Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 16:46
Static task
static1
Behavioral task
behavioral1
Sample
142796b5299ce1fc762a56add61338e4_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
142796b5299ce1fc762a56add61338e4_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
142796b5299ce1fc762a56add61338e4_JaffaCakes118.html
-
Size
217KB
-
MD5
142796b5299ce1fc762a56add61338e4
-
SHA1
ff42fdb5b3f93050628cf8f4056747c271ed3de1
-
SHA256
e76898170bbc184e991c8a5143902ea819af6429e61b42962c4d93b7857a7682
-
SHA512
d4cb9f66f7ed66178d10472ee7b939fd06d3b3b40e82e254f45fab1f26529949218874bd66e502281aff78d8aaf5aa2797a067b186262a43188acc3bee1a1799
-
SSDEEP
3072:mkwMOjXrFKhjYltZmKoKhU98NPMS7KbfYqOsiadidYlJV:mkwMOjXZ2jYtQKoKhUKVMsKcqOPYlJV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2BB98FC1-8270-11EF-8E54-C2CBA339777F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434222242" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0a733007d16db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000009ceacdfbd145f692b2cc4685503d4f17a9f936512a2ff1a227d6e7c0931b5450000000000e8000000002000020000000334f6006d6d0e81646e3e5c7f59b193d4bbd2334271da344c3f1de277672f775200000000c578cdc1540fb3e696a3a2494dfc98ad3307c329cac4d9d14b04ad83b67f54040000000a1cbc62511a5dda2bf4e56f2b91229355766daeab18a3ea7017fe75d281a87a720f1381200897e4f67599e12ed3f0fd3714d5707a2d43fa598ec88d83c445df1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2660 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2660 iexplore.exe 2660 iexplore.exe 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2988 2660 iexplore.exe 30 PID 2660 wrote to memory of 2988 2660 iexplore.exe 30 PID 2660 wrote to memory of 2988 2660 iexplore.exe 30 PID 2660 wrote to memory of 2988 2660 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\142796b5299ce1fc762a56add61338e4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2660 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58850ab8540e13b5f3f4f64f61c246a89
SHA18c3d026b51bd68584c3c89d6ee9085cb17b8e186
SHA25618c30d161e229dea3178144e36ec951d4488112f32fd674c92c0f369ec6d345d
SHA51252779f7fe1c1c4636a3bcea86dc292d3a36a64202573767e4a18d8f0675b208796bf60138fad0909b89ea594e5e73a16d24cef9fe58d20f87cd90d676c42ce21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f4c71ee7a8545f81fcd45c75ac1b581
SHA1fefefe07c2909550a9a450299892660397f002b0
SHA256b6e6af6322c2fa8abda42211c702001bfd52435d6281710b776e80a26b04514c
SHA512a6697d81cdbca7c1d0296947b38b782ee34adffa7022047ff381f6951da040ccabe4386e76afb7923030abca574531e9ead63f61e7338a8f91473c305923ad95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563371bb920cb9bcd202359ed02423611
SHA1ddcf6d75dc29ae2472e10965e130bee6f45c0d56
SHA256fd8e116e75db4fd1f5a1feed7fbd885b72e1b8044b428a4261bcdc46d0b238ec
SHA512e94a748dab409577e4dd0f9d162668e093ede77d146ac54a01a7ced6213c3735e247f4fd54f770105f53e652214d150ebd9297e5afd40f84cb22e0634f64743b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e74420bca74d475858fbaeecf00451f9
SHA11dd48f0429cd0fcdb71d7bc0c03ac3340df576df
SHA25673b9b324b42a6da1ef6d6147569cf61f438f7f52100e8166b3f387ea96e47e06
SHA512533b6aaefde890925107d2b812eea35958eeff745431c21bd06505e21ecbf2f024fb3077a52e682aa1ddfcffa75e80fc1b64faf46419dbbe40efa1882e0ffef0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7ea51b57d1eaa8b4fc379472ada315b
SHA1bad49700f23eeb1635528dfc65042b45c4a8698a
SHA256ba37e358d70d01f1a8d50051875da930866c3da8a7ee396683fbd53deff3a496
SHA512081054c30b50cc8626cedcced72d5489b4cbba8d2e29df7e0d86826c60309188aea87874e8b1862340c09ea13dece120d19fbe1bceb26c0883ee5aa1881d97a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5153caa3b4e5ea1260879a4bcb46ae141
SHA18024187d8ca043060df4fc754e0173dfa7bc1be5
SHA2561dccbce1e71cd704f954a05fa28e73df12654965b2bd826bb65aa2000aa1d183
SHA512846741cd3c36b1ef54dae39cefea4459265efd4ed6da71cc1606fa37369276cb515c3552f83645651364591cca13bf6f7fb14be6129f3ecbf6a9ee4f0baa33cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540b558edbae71c955d207a55d57546fd
SHA1a854246b8cd048904c4ccb4fcdbbd7952dd92e53
SHA2565a2a1771b4785687acd5f86d79245ad8c8011491d9bd7e67828c8c1b48244041
SHA5120c5a4437b10b49e05afc94fd8e59b2ef3d471a133b3b8278f97a5c5786cb15277049031c6c53342f53d85393e829cec122fe46c8bfb96346e52f1a52bec3a173
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c839056a08cf3c65faef30a7790cce86
SHA12476257eca2410533a68968b2595779abf5f25c0
SHA256c9c347f225a9ef884b019fbf44385b2cdba33fea739e85b9d54f5a6785dbf812
SHA51200e4877d09babb070a1c840f99d1cf88f5c24e6966cdb4f34e28b683816ede38dc1e0b6a9525c50651c1c7475becc9b894f96f48d703d05900e22985d2a270e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb218a48cf0f915207e16735f0b21166
SHA1a45562abadc69725c031c2aa99f4e17d121f5857
SHA256825de55c2843e3d0e62f84647ba4d0dd142b42ff7a70e921775375f8833d6af9
SHA51281185228f02de94af2ac3aaf347a52da9b3c2c324d9ffd847fc04cd46650c3c877fdf8b6a6d40f2c649de63731d5078aa3ac94ed016f4f71cf6a1dacfcb9e8c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573b38fb96495c3f5795b19c2ffd53ad2
SHA1e08f76fb84e8f56cbf39abcb464b59ef51146355
SHA256adaab684c2da0ff683e817272222ae7033e71bb3d4836240780e9080df5e2b0c
SHA512cd77806bbf052b7cb70a11725c589c2cf87785746db904bda6e37e05b60dff8a09e3df9f3c7da13f990ce541b8173b95af8fc920cec0a3ec2b2c544b55aa96ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2fd9618ef927d01e6ffc1cd8aeb30ed
SHA183edcd1ad38801ced731004c1b241bca6ee26a6e
SHA256852513e92b3b55ba13529a040563fcbb704fab129fbfa0b7a085582fc39ca437
SHA512a9b7af912d3711977bfffafeb5ca66125066b7dc41c1873fbb210b51b09ba16850f4325a0896f05fb503be1875c9403ee60c1eb8d9048eb62cc6c68dc3c9aaed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5608dd5c06b08983c8b5b0ab5018b47b7
SHA17b5c02c02118f32348fd91fce735fa94e3e5c0a0
SHA256857edbe42330547ac8a6f92f079d0a16b448282dafcc9e0a02632a0df49040c9
SHA5129c0e214d2d52b216b984658d3ec8d59bfc34718392193bfe945d9c63071c67658f3c99fc8de1e50176a2c789e41b01bb606a71b23907a384e9861a51cefbd8d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517e508e1d692aba384f727270e2ce007
SHA1bdf024bf345ad60c8c9371b6280b635344b52add
SHA256b675bcfe24aa46ba809c3adaf79162b7cc2b721f93c8b71d02f547b0f2d6f845
SHA512ebc8f041f63fc0d07893b0ac64ea88bd36f78910d5587e1f7b055e32079947fa032b8ea2ee5d309d295865004bc31adb4d3371302d7482148248982b50b3ac8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f9cbfeb83b7436771b488cfc63254ec
SHA156583186e9e599aaeac3cbf25072c063c23d86fc
SHA2560cd03cfac8888ebdb69963dd7ce4091738674e4eec0c0aece62f7487d6b3ccf2
SHA51295c34eb9ce7298fa3541993888e44ff11be5aed563f8f668a23068570860975a4bc6fd2cb0b9ea950a4dc8f43f978fa7c264b4516aab838a881a0cb06ae9020b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b395c851b303d87da582ca93dcbf7b6f
SHA1b4a3aed2c1714d97173bfe0890607a2e18a112af
SHA256755c2747cf1b4d6dc929e7e17add9f143926c59a0afe92128960ac6c2198fbdf
SHA51261cc5ca2360ff2caacdb6dd263b6dbe29c78487a4004dc9c29583c95fa1db00834970a35b2eec24dc1af1ed3b8d8bc434f11508b020abf66d606622b17b0c88e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565f4eb0a295c5e4fe128dbde93b316d4
SHA11710c6c77596e67f18866dd5001f524d55c3ed19
SHA256ed4c9a8921dac247e1e439fe481a23eaed6e74d690dabbed628e9e9d6934bb9b
SHA512df23e79f1983a7ebbfd092e4b7a35fd2a7451c63b1c3f01e40ce87593f2586ddfb8d55ecc2631c99d7316953bd501efd8f7a67d6db9ba5f2b5b9b74c29768249
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567407d643b3d4d1f22e277aa9e9b13bd
SHA1fc8685f85779cba135a0abf02956f296edeb7bbc
SHA256fdff042bf846e299ea030617b6e709f59751438c94356fcf941757d618e0fcc7
SHA512cf1ab2580a871a8b97fd56578bd8d2528805769eb420c3d1ff6aabfcaa04b977583a58d09dea78f8246efb8ed12e60da363aaf4966af8007d5af34cbd30edbde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f95fd3e83a2275d35008ce8386ac7f2
SHA1ae934a7dda2cca5c3fe51506d01741408989a3f1
SHA256ed965dea27a813420a85efb1ce937291d4dcef592dc84c62782fe713ea829306
SHA512cc905d138bf95d62e103d4da18c8af79b47ef167a8bcbcae101633cb74e54e993540dbfe955a8ed4af186498d709372bc2e9aa9e19a67647a8b7a81e150c187d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b