Analysis
-
max time kernel
122s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 07:09
Static task
static1
Behavioral task
behavioral1
Sample
ead24aff61f918239fd0ff846c98b8f5_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ead24aff61f918239fd0ff846c98b8f5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ead24aff61f918239fd0ff846c98b8f5_JaffaCakes118.html
-
Size
123KB
-
MD5
ead24aff61f918239fd0ff846c98b8f5
-
SHA1
8434d482d597832c5ff9413249875f0a3dd862f0
-
SHA256
ffcf167823f59f715cc7de4a4a03c60f1f233168aa05392e772d4def6d3628e0
-
SHA512
2dd79c40490798fd1f544e32ce4d413bf6292c99526874900a18251fb0b3e8784b328e24874c690ff97f662e1202a2535d1ee7e63feabd0d9f6352ff5b4dc818
-
SSDEEP
1536:fbKP/uyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dK:fbKHuyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000280c54413f93a0126f224180eed2a9cc807cde11d538ccbb80504fdd8f3bcff5000000000e8000000002000020000000a18f1b220f59fa0ae39246119a9dd1d02286aa4426b093c978a3244a0ce9de092000000087b86cbcdfcb0c1b69d40443e2d4df9851fccdaf7f9bfcd2058472747bd7b966400000008d9b4944a7d29ce3c8cab3064c3c05f2b31b5318b6f9640f341371dd93b954a9604dbeef1b8e385afd2909ef1ed4d39aa2967eafd5c69e1a78ca2e0c490f040f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432891661" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{29C78F81-7656-11EF-8EF2-FE6EB537C9A6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 408e65ff620adb01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2108 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2108 iexplore.exe 2108 iexplore.exe 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2668 2108 iexplore.exe 30 PID 2108 wrote to memory of 2668 2108 iexplore.exe 30 PID 2108 wrote to memory of 2668 2108 iexplore.exe 30 PID 2108 wrote to memory of 2668 2108 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ead24aff61f918239fd0ff846c98b8f5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2108 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56aeced28f9a7bb3aefbb582f6ca8eee9
SHA1ece37e93acc90923003006547dfc64b0b8d16375
SHA256c57f0056e1079137e8eeb67d03390b09290094ad63573985f64d5d008b5b1f54
SHA5124fb9d0d7b31f2f3c743bd26e38c186447aa1ad06424bec47c8a1305b752a306921109cf2b9c883d4590eae1f6375671edabf3310da67954161e61186f9b0f94d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0ecd4fda2818d9963e2677c42f47864
SHA1ab2c4da16ca7e14cdf7db02fea4042bfb348da69
SHA256dfe2deaa609c54a65f28a748f5bbd0b7529a1bc6379c2fbec67e576e5c411b5a
SHA512051450331984daa8c516262820a710ea2e8f9be35686f6471650041f2df4bc003a82c1dea015773dd1456fef9f7d4ae06d7443ccbb91713cb5e75515d4d5e791
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549c8111129981377ef47cccb85054a8e
SHA137aeea6f3705f17e9e8ff1b18555b4f51ef0d2cb
SHA256e0c01d5e020577d0d136e53f86d06434c0732a13aaaf155dfa645d3154447707
SHA512bc821b43e9992fe29fe34e4635653e3dbb98ea76c49d77a1a9248294281f23eed28f03b78dad359e224676c687ea9595287d724444a52ce01f7b464b3960adec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab1563c360e9cd65ef212a3882c6d949
SHA1540c168e00f5eaf2ff297a4730b35c69412e9f42
SHA25647be1001828ffd9f7fc23768f87837503466c113ba784a07e1d77ad42bc45317
SHA512166e21059865563ca8f22588aacde50f57f476d10edda6907235e51627781c450ae68b20ba7f704f5922f01308ce535aa59763bece2f5efa1dddf3e91eec9261
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b10934c676871ef330e6b1328e4699db
SHA1eeec74c0c6149acfd9417a6db01048b320a8682d
SHA25687a7c9bac707bfb126d5229f29c3f6f7ef341140556e886012cab4383c9fa90c
SHA512222e0adbff169c602dc365964f031da50e6a30d033541dfbeec8650af8db44927265aa920150677dd8ecaa01f9cb433c4dfe0d7ccd1a22223f951abcdf9f287b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5667a6f93e7f6bb5241eaa95af6cf438d
SHA191027fb636fef26fa305ade5394333213ad4b207
SHA256b7b5f0615a284e8295ffd0ed60ac2be6c5183ac1dceb3507212f6aa72571b041
SHA5121fd0a490539439243770694baffd17b3325aa71ee297d81dc632c6db4ed83672a548c738734e08984f5032d90af9eb4ed42061bc5ef7a9075bceccce41f4f3a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5603aecd6c469506c48f21fdbce510df8
SHA141671d30d7527b928ddbb79c0a9b9af83924164b
SHA2568e7dee38303eef2426f9c62f3a8d8e40df522388d5a37e6dbd4820c625036b6d
SHA512b38e70528e3e0a8dcbb2c64fdcf52678b8094925bd11529b88973d353d21af9ae948697cc2f674766260935d9875225403395c31a9bae1108be784b2566e440b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afa62559262a877ae2b262748aeef208
SHA16f6e828e6e0a4b4790ed0b0537bcb88e8163006e
SHA256b7f7a455ab62ec7fa727974887baaaaa3a35196b6056a7857845f037e9072f11
SHA5122807f1881b458f7098083fe2f97952153d10ddd5fdb0ef627980d8b2b519fb4d0bff96270c58f549519b97cd753188dc9f578aca1d92b9f1d593172db977d5f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562432ea096a6e98c025fd0587ab4091f
SHA1dbdaa71a0a1401836d82b8f45e0c91fd4f0869e1
SHA256ea798730e9cb69df5d8518f15c347397dcd79e3afd9638066b03319363133395
SHA5126775eac9366d49c2883c4f8b5c4cd6dcf9839b635a6054dc94c9676ce9540ef8e50718bdd213f3147f4bec4ea1f667c0879eca363f57973a166c43d1d9953664
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb6175ad98b06c6b9c6c1fa9c08f02df
SHA1ec537b82d126edeba5385b65f290500122112c56
SHA256427221bf176e2ceb262925b545c5962add6c1798ca84f988680bb12144e46656
SHA51296af0b20f09147c3d45a6be38ec9b01e54ed92fb7e0e63fc0599caca95b1e41c6e78d20f7daa868a1f68e9a039a8dbf563eb8df9f1ea5b3c907f50ba68056795
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5180409e85b21d4f164f3e493208ee5b9
SHA1a6847f8365b102c949e1dabb940affd5605981ce
SHA2561a28ffb700115bd227257f80308cdbd911d2673edb8740237c756acc6804d559
SHA51256a11397fa75a8ff719e6a66d80f286e566be5a498ec913d5d734e49e4df968f71ac9fbda0d7e681827b4575148340814ff10ad8f4af19971d8cc1a29fbbab94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d98a1dea835631eefe17bcee75ecc1a9
SHA1091e260e533a151e93233b0f22053b6ceb229973
SHA25654837ac1a54aa815abccaea6e14d951ffd9d5c8f5ea2e69c21c6acf406fb41f5
SHA51289d6062574a1f04c7965534051aec8cd4b88a326ed02db1f30fda09463ee89f16b101fb1e6029b92d4c9e63ee25ed58dc9aa10b31ed401dd0ecbaf8a09786c43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500d9849f118619413c08dfde35fb64a7
SHA15fe512932a6a94471c6204e4592b9d16716ca6f1
SHA256de44aee716550013e9a3b5ffdc33d174e0441f661af8ca691fb95c3a975ec8d3
SHA5126eebeab84b163ba4cf3667d218d2be9cc79232864a068c5da64c85db0b1bc4e12c1234d9260b212df0a00d3f2b69b22fa53b30914ac9450bd688dafbf7e19e79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f12904f159024b80eb4abea53bc590b
SHA1c1e6dc9d7e51959d3c212208f76d0d7d0a325d04
SHA256d4eafa33e0560f9287c9ab7dd388b30eb66e1d1ae546eef73c6f43e0c97618ca
SHA5122dc2fd169832a6cd7079f65af0235480fbe3b9f67a1f25e82428a6275fecedd3f7cb10a33c4674bd31a86fd824fccc72cbbe415c992766742bd4c2576ff5414c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5c714655da5bb2996a6f2bbab041875
SHA1deabec5bbe3c2a7e7babfcff40a0553972ed0e96
SHA256ca5e7bcbedc87fc7d30c77d1f85b08204a5d7903e0a4019b520ce0229d63a6c5
SHA512384186e88a0d9b8b257b12ed738fd9b507a2bbe549f2be26350f47a28cb2fc35aa76017d70ac51194e6af6d07482e3a1c12c14ebb72ef2de8bfa5c58afa24842
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51437721430a97cc4c9b02cb00c31c231
SHA178ef048d587f1d55cacbd8e71ce0f3d9bb923f05
SHA25675fc44f1ca966850a2f971bc56cc549f5414e8afbe994c83a51c9bcb49770412
SHA512e1585e97a8632d2dc3c092a0f3cb7063ed8ff48bbfd0ff7c89067d6584f0509baf3c461e0a85f1148d5b79715d19f588669c2764a79d032b4dee8bef1720af6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1acbac51effe0dba7e8618d1a5d5e80
SHA1d0c4650b98e9d9baac92968a69bbf011f8c74c17
SHA256dd8f3d0fb9e11e028176563a5fb171616a8f9d97ef12d078d6b7be434c4bff2e
SHA512f552972b13520e1cd97b4dfb20be8f02ecd310cad09243960e152c8b9325c38a83e80d0f6b54a30b7b7627533b1bea9cb68e6e24337e57b4c2046256ae2cdd4e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b