Analysis
-
max time kernel
119s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 13:44
Static task
static1
Behavioral task
behavioral1
Sample
13968a22ddc04b7eeb7a04aec97ec014_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
13968a22ddc04b7eeb7a04aec97ec014_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
13968a22ddc04b7eeb7a04aec97ec014_JaffaCakes118.html
-
Size
5KB
-
MD5
13968a22ddc04b7eeb7a04aec97ec014
-
SHA1
2410de41a09e9be49505e56e00220bda4e36cb13
-
SHA256
791ed2786969e2ac6b224fa15ed287df3bd6a7201bce13d167c363d13d09dae6
-
SHA512
df51029b4e47e447f0921d8bfc3443645f3460564c0d996b8d40a9eafaf8071d1abe47993c4a2963e294f561de50510782d41d10240743dba34236db1150f4b1
-
SSDEEP
96:iAMJOIaSrcuTITJctTJapanAYJ9Wpkj8JcCKd:hMpr2OrYXKd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D4EE3CE1-8256-11EF-A205-6AA0EDE5A32F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000033dcd8b6df6a3748196b51439f78365133a1545d73d90902c9321faea80b0836000000000e80000000020000200000000210640fbf4eff35a96bb9c997653bc19512a0d81accdd1730f1249eeeb20e3120000000178bc22e37fe086cf4e3b8abafb3fddf3765b246189b2ceb6237e090506e3082400000008975a2544a3c2c5beff97b826750be1edaba83a2250fe61bb7bd1368be1794f467a65843e8f20ef46f709acbf1348195fa160a77d2a527645a7b01058e428f0d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7008feaa6316db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434211363" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1724 iexplore.exe 1724 iexplore.exe 1856 IEXPLORE.EXE 1856 IEXPLORE.EXE 1856 IEXPLORE.EXE 1856 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1856 1724 iexplore.exe 30 PID 1724 wrote to memory of 1856 1724 iexplore.exe 30 PID 1724 wrote to memory of 1856 1724 iexplore.exe 30 PID 1724 wrote to memory of 1856 1724 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\13968a22ddc04b7eeb7a04aec97ec014_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b6cb31f033d5a621d230ca1536a4b1d
SHA1f21236049ea9e0d0a9a8af3aae9cebf19f771399
SHA2562be784e59221577f4b5f4173eaa833f02e7206d41f69304383bd39d694627b2f
SHA512b65b3bace8bf7852a226e65d2e37b96344a30a2e96ea56382e978a1ad664e81d9c85255281f54cd13a1f942e0b33f7f7d8bf1b5b86551047f963cdb71369c227
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b28b29f96ae52f637f7a65fee7d16826
SHA1205b474d1710d8f54570429ca9955215cdcef160
SHA256d56f8e3c45ef2a7d45fe16f5e1291b267ccefd86156baf5023f4cf89a8618df3
SHA51219e3974319f0d0590f4b09b830af2462aeefc70e76043f1cdeb08064795ad7d28ae88fb7cb69ba4e6a566600f7adaf9df204578496b99af8920d3031950e3d30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf0884444da044d2a4a48f60c22dcffe
SHA1b44c8206b5e8bc93a7f42f0b636e1c5857519347
SHA256c53487f3bd80512471c21093c276dfe4e512d700b07dce9ffe4f158072f199b4
SHA512435e88c12faa032c3b7c19d10c636b9bbc71c143b5b076d2d2d1ef0e1c1fd464378b64a9caf66da6589bcf18b4c6e7b4bde0aa82ab3b4912707e962e22901aa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558d8b86201179849c53a4a3620102527
SHA1d622b34d62ae1eddd1d5274c6be9ff99bab7a311
SHA256bce7574d3b6831b293c9682e4521a6134278c2beee76d39cdd6fb149051c01fa
SHA51228ef83aa2979e1989eb2ca909ae420451b8435b2e30b20142d802c3574d3e92c30afceeb90f568f64f399b7ba5f9bcfeca2d8d197709d6399bbcfa64b9e259f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c70125fa7a570a3543dc8d1a7905bb79
SHA1648702fac63b2441b7e9bb43e0462344ed9c1a62
SHA256faf3fbecaddda3ad8cc42dc3a19f5737407888a52a58f8c1695e8ac6321c9f84
SHA512717e6b0856013e6b1111456fa4b548795ec63fa08f553a146845b8c89a1cdf38d40da28b9becef3f51f1fa555c962cd6a026104b71f33ca4e72ecaf67ca0796c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a1221a370ad83eac644140f2110a401
SHA1f4c09eff26c60311af3cde33dc9879e9d5156f4d
SHA256ee6907ceff879b23566b9f92057bdf2fc768c7b8241cd54045e7037487918f07
SHA5126e6f932c96499272a405efda5c2b2b8a2ab3f10e8da131557c7ccaa02084adab0a2703d32af4dd694e916bc81471c0778a68897f67f985e7b4e8c256dc6b19aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538b548302fd2a5161cfb5bdcf91016f8
SHA1efafdcb403eaaf840273cabb976ec2e99c1c2473
SHA2566164c207150b858bcae8c7198c2fa9d4619d2a7058a221197461e1062009db8f
SHA5129bdbfc9787164d5e672ff9dc8fda06f106dfa3ed738244a9060ef8c33caacda977926128b1b5f688440237fdf3fdaeaab92098fcd6e6eaf798a28b6b6fe920b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5864b8e3725d280d1c40562d1323b7bad
SHA1b7531fff22ea841f7238bf47f4b6bab37aa70919
SHA25675614b5d5f8514693e5ac8101047761c324928a3d80996cde27d0bd7eeb9b8f8
SHA5120fc44f12aa34b7ec89828f51c46eb2426279dda999959dce5d051cd721a3e81aa3bc32abb75d569e2ccf740a7b5afaf20d98b62bfa9f053605b4c3f546d30a11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58533754d5d5de539192ac20f9bc46f4e
SHA1a2dd8c6963658a89218a1d252c2797dbca0d71c0
SHA256a423d98ac1c3b610cba8e703eda4d5a6c847609bd87324b8ccc98ff8ccfd7158
SHA51285bd48e4b0be38502c5662215c15b6981a4d3fc0e054dbb64e61cd7b06c2193acf67441cd4f8913180c269f26fd5a47ba2ce840f75325793be85b9b1090221b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58daac673a1e9418559b7cfd8c1661d4c
SHA15d1ff046c78ad2ef3a110465e597825744e9e339
SHA256e358cd346cf67315812384f1e676038b7dcddc86704ed44326e1195426fa2d9e
SHA51297f3e37fe910427419f68d16db3226d1ee45506d078d70b73a15a59a25e82d7530eca74b4f87f360e2967f9be57e1569c99c95d8a308357b58233cd53c8ed2a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a6e4d0acde460714862396080f9bfb3
SHA10489c63f4c8a0064db90afd8268c53d029c45db8
SHA256e37431e61a2abd4143067197e0d4c549dc698f80a07a21b767112e27d421a90c
SHA512c7686e9020cb7fb01d81c0838a8a7e741b36bc0748e0d16f3c2af755879426531c3c7f568e3c05012a0f532c1e11391b2c5059482057ed18dd109fcdd2aee246
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebd99c44da99ec3ece465a10cf9d2da1
SHA13f70d3c8830e55f277f81bea0e6307948e81da5b
SHA256023b58724b8c2289b7a69cd650bb9b104c6d325847fc774dc2fe95890315999e
SHA51229af47b0ff7e9d44355407ca5c4ba64ec0234a108e4e3ebfa2027930bd3e42e0a4f5de20db21a5a1857794640d4f0b1c56d09a58fb2cd28439fe6ed81e9fb4a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5989e262f463a28fa3b3ec229bcc27ba5
SHA190848919fc2d87a4fe828c8c55bad784663a1ed1
SHA2568260b91f0c1c63e08ef1bc1f1946180d8aed050d6dfdd2cb09dfe2d9cd35f95a
SHA5127db7a37c05613eb1adf10c148b9d3d2e69fc1724ac1a7a0786039f9aa4093573d6e80f407abfdb7ed16cddad7e3df72b3fe9d16d312364794965f14550a720c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52eabc60f7f6262d4b2ee344fe3fbb747
SHA1e78a02ba3bd0bf75f0a8150300b8af0479249002
SHA25691339a4ee42fab915de2e7665cce8f1a1f20e05cdd4439800eec5cbcb3142a22
SHA512b34b623d4c08487814d2048d83a42eeea85605c3a806cc0f4d06939d0474f480684108b584811f8bac665f14fc9475974d899f5802b6bb8a8565708fa7f43bd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1fe68a25540e678e76c739087a59c3f
SHA1995f77874de4d1ff4d913a003f900bd18808bcc1
SHA2564a2c7124290b2de26587b78a4ad2ff3458e46f0110cb68b892458e05e21c1e2f
SHA5126dd09341c44c6154fc7ec4279e890670a213d0982f9660ac1f22206cb8cecfcdb41ae8485900d7b63e2bbf054726afc78022faa97b7ef1ba72160287398f133f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc76bc62c1901151f562a218a9d751fc
SHA10841c6f6bba61e2793d2c391d0fa5e302bbf3f2c
SHA2564e53ff87a36f13792d1d0221864c341b0b95950ae060d87290aab5e68cf7782e
SHA512c59c049a520c7a22193b041c6d5a8a3e5b8adfa60fc8622213f806958c4f2831bbfb6baed303cc323f746567d4ce1d74b697306b3cbcb84812dc825cd9a0599f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb222aff966df119e1241b580ccb9a84
SHA185be121f2ba964dabbc1beaf9589d94d38a52819
SHA256641da81bfbcbf8a7b8947d761b23fe8f834c789108cfce85851fb0ae73f756be
SHA5120ef220c5a53dc344c656ff7007d95c6ed90a9efb73d7557bbf400b502ece974128939aab904506300420d76ac65839a9df34724b38a3f1e1cb9b34e791682c9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd3ce51211a9348d510601eae2c2f6fe
SHA169c008081ce323b4f78623e3dab833c908b8c5ed
SHA2569cd5b75954a234688c1c8406c4962e2baba5f7750567bb290d2a97c60512b4d4
SHA51209ccec3bb8a0dc43e5d84263eb7257a423e060566c771b60e1787e21b8a3710b5255181f24570d5af865857ef7d8a3d8814f05723b45c9b454b1d2f395464150
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5951bb1e0092c7802e671530d902e2d3a
SHA1067ddf1f98f95764ef48ae9754a041896ca0b754
SHA256bdf80a37656832a4789019fa18f4093316595f00b5c92d0139cb71af6c5680d3
SHA51274f13a3388131ca15870f24f7080d0cee551b951b882395b2ba540300afb025039b6f476fd6ed7d72f4c25b12151f40fb0ab3a3b86516b7ec7bca064a23dcd98
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b