Analysis
-
max time kernel
134s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 15:02
Static task
static1
Behavioral task
behavioral1
Sample
13d5cad16aa3ca4383f81c4fc7358558_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
13d5cad16aa3ca4383f81c4fc7358558_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
13d5cad16aa3ca4383f81c4fc7358558_JaffaCakes118.html
-
Size
11KB
-
MD5
13d5cad16aa3ca4383f81c4fc7358558
-
SHA1
7ce90a138e1c265c042508be47b63cb7610db513
-
SHA256
b528090db0153ed4794513374ee9e179efe7e4471e675e185b19d62a88aace23
-
SHA512
3e4b14da97f1123f8e6fc33a8b31e64a29cf9af32b0f0dd8d18a39b5cf3756dc00c7b3124202523b2d71d741100f9d19f906a6f7349564acc5fe3d22ac23fb16
-
SSDEEP
192:+LdQzuEKv/5nH16HPTLqOnMj0r6eye6WI1z+NxQhKpWhx0UUdLH1B7dKUPmKJ+1S:+LdQqH1w93ylF1NhC/dLHx1PmKcxoOJ2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00b59b7a6e16db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000002837e55812a2226d5d77fca94c95b8437e5abbcd2df2ca3f10db911c6d7f77cd000000000e8000000002000020000000c8d5ed713f69db79a721299932661dd52a7d803fa75a62c8a5717b9cc0788129200000005a34c6c90fbfec8bdac79901c3b77801aced9ddc1baa9eae33528cb1ddbc77fa4000000055fac8cea7689310c03399e0349ebfd56cf6e3b791ef63980840aab4b6096564bf3ed1879fe9cd23b482d60da82487da8e524b3e111d2f82964f13f021181eae iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A62A0911-8261-11EF-B557-C20DC8CB8E9E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434216010" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2196 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2196 iexplore.exe 2196 iexplore.exe 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2788 2196 iexplore.exe 30 PID 2196 wrote to memory of 2788 2196 iexplore.exe 30 PID 2196 wrote to memory of 2788 2196 iexplore.exe 30 PID 2196 wrote to memory of 2788 2196 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\13d5cad16aa3ca4383f81c4fc7358558_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2196 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5747f7a3f510a52f59a88795044be2760
SHA1f89521f7547c85202caa9801a15eabe5f3a033fe
SHA2560d24d5407d1d3d80dc6a59f515ea2ae3e9fee3515ec0ac46b239376b93218de9
SHA512ad7fd397400404898b436618661682c3b4d24fb7b9c4e76a3f1f71f923ef5e82547fb3446bb9e026bd9cf7c3d96683c8102a81099826e3ea4425e1ebc1b29f87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56af32d33dc3b37e143e1521de67c0e5b
SHA17e78c6c7acd7c3da592aca3eda656ccbc1558114
SHA256c09ec4eae42b18ef554ff4baa63a7549326b3d537b580d6d58e1dcbf93164e87
SHA5126409432fc5b849221b7454ac73c2c659080262247fb408e93144a40b2ac390ca321e8a666857402b03297e7388cdb4b6a7441b4ba8f772c12eadd7bea23045e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b671deeac591ad38ffea5bdf2a6b13ce
SHA1c75fd60e4333bd2b3f2a8512e31ecb32079a19e4
SHA25643f0b1e2eea49d93bbc502502ecb0554735d98fb0cfd99101d0b12502c7772c7
SHA512b825fb439d1da99ed6d6f6295e476388d1679e69bac965db716db2f7069c4569ade40bd3a3d4771a838e76de629f5845c9b5faa0c113c4ef35279263255988d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e932343d4400d732f35c2a84fb1827ad
SHA16229022a08564cbf9fe64d1d40f4c354731b0e6d
SHA256ea409ac8d99cba76756d8ea030dbe94b90d2e6ca4d4938330ff5b637a58d5615
SHA512cfa3fccbc3c167bb5fecee78434b2c8994ae56ed40a3626532b526a58613b8684b0784a2bfb1666db40aac92077081e69b3d9f74e6e3bcca41c2917d1eb6021d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580d4cec031bef13319b32ea4ee6d149e
SHA16802e31e8060c54a8ab6488a754d81542221e3bf
SHA256c13dc9b8e9ca8ee7ed2718704010804ef06e2e04a7c913d561e223edb2720021
SHA5126d50976a5db66f37dee78c714fbc2658a15788b3fb57fe6294e066aa0b263a6f8f3378d7a34e4a4ba0698908999e0b212890b2fd1cf07c13c2f7be8d00f5b13f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe2446c860fa490b4e590ffd03098ee2
SHA1ac869bc5cc8997c730dea11984af4c5f2b3a4384
SHA2562ad6f1575a2b94507e1e45bd79d5e9d6749f89cca6086eac59ac88961c29d1ef
SHA512e43491a7dc3a7af541acefed045fa9e34ec9ca082ac3ae08664a066471f28f83b79a4acc5994433a337ebe0d2a07eeca55803d55d30484139a455e22647f857f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500aa0f33553b82371b65894e597690a4
SHA140b49a9e9b60ea3a49419f5cf0d07073f180aca1
SHA256451a5b3d045b1b863618352d9699c2b8367070a2d17363f2e6f2c2b6c68eb15a
SHA5122bba2ee982ce2f2be495197d2e43130790b325b07e4751c59818d27426b08968664e791330976e56803369ad52a5a5d4a9691ab9021a677c84e31c5fb156e50a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587184b4589ccd36df67922d3118e2035
SHA15087ce7bfac947e07068fb04b58722300e888a8d
SHA25657f4f706f9c4002c5683a8317d72bd91dd52009cfd90b818ebaf7752a2682658
SHA512498c4d09fa03dcfe46ac2db4d84439c49f1a8ac93dab6fd5246c5392b609bf48df7937d15f3f9768384c3af4d76db473ec0221f3415214ea88b450468aad9c6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e65417a10a33cf2f2ce0bb19984d32bc
SHA166cf07d2be5eda5b056abe77e579ce13cf116f17
SHA2564fc994ca64101f582c2fbbdfb63131b2b9f66614d3bd742a8561e8d334ac9f2b
SHA51235f523da7ca1cf160392991cfa88c810c14e2026a09b33544b8fd636868ad47aa5a61e25d4afa1b51fd97355e54d18a487510834b03f83e0f86b7bc81ab1d8d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cec42994d8679d3bb593d9021178091
SHA1bb0a1c459b09c2a00cdf305fc1be45bc7559f261
SHA256147ad782ee47c8fae6616d15ba59baf7ff3353b1a4cd888c343ed8057213ee37
SHA512ae8e29465c337f49b8161d1dd79010f606ba07af34528ac9b284cec85771cc8635cfbb8e47bc4a019753f483f2cbb0797c04bb853b513c453d08066cafc9d29a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d534f48f40f790eac8b4b4464e3b44f9
SHA1c58a2bae670188ee8fcd29cb643234f1d1dac6f3
SHA2566d024d168bf6fc2610676e71523e323fce339e484695940e0c393b14a4038f84
SHA512cc13941aa0ff5475aa099e342d9fa73dc87ffe430e8581e73b35746d675ad85bb585740775a179e843967e11570ad283f23a262664d2575186424e9062216895
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527f36c626aec01f4ccdc7c63b636a8d6
SHA18ef9530115953a847d499fe310dbbf8ee1298a65
SHA25626782db9acb155b6df50a5ec5689597b6b793c261d83a8da936eab8ee37460f1
SHA51285017e94c4ca70d4a77b3fb4fe60f905d3fce6bce96d4d096f1029e33ea2fb57183fca251454c08c3a32305685431c586c984442958719e2650b0372e904f2fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543db0610426e9e593f02e79f706600e0
SHA199399adbcb472027e768ce1fb3e3e19ba64fb567
SHA256b03abbc1e08d7b0becff4c03ce4c1d637a0745628c7e4bbca87cacad49dc7ef6
SHA51250dcee6e9d1e62bf8fd33a2d24d74fbb6c66222b72a86c9c46a87f7c99bf037d9fa13eb8f9c7e91756bef8253a5d3a2c673fd55cd0d311f9d595e32854c1accc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dcd0bfc43772843206186c33802c09d
SHA1355cbc37af372985090b9b7b55ae80ac6a5d49ae
SHA2563319626af0076d60d63f6c95c744098f5923c303167dfa015c607984ac43f701
SHA5124115086b63b2f11e200cd19dec85bdbd60264e8110c4d420b30bdd44a1f1f003c8719ec3a374fefce3651dc5f570da79e4eabb73ff0563fefad511bee77ebbcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ccc8c307d041bd158b89d619f722350
SHA157c5e0f4bc93ebeb1ae10c59f18809d4ed451a70
SHA256ceb57b419523d41456f05df688730661a18f2865957ebac1be628c0875c5acd9
SHA5128bb88c0c81b5fa739850ee61d8492d3dd4311a405993cda956ca090866ae98cdacc9d6f564c7a39d0fb2f96fb8530262f9dd1d82d6306d44eab88b94b5861433
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546a34218de317c4506f33a6d53fd9339
SHA16eb3b1b518f8669dffe6c28db6aa37509cdade3b
SHA256304678bf1ee1847b3fff3219d7d2a32f09d12e085870b1228982d9121f93de11
SHA51291546d414e2f10c90fe8b455216c9176a88d3467af8018d3e0d0313518b07fc9c6e53510f95613d91d5f57d6bc06dfc8fec8dc401295ab5fcbcdfacb1e03924a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b222454a76ac2f72c4c7b0acf97ac345
SHA1419c182a5b343cda195f204cd96fb082676f3e0f
SHA25659706e8b5e9b70f7fd2e96a3c86eb1e009c6f7b6f6bb48fc43f4b7ed16306259
SHA5120d1efea92722af54c38b30f2008afe6daf820112f21ee0f50c889f6b0f8c515a91030c096941ec62fa5ad6e1ed8f0324e491245b56970b1c405af41bad9901b8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b