Analysis
-
max time kernel
139s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 14:27
Static task
static1
Behavioral task
behavioral1
Sample
d22603c21902150c087154cd1c8f0430_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d22603c21902150c087154cd1c8f0430_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d22603c21902150c087154cd1c8f0430_JaffaCakes118.html
-
Size
122KB
-
MD5
d22603c21902150c087154cd1c8f0430
-
SHA1
deab8b0abbe132595608464fbbe9ee6b04fbe0fa
-
SHA256
4c9af34da8970066732c4c020348460fadbef06cf71b82a30d2b71a821f9e8db
-
SHA512
121bb431aa4bb5057ffef84cec9ad4255529589ab35f0ac8082de9276ace451a3cdf9d4a00caf745c62969c68d43b72881245253159c7d8aa2cb7fd65245bea2
-
SSDEEP
768:ZxnfGH0e7bvPPtEtfvSIG41m9HqEdex/sbRE2j804sfpPbaatm:ZdeU8bVEtfLGKmlfRE2AHsfFb1m
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431881140" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000348c628581d09e2dab055209db5d4c25a6bca99e5b3d533a501a1020d306cdfd000000000e80000000020000200000005ea6e1fd29ecec74d230e1c6197e252fc7027cb14e1227e5a25e7b16b9dbf8262000000078d141ba89c94e2a3d68e740d0b29240ef58371ea3212339d11fc5ec787f0a4640000000aa3bb4ce207dfef0c36c11ad8e0b167e6ee200ff485b4316393302b78e2a25f35140f6bb7ef8ce583df5327634a5e5b51ffb530b1af7c6867dc94a8747e75e3a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5B161C81-6D25-11EF-8EF2-FE6EB537C9A6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50bc98543201db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3012 iexplore.exe 3012 iexplore.exe 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2768 3012 iexplore.exe 30 PID 3012 wrote to memory of 2768 3012 iexplore.exe 30 PID 3012 wrote to memory of 2768 3012 iexplore.exe 30 PID 3012 wrote to memory of 2768 3012 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d22603c21902150c087154cd1c8f0430_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3012 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5933072454d0148d83dad251a416126f5
SHA10dbb71f0244baa8f0232cd14b73093d44bddb432
SHA256774e12c2715a0e0d03e988158f4b201ed78cc396344fc3f35a4adb05c19baebb
SHA5125c9c671cb3565c8f4c55a9719b81d681770d3973348c58f50d604dc48a604003de6c71c42f260e55c636d33dafb3657bbf7eaa399ae02146bdb9b09bf0da341d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52894283eede6ef467b3b4bb063fc0d65
SHA15539f789b53327a20936d68309bb90ecf0888231
SHA2564fdf21047367a6fa9be790a43f026e30dd53df0829989e626f275a1bfcb069af
SHA512a842f1875b3644701f8c9e889fb08c3ace89074c496fd105c52d85f2c7ac23144c93455b6d9b6979972d73550cae9d25b9ec0f1e0518e1b6d77636a486966de2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a76736177d5d49d65877da9844a31b3b
SHA102f4a657524b70b5f6fc94470cd888059139c51a
SHA256b161ce2ca722cbe480c2c3fe761df5a87c9a3d99d4b747579d60520eb5cc2c6a
SHA512998b6ba76c952a7f22d9eba4ff3f5e9292e516e53239b6c59a454bce66c66602cc32424afff611d1d6b7396d8e35a8cd46834c409e9d56427e278f4061742023
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5589aa76a4210345d8a1bc7f61bfe7418
SHA1b1d4168b49e5c447e1b14fedce684f8acbe6258a
SHA2560e7a3a4f05e3689c9cdda35021145a37485a1aea6b8ea055c56ed1a8ce7a3694
SHA512c8e57d224fc1b02e4b4becfcb5bd0b81e79230ce55a05a934ba0ea3451b2c35c3284edbd7a0165995e3da26fa35f1ebee55845cf6bfaa43051fbb798f487ffed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b338bc7ee7e6ed48b14edf480a8f809c
SHA1dfa6a847a536af2d9f289eb57424eece9bec392d
SHA256c1d2687f78839786a61897b99bb677da67a3ea876e3a666f64102c3d77c5f753
SHA512c63fcb558b7276ce8c3ebcc814a1efd5c2e3b06030c67e00083c770f9836f1cfad821919dc61d3c7611460e733c9095922b5c8ff73cd38e4742b2990f63c6662
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eee7bb7d19cc5a13e9ba12567c2ddde2
SHA18d32b40592ee195968dfeb019064fe85f73938dd
SHA2560ab11a85fd9ed36d8892e47e1dd929ae5c7454ec426cab0e2b9fe670992c3168
SHA51296a100242bcce3cc1cb61ba78d07c80c246f2f654d149c854c016cb93411968a86971fca07c792db9a4aeef2b6c60273a4746716ba4b932bce07fd8d4d93b8ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c12f83ca315455dfeb16c28d86d8f403
SHA1d223110d045862b778250ff30526eb94c515e831
SHA25664eb74f54ed29188d10c748684509541679c4c5e2183ef91af370083219e1ea2
SHA51218f419a5f8e2c66b0f26fd8c53c28ea692a42c4f210d4c0cc359a0822563a593b3a4e5a7532dbb6b214f75f812c9eaa16fb0e66740f1755eef05fb73b9f8c287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cc087375d133dbeedf65aa2417f9b5d
SHA13a68e49050ffef230aa6713507dd92e24d32cbd4
SHA256082874508ccda9a628890265f8f03592465591201e9444e1af20d7b81982ee09
SHA512b197350ae7ddaa64df4d0068826468bc39411aac5820cd904318f9bde865519dd015c54788f657fcdfbccf383d2e55c87bb6261bf9333fc15e7565547547b76a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565005050a70a8baef9b2d3e915a94874
SHA1633fc4c241d057615ec0ef43722e34a1c24bdff4
SHA2566bf316444498165003fd7d51c15035553fdb02987b60fb150f9f953d602648c9
SHA5123a2d943f793accb4edb12ee50ab8b7a72518b26a965021ea096dcfc5cf82e2f2357c0bf4c0081757cb127bcc03aa6948630705756d932a27d2852a840c4c6bfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b10e5d8b4e202beb64b47f4940fec204
SHA129af788d6ec46f526a8ef11ed3a75e14e7915270
SHA256a1f6b698708437404e56ea73fafc7f8fa49eb33e2350ac1c441e8b67ebb78dd9
SHA5129c2cd9cddd0e21fcef2c4c8303b5705acaa0ce593d0378083a75021bdd28329c15ec4d8572a65e7acaf915715340640d4d414852a6a2edb1342350b631884d88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503964371c12b9f0bf7f5acad6d01367a
SHA1eb0fd667381f5a993af57cc75dc6dd9eb88fe83d
SHA25685b9315b2616f08e77444cf068d1cbaca1333f845ed55e0645282660f210de49
SHA51256d35ef7cdddfe8b46a18e3380eb12b79c52381ea09c4c14880a5a612a94d32a039298a528feb0dc783025c345d15b1c5899e5aed1fff173627436b3c4da0b65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8b62f4b09f2a854e405d05ecda6786b
SHA1a521f0ef8ab4f09f58e4f28743f8fb1423f9cd4f
SHA25662b226c1402f20c222a5f4fe68b6ea7b62955e763c9f2cfc6bdadf6235793ecd
SHA51205258087c28cb066e7db41be4d16964cd217047a72c6d1a05f0e17cd3a0c2d9a32fb66a148282431feab62738b270f01c7241ff1c9921cb29a6efa9e56837cee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511178261532ecf8ffad4b9dd98df57a5
SHA1dbf4e815aa28583e3a169bf10073be8586c17b8c
SHA256737df8efbb73a94d431bdfb21f2a56446eba78319b43c7a2fdcf164f8a42a031
SHA5126d8f87ea6fda1316ee470d962e03a68542ec910ae0a08475e138e77fb07991d299a091d976f0515678b5aa369f98f78e109df0461ed908ad8008be002bdfb909
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e47e984b78ad3475e61e2246a749dc78
SHA195c6f757a6d09fc2bd0ef399d18a12a01d00e6a6
SHA256deeeadb9d629b52a45196f5c70fa881e854151015f0b7e536464953b646791df
SHA512fcb96b412170613abfa7c54235f657536c4934cf21db4d62107e4079be4ee9c37b3fada17230cc9052a677d84700e3de1416ae32fbde852c2c8b7f02dedd5869
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf2f798b21fba2dffe6670be020de313
SHA175ca5c5327c07ddddb3cc658d88eddc4843d1d46
SHA256a04e05419d0816c5a430f53c91c04caa5f4c520a669f5ea5443108ca0a609245
SHA51251f5f5a70bf8c9f2b030458fd3f453a8c8aeff2d7d8c10829ed7cc86b327e3c5241af9ab9d72e99f1af104d87cc37c478fd7544d5fe5b71540a50ecedc5f8cff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5548fe4dfda0428b84d3bd617fdbf0381
SHA10a9ce74cd6a0c2fae958fb0e0f3cb621e6ac1999
SHA25674853638ab5772111fa93dd81e00d869977db1b0e321a6829a0a4f8ea3f9f910
SHA51220c162e7e550bbe99c4523815288d4ffcfa72f00f792432ff673c1fe4c83e9907902876f4d581b8f3ea0dcb4bb37a11ae3907b02e86087e266aabdbc7764b29e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe047b5bb37fec1bb4f2e4508e71528d
SHA141eddceb76dcb6047674788988099560ff554a1d
SHA256a08f066b26b4ebf4880e6d1b8adfb7c131f10328f827852b5ab5a123f327694e
SHA512705e2a14597d96332e533de1df901909a56448406acc018b0a8df284a5fc22c2d719fd98704a676987b0e9a8280e754bba8b4c9084875d5cf3e17556b5fe1f0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec2f7736bc8a75d48917c01916790e31
SHA18a6afff5b248bbcf29abd1e957b6f3a9c55cec27
SHA2560fa8818af2a52814be12541c0f2891fd53909a04db6604e5564888179c33550f
SHA512e70f42c81853423ddc9b7786abc46c7e8b05101cc33e1574ae2345fbdf883ec47bacd09a3b9621c3aa09c0ee7ece7fb3de1bfa98a652a9349a7ccf332e70d760
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529d431f606a6d713ff70f70298c8d6e7
SHA1de99aed68b7435f3872962695445af067b2d09a9
SHA25637a2b5538ddb3fb2d70289d83b67839f99188c7cb164bcff3ec221c2494c7f68
SHA51225f9d0b835aca64d94ae9095e7e1331154ebed7811e3334a0f92cc96c733e1af395bcf12178de33734d2069a2eef94c049ba3a4c201764eb40b328f165f4c9c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5395fc5b2d8f5214d5f058c8e5235bbd0
SHA1614eef6ec20a7d72702a571cad98ecf8e8ac1f2b
SHA25676d869eaeee42522df0f020816da4d6a80a1b0841c24dfd62bbbc24b0be5356f
SHA51254a37604c5c1b9a73ed817c33bbaf751a75062ddb78062b5ffde3c668635e26bcaba2730fa60705d521b8ba54194fe0be4c59f8066a8ed7432c74ae1fe5ceb21
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b