Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02-08-2024 05:01
Static task
static1
Behavioral task
behavioral1
Sample
832125761cc589f9c596b2ee5054c590_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
832125761cc589f9c596b2ee5054c590_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
832125761cc589f9c596b2ee5054c590_JaffaCakes118.html
-
Size
6KB
-
MD5
832125761cc589f9c596b2ee5054c590
-
SHA1
0ae65fa0e074d0ba8f7d6adc6ecc8832576b029d
-
SHA256
c256658dc66ea97c3a72de176e5ac522f409e4c495a71789d06651e7108a3eee
-
SHA512
bf5a81d526aef83c4f4bd99f0999bba1cc5ba74e3af638d9451b58ed8cd09ec11484146dd301e27f33c63a47dccc107472402d7a464aa70d2681632d3bfefe38
-
SSDEEP
192:NgoWiZLrJSmitiiatZZFH0GvjyxTGGJWuYXoXaHGv8y914HGvJBHGvQiHeHGvWQL:NmiZLrJSmitiPt3WQGJWuueVP9BOlpN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000ccc7d3adef604366433cb4f5c6603a7dea29c9ef86994e4b79029b665b5942f8000000000e8000000002000020000000f5599d5a51e808c012619d0ef540c00902db56abad80902c83e62fc258ddb72d20000000d12741a1879cb37f910502bbe240cf37370c9699655ca1fd868136ff33418cd6400000009fe847f67bf312727f1cc4119c11e0053d632dff7fa58c25f4a07d28a1961cea3364c81649f213e6761728f3fdcf6629ab736f262b869ff45b545cdae975c944 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428736768" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60821b2599e4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4DD1EEB1-508C-11EF-BB9C-566676D6F1CF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2976 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2976 iexplore.exe 2976 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2540 2976 iexplore.exe 30 PID 2976 wrote to memory of 2540 2976 iexplore.exe 30 PID 2976 wrote to memory of 2540 2976 iexplore.exe 30 PID 2976 wrote to memory of 2540 2976 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\832125761cc589f9c596b2ee5054c590_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2976 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5f2039eb5b95afe7316a0f045e4f4f3e0
SHA1dd1f082a70555eb2f157f83a31f9857476f5b6bc
SHA256744693a2bec0d2d96aee4afa8191e5b432da674e59ae2b56b65a3122bf1e73b3
SHA512eccacccd70f5463e4eaf44a919e25f9750b0cc7883ce3848e9e829018ea962a73f220a424fb366074377169b25d18848c4364e232fc4b1e766d55894e30e9d9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ed1c41018eadb92c273399ef48ea7da3
SHA10660558c37bd116b4c01648bff8134656cb16da9
SHA256c17967909a9e3e75f39e41ca7c04fa58549f43dd4307ad67140cd069946cb9c6
SHA5122b8cdf2a13edf6d8e230787a76f83b26a2312cef086e1cc424a017a3ca60633587a47a99cd63293240149dcb840ce2da70436119c6f5ab7edf7ecf734551d5a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53867b1e897fc37fbad971ab7eb6e6c31
SHA1188b9f3e46b6a434fcd18e6c274ef0a615046b22
SHA2564064283830830190bd31ce1455dbed4aa50eef26876b2c711db3e476e6f702cb
SHA5128580e0b9f12a455ac1bfcaf17a5e3e2fef0fd7267c4d62329b13bca15b9d5a3b9392eb0e11e47070515f688063ae61816c025a8bb3b014a077cca93c649dd0ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5019089555cf940b8bce61d4daaa0b5f7
SHA12b0c01d5c67a9f1072e7a6ab3ecdb0c5453db0bc
SHA256ad6ca4b8a4a0e91370e6d3c81fcf0186c973bfc114961025439a4f7f3ba453d1
SHA51253f4dab29ff64d49a3adc49c963ab5721a818a761d95e40c9888ffd9760470b4540ae743ad588221791d3bb3eafd0e41e82fc439560c2da4bdd84b545ccd5189
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59eb7b3165b40871c90f796e544b675ca
SHA17e0c4bda6a98e14636c689e0039ef5d98d3f63b2
SHA256896f22312299947ce75eea91c63cd49bf307f0e2022871de2b86f9ab9de33948
SHA512363e48f43bedb1568c2b9730005ee7b7e16d8f7c0d4779250b1ab2abf5f7470c7942dfefac5434fb20e4d7d65d8ca480de9571c9bb74678a328215017f87499d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD570eaa6a8568e1c19322845263e062857
SHA130ae791f0313c8663f483a8afbc5273b82eb87b4
SHA25608226da0ef7e797c76ce4ae4dc2e3e17cc2fa2a13876bad96dfb808b180e2749
SHA512e70bed5c4f6cb6af5846a282aa110248ea3fdbafcd76077c9ac738636e2a65586db6be86b03898923eabd42cba84230861d3c94ef76fc576b0f55c6e4195aac5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e2f6a23dd558f6d14bd3bdac2a8bea64
SHA19ae11ed49d5ce84d01fa9d166c0be21baf5fb969
SHA256dbedec054420173f1247edc7f05a08adddbd1d51389e645edb6896b047abc4e0
SHA5122aa1c363d944c3b157a3b1172d0992e3ecefb074f0de3b95f01f99ecfd676c6858478b4b1563d139cfd89f27534021803d268174ecbc111d615d607a9664062b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5baa1c48998128ba442dee33e580ec32f
SHA13c57ae18d2d66003a8d8e0f236d8463fe7187341
SHA2568703f8f7f5ead31ffcf3287abea980c39a66d4e0e64eac596bc9e3b6a4242b30
SHA512b1eb91e9c3aa4c63f1f51b68987d31ff8f508ba6643d5251ac3ec92e4d2086613214b46db18b11ffd344a8c3a50d90537db1deecedf90051cd9c97241eeb1a7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e990164895c7cc676a3c041de3a18e23
SHA1382f766893e506b7b56770a1a8e24f50e8951c20
SHA2568fa2ce121b2033bc967523455f4e104ddb6c8193f1f7e8bd6d0da3146e79f70c
SHA512f0e48132df8fd8b04c56600e098c21d737b0180a73b4ee635a9f105646fae5e9e3a8fafeed16c03af8ad2e516e5be971157bd126095a26e77d49d2224f7faad6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dfaae186ceb612ce478ca342efed21cc
SHA1e9be84def6819112fdf2d223dff4236010c9bdf3
SHA25659d965af49d981199fef6845a9fcea0055d31919068925fe7af5f9ea37224fc7
SHA51293a9d27c0443c35d43b330de9a479cede01574cd88781d43384edb1e13f92794e1b0531519bd3df1a86645cd4e982d3ff54d7b0c27136772aaea4abeb967000d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD531c38e75e4e5ddf89ff469e27b89628e
SHA182cd50ff7d503e88aa4e4120be931e2b89972af7
SHA256a413dbf47b8dc9d7b45b9a587b9142c8c81082f9af1fca5c697b5a844860a9fb
SHA512b612291e0dbf433fbd8729e1e092c190257fb82f1c44c67b641fd5cdce308e65fb914a905c925ea55197482a3422ff3a025f749d8f82663c77f32a1bded23746
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b62b813933c9c41c749fb813a23b294c
SHA1ce90a6836f71beb921454531546ee079c467ab6a
SHA2560983a0ebcda53961ec13bfe98c2eb69c34cecc14c0777fd67d5c4d73618775f7
SHA51235bbf5e0364958f80643c619c0a8f452f94c1cdc7fca09e161a62e1d9cbbbea949e63798a9102d24b77c1596007cedf0ac3bb00d194f351a71d048707fcb0e9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a4f3a394438c973d622b894734712ce1
SHA1cc4368a8e85afecdf5d785407d285116f164f851
SHA2567558fb3673e99304e3c57bd6eafafdb1cabd5ecfe8693d623942fe7812891c7b
SHA5127f285c8b614918a909d04cc0153817b1a8dd434198473e0d22c0bc41164437beb2cea33029bb48dad81c177ef42d0894e6d9ee271f6c68b89f2ba947708fd30a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57d3d75ab84a8d2e2f22d99d003e8e83c
SHA1dbc063522d05752e770a4325f0b4dc0dee1e32fc
SHA256ff9dbe1d32b94c32fb86b5709f7d09a4bb5e5244dc9df2d77c52d9d664ff5a06
SHA5121a4f2f5bfafe1f692d7edc558e2a829f418a91d2a664ffce46dec8a9d83c698bd3bbe66c9d3e2a8b0d21912b2544cf7de24fddb8146c7caa281b448accfa326b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ae433258e59dd3695d04fe83c3a2cca6
SHA181ccd267df86766057d1995546c016c9b71b171b
SHA256557c20e8bbd0c56edcd19fac1ea87df3e0dd87dad62ab5b738ef7266dd577a14
SHA5121bdcc9e22d3ea599b97f5374b9cc0f0aa73be334b69fba961a28d73a8930df8d1f0ca05ad41c8528c2ac4b3dd9e214392bbf406d465d89dbaf6a28680d7e3436
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5520b60ef3bfa9fb4183d2b28a1326df7
SHA121fa95d13161154edead2114ad0543a461568d9d
SHA2567c3ac07f55f7c1edf588d2fc78e5942148beb5027f527d25de152d7df5e2ecf7
SHA512a4c1b100a80042d76bab6253b4e2736c6a6c70834b8db4239f20ff184e8b59b3881857ce2e0287b1224c0994e7d25a578f2dcaf9e7f1efc73691f60e24eaffe6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD573073283a093b49321303fbaeae17b25
SHA15742e2d345f171de3222ae033929cf159dfe5763
SHA25644e9a8284d912cd31eed47d16985faebaba7ef05827f143b63cae1fdfe6a2b6b
SHA51298614404ed139015aed78ee5b9fcbd7df7c9aa8f8c00e14032cb334b421f67dc548ad5777cd27ca5514bc9f4059d3197ca15aefcecfe09cf445c48aabfbe5c9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD598be01fcc95da3a5f7bf6a6909aad71b
SHA1d7dd642c221862219298a75ef0d1f766b1c38ee6
SHA2560217aacf2001ee0c4a51e71025e1f56e06eb7658424ddb4c3156d609b5c54c44
SHA512453758717c8dc7a920eea366b4b214da3b9fdf8cbfb07782610a44530c98899f58045adafb39d751001e2c6c42a2d13c41c677aba4d2f881258a6df6e89937f6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b