Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10-08-2024 06:40
Static task
static1
Behavioral task
behavioral1
Sample
85246b211a2559cfe3179c880ca845f1_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
85246b211a2559cfe3179c880ca845f1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
85246b211a2559cfe3179c880ca845f1_JaffaCakes118.html
-
Size
6KB
-
MD5
85246b211a2559cfe3179c880ca845f1
-
SHA1
8443470a3dde9f8733c86383dc8f5001535ad57f
-
SHA256
d2c0a19ec80c364581ef3478f3d571d9d419397eff784b588f4c98fef92903b6
-
SHA512
3edc508f1367323a19592bbbb4782f5ffb09b3a8bfe2e790139fa685b036268a01da5064b006bb42483f5902b1eec35683fe0b06d94607471e2386856e893b7e
-
SSDEEP
96:uzVs+ux7L5LLY1k9o84d12ef7CSTUGZcEZ7ru7f:csz7L5AYS/Vb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{692545B1-56E3-11EF-98EA-6ED41388558A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d07e103ef0eada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000318fb97989ef74cdbba2eb8ccebefdc276111a32344d456da52a882d57df39d0000000000e8000000002000020000000c34fda9db89b1496048a775a58ea94da30598a48f1fcd496616132cbb53d017e20000000eca4d2a50ff295f80b4ef2b4e2be47cf8c9ca76b0b0aa073787fe7400cdbb791400000003575b5e7e9b7e4b3980b6e4be38a5e2480e6cd4d8b8a2de3a47297d4c7faf4130ced0ef43422183ddca1ddd2968393423f337175d470c0e90ef710cadc1328b8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429433887" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 656 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 656 iexplore.exe 656 iexplore.exe 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 656 wrote to memory of 3036 656 iexplore.exe 29 PID 656 wrote to memory of 3036 656 iexplore.exe 29 PID 656 wrote to memory of 3036 656 iexplore.exe 29 PID 656 wrote to memory of 3036 656 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\85246b211a2559cfe3179c880ca845f1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:656 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5814d36b90630d3e15fd0ae7112c8d5a5
SHA1efaf3d604eeb0ec507ca750a993dbd36ffb21dfe
SHA256677274a15d3aa4158a801d86bd0c8eb9fc1fd0cd163d6b956ff3b7ac8babd56b
SHA51284fc71ddee2d1d67e8e490a360087045c2ada477f1bc718fe94daf2cdb0ca7ca8c56dfb2de9e6f6e5bc688d8f4c7130f4083c9cf208fcae50f81fecd736abe63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8b500973b0958b18cb09d241b9bba35
SHA142989ae0a9bbfaf2fff7b19bdeecf773b36bb7c5
SHA256fa49033d15e9b8ec4c0b0f2be84b9acd9236b68dadb38a33136471557dd91b40
SHA51208bb95ff49f7e381b16046d1389c4dc15b4dcc2365300761ab820f903d291250406c50f5b87f73368fae8b029555fc66a5fab1ee67aa65457b4850ebea835a9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe8b4fb0e5ae2611fb0b27afa69a31ab
SHA19f480e1256ab87933da35393fbd245f3724978e9
SHA256ac0db5fea13d3a1d3ff3c7d503db1a94f9ea397dc4c42ae5b2c12ace8ea2b13b
SHA51258a286993a71c36cb19504125489a45ffc75ab717cc1281fd991b52f38aba134a2cfbd9c3ae15b3ecf8807598858bf7c2cce75c8d0b8a2768a95004fd4faeead
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5831785b94f7db4ac8a077b132bb06553
SHA152e3360455a20876f24a912326ff0c342603ee6f
SHA25661609cc97b66e3f5d2227241a97950be3b3e1b605d962b8b3cd8fa66318108f3
SHA51295b1a0433c71f838acc9cb811e1ad244ec649241ec4f57a262485edb9603248d73af2fae042e7f8d70b9a6f67bf16d8e3e35bc1ecea8f9498e334b89ee113749
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a427c8570ae83525001a1bf9e4db824f
SHA134dd5432514442c09063b03b9821150f4806522a
SHA2568379e0648dd0a0d2b9cd722bd89417fcdd27cad89981ca9e3e3d5a31302264e8
SHA512ce35fddf93ad18e4100de132a7e4852248856e36114b9ddf89ad0e7eb006028f42d4a578e39f920567fb8b82e5706395a5176f4b5a1ffdc9826f26e943617d35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53175852e8a8a6555af3bc297896f47ef
SHA1ff2a22e21fedff497872d1ba8b76b047edfdaf32
SHA2566eef842cfc95d897cab1c1bbe14da96968a16a162e6bc2c96515a45e96829a00
SHA51204b564a2eb632111be4d2de0870ee368d86dccfc376e53532a8551a761509b630fd5cbb9e7794d302451ce0c811a0cf78b616a4bd109effba74392015130865a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc692d69d336d9d9bd3ed4377598164e
SHA1e95bb31fe616315a7c1b56b231e7193056cb4fc8
SHA2562847d92b17c3d2c79c88c41b68b858392188fc244fe4fe285a9b38ed7482e302
SHA512eb3d7e7af6c3fd249a253ca9faf446b73cc508443510ddeb04119da1f971029a56224c61891a1a77bd948714a86c575b81641421d888246e23079617d87fd6aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a990252c735cfb382b0fcda05ff809e
SHA181ca1783c8990be56e2b0c07eb412e085b7bc994
SHA256206d10d51936a84a512cb823dc02fac668e2cc6d59a3435a9c480a1e537fc0bd
SHA512fc0561afbbe9ed622523a7b2656dd60d385d6d961ff6bcae990add52735b51b3cde75760540c419d75651885504eabe79a17b1c2454d3dc9da465bd770ca2bbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5540a7e073cf03c713b556dff800acf61
SHA139d03d2191dd7835dfd5d5201640214adf050104
SHA256ac44eb0692435c082b6ae2a713e7f60388f370d5dceb6d2430af3f1d193b368e
SHA51254239a896613d49c94d60591d8c2c6d14036cf830c880913ef334b265607c134faa801ef4fdc9263ddd691578596c4da93cd9727a17c928c4881f55d7afc4a21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2fbd120cbeebb85dc30793e6edb6c32
SHA179e845f2791ddda7c088280db2ad0a32cb999eac
SHA2560664680522ede00524ab8918bf20aab2716723fe9f99011326f10b8d678596ef
SHA5125d5f3ca2faf73aca94e1b2e7cc6987a46657e111e11a090af24a49eaacfe2e257a4399e789e3cb52a93979cda631caa9fcd04be880850e596e1633f11b996b6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527836901b2cf7b24c148589880eb3dcb
SHA1035045e8e7476f9a62eae77c4004424228dfa48f
SHA25661637b2a875eba16da43840c3ec1159a2ed0fc26fef31a0f75cf3435d1a7f304
SHA5126b8a707d78c1d6bfb9471695efc6b08ca0ced2fddb97ab6849f7815a4e37cd84cd825456613da4cbaaa037306adc8b4fb40bbdaf99bf3e8e31256673f59c4317
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baaa91603f28ce0c6edcf4ad94f2d2c9
SHA1740e28008d05337981981a1d1c8f17abf654a3ec
SHA256e5df5e36913b845b99ded3434cbaac67ab2c4e8958a053ebaadecadb2f36ce6a
SHA5124f27e9c86c4721f266c446836d975ef6b85e4f0ac92ec74a2f0766942a513a5808b040691606d7e2423f25b54491eda3ecabf26ae7a267bbc4419fc96fbe94fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5271f08528d64fdec2d4452346d9fabb1
SHA18ae725f87c6c3aeac8015c9d0385d7de900bbeae
SHA2569d1f559af6abe1d8fd1e07a31cd498c4b05cb9a1a5c0318bd569166f56bf8a06
SHA51274c8dd9029db947d91873e4cef132793d2bca84c4da8faf85474c5e567bf55a456a3dbb4a4a407919e12e24536750d103519cb5f4e27bedc0bcf621c0330c312
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583b370ff0491e18eb83f3c8fa6aefd87
SHA1a2367403d6c6cb57079a9d7927c94882e2d52746
SHA256b911b7aac9af96bf227dc5b6f1795add83091bfeafe0a9c6934a93887cd42f3c
SHA512f188565632de8ab540f07ea180ba655d23f484546db92bba535e7de64c777525e9e5b29ab866a80da823f23e54e3caac382fcc54710b159a1bfc25bee14b0e31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6f98a1977591d2678182a519eb5d64a
SHA12872f4e26d63361f192ab9434dbea560dd039875
SHA25660eff2aa6ff531a67705a196d6b1998d55cb0affa20470d6afc4dab565c00b77
SHA51275b223bfbea42d2afc814135c5eea249f67512a84671fc08b1cd354d389b11015ffe600fb88acab30173248879ad47e2259d7012b07a4f16d90df60e2951cc6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dbd9d2d04eec32e2ce65a6d87aaf756
SHA16add484574b8793a8557a11a642470fb86bd415f
SHA2564179b2bed9babd7c177f330279271cb3fd4245ff968ee65cbea4802c7f91f90f
SHA51289c15475fc33c9cb9a83b22d57fca6d66fbaee445ab0f9983f71ddc8834f9acabdd0b3585bc79f898235323f11414d102e1ba3b28d5fb15fc60af77d4c0da62f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536e352c99bd828b40d190669f3fd272f
SHA1aec0d7e69aaefd6da653fc4460c237fc1f801aaf
SHA256dee77348ec02a58bc19dc9b572e38c1aad019433fdfa0d2943cce2dff41d0d64
SHA5121ff2b09e3d0672215aa954ca6ebd647d78a2fbd99c6b9b74192582d53f8e482ab635d973041d202ff003a4af09be7ca20f06addb1e8ece51fde1af40b06014e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6ae3e0796fb9da129925ba9c3eea6d9
SHA15c35e02b87b7f2ae11555a2fce5e01c86489629a
SHA256a28e915934a69b86f6e96151eb6b8aeac2bcdd2535c46d8a4d3888011592c809
SHA5128ed84c017c0ac971a66aade925926ac1f4c03252ed55001f1f6441fd16ae87cc732bb3c3e760f6a5130c2ce7d964ff39bba1ec6c75dcdbccda47bb293924d061
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b