Analysis
-
max time kernel
143s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 00:36
Static task
static1
Behavioral task
behavioral1
Sample
27d5d553540c0bd9525c64889d3fcc66_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
27d5d553540c0bd9525c64889d3fcc66_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
27d5d553540c0bd9525c64889d3fcc66_JaffaCakes118.html
-
Size
138KB
-
MD5
27d5d553540c0bd9525c64889d3fcc66
-
SHA1
88790e4430f11b53abe9388b6e7161b6e1048c4a
-
SHA256
3d907782413acc87a00a27739d7db131084af3461c8cdb0da58b1bc4353c85cd
-
SHA512
ab8d1c8e3f01273f54727140cdfd97a6183669e2f3dea69ae5318d23350075653442f29f73ff498c289ef289f9819065995b53f5f2c11e87fff21ce0b1003a7a
-
SSDEEP
3072:Sl+ePl+42yfkMY+BES09JXAnyrZalI+YQ:SloKsMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434622360" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000003f753b5057a0953426198e6f6fe77737c24efad2fb1499db2abe365c8b68d9b5000000000e8000000002000020000000ad60b374862cde8bb3aafce9430ad54a97f6df82a5b7c4b2ddcc19d9988f959620000000a96830a4f3f4fcf15d6e8d967055a0a3ffc46f77d727c4bb5e31484b494663d74000000074f5a3bdc2d135f44d757a538e014a4f280ead426f952a6c959890d28457d6310e2c702cfb48ec1c6f94715d91177c9c844d9d7435a22fdff0b10c1620ff3874 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C49AE1C1-8613-11EF-B462-D60C98DC526F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 407a1adc201adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000005f9d955a958791c6353769f9eb0412761a483c882683ad174be5c31b0d78b86d000000000e8000000002000020000000521419b31dfa7cbd7af6114f2fa2c17cffc9a01cf29be74d366b4b40f827c51c90000000543e94d5e3ada1e4c7cca165517743f6df16da179f53a770ee8459d1f9c6320f1159f5bbdb563b1f210126e4cbe8d170d4e69bfa09570e71868416eea3ada38333ae80a881cfb3ae9c1f93fe68997a272b00c8819e7be3b3b33be05c964a9f461d31c469a9969f4fa05a2630c063c285cc4624277ce5c6c4676902ada5d1a28226ca478be6d86e50ac61b20b2b5c65ec4000000030bf8420fb0b2ee1e507613cdee70a402b91da5c9b59762dd9ccca9f82c97352f445db0e367af5bea3aac9a3e476dfdf241c81093e07c9d9c4f5b89bfe85b97c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1968 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1968 iexplore.exe 1968 iexplore.exe 1800 IEXPLORE.EXE 1800 IEXPLORE.EXE 1800 IEXPLORE.EXE 1800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1968 wrote to memory of 1800 1968 iexplore.exe 30 PID 1968 wrote to memory of 1800 1968 iexplore.exe 30 PID 1968 wrote to memory of 1800 1968 iexplore.exe 30 PID 1968 wrote to memory of 1800 1968 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\27d5d553540c0bd9525c64889d3fcc66_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1968 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53374849d4c2b93a18f0d81d6d43a328e
SHA14b7983c445a544aed7ba4cf866b5bb4d8d1a72c4
SHA256bccb1bccbc7ccbd5ebe79d8dfa221982aeda3becf50cfae6660b58b275645252
SHA5121bab8be535a94c710a5b9d2f670dc3219ac7556c391233912f846b9d85378ec99d802a2f31b8748bcf5812d83e7531908889b249d796d6284711f9b2b5d9fb2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559c523001da8a40a3e79b1859d54dae9
SHA1311d68d7d3c98410e181d18958008f8da9417259
SHA256568ba9dbc80575801d36783b3cff03da2d12d65f97d60e6544d6a2d80d1182de
SHA5122b8fe78304dafd30c3d2df7e83a2218dc758a8de6701b1f97ab00d2df57f0244983793fb9c0b39310764a3fcf75a327df8bfc0cf361bcb1d56b268765de48bfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504cc91a9d10d556c40b7f4366223009a
SHA1d1d1a920fa6dcfe50bb8ae0a7e3854f706be2994
SHA2561b4005183c10ecb40ee7538695773ba3e9ca357568ca68d06cb0de87bab2b8bd
SHA512c0f4216caec557d74f3b6aa44538704a73f0f73881defad023eca9fd3c83bc594be350b44811f12bd7d7fecbc031b22a1b008fb0794117f61e7ba82fc8fe94c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5434461044ae2d7ba195a77bf2b2d3ff5
SHA12045014005560fa1674533f041fca1b6720ae12c
SHA256e1cf6d5e78e39be62e6c2092367de07600d03f3617f7d5463c3757251e15dbb0
SHA5126b4465a672c9df15212026bf1a781d315b4f56f6d3eed66095f9eca04b2ec12346f295cef67c61be82e91c828a2551c4fa905d4c2998d7aead124eefdcac0268
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533a30148d43c2c9076f21a6384da7d20
SHA1aa57356ba636a242d1aba7640353ba19e8046f77
SHA25664878f47643ae863b1adc0d849044a7e5cfa2c6650e144898457f24166a3292b
SHA5125dcaee73ee995e39447bdd19e72132711563c52652ec3b5069a46e748868187693105887052ac4ed5f8405c84baab94928b96c04fc3ef4db77ff87debdbff853
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54094ad777859142d1005d179f6a04651
SHA1852b784c1f873aec9e5732d2036d146973df852d
SHA256d48e6e343e30c91d5c08cdcb8c94ead9da2d4d0d33619833218c64c569addca3
SHA512d8ce56040f3f22f358c9dce2c272859874fdec9aceb81462886d94b842d1010e2fa2c5573dbb8a39d5aa4d65aa3f025c3fcb2f49a7fa77ac61e42553b7204885
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8cbe322379bb4d3af022c90aec088f9
SHA19a90f803953fdf8966f5147af71690f2b7155ad0
SHA25634397ac5daef5bdf79ae79fcde046dc8be8e166809c30f3b46f2caa2507e32b5
SHA5125274e7a7d80e11e7afc005255061db3719c4ebac78a21c54ebc5e894f1723d4c89aceba583a2d57c4574a51ed21d6fbc1f8115368f2382c35f93c3937d593a70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa5fd11da8b5ef3508a6b0fa1a5c15fa
SHA1965f8f73275fef9e2e9578313bc16d317a722494
SHA25644e7b446ed534daac1625e3d17d77c8ecbde4bfe01021937cc6fb9ad67e9a14b
SHA512449247ee25818ae71483316e71d1c51dc10ca617308e1e494062bd6e6c0829e40fee88fcba18172eb784c0a66ea8fe5c5747ded10fba78bd778a5bc7def438e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be57cc19dec8b0256528358897fd7ad3
SHA1ec0be4f902e89b68dbf548cbfcfe3b3b68858a8c
SHA256b6d455e87065a2f981a26f8ebdd713d015eff1a926ca580fb172f43e73bd4fc9
SHA512b9829be54b0138405f672d2591d19df6ea94f5e4870a3e33c62b3f94bb23ee8271750f7fb3d7c65c7f4d0e0bc729713179ff629903cb8d04d06060ef232225a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59374b2db022c4efcabeb1d55460e4820
SHA114e52c656aa512e38a12479a5ef99fc1bf5e4c90
SHA256f90ecd08399db74218c111f5f4869ac738e44e433e33671f16844d104221fbd9
SHA512bed1040c61a52d3d8169659da1c304f459e716f0e68189957a66f76e2222063bcb1c09f1eea626ef57052430b9a99ecd9f0e46b87f0abe592907f988f78b7057
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581fca3195b909f6f811a1c1b66e2e712
SHA1803574a5ca62c014b8688e901d9fa6bd745882ff
SHA256eccb43c6a67a0ec6e12a09ff9b54b3b06215ff61b7d44645f80a98eca2efee6f
SHA512e6767d6008d639aade01893fcde2fcf2442a0baba43359becfc7db6b35d37227c4cfe3194fa67bb3628442981a147d063206af71e7ba2bd5da0ff79146ba7253
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a82edfeee6ac0aec4a5c110857b14e1
SHA1501b19118b4f5b8f888669ad0e500755440b297c
SHA256d1d0628388b1f4531960d531888f5e299a77a10ca05d156c1aaaf53b9748668b
SHA5127b4def4a1f901d5e43d892ddbf59b4c3c9923646b61947c6633b72721bb28f5cbb143e71e80ce38ef7c2d71edc216e6780cfb442d580778e9a67d086f9063941
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c64a1e90047d6c9424ccfc497489b77
SHA14a610b1b618a05bc07dcb2831753e12bdeaade29
SHA256b472f030e0be24e61709d9c89b308ed82bdcf46e290348240e1abf0487875895
SHA512e7ada1bd8691583d18b9a7c356e3fbc6f94f7b33ee030a2db0cd1fafaac0145db9312ce3f3c4585be360c0cbfa733641a492a5a4500fff0f370373e73f030af5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd3680211a8564d2884e62028e39ac7a
SHA1f5ed455ebfdf4b2f9ca9e16311ed46c39b141315
SHA256075c7815c34097108009e93b7663641817e93a7c6125a71e441f456fd974b83e
SHA5125649011e8e92b6a1579f258bc2fed45bd0c1e797364a7a6a7086dec87a33e4d8d16d9577bafcf4ee820ec81b47ed20025c98e77e89b647e845fcc08f0343c642
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ee2e2f15b7d2d79f9c03c7b4762de50
SHA1d05b8648d8db7dd53097f90cd6f9134cc4392447
SHA256f18792a02fe34487f2033a33ab6443d99918203c2a5d7327a13d14ae2b244073
SHA512637521c9fd98a28e38e23881a30157e33c91b5506985f4a4527955ffac23233c609c242592d52bf16544a8b0fe0277ddde8dd84574d4d7ca9baa1db3a17c03b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e8f3185f8facc2c235e82ece64887c7
SHA1fcee01f66c74dcea5ff2eb69a4cbb75ef23443b5
SHA2563eae48aa3fe18ece61877af4d377fa3d6ee3236d82553ecaaf2bffd12770b605
SHA512a7267318c16cc398c9864cedb384c6ec820a8b86d9cc8371fc4f18b7f1791a208e18d96507f33ed7dcc3486b9d52b919bfe80a25d0cb6d7b3c63b01ae934bb89
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b