Analysis
-
max time kernel
140s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 05:34
Static task
static1
Behavioral task
behavioral1
Sample
892e8f196ff2eee357b33b92b63bd1e8_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
892e8f196ff2eee357b33b92b63bd1e8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
892e8f196ff2eee357b33b92b63bd1e8_JaffaCakes118.html
-
Size
90KB
-
MD5
892e8f196ff2eee357b33b92b63bd1e8
-
SHA1
49937e255c234b0a2d8d805efede5be41b006269
-
SHA256
976a87b74872389066c4c0fe1c2989bc4db98ce4139c36723ff1dcc6dc9a43fd
-
SHA512
3a1a35e30439eb87baf7566354e419c0ba3a6e40d625ae04a4416cd4173617c02255b1309837fb303dc1740f27fc781c8010cc53585620ea83f2bad66f0c920a
-
SSDEEP
1536:gQZBCCOdu0IxC7hw5HsNPeJGTTtLuoxb9aXzK/rIaB2FSpTrB0D2u9WbCdMOgN8n:gk2s0Ixn2CPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000ae26cf150ca84e2c3ea8b37c96a3a4f61fda415261fa9779b9d45ee6f47ea7b6000000000e8000000002000020000000a29fef48eae4fb027c0de385d9be561ea3b01b70d6b335afe4c42becb7854f4b20000000ab34244c3068b52c9c6a0c815975022ad34f1d2dc30b1b58fe25ed5c3eaf9cb640000000eff3b07b6300caceb41a5b0720559d01c1de309549dcf8659c26e32b78f1ebb32138770c95dc3ff76b2cb115f79d04d998159924d20a8375f71335c94ff16e92 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429516331" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5E25DC41-57A3-11EF-AB8C-CE9644F3BBBD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b050c23cb0ebda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1984 iexplore.exe 1984 iexplore.exe 1636 IEXPLORE.EXE 1636 IEXPLORE.EXE 1636 IEXPLORE.EXE 1636 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1984 wrote to memory of 1636 1984 iexplore.exe 30 PID 1984 wrote to memory of 1636 1984 iexplore.exe 30 PID 1984 wrote to memory of 1636 1984 iexplore.exe 30 PID 1984 wrote to memory of 1636 1984 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\892e8f196ff2eee357b33b92b63bd1e8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cdd30306c967984ea7c8ee2f7589ca4
SHA13a84fff0d87385d7bf09992b465111f1b147182d
SHA256cde3c8ee295c408ecf4df58bec5419aa53ded3fe800bc5bfaaf7157817ee393d
SHA51218150ace29bc9608c6540568fafdb225039daa17b69f7560636ff3b4cba67f02d52794f614b8ab53f9c3bc3b011ee668bfefd2bb61118feb805c11cda8fcc111
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f317003609ebd64bd3813ca9140344f8
SHA15152ec3f88a482eef507d43821fc8f21abb25088
SHA256ca66acc77f60634a787df42d0114625742fe8a2ae228ea24a6e61c1cbe9286c9
SHA512c2afac8c79c5ff1c345aeaa8668540a6b0f91f7b9987762bb7fc08ad0068ba2746f459068c1346cfc3086625ad6f31706bfa12d9a8d106d8b75439e1c1cfd18a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50487dd27149fee21547b6a09ce0c1158
SHA1e5d620833c9055d9d86a12644341299756e4b572
SHA256765135b1c99d4648ff7384c77254af7e058840faec773be6b4216f832de8793b
SHA51220fd5e0d1689301964d57d41cb04731cfa73b9f5b61a3c2fd08b22ca04d2635cdd5cd63c9426687b805135737451893d4af3be40ff462005ad45f02f89ab6831
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca89ebe5a64daa702a1a256b4dd80375
SHA1005ac752373f3d146bc04ca2c6743d49a3044f3b
SHA2564ab47239a5f8006f1d83bf69192b7bdac27470730dc3fa3a1f8b9e15a2de8f91
SHA51247a53b6eea9bfba38160a9dde12f851dd652de3e59e0045f94660d06cb18e6fedf6eb449a1518ceeda12b6cc8b9a53b2474e247a08e916ce93c80ad483864b6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581a13edcc4595843b2bb965f1d0a66e2
SHA1ab10517bfc67a5054e8e32c65514ac57d9a0be39
SHA2563ace5dcc0dea4c981d7f10b90a9c4d109a831f94c24b3eb98f2a3ca924c9fa25
SHA5126d545aba8af0434a78a797a78ef1d1fa7e119c768f66c680fa6a73a4f37ce4adb3bedbee9d3a3acd6445c817f2331694b4e4b70e0004fe8cece8becff147da6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e4d7490f6e463d8876236b1f7582aef
SHA1c90e43590421e95c2e1efe8dc257b333d011a504
SHA256168a39ca8f7fcbe4535265e9d358d6d192f39d3ee698e0cd43434e26ec0b2ad0
SHA512bcbe82ae6be27420c18be0edf995dfa9bff1a804ff295934b61352fd22dd5d6038df33b7c20d664526f9e512533fe2ae570d2f12bef2a2bbd27e23b33c503fa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fd48579ac8652c533f98b8e16072c90
SHA1f653d5441492596274a0ef5657cb3526fd95dbdb
SHA256452319a075dfbd20ee8a2c885b1a68c5111652eca07ece56b9b0c2e1534e9a14
SHA512d1ee7f8283bdc54837e7600784d91093d2b3ff8893db62cb0d28614fe79eadad1439c55174d545d9e7de65e2cf4eaa2898d733d9975279ac26dfb704679b3ecf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5222bc543c8d334e54fa4885988e4768e
SHA1bf80d3a37fb8d801ff9aa9b00d241a8937dd86cf
SHA2565643be604965500d14f8171cccb65f9adb1c4a98a1c74fbefa05aee2a93d7306
SHA51298737dde34fdedd3528685ae9c75aa1e7dbe46afb1b2755ef5082f9944cae9c5a7c7708ce9c7abd300d7080fe3fda29838cca9b74f77871f827d99ef63b9ec6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbcd71a9301579e41f5e2e35c759a89a
SHA1d541fcf308c27e09138be9544fe2fc810f2f8ac4
SHA2568907e0ee098f2fcedc744d39348540b5b691a6793b54149d3645ef6e932814df
SHA51293184bce72d953cd19c153903f446af92491f84498b2b9e46517651d3fd5ee00248297cb4c591dcf1b4e16786141e47a01429b0a0abaf4174d638f9abe77c7cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2235578ef26b2ff4d875572b7bc02cf
SHA16db2db80d204b51f576c19c727cb41878c2de247
SHA25617d0c62e3269f3813e8dc7e30c26d639d114dff8d9788cdad1f5409c6dc121c1
SHA512283eb1df89bcdf82e543f9ed8c5a26beb6fd78347a106a0d6cd678d5c227372e47493bd790175e8c5c2bb7d152dfb1442d97033d71acf5a6ac811cf3123d573a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a64cf7d887e3b6058eb4f96c4b389c4
SHA10e148bd14b896f4a4e72e6cc451fd6002c2a7170
SHA25678570300a588612d2336002f278d0bfd0789180154c7abce6221a68f6d110f82
SHA512063a12d950c34d750f20e2fadcbb9d78d34b894315d63b0ce797ae4a5a7eacabd67234433d2c3fdf0e1d2544ed0214b3b09ed111c65d72083335fba55a51cbb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b7c6ca2359b564b3dddd19e47d3105c
SHA1d8a872d8315b7266faffc8ab156f3cb24ac3eae1
SHA256844aa5e37502af4e3713b5143d5f916aa66f5e4b3693a9b1a0312a71e55e2ae4
SHA512b384b18d889b3a120f64d33ed9ae40bb057bd8ae261e25b96f63469552aa23d233d9ee73edfd6591fdcc9312a5cfa71288aad034a7ae00e4493ddaa198a0945f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525cf5d2f768ddb629a28863787c66ad0
SHA1a1a452820e6e2e998e38b12035a933f1290ab7db
SHA256e6fa635b23e8f26eca6f9ef1fe35bb60273a393e3a17425c5c263c4db7cd8f79
SHA5123bd166c6cd5f4319911219d34ed94cc47e8ea6b4f6e9b2bebd1b83f34db48b36dcf7034e2bfdcd20b97a38b5d0e5419865cd572386006b3079f08b781d70c5fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a71476231d737390e69ccea3166d28d5
SHA17e97ec3db64ef29a96aa5c7fec1d3c6a69ba1631
SHA25657153774ff8186b81b8f34a7f1b1f86c7d1a241308d93c5f065078cd2f7edce5
SHA512debbf69b940c6f5e1f09fba3b01f71e2b57af62392418a7a9ad2102050adb45a796058d697b6852587b49ed1e9f6c8cbe6ce28d8e45b196f08beaec2a7fe25c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a63b8731f9bd8661e19d46f1ca9bee3
SHA10d97ecfae649b75d826d786595f56deaa78bec60
SHA256e7b93d7c3857ad53836155b70d6491e0aca5500bec0fe31153222a2e24746733
SHA5121950b30a208e6e383c5870a8b590726f886ff36542134fd8f843cd1fbc42fa621c4f1a5d9372b703185fa435eca26d3c047e5f1caf8a8b1a6c266dec48be5f41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbc2a4167def98a694dd03758716af60
SHA11d39762b383c83ef36a8edff615013b2b9067af8
SHA2562f430d27fcd1fc530a011d520a1cfe4356493de09bcd8b7018eb74e4e6112758
SHA512afb5c3dcbf9a525dfd74e2554d07240a2b9c6e18309139bd1abcea40bbacc941a64c7069459203a642cb0fbdeb4b44e54dd8aa9d462b061cdfd3389e0cc4585b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57812835d5cdcc59a223b32dc5e7df275
SHA11827b7239df81739d88fdc9b15f26a3a92a4d4b2
SHA2568dae896ca0c09df51b76db77b9605c3a50fc56d16c7380e97b2ca20895de0cfb
SHA512d07c3e97c75a715cb5bfc8bc7e73c85e0f10192ada84fc862998e38142015b53328f461c7ab3a528e9a0fb390b5691758970e2809f5f6ef6c5277e50d84400a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cacb199547767c6093cd75f3aeb81c68
SHA12fd6e258127702069890aacd6021ebfe312a542e
SHA25682546ba3f8b8a9ee303e0da6ecf9f8237dcece2ecf22ba989a06e020e2c07f1e
SHA512fd5825fb9ddeec48c256fdf2f5d0e326bb03dd2675135382698240db95365eb461f770dbb165390dffc2f884d8f33f397ecbbf52a574738f429682fef4d6d3dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4b788dd3f54c0e525c0b92279be1fa1
SHA1a679c885d83a272a5ea94a6088e7c0e2dce32cfc
SHA256101adc1260d20cd4d0324f50454e95c283750082d91ba379654590f7a52da679
SHA512ae8a516d1f4889ab2a26ea21753af60d045ceb7844df01e1c0eee837cd004a2f48b513db5cd2b828dac9b97c8c3a42d46b9a81034e0c207d1de23c347346c6e0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b