Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/10/2024, 21:44
Static task
static1
Behavioral task
behavioral1
Sample
25e2618b301e16574ed6aa33d09f5344_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
25e2618b301e16574ed6aa33d09f5344_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
25e2618b301e16574ed6aa33d09f5344_JaffaCakes118.html
-
Size
10KB
-
MD5
25e2618b301e16574ed6aa33d09f5344
-
SHA1
039411b0ca7b5dbef1cb23c96b2bfee6571e83fa
-
SHA256
b712035c3f56af007f512a808230eff143559f664d3306bb8f305ce808a1aa83
-
SHA512
12e82a634f62593800624a1448402c51daa6dcba39c74942f6fe892b8d25f700b78c5310845d47c4b48d8b859af5daed08e3584a8161f69ce00c196113bcf896
-
SSDEEP
96:uzVs+ux7kdLLY1k9o84d12ef7CSTU9GT/kjyp+AYjK8wlVHcEZ7ru7f:csz7kdAYS/U0PPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000521e8b21addfa958683b45c8649d28672aa13619f2089c11b107a4e25aad06dc000000000e80000000020000200000005fd605738accc72fc0782b3e3f7673d7f4fc96c0c4d05a8e715ebaf713ee7ee120000000f2a26571f62906f1fef26ecd5b7f6672fe98d7d9a49a34188a97c1e4deb032ea40000000ba0cd1dfbf85241293867e2774a4c6ed0f34015b4bc47483ecc014fe404f3ec43e906503631c169d5f19b9f7f914f19c520ae77d86fa6a601b318ee83f9440e2 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 601f8ffcfd19db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434607491" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{26033E31-85F1-11EF-BA5A-5EE01BAFE073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2792 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2792 iexplore.exe 2792 iexplore.exe 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2284 2792 iexplore.exe 28 PID 2792 wrote to memory of 2284 2792 iexplore.exe 28 PID 2792 wrote to memory of 2284 2792 iexplore.exe 28 PID 2792 wrote to memory of 2284 2792 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\25e2618b301e16574ed6aa33d09f5344_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2792 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae78522de9ce65cc0f8f8d87d65141ce
SHA1f3380177af66fca206bb3acd7879f52a0975d42c
SHA256a2ee11ab06b3f98541cb5d3b78e6e7497f804c57f28486ee2710c9f68d0a9f23
SHA51285ee69385741e314b29d7b64ae0ec69776faef11d8b5657fff3845102d1fdd6d6b906474df2b73e18246142922cd1fa9b304894d302ac14ed5395a71a81e07f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569b4b26dbcc52f5051b605f986ab3e8a
SHA1742f2e75408437fb1585a7ee7816273cc24a2f99
SHA256916125207bf8e4c060a7f370b51c351b31410e448f761309be2dd75c6061f572
SHA512149c345d4c31a03786c5b609625e6dd32531878fe22b724fb9247b2875ef5006aac9853d623aab70acd16ba7f75c998827df1b2a78ae4f991428a566eb4919e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5007fe95dbf0b6493625cda12a5ecd78f
SHA1db4caf2368cb3f77b24c3af6e8b822fd6f7fffcc
SHA256688cb06751aa43b2740c930e586327a75a3c9b9b248ec60f07efa5bfeb287043
SHA5126fee7f0626c5fd1815aa15389dd6655ad9f6957f263502fc10172a0455f4b847b040bcafbee35c6f8d936670961e275984aa21cb0cbfeecdaa1bf9b6dedca59c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab20fb6a123124caa877af1ce7adf571
SHA17549ed7935a98a9f0e5926245e1667a44a9481dd
SHA25673c61aa7f5b5612954f0eca182f0cf9fbc673c7f88bbaf72f53629dd1b1e9f2b
SHA512a7fa212f8ab85083ea12f9e813223f614e7fa592f5b2a877f8040449e6255bae12e3a18c4958efaf9d9f85ecd19014560f79628228c0198248ab1f5c6a9bd547
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd7d09927976b60e293c9858512086cd
SHA1424f885cb00dadf8f7dc7b12b932827bebe9b12e
SHA256be72ceee32a4fff611ef2e271fd72bcf6dd4b7087a0fac55cd55134de1eebdac
SHA51216143e966741020d7c7b6d3a1f92dfa4f4bd17feeaaa0080131f4ed8040c5f38751c20d92e2bafad068a7dfff89180d8569c099cde4cbd9828fb455b659900b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1564c34c6642d8d2689c178737bb6bc
SHA1023b3143bee6784ccac2b179dc2650b35541ef21
SHA256d480fc1915f55fcef56611b91eae272d1fdf6b62ec59794f73c1b5b2551b71e7
SHA512d009d91eaf3a49b25cbc9f43829614a01dad78db52db7a24dc6a657c23c252d2b7e7e17a1b8bbbabb3c643d34fabfefc848e0156b3acd0f4f1834dabc1ee863b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57706300114b85f0df00ffc40c8c10289
SHA111d0a17d2bf6389e33262d114689c8e03a8e6e94
SHA25697c672b9490e6df3fb22706e2f1dfa5ae31ab9ba710b8e4135e779e20c63e151
SHA512e2c0d27fdc4f6a71594a6599227e27c2ce2dde5fd55ccc84923a4517d8513066db3810944afacef9158b9fbacbd10561a0faff03ee6f54fb2bfa9204ed05aad5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59563ad9b3eb254ea60ce0d00fb8da845
SHA186786054fbe4e859b2c28f28235aaf47d0859493
SHA2560a5108694e6a71cf9eb0a85232d13fde43dc34026db97129a8ba7fe2e0974a0b
SHA512d21a48f5b747dd1cc53b0d6b2d2ca3a822a2369ef081e61ff1a10d2ed565a4cb5a062ef98e581b1f4871b6e383a848eb4ab17fdc181fdb57f18f093d85c24817
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53195d11c05e19c3af215b6ac2188212a
SHA1f64033078c638fbe0998dc776a8cce5cf9aea3e9
SHA256fd6947b567ed71c1eff323118ec677ae7d687c0ceaba1c936f35f0b954a06b1e
SHA5129f8dc2a1c1f6711d2223146e7a797968dd1e562842ad1fb903f51724866fbbc5a909908e3c797fc30c4ff3d4e5204307deb38f1e36d612c822538157db35f38a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0bbe0ef4a15cdc821babf0d8c31e9cd
SHA16127f9e51e835272c0e3c79b3fc48503fa2cb617
SHA256f112d9c20e588ad11fa82446d18d42953ed7612e0f82676100799506fd0c0438
SHA5124b3fef638a690f625bcac36adde67dbb1f606c290053650223c0f09f49d64e952b72b89acc88aedb1e49acb2efc24e6db96794e213735afb0d431a64ed46c947
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b333d113bb981b6602a0e2a950fbba35
SHA1b0ca9c7fe4307b75dc1337795d8ed8d1280ea8a2
SHA2561fa809ee1c975232f595e72340f7f34b8efc26d83b9e8c85e3c9500a34074ccd
SHA51243cc819b464bd97f1d66c442c901529f5f45a6d981f7f96aaf995d7fe5c1b6b29b702b14b390be5f874ec4a3e0bbc06927ccd634f3f29d06cbba2eccb2989788
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5525e03f8f0c767ab63806133094a666b
SHA13436fb70181a3ccb6f9bbeba65598b9122c4e7d8
SHA2560323dc1f1c8fb5ef46b7b60c2d765bbede3d9be14eca7e98a5769d8cf13aa50f
SHA51255607e02b9430dcf46e1ba7857e5fb00745ccaa3edde332cf3fecac05a5fbe746d7f33af06be3199a0db8d88915074c705d5d7f789876afee816beb237fd5dbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d41c4171a6874f6e52ec43db055bb88d
SHA1f95b419f555c3075cce983f109982084c79b9d29
SHA2565523a767897a1aa0614839e3cad8010ecb89d7dc7e9568796feaab464dedc726
SHA51229efe6014313d36db44731d90818585648c93602fcf052a66665295e635c2518446014cb56718d4192d05a275a0c3044ebb9d44c317ff195e5b0c32d206c9606
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595be427495e4c110f5e3235651ad51b7
SHA1e95c773355ae29c0f0b82ebb99f2eead9cd8c723
SHA256aa2e072fc44f5ffe259fb5ba412df2ec2c2cce6dc3ffeb212226f87fe20321cc
SHA512e7d7e0b69363bc65af26730825189a0af708fe3766c715cc9281515109f7098decb9c42b38c43336a9b1ffe8e574c9659c5d1ef874783860152a90181e0e4f5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee95e62917f67791ade9eaa36c39a1ce
SHA1a2e6b008b670406baadf0cd715e918619ad73076
SHA25662191d2eb4fd2148b993ec8089904809be94f1049684ee994ea74f1f249ea6ef
SHA512cbed6e3cf96b6c98483408a43de3e704471f98eac8a8a77a9565bec1a6bc395e8bc57f443963794507f9ac8c5c432f01daca48fe2aa17eaac871f707d0be6ad0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5949039787e6ef68b71fa75869341a282
SHA173d029b5f3afa0d77a39f67f8a89f04760a99e43
SHA256120cdd792ad4549c3d3eb3dbc6bf962876b464b4d4d3fd2ec77cf83bf4e5d29b
SHA512f89ebe983c7e88af44043424a7926db46e360d5846e98ce1ca66d7ddb7e6a643fa12649c15aef494ed0bb00d7f44950df3a6b56c49f380b18de581cc9a8b0e94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536132558ae18bff98a579633508f7c33
SHA1ec96730a6437408303889e584d9a1b8a59ba1628
SHA256ec6eb95b3ae81af0195bde07632db6b79802ce0cb094c45e97de299098c0b679
SHA512bd90767c26b4f23a944dbace670466dd3d5bf4cd4db409ade2adc49162b95a97357ae34cf5b41b7e322dfe0a6f0327ff16825c1802edbddbc81d766a1267ef0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de824fbdcea2c76c0b75b55450dec70c
SHA1e532b6baa7ad122e35017c91b14f7a98788682b6
SHA256107c7788fa249d47990d1c0710efea39a08ca70730dda3aff33bc6924cd04abe
SHA512df6e8d7ef30e86930c8e91813d056a5bdbb5275d0db4c78b05d450fbb56716bf6da0064325a59460e457b2b85e139fd9d05d50633eb51cf718b89ea6223356da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577cf0de3d3ee9710a62ade4e07a6f176
SHA1b5d602ab26211461229b2846435329abd158da63
SHA2564f10570863072283320f070209bae8b19958b6d12dbda43dbeb19b2819de8a1d
SHA5127d30c1079f7b7b5c787557e6218f90718b889efa92931be67bf751db040feb052331bcc69b154e3d323c6d1281fe975271b7727d5fcda0768a4a305661d3135c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b