Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-10-2024 11:13
Static task
static1
Behavioral task
behavioral1
Sample
1773bf499901f2fb98b038de4e3f9dd7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1773bf499901f2fb98b038de4e3f9dd7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
1773bf499901f2fb98b038de4e3f9dd7_JaffaCakes118.html
-
Size
53KB
-
MD5
1773bf499901f2fb98b038de4e3f9dd7
-
SHA1
72965a406dd9c3ee9694368b128920a939eeca76
-
SHA256
76750409329248b12b5a74270b638ce5ca6a7d3fda814dab4ed017100706d06d
-
SHA512
86703e5305d25080d0c72005f7f1c5c3e670f2a350ca65a94dbb6947c5ab0ef93f3b495488fa9b8e899739ccd0b738f9f5d039f630a48b20bb7459c51f9196a1
-
SSDEEP
1536:CkgUiIakTqGivi+PyUprunlYP63Nj+q5VyvR0w2AzTICbbwoE/t9M/dNwIUTDmDd:CkgUiIakTqGivi+PyUprunlYP63Nj+qa
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000a995224b89953f1d4167f515d70032e44baf7bbda00db2c7496eace4c8f64bb3000000000e80000000020000200000009b0dc3bb7323108a4799ff42447c310775fa01ef668c90bd1474021cf7afce88200000007133b82839e54b22d1f042ecfca25cc7e79cb6bc129f21e42a49929470dc04e24000000035a63bb1d891e43da5dbf66d38b3d02e9fd629d05b5da4aeaf1107904e3d36d679849410cea7724ba43caa84da4abe2aed2a7abd69a1f79c354eb9921f5c48de iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D254D021-830A-11EF-A7C1-EA7747D117E6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434288664" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0e6cfaa1717db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2508 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2508 iexplore.exe 2508 iexplore.exe 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2504 2508 iexplore.exe 30 PID 2508 wrote to memory of 2504 2508 iexplore.exe 30 PID 2508 wrote to memory of 2504 2508 iexplore.exe 30 PID 2508 wrote to memory of 2504 2508 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1773bf499901f2fb98b038de4e3f9dd7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2508 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aecc1daa171fa8917b6dd2442f704a9b
SHA1ae58c60439e60f3d347fd50c9089b91bbd49f31f
SHA256eb16b9d77e3ddcf64c5b2a5c0d018aee43fd6637e3db165c5f48cf4581662103
SHA5129148678dc5a672b7ae25a6a7d35da46c979fd1b184415cd7355a9b219e03312a06a08c2347c230d544438d49fc6c352a316b21899ed888a47fae670ad00fc25a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5983ab70d294e0dc3cb20122370db542e
SHA18beb023cbce60b7f258bd7358c4d173f5ee49d3a
SHA2562258746ad9edd336c4b7b4dcf40a5157f72a9e113ff5db224df05ad958564ec4
SHA512844c190241d6e9d754a36c97d96603a2ab47e385659a9f52a0509c40b1889a5096ef228880d03d8e80c2b3679e26925f0b3d7600e249943c92260fb59e9e4e03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8848bbf759e2ae25208be30f0a2979e
SHA1abced3a42d75ec6e8a581de6bda293eff260d18c
SHA2566edfeaccf536e722755503d8f94fc2883570bfe731b4b076accc90a4e8859662
SHA51259f48c316cafa19b4c0eb9c9d907d93bb5dee77f3c86aa2e0df24f883379bdcb33317fcd4b91c8d7db80757daff344b622bd22c34434768b7f32c24b23b8da80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac640f9cf8bc70c4c183c3fc9556b3b6
SHA110710330dd1c9ca92bc20ba019ddd70e615d3161
SHA256ef0c9d2a8749af02b71ae1687d53c45fd70fb0891c754eb10ae38b1c15b555a2
SHA512709007acecdf81b25e8970be2098ebdfa5db9bf591ba11b75e4eab8e2b871a54656e49d40e4d9aa724fd00dc05b8b9999270bb04e770e29ee682c8c0330387e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579bb736bffa8fe9a2794a529972421e0
SHA1bf9a1ab60d621f66c69738a10db3bd85e1f9afc6
SHA256dd04701968fca220e38006e3f4d9874dfd5079781b2ec0deb5444414ed28a33a
SHA5127e1d178fe40f2e75af778fcd603b03205adcc14543957c7c578caa36b41c79e4c79210c1a6a555545232f73563824d25408e10922d11e57b51e4b73ff12ac263
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583735f781756bbd450915714266f4277
SHA188a83890e28195ff426f2dd3bcab0bb14e0307cb
SHA256ba7e2933c9a9b3a60e891a181ba75bcdc7ace362f1cd27c5c8614aabf168fc56
SHA51215cd57d50d4a6e18996ad8a620c327de8061e9966611766fc0947ba8eb9331a01e3e38ffd77c2f5fb3b4154c383cc8decd2db3d0844130d8a30c7e7b9b17ad7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571f3fbc7cae9fe196aabecf6da07677d
SHA1143629617425352f9e40c4729923f4b56ab99718
SHA256e13030af3afc0430462ae6b33f5ab954a855626a754115a2d87716cbc82cb03c
SHA51264ed92e591a9379a75edb981c6ed256d58ce282fb4f92dfd829aae70815b89d12f00b3f8625fe9f6cc00b23d70409c8e2089a9944c707e4efe873c606338e877
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509dc64f09f690fc34bf8c89a39a953e8
SHA10d5501d4179e73a7237f1cedb66aa3e833545076
SHA25685fc4998446f335700cc121759172edd0d7a3806aa66c60f5272de1c55ca2c45
SHA5120417b282ea019249b84cd7851d285c6ae7b3ecbf9f3d0583d4ca4b7d8d2d994a390751dc70f045a925fabb4df966cdd45610ba9242b1c92d58a042b8aab8a10d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3b61925836d0f80004f5f13a6508d2e
SHA19140e208c05e062828a469f55689dd687299284d
SHA25681ba001319ebf357695b2d12507a745825a221e37a07bd065398b87cdbd74ee7
SHA5121d59bd4d4a63d02767e5034155491c0579e9d84b01e0cf7024a7535f99eb87afe4e8fb390cceadbae34dd45304514aca61ab26424d7c5874b29ec2d965ad5238
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a89081b2fd544c6df5c8ed15168060a
SHA1c6e2648c20495e61d227b7679979ad6ab3eed301
SHA256d8051ae57aa17e4d5a3ffb1b68f88fdeee9aa7a7ec301626e5b0a378f2e4f455
SHA512ceb8163c8d4bf06f0a777d29e26b33a2ba4020cf6eac14fcd85b1be6f00ceddc4fff9e3775b49e502dd6bd0cdbe68c06a43b021e1c28b5098b715078e762a72c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e37ca7858f2b8d6ba8a0e7a2758caad6
SHA1945a35b2dfe386561ae51a2c2477b6d32fca61ab
SHA256aa489b65cf7d9bd05f69fd8bf9c1c66e90cb04292e6ebfa6ca73ec1de22b206a
SHA512b05d45014831c779ca841ca9599f32413484d2dda9384e3bfc086aab26b6efa7d0b870df78ba901d8cafcc3f8e31008427f1114481b1d764bfce879ea0ad5df3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c000478132c36e6ea6957810fb3aaab
SHA1cb88527f88aeb7c1d3c5deff649ddb5f6106cddb
SHA256447cc14b540261b4e8aa64f2728027623496be9c76cdec86f01c86c75d43ba0e
SHA5123d5a276698cbac24b59fe68ae2756d8a96b33e60ef28a96725132be41e8844eb0dece34507a3d0f2c70c996985d4f1b701956bf1f34b5092b6fa038d09da6c61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5565f5f63ed827609bf3ea09bc5a8db16
SHA1c309ffaefb7d08e2b7b81eed0f37fdf11fb46f09
SHA2565a2ef2beef4d960de0bf06cdfb956a6f4de4c2e9644f1f25d9843161c6a5568c
SHA51228978df743e5800d516fdf0ee74654ce4a858cb4e81676b607ad785a30544b760934ce125d9fd4ea1ef5f40180bfa8461bfdd16b8b7be3350c62d430e00c89d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53680faa010f3224c158cc194f3015f36
SHA1b6168f398e7fcd53b972ef8583922d9dcb497079
SHA2565bc22af54bdd5425525e9aa996b818ada422acf99065e4e6b87cae3cd1d227bb
SHA512dbf4c45b991e0ea6b02f37420ea3709bc16e5ba687ad279c2b2cbfe9fdec44be8ae30d81aae7c5a87213ba2846bbb607f9dee70a37a82de88776298bf762e410
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbcf13e145674996e85340e7c9638ccd
SHA18d79383a6b32f0af2a595ea0d677a1758c3c9e6a
SHA256dffe8d2e4be4f21257cc081f9e7d52d0347def50c084ce4d392cb698a7e58a3d
SHA512e3e9d5e756f7c7fe4047dc118be51b8a291ef0c0ff38b313f6ab91a088e5716e8317d21d66618325cac4e4dd3505cf2441d2eed0ff8d8789ffe3dd5422200018
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c28ea35be0d7a234905909e5d328c533
SHA1298545ce7238e2aed1dc868f4ebeb486b7c5e1e6
SHA2564dfd455ead279c9e4a7fd9360ed6d50c77181c74d2f2e8403735bdc6fa9b5944
SHA512c94ce824fbf10e7472ac616451d07eb71835599ff01f089041f7c986d18429e1993af6e4992d2c0a90dd8eb61b6b8c0c4468089a9a8fd2a52cab10a78e5f23cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e222166177b8cf77f7a6ccb719750d2
SHA14689057d322adc93c972841b1777311215d53b71
SHA256af92934daf996117312302ba5bbeace181af7ec98288316000fa65a4d6c9bc56
SHA512481ce7f93eff31ab02dc12741b7cfb90831c20ecb0a3bef4a0dae323dece1678d61d7fad98330edd19c06b6c0c667116275c184cda266d5529ecb066d84dfad4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5832d1f4b4eae29c70e71b4af6e2d2bf1
SHA1d64b0d9c6b1f35092721264931cc6f55192086f4
SHA25679e97d0740e78a0acf929b692ea556555aea322f1ede6e873f3188448da0f9eb
SHA512168a3ae17f59f2f2f9467dc325445c6372ba288ffd26a950d131e6761c050cd4ea9b0d542835c1f6d483e92879670b3a1fc9c68993f1a251614cb3ce0e752828
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\AS91FDNI\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b