Analysis
-
max time kernel
67s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 02:23
Static task
static1
Behavioral task
behavioral1
Sample
84767a8c70d4ad8bf4ffcdc9ab0ea5ad_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
84767a8c70d4ad8bf4ffcdc9ab0ea5ad_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
84767a8c70d4ad8bf4ffcdc9ab0ea5ad_JaffaCakes118.html
-
Size
32KB
-
MD5
84767a8c70d4ad8bf4ffcdc9ab0ea5ad
-
SHA1
a4dea162b077b2af401bb03a45bea77b4106913b
-
SHA256
ac643beab723a85d32212f56415f437bac58f988df03a01052fa1df3b40985b3
-
SHA512
e9b66e35f133f056ac49bad61a84114a1e3e1e031e4300b4013c716d4cbb52050ba5dcef0dae0caf4b3904b30d2b2fa1c4df20069e49ced356968c21a9256e23
-
SSDEEP
768:r+NvpM3Y4UPDYqYiCgsWccQWpxj3JsEWxJioF:Ipo6YB/gXGWNWx
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{97843161-56BF-11EF-946E-F64010A3169C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90b6546ccceada01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000a1f11c68222f0906b06f4de05ccc9fa7d94453377bec7b9b3676dfdd7a16c1c2000000000e8000000002000020000000ed59daee9a2679546f9ea0d60318d6abdaa7543cbdcce41d04c2396fb2f52d3b2000000021d46b846f34c7bdaac34ee0108daf353cdea734768f29c98be630c1561a6b1740000000ce46e368f08b414d098b9aac39e2ef992564c7f89982be741d3a16d277774f81e2bccce776045a362853236683a555481c05fde9fb7053b2ec5ee78cbd02366a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429418503" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1756 iexplore.exe 1756 iexplore.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1756 wrote to memory of 2372 1756 iexplore.exe 30 PID 1756 wrote to memory of 2372 1756 iexplore.exe 30 PID 1756 wrote to memory of 2372 1756 iexplore.exe 30 PID 1756 wrote to memory of 2372 1756 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\84767a8c70d4ad8bf4ffcdc9ab0ea5ad_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1756 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5724aee1b0ad94b93210b1266848a0116
SHA1dbdc4ba0d302a7e017b1ddcddd37904d6b1143be
SHA256149ddd29b4c9c07ad5512ae400c428ee0369f98ca8e0855699a0720f4147e8ce
SHA5128884ef3b4a34047c800cd073f0a33bd79586f39535c22fef335403b764048de8ced077a94d56fc57516f78599b34a5f7ba8f94746d48057782a0f18c2f36a356
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597593fcc5445d3393c0f1874c29f5739
SHA176bc5e0f86218df30a23b1b750d187a64bd1799c
SHA2565675e98db48062db3e5ead3a9009ae5581dc8ef5208d3d6c0d58a25b473e4c76
SHA512c75b131c7acd90706ea628e640e9b1e5ec599370f6bc87a75cdc0fff6537bde20cac897a6a58aa371c272c99bb570ee365c1f2b3e3f75a8348851e38391d26a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be7f4f0218c9f5c2d470027cadd4c3e2
SHA1de31c6eba7a8f6348ad66545dc24bb1051664d53
SHA25627b07d23267db19a041023fd5872d4ff5d6b64c5418147a5b62f67ed39f00318
SHA5129ade3e42c2dee6debb016c10f26991a7de198e9a5d2630e2072bdbcdd0a5837b9eef77f54a778cfefeb45ff3e863969b77d8be766164862c7030a2cb046d5c2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578ec40679207e5cd046fc232a2a28393
SHA1bcaa7f3edd8d7570d61696bd191909e7b52666c0
SHA2564a23509a1c980131c0a59be9e915f8f7e3fd856800ab5c441d008de0819c92fc
SHA5127bd09ea04f591c52a28ba09d0e2ac94d1dfdfd294f90ff93175da29ce3c8c64b54a33f66f2eb96cd1498a2d89a76eb537f60a3be42fcd7d20f77261a228affeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cfabe6f94384a6e4b6cea97cf562ed6
SHA11ea0e71058baef15d1325a1bda65d277b1acc3da
SHA256cd25cdef6a58c9ea758e41ed9cd2e82a75bc85bbc7d9e8a2d63d9e7f3b767eb7
SHA512c67307f030f16874c2e9aa35c87d633928a42c9c039ba2e2976a27346bd5af566879a951b77e9396a7facc1e8a381c80ee5974b1cd46548fac6c0f1867dda53d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e18b826e1fb0e383dbfa49f4fea35687
SHA18db60c442f5d937e681eacacfb4bef526f2c4b05
SHA256d391a44a9d5cb96a4526ab7cacd1ba6c669847d041cdfe946b812c418721c4ad
SHA5126a45511c9eb11d7bed1f7cc92d22e8c31df502137030913b35f9f8b6e8508bad9c701693ecec805ceb11de64dcaca529821af325c8cdf261b0713ae5409f0d40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5235e4928e2a3fe9f04451ee61a8a8e74
SHA1615edd8be726e43a6b151a87ec0970c6f3036a8c
SHA25623d18044ab592d4462cd7d64f7b4c34500f8fe4b4de89609d8c8a7afbba60230
SHA512c9af20eb9b10a6bfdbc5ef81ad40803b1ab361ad3b6256fc6868f42e820ba6563ed3535c8ad214503786f74af1a6b3caef7b6abac9130b8625f713664e5b50fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b4978b756913e7c2509c5c20252755d
SHA15bfbbfa336c06a04b170fa0df4be80bae37d68a6
SHA2567de26482c8e9c685d23eed11ad20b02322630884866f244f792eff6c1d5120bb
SHA51287eba9881ee939568dd818933c6240b3a23ba45b87d30d79b701417ff764475d5e64bbfbabd5eca04d4607e8ffa7819c91623eb4dc0f53103b293cd62022adcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557cbb7c87cdd867b4cec9649cc8a69d4
SHA11c28999fb384625508125957e67fda8a17184f81
SHA25690f313276d69c4ce7976bbeff215804f8cd01692bad60550d2fc08d333cfe9cc
SHA512638169e4e43a069c14fc330b3cf31fa795c1a86a60cc141642d9d3b581c2473fdb88d2fe6a6b643cbcbaf0620eb8a08d2f1d4ebc689043610e185d065d498387
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a704cb76eeefccf9e751caf7a121659c
SHA136a8d39d5f471e5ed6965ee14b26153b192aa43e
SHA256a2537978250cafb77f70c6ecbbbc9703e75aa2e14d469ff8f5f0049d446dd59c
SHA5123eb40251ea705cddcbcc668aca712f998ba83d2665cca15d079f0a270e14807dbf7aa39ba24c0f80184b03e6224a2cf051a432a384112d3fd6e6865d547f1648
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f7c65f122a5d769ad4489c0c40fd466
SHA1ab0eaafe3010822654aabfb26685fb94d5209241
SHA25684b64affe3b091f2a8796a3900159dcfd56136cf25f987fe2f7183a8ca8a587f
SHA512eca702d897e7d6be8da70df4a9a1f17cb77598840caecd8d9f619c3df4d39011f43951d425addc6194fab9615f380d3eec815e1a198938115f9ddad0bfc6ebe6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0263a68df69c3f3799d078a21a3bdf7
SHA1ffc8315266b3ab14f8523de0ba2c50db51b5b9e0
SHA2566cde4a4c732987aa2bac62b1fe7b2b14363abef124c223610d4b7bcd55fe1612
SHA51266fa467a2e2bcab410ae382a039405e762bd1105a62cc52740f164ae24a59e2c6101cc4a82b0d7065acf397ff33fb7d1920a07cd37db7c5f94e0d3c91bb2a608
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df0e622ce96fb7dac00b5440ee85706f
SHA15f8143b0f887330e2443573e59efdcaadb416df9
SHA256e05a37a2a1c80dfd7a5a443a76f1b8e8efca8e7d86e66339140bfa117b2b6bb5
SHA512b572c6a5aaf9262f4bdd15521c4e8af49ad3b8c5060bc2dff279bb02afb343a5711b7fd064c8ed093577f668e3919f642d591f4f9f013e691b69496d0b7b7a99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa4ed1c0989632edbd0b684a2123ec9e
SHA108acd503b102a736e41f9d9b58b05332c87d72ce
SHA2564dab91028432e0a8776600f3fe75743bc2e98fa3370a202e86fa7b9e6f5846e3
SHA51243a40de07e05a33a0260d121e43aeceb0dcce0a27f52bdc618292faa08e2d289f49964d9a27d7faa43d4a357bff05645de05c507efa1ea2411f5750c3625fa48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f68e0f349cb00b43b1d7a20f94567e0b
SHA1cbbb4f678924423e643bb810ab56d5a32888d973
SHA2567a8f16775b07b1086567ac8ec9470b885d4ef31d77c64474e594bd38d4d28066
SHA512fccb672227a8552ef19ad781c15b97e3fb82a8fbf4587f0d37f7d84c5c1843e4ab38c70c1e72e5583b1c8daec74eedd2f3fa2ee5435ec69370422980c8782463
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556296a977e2beed737a161d55c5a842a
SHA1c71316ff62a88fc8437cbf5d1eb3b173b1174d2c
SHA256c50e57c93ba624776c5481f1e49d897d6bc266db96023330f4b9d25220f386c2
SHA512280e93f0e269015fb86e3dbd57e37cedd991a603d365a9eb3dcf8bdc4fd88aa7a5aac94a24b6c3a1e9438cb088d0b91d418f9992340c68db702d6c70b76b5678
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e37d199f59a13d0f89b1a7d969cee768
SHA146d91d5ad0933e602a3188dbb910040a8b64adef
SHA256a38af1622b108a5de40ce20ac57bcdbbcd3d257ec97106b8ac8c96faf46879a5
SHA51247ec228f62840c56ca61e01960bdb81f08f506ede1ca84156ea21b82ba04772636d6e44b3ed559ef3882104bdbb01bfe8db77d5a6481cc967fb355c71c49f261
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f176d2b74e8606a1ed7d39c61159a5c
SHA1be9e75249da3fdb26550ac192cdd2f5179e17021
SHA2562f144af09f9eeadae626f15d20f3dad5a1b89e5ef63a2dedc380ef39110f777f
SHA512e3a1c28ead9b8a24dca8c9d1df159af45597565f5afea06e7fc3152026cef4fd6796b59112870f4ba88721cd275db5fbb29018a2655cd88d8a6675fdedeec836
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53837d0e8328a12bd901357c68f6efbfa
SHA16473d9d0c27417207f33acb32d19d03e1428dafa
SHA256604ab0988218fbbaaf85c647b4c4a2c8a53445cd480c9f2e2cd2f47e4bd64017
SHA51226de677fd4085b1d6196f2ff92f64180d9a0f060997bf743df7f6c1e746d6bc57d584782ad257c7eabf2964b18304796ec53e9641970df41fec7df54b556fd1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57652a6cd0546977fae7452d8b9794e12
SHA1b94c81e2e6b8d94be93e6baaf4673172d558e302
SHA25645b44e39fe4f185971d958c4b061a3c291d55765308e5a925998337dfd673f05
SHA51289d8cb63866acbdc8cdcad6ecfc7223e9bb42aa324dbfcbe7be778f50479233a6d8fffd8cfbcf5b2f25b43143e456c0cbbab9af7aaa0f2ac88a84c52861bacf4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b