Analysis
-
max time kernel
102s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 22:53
Static task
static1
Behavioral task
behavioral1
Sample
01cfae482d7ff16f53120d933d56f5d6_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
01cfae482d7ff16f53120d933d56f5d6_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
01cfae482d7ff16f53120d933d56f5d6_JaffaCakes118.html
-
Size
2KB
-
MD5
01cfae482d7ff16f53120d933d56f5d6
-
SHA1
637dff5521cb054baafa88ee30617aa68c5e9aa3
-
SHA256
475efbbdf9dba248bcf66ed8f574308780f980423d617552f3ead7a6ea6b136d
-
SHA512
f575fe6ae00b19716e5687bcfd3942c878c180b52e8fcdee84ed4dde23a84ba919bc0104e879b74dad096a2d4ccead6fbe5a1e3418abc243a27438e4ad238efe
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{64F09521-4E74-11EF-A251-667598992E52} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b700000000002000000000010660000000100002000000027c65b2253f3c6dfad86e17598d9a39977a4a156a7234586fbfa34f941ead5e5000000000e8000000002000020000000f3d3bf6b72910480ba6aa1d753823fcd290b8c015edf5aae057ca289c36e3a5020000000da9458710d99f87a512a6fb9344984b67f9dd3ebc650cea49f569d8b213e1a4e40000000a5bf5279986b9df14da37ecf49bef0998bc96b748102b0a30339aa8058a4b026a8af470d4b7cf24d9b0a9da782d6bbe854300f124cdd037744e4c9e488695f46 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6011c76381e2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428506599" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1900 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1900 iexplore.exe 1900 iexplore.exe 1944 IEXPLORE.EXE 1944 IEXPLORE.EXE 1944 IEXPLORE.EXE 1944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1900 wrote to memory of 1944 1900 iexplore.exe 30 PID 1900 wrote to memory of 1944 1900 iexplore.exe 30 PID 1900 wrote to memory of 1944 1900 iexplore.exe 30 PID 1900 wrote to memory of 1944 1900 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\01cfae482d7ff16f53120d933d56f5d6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1900 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b3cc74c8e87f59db8a24957b4122cf6
SHA1a91ba6150bc098b6e4a134ba323dd27e10392429
SHA256ef565e05a9af6f61371fa0e1bebe60bf7fe9de72df9ffaed852e28e30b10bf7c
SHA512d2178cefbc3a6d909ed50d537ac468d685528289aea4dae21c0ace925d2f98c0dc3c54b005e2ef3c062dba5f36e25dd7ad0fefb1b49a9e705619c243f6f66397
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54eabf4f94af52fecf013f371d93a54c5
SHA1a0043d213eee6f73f22f0f463c5932f58d7ed43d
SHA25653b526d4c5df91cd03c9952986492148e257f7a91a89cc7969d3a719e5175d6b
SHA512e674567a2e4ecf4bf3984ab861c531c2750cf42bb1940fcae13531366db5fd70732899123db85746349701b27cfd6bc86e95c40209e8530f15ff76224b9c7fe6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538eab7ed0befc39aad948733381ac0d1
SHA121170d50598286e5431bba8ec413fbf854f3275c
SHA25638aa569d5d2baa49e57405e02d46c38418b7f12a59bff86333fb9ba22bcbc6fe
SHA5125285bfd2ad03327da9d940c4a2725848dab0260a2fb66d1ba52d5f066c8d1bc3579347fb8f11615832894f88ab2b650795432830d1449fcf2d617ee2759acbf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6e3b38d73c012a242b8b0bf3a535edc
SHA13663cc14b8bbb95d878ebadb0837276b48ed69f5
SHA25636bcad51077eba35171a17a6122bea376cd6ff1aba5760fcc486e645cbc1fc9f
SHA5124414c34af33551590a1a715722d1646a53acc3181064a98ddcfb29b9b3d6f4499f51d03554654e7ddf48026d6f08f63cb2616902db952ea10b1c86ada2f06730
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549db89bded88941735eddcaa3d9aa742
SHA1cff3d7fb272adf1258cef88aa5e5a6c64682b142
SHA256fe4c320e8d05a3fe86417cc6ba4394ef6ada8cb6bb8b781b460b5d0b1a4d47ff
SHA512dd512ebb148a3788d109268e7bf9cd49fe0de108a66a27e6b5ddee5a630611471c95ffcbe12d76dcd0f7701575cff15daa3ebd354818eb0b0d4324c32293a3d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e5c0fc3f684abc779ca702a95e9b036
SHA1541bc953a4fa10cbae398c1983033d50eee16bc8
SHA2564089ede9c08ecc0181e3a0d6b2fddda956a76195ac7a3251c9646c1b9f095c84
SHA51277d8a8b7310b3527175302c40383c286d2773a96917885f66ae1f7a185c0cd5437636d804e71bd549eb38f428cd057bcd55f77642ac10f5aea2ef08cc7d76b6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5003823c25d9fb85602e7ec44d7cc03b5
SHA17a38b488e5637aefc9cb5b09e4b705c2149ddec7
SHA25618cdef2f516db32c1ed8155336d5bbd088a3b34853f9c9568643529b1a1dbb50
SHA512e09c05cb4a8ba8c2d8af9ccb630d7893a31eb9f4b6fbbf352fb26d5a2e18f0b83c55b3fba67983a5cd8abd4ed17ef09aa922cde676bd181f50e15fcff14d6a89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db39e3246fcb02853cddd92bfddf6568
SHA131b20fba36b94262c4dd55c278edcc8ab88c4994
SHA25605c9019de81af5a7147ec17b845b28d89459adc617418f8a11f6bfcbe10cf933
SHA512a50fd446660e2e137be12648679e446fcd019eda6a967b3c29026cf3baa6e20eabd8191e7a5bb1fe181af3d3997f875d0107826aa1e8197adea959156e9c067f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552f85f0bf35e2b9280bb6ef7ab7bc897
SHA105444aa1339fbf5f9287d3b1b15f81ed6457de5a
SHA256cd4e706696710667afd00813ae571f591aec61f2eb593f0378f1c6f08c371c60
SHA51207c339a6b995c097a4715ed0f20a578159708650825b12f8914f2d30224caa806555c317aa3eb2907d33dd0a0fc134f6782b799ef158b7bdfc42bfeca7669ee0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547f7c459ad0718085699d236a3884951
SHA1a284a1df4316d89068c474d197d8ca6ad5def7b8
SHA2561d3dcd695c3598a3f3ee46c1a6b7dd0aafaad0060f794ef8ac8f54e413fba02f
SHA512fc630a0628ee274b902e17947f821e6cc75db056243be4f6b952e549b07ca8399ecf8a24f45fcfdc72b1dc627862cada4ad340df8692072828204c62c8437480
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5215b472ae1caf103113198b291166d4b
SHA1f3257a876aab6993fd602cc8f9165cf32ce6cc70
SHA256666579772732ff32209e6f3bf0fb798eee108c86caabb21660b14d4d886b30a6
SHA51210b3a1d67fba6c4aaea3cc12f6cba02ecf27b66c126253d86da48032ec74b6624ff119a29426d1171bf64da09be4a72a28905d2deaecf79ebd9f38ca92c2d3bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fba8acaa1148fa38735f8af4a337e6c
SHA1bed2eb3bc7d75d02121f6f6dc68ee9af3f44da93
SHA256d87dbc690469d680a0c4fe435bdc383a756bf028055752a6328058acdffcb701
SHA512f62c9a6672046a528dc57d17aad3bbe2df4b7defc8442ccc7578e97f8461234b5115c0827e261d5481a7df9ddd087603555b0428d9a51f1b5545bf34cdcdb1c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a99942280476c6ffccd32284ba0e595
SHA109645846e1473a6931b549535848b485e46a2a0e
SHA25633670f8dae122b7719c58efd300ab9c25a1ea0bc0988858261c1073d55ad0ce5
SHA51277b9c09811b8eed80b8c85493df3e0cad1344196624e24fb19f034925abf95f153a131578e972d133fb9be6341545b3d006c1784781df5ca90727fffdb1b0ee5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd1d5bb7bd061accbc19a1adb9419808
SHA1b200824b700400d4a4de647b73bfa40e35e7c666
SHA256be7537814e686b41986f8584677765dcb10a1f3807f0a0e81bc35ad5fbce997b
SHA512ce488db9577db811c75d50607aa20b9a9cde2703930b29adf0d403a6972980a79bd7163b845817b0e7dec94148141f864f964acfd5c2b506fb290858429b5267
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53773fe8ccfc2b42e8db37a6a76c95a36
SHA13e037ac9920541a2b4bb5d00b53433ed6349c5d1
SHA256a0eb7ef76bd3c60b5bc5c33649717e4512a8514c8b22fdad67789f4e30c08fb3
SHA512c7f404824990c792f4281a1955be9967b20248bd6d42a2028b9f65e93a1714d4c6178c22ec309dbf00d42894c906017dceb41693c4c3c742a279e0bb597fe0aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550cbee4b6ee87ee655f7e990e9ba3c37
SHA11a816172c2ee3dfc6e5136e2bbdc72df2d933bf2
SHA256787b3a320f239a81af907e4bc6020d018108324e66f57b452158773c3d46cf81
SHA5127bfc9cd1e987dd0b1d1054a9c8990a34242e6615026259966ffd042a25ff9f2562cf129eec64e26465bc757dddfe349c465353c6179e30e0f15090a979ee5081
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd2401b7fbf4f245aff8188f6107bcdd
SHA150e2e001ae2c0976490f000078c56f72d17f0b2b
SHA256aad50e9bb3df2838f6345059b493331570d7c33c598e665b01bcc1d1640786a8
SHA512e5f0c4bafc834e4acf2bb4ed80fe018d901d93e10270ae8da1889df0b07ba2fab78990dd2e9f6a6d759f995d873fb1cff6911e2badf2d6349c78ca15364aaf6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536a9a523af465cc0e19aba4a7c8ce5ef
SHA13f2786498b164828d7a0d53e746e7ff021d5accb
SHA256930816cbc2df0c23b03e053f29f19e931dd9bd499a1d5ea93484d9bb66d32062
SHA512ef737d6665b75bd712ec67aa6aed52835bcc897743396c2090240ea7a8cc0558d59aa44174488f6298dab313b11cfda67c028cd622d0c6df8ffb9ecea4c1716b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5640e208cbb2e4a34240c2cff1a4be457
SHA13e84dce46c93c586ef604f508313c70f5f7ea259
SHA256b63bc44ed26da16e842572c1c0cd267c381ed9c93d8cb8f3b83d21314f83e2d2
SHA512ef498bebeec1f7d8d9342856b091563df48e3a3a770ce8cf96d85b32bb16fd97a047431e465a9a9db105a231a3a0d0ec5db9d8578feafcaa3075ee000a52bf14
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b