Analysis
-
max time kernel
142s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 17:22
Static task
static1
Behavioral task
behavioral1
Sample
144328c1f97b1bc8702d75767c24ef01_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
144328c1f97b1bc8702d75767c24ef01_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
144328c1f97b1bc8702d75767c24ef01_JaffaCakes118.html
-
Size
139KB
-
MD5
144328c1f97b1bc8702d75767c24ef01
-
SHA1
cf6945fcb097e40f150a9f78abdfd18cc18fb09c
-
SHA256
9b22be54a71c42b3386c20719128b367f370e27ee19563e86ba9c1abc934c280
-
SHA512
70bedc5d55bf3a753cb20ade7760022432288961570c2f412663a10174174b3fb9aad73e93746083974e3a06edc4bc7894933c8103678d008e9e91720e2aafee
-
SSDEEP
1536:S6p9nIheDUhlV4/yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJA:S6H/yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434224439" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000007721315ae60d4c9a720ae13ebc19e4838c1cb8d34248b85200951c42f0d9396e000000000e8000000002000020000000e99f63b54feed16898eccb6a682d7b4ddb8dbd9eff992737d7357547f859ff78200000003e59f557b36fb4490b6ddb2ab23e3e56f9be982f00ca9f111606e475f4331ea240000000f661ab477d29de956cfa741a4e6c52b2c87814039607f4fcc80bb06bf08f5fe3b2ab00d0a6f28a6aa3a0de1080b3d3fa7ff1decad541466c5d9e166194f9a1eb iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a08b26608216db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4932DF71-8275-11EF-8CC8-424588269AE0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3024 iexplore.exe 3024 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2748 3024 iexplore.exe 30 PID 3024 wrote to memory of 2748 3024 iexplore.exe 30 PID 3024 wrote to memory of 2748 3024 iexplore.exe 30 PID 3024 wrote to memory of 2748 3024 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\144328c1f97b1bc8702d75767c24ef01_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa1c14b6ee095fa07f80fa72706bd571
SHA120576980b73f7dd9b46b25b218ed4d871a82c605
SHA25640efedfb6d18f3ae6ec59fe1500c6164ca3e9712abf9b80d5411c02e8faf8616
SHA51202690953be00f2efa02383db6460fda6ab089d24495a0cfc38dbb75e84f9437c45dad6aada9aeefda5cca8977f4501c92214a9a077bb5ad5fe688f38e7a64ced
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597049cef2133b6446d6ecbed0c0411ab
SHA1d0e5a5307d55cc57f456045eca7cae9fc30bf517
SHA256563389f0fe677f2be2c1365624a76e540950c13349ee7240782a53a772899706
SHA512185f22389ce4dff20021b59c24d865214c0b837bc5c0c7a60ded6825f90e8cf4494ae2188439190c7cf4d23446698c9879048705d7d5476bcdd2e8724f691ba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5879c6013adbbb5aef4b7813ad190307b
SHA15ef3026e8571a62862272f3028a995f5c44a3467
SHA25648cd79ec6dd30b25efdb82cab3b93d4c99e561c9a47f49ba84f47a1192865f79
SHA512415a371ee0c41ffb37cbbe2b605e670c1d0509bec9370a7f99f89407c43a35e023fd317168a57702fbf567e03c31240a602b6eebddc10e43895957ffae52a9fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586dacf69749d9b23f96236b17abb1658
SHA1bf66a38314f876a6defe2fbab1af60cd73e93e83
SHA2563ef2311563f3fd34ec080cb6048fb0a1648dc6924cc8ad03dff91aa300637148
SHA5120373393afbb0d7b10f08d5853e6f29d60d4d0d0268a8c1fbe3ae7fad7d84f8fde924bd3790f0c049311f26ca44d1ba05aab29752a3d172a5102206c22601558e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cb7d9707c30fac11779127d13f2e2f7
SHA142d08a998a114f5ee7333f66434281ff41f93f8e
SHA256fb036167a6623bec649a11fca95c9200bbeb1573c8a42042f1b661a0542af4a0
SHA5123680eb9a529706439bbf13d9b3a7d33db2addf2afc874888a269ad01e1d1678259f16d2e55f5aee15c5487c4548584f24c70893ea48c1bb5b4921bdd4d8f445a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fdb84431d7a9638664ca1f7cfa1b3be
SHA1d0ccb4dd670e81e2a9f6e008aeede92c417fcd69
SHA2564860fbbf7994147308137bcc5f05a2e276a74153b36ee4049e07934e627a0fac
SHA512b7a4471d57023621060093679ba05ad9361c2b9905e418507740cd1ad94df53185794a98d2f6ba720e296c8e028afc793c60f769ac2599e08a8f6b713bc9581e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ec695232cfb74925ff6a89fbb82bb66
SHA10275cd948d276cedc051aa4597cfe41f2ec6d68b
SHA256b1bab544f3ed0287f0967270ee1a7d8688f9fbf8701382acbc6182607fd4fcde
SHA51267fa9013b88e9fbb362698b092b59ef831b72b58dfbe2bad0ac4c04a1fee67e2558c2df53d2c2edb231c5ddc9069fd1409654d478e94074c20b7ae3334148853
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511e92c6a14ca619800ab7d90cff4c843
SHA197d8bb2b298bc37f1a640209fe39c52ba65af67d
SHA2566dad80e11876e1ca8275e134df98391a1992e20157fb1aaa601c1c2c24ed3167
SHA51229c38b42796f3c495754c3d66f7f30e453758f6536153ce76e78a04066a43d46cc94c38a573bfe5d55d0d198b16f562e51aa25602528b26a84bef1a53f94516e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eac72d6ad9cf54392a65a30004ceeb64
SHA1e8089bc7de180dd8d4fe0bc72a7fac210438f054
SHA256dd28a1bee1b8d8c1c47f286284dc573d4f84ace5b8eaa718bc0c0282f67a1486
SHA5120099ff1c85f087076edad5c7a825244f420c4da927020442719fbed05e1dc697d6f3a850e8913abc4395811fe525abde3e662d931cc8f31fe42b246f6fc94667
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526ffad10e119bc4dc31c30f879245cdd
SHA176abf43319bc21881b3ff55d2a00234d3d24b945
SHA256f8b77603bda7e558f0c2c82da9ce1dd38144a5ca6fb36a584c91181e3e49593b
SHA5124bfce56340226a0de5fbe12fcf0bb186b749c377e9124874578a59613d54f11687946de2d67a57979b02e4d3527b64917e8cd6c556ac09cc05ea992475f66d10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd0ae6a2e0d3d519713930890003c47c
SHA1abd92ccdf0ad070fcc82fa25fe19704d42471cf3
SHA2561b28a3fb26d58deb942d25240ca84bdca359698779ace5e010c1040ba7dcc58d
SHA512f9357164c2c3ab9db948d0c07f2f9c7c8453df3e7b418b9e38af6315e4f9c7918b2305743d90f3b28d4f0dc361317b5211b952a65f1bf2ef728dd61340b3b45b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522d817a09fa26c6ad666d12417ec43d5
SHA18f02b84dd9676931e52095f8b754e76cc3a8d808
SHA2565ffea3b3db1fe18985e992c9f9c685e912d2e085f86a461296e019736e2b7f8a
SHA512207d1748ea83923e98cd9de5d244f9d5312bc4bfcaef27677fbf9481336f77325fc15a0e40ae36a62e28edbfa6929c0e4e5dae8e5a4ffb5108e5f46103182b33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53902fd15351479b088be9c41c3966c72
SHA1d595e7bfc3aeedc8e550df227ff024c85c930339
SHA2567ea22f3c2cea562973dc91beac02ab37afeeabca39381634b7b0d894520940fc
SHA512a677bc41b935da7cad345ebc4a3338eee08c401611089a6065399d5022d3c01a561dbd50641fc9d8b084259e651ce4a2e7f1605640ef8133737833d5b64a675b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfc19f2d5113226319250f6f9ac17b54
SHA10ac5548a04c06fc3590523b6e90fb270c530ca90
SHA2567815b5f7587f545a119fdd26b68a8dcf65846cabcd1e22a7826d67a237593c9d
SHA51273b11bc64cb2914ad467e040e07fae564d43c46b9b4f72ca5016e4415568cde2005b1975a0367a109e645cf37c38103f6741224b067f669327c6f6bbaea1b423
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554710f7e2898d103fa451df71050bf23
SHA1b785eff0182a59820f6d3923c3f80046ea37ca9c
SHA2565f3e06af5810bdf112b9900bda1fc9dd53a77f789e678c5ec636fcc9c000e7ad
SHA5126e390f8ef60cec9bdbbd3d9249658e359f14c383c06096a7e41a31d2ebea6ba9ff0b98dfd07a19997301f7240f1dc79f808f242237f637d07b16d1b10e60947d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514878a478bad1ad4717a8a082bcf8002
SHA1a88a6cdd78621049f2f95147647701a6eccc72e0
SHA2569ccc1c49e2683ff0590bdd15d592bdf8e560f4a85c8353b043e5ac1b7f4f3479
SHA5126c044ec4b47187a223b62f29d917d8f7423d7a93abc3398141eed0c8239f9ace9772cd2cbc50402a6b8d088dc19f8f6f9e4b10b75668bd24ad21b658ff1dd293
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5922f0234a856e39a7594baea471e308e
SHA114249f1644f54df5644aa6617481f2707abcbed7
SHA256d9f013eef167cc7ad6b0d2de89f6d1bd18e28d6e7791316d9aba4219a7558e1b
SHA51259674e0443fc97fee3268962aac1fac63c111f07e76f390eeedee01be3fba299ef7ce4726f2b904bd3cf2bd59bfdd1ade8445e960f3cc0b748adbeb4a5579e38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce67b46321900b7bc48a61010577fc0e
SHA1e1db49787f31dd51c6d2594accf0314ed7c809c4
SHA2565992852380e0370aca1fe53df22427810fb268bec23d9c576d1e6d3532cfe866
SHA51208e3e957a1ed9289bb9d4c57d1c296d52dd58ba92036eb214395b8a0fbccfe8e160f6458c88832d5109fd26cd6eb9d6b1dfb79f30db3e4a247f9ca13aff5e147
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b