Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 10:18
Static task
static1
Behavioral task
behavioral1
Sample
1747bbe8aab9f194cc426415ffcad496_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
1747bbe8aab9f194cc426415ffcad496_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
1747bbe8aab9f194cc426415ffcad496_JaffaCakes118.html
-
Size
10KB
-
MD5
1747bbe8aab9f194cc426415ffcad496
-
SHA1
2a9bad3f031c493c317bd3bf1ba79b186f8db43f
-
SHA256
75e7fd54d096d5f5eaef856f3f37f0e27af0b0de4a4b8941e9f5942c190bdd25
-
SHA512
15c97cf1723356228ff87134b04f7745ab7479e8861613420eb4949fcebffd57798a56b94817412bb50553fd9fe2dd0c2ebc1baba7b0033e3ae2fa86c2ec8afc
-
SSDEEP
96:uzVs+ux7KELLY1k9o84d12ef7CSTURzfym/Hl5mX1mtTBR8BqYEBV1BBBoB1aZBl:csz7KEAYS/3gaFlYqDlWN9okYBb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000031fc50b766b1794eb7f5732ca7f73a8e0000000002000000000010660000000100002000000075c8f89558812887644046556b3eda741c5078a69980caa13ebfc84f5dfd9da3000000000e8000000002000020000000bf2487ba407cefbe0aee030c49a34929b708ec42c776380655769c50e590ea4590000000f0bf3335964b7946e9fe3440ecb183178cf73aa9e389f9d0e2dd16a6f1a4fba129388da226d61aa723a72580dae29862a3d62468e1fba942ebec5efd6a140a8e3be48f517bb72b7eb6ea782b26596611503e05ba45f6b8d2aa4e21382c5711038def29af2388760822f045acb50b930e60ba578f3e752afdbfcb3260849f3cc432f07daf4714916398bea7ec9719ec33400000002d446de10c93efc531c18827f3dc60c27bb3875e78e6354f9a75dc0d833a875acba4fed2eea44b37c722dc1bf4a15f900018cc04773de886b6f088bf5db38a38 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434285399" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{379D4141-8303-11EF-BDFE-E649859EC46C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 601f230e1017db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000031fc50b766b1794eb7f5732ca7f73a8e00000000020000000000106600000001000020000000d957e0b836596969dd89a5ee8ed0b6e11b4a58e69567d9933806c111b49f39a4000000000e8000000002000020000000b5986e6aeddb4551579cf5314b486e7e7a813572fcdcd51b9aac65462b0693a820000000784d3e1a60fb42effd1c548736479475075c13e93c53135672b4923fbe6ec9d0400000002f063f2c89ca65f0c004e7ff32ebad9b76ef579e9dd2f90ce5a0c98f229a90b29dbe50d4becdc7532ebf8eedf61dbab4c2d2cd9fd543c1b6f2e50fa52afb61ff iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1692 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1692 iexplore.exe 1692 iexplore.exe 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1692 wrote to memory of 2072 1692 iexplore.exe 30 PID 1692 wrote to memory of 2072 1692 iexplore.exe 30 PID 1692 wrote to memory of 2072 1692 iexplore.exe 30 PID 1692 wrote to memory of 2072 1692 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1747bbe8aab9f194cc426415ffcad496_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1692 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dc19247989d051c3515eae32998c8f6
SHA116420730191bc69e65b8ff8165dc0c41dd3ac74d
SHA256bacac44e849039c99ac2fc454aa6f93954217cb9e5f297567bbb68d92f4e5593
SHA512781f956726313e7f5e505987cdf94f058a4d80a1e9b8b1346612df450c0dc133d809cacff5acbccf238af4ff1390da98f1c4921e053602bc7d2d0cbf4d788a3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543cab553ef7138a02aabed7638145bc8
SHA1f5c953554b991884b92949827901db8c2d76acc6
SHA2560439b0d6e3f33eb27caea06cd429b2440be44ff46c20e026db489076dd37cd41
SHA51256bcf3155a3235f96f4189904f53ccc1d4dff68cb115730b5013a026373e05600f6824a6b2a1f1937c6d7a6078ba7d0deab4af936939e2b28d258e030e0017dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5469f1069ce4a2ed2f09e8886cee3e650
SHA15e6cf007d4f68685265e6a5005a0fb89b153f3d8
SHA2560e84c2c09790f6a1d83adc2cb63b461178970a5d128654003b4c02c8795b378d
SHA512c7d01f00fac2da07d9b976dde419a6b2e8babce1f795e5b29de1cf2067ea448ed3f13946cc9932abcea669e85d8bb9cbebc60aa5a67dcabae25f1433eff3ff31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5622ef5cc7dcaa22d0229d5682c54aa7c
SHA1c1c2a4d6b62e50642fec06e3d8e3c2ddd22844e7
SHA256a05ed07f9a9852386da4ce81c1b4b655be7a6eb15e8d3f576cd735d55427a73c
SHA512c4083a44f14dd51bc3e7225bf8d9fe0f5dd993481ffd3d89d701089b9c952c5eb3282c1bd3b7c1364ea9c61df94cf37812a86b2878ac8856e410eeb03e988129
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed7a27f969bf210b7aad3b863f8184cc
SHA10bf8ae3b7b55dde7272cbec7aaabdd5288aa6ab6
SHA2560b4d8433aef4c17fe3adfe17c3fb30f5fee7ea1241fb2a131e44d61e14a8fcc4
SHA5126e412385b11d4aa3d69be6b73fc5479f92e0c62d6b8ac3a096ff5bb0cbb1ae8ef70dcc6d5521af7aa90e4ee99cedaa00e4a4133fe5952d03e0ee92e3d126989c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5f8ab76a147be8766c742b7adcbe33e
SHA1d5c19b0af991035dbe0d8d6ac26a2e3d08ddda5b
SHA256a927aabad81fe5e011bbdbdda4eb9d021d0ec70118f9da7c3c175b579fb41400
SHA5123c58331b3d8f229cc9752b4ab592563c2efedee536af5a420524a442cc1f75c1480400c4c299c4a9aea40fe48de94f8ed9f5680500d6403bcabcdb812e8c5ca2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfb3a20620c745bbb9ca8bde60cf9b64
SHA1a2577a46f57e61b45d9acfaa2754a21f59c4a254
SHA256582f6588906373ca7c919ae5300d24ef4d980dcd93e05ca9ef55c596ba81d09c
SHA5126e22ec4b60448ad97a08a30a4f7823b706b8f04e7d71ba8364f53092ed434dbd6049c8790b49afbef3d9307616326a9888fff611bcff1fc4448f203fd51665bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576dd36af52f0abb7ac612ac6e7981265
SHA10020f08fcf2d33eb2bdde357207eabb2bb09a90b
SHA2561589e77d375473643803498ead7e2b5a0ccd933751dea960921db881b281b8be
SHA5121b66ead6ae4a0cbdc2e2502705017f9acf542263276c5d476b060f8d23b1255896742c4fc4e919a85367709b1e7f40842203094a5e2d9b169e67efd557ab9f99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ab7af4624a366d6b9f9858b64444dc0
SHA1e1c671054651fb1a1137baa170281cb25e883547
SHA2564b558c31fc9b4d3be60bfa91d16925fd91e958616b63a21d3048aed0d1ca6cca
SHA512eeda080f203aded0f847ceff519c73b52f9b9acd0b528556211c3f6b7f8154f6bd813bcd05652ddc2f192c171d1cba9972eae74a11c699c80d4ca6cf8e36c21e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f9a0c025dd1620d5566c3ee65e17323
SHA1c156c479c6522a363051f0044f565443d6c8a0d3
SHA256320785673eed8c941909b76215f682b641e7ffb9d9b21c93a0624b97d52e9b1e
SHA512d19954a49980c260514e00dfe8ad61d6559095b80bdda775b2177889a401da4ee8e1ad91e0a02609de183946d9037ebf471b61c0c8f161516ec894b6405298db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57473ba529d40969b39dc6559b581e49d
SHA1ddd865624de5ba7b676c718fd9f660c950cb2830
SHA256cd4e997673ebb8d4d9b23e1f1671b15dadaccc682cad3c3242d99322b3b8e958
SHA5128964a1bf6c0bd371a1d7c873581cdd88b96a82015f27d1a50bfc0b4e7241bc04b2f4e771fa395802952d5ab88082c17dd75dedb2c21be663f295fabb11b41a59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4c316f9b29b35ff7aaec50cb6133d81
SHA19664fe38a9ef8cc419b6a26e01c01848dde4957c
SHA2566c17c1ecdf010b5f90d958c34c5c64673fc0370994e374e2b022c6aad69b3082
SHA5127db4ecc5890bc3431bf4a8819377c55cf9e488bb508c0856f3ac626b8b3fc3b4f5b81ffb364bf1ae1756b184fcadada9c13030f3c336c54eabd638eab08aa489
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef2ad3d19796b383391beee80fa3fa46
SHA15af030ab378d5390121a7069e3a267c9c81c131f
SHA256a1ab25b86e0700a0f1f4f52279c819b4f7c486f6373521e15c87bc3cc2e78798
SHA512f450a60bacea0ee7af7313c956bfaf855520b9d10d6c8de95b10bc3e704e89c2f92aef26ae7c0fcdc419864608db2f1ac83912c5332db8a947f013c172b12eea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bee33b9be68d42f930f5b7ec78ed87a
SHA149d9442dccfe693d66a4cc2708674c66525c102d
SHA25634a65211ca006e6d3431bc52b88527341fd05174ffc1bb4696e8b3d82662c787
SHA512755794914a1fd6471be252a7348effedf87820a81723a6bb76d726b0c619aa4737085ba0fc0d4055651c5eda6c4092baf41ebc049a920b541fc2251bf1f42ecc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1b7e8e48b425a9d98520c08a34195a0
SHA1a72f415b4368635ea522fbc5a5b73b329773a05d
SHA2563a5ed51b7570c50401ae8b320ea569b63728a6323c842f90ba565d45e462435e
SHA512da742d5e2ead2bbd899114a5254e6bf918cc0c0f9c496714fd5df8696d9bd60982f9e8c9bdf8ed74fa9a8772ac5398f14e30ff4f20a3f0623eb10ec1f1ae28b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514edb3be21a5a6064bf042b67bca7c8f
SHA1d92097e1884913428d20cb932de4da56bd31a66d
SHA256d7685f33b87c5a1e449c9b6df05eab1d0efd02adc4cc9c50ab14877a23f5a28a
SHA51296172dbe578aed2c9a9ae4f7353960739a70692b7cee90d94dc3c70b950621ba08f08f95568b2d172c575e2b9e7e6a07afdec95775b4d576d9671d7b4a197538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554bf1fe8aeb32e72804d24e140dcd262
SHA17181a32461beef33b5117c64767f2255e767f403
SHA2565fc15e5454002dece23483333df7b2764874c04ee4a6a0dedea534dc4ad1a47e
SHA512256418c41929e3ee7fd0da59b1634c51159c11e12d3f72dffb19adf8bab89402b832c047cff68d11ff32bc2f2e89bb2a0b2c87fb99ea7691ad8773cc04cb6dda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad55f6dcb0c3eb741a190b8fbec04dcb
SHA17cb4956198abedd1f9c4fd80dee2eebad2a2ed45
SHA2563699dc3b2c0d7e09255d04fbd6d1cc3ed9853847b0ddbebed511d2a4b91060fd
SHA5120318a7c49c247edf5b544cc3e6b46c58b48711f6ea7f0719dfd34dfbe382a9a27c20f6e9d76ad24fdfa0b0c88fd050283de4327df51b15bc11354c099bf631fa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b