Analysis
-
max time kernel
71s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-10-2024 08:25
Static task
static1
Behavioral task
behavioral1
Sample
16ed58aea9d730bae8bd1b417ac6962a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
16ed58aea9d730bae8bd1b417ac6962a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
16ed58aea9d730bae8bd1b417ac6962a_JaffaCakes118.html
-
Size
18KB
-
MD5
16ed58aea9d730bae8bd1b417ac6962a
-
SHA1
619c3be653dab8ee90c664692bad7420b21016f3
-
SHA256
939ccf20bf22c4caf9b989016f92448827e5e46ad745d4b6c260c0164fb56dfb
-
SHA512
6ae3630599a2acd1cecf62aca3e11de57f753cbfd03031cfb9db8b155c7a9eee7370bf99af0aacfd4cd0e6722887075babe4d1963e777620b64a7d5612fb483e
-
SSDEEP
384:w+dOqti0VuZKsDXRU314ahV8f8k5yPTwOiyIMat9sd9ORi0LuZz2oV:w9r02tm14ahVLF0Er
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 405abe3f0017db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6AA15321-82F3-11EF-80EF-5A85C185DB3E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000bf449979e9493a731214830a87af24fe68407eae321794fded9b323428babdbd000000000e800000000200002000000061f2de62ef2ebe3275e73f3854586696f2c25714d7089b43c388602eea43f3ab2000000032af909aad96d0244513d26c0d16487451a78d1d47e1c08c5a058dbee09ad427400000009cf986455a25455284f05b2caf00587c0b313d7e11b796f056dfbacbd05f4891800a43858692b31a04f83e0b5f098c3cd81df1970c156f897b1b5143791a1466 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434278613" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 584 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 584 iexplore.exe 584 iexplore.exe 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 584 wrote to memory of 2144 584 iexplore.exe 30 PID 584 wrote to memory of 2144 584 iexplore.exe 30 PID 584 wrote to memory of 2144 584 iexplore.exe 30 PID 584 wrote to memory of 2144 584 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\16ed58aea9d730bae8bd1b417ac6962a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:584 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f746abd72b1e248c54e633ad33e18ef
SHA12a6ab243d7dc02364c5f40b8a542c7578f97de20
SHA2568a1c0a05808be045096997a6930de30b36440aacf6d020d54c1e4e1004805ee4
SHA51202a6ab81e66f8b84c34f79b11a14677956ec4ae8dc0cb7f825653d0611d1413574c3d79b27f70bd5cecdf5665e58e476d3357c424d8d3e35defc8c2e9006553d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c74db514ac29aee781c483de31457f1
SHA1d35605fa57bb7928a141a9ffdc4aff5b97006110
SHA25660afcc807b42302afe3eab959f6247d66f53b3c384dbc3d2f460355a40339067
SHA512b8e9356fc2f88e65c9f2b21abe760ad308d12143118e6ca2db076a36cd1e75aee8b1704b9d7df72b44cc6d36f20328209212a13b9cd1e7602e111865500d2ac3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e85138df478ce05a4d2e5caa3631c745
SHA1c06ac4b4843ad5bfe11a42f5f1d1a9de14a2fae2
SHA2561662dea30339f6b42695568c5056be6debac2507cc572750729405b9fc533a6b
SHA512ee6a275bebd07ffe1677af20ae9123ffff4933de79d24b8fe5a405a71bd845bbe29a988297405eff8e3f5cecee56c1bf896ef4c5a5558ed1f0475f14957d9066
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fa85b6273cb51e44b1b4a78fe218a22
SHA1f39f02772ccdd72b7e9ffba8f2cfb60115905255
SHA256be0c997a35dfa4433886f987f50a0a87af7a948cf0613827b98c186fcc5fbf36
SHA51297740fe628358230f5178d2290a46c59606fef94070c4847780c7f0b096b365cb675321b7ab5b8b341779cae5e1dbb0cea2fde8652ca5161d56d6fef41d58e0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aceaafb0f3b7075d80274c65f18acc95
SHA1fd6c7e69b263a2a3914b6bc82efd72720940dc82
SHA256cf95b449f134e1b9c127d2effdb2af2354ceaafa9ba6681083afeecfc235b06e
SHA51255dc50d4422a6822484c17dbc79c98f81f3c489bc3d2686c3c26237f297a63aa52ed129cd7847b001ba439b794f1632a668d8675783c1034b244dedc4d4db1e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511fc8348092c97454c1852f5a2eb4ac9
SHA1bc36b62d40954645aaa4937a0826e66dd5931a09
SHA256d30d0a0be0ead8d993a015cc2cbd6c7ea02cc17599ff747f4ae3b8daeea6872f
SHA5120f12190e316ce79144dddd3fc471d09ea254c016f82f6e4f9e5a920aaad17e1282f015d8be3b6fa18e41efd195741d52723e94ae0d0cf009ba6f4fe317cb66fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591ea92ee838d525c00a774a14b402dec
SHA13a50c65c47d0163255649f1f9a4063070faa8ad9
SHA2566eabb2c674fadc454d5ab7be12458ea73551931f4545ac33db989689f1cdfe41
SHA5126fe853b9ecba831f58ec67bc88156dc85ae88cce5882fcb3589b42975f1e9efa99456c0096b2ecb429033a4892542427b4e5a8abf6c8e6862a2a923155797f1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebfc5f53e51af400e423f5a2b45ffd07
SHA1e515dcb86d38a34e7e1d4f02664e07e2f1acd3e7
SHA2568811814ef45eab71f60b1cb76123e2a7e044710aa6d5f281554f5bc4ef3fab13
SHA512bdf08626580f6f308ff8b45b598d4f564bc95461797a1f53b125c9066978848e258b86b48111d0399027aee2d5c127a3fcfc605b0f87e2ce7fe276b23a926e17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f69091e72569315d0bf87c4cccc13490
SHA13dc0a621b634f5e3c78f98e1a2e50ecbe7d0acac
SHA256b9377700295c879a2bd028dcea6684754fbd247c27be1033de10d0894fd457bd
SHA512ed05ef1e53ad6fd818917521af77a7155fba33e3d52c92bbc7973be64dbe9d5d56117c81aeb74495f6502223314337619e866099056ae72f1ddc2ac2e8cde8e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dc4a1673eeda9741295f4a989e68401
SHA1c14620a6b4deecd545bbd8faa1e4f8569eb47aa2
SHA256576d2f6e7a9b49fd4db414c1ead50e4cb23c08388890bd4304948a4d5b745a9e
SHA51224ff8e8e83f4f0653786954f49fcf871de36aeade21bb08358338078a74b90295748e9836b27c557379ead90029b3bf0e97ceab381968d73332da6eb21eff462
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a587a8154e9111fdb97ad9b99c97d3d1
SHA1be7ea2399fbe8930c13fc46d24d4ee90c985b8c4
SHA2564d851021d5bfd14efde471a7ba422e130526158a27515440c4b0a16ca441c90f
SHA5122920198db09fba4271791eaacf41eef80622db178f46b1d2c4a88ea0a606f8dbdd52c7b87e13780215de02c1929a713619740df7d388c2138f99b23f380c155c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b62e4a2ab61309e46fb8d6ad1892c0f
SHA13b314381cf0a226e10c039469db881a1f28e8a6e
SHA256a5cd7cb63db5f2f2c7b4d7740b9018d2bc1a631f9f2610f3042cbe8abf9ad12b
SHA5123fc868c619cd1ebd56f9b33c060fc13efbd6b4acbbba8b650b7daf302a412395e60efea117c72a1c8e93d6abd36aeabcb7b687fea04dbb06d26524af4d13d2e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d093bbdd6c6af122e07b89b8edf80f5
SHA13abc62f621555939a500c04ee07cd023e27f3510
SHA2560d1c9580a3efb6791613373dbcc310096c2ce645f427ab1852e830e738641242
SHA5122db36a897931a3d7837e2de41d065d465089a5e84a7e8330b998666f8b217e0f503db4b6ecf816381dbf4788553ae0ed21b2adccc8c122fc00d67bc01cbf3560
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547e707d5f91c7ef5fcd3dcd104134f43
SHA19cdf0a400155fc5250e865855dc41ff830b1e45b
SHA25659a75e9b06b5df71752480bdaedb13c2a7cd550f4c2d572f5854de217afef801
SHA512a06ebe8cb5238257d8087a4fd2de795ac4c0da5cef153059ad9eb13ec243efdacee32aea0a85cfb532c2b477853e7caa1c0a41a5a840091db64b5118f8dc21df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520c627866cf360c2ba69f1603eb31fb6
SHA12926530cefe32b75b9d7bdc21d581d9e72721e25
SHA25627075c6e33f34e37cd7dafd28c1ae14e14da4878c639fda4a1b8c541d4e7e659
SHA51285fb34d46eeea5ed28c59b00bc5cd7d118994fa651abb7197a4f97ccde3c0a1ca2f8d3f100035d133a4a6a8b56748f4a0e693e513616ee5509d42f57bdc5e2d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7ad26b67a349f51b30c8eb0b8a43b52
SHA1f0bf014da30dd9c40475dfe4adcb5f557f4aad18
SHA256731851114a4a51b18fbd78ba204bafc8f545ddfdd152ae44ca48dea8e208492b
SHA512dcf769a7b7b3a7ad72e081d5c36ecb14154c490644b8b5ebe9cbd43f99a18d44c5213b57555a67f165bd365702abfa2534c6a80320e5acdb5267f4a41c0929bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7f27123a6ecce427c454f0aca8854c7
SHA162e0792f0a1b89514b4765acb0c2c87df664e131
SHA25666ba0b3320dff693e88a75efe761d6552d3f1d28057db447e612299ffdf6b44a
SHA5120ef6460413a73f300a88ba7c32406e6e6e89967e12d87d5eda2d5bc52f281c8f749904fc17c7681983bbd88e6bebb3712ac19f4a506b868951d86b42de86c158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548d6e50c959bb3a946c577cecef0c670
SHA1882c760da60815b488f22e26709ce87a782e301f
SHA256151c8506dfcfda5a19ccd1487da807628449843cb9f158a05cfd793e728faa3f
SHA512ca15617fb709c2893b2010c48e0882533d59a7e0e03a204da921475ab9a2c1530e1cd6c4fa9358b54e90d2b494623e53079e8f5b09edf2b548cc671705ed51da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58089d3d11fb4a5d61bb4f471d666b086
SHA129a5e7622657ef1a387ddbd3640ca0d5173e5d4d
SHA2562804ee2f067e39462afee99bc9dd970cd1bf79d30b44c27a6044576a9794ef79
SHA512a774d9db239a6e5a48de089ef9855e1229ce2cd3d35676136281963c88d363b452fdff075b2e496074d70bf13dbd46e026ee03ded06e4657638d97236c42d939
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e85b82cd0a5dd942db38097942f960af
SHA1826787220cbfec2208d06a3257bbf9be424016f9
SHA25690dec4c95bb5ef11e0b9c9fe97ae05c6e9da2c0874110553e41f4864bd825cb3
SHA51272e18e95ca0894ffa479997e73ff58bd47dea5da7fd6d4c872aef7ccebd1c29712a08b3cb8572acc44f18bf6518f85e20a98d578415e13902b4408e86461d1a6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b