Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 06:46
Static task
static1
Behavioral task
behavioral1
Sample
896448b81b91f60b3618dbcb9fe5efc4_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
896448b81b91f60b3618dbcb9fe5efc4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
896448b81b91f60b3618dbcb9fe5efc4_JaffaCakes118.html
-
Size
20KB
-
MD5
896448b81b91f60b3618dbcb9fe5efc4
-
SHA1
834428ef950c118a7ada6714e2b542d30ad678db
-
SHA256
9264a3ba7c99981d518325c274d97a72459407cb89e9baa50a9f06c64eb3da99
-
SHA512
c829d54cc517a4e6f15cd2f8bfc5cc240adefc1864bc7250bb2c62977564f78290696ae24af09bc9107fd0fb2b137bb9b97c46c6c80e9478d5650db04aadb1dc
-
SSDEEP
384:k2XZSwX9uOOEZKh8+J4J7oTkye3L6nH9+aXQyhyxFPHR:lXZWOOEZKhzkl3ewaXfo75
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c000000000200000000001066000000010000200000000f3d6a137f73ba6baa72bcc0b1ee6666fac2b721403bb664fd1eb74daf5a5a8f000000000e80000000020000200000008e058ced0fd65f1004c47805e12b368f52266ae109cee7065d2c9ab90c1e951320000000b7301965e2ca8191d2d8a52e53d462aa1023d35659da0e1aca2449cb44bb6210400000000be5dd13d792d2bd23dc49e67e8aab8f23ff7dac8405775dc0649c88c521524c5d68b70aeffc244b268189f2e07610e5f717e73be3c7c743efc0d8b0258698e5 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0ed2b3bbaebda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{668D07A1-57AD-11EF-BA79-7699BFC84B14} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429520641" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 348 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 348 iexplore.exe 348 iexplore.exe 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 348 wrote to memory of 2296 348 iexplore.exe 31 PID 348 wrote to memory of 2296 348 iexplore.exe 31 PID 348 wrote to memory of 2296 348 iexplore.exe 31 PID 348 wrote to memory of 2296 348 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\896448b81b91f60b3618dbcb9fe5efc4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:348 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59dc51483c3b55f4b854a0ebd8a1aa5e6
SHA17027cd5a1af562669918da17277bc3de55f33f99
SHA25695ac9f2814c0ade8488e944ab0b5ecc0fab7481fc03ee8e5c7f07cf78eef19e3
SHA5126719126e8fb973be2ab613f250a488aaee3afd9b1f987522c6f737e192a2661822d61dbca4a57ce2a9f26891bdcf57a03d9d0cb0881e5fda88babd4f4c014511
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51d66299b969f5a6abed8abeed75d163f
SHA1328a1b7379d48b8823a5e8bce202622340626c1e
SHA25648810759ab6ad58363f6d633d589e6ce3982eecd91dc6158780edd94484107e0
SHA512962f0fd9720535690136b5fc8c0eb142bcc13eff596cdb73eac9edd9902952ecae60f48f9038d6d7ab9637363f8d7602b95391d2a33221c9cda60b07113992d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fead58ceaffbb1068380a172f84e2808
SHA1db450f7697a51c6cf8fea7aeb641b123a04f42d6
SHA256f09936684a9192258974dc73250b1d14c8c64a1e34a15224c7298c87c8592d9e
SHA5125dad81d2760506930d499c02d513030ca609030af3c936e7da0da124b5fcf75ccf76fde5c7fc5e693a6051a9d3f247e0c3aea4fb1aa69a43dd620b9adf80ca63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d608b6c55091c78b1ea733415294c88e
SHA1215a15172dd1e23048dabf90d70c7412d9aa6456
SHA25613f3eb5d18c869532677f59f631e3ee59afc4d46eb4a54292aa7830cf544558d
SHA512c431593a58678b805c13a866b302550cace26b6eda221c49790389efcac3407187226a9594fa8d27e9ef2c826e44a0f6012b11cd9c96bc11a534e5c317cd5835
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD576620115aefa4fb2b7a568c555600cfa
SHA180a99d865b0d52a1ba9740bb42455b4577b59b41
SHA256dbaef31cd5bb5daaa059e60de9ea8a9710c3a2493e1597aa764d0a07883322a5
SHA51203bd1124792bcaabed1a9b638c3243cd51aa074022a6a560ad5e783991300805505cf6959b294139722bb94623d2d6bda666047a3eafbdb6f79887bb2af5236f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD536c8fb1f47093062d042ee895ea54ed6
SHA1a830b34a6a0a41889e4dd73ef5816c3b81e05374
SHA2569df046fb4fdc5a44ab8a9d8f0f2cdb0cb2048ffc4a52793e721b246e2c0447d9
SHA512f0e8c2a78e6c16588e5fd86a3cc086235eeab52c38dd2545b4d8f9ca45d8af08f2c36b223dea364151883d8b454ed27ec641816cb48dc9b59bc4488cad5e89d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD588de0d26901200838721d147dfdc53f7
SHA125ce1d21f301082d2cb92b838c64a377ad91f26e
SHA25600d4df9a367000e2b43de7d2b1105b15688a332e8b8889157da0ae0fe8ebb6b6
SHA512dc7d633a3a2aab41f30c08ba3b399279e82c3c48bb3d25c840992fcc2811222699cda6d543d33e47530780b0a782f10d91d19eb6bcf494eaa6b793745c9789fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5310188fd9f1f637b2acea50801d574e4
SHA1269005fc691e289e622f365f817a87373456e1f8
SHA256875d83c77d90e30439b361e1230a6273d930923aeeecf13208d4380b76df3ed4
SHA51288a45d7cfc5637f584b50f32f76620146e10203b85f492ef4407c79843bfa1a8abdf567550a88ad1eae540007fcff823d93561cbaf1f213ead3f6f02a907e4db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD528a0082d36bbadf157fc176dd416ba46
SHA1c388020c8e8baf05a9fe170f3b14bc0bcee1d0b5
SHA25667626fe9d907d74a3636a3570e627af11b6dcd5e57e908f080dba1c8144aa2d1
SHA5123a745637359ec2638e680dab92ca61ee4623a5c0d76eed77e1bbf03e858d3f18ccbda48276d46197dd35ddecec9cf232377c0c7a12d07eba4b4d611694961f5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dc9b8312482333d8491262df5378ace1
SHA17a3720406077f464899c44b03eefd884f7a13c03
SHA25683890bcbe62c642506ba1a235d103d8f4300c042993cff3bdb99c21314cc1146
SHA512d75c7a9368591f23656e7d0a09e59189cacec34dd816aebcef194a3fc04f21ca46a6db295770de033ba85324bcfb469a4b03b07c1660787157e2b3dbdcebfad3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5509b5c4601d4751c8fec75f6537d3023
SHA1b24ea8246301234f28ab3bc54562c4569d3678b8
SHA256dec0fd152d11f506ef2bbc1418e4ef99af522c3b90b0507f0b6a37efcd1d3b7d
SHA512e2db6c21bdfe1f99be4eb71ebbb06fce7f6dc65d32cdbc4e865f69faf41ddfba167ec5c87e553c754fc7ed3513cecde75e1b74be2f1b7f560ec627bdf369347b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c5bfda9c610aa498f531eca361748cfa
SHA122f951e59e8ce05b40171e286a7a2c577be44c3a
SHA256c4e516ddadf2810eb2aa6ef41d106cb1344531375e06054b18229976f4a60a2f
SHA5123f18495d7795eeeed62d1b9b3e6df553690b95ac02113675a9e1a66b1c81cfb220366009738edd4a6767857420b9ddc679d73ada99614f8e6cb36144318458c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bb1e4f21e11bc310cd83cea2e71e7e6b
SHA1d8f4d10662eacefadb4597846244b8e2ee75a92b
SHA256140845a21e811c5da85f7fb961f4f509c049fbb299aad8db72813ba3c1410c9b
SHA512d78626fb346f084dae0edd2906e041afd7095ceea268a4ebc5513653b46acfad6a801bbad77adc970848192df8832fd545a4b8ee56849f2e1cad18b8c94c17ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51b50ea5ef8af5497a1e8412ec0a81bf8
SHA1499241876667a693f1c45d398c243b44d91b38a6
SHA2564bbd51ed56bdb00963896aef29970b4f1c31cb72be3bfb621e82abc51c3abe3b
SHA51240b48320db93370e8487ddc192632ba39bdbb211357c59478c982fdd142183929da94047d47700d224f1291569467f561256880e0945665fe834c91ff777f734
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fcb5778b2cc6a926ae5829ca22dcd236
SHA143a3609dc9045f2301ca823cb52ecc7b0b9c20f5
SHA25659481272a33268d07ac7bcfe168dd82853e54a0f002884539f65905b0beee369
SHA5126a707bafe7ddee4bba4d265f92f79c30f70a78b18d1d523524403a9836018326215671bbce8eacde2fc8ceaf271a1a1070381ad0e7a7572d8b70c51a30158dad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c711f8cf663472adaabc7be6b9b4486e
SHA188c4da738a5e54d80400a2b9a54368f002271166
SHA2562d76a65b91be6dc55797b86c58473e8870f826c8b46ee9b7e75123f6319764f9
SHA512cd812c4c8c66cf064c3e0e429e3786a0da2353dd1a031800689dcc2cd0f7384577d8ac516fd660e7774d74c71164231c8fbb64cb4ff9034ab3a99e87c905b604
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a54c4c732d05b47fcd230eedfe76840d
SHA1cc055c513ad10ffc94fabf8a5f9fff638a3aefe1
SHA2562f4be2b9af552a2a365eb145d79cb6eb4f347e65295d48deb21b1cda5702c42d
SHA512cdbd98fe336b8081a31aab31d23ff9c5418a4b0adfa80cad0e6d9b0122ed0ede2ed61381cc5644cd907b055a0027038149a3ce7f7b912eb8e84a74ea1b020a16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c53e65cccc713b5090a202564b0276f3
SHA13d2ef8f4b0f26c0443c75bea071d0723655e6c6a
SHA256c92819cc13807768252162b8acd9770d9aa8c2563f5c3b967a312d21d98b8469
SHA512ee7f3ff62ae6340432979ae0cd38a1b58e4cfe9d4dd0c04eb9d79c9d8502abeeef53aae42ccebe3564df855b07833c077d41a54f31f705cdb0f82e5188130355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5188cdc3cf7b47497688ceeffd47ef854
SHA123f777ac58957134764741f83d6c223a800d9688
SHA256b924998126366e49fbe7ea41b32d9df1dcbe79fd93838d92e4ed44bbf4e1a5f9
SHA512f49259c21263b0a1a4a9619c11b5eaa78529e3aff70c4c29412c93616368c92979d415f8ec28895395072c6756ee534d81c0a9fa5c740898d8596981209659c4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b