Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 09:13
Static task
static1
Behavioral task
behavioral1
Sample
12b9ab146a5bdca1ac29242bc69206f4_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
12b9ab146a5bdca1ac29242bc69206f4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
12b9ab146a5bdca1ac29242bc69206f4_JaffaCakes118.html
-
Size
15KB
-
MD5
12b9ab146a5bdca1ac29242bc69206f4
-
SHA1
af5cdc35e2e7fdeca368a4f568a9e325618953fb
-
SHA256
757875448fabb3e5d3c3a9e118e48d8e845dc693681e1fb8b919fdbbf1a942cd
-
SHA512
bdb42cbaa42eb91d9087a9b9c7e00f0438b75e408024d586c47b435a03719fdf922041c52c639a79a94d65d3d1b998d09f1a2897514bff54537137c92435c291
-
SSDEEP
192:Rs3L/3J9K2/KG8sQ9qe36M7ROOrAHWYihaXuay1yI8Kh4j2kHR:RI/ZdzQ9qe36SOOkHshaXly1yI8YuPHR
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b67ddaa3cf03a8498d4b6327a4adb13000000000020000000000106600000001000020000000ca428b4d355e08d1ff3bf36b8243df95b8ebc25473c2305db1296835d6f6db49000000000e800000000200002000000094649af548820d447381ddbb737c9bee13e50a83b2eef696935ee2be2a3370f720000000a41028926a7075f2e87cf59d68a99ad81c94c08fff62af0ed7f020a415d4802b40000000e09b1701136bc4cf08e0856ebfc79a7a254811e501bd3d48c4d96ff8613e70c78f2718959e214301075cf325759e0f6e558ba5df39b5e96557afbf784908f73c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EDE7A8B1-8230-11EF-A3CD-E6140BA5C80C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434195081" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80b090c23d16db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b67ddaa3cf03a8498d4b6327a4adb130000000000200000000001066000000010000200000001f174830f00c9693a571ab5197dec442f147fa6f0b7d5a5ac9058c6b72adb3bf000000000e800000000200002000000024976490e5eacbef906c5a665fcc368028d9142b0c5c7978b14607f66d1de85090000000d5916be413a3c41924a120c8dc62dee62c207d4672aa32ebc7b9a53912b45afc54eb2c73ee07a51104808dc75235f2243567e098a9f8360908f6866249e32cc3d2ad1207c4dd8cae5988fba94332078e13464210a963fe7f81028635851b09ff7e8b31b8987cec3372faf98c1d72f27e8c3797bfce10fd007b2bbed1312a20f0c2e7abf1d4f39c2044b5f072b03ce11c400000005747181584a69436e4e723b8abf6efb3c4e878b8d8b2416f04e4787d9b48ad431fc5e096ef874451e178a474cdc0a5cc57e688db2bd2026a1d1fcc5d5dcb8e95 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2396 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2396 iexplore.exe 2396 iexplore.exe 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2396 wrote to memory of 2928 2396 iexplore.exe 30 PID 2396 wrote to memory of 2928 2396 iexplore.exe 30 PID 2396 wrote to memory of 2928 2396 iexplore.exe 30 PID 2396 wrote to memory of 2928 2396 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\12b9ab146a5bdca1ac29242bc69206f4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2396 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b748115474c37ea640b56bdb4731fc89
SHA1f5cbb55f4c7f80648cd828007388209efb01823f
SHA256b5774b94ce7df03040e019463ab167a50c883e1f3419a3db0b03a8b0c6a31111
SHA51201c74eea6596f41e71aa50d16a3421f7876ef063f88a0f9c85134fec45f808bb19e8bc0e1118b89129d0fded58b2a2e06b3e538a44685883ed645c385a613b91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543aed1d04d466bcad27cd3dea95dd902
SHA16c13b55dbe47373c7b43c164b5af2d47acdb968d
SHA256ea9c8d1039d7d5af7d7de035dfc739931762684e2c470f0cc5fb3d7c8c8bc0c8
SHA51273415500e26f2a4f94f8ad76bb8f44239a8d5f25ab1991356f81c96043043a504d2ddcf84f31e25c900a40ac709e63f8091956910bd5c1cf7c62aee15931ca7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58df5a897cde7ee692cc8cdd30035c3db
SHA1a8c08dc2166dcd6c0931977aa1025fee5c851b59
SHA256c0c800efa02b1eab15d14423025e077e6d67cb2b2e9d623a3293dc4374e293da
SHA5124296c91bd8a15adde46ae0cef486dfd6950a85a74206ebceff208af9b59c9bcf7b7cb6024a57c1791c081c4851a7466b395d44a08b26be67db02f68c03a279a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5055fa1c7ced7c8c2e3845d42be63e6ea
SHA16c337d79aae10821f45dfeba91480c8a7617b2c2
SHA2567c41cd38cb85927aae7c1f10874adf308740852575e0023abb8dd7445719dd8e
SHA51245f7549701edf546b0c1a31220f2943a043104ab04a9756838560cdcf4206e382a6afe8a0638c1f9c0a5e11367cdb8ec6e57b0df1d1bc802c11a0c8c9a681f33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0d7422ed56598d3c6cdf6fd55ef0532
SHA122c4955acd6343ffd967023936d18a3c0f3bc50a
SHA25699458c887d0856b7f2495a0b8dc7e306b14aa471ae19a5afdf5e37a5b783f031
SHA512c10631ddb75a2baf0dc657aa39a056ad2223a481a522286c8dbc75a683bd26e78f4f28bcf3a63990c489b44ad9844b8a52a4c7e355452c44eb7055c1de784c26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5100de8a74312044377ad9f62f8807439
SHA193d39d0a49e1a3678ec1f96be27fe96ba1e9301f
SHA2569eaf2def5ba1b58c8bf8708b87fa8fe643bcef8042e0b63ce0cc206d936294d5
SHA5126c1fd61338ade026112b2f16d4f4866a846e8d2c4a52ddeade5b256925689aa64e66e42d610f0f4ef790273ec3babc58bbbb6d75ba2306d69e4e9994c7c28920
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf137438879b6a8151728f9fd55b096d
SHA104810ca92ed7637774dfabce2b2e23cb9864861f
SHA256413a8a48f206be9a622688b7a758a2b214c0388befb2f2da60e631b6f9648f0f
SHA512a8a4e26f3d29f86c90b9a74c542c0622712b30f996a3ad18ed895423aa098bbc2ff47d59f59d7dd341d25deece593d03e70d4f701d98c42cd6a98f7afc218094
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be974be733a586af09f5834ed8d1e4ac
SHA108874f021b4c24380f3b50972e1f0f5dd3fdc70d
SHA25623d2da691a689f40eb80566556c517f32077b93eecf63c37ffb788aef33d75ac
SHA51296371d20aa6f817c18f1a12bfdf54419f191fa5f3d31a065fd2bbfee81d3acb51d2a5cb79fbe7b0b89cf3e4f2b05e93c193dbcfcbba66efd4f5e53dc7cf02e46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f58a9f1837645fda7a1e00fae415518e
SHA139a7645be21555c82b27c26fddb99dfeaccb6409
SHA25697505d66f4e2fc2b17ef91effd7f4e3ed91b5aafa155267125e4c37a049d8dd6
SHA512a4a368f89f535ed110d5bdc84d8ccd478370c2ec8d021a8ef72414a434c3e5cc9a6160a9553703d0b6218317b24a851142c4688bdcf931e18ecea6632b7e89e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50563f0aa2a6ec537116ecb5853b99f7b
SHA1384d4c0b1f2e6ccb0fb37de417293e044fc91d64
SHA256a34a9fe1e0f094f5b1dcb54a65c41b00220abc488022e361725d73b2c8ef1aa5
SHA512d87e6f91a79bc3b8f1403450e4791c0125a4de38fc0d553de57d91ac48270d91a410b8801617858265cfbeec08641a1de0712b613a8b29b8d6e73d2dd82f594d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570c54a0aa69f7f1bbd91df862724e435
SHA1a6d747c69e6755aeee496270fcb34854104f20ee
SHA256e3ca07ded48afa6a6fb92b03fc999692abda28143bb3bb5d630a346810a328cd
SHA5129ead6e313a71b6c971f4ba87c01a6cf9b37b0c59066241719ba8373460c037ca2bd25f7a44d1c7c2af8e4ac603de1dc3cbff3367756b3fcc5dfeb7b55573e1cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0f65d58ab465f403a5d935ced6b8733
SHA1b13a4af89a8f5ce561b0716c8d7c60a26d5b4296
SHA25627fd97b7163ebfa6c85632fdc3adec8e816d4594043ab8f6172935e1a38ce97e
SHA512a0b76f67d81154ff1c15b5e17ed3d878af89f205c655cb7030ff5d62f7c16e2551f326f4cae2defb586f3bad0efdf731b66a2b84fbf2140d7ec9d276d7c59025
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579849746d84ac5cc8a72127b5a891fd0
SHA11827455ab130861b3f809e01d73f93a52af50c82
SHA256e8e1c055ab86240069b7fc1ee3d6386c1ace012eeaabde2cc5cad9f4d22e7e2a
SHA5122c6608fdd62c323938a069a7fb171a73913dd3c21883b5bccebc1393630d3f5208f4ad38be78f47a35661b8e1d14e0a41b8626ee8e07ca726b9cb61c63da7d40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544303135cf290240305df2e24640667f
SHA186f20166ba5def7b6627d9d71a0c702d857065ae
SHA256318d54dfd7335c26815b2b4d34ae93b28d76bb94100441a493955572f64d1a01
SHA512acce96a930d5c618cc5db973e92a053aee20c8d7eb12a7e70f31cffc9a868f67314038beb353a509545899333f730a8e548c8793e516bc0b776cf70bbaad18e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569ac7e3115b697eaffe09ab0c529c3b6
SHA18aa4800aeb29903a4f9400a958547c17c795fac8
SHA256fd32fdc39a5f69fb93c16ceaa4c00935fe9c4705530dad964ebcc42d5c8dd886
SHA512ca75ef7c4416d949c3e445c4888815e28db95562a8ef3504e84d575ec10aac282c540103a3a9f9326b78a669896255d5ac3ec8868df2c7e5373b90482468eeb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580f208cae4aabdc3540d4a6b03311c3e
SHA1eb622b77605d46a0c5ee05bc33619f5eed4c1d59
SHA256b27fc6c165af5551fe7e5f8a38e373126d5a1124181947e22e80bde3bb1c5608
SHA512c43a5d8aba49c6c8c0280d2fbba92e83e05a60edc08aaf7bd0216c56c4604be53306e363dd1037769eeca7852fa69f40ac200ff19fe413975cf6025a9b6fba96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515ba89c2862f21c939e4acc6cf253bf0
SHA1c27f50caacea92c32519f18b93d59607e23b6d6d
SHA25651502e489cc4a0d2ae04aa9c5420ed1c58053312abc370ea6133721ecb929fbd
SHA512029a04fd0b76f43bb094b7868138f0d6d015bc25d895458af67d5834272b5ebd99e025aae9cfcfec0fbfbaa19a647da6e59f9dffc21bd8027869cb98a76ec04d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cda4f21b660cc7779e5f96823463c756
SHA10e024bccbd6b4e0e3f563fd859a0a24e9b750b9b
SHA256d402c66979ad160a07387c0487e4c0c92c5efd886c7bf357346d9f6efe3b3508
SHA5125cd4b36ea49c2766603f9c44a9ca6be934ed95d46ee40a1a70af31648adcb6a35d334ba4d63fce5cc6916b20066280e8b708b603aca2b0ffe472e6bd6efd3566
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b