Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 11:10
Static task
static1
Behavioral task
behavioral1
Sample
d438e00081660586addd737f242bff4c_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d438e00081660586addd737f242bff4c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d438e00081660586addd737f242bff4c_JaffaCakes118.html
-
Size
6KB
-
MD5
d438e00081660586addd737f242bff4c
-
SHA1
4d8ad6b9222de1d9bb578bdcf1876f2fb26b85f6
-
SHA256
96a2fccb8233de458539a95d6e0d2500838790c5bb95b21664700b4811698252
-
SHA512
f9d5b8143378223e3a79b53ba697179612deed3f7304032cf6eeea36e8bc90a8d420ebfe7d5ea84fedeaf65a4c88c1b77da72b960afaf3a46ce4ca547b4c5f2f
-
SSDEEP
96:uzVs+ux7hVLLY1k9o84d12ef7CSTUHbca1sLiVcYR16cEZ7ru7f:csz7hVAYS/Y3R4b76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EF0D51D1-6DD2-11EF-9188-62D153EDECD4} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431955686" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000002efddfefb1c9fe437f1945731354b4e4dd67b5b4be07b9277572bf8d956844e1000000000e80000000020000200000009f8a40c61f35b28f14db27317c1d0a602312154e8a0859b1de7b2714a6287cb720000000c59d4cd9411a2c7c15a4338a8affc928d25ee7bd8852492c3a9b968b58a4e8804000000048374a9cfff28e6eeff44629f4ebda74223821fcad2a58dbf82738b5efa941e3d83f378b86b8d5f48f57ba6987f01db52996ac7c01defaf210242acb2d0592ca iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 901c0dc4df01db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2184 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2184 iexplore.exe 2184 iexplore.exe 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2728 2184 iexplore.exe 30 PID 2184 wrote to memory of 2728 2184 iexplore.exe 30 PID 2184 wrote to memory of 2728 2184 iexplore.exe 30 PID 2184 wrote to memory of 2728 2184 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d438e00081660586addd737f242bff4c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2184 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5123bba38ee38cb2f6833fc57aebb9a65
SHA168866070f16867fce11f2dad1306598a85408be8
SHA25620e3c5bbdec88dc5ef052480ae52be3bfd233475bc525816f9bf215c110577e1
SHA512034eb54ea831b41a7238ca5a1335b191d64fd8ddac93b7b407f087c9bc8595b20850d2feb9a4e5dfea39f2689c031b1e51fce94aa475b05e93e825ab0e1025c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511f5dec9af9855758f4ee891368c29c3
SHA16d28c5f1900a31bf53b43ab7d59d3a4f3066fa04
SHA2561f6b2f1595c0bffb8fe93f4586c3afeba864b78bf95c824229e637bb14c84e60
SHA51208f5da666e6aac668c6a96cbf1709734d0bbe08b7f786bf0fced9022b0193d5c4758d0a32f08f92d2cab4e326b875df294373b908e63391a937239f73d030ae6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5661124fd88e581819f64253c90e575bb
SHA1e18b77c40e0f4a5693fb15bda63f9ccb7c3e6a90
SHA2569a6f77a7357cb8c356959aede1efdfcab72d0def0604afb3cfcab79737a60e28
SHA512718f9a265f7ce67fda6a397387663e99a1e37e3b6efb99b136befe5133a1a399cabb8cc29b0bc095f2c2fa4b5d2afca29ca634bf3ee73cdbc62c30fd74571efe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5110084023685b5ff28624bbcf9a4d00c
SHA19b752abf79d57a7a1be6029b44be7b51d6231264
SHA256d5bae6f707f9bc63808a43c057634765c77e8024b711e2980cb63ed990876b0d
SHA51213a0181d48eb089e907ef613ba1cadd4310ad5d4cfacdda8e128ca4819d1eb543fa89b107cfe4ee1ba84f4ba27e049319313ac4705ff4ba111e0930d477956b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb2579de05825b00b340ca46b5c472f5
SHA1c3d16a98fd16cec0bc7318af16fa054953400262
SHA25660ddb5f0f81b079d89a38c07444453c3dcb111d42babd6850a02ac1f27ac8237
SHA51226de8e425daf140def337fbcd85f0f330b290977234df0f4d732f4d9a2c9689bf67c6a26f5393ab87ada3ea137b3cec3ca0fe815ecc96adbf357479daa707d95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3a8d2c340883e505775be5fc3871d4b
SHA1d632bd1786e09afbff255a7609adc41d8450c40f
SHA2568ae4a8da60f4ca6e0fdba1d0cfe723a4150ce28b113008ad3a32f1fb036ad7b6
SHA512b9fa4d8d4047b240f8355cea22353541562f8055b2eb4f2e8e850c967b5bbfd4c38d5f78b62e885346d55519040a64d68201f8f511fa50ee407e1bb223401a1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3966dbfd109a36b5ea7d600b68515da
SHA15ce303527e9fcf1bc7682e2d374fc44a3b146513
SHA256de84ecd58d7ad1c9fb6de6aa5324e75d628326520ef5359e0fa9c50e91ffc53b
SHA51201b10413e57c0d573c929322c25f7511197c97a79ebf2cbfb3d4336d42f46d7695a25646cf679266bb08beab499e2c6804799da8f111e8ba03dac0d99a5e420b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594175c08f5c6533f55182720f476e7be
SHA1ebbe325e403aee44a8c9294b59a404bd4137e322
SHA256256e824ad064e47bec54894ce1175e2fcb9e24698ac4eecfda831b6b48d45a37
SHA51265ea8f6c9c7f4196f989ce9dc5c89e9dd64d13c0fcc7684aed028f43561ae5bba431d457191c7e5468a6efa44a20dc43a48b1c7eeaaa31723fb6bdfb28b803b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50121d4ec792b3ce347a27a321057f910
SHA1de3f341a57e4cd2f9b37a20628d96ea174009ce2
SHA2567145e9c8262ce539e69b8af20060d5f8cfdb3f980835d3af3197c49a16efb409
SHA51239c767a4b6927430dea7929e14f033dd67c106e599b47989fac016475d3a942fcd8c7eecc3a82340de22d51f1a5b0aec6a44fe899ade7b8caffb6bffd9e3318c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5654bd04de0d6fd0dd9f72cabcac6c4a4
SHA19c3feb1f4f27bd1fca158cf06ac57ccc39f58f83
SHA256a85126022a9cf542f494eaa307a480631975dccc66625c5f6a6524e881635032
SHA512f1fa410835a7d897b3afbce0ddedee595422e956bd68a47aff289344657d3e858d1fad9d609e5c63d7c5ea9fd6e0be7ec6902a09adcc01f5020621b9999dfe10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5666f1384e719a79c2ed125c578638f63
SHA1f5f42a4f3814859433e4961713c088bc5e743245
SHA2560fc4cdedac4035603947befd4acd90dcd9346b377b6ebbcf6134bfc9d6b44388
SHA512d8e6b6c2da1f9dcfdb64677c6d82aecbbe542324d052539a9fab819314c9a706d7edbf569db7bb9e74803050bfb0992872058ae457666ab2b5c1bb0062ec30fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5425fa62c8e67024f97482b82177048a3
SHA175e164ff9deb6d71e71b11fae52b87b904a8c4e4
SHA2569788ecde6b30479e09d3651de6a5b4124f881f5f7ffd97948e9c0d38437e1ec2
SHA5126e548916766c9deee56ea6c2778aba954b93889a0c4bb3e3d548d3b1ff1402ceea55eade97adb4f814127b6351b955994521a397ff52b15be90f87871cd05013
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594070fe6971767b769c4614fd06c904f
SHA1a36acd2fd08845c864705384bba2979227d75c6d
SHA25644f9d1e34d3d40212fc219ebbdaad05103392b87732709949e35d01af71961c6
SHA512d2a4b87760db56021051ff55171820118a72963ff0a5c2d365533b14b417773e8da7a1cf67c6e10c60f0a2bb81b75111b4b5c2d3bb4a0ad61c84c223f13d9acd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2be3b38aea3fd3fb51c8b3a9ea1efc6
SHA16155236f8f401906873c1ab7554935b861198e4e
SHA2564f4005744b8d1691fffc2d58343219731d7832f4316a3c7253c2b7df20516243
SHA512989c83b6a8135c52c2b05362c15cfc78773237604f4a7b78f73de85ff47ced1db555d5c2724b84e213974b8733e40d618cb82106bbdb0932fad4452cacfb3ba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e3d58b64266eeb1de140e499da48be2
SHA1e77927caa3a1d3f74cb2e16384d3c620062725c2
SHA2560603a649930e67d85aeb363b20ae19264156180e4cb24849bdbe35090984f899
SHA5121d921de5d0603b594bfb81f26ab073a84acd85dcc515626cc1ad2ee165bc80fd830afdd5b8d1547cb18f27ea313d42dcc56d2eaab01ad51d7dc978c4e8c02598
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dc0bcc2500d0edd2ac4edf177d611da
SHA1e9f4e50250a83ec699496c845bc6d3156ebab87c
SHA256b268aec7909e78a7de9af61921cec36012da8fc89cbbe09070e79eaa14239d21
SHA5124638ed0a722f51e0a3cca86a2100b3eb474ff7e4b94fb7c156c33eb350d996d7a1015267b0a13ac7113caa2437090490b9292c3f4220742e126f55f2551b68a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfb6f6e07da5f70663c4859d42536612
SHA179f19392a2dad375593a3d534a51c19bc8c09863
SHA2565f2e73bcbd36cacbc4138d444e905f1066ca2398a330fe86a804f3ba3d63cafd
SHA512ace50e39664139e00a9234af6c3efce220789f1622b35b889c97df9105949b55450800a07600563c100fdd51189dd2bae91f31600efeb7fa65f7936ef1511a7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0fc391ee778420b8cb90dc8ad3d625a
SHA1fb5613cc77ca179d650828bb39df9f81f98975d6
SHA256a077b8cf23d04ddbd8297133413cd91eb4629b7005d19b5b9d0a5a8e539cbac6
SHA512584c281a2e48629534b4720126d6a6e8ec0b353e11f0d32a30dd1716694ab1841c1e0ef4a365fadae0bdc1e21d5d876c897c8ef463f9f5429552bfaae6b19787
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ddd3abec0d4001329079ec2f963c44f
SHA1dd4864b9602a42302ee7d8e1418a64436665203d
SHA256a842cbe73fc398e065935fe33085edc99f51a0a90665d83c6b5d4439022a9415
SHA51274496b958f40e91ce08da8a05d06d6fe9f5378c064ef11b0fbfdd9d28d39cecf0e1648dad3b39eec8d3e02485b081ef707a3a4c557c14f10051c8f97a82ddc27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5964a1ac381777e7181cf18adb43a018b
SHA12fbb5fe5750d03652307e5acc3250741c5d68c4d
SHA25664356020753768c29f5edfbc809158c9e2971a9a92cb707501233bc595a3414c
SHA512aebcdc8a967117978162d0e1e263d856502baf980394578624dbf0aca968ca54bbcf1897479a652593b037bd079307ec62b97963c5abe2a3315c707c5022fd23
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b