Analysis
-
max time kernel
135s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 17:58
Static task
static1
Behavioral task
behavioral1
Sample
790d3c8a95e90c3dcd7dd1e061c0f7c8_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
790d3c8a95e90c3dcd7dd1e061c0f7c8_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
790d3c8a95e90c3dcd7dd1e061c0f7c8_JaffaCakes118.html
-
Size
8KB
-
MD5
790d3c8a95e90c3dcd7dd1e061c0f7c8
-
SHA1
a9cea2dac1206add24fe2d59eefcd09135202c4a
-
SHA256
d1aba348b58aa9edb12f93ce76935b44ec3b133054f2bc8494040328f9c58b31
-
SHA512
2336d2e468ba2c036eaac7e056196ea0a54860ebfe7ec41064b10d5dea1d39718d02fe77be6cd9ee957259294cfcae9f82f7dcbd38288e2ad5c17f9d309a335a
-
SSDEEP
192:5doCF0fyl2eJSyisMidZc+0GKUKy8rxuenNsN9uf6Jg:Zayl2eJnisTdZc+vLurIenNW9vJg
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428503201" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2086705179e2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000001f9aa697b2e5bb897a67f36597e113397bad3ac971a49b8cfa81054db28bb9c5000000000e8000000002000020000000bc1180942fb6e0083b8d24b424a138dea355213280227e1826b163a31a46a6d520000000ed8de560e1dba5381d70fc81e2acc2b8b4bc0243a2d17229a00573c96e2f45fa400000004d30d2e7af47fbaa356e171caa36be67bf531c911b8fdd48f9284aacae1710943b50ad56bdc958b27715f025a468fd5a788fff4bff33ccf9fb43a5ca97dee46d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7C5776A1-4E6C-11EF-8D34-5A77BF4D32F0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2728 iexplore.exe 2728 iexplore.exe 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2728 wrote to memory of 2708 2728 iexplore.exe 30 PID 2728 wrote to memory of 2708 2728 iexplore.exe 30 PID 2728 wrote to memory of 2708 2728 iexplore.exe 30 PID 2728 wrote to memory of 2708 2728 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\790d3c8a95e90c3dcd7dd1e061c0f7c8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2728 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a64529d98424245679fa024811020bca
SHA1ab0fb5fead55ffed3442d060aba3668fbd67a691
SHA256d578a34f6245b4f2dddf49517a31a76784260d681eef110251e4b6d57e1fa425
SHA51237d838c601a1c934c7f1d9c4bff773344b19ee23e2c64ba709d3902c1cc6c80b02b2423aabb55f2adc9dc20458fc30b60c84056d202ca3470e45bc3f40394ac6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55edf31872cca08b966c0c45b3e45bd31
SHA1f75353e8e9b7d773faa2df079ef43b3ecdcc53f7
SHA25677246d0f365c6c6ab0b0f1f81e77b398999f66a6f21a7c6c3818981a6ef60646
SHA5121a17cedb495178e0c32db93c5dcc60678893ae4033e5ab0a4ea108579aaa3a8b99060f7b9316bb25bdc73fd336a5ff8dac16bfad32afa6183d3778a1b4727eaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53362491e8d5a60766243235df65f4f6c
SHA19aa69fc127136190684c629973c828bbca61a8fc
SHA256ef82491442b596f97d4579b67764ed0cf2067915ab53bcb25ecc49cd1a817e73
SHA5125372aa6d2d1ccc0d3f01c63ef7c52c134b74fdd0411dc01eef2c4adc445da256da74e98a3fdafd88e17a455d8449a3c986ea704038b86671185e68f82319b79c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518dceaeb2ad6ffdfc7584b862788ef92
SHA1eca776b852074e6f88d31f4d89efe115f39706cc
SHA2567864b2fe4e4ffc5753f879ae333f04d3cf01d2c4c70fcdc35a793834cd20ffb0
SHA5127d612eb7f717665739f49f45e2d35f2119d01e26e3c0b1a125b49139b9658e14acef311edb96b31e9db5e00a5918d61cd4ead7a82d244af93a92c608e7fcedaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561a37cc07868e3c6ff77477820c5e5d2
SHA1073a10fc653e27ea4164cd6db7f95bbc90883c87
SHA25654506634487c2f719cb070d5500449d0d61653cad53bd326e93f5f3e783cc7fe
SHA512906e96743895839c257e4b99844899bf8d2c3a80fb2e0449f7d12790e0e8ca62519c8dc1feb64acb8978d376b21724cf77c243386cca863a0cd28ba66b4b999c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d3acdbcf69db22ae63cdb896de04f93
SHA1297fa92fc27fc02675f6900170d57c4a5a07681c
SHA256f3dcbe6ceefafa65e68237551ce8eda5422d41f7d924784810c5720960208fb8
SHA5124e8a71b5cbca01b78f4baabb6da8585388b4d439ba50fec998be5f49a09224577f89fbf6ced782f37278478355debfac9650bc65950fcb955d5a7b262f5593d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8295e0f440256d979bad8bfe425ce87
SHA18cfc9f71dbb91354605e1c2927c8d28b4f65eb96
SHA256b50f282c33db49f1b4c095eee4d945abc19152dc6cc95fadee842fc3b2c90fcc
SHA5129647cbd9e742fdf100aa7891f05f599bd2c6395bd1280b56a09e3ac24aa38c41097bbd61134fde757b60e6a44eab0ca4a9f82fc24f7c24103f7d2823248c1e77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c13210660759efb1e87cb75be90ac84d
SHA1aff7f58e5934555bde41268cb02add635582c221
SHA25650247487c75777fcaf077ae8a36251375c826e53147d6a6b9c402b47c2e73165
SHA51292f20f04a80559513b964908a47add0eccb5027eaf9bc61ff6b8057e92b103358606bf51d4496a12b6601aa3850c42df0a0eced7bada0d86f4adc0e63e9991a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ee0de44171e927db4f0593725414314
SHA169efacf9831b07acf989874885e0e1aa326b9e55
SHA25633ef8b921d1cfcfc78dd633341b900a1d8a7bfec6c4ba0ad980ea696133905bf
SHA512167dc6ad152b054b952464ef59578800306169ac9974efadfa53a4c5678eae94480781bfa94497bc6b110331021ee2456caf1aef86a78b7883722d4032c4eec1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54614a4bf352bc76a3402a4e3db1e6cb4
SHA1a7a36a5c8a53b1dfaa1f63c5be2b29f82d523353
SHA2561fd0731ad494f8a01417c382140fcc3eb187652d3d1e4f2ead8f25a384610e6a
SHA51268516dc8857e9b15aa0e9a92c57895f2764ab9ef9d787cbedec8e057020457e2323e31d3334b036bd25f18aa9d73b1974f7ebc98eff36df44bfa453afe019a15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb89dba3b8103cfb07faf8cef56a4d0b
SHA115976bfe7ad4370eb6f07e59ef5cb297bb4b77e1
SHA256624b73b68a7aaa604e84decdff6f337472d5bedf3dfa3388bed1287d561706df
SHA51297990655b1cf713b292badfc70975f82af80bad9a95a8a60075be3bffb5a1a64196afb0b6b96db7f382b36058a513f3bb1f18204a9193f92cd15ac4d3a9c4c13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516113aa3660a59ac740626757722bece
SHA1f99f42dee95f7a0c0c3ae0445b4ef35b0981957b
SHA2568feaf7e82d13ea1ac5ca7e27aaae9d95978fc3b927b2f751593ffc35e5122517
SHA51263a6894e05db6d0bb1fb6c213d3dc87b8b9108e0e67e0ae756b78767ed257f851bef6ddc9fe49eb9acfe3a0492fc2d65b99645d67bb00aab2e7b95e7197a08bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e366c5b84fad7cf51a45adb3cba8f714
SHA16c6dc5384d178a87097363a179b8af1d1a9b607c
SHA2561c894ab9807facc5cfed26ebb086e3a927e1485fc895e0302c9ccddffbef5ee1
SHA5129618b1522e77de5f17c081accdacfe2c1ea7c172717a0ddffbe5ecf0a3732840a415a28857c44e2fe819645ccc4c132490af9604903dc429d51917147560ca19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55110f182e61cfc8e412eecff08c339d0
SHA11835167d22523a9a2897b45cafeb01181500c56c
SHA2569958efc71fe6309ddab98a64db3dab30b0c5a591dcb6efcd3b92420fb487a3fc
SHA512fd8ae92485b383a3a970019b0c062fa41f5564bc5538e7edde67a63d4d1ef01d5ee44ca936b44bb15dd1ca055093b84d7c953344af94114015a087fa9c9cc3d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9d8adb5c60db2de99997efa229a6f44
SHA1b150a1c8cb3c633cfb0bd571a4f9dd506349d46f
SHA256580a572ae552972a802bce6666fd474baea167a2b3a18bf728e30900b081039a
SHA512192b3f648e2e255f04dc91fd2c16e219c5a522dfe363d71ebd4256baa7384ab8d20166d23ead3caf041785d56c0c00ec6fb9644c9f6dc81b82d1772aa05401d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510e4c616c7ce463779a0090ca71c05a0
SHA10a382497c9e7e2beef96166f835c03368c843f9c
SHA256d5bfc59905357fbdf8ad4badd342a1c029aaca235d4ac26dcf20865c015cee60
SHA512bb606981e4efacf353a4b4f6a2689487d2b0fdb2fd8f38f5426aa29c19fbac1bf0412c683362090ad36fe7467c867f7a0fd01b89f6a3e40baad8c280aabd3893
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a34a926fdd6a9f9be733ee24bef6d50
SHA1de5da16705032ebf00c713d89222dca602927452
SHA256b1071979c9b763015584b9f7f9be553ea53bae2189d737c30d57138e3ec2b6d8
SHA51288fdddc789982f4079ce3a191104f2c2d4810746dc14369b690dd70917b621c755201a718b879adadffce006ffca332c51c439dce7dfecf213cffe4a8eeae22a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a76b5b57e60bf403c921db3cd059225
SHA1007e715234ea53bdf9b3a1f78991e9d55c205f8c
SHA2563dd7bbf7674d16f0f965c28490b4e95a61eacc624041563c88cae76e113ffbc0
SHA512587de6865d96e76b6b2c08e94305584df4b0c207c65d99df13996d5c47a9c2fa3fe69e097ee6cb3af6581103c367050316f01b8d10f7cd0f03320392ea4b1d5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57494a08a83b8caaebac6b130ac83dc3f
SHA1c26a9aeadc1d6da0df4342b570ca6968aa059b15
SHA2562020207bd70596dbfc41fb3e2abd2244229641e4ce3128382433fbe09f2d269d
SHA512be588af72ab96fcb6617cdd96bbb2f1750037179491becb67fe4ee79915d61d006ef4df85e9472db81bf227888f538666c995894e14e3f2251efef7a5da8ab7d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b