Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 10:38
Static task
static1
Behavioral task
behavioral1
Sample
ef9cb69779063418b7ae19a208d628df_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef9cb69779063418b7ae19a208d628df_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ef9cb69779063418b7ae19a208d628df_JaffaCakes118.html
-
Size
35KB
-
MD5
ef9cb69779063418b7ae19a208d628df
-
SHA1
2d7e4aaa3ae2e6eac901b941acd0f0d9efa8ae04
-
SHA256
6ca377538455d2e418175aa20b6be0fc9273c3288b707443d4fb97c6fb5e5ee1
-
SHA512
8e17c64d876834272fd15817a4193d970b729703643fe0e19c46a2f8397735e35c729a79bfcf44b177e58f467e8b91f89f4fa69b0bdadf922fc58f0deccfd2ba
-
SSDEEP
768:FonlNz+MKTXQmDPK4l6iV3lKvT629Zd6JTSsm:cNz+MKTXQmDPK4l6iV3lKvT629Zd6JT+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60605e77120cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A0FA4AB1-7805-11EF-80CF-C28ADB222BBA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000023159c07f06bac7ccf8f609d105f6a2f526e7ba96fa3413611e67782f5a1a469000000000e80000000020000200000005bd7375502a243f8d3cdf06077d400b18c1822efdf14ba663266d2daea90cc2e20000000794c256251fab1cbb8feb1fdc86856748181bd4b4c856a3f04a4f246ae25abbd40000000c064ca6c1149a2841ddc461f22373ad4468261af3ec4e99d1c4f2a4e43f3b87beacd09676f93569d90d56b45eaccfac8c80a0b33795c0ffab4de6823aaf2138d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433076972" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2832 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2832 iexplore.exe 2832 iexplore.exe 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2832 wrote to memory of 2332 2832 iexplore.exe 31 PID 2832 wrote to memory of 2332 2832 iexplore.exe 31 PID 2832 wrote to memory of 2332 2832 iexplore.exe 31 PID 2832 wrote to memory of 2332 2832 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ef9cb69779063418b7ae19a208d628df_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2832 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543ef2d7005d58c7dbc64aaea524e318d
SHA130164d3e02cac2f0c437eccfc175afa291aa91e8
SHA25645ea1a230dbb566d701d2384d2098b2ac124e0f93bfec5966918a62461a34748
SHA512dc4cc52060ee85e4e35aec90acf1579d6c5a5c9aa9ac32f1a2088fa06103c1794fb25dd0a070a5610372db864f4dc30728c10d161f60f27c59545b89df7549f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8b0f0d22f7168adea5c7282ca2f1372
SHA1bae0707c184bfce3f6dc742a6fb8a27c1a40cb20
SHA256ff3248ed903da0acf9b59df8ca2f8096ed87c602d1dd0e71c86e3bef74dae907
SHA5126ba35ec1cff17807242aa8a0e3aa1133deb7986a5fc5bf55eb7b22952ad7a8c21e973752b0ea9952c09d120bd3f28ba7a7046e671c710be93ca3023ec27cdb01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d152f151edfdc134901126cb6b6c8dd9
SHA11f1ace338f4fd9d141fb50dbba037ebc574e74b3
SHA256afcab92ef977e636848519d36408db886b8600fb058320e2f4b83737a984167e
SHA512926edf8aa6a87f981ed32c708d5182509b63c14ec5dbdd38a739cab868a7d7736788170b2e4b53baf314d15fb7f0103033e89ea0c3a205f2ec435c87fde40620
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5740b649294837dd49e33fcf5cf4ed079
SHA1caa6db453d6cb1afd34813c79856faeafd5dd8e2
SHA25617329fa8a91ccb77ac737145a05f2ef221a0835b45ec8ecd6f6f1b4094ccb5cf
SHA51278ee5aede41773117663039def188b7716edf3ce881c1a8a7403853eed22723e218074d7c817750b7f76538ff32be722304c3f7087dc85f65e3c60de0e52ebfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57195c8588f70689f3bb8e0f3cd523d33
SHA13d729efbb17cef699ccebcad3782023b0e1a4b7b
SHA2569607422796e1b7a9f1dc76bbe58e2d952c533df6f49231bb6db0514e5f661848
SHA512592ade038ca4fa62e81010d9c5caed52350471f799943b757e15685e1846316e33a21e73fda35d49d80666bf1855e41dd5b757998575d8f11bf84e6800502f8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fa0698888d945f41a409531e997172d
SHA1a305e7b21a0cb197d317d85b474fac5fa8ef15f2
SHA25604abca9093b3f7d1b392de490a9309e312b579d6d9a0db87502f911eec85caa5
SHA5126b626a7a359adf9db861a08fa104ba063b9bce1ad946a0f474c6533739452d6aeeb3cded3f7b8fef473e27315cfe276c44a8fffe4335e2d4f84e6e0556324105
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c89ca7976cc62716f5f13e1fcb844099
SHA11f821d77d01508102781a15545b4218a84a19a7e
SHA2561730f83158024eb5ee2c4242eb6515be74bfb65c7fb5a1386b281d7602931ebe
SHA5123c5e4a109810072bb950139d15284ee5fb1e21d0f27763c14785cb0f5d37e7fea8342eda0448014445f643d901c65e1429bd057f40dce50a991afb4558cca397
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586fe97246a6f2118928b4fe81348aba6
SHA15bd1bc92e740f9b73ce20da488cb39bbc6f72a09
SHA25632a67a7595d62493cc046b2855b28a9491d3b11a4e3f9888d8df58aa429d94ef
SHA512b6fa5dceba5e0b76d2717c6f8e27c4b44a859e3d67fe8c6f56b65e286efabae8ba3b16e00797453c68536b0a1165b9d751101529603156be2046308cf7b36845
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6925bc8914db2bd8352e6fec0cccfa8
SHA144d3a57c0b5d95dd76c19baa11f3cb7b106ddb94
SHA256a7c168e1abf55f5a8f13adb8f49730fca6a94c6728918f474625fc8b3adbfb95
SHA51263f1361cf1863fc4cd0c1142bdf4257da7de3c3789e90aeb1b738376115a7be6eafdadae65d3efb06ef6866544710a5a04663764f92709a269df9c2bbb453bf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599c37ff3246b626ff82b541eaceeaeda
SHA17d56faf10f2c6561bdd4b5e718c1aa62280d65c0
SHA2568ba8e8505dd99cf7498d3203ae3e280f1b2d43d3750cb383b2cfcff10c04354d
SHA5129a3706789acd3ae23b5e1d6df4f00fda1c6bd8a1d8b0834be20cbd279d36b61dc81d452e0949b830c56a3c4cb1d33cc1356e01f5c1ad179e99f886bd5b8b5a5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d865a2981aca710fd2969ef0d865f5f
SHA177e5edf83d03fa88ad0261adb9b8925deca81cb3
SHA256a19713a5d73f0fccba04bf41981131fe08c64ada571d40ebb3720931dd4f6d0b
SHA5127ec35932e9711ece065e057f255e4d75777b5805715120fe7eeb7efe0ca371e490fc87610233409751a7a03df3d8627947915c0967f5eeeb5c4c616e0b71ac22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9c45f2cbba67968f5275d6c0047f5b2
SHA13457b1343ceccd31910f1366a9e179ebc77486b5
SHA256ff4e832fea5df284c00880bad7d6326be0dd9fcc71dab49a03ab3adf1f6a8033
SHA512db9daaba63227324ea20a2af5adf2c5cdfbfabaf7fe98266841ea05d76a69b08ff3f220f232b49ee6ac9778995c5d6bb193f6a3d4c48773222932219cea6ad79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f36456d07e1fe64769a334107da8cb76
SHA1a401c1415e8fabe55eb3c9ec3358e1f7899bc121
SHA256feb15d3b7efeee0a72b24576c1e355dd1bbd488b9703e24a63ece17dd1831126
SHA512d088085746735c59600653a9f7917c7783a97e8bb9f643822bf3067bf06e0a6adfdb7e180d1665188d0185cfd86b392b180f45bacc1c63066f8567f9154882be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e24d3808dd3c9b40c7008348678908c9
SHA121102bc623ae979e912657bb4a7df1c1cb508fc9
SHA25633ace44ec69359b6b1a3447b504df77c6cd17dd9ee21a3b351fdfce074028818
SHA512965e987ed8060aedb029eb95ee03cbbfd1a98165e9999b90f7ab9cce5c36318830bd7d1b0eb59acbb00ee50897be4ee5e699e460ea0a82495afa7ece5e61f13d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513072c41560c7378d2668ca0294e83e7
SHA19dc7ce83aa9ab5d1a0e978560ce12fc95a4e4004
SHA256ce8ab933ea531cd8e0be1e64261e441e367a3753fdfbc284200a30fc77595eff
SHA5120180103600e8bca7f429dad4e0f11a92808d0c609c49ede7bfc647f5aa9250e1b062ee16d4db46f3030519f9f7a4dc55280b8ee0e700166d43b99c86600c5338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df07ed1b261fcb267f10759474c18ca3
SHA17074b169abf21917c6c59f3938a6cc03fa2c5e70
SHA25691ba54c79a6ec652850a65ab58260f6a9505232c4798e08f60ea7d22231e4a6c
SHA512b42451ed447c0bba6730cbd0e3e79dae7560146a56d12e93a312649fb6faf37615a8124f2843b8a19e0444f22723bc07b90a55ec4984d01b8cb92aca21e8b519
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5aba4c02afb6799c7a2853068db89d5
SHA11ee3e1382ca87a14a45b2e1569444166a315a9d4
SHA256e871ee539fde2cb09b2cb9d7f4946edd74ca9576877eb7c235006a51bc2c5f70
SHA512acbb43b1d1b8df993ac836701ab5ba48790e34059660704365a10b611b8c26377de53121d0aff38678751013e40eccabbc5163e9336c2601df7ef258dcfe14b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e90f7980df08e7d169d8ee2e707d6ce
SHA17ca44121a67ee7aba1f1f14d376cc2c27727f10e
SHA25616d5b7ddb4eb590ffa063566605515c0afd921e75c995bb13fb398a3f4c12b33
SHA5122f8b88c421de09d93d6cdc35a4137f240fb735e0ae18e690eb65a8cfddd1265c0d4d8c83747d08d4ac46a426e7114feb21b2bad1236827fb9e9943460c7feb79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2865a75921f7f4e5fe3c0d7ba7e1844
SHA1077abafe9a8e25d8617cd86d2aa98456e0ecac22
SHA256d2c764f8bbbc311be9b6ef93e66cbbc81a625ba697314422a75d15eb5bec5c5c
SHA512edd48efe2d8f9f7e9daea8a5dbf5a6ac1b862894cfe31fd80c8a73a786613dcc582cfa766d61057a4ca5b8b8fc1a9c6a1a83920e0918483ef0d8b384ecf8108c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b