Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 13:30
Static task
static1
Behavioral task
behavioral1
Sample
efe6084ca54ee229b86b397f4cfd7c23_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
efe6084ca54ee229b86b397f4cfd7c23_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
efe6084ca54ee229b86b397f4cfd7c23_JaffaCakes118.html
-
Size
204B
-
MD5
efe6084ca54ee229b86b397f4cfd7c23
-
SHA1
7c8832bf572b6e6a868bfc63cfda7dfd667fbf64
-
SHA256
cbbee4b964c55eba6935fd8519647b816b9d7be7f17075b3447d7a3d586a932a
-
SHA512
1b365ed9518e07942347427b5d5bdaf769f93989c9456febb2b3d7981fe0c7fccbce56dbbaf65cb6d57d20e743b0639ea7e03ebf85ba1a0876be55ff7fbe9dc9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000c62eb266e5cd2e3ae6cf7c8c53186710ec662fbde920936f8a504e1ab34817ab000000000e8000000002000020000000b7dd81385ce3f841c3e94bc72f85de93bfc4af7440880a1cf139687eeb542adf2000000060e8dafc2b140b3cd95fa5f3d7b146df6cb94b08375763eda8f675b3a191625e40000000bfe29b0cbe151c1d45c3b03c5dfa72d41adb63bf397bc1b86a254358573a815e8055913d2827d3470969949223e5dafdbb42d289f29c870db9dbbdea3cd9e573 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BAA85F21-781D-11EF-931E-C28ADB222BBA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0ed278f2a0cdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433087322" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1152 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1152 iexplore.exe 1152 iexplore.exe 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1152 wrote to memory of 2868 1152 iexplore.exe 31 PID 1152 wrote to memory of 2868 1152 iexplore.exe 31 PID 1152 wrote to memory of 2868 1152 iexplore.exe 31 PID 1152 wrote to memory of 2868 1152 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\efe6084ca54ee229b86b397f4cfd7c23_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1152 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e052a6b273bedad2f75faa0fd441336e
SHA1ac0b1d6cd988513bde369f987a9523fc2c315db6
SHA256fc4f5433374a4df5aa354d45bf775ec5927d37e4dd9c82482bda0319aceb978a
SHA512f4715219eccd015d71f6fe444eb079b888b1601718322745611480a20b82b519a705e5bb2737eece992cd82afc3b472b5704d40f3c3f61e4a7792dac04611c71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bcd5952c55f52520919eedba784d320
SHA1ca34562f506a017267ccff58ab3c0e7861f760d1
SHA256a5590d86099af25d754c59211be1920abefa6a5b19bf2769a22c490489601896
SHA512ae9943533323a00dea53965eb30a3fe8ab3dca7f7bf266c85a9fd69dfd1bdc32b434b2c69279c966e2a722e0f024bfc67710690392440c4769e966ae9946f948
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57427a98d524f375a6859b78e9f9010f9
SHA16c8889031f53970fc388e743523c31f97245d4fa
SHA256c77f643e901b865cc44dd8ac77ad56f202f9589e626a543681a455c148873474
SHA512007e8c60a76e174dd100db2d681f8ae510bcf01af9175c4ceeb608b9daf487c697a0d57b7dd2575d2446a92d617c87c4cdc874b7607e9db5c4006fa88abc90d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582d15096f229730c52bc5a04c9cd908d
SHA1453d8bf367303264993637f5932fc8059414ddb1
SHA25627e72e883c473bfeba7df7d37618489429eed14bb54dea500c5b7a9a22414c34
SHA5129f79fa431c7c6faa6655f8f460ecadf5ff229217c8f435c988b67fb6de9d95c73f485809dca2543813109b58bd3c0ba13d35488602e86702f19ea9f08161bfc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db00156f4e6a7eebd02328b46d8af2c6
SHA1cfd5e8503c68bd13d9ad9c95e6b3b69b65220c62
SHA25650c34281dbe8a2684ea8b67d020cf05f1e0c81165f25b6bb3784231bfd2b031e
SHA5125386b772367504c403252edfa1b1a77bd7671e6430fa728eeb3328682c3d1c94c9d858c2e4cb49f7d31c27107d3d9810265ea66549048f07052ab51631849cf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5476764bf1f3971d52d650e5fcbbb0352
SHA1de8033a1ddbd51a7f15f893654dc810b972fba59
SHA256fcc08531c7d64bbbec3666200f4580a81a18c462e62465d0c93b2c43c026107d
SHA512c9aae7789fdfb88280c514175e9ceb8b7ca6f7dc872377638edbf8fc0eaa54f9d035ed2306377f50722c9e49adfe404cd88772f7c7e3c2899c3e66ac8b4899ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5061249141d7b894f65c8bc60b293c1fa
SHA13392dd6262d98ca56d0f0bac6fbf665da32b7fda
SHA256e17d5f103ddbe8e2008767ca04def462eb40747fbff26208d945dc7a214aae27
SHA5124435c39bc728cc560fbdfef7dbef44a5f4bba4083d7baefe8a98e2efd1014f6927bb6f03b7ac6f5fe53c0b02d501e8925e3d9694a340a2361403155ed12d6ab7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570f405fd7059ea29839d0362b6b6a574
SHA1685209002b6cd03ac8a849f658cb337786779fca
SHA256b4e7a08e67d43f0245035900ba47394d838c6c4e2768801b6c9adda978056e38
SHA5124f44311d0f2aedc5c7f2f77284fa0cd3dcc6a45a926bd4ac7af755ea07d86d353c4655d05ec0d3024397ae63cff35e5c4d2fd4a4b56ecc257e03cb98094d7dde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cc1e7db6cf3a86b7cc004da1c29299b
SHA11aa70ab6f9a8a95448d21208bad2310916817d6d
SHA256c78afb0257262367d099e682cd116637b129befce7b8e7fe2d39c772cd761a5e
SHA5120c36bf4c7c684b12afc9a21ade90cf9c70b7df8054a3d895d2ae12b0e9bde5aba3b043fb0e944c8cb7f21818daf7b80cedd7a6945c71c4a241ede85d8ee61eca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cf55fa4331fdf9a827341486a09f922
SHA1315e14157197d84fcfba0ee649cae06108fa4999
SHA256e987eeec0992f113c2e9e97bfb0055e379b0f2b0e82e3bd56e1a6729486efe1a
SHA512add268b4a83591d02b0dd6e9baf3f72b7da45fe40c25b7dd827725bac3b1a01eb9caeb55cefc77e85fd71af91c0daa7a7bac2f94595101aa697c760a436f5203
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538e13a4525638ce337641892f5fb7f92
SHA1654eb9a2b4bc9013888afe1bb67717bcade99985
SHA256cd39a6f993337aee9e19a0cbadc646098c5871fc5bbcf40d7340a226c8e60d6a
SHA5126cbc41862213e73a762538223b79e2f1a2ea2ed0cc980cea3cbceb83c3f9c9601bdcfbe6ed08d641cdcf12d3e0dc102bf1906a87c7e7f10f9f688ada44fedd2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529601d8e6769ef633a3507b56349ddfd
SHA174126c84ae95a23a778413ce9be3f928804aa6ff
SHA256211f06fda801ad21beac5622a4b4a82170b4f4afdea7fe3b709071ecc65a0cea
SHA512ed9a1b79bb96313befc524ae1db993aa27c9ee7269cc8a40ea0e61786399de81d59e06f80015eee64a367a9888da337618be631bc931818a3a5e4aad9de173a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c91478da1abb5f19e4afec824ab75fa
SHA19ec686cfd85aa33968fbc3a756d39029aff904a3
SHA2564056969927d5ff7f8fa8cd9d8a826d85bc84515e50737fa95db1d78aec63b3a4
SHA51267795d786b7c2bae77550f7c0908d334a33ce2991546dad1ff09e71bb5d667c553e6061e6d5dea042b970c03dc819a72f92dd44cd89355b1efd53b52fc0312a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54724cfa1e675df85c0bfbe8919a65ee9
SHA1e66520db104fe3af6a4e584975e3a8357b6fed93
SHA25611023e86d7943c14d9de4ca4e0323f045b3027e4390e9889df543f6b2a67a8a1
SHA512df546620b4ed1243d67c45d40da043160821c8b6f29e53e8651f2c4c2560d06d60469f2ba3fafbf71d74728cb79a18f7114ae50e13d6c20fa92a5bd561ff6826
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a962d7cc2f5d3c96b39eb82eb54565be
SHA1eaa4abcc731712c02c4a17219c0436e55c1cb92d
SHA256208a92e0bc3da8bcaf20145806733f5e4759aec812e305f4a1808e73afda643a
SHA5129a5f2c041ffbb93a3b9d32fea7c79d0953f8c154ce155a2a68db7dbd3af0f7e3bb655a17fae43b7043b85fb9c3978bf1fc6a2d62c8b8fa364501740800b3bec1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520fd48cf0bcc1cf22fd1088f3e981d86
SHA107d2cc9834c9b30c27a8527ecf9edd4822d20387
SHA256088f4908695f90acf69133174ca38bd5f9609f07c546bcb3717e208d76b386db
SHA512ad1dbf07dccd6f7b4497aeec9d48fdbb74cc9e3e8d74fe293a441bd29ade78f902148920684d91a9b26cd09f5b4f5eda0d9e6be0d3a543c5baf5459389b9c559
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b177116d6d5e688ebb6fc2795d14162
SHA1254e5cdc7473d69ac6b53380b4be8d49fc4576fd
SHA2566442c5657119ea21a5527a94f087ba40697acede0d9444dc0345821ba9ec77e5
SHA512ca6efec6d74424687dd6cea86aebc3fea25209b6a262932a8693f814198c259af8e85dc995d1b5c5ad8c6d63ee0bcf2bd1aff2908b1293a147a7db3f71ee9cdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c6aa9d10e2773e72b16c12cb3fa6daf
SHA16a9d6346659007119444d6684c976c5ad4167b63
SHA2562056f3c6dcde2a760f06f819b9f563a1b8ee0abfe3e50802a54149c0f98fa57f
SHA512d221c337f5693e0e8b2f4203db07e16843be270acbc434381fec42faeb17e44175d53842827702e7403487b1628d3d730c4628fd1e2309289066e359bf215ca4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5919366effceb4b077c394d629304d756
SHA13ea2a62e5bbaaca3d80fcf8a8014c80ba78a71eb
SHA25602ad835c0a2dd6c6f2a5117f86b98edaa45e36950cec92fc95f54c4c5e893166
SHA512e31a037bc4bc4e21400fde6de9f7d80f1cc615eb0f536e4c8c4c4fc26db16297b0cbfa433e7eecfb5e1caddfea45d2fd0724982391de049200242ca05679f677
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f31a10f78df3ad8e3bb0957193001594
SHA16bcb85b8fcd383cf022d9978dcb092d353d43b09
SHA2565c23e8cf83d7e35a83d053b857d9dfac861aa9f2a0d7f5b0741e74eed700e299
SHA51201c84e4f3f613cbaf0e99902c46b05d296bde25dd48418046fdfe8d92ebaf8799e2c75a29645326c9550a723f9beadf2cfed89c254ebff250d59ab97f055f464
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b