Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 20:55
Static task
static1
Behavioral task
behavioral1
Sample
81c346e4cc6662664c9ae9da3fc9bb5f_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
81c346e4cc6662664c9ae9da3fc9bb5f_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
81c346e4cc6662664c9ae9da3fc9bb5f_JaffaCakes118.html
-
Size
6KB
-
MD5
81c346e4cc6662664c9ae9da3fc9bb5f
-
SHA1
e5eccf2b1d16594f797c3b1c27d9ad456ea88ae4
-
SHA256
1aa2b33c8b4c9daba3d3d6df7aadab48ea1ebb826e475c47dfafe3dc5a3d0ec7
-
SHA512
200baa9e34b17cc8fdc21e2394587a42438425cbb44676c1624405c3be9914292007789d5d4839ac3a87b09366daa043ecb0e025aed1a01d71bb86f678622d77
-
SSDEEP
96:uzVs+ux7eMLLY1k9o84d12ef7CSTUHh/6/NcEZ7ru7f:csz7eMAYS/O4Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf710000000002000000000010660000000100002000000073c0842928afd08e0032004c2ba28b59b2a084fcad77e7543ac66b6febd0678a000000000e8000000002000020000000b8a786a9d4ffad9d71e5021fc9a76b80cff44c36b61f99b07b3d1084c470535020000000bc32342284788509dfaacdc53e0d396845a79e4890348fc766d5686ff48650aa40000000dec67a299f8c42de388415da0467b85621a683b4ff8e05f82cab03d84b9d417b1fb2b07d226f4f334b65df6f060c5069de337c3cdec533d2638e01257dd6e425 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6A57C8A1-5048-11EF-9D6F-6AF53BBB81F8} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428707610" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 803c925955e4da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1616 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1616 iexplore.exe 1616 iexplore.exe 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1616 wrote to memory of 2960 1616 iexplore.exe 30 PID 1616 wrote to memory of 2960 1616 iexplore.exe 30 PID 1616 wrote to memory of 2960 1616 iexplore.exe 30 PID 1616 wrote to memory of 2960 1616 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\81c346e4cc6662664c9ae9da3fc9bb5f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1616 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5729f582c9a10d5cba2250855bf2fbdf1
SHA15ad7545b98e9fcb6845aeb8ea7757f08b4c099cc
SHA2560a850fc089e6156742db044e2bc9ff04f4ca490c26e29078fd923561e4b3a9d4
SHA5127477825c682dba8e3411bf6ceeb9866e130350d281f40f4f476dfa48d52b9838808212e753ee08058e547eac6898127b1a34156bb7e918c9a72993abeeec179d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc090246665c5836113314671f8b9de8
SHA19ffd0b7b4c2ec88333cc2dea8ecd1e250cbb4958
SHA256c1d0d4300b89ba89f5c3081ab1ef8765e1deb5f26f249a2377a4c931b0fcd4f0
SHA512a7bc4a652d8c479e592906158b343edea2552ae7eaeb95ff13628ec3dc0704052a462090fffcd6c2677e2e2cc9d607abe6c0995540bf41442bbc02686472d941
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567eb23315ec3102a3c465abaf9246c65
SHA1f5e9561d2dff6fce5e98d774d773455a7e308953
SHA256681322e19a78a8b394d0c2cf0c09efde4c939d176681577d3dab1e9d1a323533
SHA512b2ed8e3ee032a205ca694f32bd76e6cb0c5f3b483a934eac610f601bb9ad3ded6b2c92ea8f6742e8cf5258c6395a0de81356fb98d113e904387a8237d02e4ca0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562a8ceb848f29524a3250195fe1412d3
SHA11901b36d4b0422b3dae7fcaf5e603fa17807497b
SHA2562883450e6b2d0bc0fd2cdd15eaae20a97ba3e207999ce87c5354e32427acde4d
SHA512d9ebd98bccd4547ef8b39f85587513da5154e447cfd02ea7421516b66fbf6c0ef46efc85575f1fe0af4d596ab3e0101bddf4dafc60b1243f5405f89df2029001
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c6c4b749ab63ba646c1becf4a384033
SHA169e64b2435998eaabc7dd091a40c97bcbe44a922
SHA25659c8d28f68e35016d237030eb17855d4dcb2ce78539f6c742f1cbf1ba83ec6e3
SHA512a47d3a795a80555b263045ef14052fe6a08979086d7f50e5474d9caf6f21100859145423638d095dabe4d281a410b25b97c7bc48cd86c5b084162c8d9c30e5a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50388b2faef93e0f7fa125f6bc17a1a57
SHA171c73405c63cc3a40477b60cb8ae4ac07a2c4b0c
SHA2560d97e5c127f682d4c8fae2ee934bb3a75a81ae899470a06e5e1e4ef22f81dbb7
SHA51289f8d8d79f02b5373b2fcda10d09e20cab35592b03a245bee5e9615c9198499f3d41aca3818aea4adc05f419dc4f015a156e9084fede5cd7ed3860c069f1d4a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b25d7a8e0c01d0a86d22daeb6ac4af46
SHA15a53785955f7812ace0a7b8f14a9b000dff99611
SHA256b9bbb4c946be42429e9bf20f4e606294e813fd7576645f5736e7414562538fb1
SHA5128124f021f768b85cf086c92698392e061702e48df65478d7d831a60e65635120ffae1b5795364f1b6e31db24680267ad9bdca7b8bad66b824d0a6d5574020eb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c836654504bfe46c79c8e336211ac4c
SHA1d30ad61aaccefb70b57dc5815d61879dd566d89b
SHA256ad710e805dad8042dbe30fcea6a29ef326e584fdbb4c86ca5757a5a6607ac9b2
SHA51233c994344dbd5d11dabf773c4a39ee3ec2ed3a6b198640856c2ba305f100445bad471faa1f8b5f3fb8da23d7452b7f2b4e2d8beb03aabe03592112890e94212f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f761c0468e86f26b71f102f0abab0754
SHA190ad6d5bc75a07177b14cf1db18603f9c0e8b317
SHA2566cb3290a98f8589dc81064ce323c538f29666d1906bebb71193cdb46cd8d1ac1
SHA512de98049892fb79b1aa90d8d814038521f6dba3bd9eabe0a667d56cb25d187fa96760f261b27fdad4aabf808c2ad472f1b30c836f5ea1774d542913e387d39397
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b7a6c3edc1be8b4ef7fac2f59c9cb5a
SHA1b0966bc78bd62cd110c4248405a8af605cb571f8
SHA2566b784a67971c46295e35782e8966d0b6ecfe8046063e87bede52d7699d9c25bf
SHA5122d1d109c9ff10514c642187228c72f72bff3420769bda3af0118e0c79e6714c4f25f8c1fc2a892390edfca4edfdf346b07af70a1a00637f6d83c81488f3393e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512c6447f4157956a547911bd7fbaea93
SHA158849096f5d81dcf212b9ee2fa276f99fb799122
SHA25668dbb694f9d4213447c2043cfc0c1bd968612b5b5f64018536427839cc9fea58
SHA51217aad9d25878bf109e07e1e83c13ac31cdcc4d6b1e5a051146a2d9542d00f5577ba66cc0665b30315fa611f64d60051a59a0ae46cf0b9249b0e13b65c05b1cf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5b17d572f2f76811f6181f69150ea52
SHA125573e966dc16119f837eb63522081ba5294e058
SHA256d642a5482d75c997effbc5c37a7b5a1d1fc0c544f2cde572b8f025c3ceba671f
SHA5129d3fa5f5ebcf8aa05cd8b6493ca2127c3fa0e43408a3986dd25b232430efab241e0f74b22e6923bad763497703521164a3f7a61f569e06c041e062333a4fcbaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d3e5045c90c592e753a253a9597aacb
SHA18d789657a326736c9b8dfd421bb85c7e1c3c627a
SHA25675d8e5f2d36e18f3c0e9ea814157ffdb168d0eaa29e9ada198ccb62817ebd98d
SHA512b6f933e8de1990cbeb06531d43b5c673b41e9d2d2bf2f2f636690a8f05a87672cf124f57371cf3b138cfc3ea065c1352251cc08782d374eb3a96a07935f78d15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fce75e527e7734c44a8b7cf88c4474d
SHA1cf2c34597ba44a423fc04077e8a480018bd8f150
SHA2562d59843566681a6ba97f547492c32a0a6f1b4769c07f115dacb0f7183222720c
SHA512194655aad903eb5e3e09487e79846e99964de66d9341bd5986f16edb1602920486ced077db542a3175bdf53e01d77830bf1305552d2150dbf0fb71f51c1a4264
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f35f6fb489a40ea2f683055510b8db3f
SHA16a428e6929815a74361989c1acc063fb12c20f95
SHA25688f65b2b1ede3d6cfd7cc9a945b3765320dc4f09e03d505d4f285dd0ac241a20
SHA5123735b44918de27e5981edec3c54588bf776269bb1bdf811bb2328f74fbc359ac4626bd5d055c4c6b15d5040ae1b21d7ffc0893c40fd788255e30a2529d55fa91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e4511962b2130327077c32245d5a4c6
SHA1653de6e7fe604b8d8a2b21998c2d87383f323911
SHA256769cab76df936b98f1a03a8355a6637175477fb54ce2a2829c9b8c494203b2f7
SHA512d18c1636d66dbd43d217484643b0a87e7683f611bc53f09ab4a9c08e3873be6d7496d250e9f278fa3b5d8b9f2d07bef69a27d388fef0327e02fa25249d57ca76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546425c95512dcf694dea7eb1c1547dee
SHA1e96dde78d954d567e8b82f688dfcd148b138b2cf
SHA256dda09eff988e7621ab8a1e48384c748fcbd8407623583048f9a37a6a03e767ac
SHA512db18290640edb2cd97c3308269df3f1a72f47ec02eb4b2a4c282b73696f5025ab271589fbb2b3e8b664f250615d149fb7db24fb1bbb7c60b4d400dc8d496e4f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5785343b6c243e5cac6f2edc245e0617d
SHA1b80bbbecdcc515ae96a60f7ea45715f9374eceed
SHA2563401755651b8e35a18db6d16b9398eef5795a9d46ce0218d397da836b027c718
SHA512742e599b6db0401451572b18bc4f03dece1942a32e5b534b9b4cf297902f09aa46bf36b606e7bfae9772075704db0b033bad72df7626ba8667ae4676877895ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf0cad268785fe362de0d1d4ded3a810
SHA10a3110960df7303fa78b30ee152e001be503bb22
SHA2561666d8eadded672a1c85d8f1f4566352276c3d718abaf9ad192427bed0869118
SHA512a3cdb6d306e596fe58335fca8ccdeed71d59f9faa97809d0f1804c2b00f1805a48da9d380956390803d903a9b7f5abd7f485b998460d5b02f348d8d70cc5dbb0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b