Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 19:40
Static task
static1
Behavioral task
behavioral1
Sample
a7f46bc89617dbbfa3c058aad9df1cb3_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a7f46bc89617dbbfa3c058aad9df1cb3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a7f46bc89617dbbfa3c058aad9df1cb3_JaffaCakes118.html
-
Size
57KB
-
MD5
a7f46bc89617dbbfa3c058aad9df1cb3
-
SHA1
913435b6ed63ef3c22681aac8169961976bfeec5
-
SHA256
d7c418f5a59b448a9b7d3fd3f1e17fc19543da38d5f677038ea86f9831f746d2
-
SHA512
b4036c383db50056d0670c842848fd91d061c1164c11c751455650aded465db982e1625979160127f3f5e370e4b5e1bbdb93c5a0df6a6c21ddfa8d29bf0b6466
-
SSDEEP
1536:gQZBCCOdF0IxCkoGcZjgmUGOazhjek5jYrHJfB5pHHNbgNHlnbE4mSqWzdAGi0qv:gk2z0IxjcZjgmUGOazhjek5jYrHJfB5j
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C67B3731-5D99-11EF-A4F8-F6F033B50202} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000bce5152c97e68fe4abce7cb0142f2a6e8bbc2fb5d6a0e31faffb3cb22964d8fa000000000e8000000002000020000000c365e8860bc9da0560fb7a234b8e52d03c863d4ea53c4691b6c3f0c038672f2f20000000a6614ce172509a6d09a59e9850d3d65c954d751dd4b9a67814f7e09a6eadc4ec400000008514e6b137d781a79fe73b76b3f9efa8b9969f4db8719b2323719db384c5ef242d0a9658dc7a30322d850b135d41be37fd9de7a70a6dedf285adf17ab3da348a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70b7f99ba6f1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430171918" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2544 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2544 iexplore.exe 2544 iexplore.exe 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2744 2544 iexplore.exe 29 PID 2544 wrote to memory of 2744 2544 iexplore.exe 29 PID 2544 wrote to memory of 2744 2544 iexplore.exe 29 PID 2544 wrote to memory of 2744 2544 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a7f46bc89617dbbfa3c058aad9df1cb3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2544 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e02f9d600ce20f25431642585b84237
SHA15a1aca89dafe66673daf799af747c8133bd674e2
SHA25680c6552c4787681e64136b6d17ac3ad18897720ae579a02934eb24b184c931d6
SHA512652dfea0e1297c147364565811b13f7be40e5da08cd97bf22a7d294bede2a0b8dbe02a858f56f8f6d7514879392011121bac2b927f4f6c708967a9865b98f0f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e859e8392b0c0e1699ccdcaf338d6bc
SHA144e86093eb3d83b6d93f8ccae70c0bb6eab7bec3
SHA2563bbc40519f7d8187d824e053e4318d38d9538e5644019b1328beeab56f627630
SHA512f72f8b74781c4516689afea65a349717c4ebf0ff11386ca477371ffb53528daec28d05bfb6c46687920617ed3facaadf98a7fb72ec21bc024def31e3a65eaf46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8e49735b2e1c937ac0e1e07e9cc2e66
SHA119d80c9c423bb85f1ae9ab7eb86675da330ee42a
SHA256272baf37ed7d06e07a4cc6de6a5d0eba2bef262425eac77cb3131d69017ba3f6
SHA51203813796589c2b38ea18ff98910511c34eb97833b1501ed146df86c590ea6822895ed88b9d9e927fe6bcb6457291d0339cd4e875b21d28dd56fa701d7a7b007a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544112c6e7f878962975947dab54f1ede
SHA19cd160d2facce6fa6511393d4863cba698c98017
SHA256c29592e3c4fe363d52ce7a6a53b1fc9bc1efcbd4f3de1d180c36f6524738f839
SHA512774ebed77ebda4e049307fdc8853974aa9cc1476875634416c08e69d070ef2560a15699ad731a8e98ddbad96899184eae66ef5abb785e762a6303e3c86be9a8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f931b6a562cc4d68317a36b23f0bb463
SHA1f6fcc988d7dae4d4455d6f15af01e250afb65d38
SHA256d32f63292f91ef9ac0a89fe2c30d29b49345b37ff717f629adcfb33e0156b037
SHA512bf96c5cd7bb3a343577182a4f50cfb933aaef3d727064faf31a47f2b7fa290f4920c173f775ad3d9f1a84aae549fe21fa76c7369143fd89ec61691dfc9236dd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a37c80ec341c764cdef563638b1499d
SHA1a2e144a4bd96bb64e58a5d247455ac3565c32c1e
SHA256821c081c3b2c119176800cb5f81048172633d4cd9758a97825eef39a88ad76ba
SHA5129322c7390199f82877ed4dd69d2d53ace205382c0440d11492a7affbeb25140aa8675f8ec956a7bff559f9fd0ebe02420da92094d34e9c702e981c6bbcd4e103
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d82528353830289d76e78291e77df84d
SHA1e92ae0fe2c5ee0782cbe9e15e82254fa23dd012f
SHA25665556d1689f61d46a2b2ea905f5927a5a7c4ed22adedbc3558e11375001f1a16
SHA512382063d0279686244c0eb9adeb115f4e2fa60f2d82fa88608cca56a8e7048a05e56a01065f97de2dc3d2d00d9eab517a6048d05f047201fd4de8e0d2493f5e6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b30eadfff3df53d2600c5c06e6d3def
SHA1c088185c7b24107e5797fe022f81315d5d31536f
SHA25656f7081753574e0ceb5031566697ca85217a10c076ca4b5577f9d19cfc4afbc7
SHA512ae0009e8188208d7f6a9e048a04ead477d9395f8480f7873576fd5f6c49b16ce23ba66b97c910ea6a23160c17ac988f51e4a3cf857bcc97d339e913a60d4ed67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3f2a0c21cada647a78cc2effb07e60e
SHA1b4fe447c15ae3cd32f24a0f242c0774da48f8632
SHA25688b0ae4295d079387cd9436e809918e076a373520ae43166abbd8aea08c07e46
SHA5120af8a2baa2efa4df478f57c34804cf18d90abba0fd24c2619efaf3d2119912815590cbfacf889ddd4f20e0510651e4a4a343f0a38193b965bd24b5765d243527
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5146fc6eb30b66e93c793239fc49ef4e7
SHA180f393922786b87b81b1be8fd6a544b143c42210
SHA256b07865331f827efcc3b9b147cf94797f384ac5eb5a699a978e5289ef17f6b570
SHA5121036314c5e468f9b038b7d8e38702005ace1bf29e98aa55c8dbaa4fbe5f42f3e098cc9107bdcb248ae858431e6e63151ad27bf4c56040522cd0c98301a9fe607
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5588d9298cfaedc68fd80cc9e0d67479f
SHA1c96d1c6c0d70140b0289949f5a14d9445425a1df
SHA25657cf4dc27bcf04c3c1dd9b9de482310c5ab2ed1133ee142181a7fc219b915724
SHA512aa042b54810abed9b76ab7869808946896a9d138c00580e0f372f470064024de77cb62357fa34f69a4bad2eaef2141da14dd45e05b6b8208cbd1f89ec05ad59a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509b5d9c96c980404264764ad3621430a
SHA1fd08efcc821a75a8a05b2e0142ba82276e0db1ad
SHA2560889187bf938d21248353f756a7cbe94c75fa11a46fb649a6c3f2f1e71a8993f
SHA512d414f4a7e6ffd52c37fb81691fa51ac26fbc1c92d1fb79d881a5cf1ebf9ca6cdb0868823d7dbbb80314a12683cf9c536c91cb64bcce0e78b5a29a6c15cc1f62f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b34e21393dd8c9340e8ce22b7165fdf
SHA16b8c56453243e62de2115942703a51d437c73c55
SHA256516c97ab334cdd90b56023ea41710ffeb727484cc9935be08d10df9f8553ee23
SHA51213afc75698d7ba2285177f51c143486417033d7a0594450dc1a6ee2f0a864cdaa47b62ad69572d3d643e0ba5e253a71395eba202034596adc43ae91f1e41d540
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a944eb6b98b769544aebab336a0b160d
SHA1a375d194dce8d4e077591bdbd60d6afd27e29b0f
SHA25648ac994b99cf97334a64cf7388d2c493a893301899c67284f11433670e1d9b27
SHA5122cf3e2e1efc283bf977df383b65c29d548d52a98bd8175c16d96b660ef918a415c8584eac0c98beb9bfd17d9314f4cf0a55fd297a1a7559b0ecf416957bd1cfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58114a88119c04f90d7977c1c8afe9865
SHA1ead7869c62070cdb7cb3ec4ef73483b8605e7c3e
SHA25616a2cd21f03fdad31888f5727a260cdb871edffdb502ad416187447ff6cac215
SHA5124f18ebd24c10cc0fa420a26237314342de884bfb180e58be24b5a6f15eea0420702c1488a3d6b94412a9e6aca2a4440f564da03877c39d219a2d3cd5bb0f6d56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50894a84de276abb8192bc787c06aa329
SHA160aedc346a04d63020e6933fa2e47936142177c8
SHA2567efcc8f0ccdc2763cde32b9dc47292ec3121964dc0d91f3790bac2e959057789
SHA512a089937a935f0d078fbad1505e4eea0cdca90c19ad31cb5a388e03feaf096a1dc4b4ed658e19f1b7f29ab7b4d7c5762796954ff58a935ff358280091ca999487
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54849f0b600bdf49250e3ce705ed26cba
SHA16f7f7aecf128129200486f16b036b94673bccdaf
SHA25699f01d8f73e7c0ad42a785f88f5c0bec1b89e355cb9feb1f1d907cebf74aec8d
SHA51298da6af4e2fbed3b2947acb0c9ee502d324ec92cfd684c9aef4b0221b28da2baaec2d61a8e06fa48fa2393b14dacb7c5baae5a81a97fbc298a67cffdeb4bd1e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd1c05716e9e7928f91df2ad257d6c77
SHA12a4d136e29d1d52d56cf6272465b234bee64ddcc
SHA25640431fc070bc5993157395d2a73eb1780930b835f7b2d6feba96a1fc7c82f900
SHA512ac9216d3cb4cd110899292e44d991554145fa8034b2c723da5f1bd84885a722e856ffb51e207f7390d4e7c6c226ccdd21b5dd208bfe6b8fba6ed2cc314a148d9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b