Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23-08-2024 06:15
Static task
static1
Behavioral task
behavioral1
Sample
baab12bb757ae1576d9c3510d40c820d_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
baab12bb757ae1576d9c3510d40c820d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
baab12bb757ae1576d9c3510d40c820d_JaffaCakes118.html
-
Size
9KB
-
MD5
baab12bb757ae1576d9c3510d40c820d
-
SHA1
6aeb99375eafbc71b1a87af0db70a0a45c0d6f84
-
SHA256
44e7a7b3076208c7db1dec4bf98e0536ab5489f5e8ee56478e38e4f6dd2ee2e1
-
SHA512
e76dbf3fcf2a1d8884ab95d5f611e5f06aea7dee8258f81da031fb0e7e49e3d6085b2887792ef9b871c8e4cf0ee317dd14c56d4aeb6863dc8c7cd5cabb30b2da
-
SSDEEP
96:uzVs+ux7/6dLLY1k9o84d12ef7CSTUxGT/kOEMPBEMFpflVHcEZ7ru7f:csz7CdAYS/ArMaMHfPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{274E7511-6117-11EF-838F-D692ACB8436A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 009c67fc23f5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430555622" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000005184bc95c52403b191b48c6973ffc3b04dfd52ec55d3d9ca729c7558a3f211c4000000000e8000000002000020000000cf7da112aa52869c691111395729afe783e08a51f060f4241c52dd3b6f4b521520000000d2c343643711405cd9dc11b99c8ae460afb3c2e003413b137d1a6b7e5acc61904000000095ec573dec194c1dfd5c801e626d5726f46a1d44eb974362ee8ec93e56a77ae1709426fc4d5022da52ef5209d2ec14113939226ed4262f774cd4028c1a1c38e9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2732 iexplore.exe 2732 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2748 2732 iexplore.exe 30 PID 2732 wrote to memory of 2748 2732 iexplore.exe 30 PID 2732 wrote to memory of 2748 2732 iexplore.exe 30 PID 2732 wrote to memory of 2748 2732 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\baab12bb757ae1576d9c3510d40c820d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2732 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ef76760abb1fc0dffe140ba46afbfa9
SHA1b9e2f48a00e570c0e1215ed9dfdf91b1145b040c
SHA2567f76745426f0baef3afd4e67dc4efb7e6354bcd911fea5f32f68af5aac2b3404
SHA5124226da4e3797f0833efe80dc4c13b91aac6fe96d88141235b28a6f8bf9f6d31b819711288a0daa31feb0c3f9833d4d5f518956d2f055ac3859884d25dc7d7b23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5101d3ca25106777fbdc26632db6ad3f8
SHA11d86bcad423f099c1ff62f4156c1692ded26ec70
SHA256055ad1212f054509a20eabdb3a6765219e0a23bb15b47ee7d0346829e4b14234
SHA5121525e1caf93dc16e5debe3f469b84575f11ffa8d11605f564be731e79b4174bd43ce9fd7aab21c7e1050d1d1e582853765380a34106075e5846eb261d293b81a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bb7f848898c35a71b2f4c6491d9487c
SHA12f0d7e72cee4c1e031e17b260a1670f59d0b86a3
SHA2569b7ceb443e5e8159c435f384750269d81e29c65de44093e8bc05bca43567a021
SHA5121bd0724e3a579d27d5c9bae351ff4fa3426b16e4edcd9d992e98970d188c65689850af9f6d774045c66e3b65ec2a543cc8cb2136eba381705c0845ca1795dc8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dad62d79e87d4b75c560b28b801db88
SHA143c003cc54a32ecfa8ec4d167971ebf25c1b5e47
SHA25609f3767cdafabfb97bdbb014f153775a9768dc3bb8807989ab85b3558edc60ca
SHA51234e116b855e86cc35de61c2fcfd019d773ea2974137f3b54851c3daff1e52146e4ef6ecb4153f52ba1a89b49347c17809328a925fe3d87beff6e23f3ff9292c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5179e89a204a2931ebf5074f3f07b842e
SHA1894fc03fb598177b2d60e2b14b1a42218d07f0ce
SHA2566400e53d07c494b1d83a0b995a5d0fff4372ee3c583dfba9a80e5778c6e1f923
SHA5128a3ab6f48c2d08b83e21685a652a4e04e6794aab8af5743230ad4142be64c9cbc71e4f740532fb8abb39fcf2bc1705fa8c269b02b5e5c3a78ea2ba2cd88c2708
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f9170e31d52138966754526db0b72df
SHA1eaa52c11dcae746abf7a5aa38c8f3c78da03e838
SHA256d33774055ea68447ea5c6ec136188ec209ac6241823dfe685b010d6e6aa53069
SHA5124ec0a7a2c101823df33a0d7902522d76d87120e60ed9b42dd9e2b1326e6ed48cdcfb130ab518de2a682707c2c8c6176f91cf9783eb887d6c3b03583b4c22a8fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a04c6ff28004cc29e01358c37055170
SHA1f95c3cec41afc1436ae5dd0ea9c7c5571261c5c9
SHA256470fe06d018f0138b29e1a8a19dc13186e1ad46b9585ee7f526e2e8610d10791
SHA512283f5fc372721645f5c750749338da94d1c8e08eb400deb81a908f761c086cf1c98348a6d8a428041977aa1a9c9b4b9b3ddd4702bf5738151d98fcd907a4b9bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9d443794aab9348d036987cf7b4bb21
SHA117ca12d821b6ea90148574ba7b2c53970c9af4d2
SHA256f487595fa2b4cfe74909f8e224be71875fb01c291e8c0710ffbbcf35b426631c
SHA512bed2c6b8ee11fe9563ab2f293fa6422c92343f8b6016212d1709de4accc8511b4b4c2f4580f514853a289da3bc2b72d8de2ac11dc9d2b335feff6713406f87d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510881c4655079542e77c23a36247fa08
SHA10f5fd748954661e6bf58c625b631d2f876af3cf2
SHA256e9fcd6eba1c8fb4078775e19cb702619a495dd1d69fffe559b368c19814dbfe2
SHA512fdc42b774779dac987f56c7c14db0764e1a6f86b6a711db8144cdd19e1c39070ae7384dd3c5cd825578fae818b3111f130d26f1e0a3ba4657be40db21abbe1eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f154b703e26d6cc96ac6249b527a5c20
SHA1218ea63bfef1ab3bd4ebd918034d03880a75e483
SHA2560a01741b9c255bf3aecc8ad854daf6ad8210127defc3d8fa9516f990c443ce6f
SHA512a2165d8495ba0853830d8c0ce7ec3e2506604588a869ded92c88412f4823ffcebd242f6f8d198f95df93ccbeb5c661be6069cf70a56ba9bc402c08f29d80ee74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512281e3086772413ad6bb927eb9182cf
SHA1097ddd5a85271b7c2c90470789dbbf82bd8e1ff6
SHA256505b46bcb313847c4d980c85b2b3630279efdfa3c22fcf9caa1b75dda0bd33a9
SHA5121d99da4682abf57737fe074566fe4433ef1364ca038ab56f6d87b0794913d877491a7fc189e8e06d7100d05afe7655cfa960fd7adc8a669ec3d696a16a851d6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55630ad1a8f9a2b941ed5044b5b7af688
SHA154b997533368ac848a75d1266c3af01a73f8f067
SHA256111e45f1616b7749f2ef269e9b30d5122a74e1d7f7d6066aaa7494f8d5a942c5
SHA512e359b74bdc3a67794135a23b39204c51517fbf828a2915ef82564fd55b6979d602fac52177f1d4fc595a76a008ea9ee9de926817ab817387addb946bc9663309
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5761b81d03abfc755fd705f3f36b6fa61
SHA162bcabcfeb4254ab860a3363b6cac031cd295e5d
SHA256e60cebed9abdb89e5c6d04e1024f4f216f8d3466641eeac9f936a70bcfb624dd
SHA5127de039228fdc4665f6dfff26becfddbc235aa67bfc2055834629ebf1fda1f74e69b56534f47564b8617e0278c010c39e037269b2dca54894f098de826ffea5f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582e994e5e0dcf1937a5e3b9d772ae73c
SHA1859f1bdf1247d70f88703737cd98d2e635243e62
SHA25653f427eb695d87bbc81287bef8c2224cd6b1a6079e915390f7322a19ab100e58
SHA5129d3a391339ded3406b5369d03b60d81c9d28bb3bef8bfdab108efac68a22ad17c3806eb59d7a0379e2ace82c81c27294dd3e70f047a7bf11bfdc1255514f1d56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bd728827845dc3f9adb7aa6fc14d7b8
SHA11f179db17461137c9af343b1bf6c43149e9edaa2
SHA25691df242ac399db00adb338c9200d0b774847e3ee8745c6c40f03a0d1647658de
SHA512bd86b02ed3f04ae8e8fb79b19fd79a823143ff6d8e937e4fb3ad60af12e6acadc4655fc8d54dc402a9ea9f5f15732337228ba22a7f0fca73a78a3e4140c5f631
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5403a28ebd2c5ad471a46518885c171d5
SHA14877b6dac953ad728acf771c7c07488e558ec109
SHA256b39b473588e6a15b2c976c29ef10238b21e23ee75e7f7cbfdf74cf6ec0d99203
SHA512cbe8358a84e0043fb2aadf6c75fee1d8ce1df5d13f3bd436c67ae7a8689bc0d6cea7ae3c79bc4f83b43a9a7a2d4e6126120fbfc3bae4af8378952e8a3b9acdff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5958f47f6f38a522adce80868e158efd4
SHA1fe611820c41e24cea29c64ca24574a1c308fddcb
SHA256c80213f6b98f088555b39d966d9f95be9de170fe120b88b33c9639f02c291821
SHA51256279dbc77a28648ac925699fe00177473682b1332946d2d0b3dc4553e2b3f8b8e50dcdedc75384030e086ed6eb46a9a0a9d8f3ca151544d5c5c7d49f2c8eab4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573a0df88d4f64c4e01e51c7615635e89
SHA10bbe780091cb22bc0b34f06d7cf0b2e5b54ab68d
SHA25665b87577cb3b3981566583c3cd6d4e8a830cab42d3c65f565306453b8716ed0b
SHA51252d9962f9e3e615e34aa8a1edc3fe1776ec680a635c190227f8ed85ee96e8998912eb5fdaad6ae76651dc036118a406786fa99f8d53f8f423edf8ff346f97580
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a0799e2ba7dcb5512e4a59411d326e1
SHA123210a317ac3e9e73a039ae9c5ddfe8e1cde4216
SHA2568b0a157adc76d6e752d6cccb4591a7ba7c8ee05b4a0fea5994f52ec22c1fa147
SHA512322cdf03ba891da9f72995da34f52422605b35d82fc0bc2e4e45ebb5ec9561e8cec1d639202dd79ad15ca028eb39093ce17baa17ca7bc6bcbd45ad2d5248615b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b