Analysis
-
max time kernel
139s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 21:26
Static task
static1
Behavioral task
behavioral1
Sample
81c7d9b714029c41880ffd0f2769ff56_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
81c7d9b714029c41880ffd0f2769ff56_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
81c7d9b714029c41880ffd0f2769ff56_JaffaCakes118.html
-
Size
91KB
-
MD5
81c7d9b714029c41880ffd0f2769ff56
-
SHA1
3877ff04fe5eacf0ef1b957d3026e837b12bd7ef
-
SHA256
1b83ccaabcd7158d6cf9cbca9d56f941f4a4996bff753a7518a0046ea6a7208e
-
SHA512
18cedf03e7bad45f655161809fb8889d939f05007b6eaaf095a01c55dfb675a67a3e213719bd5568e53b08915b3d52b33c454d140db595c072436eaa26ea57bf
-
SSDEEP
1536:gQZBCCOdG0IxCNzov0X0nBC3pYxZqZQwDEYnqFdwUqIuhZ8Gjc2BJwWaAA8eU90a:gk2c0IxwPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 009bbf8559e4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000fd81c7b88a456ab5cb6181cafd65e02641aa0eddaad92f9f3e716a96a624e005000000000e8000000002000020000000daf45aa61cd6eaf39702afdab29bc9203bc7d55e4f00e38d206a3059cc6cd8ca20000000e479e19dd5f7c14d47c35f5228966ab3c6f3b2e542dd9dfc54a27578a836e8e3400000004518fb78dcd90d821f39b275653e5228e736b90ffe76856b51fc218ebcc56f380a66fab2bedecd78ae21c839344639e813b31ffae34c64422d8a286b9e5c7152 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428709445" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B00BB2E1-504C-11EF-937B-6ED41388558A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2728 iexplore.exe 2728 iexplore.exe 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2728 wrote to memory of 2740 2728 iexplore.exe 30 PID 2728 wrote to memory of 2740 2728 iexplore.exe 30 PID 2728 wrote to memory of 2740 2728 iexplore.exe 30 PID 2728 wrote to memory of 2740 2728 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\81c7d9b714029c41880ffd0f2769ff56_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2728 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ecb13930c5e0d41805383649646aeaf
SHA13f36cfb44a42f42e357eb52dc7234a123e531ebb
SHA25656ecf33d8a0e3e2f82a93363b9179edf5da4d0851ad5aaaf5ebfeb432d0f52fe
SHA51207111c037394a7bf1b1597e841bd71b31af743bb45c428bad94920aaeedfbc78c66caf9c69d1f25a92ea3f613cc88a686d6963e78d3f579ef7a90688f39ce277
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da343d8a642e76f2ad6a5a553bf9c162
SHA1751e051ceee6a36fe27f80f7e2929961c1d09abb
SHA25644c8ad13bc86c350e44c8921f3aca469e72b507db85a61b89fa118cfa32f8290
SHA512ba8f04d7de96e88f46a73ebdc9b79f4241fa7a6e82c73b11f38afdcf43a00a54108c6ad21b8ce5315e51f3c716aafaf69f551411f0e25cb5d135cb6146bcc33b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c3ecda5eed25106771910c8dc04c933
SHA10133b4c686741d4be6c36c88acfbd636d3b375bb
SHA2566678f212e941e28edf46f2a8d818d1d19097474b275605b543cb96e451e261be
SHA512fab09fe294f4c4212c82d4a8e4e98fc55b254af8cca81b102d766196607b9153243f02d9a98b1622894961e873091589739b8d2b5e4bc3ba845d560e40a60a0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7f5e2e4fefc18b03a4d446002dddfdf
SHA1b0b4eeec059faea41478b31f2ac12e8ff9dc423f
SHA256b0aa62ae2154216f389cc9f5c91123a102932dc0d2ad5da6601d4b798e45529f
SHA5123f904f90c08243abddce0f5fc6f8b08d09efa15bb122f49ce8a3bd89ed7434d05bd8add28aab46081bc841128854ab2965d217c0388b4e9aeb413e7d2149ea93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0427d70fabadc08d415e69a9ca621ed
SHA13e85b8b3a054e8f322180bf944bf58c6c4d41223
SHA256016aa0d5b00c6acff0953b6cfa71382d5257d8ae19c67a2f0de31d1c922c4564
SHA512521e9100cee47e8b6aefb0d284e10d35abc5f7e73ab175c63296686dae92b5f2255f17ef0074fee4b19fa1b5fe622409cada30b41ebf412fe94ad23e95be0492
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ee99b0fe33503a940666893edf8a232
SHA180afd4d0f97ec16d7c814188cc8c4e4efd5b2de5
SHA256d78c0950f5aefb42d0b3f87b6fcc3a459c9785f19e07d55a1431adc0666d7756
SHA512a2c08e249ee03ab1e966c59d847049e44e0408f0f96cc91def63eaf0ccefdc0e33894766eb2ed140d0144dbfc6b07be5df3bec32744ac2795a22ca2e73daae4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584c9d2872215c23496036a1aaa936510
SHA1a0e0331e60dfa08caba5b86f8bdf6c4c89a0746a
SHA25675a15b58ede7cf1cc6a0b67dfc37543cf666dafda03b5e18b3731ab78764530f
SHA5128da7c6d12b9ed5bc910e137d6cba9d17dc06ce89b41bced71e79dad3d917a09a0b8b58044e7a2385102941774c583d5249a80299ca671a1eacc76206595fdaaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504bac07665a42f689fcb91fe4ca7b5d3
SHA1fea11dcf42df909c2034da50dd625affb86d1520
SHA2567ee6edb0ab478cb41a76cd60d6d3c95351b761d11ba11a6e1485babc337b401b
SHA5126a95374df8bf32ea8c904bb902d7926dcad49d565499db00ae03d3fa9fb88f8e7495132bcdacc4a30819588458415c741791747a7cd8f32bdc821b1f6d7485c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e079a1c8039c0858a144cfd0c2ff1ca
SHA1160e72f5fd4e9bbd6d3c4cb301910d2bd3915975
SHA256ddc0fef88bb95e9451bebf61546f52ba05e66cf2aa4e2b970968c4c222852188
SHA5127cffa107e63c142cd35c8837a6a5d482eb4f0b22d5d5b9407428f80c1525cf871b9fd1acc8e31ccde566db32780a2c3ca5c24fef78176a360c752b87f30037f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586f107e3ef1563f32f88de7d27789058
SHA1b2d82fe0be87c07224a17ce50c147855fc8bc2d4
SHA2561e0fd2797eac10b3c41fe046612c3a66cbec93ab3efa4a54867fd74c9c0d0648
SHA5123d89082c4d3fca0ce1dc059db7f9e19aaad407cf47f9d0d64e3ad252c85eddce4f49927b631d71a41f1998c0e1064c102b1bde5cbd2b9b23e7391135e3922dec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d086fb3207c4cfcbb0e5a73b6ea7917
SHA1117bde5cfb1bc9ae4dbed10d3fe5110ccd583ff6
SHA2569496b55f51f45b87929493b205600401208489977cee3b05974ba94632949611
SHA5123f4a241f04a300e7f031763d93cbcfea88cdc1437a5927635254c23523015663420349ba00ecaddb17fcef0ec5a21b1928fc5396cea62135cc920831cd1cd1ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564f30e28ca6b87d5001e758e498d4526
SHA143e9a8a2a5e016cc15c88613b8969d15dc26029e
SHA256204f004fa0ce5655954a55317f77059b906363faf4a0604c4d83b5a92fa095cb
SHA51293ca8cbedb8712350e486d142a0fc3d2ba2f5abb8c258674fb88305cd58d70ed9f9042a6df84133cbdadbe0cfcdc62f81e442d548861d27cf45ae94c181a2b9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511a3d0a2cbda9fec35193f2ab0addfc1
SHA11e87fdce22ce2f9616891dfbd81edca3c5c3747d
SHA25688b3f39e9bbe35b6f6fc5dcebdc05e45574a433467a3a6eb03e6c19cbb3917ee
SHA5121f7e60f4f83e85d4622ab9cdbd43116c335dd3bc0ce4af1dd97b549029e82fc41dc700b484a32f63740fb016045800efa14c92d90bf33314c4f2a2c277c0f96e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b30a0264b95fc4de480260ca9cb63a42
SHA18f2a726469f60cb08a8104a7cfe6918a644dd50d
SHA256bff3acbc00533be5900ee701770efe87787f6bbc0d8b5c825db52d9ce84c9cc8
SHA51290c956a6abff4ce927efc6c8bcd097b6a209161b2082e84c7bd17841a89a9249ab33073da285ee28d50645d178bcaa4f30eb593aafc93fc249bf11b55f415b51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9c7f1d84db39e64814e915bfc5c8952
SHA1bbf891f1db1b9de0a5678185585fd3076886e7d9
SHA2567639b4fa30b8fa05f9dca9ef9b227b4d754e2f02631ffa933c09807ab20a19ef
SHA512336e8ab10cbc546385839cff67057cf1ba1a6f62c9067c29feb314afb938798d9f0d4f3abb93facdb981244ef9947333e62de0bb6f379dbb2e0c9073b41b2b48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ced0eeafddda64cc70e21db20b8f097a
SHA1aff46396e25627e764c96feaff2641c3acf83e80
SHA25621fe113037894e1e1d625e99aab0ab33c3867981fabe859ab0d18153cb71026e
SHA51229a399804795d5af783857c71a98ff8081d08e92ba1325b4d459a8b9fff4cf3126bf67dab89b112912e34ebb031c194a0271dd6eafeb1011512fa8cd52007cb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5814a294ce51e6227ba892d860a8bb95a
SHA1bc7841d56e477df5eddb593e1a1cc766b63a9ca9
SHA2566a78b033cb83c088ab3f6926b3b525863fc4849c940c9684547e5d581fc82a06
SHA5126e9371b4fc200761a352672ba7b8d5389e1ee5e3a1576c8ccab954dd87d9260fea9be8edeee77b3666f0253332ba6ae35e63f76150420f8ed0477203cb8da080
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59eabf7d161fc4c0daa750926b701c186
SHA18564efd73662c1a4eaf01648358c532a0d5c8184
SHA25654c8f3949a99af467fe712ad785bdbc1f47ef6fba2d95aa0470b13f49839c4e2
SHA5120b2570e9fa21338c3a2839df2541b2fadb092a86000a384f8d4b50d739a1694f531f6f0ccb43ccb9c1833d524525a2866a760f1a565e677f281018ba5b8872b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51412a1c0e435c32a4095b75798737897
SHA1260bc3197dbcb44686f3b239bcab4cbd03c1f6d2
SHA256497e6a839d86ff63352b6b003f06ab8c7958e5edbe06e2ae747b25c41f39c87b
SHA51281d451fdccfb0efa2830bcff681189119e27144b677b27b5a3f458d11f7731178fd65eb5298cc96f4ee26110000e97e0761aa903538d40a6f30d224a3af76d1f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b