA512c4343ab082de1105407311344cbd872aadf41dcec584b594d23680690f23584b6fec7bee0ae6edf8eb669d16b84ca0e0ecfd4c88c0641c0ce8e4cf1df6c583e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e0eba2e80435890bd75d28095405dec
SHA1c8b467e5da800e16ec82abf1ab1403e4a7c5ec61
SHA256fe3863beea83d28790cb0b7b9867aa5abec88accbea25dafdda44ae14d8f4e29
SHA5129ea8b8b1fa85d97eefdf18a3f040100682c11e56d9e3aa605a0573a8e652617a36758a46f084e27f00a4aa52d2ac222b2215a9351eb674f4b9128d6ef39ff927
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522d5aa0240727c6f659f14aa3d0318b0
SHA1a8d88af2ca93d4fb7ae427981baa984502621ca6
SHA25600960721923c69d00ccd15e766dae19d1eb82b90d6a06685ba8576f57389a192
SHA5125ccf6979df11bf7812ecdc6bc9e2c06b0275b5ad3f1a250ee4fbbeaf2688281676e4942c05b5106453ca79265d171cb55a5cd60e8899146dbf1dd37e1a192126
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5505f6b5c1c0d92a6e8bd0faa31237357
SHA118ee0dcfe8b4a40bdddfaae51f61f0e40178c227
SHA25679822597bfd838cc7095e9a65eb1e341e017c800221bc156076ebcf24caa7365
SHA5128346cce0509d0b622c0f8a6f5022ccce329f623766d919da4f4496ef54b390842a6edbc1e1e2d9424a0d4e7a2d7d139b28c8be60ea6ac5871e3c7b47e5249fb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d3669df959ec265b5e7fc43188f9e21
SHA12090333a9e10f9904d02f1eacb5a93b39d1d8c52
SHA25691013b3195836a9d793ed38e9f06eec48e6ab6a66e79cbb82d905103c9de2e83
SHA512ecafc6a2f3816743df9b31972f05bf6511bc845ea7720ebebb086ad96221048de8dee757e94c31415cc9dd5c49792d378eb0b13e465fc1d55d256bd10af9ae0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec73813b9dc4ab95df3da8b86760cb8d
SHA1a34de0dfba01b8c05a4f99bf8147e7eb928e5802
SHA2563082d4191af62a02dd2d98385c47fa0e81b1a75cf63d055d667d710a4e619380
SHA512f90b60f4b003961541c99fa81d752df779cdfddddb913221e73e34596ff30d637e7cd888f397b80679b58de972fa92ea00f6b1dbb68542022c252ac9f7680ff5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b8da83baf003717bdfbe7beba0830ca
SHA1976ce022e045fde888f24f3fb97dc2c33240d931
SHA25659d38ff68a019f9fcd999bd7226a875bb9b0e15ca13328fb4b4ab067680ce71a
SHA512c92bac71c39f832855d9dc15373f6288082db47ac68b8b9a36e16e94bcd70803ac2849016ffd18164cbac6bb89b969ad388981e16c73cfe5023743089b86af10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a74e9572c7573f33cccc5a9a1145737
SHA1433c68d72396d2d057c0f9b543188563f7691fdf
SHA2567ce839444c3282287568d0c6d0682513059959f02898d8eceeb493d6d5f1b211
SHA512e46d6714bb9540a37b0ac1961c93920f9bc9ff2f246b9482937ba9e78feca328746d621595f713457326401ca9cc2263d34df782e061497a4a5036bd45ae912f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54836de86520b78d3c9a963c16d09d59b
SHA16f45f95cc7f2f3313c305df3a777b3a631552689
SHA256e316bafa1d042babbfe5c024c97262babbaf8da4dbcd046f94f2d43a071af85a
SHA512c6e70b163f426b9643c6497e60e0aa5c22ef4b0d403313131e8ebe03a19d94ddbda398e8203b35644842b3142206c5f3b6592380c4eb96a8cb00d6cdc63073cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1922680e4170eeb50bb21479e8ead5e
SHA1ce9d73b444263504c75274ce9126d946c59efc93
SHA25645493dd0ac5987dc9bc780d0bf3bfe4072839b60e61312630799eb603d74d987
SHA51252cb250fdb0c22c344870e65879438b2ea340d66005697b5986b0def79498c2582e51977a4bb461e88df6d1ab5597d9bf4d3b52b4f5ce47c55e52efa8f83d927
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1d6eada182d0af7124f189ead95108b
SHA1043835595a9f070cdac89301792b0c476929fcde
SHA256f5c3e43eddd4045c835a01a2ce6fcbc935485aeb465551a188529db574fdb13a
SHA512b72636e8c302be4e07b7bd214eeddcc93bc8c244b7034d9f67ef1e5ea75a2f2563730ea70d0fb45fba279428ea54307c2a1fe29d45760cea4da6c46e6ac76406
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b