Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
14-08-2024 07:50
Static task
static1
Behavioral task
behavioral1
Sample
95376fc840868a74e83a8e4f6022f850_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
95376fc840868a74e83a8e4f6022f850_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
95376fc840868a74e83a8e4f6022f850_JaffaCakes118.html
-
Size
88KB
-
MD5
95376fc840868a74e83a8e4f6022f850
-
SHA1
7317070dcb8dd61329c5de925aa107401e2122f8
-
SHA256
fc778823235f0e767eb040c72f02a0d2380c44a470d13db9611fbec7ecd55f34
-
SHA512
26ecb701e7cf193ddb98f99136917e2f0f56b295787d42e3fd9558489d74f145b2fc0ae434a194e54014d415668ebcd280abe2191f76c4980dad5f7eb0516304
-
SSDEEP
1536:A8AjBWyIBs5HiM6qOr95q02l2YSs38G3AXJOREYuMLkwqnGtZfOagHbBr/6HP1WA:A8AjBWyIBYd6qc9g02lvSs3L3GJOREan
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000faf616cc437de03bfc4049ece4ec3f0f32eac0f939a722a5ccafa5900964a166000000000e800000000200002000000025c14c5461a44a58c476a513f982ebc3ece7fc9d46d87a768756fb5ad35cd92d20000000db687b598ddb4221582a365602a5f71bd64ee395b5a7cff41730025d482efc69400000004a750779806b19d0bae79dd72b2a848a4d1ef5e0d9e67bf43e842ff6435223d4b25b90f6f2b5d911941527c31b018ae4a4875384a2d637b55018f39e505377bb iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0f3b5a71eeeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D0067251-5A11-11EF-8B52-DA486F9A72E4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429783670" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1696 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1696 iexplore.exe 1696 iexplore.exe 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1696 wrote to memory of 2448 1696 iexplore.exe 29 PID 1696 wrote to memory of 2448 1696 iexplore.exe 29 PID 1696 wrote to memory of 2448 1696 iexplore.exe 29 PID 1696 wrote to memory of 2448 1696 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\95376fc840868a74e83a8e4f6022f850_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1696 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0496ba8c38a40ba8d2d393236b935aa
SHA1c125ae57297d48435103045544c8fe3b617f9ff0
SHA256bdae3243f26fbae2c1e0e1750a7e2e004b81f13d993c4127c076880c5c1276d7
SHA51210e8248cb05d1d848efcaed8de9b942682609b7c2075d4ed82a2dee9f3eadd12ec8f50dfda1d658d2a648bb76d05754b19a51b9344dfa0002d6505e7f48ca957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8db64633800ada093cf9810d7633660
SHA1b79ef76993eb35f97b055db846dd4110cd39f20d
SHA25638dc8cf6e9375c2f2c270988b75d3dd27e480865ddad82fb9ce13b543fb8cda6
SHA5125af042334a5b47ed3a5751106630866fda7e5bd125bdae2b442b6b1f767b2951ba875ed81b3ba2014c3e7f6fb2db84b109e1b39c61230109004b2e8833ab997f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ee516d406f2f545c3f7899d68210f4b
SHA146d160b81eb8ae2f6e48d66e04182ec8c6cc5c56
SHA2568338219880b4ec0fc2e02fda8eb85da128e17d010cb5942cefb75151d4006164
SHA512017a9dcdd367a484df872e7820e3fa97984f7c8e0c237bf88660ad8552161debc3247b467885a2cbf0b5451c8086b4bd75608338993c132b9898c0516f0fd951
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5575f919982b99800a7320d63af1f6100
SHA1d0afb2a97d50655dacd7cb019d32165c49563fb7
SHA256be5cd53d2e1e999772edaabe742260a2dbbef0464877afc3fafa1627357cd111
SHA512952581f5fd076b27097bfe43150c5c7ee4b45410cff3dde059c9ae5331b4d44471d7b9b43e68ab53377e1c6245633b8e9124da195e9a9966c35e24b0431fe0cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571d09aa346423b1bb208e01a57223287
SHA113504dd1e51e8b33a95abd31551421e9a4d36125
SHA256cc5ef3275beb09af8c37aeb1a031f6d10803fc25296bd1e8f01cdb4396b56296
SHA51282db2eb409c72a7bf2b938dc536c5c968aeb4f5591e43ce7a5a591cce1fc5a73c04b850691045a65ce8a8cd483001072678737ffe0de3ca869eb3f40a67449ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d031d0528c68d7a5d151a1a785521f3
SHA1d8b1f68b68e0df36694b065ebea91b7b4476d0d7
SHA25696c6334a5f6e9e0d32c2d8105bc2f93ddf2d97d739d3d1ac663d1a222540c5a3
SHA51279129aa12cc0e6faa063d52be1d488590242446fbd935de42816b0df3cf459fbca2147d4098b43af349136e0860e8b6523c275e8cf531ffb2f06267c3640722d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6b7e055fd0b90374f8c7ba905ed9031
SHA1a57c876930729b484215c0a6785e0ee0fa117dc5
SHA256082cb8d1adf8e533625123362b8348eef2ed73067f62c06970cc76dcf74495f2
SHA512623fab68f18b90bf422f47f2a2f81866f881a98f17ffcdfafe2a8d1b898f179b1f8824b8182efb12233dcdc29b8cb02494a93fe5aa63d25a0f5faecdfc2f40d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d77ce0f5c01ec9409fd761629169908
SHA1947b273682b03b38605e0238e9b5c6edffc797aa
SHA256c47c83fe00b6e8c468a17fa3d07e12c13bd45b1bf9959f8342fe787faf1d0a5c
SHA512114b276327292cd223f5f17e542bb08e7ddfba9310e2fbaf6d8c4ed40cd0f98b1ab0679b47aa2ee6845d76d171af786649a0e9eec4cfe8c34360ea373ca785db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5524e49eed29f76d5e3fe1062515efcf7
SHA13eb9aa5761aa87acb7ec495d3ac3c8bb18637f74
SHA256bb8e36907a7eb256f55cf75f2cd879b19ed2202249e48a3e031ddaa0c0ad21ee
SHA5124c9a7e0aba1e0290d312e01b0214603663c6cb4c3fa9b80f7a7162adb2c993acda8d2d0dcb4c096eb247b313b537a02fac4670ddfe7772d53361615fc402e870
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59416141710b60c656afed7c8a49807e0
SHA13221393f7ccb3e07560011d3c802e3b3f704e3b0
SHA256e42c53fd6e513b1b36cb3f9f0be1d8c21403536aecf5da1aff46559b7ef39a54
SHA51280e22506080ef5243722f28a90e84e6dcec3838a4f08b8785645fcff718c3cefd41446be3dc712692df8505c6806c1390ef1e2cf239f52fbd62bcc5f3d133190
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb8513c7ad2660c857a8c621213fbfed
SHA114b79484d593a70d87269bb45398816eccc718b4
SHA2562afd6b02191f598d59d6af6db697b2b5f73c2c00daefce3d1ee12e96752b5bc0
SHA5125cd4682a3470904436025c7edc543af5a81b2217406389892131ee47cc4f02ee5176cf157e8e74c65ec93a52712a070180dee444c257fc9b1918624ef63e3961
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58012fea2d3e1c515981d63f7812dbc17
SHA1541f4b05b36991c24bfecb862411d981975f62e5
SHA25604d88d155f26c93afa4c6e813c09fffd6eddb65615987572f55346088ac44c06
SHA51243e532b76294e2f5dcc7c1a4b488c0c21e64dc871e7179941c216ed5cb658ac68fe02c631bf5570cadabd27603c442c3bbb82fc6e8629a92831b68d62f8ee31c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55355ce1893df907024a8d9d357591287
SHA1e2a069823a92811c8f244d3ebe4a7d3ed47e811f
SHA256cc6c74205e26d86b7a1eb631135b8ecf352fec40efcfee6d005f6a97c768eb13
SHA5121f6925f7c96b10d18dea248dda81840699fa06147a2aaaf46849756c143a55f499a06c869fa49eaa02015d9b14a67b9e885537c1e3ce67505375d2a0a5d54619
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5534a24fb645e9f7c6ef98b20e83199d3
SHA1281b262476239a7169e9dc0e9408a3e637004187
SHA2564fe7d4b89e968a6bd72334f03a0411c5398c4fc24f88d58582c8218ba688186c
SHA512862d7f0beee163296794205bb3ca8c70812c38ff3d69aee2c61365c1a674f04e5d8d1eb2a5266fca7aad4699fc5a0f318fc573c6888fe4243819cc6d9ee32c2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bf9bc7ac9865edbdb588c8e4b855018
SHA1af196848b9196acb891d03b58a263407b82bf1a9
SHA256f4635c067fb35be7ec4ec95e2ec9c88b46dd5b10cd0583a3884562efed2bcc4f
SHA512b725f609de73ef66ca1c303ad9f3ce64f646b109c60b791d380f33f0273a8d1f7aa84ffcd475ca5e6e9c0f874c0ce4973001e08225e80184bdf8201f31a7f9ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ed3669db1ee3e0bb29804c9fdb4d204
SHA18e1a47971093b5c204fd04108298bced0e0ba7d6
SHA256f8134a444565e7bbb424bb6306eff997db6af1e6f3fcf18c8e46e68ea4422f38
SHA5125efcbfeea8751716f3cb2a74e70025fafa86d903975fb9e7d3f115ac308731cdf444b4ef02d12c8cf7a82c691e9cb2104344d23a1d30d744a8479622ef459442
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eade65a4a637a82e00636c1d9764a546
SHA1d2af971aca336e8a62219652314b9ca126d34eb8
SHA256e7afc5a07d24d50e93dbc9bde869a9bd66f0525d2f13e7cd5815ce593de9484e
SHA51283cee3285fc0a748e229618a9ebd4d2961ac34f725cb81816f4293fdc1aa93f70de10a2d9e533fd77fe45ce7beb83d90a3aa5242094397c76b95b6098c3cfbe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e9eeee8c15bd8f66ecc7dbb795924ee
SHA1f2739b207b7c7ba0bf8815865bb6c4b64c4c4638
SHA25685f2c9e6eca0ff8301c9962b01a3481caf5452c1db6000a92cd0c3c81c60190c
SHA512d11450ac6d227053cd95e8d0f3b1483e49203441f39884a6bbe1cf501c54af9fb8cb3104d300d46d6155ae874898db4b2aed0225b8e3220564064b5c56c3fe09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533eb1280db52d0fdee597eb6b81a4903
SHA164043aad8f7acfa98b81eca91274c290cacd25d5
SHA2567d19dd8cd669bf6aa572685f30e398bf18868d8227c156943fb85da8c9d063f0
SHA512dce2c613f34eadf1c1c8468ac2c67896dc580352485ec8e7feb30107925ad674d0f743819935ccc2b9a70e383b735093ce315c0963194d3ac6d103b03aa58830
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b