Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01/08/2024, 23:57
Static task
static1
Behavioral task
behavioral1
Sample
823ed2f15de0a7edba4ebf7334a54010_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
823ed2f15de0a7edba4ebf7334a54010_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
823ed2f15de0a7edba4ebf7334a54010_JaffaCakes118.html
-
Size
19KB
-
MD5
823ed2f15de0a7edba4ebf7334a54010
-
SHA1
febf3bb38075c97f64d7d0126778ab329365008d
-
SHA256
18924db2caacf5042cd33cd0d1371234ba699b6d3c8a095abfbc6150fe8aa73b
-
SHA512
576be2697aba5b95c774872124b5c5feb496fc26c25bf5c725a890d4dc4e4c076e2954947875271f0e3584a73d88bd80014b6a0a7344f24248eaa1006903a69b
-
SSDEEP
192:csz77YAYS/Qo0mAoXX4LG5maNWJUDyPcb76f:csYAY8UoH4LG5m8WJUDjS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428718520" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c9200000000020000000000106600000001000020000000023d13975c710acc40f4e1f3b755b0b83a9a7a407551969a49bc99fa62544652000000000e80000000020000200000003f3090ead5a2dc5d0c0e82d0391e9318a836a61322d19e8be9dad9a4344cd37020000000fe2b74ae39b35ef4d0b332513856725d3850dd172d63ffe02106ca3432a1bdc0400000009601be1c2f042fb980a333445822a437c1d986290cf2a0dc21412eaae6719b8a3e041d8c900f4bffd58b43e2c143e2dd596c09ed3f199ec6d3610e1178ff39bf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30e9afa76ee4da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D12AB6F1-5061-11EF-A32C-7EC7239491A4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 300 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 300 iexplore.exe 300 iexplore.exe 1756 IEXPLORE.EXE 1756 IEXPLORE.EXE 1756 IEXPLORE.EXE 1756 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 300 wrote to memory of 1756 300 iexplore.exe 30 PID 300 wrote to memory of 1756 300 iexplore.exe 30 PID 300 wrote to memory of 1756 300 iexplore.exe 30 PID 300 wrote to memory of 1756 300 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\823ed2f15de0a7edba4ebf7334a54010_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:300 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:300 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5948560521988edd8397d69ffe0960bd9
SHA15b381f45858391b85b05d5777414139b1c5ae8f1
SHA2564e266c81ae2c3e7b9398349c4c6861641989facdd376cf23442c8650951bd4b2
SHA51275c9580d020fb3d920b8a8eb44993606f36a7c88ea5b8b6f4b59e170d995bba04171982e079fd23abe26b75f3d3a2fe2d1ffac465cdfab18c5a6dfb1d1bcd3a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c64e3593bab3ce17102604409c42da13
SHA12d5f8e161d3667be35931de9589f16bcebe3b020
SHA256d6833bc420b18a26a483cada0ffd33373148a6f9b4a7293aeb1151f7bfac40e8
SHA5127a1da0738da1a20bb1e5f24cedf553bd40206778b233517efe97333037cb25862733dc106fe2ef34acf229bbb2da9b13c32aa144375e806b5a93b1588730b8ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b82ca84958afeb7d717e8208e00ab8a
SHA19533f69b27ae3af56ccf9b569140d9e4959e5836
SHA256629f5997c7d85634d3bf17bf4023d5e2ca386e784d8d39adfee3c8a138aba97b
SHA5123b150586fe5a6b924b322b2a9c54e3d0b2763f5cb57ff8f6abeb37950666ede7904ef83edc726e9316d946b024da6162e5f53e68e22bb03ca4fcfb56cc711b80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5249c60c9ee367dc9aa9b3dbc5be09c5c
SHA146201d893118c9d6a889c621078d0e2be968c17c
SHA25615bad2d9e457da0cb229cdcfff1814d5aba99081fc1d113934be19b5dfc904e7
SHA51276cd1a43623d08c05dc5c0f24b27b49996e341d1e81a8361c954b0c329e466758ddf90a12a085a34b960df9008d313776acb83aecf18cd529f4e542af00ae7d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b1cd4f4ed2cde27520e095bf0ffdd1a
SHA1f1835a43c6cb55ace646f18040601a72e634c189
SHA256cbd57eab72a1603363149b77d8f52ccce25f23d7a8e189bccaa9336fa10f56b1
SHA512d2d4004b0b6b99c839f186488936deaf6371b381cc16fc5347d0ff8b271f3da400ed883cd1c5096c456b8dce8ca54877d79f7937e1f0cf07d0fd3a60528738f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a66778431de68ef6b2393a21bc1853a
SHA1a960bf022e8bf12c22774754775372785ba56c55
SHA2561597abd83519d2a0001e3c5f25d5ac24ccc4fb62f8645254f9546608d327ab61
SHA512745ba7240b2a9d08c4d7fe948accb8470ce24ce619c79afa9911565a5fed48b3e3b85961b16278a7603a6bc2d8c00b4ca0a5528191d403b5d90f3317c44ceccb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51befb85cc51096f969c45e3863f05494
SHA12468b2bce9cf3f8d817f329c34bec355ae83fc13
SHA256235fbfabb3aafb542fe836af73a1732478894810388939cb0e6512092f0ed6aa
SHA512d071e2ec28476140661d9d003e6e32f140aa290d0d916a8f7bd846b575d273b9404211302a1317873f891ae6bd7cef97033d17b9f16205ebe5047ee2806550d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5810ee81b6cb350ec488c8c61c91414e0
SHA1dd12c795c63312e4aff762fbfc39fcd8fb7a2b61
SHA256c7f4dcbee909d653c6f9bf7ac499d7575fb7f17e58a50a119fe741cd0d48beb2
SHA512a5563418b06424c8b58be9be588fe850af99cc775fc8c4f9d1be420f5088cb4acf632a70d8e6f25f9697a429d7565b9b7f331a6db196d0f392977d4cd45e4bc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba3a4e77a601ce7bc8661b44a50aca0d
SHA1c6bb6eae8c8536d7e51b87be583dfae081a77459
SHA25624b408e3c13dba0ba1ca4826c68dbad3a659f554ecf9d33a891f3179b0f96698
SHA5126626f0a7c5820105d9ccb27b8c42a14de45ff3c0d30cce39414a8abd1d8d9c445d861cb90e26f1c27e41b7b5a2a299c50d41489733866e6b3b548a96c2768100
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529cc3da1fb9f2504cd34e558aeeaad1d
SHA118663d619f8430c2c89fbf852835954c8566f50f
SHA2566a9ca66286dee836c7b3d4862287396ec6670a63d1073d099a1a0d3112665973
SHA51208b8b55a23c12c1e9f24573d441d1a67407bd0e02323df2227b930cc78e571400176a37c49f5fb80fbaea0db37276f068fe5eb2b93b9d48c4818763888676f9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5771dd0152308051bb96847eac85c8960
SHA1b2686ac9e2e9c835dcc8621bc7e1fe13370e8b76
SHA256413e4281f66b0281b92f47a106c7d306ec65520b36afec2b7d464222f40c56dc
SHA5127dedf0886c3fadedd16fecb94def5cec7545b781034a0fd0442690c917cebdc19456ae30a7b8cd08f19fbbe29c8d191c8a05ad77eb26d251e3c3e69f7fd7c372
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c837a23460c9975bb90896fcea67366b
SHA12e9cc3ce3a13aebe9d7d79e0e8de0f32e9cd980a
SHA2563596cef4d77ea03ac3f369d267b3f731b12c170b8123ffca8e3b7d827881daf4
SHA512e76dac4b6d0ce2feebfcb63effa94b8cfb0f9e1f6f0767b5966154869b443656ee2e53bffe734e0e0c19165ba3488c74d9dca3682e578ba0ee363dee10c66d65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586d5fd248384730cba99067a8f297b15
SHA1510646071956e57329b9074c46001b5c9959c622
SHA2560d7bdae77b08379421a22c3f3bd0353f997d7f4b4685eeb1e54f53d07ab728eb
SHA512c42756db6f1e18fc193396f169fe8e86086e781db8bd2657864795cc3a2ea8906e8e7922e22d636fe9f1e26114f8ffed5c3f657d664298f0742105ab40e01fa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6c71d483b3b7a4df1294dfc1a14e513
SHA1a8ff9d00791acafb01400c1ebdcc85bbd1aa6c79
SHA25694aca61b9ce47f0e2cc63b66de5b2564c1588d751497a0a9a1defbd479a2d843
SHA51273de3dbbf7f2e104c9bed94789ad6d498a2b7efc25fabe073f1b038176742298a438a59ca537202397e2d88cfa94bc49e7a455cc47b18175965dee81e5b5c382
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffbb7239089ab2fc47a97fd77fc8c80e
SHA1c32c003d1be5c3b1b956ab136a27bb4d5c8065d4
SHA25676421f4222cf0df24f7d46b267c74ad30f22262ed223f760066d8e1c76e22d86
SHA512ca6b08705cdf98f2e8a6aa4bb3ee180b04392c3c5bfe4cc36aad06938c09015cd55f201f1821fa9ba1fcf1ff87063030236a14314aa42db7dcd9b14f8bd4c492
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5552bee7f70a9cb1c4d9b291a3877ad3c
SHA11f065a2324be732085ca6d6352bf5573fb6ef382
SHA256312b4d4f61516499bf787b122c9f581d35b8bd8f63c587481a53d31b44038dbb
SHA5121420ca470919ebc926fffe2410e42d7a59503691f756096709e06adfe68bb834253b70ca1aec36b2ac64a17b9f745fe5b780a07712a9c08d1ca45add85444d2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5362fb2d4caf7c0469b18406c92b29749
SHA13b2d675564402aaaf5e94390e1ac174be69c6ef1
SHA256a9849a746d27a85bc957243c354ca3c428bb341a04dd8730c9c3a9f102479fc8
SHA512cc5368ffa3a5710d59e81446091bb29020d9fcd3295207381a75527810fb938528d4132d20aaab7e3feb90fe82ac7a0a0f5778dbffa3a57e4c998a2300cccb82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7b207b80eca7060cdc430d5af1ffd6b
SHA1a41af7911160c10a7caa8b8d9382d5253f1019f8
SHA256a82573cb2763cfc88b5a4b8a8d6b473a67d9e7c126e7ef78d56c60f30662e98d
SHA512ea121f27d1ce05a0f3193f4a280895bcc76f7c75409565a2f9cbb44758a7fe9b6405913c1d0ed69d63c09ae11461e8792cc05c529f77f558e46918548d229b19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50354ee80680a7a5fb0afea4d00477a43
SHA1e82804dc84dc8ce6709afdfbca0b338200342f18
SHA256799cf9926722bd92c319fbd6d964dc6487b84b9bdba1a9458ec551337265cb58
SHA5125a2b596e5337d4e4a00ed5957b581a294cf63f7eecccd45d8203350f354523d757c755bf20317e01865c4a8406f92a10cd94a87ca3eb84451b566ba4ae62891f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b