Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 06:12
Static task
static1
Behavioral task
behavioral1
Sample
1228ca41ce70dcd39373b21f3db61b9c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1228ca41ce70dcd39373b21f3db61b9c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
1228ca41ce70dcd39373b21f3db61b9c_JaffaCakes118.html
-
Size
21KB
-
MD5
1228ca41ce70dcd39373b21f3db61b9c
-
SHA1
e66df4f15dcb4118ab8ff3ac2fff50c3864c7db2
-
SHA256
525c11964704590f8db479b864eb106a2f1e49ae3039b0d02e5fcce2309eb379
-
SHA512
62f14e45ffddbfb0add16b2c1e5fd4a77fbaa38b2bc7026d7833998e0978ed53c262dd64ee6f276eac167d747eb762a573d2384d2b52073e6cc892e0c1898d6b
-
SSDEEP
384:KQObQzAD9KQTc3QLH965L5Y9IkUd+fg6mbD:0c/bkG+4/bD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434184195" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{95695E41-8217-11EF-A2A3-4E0B11BE40FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f05d306a2416db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000006127d9e94ca84fd438ccbc34dbc8e6cf82cec81e41e60a3f705b12e69de4b502000000000e80000000020000200000001e9767def6e705ec406d1a2cff75c4830618830f90f9eb7124bbd966efed7adf900000009f53afba8474fa8f91abcfa0b2bcf5c769bfc3b6cac1967dc5953614fd054889828d2d80e45d5b63ae14cddd5d791f41be3897b4e1fd705f0891d3644b4bc3ba55f8780b30432f1890d75b34db701f235b4d3002a829ef8a6099e02d7aa5fac691f6f5efcc05ba4db73b94342ec1e8199f05836901f519553af2f4aa1f7db1663a80a901b99909192ff9723ac7826dcf40000000a293514904aacc098fa6ad4133a846dad74ed9e865ce03fd98ec4d47289c08587f64eb6a85c32f6b5e70905d4847b0d683bf42b15afb1b71c21cdf296bff1d97 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000cebaa12b6d4c9ac408800eeaa3ff574fbc8a270ac4ff40f1945add7f3d6e3123000000000e80000000020000200000006cc0e1958f45a3e684d0fed9a50f8dcef18d38694b45ff98a3899d830f1084ac200000001fa4125c1e7059178170ceb7f2d07528999effbebd3758d4861223064c7d63d6400000005b9f94621da507670c85ae166c60d4feffd433fcdc99f5f19a9b9b064b719d0e9c831fb3e04a095a2f7cfe528f1ec42a6b42a2351c6c4dd5ab7c6f07072ffacf iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2660 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2660 iexplore.exe 2660 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2704 2660 iexplore.exe 31 PID 2660 wrote to memory of 2704 2660 iexplore.exe 31 PID 2660 wrote to memory of 2704 2660 iexplore.exe 31 PID 2660 wrote to memory of 2704 2660 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1228ca41ce70dcd39373b21f3db61b9c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2660 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54221eea009bdd05064f6dcb6e51f8268
SHA1452b058c6382f1573cbb0d0fc07746b2d69249a4
SHA2566d604a793ce9ca7a5031486cc6e533db151e067f4cfa87fc3b2eb19e00149e28
SHA5121e1b109fd01f3fa85658376eee74bc3a49b4e2a082d26e968ac5241c967e72df05fc480a0d60293285c3dc822653012fa7cf77b3f48e8a0f673a367ca3e88082
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd2d278ed5178e98e573657159b29239
SHA1b0acc5725144e4d33c76d5e90681144501f2773c
SHA256108b8b42e1fba677f79b5b93f5660942443a5aa559c2c8e3a362da3c3065e269
SHA5125c3ef98a443ce280fcab46322322cd6feee7ccd1f83add0617113faf566c61191c52c82f650fd5f336a7dfc54a0fd49800c75b96f3dc694614618469dbc498de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3291a62031ff22fc61ec76fc81e3b1d
SHA1591670718729ec0edd137c98822b6a5a4bcf596a
SHA25695a09e6f71409e0b867ce9818854a8922fd133fc8f2759990a2a6c0dddd32331
SHA5122aa0e94dd70fff62bc32863c5e53c4375aec977b04be8ee0807f6f8cc4a182d9ff4242bcc39bc30e87ce3a3acb74a838e96ddff988dd74635f1cfca8ebb3efa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9cd05d1651cb7b2bb068009392781f1
SHA18a54b057c16d3d0bd42146dc088e56e9c4bc61fe
SHA256b7f686010acebea414014fb671b4ca99a052bc5d3aac0d9ae8477e4fe77a512f
SHA512cdfb70e74e9ad92b0a9e56942ce313f9adb8db82270d2a8109aed14056fdafcdbdb869fc7695d766f8dbcc3440b016c9735592f9d4b04a16f5dc4b21a340aa27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5891e47fee983fe16fc7aec2fdf83de46
SHA14825d6f9880d7a9c64f0ef5782960ba6f4c6125e
SHA256d7485fe88717da1711e01e3696bf7392352030ce108ff6efe34626cbf30e6d81
SHA512b608b359852a9934253f3aa795717ef2b90237a81a00f21e5ac540b660ca0b531d403ee59b82fb3e9c66530968daaa4698a034d79d7a2762830a4a8245aeb6bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5741118f937abcf62d85a15ec3a34abc3
SHA10294d1b6b3516f1620b025aef8467ee6d39764b5
SHA25605de8703799a42ee1cc36b627de29a4666d734ead87f87b5c408057d137ddc74
SHA51287f42f6722841bce823190ffab3e07a101b35af9a5b23b120b5d1c9f9125b04d9555d88b6d35f4244f420b3cffdb368cc315ed411905f7b9652205ed9a76e619
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2343feb097429567c104a010c53be05
SHA1b99e56b302c27b1735974704f74237cb0a0d77a3
SHA2563bfb1e0d94b58b4a831607db8f81c2632a384d7ad62d9c18780e2f7ecf2af006
SHA5127af61d9f57b5aa9025fb9e0d2d1d3a3738820d0c4013815ce420caaf057b67e9d435020fda249c1142262a72560c2fcd6f2a7ae231df0b06bd7e69a17b32d978
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e3f6e82d5080b6d916cfa4c08ae1497
SHA112d7bfd1cf6344789640aea3117d4a2437fca4ac
SHA256bf044354518f2bd6a461f0ab6ce67bd0f1a79d71b694e942ae77ab4094c3a141
SHA512ca7fa49979321e68db4378f208189b2244eccc4c3d45148fb193b14a4e0a0438cb0320128c19649ba7959f8dabca31b96d787ee7c5580657b1d8b7936b120279
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a12c9fae7afb906ef6f0a6d9ee7976b
SHA1a4b596b00e285e5b3cf0cd87662c4763a74b8800
SHA25694621f9ca4eb5c57ab4308e582deaf7ec44d2e664ecb26e90dfb09d46df6e232
SHA5122857a3d947d23bb5479b4686574cf0865166738ff1618a6915c8ea13bb9ca9a89c5a8dde6a2eb53c341070b7aaa27be4f3b3e5503d9bab2521247b165bb0d975
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59912fd8cd1baecefd4e1485a7397fbee
SHA1a2f779f5db851b500ca32a719fbc569eee8c99f2
SHA25619e52992b68aa686e2c6a718711fd6fb357ca94ace3b8c1170c82e603c4afd6c
SHA512c1c72b1e9235f23f38fdd22df956f6dc390e53658bbd79be8b623ecc50c8ed60e3ebad9f5b310e554ea37a16a4f2d9e7d037416309e17d1284f8a7abdc7d9fcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b7fcf42c27ff32dad57327521b646bf
SHA15fb54b55749f82b94e49b2c47e6bbadd8885dd92
SHA256475e47200868db4541928744c3d72d6719bedcc80ae9f2a538f7450118e2bf48
SHA512d2dbdf8dde60e6014a316f1bd074bee54110a3a64a89c398d76ad4ff725fe8da98e15c27c8224064f707597fd7b9ed568811b70c17e537e7c52db9879a91421f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582c4cadf07c2d637856da65a0ef4fb65
SHA13074957e46371ee726835d1f97f62d591613369a
SHA256cb67849b2d881b38b57b1639d785dffe682074ad8642edadd4ec46da2afcb2b0
SHA5129ab94c59a502acba387e584df3b294dfa68159a56e6f10255212212fae855aeb94c4cddd069f6c843eeff796c057b53079c26d65dc1589598ac3e322cc650b78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544e1cfecfd689bff3e3d37e1788c64e3
SHA169afe2fedee317fec26b34cd2baa055f45b0920f
SHA256735326090280c736da55220be7af1a076772e2d6c2b648091541a8061f2fa5ce
SHA512c80abe3ccc5c13bfa0c68ce5ba71a6c953ff4c5c15fc30352f71c3267355dd2dedc6f7435a35d970e81d2cb75e5ce70cbb0a7e2769395744672a397173d96fdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4049f9af5fe0a87195e772858aa6d4f
SHA1fbc0df53b669c63c8e02948969d8b4be56f4a6b0
SHA256cb37a7f8cd45f8ce6f3f10c4aa9fca73e98f06eecd2d7e1474cf1726dd242e24
SHA512e2dd87ca2b1c9eff99e0c83303b19270598fda690d0b77d78e662973409158fc4988a5fc75cc6410751f122e022e074cc4aa49768e2f0c8bb972e53e8e92ba9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb566f620cc50c675ee09e81b1aaf68e
SHA127691ee214cd42c9dc67d6f22353697168eafc23
SHA2563f2122d3aa36086d3a624e445c5b4a2a12c96fa6a7d618b14071b3368f437218
SHA512de1f1eac138a28b6617a65b02503f36560abdc80dac3898cc26af6d6945f76164dc0ea97f8cdea5d2cc647032ce92853498e98c6bc9fd12f890a6b2f95250b5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ded43027185d1cc0d8d7a545c0899c86
SHA147a1cb12bbc94791fa84fe15ffa3d71231025c48
SHA2562df76e45e8ec9bd953d7af487fa5672d8d3c59a70786b20f443022112778dacb
SHA512d12b724de5fa75bfc90ac56b2c29eb6547830a881918167c7bef861a6a46dc7c917436b6e02850e383040bf7ea379171cc68eeac2098a2461c2c478ae7714263
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555106d46786e4b5592b73323d0fd3b8a
SHA1288d0f4414501552d0c5f40a5f59846177612dd6
SHA256ce998224aa4a4fc706eed593c48b398b8af7f4d7a2c5173a606bfaee59d4111d
SHA5121fb745fdb5180fe8698a3c89e7a473a1c08778d353c66046c3e059dcad22bd0e9f7d0bc60dbc3ba2c53d540746bd7c8e4bff9927013fae0f2e6351078ea057ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fe2ff1a36dfa334a7dc9db1b3acff51
SHA17a70db8c55bf37278708e8c99e1f1547dbd40056
SHA256da78466e6b7f354e391d433476a7e8d3ff79d9074349445b0c6b5c59a9a89bf9
SHA512b8881266cf8ac1b3f6e96b3ba274f8ab11b3f38bde39248139c481e5be163222e900c1c151ae9b71910f8caefb16fe661aea332b9d5f5d77ae45d7d2d8fe2096
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efff9a3566ddcf10674eaafe34a5a2ed
SHA11f4b691d7c03110cb1ad2a2712a7d7e15d249478
SHA256bc7c68ee90d64a248ef7b852e695e4b060e4000456955eb76922ac9598c948b0
SHA512aa63f4a4ca039025e4b683b7849d3564376fd6a6951ec27dcc6668a0240cd0f432118874e02c33c254f182f0a4eb8ce211558819f747fc284d9daab0ff1cb943
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b