Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 23:19
Static task
static1
Behavioral task
behavioral1
Sample
f70ded5e81d17af5d40bedff97f224ed_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f70ded5e81d17af5d40bedff97f224ed_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f70ded5e81d17af5d40bedff97f224ed_JaffaCakes118.html
-
Size
70KB
-
MD5
f70ded5e81d17af5d40bedff97f224ed
-
SHA1
8e0b8016c584a485b0bf261754258e35ea68637c
-
SHA256
f679cda785316d9e6a3a1c01340dbaa2df17b67ca81a6481ad7f3730cfa7e4f7
-
SHA512
f524a915cf953b22f26dace26f8650147aed28f7c5a272d96f57d8cc7f5b88b5203c3a2a71b6e9c39b3f200cf38119d8f4f1a85dcbcc765e671394f4530c7092
-
SSDEEP
768:JiYgcMiR3sI2PDDnX0g6sN62eblFoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:JKJTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{97257F41-7B94-11EF-9E7F-EE9D5ADBD8E3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000956190bb848d2fb9e755d3ff05d1a3ce328900d2c46556526243e9c53cf8cafb000000000e80000000020000200000001347bb093887fe213579f35dbaef03865c410d47eb624dfc99fb426ffa3f72f020000000c004123d4c8f8044a9a4601e569c25e56bddbc19e72dcc3616626fbc08c2cd3040000000c68b6ef12924d4d008807ada59be8d0bfe5878292a74757e8812cd4807c70754bb2c268593e7433272c01bb5cf3ceb3642f6e149847b3a44ba62fcef47ba478a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433468227" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d04e5e6da10fdb01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1628 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1628 iexplore.exe 1628 iexplore.exe 2364 IEXPLORE.EXE 2364 IEXPLORE.EXE 2364 IEXPLORE.EXE 2364 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2364 1628 iexplore.exe 31 PID 1628 wrote to memory of 2364 1628 iexplore.exe 31 PID 1628 wrote to memory of 2364 1628 iexplore.exe 31 PID 1628 wrote to memory of 2364 1628 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f70ded5e81d17af5d40bedff97f224ed_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1628 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c2771a3849fe64894cab875a4ece3b9
SHA1ad5b21b9883405b65839db0def52a7ff0a7fd4a5
SHA2567e88cebd0128e96427034d782caf902c0ca6b824cc9f5555718fd0fc19cf97f9
SHA512b92ad093b1900a53689798c62007d376c4698ef7d363d110ce2b41576da3a2533fd3556237ce9a836e17491d699c2cbf6e15ff9fad2a6ed6f29ddc75bf203191
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c7abb49fd91e6d33973211f81b240c2
SHA1ea39731d7e856d811b236be741fdc1403033ec08
SHA256b53b083d8c21b9ce014955bc7c4527fa1d5075805dbf07bf89e33af95a434c2c
SHA51224c112ee8b63b93e3605e713e3be5755ba84df954ca5df4b9534ebec6935bf62850d44dfdd197a617ea342b3001df4539479bb2e9542b9b10bb9f911c5841e58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538f6a84d2875ef8aee6377db022a13fd
SHA16bd98c1c06228ce6098679be2db583b5f1778b14
SHA2567d55c75b576c66a49a31f7715fc04e28e02618e94849ed392154463cd77727b5
SHA512464af443ee858a5a6fb50be0ca9a1efe1a8311543dd6b8422357ac18e026844b84dfe76c433814f59f3fcd7b979cefca42711f725bdb6e683c715d636d75a18c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fcce0d930a1e87dcc343a2f34d4574f
SHA183611272abf49faea80d43f2b73e1a625a8d6798
SHA256f9a477a3ed5903516b2f92356bebd7076054040c84beaf8957dea83cbbdb4ee6
SHA512a86d46e3fbdd0eeb1717d0e788a38db6bcf3d4e1638fec9f0f08594d434b160c94b29bb6d81ce369b91e038d766e3da9a7883b939b676649cbbaf5b5ac41ac2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcfc834c3fd07936f28febe1a0761e5d
SHA132e815a4572648500c48eadec01abc2d75becf36
SHA256208703bd45b30720c1dd74b40cace350df80e2d575e0c734182b55616c391005
SHA512b0fcfa11de76575d969d2605240e174d96574cfdf1d27dd9798052fbd8e9723205ba5a490510cb8965f271a5fdff612e290273fcc033dfe40842272f00df295f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bc98695763ae3af415445e20db17c58
SHA1c696387f0b742959ba814d0e8d29b5044dc9e0e0
SHA2561c35a712b7b1b914b19d29c7ea98ef863c5a53d614e7994d75685c4915f9ea7f
SHA512faaca53c549bdb5cb4d26d146ed49301c141ff42c0a3854978136aa0a2e22df5334d0944893ea6edfcb9af97455a85dab6335a899adba81eda23c3a91a6464b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc449c7a54954718acb02ea4db67487b
SHA1c00f0270d44666519a70010d56a6e64a251bbc25
SHA2566147e52e4c2590abc7272b405a767b43adec28cf062debf37f9674f42efc317e
SHA5124ca15345bc725ba6aed31e66250268be4e84861cb737ecd2bb2ecc848535b873b09108d1f1f25d879f925d356806f4b537c29d6e8c24c729a4cc28fb387b82ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53489179b7aea66b7a85e462f1b162bea
SHA1d26f7d9d5e5c40880de35ebc85a99e2540f2c0b6
SHA25649dd009b49b8427b02a40e160f14fee78ccca7448488413be568b0920dc23d3f
SHA512bb89225c97411b174ecbc1eaa84d154d84288fea2926b2b48b686bae970b48d8997a09da5d54e2237ffdfffa689d90b8b76fc4f65166d395c29e0a80e410eed4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4a676ba0c1dfa7d27398fd882aaa4be
SHA1984465871c8d323611b0ebf9ac69f798ba5bceee
SHA2564e221cb747c4e15d8bb8b57378d93e09c1129deb253b932646a835b50add7062
SHA512216f934879fa65dd41b78fb8d735b7651d0e89689626621d39dbe82d3e40ec29ab83da333a600bd3200c81bb13b16ca51bec09eb6dbde449f1c5ef1afc2885c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ba29acc5179853cf5e30bbf7c5c544f
SHA146304e74e765c51f98eac78089fb77bea6196db9
SHA256a97d086c2525a67903a7c147a87cbf562821d7544a9f16be03fcf866f2251ccb
SHA512fc246b90de45bf89ca1396f6337fad44a093f2fcf3d307fff799e209114aa9c6c0a8c10fd9fba15b1fe1e52820bc8414d640de019caf8f9442f1b5e28204d4db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5830bd303237c711e930bc54700108fc2
SHA18f41e8b8463ae6590021ea1033b294b59b3fde21
SHA25647d54f993c6c9ca1c5821cb262b4885c08486a81d5ee8720610ff321d29229e5
SHA51205e8aec464e2ca3e3a74c39e53a2c615d2481e89db7af64b5a26a1c7aa1317fd67ddfd77ca04fef54883ddb69f07a36a15e4d076643d5b72732f13607b2816fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c821dce52e6bac984413defd852b89e2
SHA1c51aa4db7791269c9bf21833f6597cbee5e29517
SHA256383fe0e27928f9cff0d9cbb6b7cab266122d1b1c8c0ef7e8fe94c9501ccc3e46
SHA512e43af36996147a7e5754ca11b6f90a00352398df85cb415f188d8e4f14c809806f6bf12948c0d7c52fa0a5c4dc66d11ca3e75de79e44ba45f6f5557e13188a49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54db89e1b4ad1b50ff63eb2d0966da424
SHA18be34892e8703ba68ceef8ba81ebcdd91950f3bb
SHA25624430cb242060cc8e6bdaea67181cbd04a4004ccc06b445bc7e2221bcef5196c
SHA512f8b7eb8224a4419f5f2d815b903a10e5425f6746825f1b72177712576cb226fede4f37f26a8ee4c0a78a34c0cc07d709ca2686b5bb2dff1ba8457c6d449cc7d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ffd77cd710b242b7ba4b94820c11402
SHA1a32faabdc4e65580ffff44ae31628487abc7fcbc
SHA256a02e894a340f4e1b50df0b347d6b4166c231165faa15bebe5a1f948921ddaa2a
SHA5127ca6622babd2d98776ba3ef9017e2d86f2bf3e1fcf12e8b44b7de04cbc9484876f5c458a20fa8db58db1def07189db829c51546d91b73b5ce617837ffb84cc15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fac4f88cd140463a6470accc3c1f2162
SHA15a523c4c815eb4374d5052dfd3e791751b57d777
SHA256aea558bb270e0911591cf5452d541c711faef5a71f0310d93a00c4d90f807e0e
SHA51284a933a9f1e5d6ab711cda1ae7b47fe551e67b2b1d8af5422257dae29cb80916ad1a563f6f9e44935aa22ea045314f9eb0a9b8f9c22e29ccdfa236ed57446016
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bc0648f63b0c7cfe4be44e1017dab26
SHA157f501e13b0d7e45a5e7deb63243e173ce606402
SHA256cf71ec3621a0d12dd0a33bb8a2fc7fe6a3dbf6098e447d0a2b0afeebba133204
SHA512fa4e1fb031c567105feff25bac2073f613b8020e19a886d0bd196ef6b449166564908f645bb4c2642752b85f5528c7fae2ae54ed14ceb2cc01dd94fd2719a22c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a5cc659d30688eaf80a5e0ed1c26c12
SHA11a8db3b59a00d7535e80733c3f40fcb1ba1f9835
SHA25629233d529e0176be73263c5b7f772ccf1e6cca14e480311846551a9ccca9d70f
SHA512441609b021043d9b70c0e8734e69090896bcd909b5f3b3ed72fdf309798580fbaeaf36a108e908684d96f73f869ee4fdbd278640db3916529bffcf5ca501a978
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584c2ff555122686ce569d317bc20e14e
SHA122b1f49c9c3024d71915e0290df7e16e14870a42
SHA256088e370d7bf291ce910b165efe14917b4a79310f4690a4ae4877c0ba66d039df
SHA512220239c6223dc6404ebc3443fd882ccb2e3f65e25a5dc2d16c2c9e99eab1b6b29afbcbf1a77dd8a72380ffea982c9f29caf206853c18d58532a98512d32f5582
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5ca378da486d01b882bee05b6ed1d94
SHA17f3bc4337e292dcf0b44b522c5d52a1e68d27848
SHA256e8cba9f46dfc5e3e5d9118ad4cbc33723029d19e23f2308afd190192dddf2024
SHA512dedd49d75263edd8fff1c0e43390e832c64aff59e1d9202a5459e099d382f9d6174aabeeaf2b9bce36610cd2c3c034d7a1851a1540009e9998128d345292c9e1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b