Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 05:33
Static task
static1
Behavioral task
behavioral1
Sample
f54c62c171abf1c03fa2764c20f07803_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f54c62c171abf1c03fa2764c20f07803_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f54c62c171abf1c03fa2764c20f07803_JaffaCakes118.html
-
Size
116KB
-
MD5
f54c62c171abf1c03fa2764c20f07803
-
SHA1
3ca2c9adf7635a155327017874bba22d6be48062
-
SHA256
5fe853b8d05db61d738d22af60fdcb1fe1689618b8e20b74078edfa7b9bdb2b7
-
SHA512
632424846b6bcf7aa3cd0caea46fe33eb0b54e7d6c58be531d5953333247778a6f31ec14475cc56d7a746369620541b75c35d93a7fdf24312a7b4edd83439793
-
SSDEEP
1536:TLnFYlyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dY:KyfkMY+BES09JXAnyrZalI+YW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433404254" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A4D51D71-7AFF-11EF-9917-D686196AC2C0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000003cf828a5894e838acbc57f3704789c3fcab378c2def176b01496f6d0c24d5405000000000e800000000200002000000077e72ed313e5f074aa8552d2e064ab696bc991eaa1f33ba55b25c224094f51ac20000000b4161e30ee5667bb5522287316f57af96d3a53bfb62d520d2121087c7399c68e4000000012f8662e6d995c3b7241dcbcafeaf63708cbccd59e356cdf0f069825995cf35632e90459408626b28e690de1833f38d0dbd27bba26a638068aea4c8a02518421 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0cf6c790c0fdb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2192 iexplore.exe 2192 iexplore.exe 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2940 2192 iexplore.exe 30 PID 2192 wrote to memory of 2940 2192 iexplore.exe 30 PID 2192 wrote to memory of 2940 2192 iexplore.exe 30 PID 2192 wrote to memory of 2940 2192 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f54c62c171abf1c03fa2764c20f07803_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528ccb4c4cd9b3f8bcf4041fd79b833cd
SHA1813f59e995dd258d1be5005f2790e26bf8d64c1a
SHA256deb42d077ede0183c77c217464c0afb13e3243f686cf859abb5e5eb23e76abd4
SHA5123404fe4dc2d3a1726e518f468bb5584cf1c4fd36df31c8b0d41817c433e148ff18f8619b52608f95ce4f8981fe290c51b002afc7936d5661c05e52130d028b2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c078f33d8c1be5f58d161738f105d0f8
SHA1ce5881355d2c3cdb438e05f3ea710ba95ae91807
SHA256f8ddd2f8825e0db0016829c2ebdd6de98a5fe3b6288ea35038f8f08a3a87611c
SHA51262bfe652883fc90996e3922fcef7f43b609920aa5984b62bbd7919dc0895238af913264916a79916b41d83e8ca222c36923b8e9eb12ff2af20ab94f6c790570b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5862a08078e5bd213ba3c755ade0bd512
SHA1986c412021395956c38257ed872a730111e5a539
SHA2560e28615a64dbb4d8d13290848049c7dacdb1fcdba9deab85b6cde90aaa573dcd
SHA5122c8a201559a33706c520ea0499e7e8b4119fd6b7bf548e8456d332ed14d0a70983b79086ce25c076c5ef7f59f6ce2b60232cfb693a41b45016b1f9f4d3d7bd75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e4d1493c12a9ac47ae2a37f51a856ae
SHA1f34cf5ffb089e8ea3177e2550e12ebc8900da931
SHA25673e745bc17288676e4c22fd2c93db33e1d0a2715ef28ff5f3ad66b18fe050177
SHA51258331dcc2a8192f1c02582331984760e0de0117b5adecf8feff5b3a71ccb3634b87f3e8d603d0ece928c08613423a9f8a764a5faae0792fa71b59368888fb236
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bf4bf79c4efc806e68752741c24e3ad
SHA125baa45cd88548edc47bdf09aaad3697d7655002
SHA2566ef77ca00b0dd723fb13aa61ac0bc87050cff8aa1d3c4598e0a864f18cb858b3
SHA51221723c1021e34a6603caf7b7b5ca43985f00410e2145b35e5dc0e1e40a7986fe8234d9ba0f8aadfc9c0448118a38e04a53bc6dbcda5a9ccdab6256db7900ece8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586aafc8bad5efc89daf35b5cba0a88bc
SHA1a61b0653296fa02e2bc1d102e7314922f0aa7b59
SHA25662240b707ac24d76840a423b42bcbb8839b8f01a1b68622ea7c10f9e1d2e78cd
SHA512a00be893a8cab15a79d1bb8d59909d8d92c1669150ae9e73d6f3fcb28643eafe021eaf995be6e96942d5a5c1e63611fbe8b8d8dbe54b521b159b41faef6a38c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd3b393be4ae65d5aeea4bbb30a21c0d
SHA1328044b62b7ebb8d32de47565a4449835f60c5fc
SHA25678492dc8d5df6dc60341ac129f259ed7c3ff147a11817f3393f977fcbcbbc49d
SHA512a44686e3f867568e5a3f38f6a39957c1c766d76e50134b2737a876d90427b6db637f6e31361cd58db467844d443ee2779ca1658f784e5bc8ddb4648841ef714d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9a1d54dc2b8a19c7e1366ab9dd481a4
SHA13922f9fe75a3996ed2e74191c5a20262181f7398
SHA25647620ed1e93840ab71d9ee1e8e95609a71e34700305bea1afd91c96e96011c0c
SHA512d73d04827d798c08b2041fd1dbdb6157c9b63de549c56f01f1ebe9d349878c48b9d9d04c04caaa62fe9bd416659092a0ff5d45dd2e6188d4f6c6c3c5a604f6fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55aef1b9c05da68d58d3ff7950adb1285
SHA18fd3edf2c222b61b24cec0dac887a603e2b0b79a
SHA256bad73c99619353243835f539550bd45b20489a4230b7cd27007ba94f19390587
SHA5123934bc8decf93d82a9eaa0df5ad12c22984409db2e626f53e12326123effa0e9c1f7b04d3bc8b1f2665c6938c388395347e34680d102cf8cba1a45bc701ec3f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59885b91466b30a4f1ac42ebbc7510c0b
SHA115019b4d8894316a1037e1a78fabbd73dcc4ceca
SHA25671fb493b8d3453bddfd6d0453ebb48e9c0ccef3eb48ef46c561f44f3c4cd32c2
SHA512b6ed5e2b460051fd0a586a494a5a8a3b6748299c6e2da26e53696e92be4366f52353a73902dafeb55ced7fa7db5c43f6f0e6fcbcf56005d8ab1f3b13684e929c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf2c3a520369136d8ad1d3ce8b840b7a
SHA1a0a448d925975c3f6aa1b3b869efada0e417bf95
SHA256f72fb673aa53a132c4ffe9aa6d8b379152715c4966f473f52300001b02df3e92
SHA51218b256d0ebf6b22a1c01fec6c8278bfa39ad25b0809b7d2d22f28e8fad0e844d168ef11a3b304e943fcbb9283a22e2a9756ce7ac6a4616aa58403a6cd965a15f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a31c15b75cfbf0e789d5b9efc96ef0ad
SHA19b033e7cc793ddf050fb1967d868a56a689dfda9
SHA2566842c3fc623300fefbb5865b8a1ce4d89799641ab3c90af11873159f88e1ff69
SHA512795b5595a9d4dfb737130f2d1c0ceb125ac195ddff77cc643b1d4363d569f7a8aeca26c27087f198ffcdd637b048a841f051bf68dfc8b32f27762e6418fb9353
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7ced830c0e8289ef39be10e9fc3016d
SHA16abc5a310a202f46b2ea5b2a6815255c4b79a2ef
SHA256373fcfafa5e505950fc9e75d260859edb45dca701a66db870607db2258317946
SHA5120da23f49a387056a00a3cf3a12592e8c280e6b360623a05cf0bc80b17ccdbe4e160ec5b89a291569d4a476537e4f884313bbf14a8bb3edd63e2ed9ad9bed9f5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d79df0dc642327baa385a6e28d270d99
SHA197602044d85f9474fd87b570b5936e4d2849a5ad
SHA2568385033eb60d813cd50906c465a5e7abf05a6dbb353d6a917a953a4a24f8056a
SHA51223cc4b9c900f01a8c41354e6bb850148d459e548bd976db722ee64b2f60046e9554918cbbb45f9501b195276ec62cb146bfa2de6b5dc720f5ba0d735bb85b24d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e321c4a2aef074211aa6b988d72991e0
SHA150c761e649d3feb8dd80add7e8d70dd5b5644bc7
SHA256ce7476027462ec48003c86543664cc6af1d626ce0c9f207e418b55bef5fd9f86
SHA512b0aee5278de7e544aecbb2afada450fcb4f54ef506f6bf76acc9c0dea727e0cf7b6417047a016caa82fc002eb3ea87f12473a36d7988165e04a3a00a606e5647
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9100c387a74ff33f0ec278e8efee5b9
SHA1ce895857fa34cc49036d8d05282694d88127b4b2
SHA2566a6e02b09dff61886fe2cd7db1144ce17e255c0a40cf66248e68ce6301ab4dfa
SHA512310ae0561778ee9c0455609d3ee0deb9d2dadb7ae7645ca59f1cdaa89e3994403b10f8aac2b57d17106520d77999f9bd718aaafbee85e4565767c4350ebadf97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584a76b3e2e8d5ea02bb461d4b608bf0b
SHA183b864b1612e08fa19fbdf00b2530b7cb360e695
SHA256622e1cac7bef8a9bbc12af3734b1a65b20160de655130448f8492ab197a65051
SHA51272b6b4cffa09dbe04a4d384473067ebc874f9084c7d0a687d6897bd7095c022caad74b1a29a69d076f9a92e79cb865475bfe3cb927971505c23730e3e8735799
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535e01dd8b2b426ced2b4e543ee32e219
SHA1d92462163bae85289ff0d13e04f708622c4d7915
SHA256bf00f95a8a7ae85d00fbbdb895ccf9850f7bdfe6360725d8e44fe016e20281af
SHA512af7539b0f5f059984b36019e6169ba9897110fef3a541f1beb1b7e59bdd0b2976353541ebc31903eabe1e7bf536590ba84d7805f9f7172c05dd007df95b331c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59501090d6909e6d1a3ef961797fe9068
SHA1953f4d803243ce8995dbda924a859626f4973cf3
SHA256450b4df919c0bd42c2d1af4040c311e367edf257c1a2141a508fd3142885dc86
SHA51206d5d1b8091b22b4f19d256301690cc814e6bddf86803fe0d5ad0cbe1ad4750f208b0a83eaf41275ec3080af169e44dc0c4ea1e589f8fc3fb6c058991d7c711a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b