Analysis
-
max time kernel
68s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-10-2024 04:23
Static task
static1
Behavioral task
behavioral1
Sample
162428370deb67377bd8323f1cb54eca_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
162428370deb67377bd8323f1cb54eca_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
162428370deb67377bd8323f1cb54eca_JaffaCakes118.html
-
Size
745B
-
MD5
162428370deb67377bd8323f1cb54eca
-
SHA1
19e0fda664a2dbc40a666bb1d6c439c8156ff2b6
-
SHA256
aadb42e40f1b308684ab60e3ea10e8834604da0ff6e7e957ba8331fb3444c315
-
SHA512
f7918d237dd27c3dbee3edd296c5201fa48b961f35105ac87a76f754e6c137f306a0c06d665dbb549cd0630d4c36562c8c313f461641314d7781b84a45323969
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0716b54de16db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9036E091-82D1-11EF-9218-EAF933E40231} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434264074" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000254b018d34177e17b13451ac720505785f2e6ca036e38fda90c5c0f8c0f49fdf000000000e80000000020000200000005abb3f568d01a7387b0b9103f2037d917ec48cb0153a0f6fa14e1d0bc445391020000000517a302d46f40d54691e310890d98f5c0aa64993fe057dbd36923f91658b894a400000007006957e856557433d07c99ad6a6fcfb23c60ad6298e917b1d434656e931f945c1b2adf4eead92d69fc8ee8987cd9c42ca9b5c9794a6518f024fef9280370dd6 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 280 iexplore.exe 280 iexplore.exe 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 280 wrote to memory of 2328 280 iexplore.exe 29 PID 280 wrote to memory of 2328 280 iexplore.exe 29 PID 280 wrote to memory of 2328 280 iexplore.exe 29 PID 280 wrote to memory of 2328 280 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\162428370deb67377bd8323f1cb54eca_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:280 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5466fcb67fd714daf2bb16dc281cabcff
SHA196e63518a226c7271c629d6dc879e5bbf81e855f
SHA25677caee65c4905d247f42b15695894e3323d42da8cade4d31ed4109a7bbecca24
SHA512e719aa24092ee6b3077500a06a79bff5e999a3481cffc8f382cf675ae8ccaa7dda9264dd8342a026473aefe66532dbd5f690c9d63fb8bea2664aa1c4420c78f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5454357f9265d28ce7866117493dbbf
SHA1d20930753c0f1330ebb31b1fd585f2e5bbed0a3b
SHA256ba64b80e2ffc012f761e4e43ea1eb76e64b38097137a0567ace8b5f17b83be90
SHA512f592b606c170f7a71a69b0943961d80d4ab4702471216f1c0cb5f85bf0c5de9b0286ff11447d7aecb2b91e2dc828c9af43ae35eb454ef5c49ef8d4a0f370e1e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4309d2bb1b7a648e04184ce6291ea6e
SHA1e85c727043e8fce4fb65bec569deab41ab78c851
SHA2563fc01532ca5ee17daeff66236e84e43369a184dffaccd95bbfc994a2bda9e2c3
SHA51297a6642cf1567d8b2600c73769734119694553cff2e6c4ee12f44b9976020b1e966672cf953fad81e3249464df0b055ec6b0cec6772302511d2a22bd5e51b514
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54793e1041c18373ab9af185a67e724a2
SHA1df25385bf7847737ed089413844e43d04637a98e
SHA256a8523822b16edf9467877f289a0afd1f9757173c5919d2c0bafa87bb780ec4b9
SHA512c04f90cc3866f5dc317966fa3990b3e33c2ec861e2a013f98aa3f761a3c2a2f505b2b552300c89bc9cfe072c9a5aa29776aebb150149b09a29b2216764d2a5f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2816ef2a6e967d628350fb9c41e3fc8
SHA1b5720c108615a2e102654842b4efc4271fd52723
SHA2567a1f457967201766470c92ad0dd5631686e069a510373d93c076121007b392e1
SHA51232c1bf96d85a10a015065439c845b0a60ecdbca7db3b2c11aeb490ab07c88776adb1ba7cfd2152504432d6658df7aba31984f9612c76631b4fa1b4f279dc347e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d9592e0c63ab1185fd8755420030588
SHA1c42094cbf8d1a3f058e3eced4a631cc3d99c9e3a
SHA256e6d3c61680097a91c4294b6c2ef974a60c6c13d257d537b1e7be65b6fea4e7d0
SHA51242fc522881a3374838a8fde9d53dbb2b376a8c0d0beaead89457c0e3ce8bd1e1fed0121e0ab279d079a47e7192ec8fc16580972c0351d1817a35ebf6951ac809
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd7aeab40e24e92ef57f96247a94469d
SHA14defaf575351002cd9cf6e2634939dd8d871b943
SHA256dbf925ab8d78e1edef8622f688b6c72185fabb601118501bd6c8ca91788ceded
SHA512a8ab2ab44359d16c3559cf43b74292b48d87eb5de29d703615fd23a938919ffc6acd858a7b36fbf2453a745e02994751c197f57a0f3f6fe85c9c6bf416b8845d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5a284050a18bc561ea26b707c487497
SHA10cd363eec4bea717a0498ab7883f73d8a3d15a1c
SHA2569a2caf5523a366da14f3254e159b2973b619ce23b2380d5f781f285a851c0fa8
SHA5122c1b53ea402c5b89df6bdb5573fad12f3877ec60573bc5051069b4c8d717ada548bd1200aad60fafa350b3b17f06bfb51d53a334ff1ee04d79547b17ad28da4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3517dc6203a29a043638f7d119586a9
SHA1eef3fe0cdaee9fd46ea0ec43167850a793546b35
SHA25635675ce999bb1b1630f7440bcab3f3a613a42dcc37d6a4e10cca5a0180b893c4
SHA5129d0a3a9d222cfef3e5b99b2210bf458d611bab69c37b2451f917a8b1bf858ca87902fdfa60732e9545639a9ecb3ef0dc7ec4a4d9c521ced2cc2a8e7b76c002c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dd27bde9d2d9fa83df62184b20c77ef
SHA1bf0781ee2c98d2217f66ea746796733b5afd1a47
SHA2566db0a192fe023aa0054dbda00d7a8d224124210610611b93c1d68817a0c00022
SHA512637c53a6b0901407068e9793f08da4c8428c08d0002841397ffd8526533f5b2de211228a43d60a28e37ea82a488db7cbefbccc34532b4011fd78a96dc677fc1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cd4f6d659114bcf723380cc2ffc904c
SHA1aaf7f9b233e270951901dad1fc766ecd0e6f7cf3
SHA2561cf88f92e46df9a8526c8eef2ef880f7f1e277095b11f452d4b463b3bffb6869
SHA5129e03fca96d0fccfe285af40e170628c64e5936e6e1761a84da906515f69ed23926b726cc631c82b95b0ddb83e1dc32d968593dd3082765adbe6f99b2f4f67ccc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b63daec0b87844961821b171449afc78
SHA1f627b46d5f60adffa8fd15b7118317afb14bbd47
SHA256527b15aee289bdebe45cba6b6091bc224ca94029b894e50de2ee27ab879529d7
SHA512b6ef729cc5b69e999a1f7f0b147a254830474de97a1f985b79fcd4bd88e42d3310db4f1947b4bb577885955997986a26b55a611e3b4f177ad4d89cdcbcbcd825
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5add739eb6316341083b3583953935805
SHA13388c0e5a4cae089315c42dae8b0449a23f55180
SHA256ae5416181cb171a93f63c3676b5eae2aabeb93a0b0fd04ad4ff3639a114eec87
SHA512c42df330a4d851563f70e0c678805f4f7c12b3c4fb0712e11d69895d9a4d7ead88443135bc2551d34e13bd068a60aa4f0cb303f89ef66f77570482b32c5f7c0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab30980afa18385444941a114e6ce149
SHA1321ebeab3ec805e2bc23cf0326a6ff5435300a60
SHA25657a9ea64849e9f3cfed72517a45799ee287d1200004a5c012a1d375df1b906f6
SHA512eb2f2d2e5de2e4c64df3d4304702e75e30d1be3832a233da2db16f891b28e725a7639b2839763e4009397ffa089055f1e6aff18b71d9a5b35390e4d0d70dc1b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f6091bbda48991c60e6f93cb09e1e71
SHA12f5ba0fda8fc4b52aba38a1f36628d495589322c
SHA2569a9a72eff4c391dc22e25b7607c6d4e7973b25f266d2cc8bb90d8ec03fa9f20a
SHA512cd387bdece0df7b7e3abbcf235c592b9695d7fbc949e07598c1a8884ac69b06b9aa25ddf79e52ef266d7f8b4fdde27446519508dcdd592f9e6c589b493ee8387
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fed847018cfb62042718fe3af4de082
SHA129bb91428c56c2a2ba7e15700ec791e0f8fec554
SHA256aa0f37cc9ebaaa0847457ceea4759bfe9430d86e53b89d5fee5f99dc3a915c22
SHA512a2e6bab4b3fb9ab152566bec6105a2f6a04481ac89111af4ae29dabbfbbf83e6f029935539b9cb34ce46e8e3a628acc717b0fe674351e663db7851a88a1d4900
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500b6bd2e91dff262c4cf11d7629d6dd5
SHA1c79f490c5ac5c8b98e7875ed4abff5942f4b3352
SHA2566bef2b40f55fccd2b85878b0d9cfa9e681863a39ee3feb8aff6811a50a8b1429
SHA5120fe6b27a508902724a94fa4c9c32e12491a3deabc254015096ec438c754e8da580c3e2b693847a3c494bbe3a92f791debc2a656ace52e9e05b2db9676eaf7dcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56693374aa5be16af7128277af7200eae
SHA1b7a99cebee9d543225f9daeafdd9d8b148d39e06
SHA256e0a78052f9477173b02513e2c660d408df0a5848c667a4901d070f13e9f5168a
SHA512923885c3806cd827e53ab02d2e3441eb84c5c8be0245bd04c2d24cd5539361e5c33700b53f0742b80c7c09d02ee2418c5a0be44fbfed92719611435df7c006a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599e36a2e9c1caa77243081b40218ca81
SHA17337a3c2ae114175a095532cfda0971b2851f662
SHA2565eb15e865ad42e0bf223aa8c443e875951607a3e616d2004aab371ea9be6a0de
SHA51284d2653b220e32990c93fd81a9dee1d16939781cdeee21fc5bced51e60300eebf92685dbdb06946768dc0a5e3006f44a33a884bd47a475aea6cd63f18c4a8c06
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b