Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 08:44
Static task
static1
Behavioral task
behavioral1
Sample
de143089512dfadd0c05159ee0842142_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de143089512dfadd0c05159ee0842142_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
de143089512dfadd0c05159ee0842142_JaffaCakes118.html
-
Size
6KB
-
MD5
de143089512dfadd0c05159ee0842142
-
SHA1
387f6834c910b62b0ff728700c3d792fe8f90031
-
SHA256
e82f5ebe04814d60f43633df13e3cb7dc0613f3c6c30af3f9fc11cdcfb0c9173
-
SHA512
199e2cb282ac90190f6beee21a353f5a19fc086c7109601b51217a8f3fe8b1762baff80db9f18c0fdc9daa5b2e4f1683230e8f49523a8e7fa149e9bddeda72b5
-
SSDEEP
192:/g4K8cpg9dkXg0dP2JaGEuAyXKJaaotHo5ro:Nl2fuaGxXKJaaySo
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{569343A1-71AC-11EF-93F4-C28ADB222BBA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000005162ac62b53fbb20d22c4e1d182546d83b4aaff5f187a8b8d12f6bfc0ca6d783000000000e80000000020000200000000f4557d8d32c50ef4069bd9a639ed93f1b362652f36120de76c2f50001d279c22000000035f273ce7b7345b06a770412c178f4b1c8de771dcd0c1a787044351c957585974000000077abb29a8c9665221d6bfe1012df7eafb946972bd574502a8675b3fff915e439125367a25241791d47411b7225875146a9e6fffce426607867c015c26fc5f8a7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432378914" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 102bc12bb905db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 800 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 800 iexplore.exe 800 iexplore.exe 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 800 wrote to memory of 2356 800 iexplore.exe 28 PID 800 wrote to memory of 2356 800 iexplore.exe 28 PID 800 wrote to memory of 2356 800 iexplore.exe 28 PID 800 wrote to memory of 2356 800 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\de143089512dfadd0c05159ee0842142_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:800 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1f4909babde428eee29bdf13b5404cf
SHA102c48bb4f8beb304d64c925fba9c18b0d54a5ea9
SHA256e893b8e472a9b48b9c7db4aa74422f0dde70ed5201673b2346b29f22dda367dd
SHA5129fa7c0b94fc4d21e8f586e1de44cd9380062d488a68c7564e0917075c3e52342f24713b39600d060f97ed31dc721803a6a561c2b90928d82b7a96884291da216
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e14a97852259b737cdcc824658b60871
SHA1b3e7d5e30ca93dfe0ddbe2dca345d0f47aa46484
SHA256f91836948368f21bd172d7b3688d1cae803256e0e8303953ee051cb0ed283733
SHA512d441eda199ccbb5084dc3295c550b01bf7b8914877c7f45cb81135cbd8d1179e8a44dbb6e836574e0ede46556e5ea7abb46c1cf33282285b924fff098322c245
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5269072248fff4a6533cd691427822ff9
SHA1290c993b513abe698bdebac91f169171237c89f7
SHA2562b41a9b539c216c0ff1f9b8780727c01b9b142c9498388ae7d0eab74b433c4c6
SHA51266149fd7ecc88c9d9a8d6162edb21f8607a1f119571f506ef5dfc3515ba6e920004f362537ef76610e67f6225e141e877e8303061b65ea9cf2ae0f2894d394a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5cbdd6b5151d04b0638acfd89f0bc56
SHA13dbf53c108386e5fe612667627b6750b8b750632
SHA256dc591fa348af0c8342e5a6608e10a502f863d8e7f7732eaa3c68b6ecf6422ca9
SHA5127598b0000e42e277f52db8ea38731834bf72c70d880e34cf839b74c4157aed52e5f1078a055475e8d49e05c3351d006f27339f9783af74ac9a1fc88a95959bb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536b3c5d86372c1ccde6c6ddd0ee49af7
SHA18d17376b11545df9651166c4ceaa589f44868346
SHA2568b179a4be3909da4dd9044a0d628418497b4c1f83bb08e719a653ee1aeb9e2fc
SHA51274b7538728ed70efafdc5e25c6abc65b8a725d7557e328652de81b7c38b2d609ac1013d260d0ae5f9713ba4ab0b50f3b506a205a97a3e3fc42d6df0a0a31daf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57955c964d369fa6579f2b2438eece2e3
SHA173168a0dcd064e39c5a259fddc3bc0ae08c23c07
SHA256a918ab0c67245574974b44c941c0b689d232e1a2d11c5a6217e9078449fa6eee
SHA512d9c3769043f73ab13e6ceb8710cc8b65e2ad1e3d9d92e0ae05dd7de6f004de36587a117941e541111a385ca8e39b59c508f27f21864994ea05d181cb8c135237
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5392a49ab803fcf23dd3e3cd81ad898ff
SHA1b1190bcb3d2b39fbf2d3f5c2546c7c9448b6ff59
SHA25621a36b37500bd3f9eff2776907dc9f4ca8a138dad26c37875204f01317b1a4f8
SHA5127a7aa017eb4fa038128d621cb791d8baf78f8a4e2670675c8a89943824b8c0becaa54c882f3e61582c1800634e3f0f59b47c0fee71c0d48d6f2f1005986dea3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55668123fe2a96beb9ca60ed167eefff7
SHA1dc70facb5866b1aa2db09502762f589e09b0a8e2
SHA25670ef43cc4f2bd0f74e6ecc80b4ee4166f48416e59f3ea2e36bef45b2742b1be4
SHA512f7d5c1df350c3e856fdad080767e91fa261e64ed75bd1dfeeeb56f847d9d9e7f1a722fb3f7e78eef4f620928e412f2a6727a737dfe70d0f12eeb878efc1c4cfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5379a526ead83bfbb688f77bf4f073be9
SHA1f128ac2a6c9ec40f1368245480a80c19b30d656a
SHA256e4e57f8c4b516fca9af3dfa913b2878d5460324175356874f73ff0b9d3d32fc7
SHA512377b52de5ff3713ae1a1ba63e848059b45c822fc2a8448d8e134182a5a25337517df85867e65278361daae8bcf5c98e2305604556b9ad061c5015d3bd8cac848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54423cf570030b3dfa34deeec17f0e49a
SHA1a4a293dd06f32a4dd56731e100b22be680e46b23
SHA2564cf3be05286a6e988d42ee8097219cf5383a76a3da409a3f942a2015f45e0a76
SHA512bcd9daaebc655099189bb3e19b90ae81a269e79d5315bc70909b34eab15f61be83ebc9e7fc25f83e2193b3f39603021c8d5af81d0ca3a70d7b753417193c3f52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db51943cdbebbddcd29eb8399ed012a9
SHA145cdff880926348cc534aaef371b81b96c9e0e13
SHA2561cf9b562ea83c568e355bafd0dd0a96c1be07793861e9f247cacd6af4c66346b
SHA512616de88e14f7d6dd731007b791ba87cb4fc9aff5714259bf13cc645a81e3e489a0227fefc8b2a89bdb08a96f20273223d44356a94259209e9d6bb657c8332e1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d546b6d330ff28469883285890815c2c
SHA16a803799fcd1678f434f1ea6dcddbb838230829e
SHA256b6a4a5ddb32f025e28f85e57d28e0859ccb7e6e8ed38b627ac47522275ef9551
SHA512f00368c16333e069ca1aa08411134383b5655db3c400f3aabbf39cd0731264fb60992b9e0d976976a79ae8a41a64b4834eacd3c9f7e292abfe8c7d5f1f38157b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54904422a132ba24ba9cdc5110c440242
SHA1a38322769c36e93051bdaeeb31e2f8e4a2249478
SHA25698c88d6fa867ddf169031c5f498c7a9db92ad53a2c104bc32d0de5781b966bc4
SHA51207307dfb9ca997a9cd398b2ef9ae67d74d6be5ab2fc2a351584a513d40a3007f42160aa78ebe2c0a3a3254cb58ead00c14792fbfd5a9b436aaeda7cc0e0d3f97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b395de5c57d2c2d88d773a05c44556a6
SHA1d784d8ca30d1df8d4aaa58e5cc1b80e961732404
SHA2560789d9b1f7d032dab4f56790c96c186c85ca844a92bdaa476f78cf77058e5f74
SHA5122c25903e7794872ae5f425c37c5a04f73c7cba2a5cffe52834fed759ac678e488ed0d03e43d40ee2eeb5eaa05824d937455652a07c8f886c22e24547497db599
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564464b054167332807f2e8c99325d25e
SHA1b8f171b2316a9b5348c29cdf0c54d9e7000c3e31
SHA2565e1ae3a3396ad42774c6400a5bed06f9c0f3c4335c4e47b083ef2764f374a1fc
SHA5120ee79b112cf54f3e57498ffeca7eac3daa6af34a04031ed30dafe57472a56ecf0abe700bee0fe79cca7c84196910c369754f2dfed2399ba9b91fb69bb4c2ce8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5555a5b3f5ea401f6a7017f6bc90e6d1c
SHA14ca8c3641aac2166505bce421cc07d3ccd6b4e81
SHA25639f29e9fbdb818c8cf62b7992aead32e7e05fc06e2ef7ad59753dd2b0d6d887e
SHA512f7ac2a1ca356a0a1270be3a3ccb8897fc3c77eb7fb4dff8a4536a6380afc7190fd4769b96a900c4daed4c5c72b6c41888ccc074a616125b247ccd75364c0d9ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc3fb4dc17a03bfeaa4dc50afb84e414
SHA1a9203672c93c630c10d8c5ea7aa0aa6bf94e4a6b
SHA256e173736090aab5d05dca7e39f1f5e4c681ff9ba283f6fa81ab9b5de2313bfa25
SHA5121c37aaf07a02067472445ebcf96ab23c71727d9d4e85bef1c09fb1ca48c33fb788729a6f6ad40678f3a8ba282ed64524f06af175b91ec4c7fbef0c6e759aa5b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548afa96395473e32e2f45bca1b1f0ba9
SHA1e3e859cbcf74d192026ae905d2b0b16492b4d23d
SHA256f858bcc640373fa448f5531004eeb3e0e3f43d200ae4befab8a181a5dab492ed
SHA512d33c6187ef951c61b54a1281f65b036bdd3fb27e1b4b6dc22e30a402ac602a878e039e31010729a22595f1a23a7db11316a8b2c1bf440319bb1ba0081c602e2e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b