Analysis
-
max time kernel
135s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 07:06
Static task
static1
Behavioral task
behavioral1
Sample
ead12d007963bcb9da27997ab4e8c038_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ead12d007963bcb9da27997ab4e8c038_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ead12d007963bcb9da27997ab4e8c038_JaffaCakes118.html
-
Size
4KB
-
MD5
ead12d007963bcb9da27997ab4e8c038
-
SHA1
b35d6c9c02b9a9d91e64718b987f171fe56ae66e
-
SHA256
8574e6e8965dc0d7a504f91aa7c1cbe74390f58c271db7f2ec0235b7949382ac
-
SHA512
a7f712c6b3a91293f08a4f794c8726cf709f2bd1fe94d66e4f59671a16885c811f820cf54243a79342b8858201701ee8f06bcff51f2f435e616d86239521f238
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oByzqOGk:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BF16C161-7655-11EF-87F4-7694D31B45CA} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0caf893620adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432891481" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000081b344cf97b666b11adf232916d33a4f43edac69e312f1b4282e90313838504d000000000e8000000002000020000000f571277ed906c369937ea729a0fab202020c5c3cbc4006807d8ff7161cb45266200000004c0571193adba6c74ccbff5a0b6370869baf08952af3230e4f36ddf201882b7e40000000f800dea34128c7d286735a889ce4f285fe5a1939a1bd448ccd4ddcc6093b8a015c282a356cfa9c7ad8ec77697e938b10b6107a394fdf049b9507c3e451e28e31 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2112 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2112 iexplore.exe 2112 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2832 2112 iexplore.exe 30 PID 2112 wrote to memory of 2832 2112 iexplore.exe 30 PID 2112 wrote to memory of 2832 2112 iexplore.exe 30 PID 2112 wrote to memory of 2832 2112 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ead12d007963bcb9da27997ab4e8c038_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2112 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579996327885fb98b19b0cbf79c6601d1
SHA1ae12a675f587b8b29c222bd191028ba7c2318493
SHA256516a65774a92dcabfe17a359d235cd0f06366d8c351a651a60ee424ac0bf7b64
SHA5120301156e36475cf436f253eddd4fa656895fd9fa79cda8ff069f89474b7ba4814d817ccf1fcde4c2f0d8d94b80411741d683afc251129c3d36f2119f764ab32d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcc351967ecfc4e140c8162a7ab1c909
SHA1b4e799a8a6f5740c38fb39c8d924a4169dfe59cc
SHA256f028a48df6084adf2f161131cd722de91445501e446223f8aead87b6be4d89f2
SHA512bdccd545c28603f6c03768282105abb40e1745e49ec98524e4b6eb07e4191973220ecc236714c4d232fc7993173311dbd63705049d6a02b2b0f241af6238a723
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c437197808bb219d51168cbc80e1f1ef
SHA13bb06677e50426b9b2ec613773a0d3d53a41230b
SHA256785da5d7e9e3ff3a30ead0085a14ddb4394f00fa0c31825159a4026726eed100
SHA5123dad64d338e924305de8ade8a14a107d297467bc80e8616a54b135cffbafdbaabf016f6fafe67bb37c66abeab3f354b1b861f57c665da8fdae6f4c905458b645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a5b89afa95fb0ff59ddd41e7bf48287
SHA14f527bf909ba7cc969292db84767086fd1735301
SHA256545658a7fc7e4f2be8d06890bff9b1657c29137765ab38261b52d44e1a4eb70e
SHA51227c3cfb3ed1e5ea39c9e2a67ebcfb7460341b308993b24b4b2abb4be9ff0cba9795d11f151113cde7fb1602887e12c92ab881f6f55b287d630a693d612468ab3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd7e07a3a6899faced22689048910fe1
SHA1b364da787768a5b0fca513bd30ad0ba6efaa04ff
SHA2563af4f731c60687237f6d3c3332e42e831b145c7b85b29385b42f330591754bc1
SHA512175fb058404cd92d1bd3f1a727cea502e4807c731c6a2db52e945259180d83baab3ee973ce2f30fb24d1b021d1b88fcacd85c6c89a82dc112cbdecf682dfe967
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf25f5b1459729fdbc8bcde76a3a2797
SHA1c55f946fa5e6e1eee6f3c203b76de168ce620671
SHA25691c508da1e7766076dd6b8ac026dbec91baf7df416d0a922a90e138c543006f7
SHA512251d7a5ee3854a75406b2e3a29f250417a53a21fe1ab97b13ef4cc1550b7d53f62b53e94cc7f80e0aaa4d2cb42b388ffa239855430162f27944589e2178485d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e31829ff1c85f2b18bb7d0b035fe32b8
SHA1100fddb540b6db23f2f770653b18e4517dd3f3e0
SHA256a57a7d60ee709b15760980ccaf99fcebbe7613341e2fc3d322d849a4f76379cd
SHA5123c6e0cc5dde0bc177a789e09273ab02ec982e117d391d2ad940b4452c281eeea8ff8a484ae398a8ab88f58d0c19a702cee1d1a8fca02ebadd6abb8d150b2b3db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a38c812796c3d378f55e25ee8bb0dcd2
SHA1a8fef52fcf3e1bfde77cb3c4655fe900fbcc6ef9
SHA256dc1190dae62a4f68faf1cb0c27398c38720c7d94cbef74b923f5b725096a5e92
SHA51286052304b0d1ff26a5afe8fb8c1a0eb810db495be617c38612e3f3832d9cf8625a4c8f83611def741623baa62e51604e08ce59b3b078d3fedac4e7bdf679d27e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c6096cb99e7873ff72b008d12aa34ba
SHA151eee998b7026435eab7c558f2618ace9b678152
SHA256785d4a5a5deef04a3b07c2d925922fc12af366d4c7fa37d64a1829eb5b12db49
SHA512f8f981548e2eb349d08a49b76e81f6d01a75fa048da183a5b9a32d61091c60f8ae8e254b202a12441c90ff84f7fbe80ad5dc0aa8cd4dd5e4f6326518bd1480b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a08a38f7fff2962da3d1de2e73b9889a
SHA12d36a2ef9a0596e0e17dc46549aecf1ff8860387
SHA2569617ad6e939fa8bdf8ed2d2472770873971990dbc237b5a8e88c8b96863e9dfb
SHA512be182c77c409ce3d997aed7ce115f5edac1698d059417ed38b80e1cceec0472d773d025050b6fa3f6c2360068a8ea8c6c34a116f069141b4998621473e4d87ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b15242d22392871dd5ccfb4877c30c6
SHA10293ff4984fb7deb0feeff3ea3272632c4a9982b
SHA256078bec875b6f2785f927bffd89028e5925320567ca729cc03d51f2fb05602743
SHA5122c80671833e1b596c8f6a94d3099e8d87833e427ade395c0dedd7005f9e87524a31d441a7f0f7f5ffdf694bababa829201b0f3e2e950fade19aece2f2116b3af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5342602f3967fb1d12f3ae97ce300f8c7
SHA16ad75c44a1b41f82c3b947e0bbcf022708342cf1
SHA25678f5187ff7a02eb1a7689991d6b553230b7b77e98088fa357e37830bee4fa835
SHA512923651aee712304827115eff105a979ce6a00c72f9aeb5f0c65067168acc5bf05ea8f197dd3be4b8dbe104a53ec676d9399a2d7d637330ab49fe0740d9273cbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509cf45cff0d9c60058c44f01ad4b1b16
SHA1cb7818c045d5b0ff092076af175c7d40171a2696
SHA256c4e619e2c8d2f5782a245b7847118ec1248df94a5fc838892583be5990f057f4
SHA512d75dbff4ceb368445cbc4b6a5324d455e484917a5f6ce61a480fc094a66a718754f8384b0b0e09a6001610f641fe9a8a8447283e56852fb3addc03a89405988c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b3638adc79d96efd677d3c3fa0d54ea
SHA1a9c037646040a979cb30724b3321af4d48365594
SHA256389a4280f5aed64cfe0f910ee70460fede3e5ce572a8c86575d4cb6e8f50622f
SHA5125b40446c7aa22d6b131d915eedbdc7f077ccb16f06b13ed0c1e71beaa529a717a82df1432ffbfbb800acf286b858619f1be543400cdb73d46d36524593d79ec5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56aded628f3351bb5188575d2cab9d161
SHA1d58bca806b680a9f16128cef4a491fd307b661c5
SHA25678c99e7aec331cc1261994d3b124b6cac9d71f1fece7f6929f80f6c1cf3fcdfd
SHA512c6a1b404291f07135438265f0efdb6eeabd3b5f06e5b9840f967a3231922b8ddb6caa0a9df0a37446d815ce0c5c3a839d9caeac53300e61a61957d028ed06c5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5685efcf5f7cc6f6f1bedea7dcda1916e
SHA1287504ec37a2e2f586b062c97f96072695c7290d
SHA2563cc505e8130936caed6d9aa12f7d9194e9ea6c0e5b6183f15115ba9486bc8cb5
SHA5127ff469ccfd6eb76a07f4c26e7fd9507a2f05fe6dad49f8f940ab202b387624b349a662ca2c7344721a65082153e1481cbac234a1cb4d61a2597f4da293a3a4cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54236a77f084f2b6759635e1c5ae8a29a
SHA1894169e320e9dcf074f1e0982703b60ad14d8b96
SHA25667bc7a03ca6b88e1326fb7fd4716b0d1d207aaee54e9c7bcaf39f031b26c4aaa
SHA5123c4fa55f00f028e0fc761e948b4f9fe51e3d717106b21647a046f4ea878d6c756ac9178acc536f45516dd338cffccdb15510e2c7ea7f755a87539882bc805648
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd7be2b19b4c852b36e860ee565f9d3a
SHA15f6c3401e1907150c901ad2f4140dabe9142f668
SHA2566375fb8cd98b00c5ffdddad1e4215de14296742b43ea17498a86fbb5c1ee7852
SHA512a91ea0206628e5be05d1193112c887024d44a606b5923cd6adb385bc1662e860f61a6f3cd658ac59aba29022836b96914b875952e0a87c67b8c512ed66ab781b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b