Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 23:43
Static task
static1
Behavioral task
behavioral1
Sample
1558154cfee083037867a57f926e977e_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1558154cfee083037867a57f926e977e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
1558154cfee083037867a57f926e977e_JaffaCakes118.html
-
Size
12KB
-
MD5
1558154cfee083037867a57f926e977e
-
SHA1
7fa8f244a059ed53b324c5590352e2d3fa8da586
-
SHA256
6868ba540c1de521c28dfd06b23e83fb4d925fce10acbe0a5c9aa17d6cf3a7ec
-
SHA512
ec1b671ebe4d48eaa9d96428a6b3b29cca0dd5d7bbd29ebb8f801c5d7419b023694339f0f6cd3f102507d5eb4e47513201360d347be7c64838a5920333676ab6
-
SSDEEP
384:CyiLsv9oa/PYxPujAigb/0PMz2TwnAPU7w:CyityjAigbsPM/nS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000004fffd521757e6e7a2a72239ec9652ef8231d9410553c1172f4c5ea7e7f05d397000000000e800000000200002000000039ed532aae2f8aeb3dabbfcb745bac0339a3850d9cc694f7d55eadeb4db739f720000000900ef8e439fd84bc003a8e44a5f13b2d82c030dab2f0a2f6e5b844bcadb9bcd7400000003ade4e6d6a2b024da3d5c487a83a480f44923d157472252cd504b678b5a61c5a73776961433811a5f15a8d333d55357f118dce1f88d57bf14f01ad6bbb8a9b95 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7CEBBCD1-82AA-11EF-946E-F64010A3169C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d01f3454b716db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434247290" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1756 iexplore.exe 1756 iexplore.exe 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1756 wrote to memory of 3000 1756 iexplore.exe 30 PID 1756 wrote to memory of 3000 1756 iexplore.exe 30 PID 1756 wrote to memory of 3000 1756 iexplore.exe 30 PID 1756 wrote to memory of 3000 1756 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1558154cfee083037867a57f926e977e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1756 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520c63c010743cfedb23e196aec030434
SHA1902e185aa79c0f783e4d8516e9d627838e4c250e
SHA2565d8f1b0eeb17ed1bf3b45b98021f958736a75f4c97eceefbdf0af8e78a4550bb
SHA5122a85d99d4c65744924fe2ab8503a41c8849d0fce822cfd8b1dea13b0c8499d02c58a95929e00000c8eb7a9ed53297a6be8367f45e9133388956cc67409d1e662
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5508a496c1007429fefe0d1c299d5b295
SHA19199599b361d78b8f240d230c568c7c2d5a8ef23
SHA256ca80cb930deeb23a2b4128bccf2e67f7169ca5927c41a43fb78fec55cf0b4eca
SHA5121bac4f464df78d6291168f8426b2ea6b5c1ebf784b0e7bc42d74ace509d7cb3cb5c299830d5e81c29adf1e20adbd99bb04279552894f908847d841009672dbfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538683de671f1712ce0284e98ff40a3a9
SHA17582aab3cb38d656742ea7662d949a19f000b4a4
SHA25610600d16f44aff089283a2d69a46d9d3d6ed2b1b7c0e7e5876ba1e419c642c33
SHA512b7f1ea357734d3458e4f63e4dcbf848e11a5cf3a5172e18026641c0529cb02bae5c758c2f6edb39625edb75733e3f6b843651ad6ddb5b25f02e9f6fb0a67d982
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5900dde8776c47bb349de3e9f6dc86507
SHA18f09a33e1e298a4df5c1503ccc6e328ab62538b8
SHA2564151f04321a606eea34a9e2c4e79d0b6076e7ad537362a482a9dfceb9bede85c
SHA512aa6ff6568bb1420a2b49c03b920c38012d6d832380ee03b6e084249374719c01dc14e4b03f7a061dd6135e48cb01a77f4357adfc8383e9a649f46d611f949d54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51329eb0667d65dd4d71c4a3028b18020
SHA14beed47a477272eb01d1c74ea33294bbc26214ef
SHA256e9ef5d4de5581159677c414ab7826931f69305539fa95798bc596cda096a9624
SHA512f2d5103bc43f77572cc18baa03793df12b99a6b0ea1b6ce70a56030172911791739d514b42b55170152e7f59e43b249a67c6ebd8252eb6d289a69b2c3cb560b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5184476eac93a0e377ea3b1bace709f61
SHA1786958423ba2bb893e19f08b16f9649bae65d7aa
SHA2565c1ee115ddd98cc2e399e673c971ed34d83b5120c703a0ba84ba2aee73966299
SHA5129e2ab5e0bb70f595f17f1727ab8a00f2f8ea162534d70eb26bd1bd076da41162de8bf3f66c7d1c21dcf5dd37e7e6410c4dfef99500f133142b85a6b280f55919
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7b7f148290eb6cb54939b6bd56ffb6a
SHA1579619ac710e9241d33163f4c33eb4207320549f
SHA25628a26bc5118a67fdbd237d98c0ec295a47c715fd8c7975ada99bdfd99a965493
SHA51255609c04e843923484c88fa4fe84d9655ac59e9eba3ed1f550f8a1bd2b734ce260902353cf2c00b8c455629e21f26da730adc40fd1dba522c1e92d2b7242667c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528117ec11918b33c47429dc3266f6816
SHA1aa1df3a2fcbe9c19910bcfc875add1f7bfc4e050
SHA25680a0ce6d9508eb2af46aebee71c6492ab808e6c0b9239b10f4e3c5aed9e904f3
SHA512af9d8695536d1ee244cb8488f395480277ba3f60bc74f19565620e0d0c5989ae76898502ed66c88087dc92f8d9a26a8613e78b6a57c23e4e641692563ac12ba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5504757446e127517554904c0238fe996
SHA16924d4d705be896c8e94a8fad0e241fbd30502ea
SHA25678c34ddbd1c60204eb10ca0ea5972b8e9dac06c877bd37815e792d4ae362bd48
SHA512505cca0d486b8077590900039dfdc6d65422249392fd9dc1fb24f55dd4a17487fca9b865bc6bffb8b9e6ca25961507ae19ab3538f91bbd3acd3c8980f4ff9396
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bf1702381a9cd8de147f16f598edb47
SHA175e02e534fc3dac328bb8e51d2385e10688a77ae
SHA256d7327339254b68f0ff97b484ceb3455edd8d0a0964b54bb47f9c06aaa5e437a1
SHA512e40593284142b878bc35a2da6d83aab44f80683474fcd1e6eadcfa748d4aa50a6547b4d46ff75400030378b0ba55aea337fb90d4e86e96e64b07995c281781aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5545082462dd174194fc97a3a3aa4331d
SHA1410eb70cb1648eb6c04fe8d35688ff900692d730
SHA2569fe531d0dfb3fa360229c256ab43fcbe1b61cbc398c4b3ebb88cfdbc0608e9ae
SHA5121ccc415686aaab528c25794bfd86441a5b9fc5af5da5e7d70d82f84db36079bdea9eed23049d21b32fb64b9c9c0b829e6e3be034e1bb24872b5481afebb1f020
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5158831badf1105a3fe1711cd4ce4dfec
SHA11ab4c7772f51edefa5d72a66055dcb80bab680f9
SHA256f495a3ef56ec5d9cb9bb3fbb7113bbbf978d7cd2a9003d198cb28af421410f8f
SHA512b0704283f85609f9fee2e9be42da87381331d9f308a963ab4a6841665392253baba637d160aa4d09a8d993736121dee597ad7a0ec87a47d24085186d9c0a7ebc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514f118757380f586fead7a79cc6098ce
SHA1aa1fcd16f1b90b8b707c8d23bd9275b0448f46cb
SHA2563473342e18bad6c56074d942e9facf9e154415f6149e5bb3bc92583127ffcda3
SHA5126c28f8e9f9689a9f05ef6e491fa13269fb2914c2376ceed0d525075a33ebe2f42e17794fc8903c52eeb7965c66ad0ad56f2ca29e7e512ae28ff4774bd8bfba09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5619dd90ec42fa62796c7f83674d10dd9
SHA10560777cc7de51e1f972c097621e3cb76faf85f4
SHA25681b86a85a0028033db8dbe69db3da2a268384fcd721c9c2b1fb4399245e1aac9
SHA5129480818cf1c87b82f7b613fa97b485953d4ddf4fcdb9198584b42dfcc41af392a18d514baa583b4fe255c61766fd670e7b7132f5aff61486f93bbe23b0cae4d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cae0b959b72b4e03cc5921b6d37e4554
SHA1c9c223a95ee5d005ba7821cd7b04cd950811b209
SHA256d10d8d09cd0631777852d685f20c8620f6c708264cec5164c5661e558c58ce23
SHA5124c268303173d0d0bcc77527be3d33f7492bb3e7e1ba5d88c62e702b631566700de20ad62e0380a018c92a69be0326ebefd0c4ecdc78ff7082fc451230a643588
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51038505764630b6aabd7666781d558cf
SHA1365c6e98186f5feaea9b00035357568e76cfdb2c
SHA2568e83028b7123e607c0890a7f5595b7da6e03b5b1b6972d17b78b310ace119081
SHA51238da28fad13aeb4a7add6413989b764dfb4a4382b7713be762d6cc2a5a245e0a79417e55fd5be1a1bfdb7b6f7cc6f4c504a26668d584c9d733e019a504269f73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aeeda15b447449776caea84518ff332c
SHA1a2329e1163203cceb645641e617dca4f3cbfebeb
SHA25679ca3ebdbd55d1ca53d74087b47659d2a03a618f09966d1fba7b56cdd21516cf
SHA512b56fbcf48563ddd9e717e3bf060984bd8e9e3a7044c2dfb0645f9e8c6645d8282dfae499311af444038583c099d3b83e933f86a61705995f2bfef7271a646768
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571f488c12b67d1d14f5a13442de2a989
SHA1255b3cf3a2fda33d8389a83a0c25f87a00b9d0a3
SHA2565b5a182858d50dd6b54148fb408e06af3f9588d71d27fe34de2b858e70e156f3
SHA512de42f63062a5a78aca360cf0200e04d71fd0e2e714149b1956c2483b0e3740aff62bd21bd82c2bc2337c77e13f1f2b8f436014f264c9c27bcd12c0e9852309d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fb1b9accd9aad526161d5bca521c9f5
SHA1c7a2e629546eb06afc3c79807810fd7a7c0c81be
SHA2563b64df0f62cfd75fcfd82ce85a1ae4a7fa4fbb41ef93fe18ef87d030d9d03375
SHA512ed7e169ec15aad9184e57fd0a3be0d892581bea9d2f3e6f89649f68f7aee4990ecbc91a753b99a4d90a6a91389d568f46bfc92047029b5ec69dbc4e405909e70
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b