Analysis
-
max time kernel
92s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
08/10/2024, 21:00
Static task
static1
Behavioral task
behavioral1
Sample
2564fb4fd3cbd2b777c5df262883ee40_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2564fb4fd3cbd2b777c5df262883ee40_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2564fb4fd3cbd2b777c5df262883ee40_JaffaCakes118.html
-
Size
155KB
-
MD5
2564fb4fd3cbd2b777c5df262883ee40
-
SHA1
04000c9ad75191e6bb91f9c458ce6ff647f9f3ce
-
SHA256
4577d4cde2e7de9e73d797bc3375b7809cff9e1ab4addf1343707b01ee6a5ce9
-
SHA512
39270052bb02570d23eac5f07fa5b75aaf23860897e7a494ce6e748b21ba9bcd63ef6d221710a5980cfee053bd5b6bca3f8e8f16a3ecab6d36d14c897ba1913f
-
SSDEEP
768:Fx/WSUSDgchel9v1Fagp6tuNpgEwUu8ZxmHtYCKhJa9uXVI1rbAi0XTZnwAbrk7C:ON+J7IZX1Dfjym
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{775C4001-85E8-11EF-9DBD-525C7857EE89} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434603762" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000008cee0502ad844fb13d067904a66e54793d6c1567df9712b50c75b95174949212000000000e800000000200002000000029ca0554ec8a38018bc938c57097035328e4c68ab6e405b50a4094bfd8b8aa2320000000237b211c3e8d215e3f6b3c659114225fac9a8864a95007aed64b503eabc85b04400000004eee4ee3cebfd6e632cb4eafbf712eacb1dc31c0389393186a67d1783b55707d8e56a0136a22b00c7f8f3903fb21ade7c5b0b1c9d728d645d46c41afdcf509f8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50541e65f519db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 568 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 568 iexplore.exe 568 iexplore.exe 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 568 wrote to memory of 2304 568 iexplore.exe 30 PID 568 wrote to memory of 2304 568 iexplore.exe 30 PID 568 wrote to memory of 2304 568 iexplore.exe 30 PID 568 wrote to memory of 2304 568 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2564fb4fd3cbd2b777c5df262883ee40_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:568 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f5ab0f4beeddf37a0a6e6df965d1bcd
SHA12e7ea72c3326155075b58a7d21749e2963e4afb9
SHA256a5f1fc150c9f4891bec03eed052620d46225f5e2a4f4c1ed5be92b711668a72a
SHA51283a4f32158a152c920057cb8f6890d3ab562778a12b72f6b3aa49304d7de31fac112c52f5fbba78a5830e4c4759e699cc9af6b9838484ce6713d0fa75c9b15e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea55991d4dd9f0d40f333211bc2ab3e4
SHA10de46b7f59e4d2381f4ac818ae996ffa4e341047
SHA2568382723b2864f60d8a732cc04078ff963c17df5e25ce715b8b30fff683eb53db
SHA5120f20faeb330e886d50c0fe7100ad26b4321161314f5933f7f32e5c6a71df2088527f733f71456e4f235f6ae2ce4fe034f8698f9ee3ef1eb0ade39e03b51b29ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b85ba750890162420bbd4ad67922be4e
SHA13b6a12a9d6d40973dae2abbad088db8a5619a367
SHA256bb20902fbf16f0cc2256d2a26c82969ba281688a203c3434f34e849574769552
SHA5127c36d7e17a4c989a7bbfe15f6bdab255e650dead65922d6aea8a9f43ef5f0641289e98316e20a19d00ff6ba8ab371bdabb11a7e76cf89120551b16e40464ec6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512e2b6ca94c13e63941c82cbe7e74505
SHA156c8935206360167c7a2d9ada138ec7dc03087b7
SHA2561fda355de730f1657bca91f691674362ab531aa52f27d0cd977e31e1442446b5
SHA5127da6ff0e4c6f98a20f38685dc3c1699ba8bcd5035bbe204bd9e46f2cea0e933ffff87c6ec9c3378ffe520a8ce769236669c564d14eea44d54bd07ef69811fda4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ba7735d82ec1f225ebcd1674dba5b4c
SHA16692e52676f48369b9cdbfa86bb74de1975ef3e4
SHA25615b9aee326c7e616961d3b976e312ebbc73415f2e9f1a9b187f2b731f999da5e
SHA512f7dd43511adce4b6748a753ec990d0e2671f06f5d9511b2a970cc882cce4810b0e84bab30aff788330318a98c16d2194f7631ba8c1828d985122c3779f0b07e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0905101b844826a6dd4b8030c5cdd6d
SHA1b4c6867462e72bd5a18c9ad7d510b1bf4fb424b7
SHA256156149a1d517d2eb8147a2de40bef95991beee3b111d06c1443e6072b42f0211
SHA512f6e2abbdae263b33f9dff4509e550ff4930e677ed8c845235fe515e519a56a85b170f31ac45efeb842321ab3943b7d3cc0106ef0dbbcd1eb04b9a2c7dc154421
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545485d41528e5604a531319c5b826545
SHA1036e82ff453db486e31fbfd18edeb8939fde003e
SHA256ab4e986064f8f2dbb4cd7a03cce37c13db2e92ef7b447f9787a28ec1ddec1fbb
SHA512116c1db407cf0eac2ee01596faad3dea8038aadc64f042b3d7d133032fa12325b29cb78463aa457f07da8d56cb1b05c9ee7ae99276e45f9a21f36c0e818b1b97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9dfe38fef8c505db45cb67e604767dc
SHA1fdf21421526f00f087decad76d93d7f00269a958
SHA2565c3599900f92fc924d91978150e5254fcc5fa7662f0238ce7f9e73171387b51e
SHA5121ca7a70cfdf7d00378d95402693c16a569734acec20b3fbf3edb8d40dbe1f96df98171829bfb366b911d99c1d08d434d0c59a028298f3485d504a883e433244b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be0a25f10c5422942432a04e37beb3c9
SHA17bddce3b6d84667a09034b1068fadae7c75afa5a
SHA256b4d08241e101f835b0f707c1472bd6ccc322b14e31cf3ead3fdd2f7b76b1b7af
SHA512ae815c604e598a13d3efd5c8e98a74e50959d1c33181f7ef30d3f22a1a79ddf7ad579b75b2a88baa01e6fe32d1c1cec8469b67c7d39d3d388a2a041a8f3e5ce4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d00dee01f919ba3eb935dd009c72dbc1
SHA192d6e9098734fa37bf5b53fd0512f0cfc34b170d
SHA25674ac832bd376693df70a3cc12192de900dbe004e7fae918d3f08a5f145a12a6c
SHA5126e575664aa90530ac3f1265773d2bb14944a7807d3671467de95fa56cbdba709c230c5a1911b5eb2048103c34348738924ab70403a171982260d9ee644cad686
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d61ae9a30a07bae4d41045997e146294
SHA142e3eb11b8a11e54e47f1bc03ffb42d83a2d63ef
SHA256f35b03bc116d9400f76e230f2b2a8ef305d4c35188b6f41fdb1d29c001f27cf4
SHA51246b7b2af8c4ac443c12f21aecb75f90d19276a457e0fc4b7cb8919e6e356664b101fdc4c357a5b78535007004aa1b241d122de2198bb022305b0ed12397958ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df6c4cb25dd03b6f43f34706b643aca9
SHA1d6d07891dc1118faba76e8ae69a4b42ed131d6b3
SHA256d008329e91ae0defd2830002e5da80775c31511e1a4a7ed76b406204cc1c5bae
SHA512721649386e26932a6b572b1f8772ec2a12f6cc825eebbbc2572baa7f0d28d5adcc0dd0a7c40c318bc4da9691c730fd972f4757915e4ca2c0ce423fa3d55c281f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a41e0be52d7b5f5462f21b3f381167db
SHA11bd35caf921bc6b82c0a6e3a637deedf7207213a
SHA2568e2db9395ff4f6c39c24b54924c02e58f530791bd7152631639abfbe157a08ac
SHA51226bb18393d95a41b5867ba50155fd82e64aced2a98062c1862c3d6864b2248a9cd1e944ad85eede2e6eeafe628f239ef34a99c40f397d6b4d81dd01ccb21f287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0f799c66ab5ca06e2f79fc4ce770b13
SHA1dc092c3b248814c1c64afd9374e70155476bcc50
SHA2561173100270ef5b35d71e3beef13f932d8ae4dae6bbb4a79aa1f3a3f654d672ce
SHA512947717bf994b27d64cf3ce65415680b01c9f6d50c856462b49851e3e886a1fea164010de9f54f05fd87de9114443755cc3c806c074813edc270b9d9d1a20d394
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0c717b7cef63381cfe710396d06744b
SHA11ffd8820cdb6b70280768f78df14623df945cca8
SHA2565166f944c9c2cae30df803536bf2ab70ae88de85cd10c61c29de652d66ff7095
SHA5127a9a798d4e514e326af28ba0217985ba3a560782cb9afb07878f04b3677744873c7a68c1d3005719d682356081559e165f71a4ca1cbfa8af6f023bc2bc417dcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aebe3427b72c832d03422f4b67d08e31
SHA1d3ed107bcceb00d0ef9feb6407d77c0295d965b5
SHA256020bd37644dd4b6508d9bdcf8a472c1b8d827718a19fb5b7068f6bcc5f167dd8
SHA512cf32aaca084acab769f766dda1622ad5140d48866c3ea148c74162bb076947a12cbfd45fff82193417dbc5ad708ee2f52585a435097a4e8c54702353cddd71dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f1daba02da6c63b4a92b259d2a1e8b7
SHA1027c4f9036c8779e5edca2435929909bb2dd423c
SHA256520aa632dbf8468d77caddfe4684eb04e206ef6cc77b107b27801319a92efe20
SHA51257f8f515cd94215442aef90b23f53ad16e03f948dfe7f7ee03e4231664931988f181f4ff4eed809dcf1c439a250e26e213792b7c039faadfd786928cadc354a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e2882d86ef8ed7592c34fc58c286ec9
SHA1117024a9246f8e232480462c6800dda63059d441
SHA25618434bc2f47b921dc3d7cafc743fb24068c9c446d3856a518c4b84843e00aeba
SHA512d30af98690502896c6611ea25174f98537ae14dc631d1e174648257ce4d5ce7312cf7d75623000fd6dbb6efe3fb0372055e9f4915299f1a1312b65b1eb7b4cf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd23bda02eca32e409eb6eda6cd7537d
SHA1f64ad721b4ad1cde5559684cc24636ca70cfe691
SHA25635e259e037d840c909d366bddcc0c14debf9c48948bfd20777051d6f91dd2c5e
SHA5129d33b4c06ca318aeabedc2ec7a8be11e41f18ee039ac5a153537a7ec7fb37abd4a17647f2a1cb60b99c6972731bfec352fb683bd52487a6f89b015026eebf769
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b