Analysis
-
max time kernel
121s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 20:28
Static task
static1
Behavioral task
behavioral1
Sample
7597ff2e318ffe2e666205e336f9bb8f_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7597ff2e318ffe2e666205e336f9bb8f_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
7597ff2e318ffe2e666205e336f9bb8f_JaffaCakes118.html
-
Size
119KB
-
MD5
7597ff2e318ffe2e666205e336f9bb8f
-
SHA1
bb0070ee5ed27be81c7c098f9e2c4c995468d781
-
SHA256
623c9d0684a3a8b596b04abe8b40d94143d92a90c23220a4d07bec31fe8e077b
-
SHA512
3961f1f4b53b19caa7b682d0453cd07d0e42afb5b8fb8a2139a02532120545fda873299a271b21d966b2f7710e8da45e2b4c87162683ff99cb87e483deeeed4d
-
SSDEEP
1536:ahurZxJVVXixM8l/aRcbGkPDRA3aAqPT0O:RbJVV9CZaxMTp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0024533a00e0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428231261" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000032366c46b4d34690103ce4790203c27c4c9f2efbbed20257e3b76104d8e5e373000000000e80000000020000200000009b49ffbaa2a0a2cbcbf3ca55ac16340c41ce7d4aaeb118ac6f5e5d7e8f1646379000000016da616b74a0bf9ad5d88377885e2ed0b65a6b169c5e9a39954f35acc9e375819cfa5a5b020db3c0bec31563335c17073fc0fa8d10e23888880d4d164b692abf0c93d674fde5766032c146c64959e8eadf25a5bdf67642d13fb9455e134328a424b1df191fd93529f42165c194f42b194d120118255229e35f32386a2326c03b1ceef1352bc1d8a26eaf1f5a60140480400000007105bf1c305e09c8df63d168f4c8e4dd45c3edba7118406cab58a85b7c06ea4d4bb1820ff8148e95b6b986e0a423daf7cbf0b73dcd3d9d7cef4c679cf32a9304 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000dc5d618b4c96a401e344051f1117d97f59c4d94c754bc4e1d887fbcca5779209000000000e8000000002000020000000d02c79a06262851f1881f9b2d6284dcc7c3ae7357447960a2a9a471b25e161f320000000c0d3f1cc74756f7b4ce7040be796a274a8a8a284ddb9415e90fb79a8354690ef400000000d307c1ebb5c91d8d5c4c6154eb3bfd1cf6b9fdce32133c24c88aab1c0ea1fce5eee1bea26fc2e8fe50915fda8970334d92a79c21c00c0def5c53cfba1049a16 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{542A4071-4BF3-11EF-838C-C20DC8CB8E9E} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2536 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2536 iexplore.exe 2536 iexplore.exe 2008 IEXPLORE.EXE 2008 IEXPLORE.EXE 2008 IEXPLORE.EXE 2008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2008 2536 iexplore.exe 30 PID 2536 wrote to memory of 2008 2536 iexplore.exe 30 PID 2536 wrote to memory of 2008 2536 iexplore.exe 30 PID 2536 wrote to memory of 2008 2536 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7597ff2e318ffe2e666205e336f9bb8f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2536 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aadd0cc146e0928525e548ee73ff73c6
SHA192abb3ac6af962cb2b3ae31c41d085687f30f724
SHA256dbf835f4d93fb6d55c2117317143f2fd5fae3b9934491031547fb35b3451410c
SHA512603f05c199100bffca183f91501f897d820b2140a34b4916ef8409f4dfeabb9b088768e280b60f1bc714d8c4dc775b17b71e61c150d6e9b2d1a5c32d6ea1b642
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b23eb59f3c746e14a2b6845d5be0a9b4
SHA13acf609b4e953613ded90edb0c7c4ae3f989fcdd
SHA256c2c22cb19049e0a68712f18fee7ce545c607c25513bf6a24d668006315317d35
SHA512f8477b169db4ef2373394d683af26cf86d06a0f0df548e4dd5f6f27ef4199c01744c4b649cf3b4b656fe86115b79f505547b3a009d8852c6c99fc1eb09c87838
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5796b139ccda4e2be08c3b2b7a47b0fc7
SHA1f244ecf039ce56b70d176eaa89bdd4cf9b04e42c
SHA256d0cf37261a6b8f7506017e0370839f7364195011a7644b87c9b990c4dd8632b1
SHA512423cabeb79e16770c560bd715d6df5877bc8207ebc81be0789e4d200637480ad1054f5839ead35e6e834dc74d6deb3e43e8625f4aa188da98abd023b465717be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534021e341397123e69add3fb5036e85a
SHA12f9e67ad442b1d2a52698c5839f0d6d8c99cdfeb
SHA2562054420f6c4ece3bfd4dffeeb2a18d8c91444edf0c294b9bfdd6994ee2d11d36
SHA51254e86fab8fce30a8731b2dbad5eedfd24dab1402f24e59fd21fec61cf7679a2ddfe63c157d17320b6878ce920fb4f2057bea2aeeca15b16e8f79ac7c7e174f8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa73a623b78b5ae46da686cfb3a37432
SHA13b58c2a7aaa6aec7b26516ec37b24ef4107e9059
SHA25622fb8ed1c0fb7976b4d06f80559a66b845b925a79d8988ff4d445523091d614f
SHA5121bcda43919bc5a63d6fec185a76382fef378e2640721f0131e2aec14c72bd63b7b3ce36c28aa4b413cf3d0914f85c836de5c2ef747291770ccff54698a117f7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae922f86e1334b3953ee7d1d6585810a
SHA18ee9ee60d1e98f90449e2b27ccd3fdcfc986b3fe
SHA2562aadc9a69185627981bf4d223b8d1b50f2fa237f9134b4f9f56d3240fb4360ca
SHA512a554e835e55d7b7539a2888648ee9f999d251db0cf6f82d6c034afe96928f736608f52a43c74f2f9c50d83494fb0d7b8bf839cf1a62bd6fbc4982c01c3013539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a463de8826cb43b3e9993ce33775eb9d
SHA18ad92f9d0d179c7ad1c9323a10ce10f92fafed77
SHA2569554e5998071f209ed0227b5ad19e56d626109e710a9d378815c07f5ae66eaf4
SHA512c3226c3f821b3d12249e9297ecfda02371ddd7851dda310ae98f57b9069e8d229a6de47974ddbf9a871037ecb19c69b9bebc5a9281e1ef6962c0bf65fcd5608f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557ee67fe311b98bdae65354bb9676f36
SHA1dcbbd312fd2655b0964c230b4a89d9f68a17d2cb
SHA2561c101ea8e0477c7cac781dfc772c5fc3610adfac66a65c1a323cdd8958531ede
SHA512692000a0faaab9a5375585995878958d32a8b0cbe813f12e7bc5bcbce9ce28bc962882c6ea4b1e4cc227335330ad6f5f09183d77175ff23c2c409bf120ab1760
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5163b8f1ded60d20394a68f9ab8a6421d
SHA12ac6d74ef07d2e4f8562ccbfb87012195b23578b
SHA256341cf2351088abce41f715906aca4e9252fed7040438b9f96f52b87758169a8d
SHA512220ec913c02e3b58b11d61792684e63cacf3fb9417fe2da7061e44df70a6e770902f389830b3f3f784d3f86aa992700bae0a9a91d1d8a1c45866a58c4523914c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4099af24ec32c32a3db0c090cf5757c
SHA122a52d1a64f26ad92150757071a7f24c25aeb236
SHA256636a693bcb406aff11e560f80871c8e7212e6c4f6ca3f5e844f0d7a5d7665e9b
SHA512a7bc44b697ff6bcf23fa11da333e564014fefddd9e7dbadcf3715215549cc41dba12ee406a1ca4f8ecc4036696212e2a0d7f83d6fdd48c6b3f07df2a0683740e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaff28df8bfed2da015176348d7980b2
SHA14c04b86f7f55e8c23698b55227eae6fddd13541f
SHA25676fb66f38ec82368d1df2ecd4b1bb46bbe009faaeb10ce8eaf4e0c1df19a3a0b
SHA51208afb6ee60ec7340d1f3da093f34b601cd04c6c53dad052d678675993cd480f453cf09f45a2e47456da6f0414a385d9a9df8805a669f9fb8f093c97eafd8ac2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536e11a636c0a86ccc4dfc4e92071df8a
SHA1b503a33f66c8bf9ff9ed224e338ce2e1c14bdcd9
SHA25602ed4745693ea46f503d192519d5b1b3e391edb2c80a2282b68909bc81e0df97
SHA512c51adebced64fe9f652eef6b76fa4772e6beeac88c3913f2578b65982ecd086f78797f8894f870df094d8f0d9600dad4c9a8ec530dfd6c0fc1d1edb5de1a5078
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f81fab2544d302192c47a59affca99d6
SHA165164b65b889fcbed7284fec9fb5e0ace54dc257
SHA25698fbb951c9cdc0bc2a9edb7187d47d85667d2864c8378c0dd21908e8ad5f7722
SHA512f65666ff062722fa62139b7d9c3822f2334f3cd7d3d28a8d8e524e355978d3e1157e34dafda9460d088299d5fa7511958e8b031f6ddb4141d70033d036a16e25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5852c83efc1067e0076344a377f701375
SHA1f71b8fd43a3fc49b67a467ba6457de1285e37c0a
SHA2562dbbe2e73bdf9ad331eea55d460cf990f0e27a33715f23420dc5a6065fa15ea4
SHA5126818fd4f9a126b32db33ff791cb22f0e2d8d0b6b35e1c0892699596887e23332353c3b1fd755036f4fdeb61b73a19582f257b9125d91a44b085ace41aa9ff5f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc6b85d28691ec0e1188c715f3581941
SHA13b9bc4baec4aac0fed0313ce72f70a2f38c40750
SHA256b8cde7564621296aa6572fd674b6b5404391707c8336a1d46439f3af8908eb9b
SHA512f650f802e5af568926dec517d57c470b772707f4f2ea7c6be7f0ecee0a26db5c9982a20e5738cddf84b878ee45840d98df4a0442e00ae3f576a7ecc409d191a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bbee36cd3cc730a47b3aaba17bf800b
SHA140830409574429c9f73073a8cf45d504363dffb2
SHA256762da3ddd4e632b220cbeb25ff79ad0855ac1e74d67307f94d20942eb417c9f7
SHA5122f4e634c671d2bf5e170ad06f35e01c2feaf7dd1145b3b6421e5d5256ea44c4835b65be2d390b0a44c705d85bcd2b097ce815b677811a620926ba0e6148611e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5240c511f8d1bf695a60563f9b1969449
SHA1c16e874629a979aac2995b82b5f2fc99444d7b0d
SHA256ea60112ae2c264361b3ac4c51a1e3497c96e952b1105f1d257286605cba0e87d
SHA51223600b9f282bb1b36e73093243d0857be20ca456fb8250083ce1d5869295ecd3d77083e90140b1c9aeb0747ede40deda288578c54a849794f3de4f0fe36af4e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db28e520db1949f3404d39f5272163e6
SHA12e5ebc8f06b4e5385b8f48c3ea9e313da621f298
SHA256bf6f2a7f99671f87f2edfe531f9d620f05fabd8b6d21327074c6c5ccb8769078
SHA512848251a2cd2fe4481074213d8cffe229b9a4a78572d29be4e4eec0b69a91b691ecad431b5956e8b675667ccab2136989a5488d9f25dcc82eb786746996a30f47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530e4cf09087943705fca08a05764b630
SHA1c15f892171b85088423f40bbcaf5394dd7e38876
SHA256d9ff80f21eb9199ec522233e1a6a674203ba753c5cf8cbfa5e344a79968d4c0d
SHA512ff29835941784f828b202718bd06a371caf7b58f56b40cb43c119bef2e9220e0b6b1cc4db02e7b76e32fc9864d15f735f9e27828f5b7bcfa90cf7aff2ea6d1d5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b