Analysis
-
max time kernel
135s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
02-08-2024 04:52
Static task
static1
Behavioral task
behavioral1
Sample
831a959cb63393fc2187966df2ff2bf6_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
831a959cb63393fc2187966df2ff2bf6_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
831a959cb63393fc2187966df2ff2bf6_JaffaCakes118.html
-
Size
53KB
-
MD5
831a959cb63393fc2187966df2ff2bf6
-
SHA1
b583752fc748b297d6464a37771cf0574cfe8b57
-
SHA256
d08348782457fdcf92130fd672106aa538090241de75c00afadb173fb9cba1bb
-
SHA512
f8827e92ca94425e452f2547f8b60dcf8493694a0ab8b74587a3fb94571eeb1ec0c3d8583f81daff8f62b6da9c747489cd6d961792a7e1025715c41a5c335483
-
SSDEEP
1536:CkgUiIakTqGivi+PyUBrunlYb63Nj+q5VyvR0w2AzTICbboo4/t9M/dNwIUTDmD1:CkgUiIakTqGivi+PyUBrunlYb63Nj+qm
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000000e2e25ec803095346a65751f18f8e9ff1ff56bbdf32f47ef399854f1501fc2f6000000000e8000000002000020000000a15ad3b4a560badc65ca4845fa99dfe9353e341fa416c9f9b4a128646ff153d8200000001c187a9df7f7d86eef62c0d5aa45f44aaecac89df0b35e005779cb1370a7ad0c400000002f0cb44750c3c9636038e0d90563af40deaafb61f780dce2a80285c8c8ce9c9a3efa267d0e92ac3ecead62f9817c60d81756a7ad1d4dcf520216e82a9376e32f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c087c4ef97e4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0B5E89E1-508B-11EF-8A22-66D8C57E4E43} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428736228" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2400 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2400 iexplore.exe 2400 iexplore.exe 1252 IEXPLORE.EXE 1252 IEXPLORE.EXE 1252 IEXPLORE.EXE 1252 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2400 wrote to memory of 1252 2400 iexplore.exe 30 PID 2400 wrote to memory of 1252 2400 iexplore.exe 30 PID 2400 wrote to memory of 1252 2400 iexplore.exe 30 PID 2400 wrote to memory of 1252 2400 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\831a959cb63393fc2187966df2ff2bf6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2400 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4d03d28eb10a23df012cc3fd3184c3d
SHA17822cf8aae43582727d1bf33092cd6b473050552
SHA256df96e3a3865247b49c321d6bf8a6121147f2e86a2a856123f7d0fae618be0bd9
SHA51239c9c55ba0f5bcdfa6695364560ca05376c521b3131d2a78927b40c37815d5c738147aec4ff9d1bd4e31c6b51d532c613718b393f76e46cc02117b0de205b406
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56069d591adcf7a1e8ffec113e083a6b3
SHA164024ad38b0b85587b0372ab65b753707c97cc47
SHA25687c6d3dcd37fdd52b09e64c62a4fc6ff6430f6024ec038e9b3ddd128f34cb7c8
SHA5123222aafc53110e1f201835c2cc2a52f55d6516665f4aa2eaa566668a4c988c2a55b5a9e0564ea037315ea3de6d6f0cad3357a9ec27b612acc7f478ef5a353f7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d9272da2ef6029a1f5c5efc2af30227
SHA1030289efcf580b6b04642eac55436a077942f50d
SHA2564daf257ad38ac6c071ddf7a61cb32219c13d9fc5e7d186e657b35395941d1ad7
SHA5122110b245695dacd4468242e92abb9100220a00898dc7b4320083af73cd136d53038ba5162333d28b460d3412c1480b58557dc60dc1c41a253e6729aba85bfa54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd6fc7018d3bfdf582a27e4a70fdadee
SHA17ed0c685226557603804b44555176f62c95338e7
SHA256f329c9e09c3b4f5f9d10a25d7a1a2d07e2a2516bd2b9a7bedfac303d65423fbb
SHA5127b1e1f87586cec64512a2b3fee3454fc15c2e7c1a0c2fa3e6fda8d4c01cdb2fa6b97628b43c28d2eb2a701f3cd777d6dad0335757ca18378e530301632501063
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50641d0be4900d75e2fac97a0991e0ee3
SHA187654b049890309437cc5a387e91154312b5a1d8
SHA25664cdddc6916d48bfca1dbe00a6bde8356ead28e2ace09b13080a494166bc7612
SHA512b5d4c9a224b78fe8c802dc3c472fa6fd7d8c418303635d8ae5791b97b3b06f87ba7d8ffe3236ee1c2fc39d00d11611172fd376198df47db23ae4c8cce74d5d2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558054fb843d8fd409a9835adc3a1ecfd
SHA1ad1ef17a99fa209a4304badb8c172c2da45f4c87
SHA2562b5c02281fd16dbe33c49c49574a31b93c325178bafe6b65b08f2551fc26d819
SHA51284c04572adb2b87443d5a5b324d0bfd5974169f2fa99af9bc7c537e4bc57251df0c54dd1003164e8732a07ebaa0965315e42301e426f01bdf4039f419aab4907
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510bbd38ce962332703e8ae2dbf69cdd6
SHA1659bc5fdc8b372adbd43b0b4540c2771238b1008
SHA256f77b4c8034c6470ec11cc3ee904a08074529eb9772977b8388d670ebc63250ce
SHA512305c43df4cb276a86f7aca101acc6a30b75feb602519d5b97c13294036d3ada0127bc0f6544cd7b9cc2ce95fecd0fb47235ee30a24cf973e8d25847515216db2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afe43281a093e81c7837f36c6f584d3e
SHA1ae81018c469f146a06eadff261b46ed0b0007c77
SHA25699fcb0b0b0610a6fe76a86e9fcac63608da577a1a9eb1c2aad6a7a9f111445e0
SHA512dc3850c4d2237c693df2bf22a52a038cc6e2bcefbed051d84bae8097f463a892114344d1c08a1084c40fad5f46e2f06f88fcd1454e7987ad09ed17428084f2dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d305327086c056406a2f000507028da
SHA1a6e9f8c2f6ebdeb29ef0bd7a7e9f0abda0a01c57
SHA256e49123b2d9a3e459b5992b32f7c22f9eb01d526fbb663dd275c711a20c635ccc
SHA5126e1b8ebb6999c4e31b934900d4ac5840f4e2c4240e92c1dafe6af049b1334fcfc4ba2eb318f630c819bfa0515dedb8565be896c3760163d271ce7b37cae118b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524dbbd2d3533421c3e18dc33aca298de
SHA1227e0e15544487dbba7d49da5a573811a99bbbb4
SHA2562907d2611a1a0dfdc86f9f015ce5fbf65ab7e7f1dd35eb78db18f8695f2d00fb
SHA5126d41e04127d72c21a4debf7d81428acbf6d4bb39984c5fcdb03202787de77c79dfe98d96763e66d79564bf14d62c5d9d7e6b75deee6a0d3c5c53d313831feaab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3194cf8cb59f536872653407b52ec79
SHA136975fde8d6f06818b203f573788a3a89b72c7b3
SHA2561de1d0b98ba0715d877887764a9a917726f7b4e7797312d8b187d9e93db41e0b
SHA51254ff1b0feb4bcf100984c8481b211507984ec2748595e5ae34753830a9078d65e9bd8618621f98d8a2f3732520f1f26b574ab6a34029e6a992b72c6c34f9e91d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502c6d3a01ea14c5410861b2a8b989604
SHA10b1b46a582883e584d256b7d41c0e345f56ee5a0
SHA25695673e46a339cb24d72edd676fc70d476d66e8909b7b1e7fd23b3e6615ff861b
SHA51217c443ddf8781f460bcbc3e6b2c574bf7336d9a9fc64e867e27758527114fbdc9cdc385fd4eb302f00e3610d32fb23b0d3977633f93e539fa417aba02beecb29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5592efdd4a083bbc449db15bbfeb43eb0
SHA1b5c10ec9d89ef5b8c4c8056da84998c216a87f65
SHA2568566cf39ea285abdcb7db7ccef9659808d6a0e684cfc4807d20ba9de8bf71cae
SHA5121ab4751f29ac90d8d68c84b06adaf37ffddcd7467a15a331ee040d52b85775764901aeedddb4f9ecb7cd33d63238810dc4de13ba70e161fc2a297f4cb7d43a5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544ad057ffde97599a67618664fb4cf71
SHA174fdd27148e07f0e7e3db5d5f46bb280405254d3
SHA256cb4e89364c7a69878defba477a39ad2d096922a17ac1178e789c2aa978b1ecb4
SHA5125d49cdcf7922ecda2d2e9effe6e21aaa801f9c704425619fa3a04627f05e2d391f09c7a85799478dd7679d280adab67843e25437c08c8a6371e9410aaa95d212
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552c0b4b8bcca2f022b47431c84b9cc52
SHA1ef4cd8c1c78885fa70071cc25da7ae08d303de0d
SHA25638d40ec89ed37a50595490982d1896aeda226495cf46bded789793c585a737f4
SHA512f9f869089d71da30ff0d31c7662805f9fdf0ddda91c6a9726b51e6ccab783f067d7eee20c2388aca4fe80a6ad49456a7417b9cdca2b6ada6e759da6ca5e9a237
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558f70cc748578630c87d7acf23c4d755
SHA1a855c827ac3a97080a09bfa41fb278f2e6a6cb0f
SHA2565cfda6e8b102f4728f8a56a26590d9cdd1b7362fe8f094689cd59b39ef39262a
SHA5127b4649b7e76f58249b04cb6d58a679c46f619a0249efb49e3cfa2a2e40cc81f380a7624a4d6811116eb9ba8452a28a54cb6ce554720db8810b5708c726d677d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c85a80369f6bf59bca7913a5be7bb862
SHA123699c51b22c874aaeed3ef606b20e590f68cbb4
SHA2562fea794e0b2dec259e0b1bc8df55c03d1e55552e5194caa768f3b9e80ce2e59d
SHA51289f5ff3225ff7295e7bc7db2cd22a6c576ace5fc577003f24404b3a2e5beed925e0270ad41a39700c32a97dcae0cef98eaae8730553ab653b2c8ffdfa007e601
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a83a5c69b092189d65a39040d3445c3d
SHA13c654b0da16241f4a7b024a595ed7f8cac6563b6
SHA25620da6e54a076d4f4d7dd9b2dbbb08caede26dc3ef9def2d69c7965eacfc1d144
SHA512ef9d0f866724f35f65918c41ff4da2c2c48196b47fcb894af3bd5835d411e642d6fb2cd849c48b771a8a62779ff59fd2dee52a3e1da97d2fe9921f79f55ef200
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1VX38S3F\sha1[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b