Analysis
-
max time kernel
134s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 00:08
Static task
static1
Behavioral task
behavioral1
Sample
277bbeada80687b787b4182ff2e6dc7d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
277bbeada80687b787b4182ff2e6dc7d_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
277bbeada80687b787b4182ff2e6dc7d_JaffaCakes118.html
-
Size
21KB
-
MD5
277bbeada80687b787b4182ff2e6dc7d
-
SHA1
ce3fc7bfd5aef21b04cdd692ab0445571656d179
-
SHA256
c2e36955e1ebb7a8ef4e341e9716de2506de99c8a16602db06c41d3d4737244b
-
SHA512
1ea4c77a6e24b7b6a7b79af7ca7cac9d0fd846073c11a763f45dcfc2cb8aa290346eff4633e489d36d3e316ecc21296dec18e9bed2dec331dbf52f535187ab43
-
SSDEEP
192:7IgqdZwpBiMdPwB0aiqg/M5P0V8jFabL0DCnN8cY+lGlQE0FVBbw2vcD0WJuOlMW:sUgZ5GUzPvMWyaKO
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{789E5A61-860C-11EF-9982-5A85C185DB3E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000c17b7038a8e7190418c2212a1a0f5af91c74367cfec96b0cb03dbeb21e4241a1000000000e8000000002000020000000fd47e5c2fbaf03d7414d5301c5116c247735e8a42aa60171b9eef95ad228dc2520000000ce48c53d14ecca35e4c87f8190378ee1336565de0a3c851915b5e7cfbdad50f94000000007ac249d07e8577c53304b636c86af4b2dce7a8bd8503a3fd0989a851132d3085f50dbbb5bb44f2230d8535d74a956d0b98f9c1bdccc2a732f8d164fef9cbb5b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20376556191adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434619226" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2672 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2672 iexplore.exe 2672 iexplore.exe 1436 IEXPLORE.EXE 1436 IEXPLORE.EXE 1436 IEXPLORE.EXE 1436 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2672 wrote to memory of 1436 2672 iexplore.exe 30 PID 2672 wrote to memory of 1436 2672 iexplore.exe 30 PID 2672 wrote to memory of 1436 2672 iexplore.exe 30 PID 2672 wrote to memory of 1436 2672 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\277bbeada80687b787b4182ff2e6dc7d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2672 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd7566de19b6ab426ed956f117c94f8d
SHA1e36f55cd1da36b1b3ddb362b010fac77230827f0
SHA256ddf90bf9b4928c3bfd99b569848bf7d36da76af565ff651c7dbd6f0cc58b436a
SHA51210531837013fec9e64f947877abd8f60b0e90eabb10245d8ca125c9a485772b7bbf91f9ea3c6d1af911797a94625d4c7036ce3ca2bd3c222eb083d333524258a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd4737445332b54461d4cd876eeb9e51
SHA14d6a8a53334cfb9038553b049e19d505dcd7d4f6
SHA2569ce3a9600fc28afd02ca39dfcb55a1a1e2fa6aa396f65cfc09b2272490e0c3ad
SHA5126df96c2e8a22fb958b14ae312ea09445d1a3201b4c0692045d54c4cd2ac47aae97acccfc1216498152f0125e72ae913d48d7eb3317f9e41eaf9b5ed1a4071b3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7fd8d21f2426a0a5a2b4fe82f8cf35b
SHA14a6eda30fea222f3b59702323d2921127bae8485
SHA256fdb9db7c48c1361e5fd6c593ad0ec6625da8ef3c83ef1efa2264f82bb8812412
SHA5120eea6b916df73de6146d6ac58cdf8c1047b832574296c2e4193c25fd080d61d67bf180ac2b9223576a9093cc604459b2d17a6444c290b0df4f5670a9546c4c15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bff695654152dd809977a1b582f8352
SHA1b479cf0f028b04d86000426e500d987568078c07
SHA256abdc92683be46ff89280d1eac52907af8ff5b70ae2a4388b32e955fa6aa29c96
SHA5128ffb19dfa3d0830f29bc3fdb0255d13c48bd0606a4d2ffc7cba9c97f6765833594a3ffabbc34d485ac3f711bc2e7924cb8fbb2591598955143091a28b3371e2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b498f3c3ee8e063e600e75b66d0293cf
SHA1f2b84ab3763512c57d6dbf030bfd4f177fef5124
SHA256a21b9b188d22d383fd676656bacf410865ee236bcc2517af94f120e3cd638b9d
SHA512ff6f1d20dff58120870392d4b45caa2236844f95ae6f78ba4f4a869f2e226ddf64f110796c48920acf25d51245f7c6aa81749eccf8d109d64e08c135dd65b57a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54557aeab69aed735fe3b68ead9c665a8
SHA1a009c26ee59d6401e4a7156ff1ba22d65f55a0a0
SHA256061c7a71574d81febfa96134611c8b274e45cbaa824c037274962d92af411bde
SHA5120bb3b7655f4e2e24f754f1811d4957a1c93c0bb3d682862646d1ddbb4b4a1081171e9e46ffa377a995107bc38e92a0ec3541e14bf797184ff7289e3577c52b05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc2114d062b872c9515a0125f1d1374f
SHA1fd31322ee1895f8375f094e699b46ee4cf3c82e2
SHA2560a4df7b3b7f0b0a1f60ef5fda387efd0d1da098074fbe0bd55807c62c144d370
SHA512a1a6553d400207322bdc18f11108b27bb4e74695fc59784a8fde6ea0c557241f8b08f32e07f1f71db930adc34cb9c21555da37b825520a932c7bd486c75be180
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5996b651785d0805193ae94e22816ab58
SHA11287b69744830b3e174f0f2451df492135578e7b
SHA2569af1020da306dd1f37c2e1d8d0411ab7fbdd985dcb02028796dc0e59fa293079
SHA512985195e5348ef2363d680ccc78c751ecdd0e76e70ce779546e2abaae81c81d138595ed0d740d478b0b6689881dcadca11ff916e29072021218d9041c0fc24cb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e20c5c80db847d424850f8b815185700
SHA16d386357cae9ed570a1d356218d05f33abc76944
SHA256812000f952cf3caf4a61541bca9d8f00b52f23850f129c2686932c2e9b4a408a
SHA512307f9382f2e26a8aa90c25a46549c1607908ca230f88f8e840c84c94477f237efda06eaeef1d0350ce4685e68007656150c06c98e5156b5f5b3a8256c5b5a6f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c44278e374eb6ef9607f998dbb2c8dc
SHA11fbc04460fff3dff19d14d8b33b52a85c59035e4
SHA25639a31d277e2b8625e4c37e037c38b0d0b53b71be4a782efcb113dc90a3a47429
SHA5123f8707a59f69bd9b5db7aa4bf61bdbf7df5ce2f55d560a7f63459ff3b2388e9b2105ce337a24fd167dd7145a3c12ae2c707f1212eb0e6eb5bf907647ab08b4e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d42ea72e98303dc73968285e795f27ec
SHA1ad2f6764f6827a6880f6652b65374cd46d286184
SHA256fd27ede87560f33043efa97795fff0436db2e6afdd25ca447a1686aee1e6f38d
SHA51220e35b9448007f044f39e2f169d3b7f82cd6d0545e418747c697ae3deefd3ce9329323a681b31dff7963471642c9c353cfdc9d771b382a96a8ef3baa6a67b237
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5318b1f7e4b61c53ba968024e5ec205f9
SHA1c09d011bd2e23e168f6490c7b007e7d26bab5dac
SHA256c2a7cae6023a3dc4444b8c52aadd75b33b2774044b9505c7780ac86b4c382f3a
SHA512c3abb0844de9eae6eb4cfe66ce87d95ca8c3f3b443eff0462b7b778f117beff16a1b9df2e1d03dfc218b435bc543cb8cec2d6b10bbbe91ac4279c958a8f21be1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9d98de4de91094c78ab935280aec008
SHA1bfb2ff1baeb7ec0aea7ff179a4ee755c8f313022
SHA2565fece384686984065a9c1cb2da384cd2120750ee3d916271a499423227fdc8fb
SHA512e78f6c568fb99d4c8476690bfab27def75b5e83f7c37e15374c5d6d14da51a8bc533188277606630734197ee01c416ec7cfd1bda282d63b3af2b5d3bb0458f79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec15870c24a0bd4ad2d19d9f5b66c910
SHA15b4af3ded3ead3a1bdba1a660f8e5002bb683d90
SHA25624b422b7ced1cb8168b01ccb028ed1f90523da2e05202338785f69abfca9f70f
SHA51271636c37d7dc28538021e65202e9409ce79ec01b90920153e0385fab85b283c004502e99790b335c681ce17075fdf98ddf7f13294c3e90ae7ec96b2e7ae7b59c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53842daafc2ed242b5aaddb7449abb27b
SHA1c1d07f1ea69d4f3484567ecf5f228e6d3c20c762
SHA256ad98911601f5c996fa480138cd0f45847ada0f58d53662457565f423c5d22b45
SHA5126a724d07b588b315eecd999a72de51440aacad02a8ff4a735c2678e414b5ca4e65e4a502b3aad7f4bd6638e8dbeeb30ee64193eb21a319a35974f4f25f7799fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51162de0e733681e983c60ff4fd659dbc
SHA17d13878e2816d10d6d7d3ba7f5b6e9c2b6fc9bf1
SHA25676992c2ad6e70e94694594c761f66b7ffba57d40b0e19c51eec3ed5e5242988a
SHA51244f647aa7ecf68ae4cba370c64c1032b1201024dabc0f27cb3924f9767cdd9148008e7a027b4f86ba3f1579d05baf1da08bc45330f3e4105f4098076473f325f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551c7c6b0036f0ee051423b5d11504b82
SHA1950149473ff559d5b7ed1d6711b0d28ac56de48f
SHA2565e299404a87f4790cc813563ef182a00a6945c70c01e2714979aa03fb860d672
SHA512885ea43d93b0a7509fc6857257f207522d32872f5b3d545d78e84866eb8cbc8e3268dd8c13373227dbf8c0dbb8818589d79a192b5f827576612498a0f8b41f53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5024039f68a74c0c33ef72d0b14b7cc7d
SHA13cb1be433c8cf02203bfa65d63b69ee905b9bee2
SHA256e3a75fcfdb85cd18355e0a5e4b54f2363901530a22a7654a5885deb9e801cade
SHA512408af2a15e532dba8262c3ebce44d43de845d28be37eec302b4e495bf8d6c804fd7bba32abd826f7db8d6f70528f184348b2c1d3ac5bd60158d03ce25524c813
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593780685685db0105c3e9db3cfeced31
SHA18664dc5de2b3d35f308adc6713b47f61288f6a04
SHA2560ee93af4047ca354711e82d84e95447a7803ae30dda5473b14a95f1885a5eba0
SHA512dd368be1f7b013788665394268d062f1887530d745978a6bbdf4d8d7baca134ec0aabae5d3295911b9f5e589806829d7bbb9c579fe5d796a02517834577233c6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S8GI6B9B\sale_form[1].js
Filesize761B
MD564f809e06446647e192fce8d1ec34e09
SHA15b7ced07da42e205067afa88615317a277a4a82c
SHA256f52cbd664986ad7ed6e71c448e2d31d1a16463e4d9b7bca0c6be278649ccc4f3
SHA5125f61bbe241f6b8636a487e6601f08a48bffd62549291db83c1f05f90d26751841db43357d7fe500ffba1bc19a8ab63c6d4767ba901c7eded5d65a1b443b1dd78
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b