Analysis
-
max time kernel
138s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
22-08-2024 21:38
Static task
static1
Behavioral task
behavioral1
Sample
b93e42d4bffa3e5bd47ec0b0fe62d1ea_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b93e42d4bffa3e5bd47ec0b0fe62d1ea_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b93e42d4bffa3e5bd47ec0b0fe62d1ea_JaffaCakes118.html
-
Size
57KB
-
MD5
b93e42d4bffa3e5bd47ec0b0fe62d1ea
-
SHA1
fc73ff7bfd3bdfdbccc31fb81fd6c5a3cb722360
-
SHA256
4371754db4844f88766a2a2f4826707176208e66948f1ff12e82aecae69a68ba
-
SHA512
2a205682a9b2a260d48c24733332f5a36dad80e5d5b64c2e9ee2e609f39bbb419d3a696ff8048425679cd531c1c083c98b4fbc4cf3920601dd4a565b46f79fab
-
SSDEEP
1536:ijEQvK8OPHdsA3o2vgyHJv0owbd6zKD6CDK2RVroXFwpDK2RVy:ijnOPHdsL2vgyHJutDK2RVroXFwpDK2m
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430524642" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{05C38861-60CF-11EF-B8C9-666B6675A85F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c92000000000200000000001066000000010000200000000a66829b47bbe2dd3a145a68da8aa03f7ab62925ee7f250885c56d6a9ead3d70000000000e80000000020000200000003ae4704f1d75ab90bd244c1fdb77cbd31a9675a7187e546852bc4eb905cd63df2000000090e0e65ce05d466a0cf988bbeba8e6dc469bf1e4a3a484b6e59bef0b536502304000000011fe699a6f69a1ca2d5e3bde2ecd671b10b65dede5d86192ebf1b0d5dd9b40522e17bcc61c4e8aaf5d19d6ff90f2895dfb65f9793a91be36eb1182a57110dfcf iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 304e47e2dbf4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2556 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2556 iexplore.exe 2556 iexplore.exe 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2556 wrote to memory of 3064 2556 iexplore.exe 30 PID 2556 wrote to memory of 3064 2556 iexplore.exe 30 PID 2556 wrote to memory of 3064 2556 iexplore.exe 30 PID 2556 wrote to memory of 3064 2556 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b93e42d4bffa3e5bd47ec0b0fe62d1ea_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2556 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55796ea9025c36c89a6587c8870436121
SHA1715825ca3b775972583d9954616d7a18b1685826
SHA256170d4731c248b026bc37dcee5c22e9bb0e6363c635f2d9ec9388e5fddb749bcf
SHA51247722750673568e2768d6fc13a20444e44c7cbaf1d838471d7ac709e2ca81a74a08fd3abdbf65c71797eef94725005b0c103580696f9533b5841e9f103944ab6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc2ead7e13755961b4b7cc928f9d7789
SHA11c97ced56a6463c9dcd8d238d6d17fe2f5eee43f
SHA2565df1f5f01fb49a3d90725b73e17c998677262aa1d34bc63f913cb8d69503b818
SHA5129b50a180df69216373c4d5f6fe9fd0f898201c5fc382604047a8032ad37d8868952546fbc918d26951397867e74b26a39517b81704aa291d66463a044e00738b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dc8de19a25ba179ee5d63fface18bb6
SHA1acd91f92b89d0dbdcd09fac53519c26332560f0e
SHA2567bbe134853aa4ff60eb367854231edcd763c155ede84f24c2d2dd046f6c59e8d
SHA512ca2c42f170a04cf0bebde44e16c6554fc4a2d8c89ec19d598ddb1e2f746e653a304fa64253e77cd22ef281ae8b2e3163b434f35a6727a544a9f192ee11bfc4e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1bf987e6550a43d88309a2f3ca4d765
SHA1760c12fcac4412c753c62dfd3b2e8386eefbf254
SHA256cd2211db8990dd5603d998203cb7e1ad081ba046969a5156669bc0fb37befac3
SHA512d2f37f9705a83595a2048369ec6fd40fc417e61747e8f79b8fbff5d1f57f0d52da1ea2dc351b046ef8e0afa43813d7cb232c153426faed511d6caa91a925cd19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa137dc3ec76f62d966fe19561ce8da4
SHA159e639450944548daefcb3208b574b5435e18958
SHA256b0d13d005f4d8bc76c7c614fa35b6b98e549bb941263bee27488c5c8afe5b3b9
SHA5127eb02e915a3e77ab377dbc230d01c24bad9c703b301f6f1b392213cf9d624c522088ea1a858c374b427dcdc25bc05aaf48cd827facbe69dd177eaf39e89d567e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2950dfc89760b3de1358134885aed1f
SHA11aa1b3d4525bc9b08e7ecc8fb374a0f9f3f9a03e
SHA256027d5c25913b1b56a2b02f29aaa5441abb332be5efb6c8dcf8191b70767130e0
SHA5121ec7c35e49162eb2c1ea5337baa6ed6b064e9c797b137dbe75154c4b18feadb228ffd84131b776a037c39dad196fd542ba107dc183048e86ae220d06dfb8c668
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a58812b5839ba726cc5ce413f4c9fd09
SHA1cdf3f1460cf73871f55a5257540256b4c484c6c9
SHA256b8f789a2b01527bc94a3a3768edd934ada31fbb81f013a2d9447ee974387711a
SHA5125d912c41f277ce40aba94760cb1b2f2d9518d683c9ac49238b21806c79e5883862d8b3bda7ecc26c0b368a1f9c3190496e120c52b80055881583040a8f55cf6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5290ff5d497206bc8513fa45dbbda9c4e
SHA16b3d0e5c609e52b7d2e413e202fc011d4e24e53e
SHA256caad183effe20ec5326d49ac7e0320d03af5d4fc45c39c072ad46f96e7b0a440
SHA512f8b4335cc3a9fc8fc4585e221c822fd66681ab21a2742c69424259a82d0b0f923537b76fa985472b1f85709787305d9ad05643bca3c9ae1d40e6d4aadf7eb3eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edec9fbc3147918ef0da6fe56cfe83d7
SHA13efff8b649cb18d770f246a8bf9893af47f9d62f
SHA25678cd5d2347d134aae7c90c2d7908dc5ebbadeba15958a1421359de6fc69ec568
SHA512b4e9774b1b0ed6cf6c48ff3de3e8d913bc55fb66f3f71c2f19a495882300497ab301c5141986fec2ca22bd2bebd862afed7c8dd9e5387533618cc1b6df491d90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577717f35cb8feebb0639543128390d7e
SHA15c1ce35ed89315186bb09f33f3e308f96cf35e64
SHA256f3602da41093cd4477a16cb39348f933016c5013a26b524cad998a247f8382b1
SHA512a383ac9085b2d8a053e6ddea936301bbc826b7ea09c8e520e632286fed76da95eec8fdd5619e5908858f5fafe2d8a0369b9a4d16cb0221350e95faf016887847
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf1a5b822e21bde94f669f746cd10f17
SHA1227da6594dc2cbe64002ad6f91efaef411b596e5
SHA25646e98fc73b9cb2821404996a873fd36778908d7f314f6b6735b6721c5d529c95
SHA5125c1507e8197a0ce17a158f521f4925affc6ffecaf5abf8740008f534fad73850250a2ba70bb229968fe8251f25f0e4c775c6c109c5622ab5d49136a9d9f88d9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581fed1b45784477d21f252430e7ff703
SHA19e64f1fcb59aa783844f43adbfb24303c82c0a0c
SHA25655a0bcca41d9055ed3caefcfb99e21b3e508142741a94346d93b54cf096de1d5
SHA5120064322f900202b314461d290c5994907d28bbb5f432887f131efa0b7664451781f03c498883f61b973845c373ce7288480f0578f3dee4045cb54c82972e4a3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebfdcf3f76e9288aba1fe85a368eac72
SHA1cd2021a77898c709e53aeac70ec527baa4dc626a
SHA256737e5b34779996264bf2fff31eb8911b337d66b466c4fa081d4db5e035d73059
SHA5122dd847e801e478d4fd96f4a8b41880b15ccf1685a044c2d51f048f33bc6aa43ddb782f5d56c3af60d41a45e631a5a88d921b5387dff0a69415843d6533db1b5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fd14ea0020b759222bf8c0baf33661a
SHA14bae0348d70b7b8d755f5551d51286d87ff4ddf8
SHA25697ca2b009c1052de138c3fd1e135039add903bbe2065865f9fa10d0f97336178
SHA512b673ea8e3b5b863cf34e48199c95e4c6a96d09db1269f0c8f1a6eded34e665c67e62b7457516f0762f3e3a0d7445ca0ce38b50cd8cb77e72428bffb4fd9c43dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ff35078a81b335e31b84e21305be7dc
SHA1354c421fc1d669ecca0ac9d81157cf5c400917b0
SHA256d5540c99658b398d75add807f4ae33f7cca95f8b982cd1dd61fec62a0fe00450
SHA5126c41b09b13020dcc860d403321868312e3a19361048f0423cedf9af33f512af94139be317dbe48ccb8161ea73a1c91a16d273ba818686756ec465103cbdf6587
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3c447222c064deffd6bababbd213502
SHA17563d3abbea53c61b10d7e17a8a4f427baf2af7b
SHA256c30deb0fb4b93865e744ef03ff21b36637285dc6ba0abd8ff765b054cc9bf6a6
SHA51258dcd7ffa1d5aa87bc55abccb0d96dccdc1e89768b46ca5991c53f44687a676e2a879ae2fb9b74cb450d3ba2075d237abb8a38271011ee6c24679cd719781562
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aca6c0b74a94429ab38ec28d799f81bb
SHA1eb41daea51b0e998dc21282fef4e86abf3c63f72
SHA25638b90baea4dada381882d996677b60533e69dac711dfad416b9e66afc39d8468
SHA5120eeae9b5dfae64b03e99f2c0ea50913772fb63781b77f02c493973734841c25f4bbe118a8cba6f86a5295d929ea74a0953e5ff53d3d7911d1c33bc610869ceaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7446534c6d603b88a2148ae3702fbbf
SHA18e5e86ec0f27d5966a5d414877e4b6d7b32beb34
SHA25675cac2b0c207f1dcf7a9af0066234f45167ab800c04c7bf35871a26ff68d67a7
SHA5126ff6c23ddefe5a5fcf5669c3b6990cb47767a2cb6543e6c45850f295512a0af03643b298bc670828100cbfb37114584174de1a0e780ad47e3b3dec4012b4d5e0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6GL24G53\f[1].txt
Filesize39KB
MD535e751e9ad4488fdb799ff2ee5c05093
SHA1bb6660f96662615a468de0e613e2ce703730877e
SHA256120541cf1ce005e98991acf361a6f8d344952c46ac18aeb2edba61f3dc3cfe74
SHA512e1cf23aa3fa90aa6555b3176f262aa79fdd2a8b9119f579d45da012f61a9f32b5993c1fbefb715bdcbe3ec8563d93c239fd623b58a46070dc4e90937fcb31914
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b