Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 19:20
Static task
static1
Behavioral task
behavioral1
Sample
10392205ae81b7c32397073d96f5b275_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
10392205ae81b7c32397073d96f5b275_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
10392205ae81b7c32397073d96f5b275_JaffaCakes118.html
-
Size
6KB
-
MD5
10392205ae81b7c32397073d96f5b275
-
SHA1
750cfaba5de9367d76fac2830e9311f332b8f49b
-
SHA256
baa86e115160f747d425b148dc73833ee501a8493b4c686d0e233f4e423c7e83
-
SHA512
43ff5c086fd974c5ad33e5878b291b47e2649c475759e5cb6e2514446091aabcad5cbc4993d4b844021d62211311f29075f65c3678cf9d471636f2c07574bab9
-
SSDEEP
96:uzVs+ux726LLY1k9o84d12ef7CSTUVZcEZ7ru7f:csz726AYS/kb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434145094" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80614360c915db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8B51A081-81BC-11EF-A9B2-6AA32409C124} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000164748297dfbf4dc6dfe8d94db07afdc0e985c509908ff73649815ad2040cde9000000000e80000000020000200000002a3ae73f770b39377b37eb09b705bf6def9474e25f4f80769dd974c72459fdfa200000005b9f9ced1fbd7ca921bb1c83043953585b53a4afb8c64da1c34965656a04ac29400000001eab0321c28cca02598313b2b230fbc3085c918b24a87e75a3ed6f1e1b47b2ea4fa170524ef893e6f8be3955f2eb5b61baac5b03c62aaa0a0239f06c53d952b3 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2296 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2296 iexplore.exe 2296 iexplore.exe 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2028 2296 iexplore.exe 30 PID 2296 wrote to memory of 2028 2296 iexplore.exe 30 PID 2296 wrote to memory of 2028 2296 iexplore.exe 30 PID 2296 wrote to memory of 2028 2296 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\10392205ae81b7c32397073d96f5b275_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2296 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f509692d2b43d9410c7ec5c59f4e2e7b
SHA18c49df304d36347d76d467d43fcbc4e4e8192564
SHA25637f2c1b172ef854dd9f93483af5db9a8db35a610fd6abc664fbde274b0b861f2
SHA512f83d65344703ffc55aaf9a6ebace477093730a0f1231a09ebdc7ed2b0de9bc8dae66208d44543040b8eae8583e760587061901a9e7404b0e09db8e27f59e762d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5644ffd04b2985b635e88e1c55fa9068e
SHA15bd48182f308f8ea98d5df9fa64e8e54a48ec5d8
SHA256970b2e82d6718e381e80838516f04da51f803f6f750164802066b546723f41bd
SHA51294c4e2e301163b11eed52cfe042240e790c8d6584c301141db9c27572db003cb36f17db7cff5948109bb0ba905e209214e0df4631ca03920345fb72c942196a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5312c10a2ae2b0d1e7e49df22ced7f1f6
SHA1d051432383d5b75639717cce621c21421ea145ab
SHA256fef84e651ee10be86c466cde15025d29c925d318353fe1b63cf2eaefd6165a5d
SHA512926e5a8c7e0cb21ef6413173f0755519cb57ac2644aa390a1e6da551fa997849c17ae9518e08719e634d8a0f68e418a318fccce6011e5e2e7638f41696a6663d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc7c1ee89f0df9910014e182a142ea07
SHA1cd78d1d4640b0160a5c74e28f0e0ba2dd9d11aa3
SHA256813feb8bf1865fbdb47cf7dee0f67fa4358bd3fd421c9b63667e8bede499c707
SHA512710d11b353f07de69669ba0c28986b982c256d9c292ae24d6214d764494a5c44ccba126cb6ce6b92b259857fedb8c71c94c5f0651db0a88dd6da751e2ace91a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530aa74d7b909c3a464b3ab11197f24f3
SHA196a8fc83bb72e897812308c610ce678adec79a85
SHA256105b0cc00f25e3be1a3a44011a9647328083ab729a0f3158328994b217d6e784
SHA5129067720930d19f29810217bbde09d10ee199856ece5400e0c21264c5e7d86a292c65c817095e5536c13ed7a689a2e5ac6463384dcffbdcd2a2d63786e6d1063a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5296546c5e34ac948aef12c3f9b3f5b4c
SHA1169b6ea658399390cddcbb0d7725a5fcc528f180
SHA2566f1ec7dedd3ac27a1106939e064be31bb12be6696647297f9b5bf02123c3c536
SHA512058974e87b22be8e1cccb89970b144326166620c32744c16f88eda9160323d97e4b7804b8d65ac16f1724f1af19e2a69c42e12f6b018ed5644617e0a5a6d4875
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4eb039555d77258c1bfd078d986e30c
SHA1429d3db819cb29a09cf5d51778288f25661bebe2
SHA256526cd4cc13965ee11d0198946f6c1283e796d11854f1e9ca219a6465ffba2b65
SHA5123dc03093ac1b6da663b46d9abcc654ad474a14c78f7fec8f17903c84a5ac0753aee5996ba83a058c9eaebbf72802f19aa72b929466ff269c09a5852b74cc9f0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d754d3b52f43d3abbacf32dbe79dd8f
SHA17d01041a1c9795301982f950e0d3250f226fdf58
SHA2564b5e8b5b0ef2eac90de738e25f180cad7c3a1e920576e54f178a3729e819b96d
SHA51234d5772e049846693c59ae7944bdc80480c4836a537149865a367a3e938ae462746a8129e028d4d3e0565c61900010c7bb67705d1efa59301c5ba713f6da9973
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c70eddd7f832f0ebe573d3521addd9bf
SHA14c671084759733be3bff950c3a488f68d630d993
SHA2567cb5593462eaf1662728ef951cb715cd79d6cb7d0ec470ed647c19dcb9e6b856
SHA512e7e2d89c13723b329917780c6fa10145500641c8cc78c4002957366b379ed8023ff88c7b90fe2908507cc6866d8cdac721957086736098e67d4ec16babfc3c13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514838f5fe349df5227284706c9741ed7
SHA1c4eaa39f4fc4ffd6cdcff3c2b394cbfa4034a055
SHA256f17ccb39c21d58c776af91a83ea724f1bce9bdb8ed2cc2b56f29f12fba028ae2
SHA5123a2a5005dcc45471c7023c8cee5a55e4f4e9445e9b10f1bd3a5b28f7b9bab1d5d9b00e980976418079fd6eda490dab3e886b9509d7e5e3968f69fc34833a0cda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cae94701d73f83ea177aadf8bd438a4
SHA123e8ee323727064b7974dd32b3107cbae4eb6771
SHA256178419704e0c55faec88ea1ff24c2ae5dc06e26c4ed23c429bdd5a694b13f4a9
SHA512cafbf848c3cc451c1ff2b96444462a84348711ebc553fe633f96056ece02839a5ebbf7822d613edfb25e6a6837c3b3afdb96af4a6579fa3a8d6dcb0d1720b1cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d686e391cbbc405440f2f820515b3888
SHA1f42d9b1c24ae385cb96d4f2c02b644c27769172b
SHA256ca241585985f2a5a7f8d786912515041dc6a12a7995eba89e47acbeaafc865af
SHA512b2a01367dd28a98b0c371c2fe0762b5e7fa50f5291ac01bdfea7f54d8b43c59d64a4866a5fdb564db043624f491f6cc4d4f8ead66b7e291eabc52a167d14acff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b19ccc2d745f02536a5fb6345993921a
SHA156af9c25d05e134aed326fdee4c8d04a70a8a543
SHA256fc1c7f388a698a50bc8216d1ab99c11ed9f64bfbdc9eb08beccdf9ac8ea5f89e
SHA5127544387d885bdaed14066340bef8a828cfcbd09e794565af1a2a0368578eb1b4ae7daebbd278425831af8a4eb1806fea6dd20f231f24d1b9cd02027cf480ebe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d751b42067f69985dd7cc9912517935
SHA16ea2ad6da4aa337366bd55f773ad85dee829c8c5
SHA2569eeb3d70fe6e32c363c601cb41f32eaf25fc44f8d02923033584ea3d9e512eef
SHA51216df5e5de0c5d09f26da601ca4d5aa99c90c842332b9edd962738171fe7d4b767e0eb99cfb67e4c0a6f88d7b64b5f1534bf99ab4249118b6297841830a728596
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e28556f963643796739d6d87c6b7944a
SHA1f1a1fef8bec8aa736e4a69feb206dbf9e8e64015
SHA256f69cc992b10535de1b5afdcdb620f2435f7e3d292ce42741905bbada15473f7b
SHA5122f9dd7ba0e97cdc9673ac0aa39a030d8239f63c49ab90082bf7d1e714d5246b6768f277bc657767606c7e0d86912cb6942606be51ad0e7eb96b22bd585770459
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c46b49968ad0a98b9e142f80a271f37
SHA10213c0df495b456381a85e1e85c40c73d9c3dbe7
SHA256a3bb885bd620223fcb7f36911d7cf6b6f86d262bf3a8ffb95e63d9c0cefb197e
SHA51249202a98e36f52bf45a3abea9c483c134c5d039c6b2ce050b11fc18c08a1e6ade773de8e7bb544ff4eacc6034c0fe6d9ba683bea91ddc758cf1afd5bb708914d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a9291eb7b089285d1ef8a6d9ebd0f26
SHA1571f905f34871a3659269b6efcd0c0c636281239
SHA2568e8959d786df99d3cb857a5d9361d0be10d0aaf6dc37bb6ffec9b1cb135e822a
SHA51280bd0c0b7d9bab7aa8651358674c908a6e9dc8d028d5169d75aa92f0f6fe3377405063aec41ba347222828cfa5250c332ec3ea119b2d6fd26697bcf37eb81325
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c8868a32f703c68b6a6adc2ee94d9ac
SHA1d976ca7b29ecfef134196519833d2b5f63bd73f5
SHA2560f639f5d006a35441d6a467623bc200559f568042d659031a580ba2b6e70ab4e
SHA512ae953a828899ba6892b3887ba94f921fa7810d93eb6668ed29bbbdb4505d53c8f2ba760639cd0bbe8b78d9392cf0dd96979a289963c8cf73d14da682e221299e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5050bcd717259339047a4dcc1f542b850
SHA158dfb400bd084dbbbc03ba5b5d6c8d91b92edc48
SHA256d924e6e05c6f98de9bb33854a906d538edbc915763f40d331d7dfb8a765ea740
SHA512299c7ab48d8d99aa351d887151f48b8efb60598be625fc993e2103587bdf7c4223ce6d5b29cfc7cca8d1a4bca10772d895254c9e0f142a1386ab2dac6f034e92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575761fb191d5562e261dd373339d43f7
SHA1eae1cfd0fba27ccb52b9f3264cbec162a0256894
SHA256c5e6590d7847f2a0f2b51dc694865a0fceb3636123525dfe04f9e77f87b8b484
SHA512c5d851c3c7056b594fc3cd5f03bace1767ddaaff1d7755085288eb739e01cbbe13ce5bf8a8423d008b994289ba41b5b991f455ba9de0c5837ad0731ac6c21970
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b