Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 09:38
Static task
static1
Behavioral task
behavioral1
Sample
ef843c0ef1b4117efc3ff25308f1018f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef843c0ef1b4117efc3ff25308f1018f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ef843c0ef1b4117efc3ff25308f1018f_JaffaCakes118.html
-
Size
461KB
-
MD5
ef843c0ef1b4117efc3ff25308f1018f
-
SHA1
1e959f99ec2b7f84e53c327219edf981174d2462
-
SHA256
016174f435f9300ddd0f8f2c51197bd79173be391a3110eeb574e9ab703c2a88
-
SHA512
dbaef8700502eb13d7539047f60901faf1ced1ba4f8acd85b0a68a122e9844d059c738d477752e4366687bd894b27a64c2f2ab5c2b6c9336151e92348ea8fa55
-
SSDEEP
6144:SgsMYod+X3oI+YwsMYod+X3oI+YxlsMYod+X3oI+YLsMYod+X3oI+YQ:p5d+X3Y5d+X355d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{46FA78D1-77FD-11EF-A364-FA59FB4FA467} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433073384" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000005ed93dc6798da2a95746338f25b1d4680dec0b5ee3608fd7cc339fc094f954b4000000000e8000000002000020000000c6ecb90f647752a1ef03ba0ad66f449bffd1e15aad71c729359c5f22f539975b20000000cc1137beb9d56709711161bd6eefd00dc90b1cc1f4348665a6dba6b62cb7ef794000000056533af77e72abadc91addfe860a989b48b13a1b686b70a11c3bb07dddf7dd8df42c57b1559fcb02d161c39e28d412fb43bc5c0758c54bb08cbb395c25ec83d4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d00c14210a0cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1880 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1880 iexplore.exe 1880 iexplore.exe 1732 IEXPLORE.EXE 1732 IEXPLORE.EXE 1732 IEXPLORE.EXE 1732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1880 wrote to memory of 1732 1880 iexplore.exe 30 PID 1880 wrote to memory of 1732 1880 iexplore.exe 30 PID 1880 wrote to memory of 1732 1880 iexplore.exe 30 PID 1880 wrote to memory of 1732 1880 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ef843c0ef1b4117efc3ff25308f1018f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1880 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fff79debac4199c381704b508022c5f
SHA1261584bbe2a5590ad9ae0fcade924f84a206c2df
SHA256b84a31dacde176c87a7b949b9f13c211196330566894383089a734e21fa91ae9
SHA5123b13b8f2526174e1f89398b344b1f6bab884d4ee0d8549ff2e0b8105692857261ca574abca201dc10a9db2a389f5e2f8f850bc92758f0ce477473ffd71da3900
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5664e76158d7c5520497b6e38b2dca3c3
SHA172a9f2281facf940216e05bee78845dc7092870d
SHA2562c04a6834559423a1146176dec03139ae4daed4709e5fd56e8892922e89db5d3
SHA512b15f0bc96dd4c0ea520b7643b0bc7ae241bb810675f7c1b16b2dc7d2e6a63b5db9614d7b15613f20d5fcd896ef8bb67988330445c04feea0aba7198063402573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50184d88e7e4c480dd3b126e85e51be82
SHA1e31a14a50ce4f1532bad3468a4174944be56a18f
SHA2563f375d8e82595c140e8f0d08c155bdc0bd472c032889fd296979199029caaf56
SHA512da46a3c24f2d86583a002ce2704ac01df1b5b869a154429cb5cfed3bbcc4571daa4ae959796493a692e748d52cd339d1a903d52585f7276a6de886c21b1f9fb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc776059aab4faf353b9c678b21038e8
SHA1a0843e31d42012222db509757587f992c7f24af3
SHA256b7da85bacd33984040c023ba1076a281204254e643f06a4dc56cfe96808b8a0e
SHA5123306efef917a901ce1e713161414f3efd48cdbf5ab726c91890619994648500e8d9474867b47f00990f3527f951c843a33a802f91d1c5baff6922d5e0e083444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be111f1c2dea2a5f57f80adc35236398
SHA1a0462b860d12a19ca16e85d433366b4c5890a7d6
SHA2561397e4aa7f0510f9924d30ac853a0373e1117349d172d6248517eaaaa95fd632
SHA512d471c74db44e8a58d5fa2f98ea754179c1abcb5887cb687049aac6de9e3ca89fdd34fa139683a8fbc67a5718670f0421733083f67551b186c1c13a04ff289543
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db7cc535a3c797c7229507fcfa0388cc
SHA1a3467bf88162b3df4b707130df9940903fc6c1c8
SHA256e4d754231c1145a803e8640eb095bbbcd6a883b8a043295f84baf555c4378ba6
SHA51241606a7f45684261c0a8c77b837fb683c8cc1d2e37da125393301e828cf84603bd41e31d055baa4c2d3693fe68264d9aeaab3bcbed77b3ab3c0d4b81e5c4524a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d41407c3d94d2e70ff40d8d6e3f4882
SHA1e3b1f23a0a3aa569e779701ea478d3a003a057bf
SHA256797e7264fe67921c980aaa2b84a2bfb2183115eee174f9e87ce44fb81111a83a
SHA512324ef49818ca1bf3e36fb51a0a5edaa7e91cb956efbadba160354b2e1cb8714ef3b530701603e8d74e936594ba4022d0cae3a1111b356524db93bedc37911e6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff92fbb14ae806d40487000135e80529
SHA1883877c06c644d8ef4231cd3a757e9ea7300b84a
SHA256ed877003af76ca222d2c0a3308d90950ab1c55852af2910b02835b84243415ec
SHA512bdca970d48043b83a1bab6b21bd7d8e9ae9d46aadc6c47124214164305ce19129af64c5975d60ebb2fb68d65c29cea273e1413dee44d20ee289ccc603636fc87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a8e695bb94bdde5d16b72bf17a6919e
SHA1fd8aa5c8b3635efd244203dac57287cf13295f2f
SHA256bec8d214a35fe6a8decdcbad75a761c696a345f622681539b16637c3b8246ed5
SHA51298bfbd7b5670b9d083137a75858a82dde07c49bb9ef295be3c5f6af83b45f4871a3cbadba080de6b4cde4a6164136cc47f5637fe71b1a87b278f538c78cc067d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd4be0cf28a2a23158f854891575f7c9
SHA1e398e050e94bdae5c821ea238f796987f531d124
SHA256fd82e9150d0ed8dbed020dd0963ada072f3f4d4345cb691678f81d32422c9ee7
SHA5128416ab63a38522fd528620a517f1c0b9da4794ddfb7769bd6b2e79f3ffabe8e593a1fca1790d692b1562c148d1598f04e2a2ae6a0c218525cd6c9f064464c114
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50eefe55cafd4da692cb97ff0ba6e674c
SHA1ceae12c920b21c8f4a434fb05cb93577e4692e95
SHA256026aba496dab57fce156cf80695f75a41f61bff9bb15f496c445f2fd863774d0
SHA5125059b7749c0f309f8987a311210bd54127389f237cb870b96035aaeb260c66b878aa8f6ef74596cb80d7639a96ab2700525f001dc0a8eb22aa72c3b804dd393d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b2fccea5bb095d67a62194c6889b7bd
SHA181ca35af46f67cc3e29e05f834a38a854b5b86d2
SHA256101bd716baefe8dc9c4217d2a868f449ba30c3946538b70e6395910a9acc07c1
SHA5125f766c99ac375da9fed6eaffcce3a53c5ffe77f9718c1bc7f36f87899e0915c7dfca8e5284b521e7874fbf43559f177fd52f185574993c03df73af1a1d537c2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52548b5891812c57ba3bd61ab6aa86a4f
SHA14b5a3ae4b7422e678fa12404fb19d059e45b2283
SHA25627f960fccf8bc2b6f50250808b8f1c56debb1282a90f0b435d634dc3a437297b
SHA51248acb4e3a62307517dc9bad8ea29d8c08ee905318cc4c9afb0764ecb17096b9d009e61fe1bbe01b0761442a0ce4c66808de7fd82ffb27882634d47dfae425702
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5217edea7a966508f0a1f1f0f06b0fe0b
SHA1271bc49a8a3ff804d40cdae141992bd72e5f2535
SHA2568b4c718d6ca3eab5fefc58517ad926a0ca2233655f6bb358876c3f1296b04290
SHA51273a4c33d101d38d336c161d0bbed7c8adfcf1efe746b42215a6882a834c57f046069f1f9714eb0ed902af952fd1b007ceb0920114dafe5c91cc1119eccc6a1bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5273c9ebdc71bb787062bfba42c871108
SHA1516ad360cd6d2c481518b9fa177291e25a1914ad
SHA256c8ce2bfe7154381089c07bb72f4a7313c223dd7f8f53c16ac1be20fffd686a80
SHA512c316feb1120a8dafe1cb0190d2d16b5c5821f39157be5b3f988aa5a9059c8ccbc2d2a2a4b87d098b72413044b877491e002b1b7133103975ce8a5c321c24cbfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ff91053fd7eee5a8d3c59c59b7f16f4
SHA1a5d634e9f3d954b91ac3a9abf9f63fb17ff13e94
SHA2567d251d5e33bab34801e662df2581cc9e1aff24dafbc98bbe122cb2f852254359
SHA51244bb76819be50fc2962b38c519a024bf27923fd8b0ca12ad1e04e491d26c60b2a684ee0fcbe2b650d5457ca4bf4872bd26d6b9c24b78aa4c4ccc9dd690822dff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558c0ea9a54a140487c9592b0e8691f24
SHA121ce90d1fcaa0ad8ce3689d92c262e7edd72ab4d
SHA256239ed5c64b392854f1ff3ad1bd6384385623bee437bc3ef656b48024b9ab08a7
SHA512dc3f543e98e2fbeea0d47d7865f325824f8b6fbc07955208a3dd3cd4a8bc733fc4fadbc520eab8c748a8dbffddf4d13d0cce55950716465005b820d76446f9ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582e9a0c36b7a4a26887ec2ef88f7df2e
SHA15770486545ece326b32c6b1141b9e4d8a966f03c
SHA256803ab9820d57ab310314b895ab33d7c19c1be1dbd27f15cd551ca1b025cd0fce
SHA51220888b58db48128421eae7f8c80b23ce31d37e2c278800e04b815d8a293723151a22f09a792fa009af4a6d40e5b2b771c759a649c0bc363d2c4c1f362e20f18f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec4b0031e2bff90c833958b040e98a67
SHA10ef498a75818dc64ab032b38babf44568ba9d1d4
SHA256634d4e4cd894f9633198e13b786c4fe82df28a41b5e1a417fd7e650239a9a099
SHA512393014abb1746175d6798222286e604f47cc1201ec6af3c798d399fd7aad82d669417a9ac4c6ed51c4e2c3c061abf8b46e4712b5e1326693ad59717b76f13880
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b