Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 15:15
Static task
static1
Behavioral task
behavioral1
Sample
f012470bfa193b78d7ddb878d117ba4f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f012470bfa193b78d7ddb878d117ba4f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f012470bfa193b78d7ddb878d117ba4f_JaffaCakes118.html
-
Size
16KB
-
MD5
f012470bfa193b78d7ddb878d117ba4f
-
SHA1
c78c6047d0284a14e48c293227852739ed434c43
-
SHA256
3497bed275eb7a9e5b105508116cd1c90d6efcdeb9ef1114d060602a19c0a941
-
SHA512
da21e45a1d13e7ceb4d6e6712483680d56067beadfa3fca5dd6dc0283adff4c4e7e2656203ec1d09ac05fcd5b1ac7d1294f4552e90a9434923431c3ce798370b
-
SSDEEP
192:H9MVxqJTRHmFB3ufSOl6kPOu1t8PvzEZr0STCNtUbXVc7MUK/mt8hGYnXdSu3nyk:dKAl62evISmCmVwMUMmthYMEysiUf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{49C10F51-782C-11EF-B12A-E61828AB23DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433093576" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f5420000000002000000000010660000000100002000000069b57ff294852cb0fc9671cb3f112c2e8934fb51e7c618f1d0b2b0e91b16eb05000000000e800000000200002000000032789bdb5c376ec8a7c25322cf839a90e11414f040f7dff8993b20cfc8c90f6420000000c0a8bb1f07e6516ef7a7504ee312a96d7ed9b5a28015b52c85b258ba0f584231400000009cc1d37dc975a316a107e046125f9cf576d34ee8d7062c2ebb56da6aca24b16312dbba21c3fc8c129e76219a6b453cb47e238e7d5da19ae0642168476cb9934d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50d9e91f390cdb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1884 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1884 iexplore.exe 1884 iexplore.exe 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1884 wrote to memory of 1808 1884 iexplore.exe 30 PID 1884 wrote to memory of 1808 1884 iexplore.exe 30 PID 1884 wrote to memory of 1808 1884 iexplore.exe 30 PID 1884 wrote to memory of 1808 1884 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f012470bfa193b78d7ddb878d117ba4f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1884 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0e4fb942e6232df7b613bb14637374b
SHA1e7a745edbc9e3e7e667dc03b520e66034450c8a2
SHA256aa0f9cdfe30a8067da8e114e3a32f927b2ade7ba0a654ed06cfb39d8058d7b6c
SHA512ad3ce4c0e17bfeb7d2fa9fae927cf796a0ab540410768cb348bf85b456d880e0571dbabb1e97c945c257ef5a3709fb94e64e8ccf21f9894119dbfd59373d20d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d537a41d7e90c4213cfd47ffad4c6515
SHA1e1bb9749fa22927d284de21d647407a84ec7e272
SHA25669a8a56836257d28bf009a88d00f1e9c798dc2797b6b0b2ff5df28a7bfa0c1ab
SHA5124733e05b3b1ab5ccccdb8532bdc11cf93325cb4176ebc0f638469a9daa494628449095f2b4c22011379380e28ade43ed1d4b4f512c6d01aace4128ee47f60199
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50608b8b307f551b125cc03a69ac142e6
SHA1da23ededf6b7cd21a0d4eab0370e637a7692b25c
SHA25685fcc0ef0b6d5ea4a18aa3bedad012c41dee6182fec54931f1a075c440c59bb4
SHA512df0c11464268e6e0d52e7e4d9d4e05edfa671e4e020ac69e01f9471d529e63a00d8c5525d88da9e59010423c3dac77f2918e396efe3f6da6f377ebfd11f6067a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548467cdee88a2130cdd62c4a9c845eaf
SHA13b23f10695d4c6112a2d7ca22a7507b06bd8754f
SHA256550fa36b7327b32f22c32f9e12056c771658fb98dd09d265f18b997e119de770
SHA512724ff5f922c9dc47eee473c550c45b013af59b80599e77760f6f432db537353d2a6e91bb71678661556ba7af13cba745eb1b47e382811d5abf72a93199ca71c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baa949e49d5286cbcd21d7ab19f69547
SHA1c6240f7aa3faaadde228dd2d047627e4ad41762d
SHA25663ac8abca51eab51684b49dbc3e28658fe43bd168785fd32701071123d755b4a
SHA5129d65b9fe389754e50dfbc4b22102ca3f0da20a04cdafffaddf6d83f43c33b8162b67b4a441f4129880dd510da94faea8ed3533abdd77a228279b2b4f065fd591
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555fb00192df831ea4b456fb4610932ec
SHA14f1252ccf84948541f0a678a9aa30cfee2ccc7be
SHA25623bf57d72d61ea80c9c89fcdd08f9866e722518c5578fe01e480c9e413702a18
SHA51254db9ee78d4e4891c6753a23ab886e244fa16599bd29b7e972d45c5a3f953205147ae2022140a27f3166f2b626acd173647679b944ff106a7ec1554d54005764
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5824a50387d35fc001c2a9aa0663ce2ee
SHA17cee4e2a610817567360ad80f8b423da34b6ec23
SHA2564c3ec08a5bd638d79781f50566592a65bad4db0b36189605d3c69dd045598e60
SHA5124cb01a2227c9e2bdb54de3d542df90e580a24ed705260cce7a4ad3bc1ace7e1a710602e6350172f87c0d89c4f97bdd5b230002d398f758317124fefabfbbcfe6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7f8218b924156a091cc0082bdece37f
SHA17af3d936301c1a19b9852e698b8ccb4105a86776
SHA25647f7d533174bceba68d875c5fe63d65b2be4c53486ebfd4fa57ea08febdc5804
SHA512e1f463090f480633326423c2bdedceeae788b1147cb342647c7835daea515b5753f89bb55df0b83bc239a5f8c20f024416b308dfe47a84e94f2419c0cb520f53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5041469af09e0c63b52d74f046ee5b80d
SHA101e2cbc698a7bf4cd278fd5ff373f0d6d2d792b5
SHA2565223a363317f938e6d868d561ae7b45881b78e74c888538dbca31e67ab070a30
SHA5128211246c945e8cf28845f6480efdf2d7a8f3a83bcbc3b17a3e68680d958a079e7117ce6d64477edc3374c3045e0757cc95de9ead4e7cd48f1e0ad9518a4970a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0525bd48241a0cece1f6536232372db
SHA1ac2c0848cded6c58f5207ca8efe91e69e7fb5063
SHA2563edea838d4177bda969f3b5d45a5bdf2d93af850cc4cdf9024a5e29642a1e9c6
SHA51226cecc269b310cf1d0c35fea329b4d31d9175ea83ab694991c4a13d7834142145ca3aeb8cdba1fc89ad56629d4848157420b9f457e2960b536a7c1474af172d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52923774f726528293b033b32d2f8cdc9
SHA12d1f8fa73204cedf2436f28209a6d01f40b9b36c
SHA256aaae8db945de54182d9bddfd7d51dde180d51fdef8ea1c726468b55d8259a37b
SHA512037a71b377f7125b49f711286de3fdb14b1f4ec05fdc95e0361f1eef7b5fd59f7df3be4ee82c503db422c7e9a78fea0563834c091bad0ce54700351b51fbecc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bac39c9c0653f36b08d4c1a7a5d3a68f
SHA140c80f0a852bc3b07583ce4d2abdc6041c4011e4
SHA256e000882b98d9dd7cf2e0b3ebb43ee97d53e49a9d93caac229c9e0fbf6c3cdaa6
SHA512c772dc7fd31be0bf2ac499c24b4177edc206721912ae442fe22f3a7fc400c03e79e1b732eaf79d84766843caf10d5a520a263e8f38f576a21bd2b1e3ba7fdb6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adffe64e3f276f5b6dec1a683b014fa8
SHA13aa1515543d16e09378df727766224996681acc5
SHA256294d45bd6ed58d3203ddff7d8caab958126eeaa30b9fa977a0e62c291f619e2c
SHA5128502032b0b6c3c6591f857b22d742d2f448a17cf484ebce4e3d31a04b3937c04a36661fa8ac35519978df6412bb799ddb22ae6a87b406ea20befbf90d6edec53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dc50b8af1d60f890382e8025be165fc
SHA108d081133d9153e19acc476a43de13ee9246308a
SHA2565969aadbd9b59ef75f59da3299fd9165bdb4f9a340230b832e8d3203fbdd9307
SHA512f2e648e4b1d238f4339dc60b5af26c33276ecc3c5d31c79b0ff194691fc20177f029ce01128936818f5269230b41954078145b8ac91c7e8daaa7058f9ba68f42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c21fbc6a6cd2debe12e8ec3ed11b3d59
SHA174f47671613080fc92efa5a6240f2ae28411f732
SHA25679f6bfcda09f5e3aea2052e3a636940f2f3e7e6d7fdca44bcab5fd6bc07b025f
SHA51256cacf17eafafe88c556758eb95fc1676226803ba419388b2bdfc9870555d3b606eeca882866a4f36e25403ddd7b51f5cf5aaa9acca5538af2b78502fd126963
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ee0c4f2f619a82e27d7fad7d23bd496
SHA1848000e733ed76533df630d0fcbf098d98b3ed1b
SHA25656f953b44d29ad3acac450e20abdade1bd108ba6e39e54bd9abff53d67ef3add
SHA512d9a8a4a2ffb37d3e501b72b7e58ff935871cf00c3bbd89b637409e92e48ee85d313cacd6b9d30279a4b0e193b64fd491441562a387be3e935287364d1e9fed8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd9d1763ab7fdb06249f8e8deade7b33
SHA1c670bb8b739c27f12fdbff7ab4be2f40e796e564
SHA256cbfc38b1607ddce045c70cb373664c8df53686f72ab7d57a95438da111921183
SHA512858f2a8c3d043594c5a4527576216e1626c12a6b7c403efdc938c140fbd314b1f867ecb2f68c870b80ae61d357e84cade94d51a20372220295ac3dd1c0cc6be2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5997ed87e5e48e6cddf6a2dc6d187a8e2
SHA16fd6b7252b8c8496079d6a01053185406812e732
SHA25641b4a0ebae05bddb7b254f898157748053b5c77b50ce13f8394be58b1e059863
SHA512b003dd53a7f672ef1a1e7a9ec3486c31fdf3d75390ef3958141c3b65e0b179f0aa342163472602f3653e952924446ad8a6759b1c62b8a92c6801a14ecbd0c59a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5483752014a6870f50828df90c5cbe6b1
SHA1324accf417c9b23ff7d1c490ae75a5d3f26f7c8f
SHA256e5e6343e65e9f92db08278d2faf8fdb473e2563482c5ec960a0fd36a976c19c6
SHA512a2bd68778a22ff1d202f2189241909b84204164b784c1012552426d39cf562f54effad63420a854cabbade04f4f9c5aa67ede5b104073458567ae35ac142fcae
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b