Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 21:32
Static task
static1
Behavioral task
behavioral1
Sample
81cc9bf72ad5e79d106aa3a251e8ff8a_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
81cc9bf72ad5e79d106aa3a251e8ff8a_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
81cc9bf72ad5e79d106aa3a251e8ff8a_JaffaCakes118.html
-
Size
341KB
-
MD5
81cc9bf72ad5e79d106aa3a251e8ff8a
-
SHA1
6f38f50c4788e0291820c7dd9a404d0065fd5761
-
SHA256
01ed2fcbcaedaeb727670dc0c812348c8e9876bf9747f9f5fd85c9571724a9a7
-
SHA512
1af965653a521b04e36ed51ea59a9595d416db0c915d39bb768b1580675c5031edf9547dea208641d187a69f306243785d1cac3b1b7c0a322082bbe9d855475b
-
SSDEEP
6144:tsMYod+X3oI+YXsMYod+X3oI+YzsMYod+X3oI+Y4:55d+X3F5d+X395d+X3O
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8139F611-504D-11EF-8BEB-4E219E925542} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4056ee735ae4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428709795" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000006a9c49a259475928bf7d501d3da2dbf626d5af5c12a10b9d34dcae9eb2ebc3fd000000000e800000000200002000000033edcdf0c14c795ff7e2698170993990bc40b072c4b59cdd289c956cafaf5e6a200000004021b0e9a7fbbb5ababa75f0eb54647350a6c351530550182423df4a48994501400000009acf3c79190f9b4c48998cf5be25001550533f4020a4a8dc300f0356bece77dcc56763089b75415225451ab8bec8fa46cfc563594609d94ffb02d06327d36b4d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2084 2172 iexplore.exe 30 PID 2172 wrote to memory of 2084 2172 iexplore.exe 30 PID 2172 wrote to memory of 2084 2172 iexplore.exe 30 PID 2172 wrote to memory of 2084 2172 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\81cc9bf72ad5e79d106aa3a251e8ff8a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2084
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59efff747f86757f998f3b985bf28090b
SHA1e9e5ff92614ec2c9d40e6cb21bb15346fbc36dc8
SHA2564ec7044b536dcd20dc53fba60d0a721edca77d6921f722a56e53b9386cbd039d
SHA5126412d25bb789909a6ef2289004452b829b94fda0d73a840ea166aef5e94d89e844ba8f8793076b746519ecb143949bf81562ee68df5db20fd004d81cbf77cb90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a3149f283821ff3c1fa3e1cc93e8601
SHA1517621c1ff4fc9f8abcc2b41fbb2b1927d19a197
SHA25639e6ba68fc735e3e1767855c2e26bc1a210e18c996d8b82401eef7156d91da54
SHA512cfe37bd89a3cb3d54170814f69d9f57ebc0c87a4c530af6b4ed1b555ca5d1f6b8e779aa9694e826f795b045489cd7e6578cd3a19b76ee2b9b640369112d5e377
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5603248ff56060a825f73504715c360e1
SHA14bb832dab4aef0d0f4b2656854cd3b704614d58a
SHA256721cbf334d469631c9e00f0794dbf3d7e5eea960fbbd84df1d1043d9c0363bbd
SHA51215f81054c1d3961a9bd5d4a513353621c66710a537b46202807f227c8884660302b0de275682fac8e12f6e5ed2ecc12627c69e940015f572a373b095fa6ef36f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533e769cba8ba809e29c1167228a9f9f2
SHA16e78be428bdba4ebb84d0184850cb89b441d820f
SHA256d8f10c648dca501ddc71bc06f9dfce9bd81330444884a00fbf5fd0de12b4187b
SHA512a0d7e32b2e7ea3235ecac16fac39398b0f56a678cafc5e076d0e1e5bffbbb69fac799ee7139274847844abae4c936bce402f78b5fe7b024780284efccd9914bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bd1f2fbfc575cb92120c978aacf896f
SHA1c9ca4d98db7d52df222c254ecaf333bda5b4bccd
SHA256506f7381578b1caaf2c13747a5f1fac895f2e311a6c40b6135e784ba7e2f4484
SHA5125c6aca5209d310e935e3abda9376349b0d13ae88015215215dd219aa53296d7f8a5ea6ea1d87cdb0fbcf282f28279f29ae61a50fc03f59dc76a10b15abd3a354
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc2e65572244636d158bb7259632b578
SHA1f28e690cd9ceccb616df92694c3ec3e8ced4f617
SHA256b5385427dfe2897b67a2f0fe6e73b597a3e46d75369ac97a4165144f5ef7a862
SHA51295ff610bf56c7bb9518e1862b6eb4eec18d8dc2e00157ed09a7d73a66437cface39f18e57198e6e254d8725a0927c5fd3b9e9f4b7959f0af5a73918f3f2e39ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5905e4b13f93b964e3856a8a7be73f0ea
SHA116a6474322ce42f41152582de018be3c3f8b497f
SHA256e776a0f14dc6755c276ce7341b5e3808bc5e7ddad609e5d14886f9a8366afa1f
SHA5124256d6cad666e78f702c18e2424e65c65d268c0e2eeb27b23a4b702cbf5d18928ee77351a9ae71ed3e15b5b63bc7490fbf7bf4a94264509c241233e6717e2bfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5943bf98ee0473b62ab49feb76764d83f
SHA112d827d44ca241ff04ba5a1cab9c681a9b96d244
SHA2562a6a026213061a49652b9e5b443c6eb902e1dfba73825dfeb65bbfa7cea2e480
SHA51270f73570826f4d0d631ac2a143dba79de2f1d7453cd8349263790a50a0dbe68444ba20ac752a0f57c6717b0d41520c04fbc3bae13bb989d897ba5f51b5c57228
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523035a849ccf33c7fef9d537c7de61c4
SHA1538f6166a90120a08fa09f55e164d91ad96dcc18
SHA25646f5b77bf20708256dbd14d0aac7e26264a510d9693c30529e161463dacbc8c0
SHA5122e7ecfd123cfa6bf2b4c3677875e34f033f5b74be0ab0f326507d69d02ff86e92652e00e4185ad314bf446f24f43c5be8c26e54adca2d899c7e6ac48d17861c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d6d4400cc589650f70bb0f049355242
SHA1cafc70bab88fc1951864763943c75c98db721b63
SHA2568c0e67d1be3fb9f1a2cb44eaa189931a9b4d6b86ee6957ea60f9be9d49190bec
SHA512ff91359be01d1ad29b5fb08bcc75d4b877c71569b874dcf7b3a606f2bacb9ba9ff6600022f09f41310920efd180d2f9bd937b1e7eb9a610fdf53f31576eb8ba4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597efb035c97083dae86b4a03bb83898f
SHA17d3372a4a00dbca5c796e2f458639e33c00c7172
SHA256558b4cbcc168e2204140e5ec943fab64bf01641e5a834a25d81dc3a84d39d9a5
SHA51203ef0486f0a880601358f228cd78c8eeb9daa8c7ea25b20a6752d8c103c28fa6cbf5755f11234a221eab4f4cea892c9a18faaa0bcf4630837d400406fc6b97f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9298069fc12f6716a803646eb8f62be
SHA1c80f51a016542a63b23746e1eae788e75beab172
SHA256956783023fbb688f9c3db2619f51adbc1445fd00604d5d02bf01dbe386e130e7
SHA5127aeee19ae62c1a20fe5bcb53df8e675f8a42d7e295edf7c296a65c9488d55e18aae0038bea20c96061e3c79b61a97cb206fe4ea8ebb0f7ec50a1dbe5e4031d47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551457d469dc65f607541927efc6f4159
SHA1ce9beef92addad4b3ad2c7d92408ec76c5f9a821
SHA2565b543eb86aac3c586c35c2985cf986fdbb56e1aba268eb0ccc9645455d68a8ca
SHA512ebdf2b5d82d39b6e4a20be5c100a3e81e05cd3651672916e0684e5927bba70c7cd033191d99b8b9b6275713d6ccaa2d37fae667d25ca4c5d4aae2a226c4f7c74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d329a7b6e26816ca49f30951da584d1
SHA1ab92b1b8d9f3a80b5da0b130b5a4af96b431a655
SHA2564ad447279aa15459338e8864f55f94ddd366681bc2735a47221f85419c4fac2c
SHA512672afbc820a2530835d45c7e63e92479de4597b72980393a24f6a1a3a3d927472d63c3acd49f218fbbdd7cc27e5ee4507516c7b7befc5974035914a75eace2d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50935bf9b9081a113d53bc2d1e80408f4
SHA1200295843f85bf870beeb56a88be50ca51947a6c
SHA2562d6c2529dab67e116abcae98b0fceb3f9f737c1c6e5fa6782f7704c75f481142
SHA512dd823dd06ae030c1d66792010348c1d6de5e81083736ab5549647a6328340891d63e5ec988367cb810153dae129f574009b689c499b5d93d259bff917ad82eae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd68eb93a060da524067011337b68983
SHA180322e253426b1217da585c5ce4ef269b85ddb8d
SHA256dbd48b70d84736537aad925393c9c94acb95052d49e29b9073d418bfe3774fdb
SHA5127761f4917ffd886f9e2357a5551eef7d2ac2ceafac1f19e871edc8bf92f1e3a67e7b4127d90f1ca749bb6aa93807b4efa8c603d1727938ebb3cb01ce1b04ff1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543a44261b41828b3eaaf07fab945e074
SHA111740f54a1469775b43af3389b32289337516fa1
SHA256a6a99969e63f1de0ebb08df4e04fa2395db141089867844fc3695473093564cf
SHA51296f861dd9cb25b81e7ebe1d6fc108236f3706ceb2dd5fdacf726aa4fdc357c857b02a7e7362ddd0f8688ed8b1d8a24b8115fc8ded76d767ed9328c3df7387bf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e83a5605f49de25e8f13d3b47bca08fb
SHA18e3a31d96493e36a3218e40e824bbfd7653f762f
SHA256999305fe1e0b79fbf24b9f5939cbd93ba75422d9f17ce6d5348b83b7d85c2851
SHA512b9eacd3205ef7060a423fe19a646daa453ba19050a53dd9b07db236a1c0dd3ab32849fde234a1645eef2fdc4ff0a36d865db7755cc9a64764f69c633766247c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b1c60585f959dfc2f1067dc652a35df
SHA16a565d5e0105c453fb887f3e47a288f2064bdbe7
SHA2560554652f7a5f5270b4331886cc4e0244e8338c11a58bf848d341207d34b7f4ff
SHA51299aba6212526badcc2745d21c20b1d8a76624d98c2dc88282dbfea9a49ca0bd112d1f393abcefa76844418f66e10061eb0c6a19078b1835928cd66da64390508
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b