Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 03:47
Static task
static1
Behavioral task
behavioral1
Sample
ffe5bb6653987afcf45439b974bc6b13_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ffe5bb6653987afcf45439b974bc6b13_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ffe5bb6653987afcf45439b974bc6b13_JaffaCakes118.html
-
Size
14KB
-
MD5
ffe5bb6653987afcf45439b974bc6b13
-
SHA1
0cf74b8e876fd10010293e7fe74bd649e032fd31
-
SHA256
a6b5bece8fc781c3c8a29e51d179a33b61206333bf684ee629d776d204ee3bde
-
SHA512
cce1712813605a95863e2837ae290db84478f1216b01d09b67914b0337ea6e668108bafa13d6bdd5e5a5eff2c57c08d6e2e000311e1633f953c7d1ba40957c0a
-
SSDEEP
384:CyiDsTwH/+bhHQFAi79y1wDMM126bweWxHUlEQpTtF:CyiITwfaQFAi79IoMMxVWxcZppF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B5FD5261-7EDE-11EF-93F4-C28ADB222BBA} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000d2500363cf6eca14c469ad6f3801f4f71f885d328b6ba9bcc5a334e02d2e066d000000000e800000000200002000000054d0172d63e57a312d47e052baafb6838443d605126c24f26d44d130a22887ed20000000100fd81c4cdf765d23d2b324238cf4344bbd40f84fd962f935fd12db54abcafb40000000ca58067effb60c5b4973ce4c3a7beb8ecd2fe9d71378bd94239725882a23b4c23dde559d572e52c48a5943e3595223c4e979ce1a8ac346c0090dfc74ed84bfc8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433829914" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0b1438deb12db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2232 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2232 iexplore.exe 2232 iexplore.exe 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2076 2232 iexplore.exe 28 PID 2232 wrote to memory of 2076 2232 iexplore.exe 28 PID 2232 wrote to memory of 2076 2232 iexplore.exe 28 PID 2232 wrote to memory of 2076 2232 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ffe5bb6653987afcf45439b974bc6b13_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2232 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590faf91a18e291b64fec6f6cab7fc260
SHA1c4e8763368fda0944396f3d171c324d749dd20fd
SHA256393709b22838574b94d47114dae08352d67867890c3162c8e09990a563c05b28
SHA51259c0cc91ff1257daa027c3f5c95d78459af773a12d593df9b49be31d3548657667f33754abe14d394ca30d3358ec143914e7463be2ba107685c7dd165337b44d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd0d388e1ef8108ed8e13b0c554d9578
SHA1789a2dffe86469c53a16ccdaf5f9671bd99e00db
SHA256a18b019d92f9f2f2f3356e3341e4b9bfa29532f34524c25354a6df6d3a3c5500
SHA51268f44694abd7666dff0b31a18615e4e443e5720a3e9f149e13e66c9dcf1293f6b3d7f4cbcf4e33e1a0970e4fc0726a801e191df57933f74f56a9e99da04c8601
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520293914799d038dd970f279a004d5b2
SHA11df16659f4a28013fb677ab548b0f2f6f2dcbf53
SHA2569f1102e6bacb39275a9d0d7a8eae802928be4722df57d0fe624178f8ede7e82d
SHA512d644e09261382a484f8f78086f1d8a2e04262ac57d3502e93cecff77232c823fe612f66f3c6598beaa48b5fd409029766cafeecf2cc368ba5aeb5afd01d91fed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f372ca2e546a8d3e0d3938b75a1bb04
SHA1891566b0f3a5b3b332e371136558fe3d96b76ebd
SHA256d08ce6c272a2189503e2faa5e1328550f101fa5ab519c57c8700502ae5dbd0d8
SHA512f5daabd219c669e3c1b0463981b06c3beed5f86ea969fd4ec025e0b5efce8c5f6b65e99e6eb08ae1b167f3bbc0fc729ed1134fafc2dcd44e2eabea4c6225e1ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea0c09376fb8ef8ad23d20d7ea7dab1f
SHA16005057c0d214c96dc0fefd0b3ea5f983ce7d609
SHA2561d765e1b6146fbeb533a7842c27243f29b9056ce41e0531b451c2cb3e8603aaf
SHA512c51988ce6da57752cff17d3f40271063b5e5ac4601cf1376eb17e7ec53941bfb3e777684883e9879877d95435e8d8e21a874e80d7abe3f03a54393f9ef55c3fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c92c4ebbd0447df9b9f695388c8fc507
SHA1576c3772c172e18e487d806ec34e4cd3ddfa97cc
SHA2561b0e789934f941ba71b16c6add2947afe0275033df36d17c587817f2fa47d920
SHA512decd2f7d82f87bdbc3e7c61cd6f31b93f74e8f839be409397e52ac745e5080804e81798c19fd327a90304b553eb15343a6189e20521968638d4a1326fc1bb892
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555d7f24e1f06f0a84cab5cbe5a8cf195
SHA1db9b76be6299c809b8ec0613e575cc79746ea78c
SHA256b59103dbee056daa717d3368f668f98a23d02a2b3e81eda35b70ea438ce88109
SHA512e960c2701452dfb85461bb0be2c59c0813cf5467b50843b821395abccb0d59d81263e812346060f527f9b944f0dfb72a269e6c409f2857fefca7f77bf5769bb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e092c131f05f3a299f6f4b01a8a9a5a6
SHA1e33eee10f80f878044afc7a9c3b8ba920643fd8d
SHA25684aa99c93a74663409bb42cd45f1b16f906a65c73aedf50c51f270a081a54cd1
SHA512096d8271b1d45927fb584bc52c5bbb8daebc5bd7c261713430d5e9138f9715909ec1d3d7cfef66830df8ae7571301f3828d65ce0f79bda07188cef34bcfd793b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510c225ba2b3f4fbd7090c3e1ed2403b3
SHA1a553fe2e0a11d98a500f44bd70fb312b425e755e
SHA256e15ddc446c4118af0b93077d819ef9d1fe5d2b110b2f5b7f8c2a07c72aa981b3
SHA5126d8d52a8db4533dc188a544cc1a9ae65a517b8685d2399792cd1a298983f418384f8fc03c1baa8cd2ed5c0ea4643f09e089b9abef4bc2b8b11649480c3345cec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dfa750d14f9b24f09a815149c0cf924
SHA1f0457e60cd004bdcb307c7ba22b737042d6e8fda
SHA2564fccaf38f66ef6f2548462b90a4e60c69403619cf6bca50cfbc00e57bc31fc8a
SHA512ba82c15eab304309ec4c2bf81d33e1cac8fee72e0947fb3717ef0a6aeb79271c91e199a109ab86db13238e4771d7e1081e77082a7dcd03a40f3d56a83b2faa01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53518a44dc8999d9dab624edaf3f60b67
SHA1d0302b29fe6089063c6fea51bdd49418de3bd44e
SHA256f418458b1ad9c24f33a7f311d012e48d435509314fcfe008c46d8e1417b24d3b
SHA512706566d6ff6b91f3dc5ed32fa9da3d7af1c8929ab4cea4824e367837deca0d5c876cd4b06e7152ad6b4f003ab88d9463005c2de619794b8cce84a502cbf7bcbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56612e2db81027ff5595a099e5a5d5835
SHA19cc7a9107fe0b88dc3301c8114b772dfe46949f8
SHA256f11f0cfd8eb386b699b1431f7278f078abe75d3d333ee937255bd08ef0f77344
SHA51279c08378535bcff55d1ac68012ef12b5881fd1f66da39e3dbc96306cbe9f2c088744ff51be2c2d11895e038966475bf4b8f801957aba64c8286e68906c9e7417
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db07c6ea1de1ba8cf332db08a4084a21
SHA13c7a9c73b908c47e4e651f00c87601f4b029e0ee
SHA25600919cb7ba2b4b2eb6d2089527a4321911ac5247ea26fe9e9e0a7fc62686207d
SHA512c6211603ac51ffdd8a35e948e24d6ab0fed2eb386f257caf022ff7f668cd762d07e3c3fc21e2c75c5f5ef9e43c61144a9bec1011cb8847914c7d70f39e81e543
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e7f5d4cfd058cd743491a184c6453e9
SHA19388d408f1e10a0fcab962671875674d0b1105a2
SHA2560919ccd40b2208296f91070d41e6fe481d2626f7a4aaf556a3abf584b7a793e4
SHA512819a53c1f93fd65e0543f2bd9391ed40ddeee46e8ff17153ed8982a81870dbebad8712b5c2aa34eb3e38a26ee9241a0715b9f5ea45ae139dd8a05cb3b32bd261
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df4400ca215b9767454d859c88748a48
SHA1f9ec445a371e00ec35abe8764a8256147737edd6
SHA256b8b8e0f6e5abc51fd646a985f3a7ce2a2977f0a737579a52d3791d16271e90f9
SHA512e9f168a6872459df224e2a3259107181b4277953efb42bc5dbb66ca3e00776e95cb0bf4bd3e96c7b56b457693ee45340fa7a55fdcb0a2ffc975288e6d2b7748e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a055ce422c3a25e1739d0bf17e257ff
SHA1bc7a649e33be81e757af93f6fecb862cf7f322bf
SHA256fe7d9fece0ac31385ef536b435c60e56748e2c51375d012a2b71e7a60719c1bb
SHA512c71f0068f65e4e2417c2452e0e461b7ef613a3a185106c652d32030142a3b6b889fa2fc7ba955abc7966ff59219cd37b0542da1c200478ac00fbf63c1ffd2deb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd68ee6d6a2041e6141620e2d7519aeb
SHA19b0ff4ca00c34c5190af9e9565172f539c6e072b
SHA256a7b6db3fc5e60704d1dd560657de5d9f3c521d5851a49fb6928cf737dc05ba97
SHA512525f4d9ef6cdfc523b61b5d4ef7e9bb2d3f5decc1a635a920e6ec370afc82ed9e854fd1b636d227e2fd42cbb4ce1b3d122ecb38380292822de58d74f7c85969e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b671c277551bf5eb18ef057c616dee2
SHA17209c2eff1bd8b9e4ce096dd8078c7660188b8b7
SHA25614f01dcc63f091c64c1ae385952e6e2ae009ac67605e42836bb6fff9b92d71c1
SHA5126f0253502863fee685fe56cd95141f9dacc2bc2c15dc77681582760eb10302a6b0d503070e2f4f6f01c607857ab10c486f6ebdf50370d0b3612a05d1e6d98e2f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b