Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 15:02
Static task
static1
Behavioral task
behavioral1
Sample
fec6738324d673620643445df3f2170d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fec6738324d673620643445df3f2170d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fec6738324d673620643445df3f2170d_JaffaCakes118.html
-
Size
69KB
-
MD5
fec6738324d673620643445df3f2170d
-
SHA1
e7bd477b13a1c86befd376b2bafbc9332848d2f8
-
SHA256
01a685f5b85c9669c37704875fe22e1f55c7f0c96a0ac19360de85f16143137a
-
SHA512
44b9052340f9311c85a37e7f1f298caf54d6ef23e24c02d477a32c0e1b0ca97f82b8e1b101507fbbe93b3fecde8fdb05b4ffcdabb1608884b31d883af9786698
-
SSDEEP
768:JilzgcMWR3sI2PDDnd0g63jAxgCoTye1wCZkoTyMdtbBnfBgN8/lboiGhcRoQFVu:JL+CgLTvNen0tbrga90hcJNnspv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000005b11b2a4224c03e1b771cfd4863edb934d4c064bba8b801e7db987f81ecc71c0000000000e80000000020000200000003d7910b033b3ef7348cd0ab9f6b78e9541eefbfbdd2c7ba16bdd119feb8f54f32000000092d288ab220d09aab5e9319959ca24a982af4230ddd75851f0d742c8d0426a6540000000baff09d83b223ce38f23da85c1fd55d5dd57cd77555729afaff751d5f942cbdf90e5ddcc413447fcad13bf597756c2c1bfc2faf4d9dc194887341d9a8921c71f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433784047" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EA884A51-7E73-11EF-B729-F2BBDB1F0DCB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0eea4c08012db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2668 iexplore.exe 2668 iexplore.exe 1044 IEXPLORE.EXE 1044 IEXPLORE.EXE 1044 IEXPLORE.EXE 1044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 1044 2668 iexplore.exe 30 PID 2668 wrote to memory of 1044 2668 iexplore.exe 30 PID 2668 wrote to memory of 1044 2668 iexplore.exe 30 PID 2668 wrote to memory of 1044 2668 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fec6738324d673620643445df3f2170d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5762e8f3a1f28b94febce85d3dd7ebe26
SHA1008b6cf11b21ee2a1deb475bc45869016f6d5a44
SHA256024e7e2d0f3665d119fd871bd47c8a38e87164e0af92f0e85b5abe9851b564ee
SHA5129644285c8712b5974eae0445c6b3bd0d5dc6be3bb45bb2dae0815a5b27065e918fe04a74603ce222fda6f7edf6947450dfdca9b6920656105e787a5dd6542165
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f26f68d3127d6fefa4ee1356b2529e93
SHA1608bc2a5e87c60d4ec6f68a470cc4b5fe3aee78c
SHA256a8e7b90bbcba6d2bb7796e3da01e680741f1f2fe3fc87a037c69ca9dc27c46f9
SHA51240fe6bfdef5e85abad33cba2abde3330452c49e13d411e0fdef5bc4c2d8c88f11d421bf931414fe71e636a05410d8926df4a69e2fa1a71ae2f9aa26045aee062
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587a8a8af6400001dd8442b1911ae57be
SHA178e90b9db3e1db1dd5bf32d38c3c587c320b8d6d
SHA2566f4eee5f3bc8ab011eb7543c7315a0acd9aacc37dfcd661dcc38a285f7c281c1
SHA5124bd1076e37bf5864038ee4b5a67d0a49ceda46a5ea9e37c73d8851468909911339b458130ae21b580ed28d2900e91bca198a3784c1eb589128d0272fb3e095c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ed1f6b1e8f9a0482eb199660a05b766
SHA12142b1f34e16c1055afb23d0023c203f5c76e85b
SHA256be7bfb1d4b938d8c1bf2b20cfe3f22a07f2d0f6c666af7414edd40380712447b
SHA512cfc32d88213a8a453187fb2d32774e06ae69333f3116f175b90167c4ee2ea5d9bb03f6b6a6791f437dd076a744525c394b252a0946335e8ba91e1b47fe34e785
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aacd010748c8e0946f8c68f9a038f875
SHA13eece3c7594747a27675bacd3f250bed7c35da8d
SHA25678f547f75cfa76365e314d5b3c6106868196e35d3d27207270a0e16f7317bcf1
SHA512de48f3b7574fdb821ee7a262ec74570cc3dbcbed8f057e384b4cb831a7c9d06ebd8e86e70e3cdff70483ff2c5635ce3ea59526fac6777b7418c4b7b1b2cdee15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57637d2c1dab2134be3256d15f7db2318
SHA150a65862dd0884a755ebd8cd91e06ce8f65781b7
SHA2563791993ffbc31e3190a60f25931d73038b46e92f9566a37006cad829d39f2b6d
SHA51275505a0861e4ae88f9514c04fb200dc27520ab6930380b033204e554dbf63f24530b1bd35cd4f9ad0153c4832523a1a4c34a1ebf8e99f45e1403e9d0acb438ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fb955205bc97d1a820cf76cd932a17a
SHA132369b20c7915b33181f8dd63a07758f53ae7848
SHA256541c0b4c0ff3f211c0543876514487ea30649c7aeae98c5541deda81ba75bfa3
SHA5129f8ef51aa8f4a5488732e86567c7ae8b308e205a431ef8177a032386dfaaa78e288b9d94198550a329be21ddcfbcf4ec6f26841472edbd53c6e4f7ba43d93d85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e5229f46755e5a2d3eab839c3551e05
SHA16cf819f549fe4f4dd8255a7d9108a380a3010563
SHA256727a6cae0c60e5a6b0b3eab31cb7d99ed4b00480fe3cd253459f00a52ee2bd3c
SHA512a5935a52e17063e50afcab1001b3add47deb7b027bb1dc2ac2fcd21e214b120134452a1ab7b69da7bf085392546db9b3d14c7c46bc1f6dc8a20d980a895a315d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c8fc51346ae8dc54ba41666eebc4ab7
SHA1b01a7682c802849969bd2dd660655d36ba8db135
SHA256f85d298c0e97cb304eedb0316af48951c737717649a5e8ce6e395ffd71bb4eb1
SHA512af0a4624cb59ba7ac9e07513d9052e6e50ea947f0041f00555ac7c89a34460d099c65fa5f05387b9baba1df9dbf0253b50a78cbe7e98967f0e6d3789a0572496
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5272c2679e713270f9e38ea8a3f7d374c
SHA1750a89cddbbb3cc2e15ba48ceae2b8b5c6f5d7a4
SHA256f600fb6dc4a974534a5215eb5b27852cfd9f5c52f6b8e72d04e35a84f0fd6469
SHA5123fe72305d17a392901c2816559f83f4c6afc5717bc513827d36cf053bb975fb33d249084cc832a55a00b712885f87654fc591a7602d978541a5e8faae36bae00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5636c3a7c2fd39031f70576cca81f6b9f
SHA17298f36c8358c0ae20616035fefffe9dacd1caed
SHA2563461a8bfeab2e6aaa33c59cf2294e16b9e339c253f9d78b90bc6337b9c93f9ad
SHA5126893b110cd6fff90ac483bdc743392a79980d3ff87fb9456e85e82ea1a6ed586f19bb4b7351d5c6f5ea24b5271e0e4f4c2203bcea4976030be97f262c0bf75d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9e2ffaa66b1abdc7ffd7e6a7de753ed
SHA1ea6fa25657be0d688dfb7e18b101e6ed81f0c616
SHA2563d6c2496beb6b5a26544b06a97cb1f6078f6afcb9b1ec83e9dd60dae1bbf8dcf
SHA512844d46e14662fdc3d66c942a487bb5afa165a77b48eaa0747ab976f5c1a03bb8ce733c5f6167b09eacf958c4ce79360ce68ee2708af6fe886c02f2263ebd676d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5648d346afbaf24d4b0c3b13adb6bde33
SHA11dbbd353ff75519c25f40b3f2dce0c1349f61bf4
SHA256a0b47273da41fcf8a1f5d730959a86f7c5339dbdb4abfdbfc6d1fc155e9da79a
SHA512bd7d5979be240078c1fff3cb33f0082f9d3126b46363b5aac0a68d849103dfad05ae41942ed95b0142b279a8530e7ccc477e10e831af4b17f25d768f373206de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c13e1c446e8a442845111debd391f906
SHA1025e6c9b810d3f8f092fb492208b5b99772a2cda
SHA25687fe6e118bc9aa66a336c150ca83bd8353e194dd18d081b694922d43f0f85f73
SHA5125431a062c91f0ee12700742aeb1b81b5ef8fcd4ea2f71fe8fd87c7e06ff5f7a6d3b6393727695921ef6f2f7f13dfdbb8a73ff1f787d51113050e9bb52d8367bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9e46edde073d5cef0de76d5cc399e57
SHA123e9ca198a65e6998122e083b487c5585fc75faf
SHA256d668cf93b8bf7fdb350b579c027fe0ac4b2033acd8e9a0084081609073c459ac
SHA5124b532a713491b51a35c20ab5ffd7f0b0054e79eab276033a5fb6f84c9eaf542d56516c6c007e0d65cbe4c1373c7e3f6bd1957f03f3d2538f3d1defa6a54c79db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3602e6b562144241df8ca5365db901c
SHA1aa4697fe201feb88b74d52318238f82306756df8
SHA256725e4551fce16f4a0e900e371a6c3d6aeb47fe86b70be007cd60b065c432391f
SHA5128942fcefbb0a591485cd0c2a0201482c995a8ed28305bfa350036795ad922f5008ec33e97d7c5d540694b969d3e36ecda83eb994c3c1fcfecc6714b527dc97ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5909f3896d328eed3fc90bc4275def508
SHA1c9c4de0df95cebfe8b17ad430496ac21efbe5dba
SHA256a7cfe9d791c1059b75334b9ea696161452804f2f2a382262007b662d7abef291
SHA5126cc4fcd90e70a9b52e86877d21b5cabbbafa05471f16784bae084ab7c934976bbfb65fefc49f179c99f456b470aaffb195dc9823eadb4c4000de72dfb2cef802
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5dc7cf12b0976fdf58efa751382a401
SHA1fe88ba4b1839e9f0e64a6ed0a7f85254600954c3
SHA256d459ec829e9bf4d2a693b8cdfb67917bb5e0feaa2d3f7c6b8dc163ab97cb29d5
SHA512ac4e7779f3c443a743e52b3fabc9798b28cbb07188305312e4479bd8f979d2e4f5d5959da2ed4a9dfb8a9c3a2e7d3e437806ff71f9b6a8e148aade616debe001
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b