Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 02:36
Static task
static1
Behavioral task
behavioral1
Sample
294f7ec12ff69259d3654475ae346a4e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
294f7ec12ff69259d3654475ae346a4e_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
294f7ec12ff69259d3654475ae346a4e_JaffaCakes118.html
-
Size
139KB
-
MD5
294f7ec12ff69259d3654475ae346a4e
-
SHA1
e916529701686d7163dec77a6ae4d2c72a3b32da
-
SHA256
1f33bc0e89aa5378624d00757b674ff06b8511f5188dc63201c48fcfe601425d
-
SHA512
8561835114f648b1913aef127ee50627af988805dae595b53a8ffd42141593bd98b91328f411500b73ba8494d0b4bd6c60a8cb9b0aca8d28ab4bffe95d31a96c
-
SSDEEP
1536:SeNoFWcaI/mX1YollElyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXu:Se+Vo8lyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90021f11371adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000008045f9f389a170110bc3277a48478553fe4d83927bd9a28afec3145dd08da4a9000000000e8000000002000020000000af572359d94289eb817c14022732407d0ea7d41da8913db79b167e1403408168200000002b0874e1cb2c166314a4d79636c52dd270c02f9175d0efcba88fe241d44f8da9400000006106c0f8cf971b2fb0ad038dd9e2a6fc502344d301b6bae1607ca22188da6b5cc00fdec01288048386af6896806ec46a11094148054d6fbff34ba6563e81cae7 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FAE520E1-8629-11EF-B895-D686196AC2C0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434631901" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2320 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2320 iexplore.exe 2320 iexplore.exe 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2568 2320 iexplore.exe 28 PID 2320 wrote to memory of 2568 2320 iexplore.exe 28 PID 2320 wrote to memory of 2568 2320 iexplore.exe 28 PID 2320 wrote to memory of 2568 2320 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\294f7ec12ff69259d3654475ae346a4e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2320 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fedc2f25ebf569468670d6d2c92aa394
SHA1e20e4ec6ea75648add254fc52b56cd8ed71623b5
SHA256e29b6a6386d86f73bd4adbc72eee0a28dea6ef51fb43c72219e73e43e05bc13e
SHA5123fcecb1bc75811440e203a003f63a1625a765d6722e93f2e204feb2fac5857b004cc291108c85f1b63ca01bcafa72c1f931001bea937194b253eccdca6dfb2f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55110d7cf45c4b6f2a0bb0cf09444b3a9
SHA1f2578328a644f677686ac88c01d1812f748e0d81
SHA25656d1c532f316830147fa0d1722b845599bf9bc82221bf7748ffeeb75078048a8
SHA5127490066d12e08106fe7bea5e6a847a34231a1c1ab40d9fb1cc9e6306d2903bb71e7f196e8ff9b28d857ee70bb3383b6b198ab8211f349e0417b2552777235ff8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c67e75a89f5761ae6cc12b443bcb16b
SHA1785598831f84b48094c9867125ea8d3428b0e13c
SHA256ca0520085583b6050f539731772bc4c0e6a748fefe024915840742cb1ff37d80
SHA512daac591c404a963986f369a8fe793efda6427db55cb14f1c07cfef8df67d1f924d4c3c2c0aae91a129e50a61a2c9ba2c115427ce50ca0a39acec4715b371aab6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0871798b93751585f2e84064ff26141
SHA1b9ed3186147734180ccc5278ddc08e21e97324e6
SHA256e74ddb2cc41ad4dd34d4f87ccb6c64ef2b43ed0246c9c0ff632854c55adb7851
SHA512c76a9f66e6729be7ea234e757bfd2da28e170d2f6198772210a750e9392e9838e404a42240b9b5f29cbf6bff053c550795226cc42d5f01bf8a2198a5555d7685
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af2998842eef7e417634b43091e6d57d
SHA1a694eaa4b3c079720fd619e471cd7764450ef32d
SHA2568f543aa85679b46d72d69af977d1f9fa67c550d3cb12248732c3d6dd91e28818
SHA512135a9326995a6bcfa3203518b54b5eff84727f5c40d98eec7ab4f82948fbd6b8fc0c49d108760125972c3d1a1cb87b01f36a45e89f8b78d94c56d6baee0aeca7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e35ec09815c0b3121d5e69fc684d74cc
SHA1e3f4b90d7bc77d28c968d519eeb6a31fe59c66a8
SHA256862b0019572be94516719118a57e98479a3bf07a0669e89050ed4e71e5f3cb3a
SHA5124beb52b23fe1f37d6a5710e86ea01f1b787d005d42705f978e10bda707b01ea970af8cf27e7988fe22f4656716bd9aad42a52e2cefafd7341f2bd90397fe62bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0bc917989bce6e545b0df8364a21422
SHA19364264bb5c5a1e2e8d230b61359566bd414261d
SHA2560a557ca0c47d1337ca1a4a5342b0ce0dea98e849ed5c173a11a8bdaa7f91482b
SHA51268d90fb12087aec485ffdad3e697d0e76728b7c6b7679e7f8b89293c51fc32867ebec0837751513b7278fd8b7003eeb1b6a6275c567c9d68ac58f0967eb3210e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514ba039a46917b6126850e1d95efc909
SHA1e32f51b9fa0e1b7c71469796c357d7a8da372ede
SHA256544fc4b95ddf9a188c4d36e5f99e38b7c87bcc5ef9124d8737b34027b90fce3a
SHA51294f428f0df8c2d51d68142e8998011562e84652d83f1830092688a82f289229542cd05089b0248e44dd3eccf4e188c06270a46d5002203eea07dfce664fd4062
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e4f5a21ecea4e422f9c7cb778ee9a85
SHA1628b253ac40f5bee22ab95a683060218ec3b8716
SHA256fab7d457e35b68a4cbb8b45c10821e98b85a278334c53178db437ae998ce6dd1
SHA512b1a8b84632485af4d12dd16806006058526d28e13f218fc9f4c7560e4ce5d5d0ae4bd3d73291b9d386ce4e7d4e7eb0539183fededc135cd7fd65960c55413123
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565634294f521796898f76d3be32f3f7b
SHA1be887dfbebb2ca9e7af5b761bc43542b71966a41
SHA2561796565298ccfd9106c2f117acbb9256215b1c7c1e492ae76898dc0531b4ebd5
SHA512acdd526e63ca9ceec15dc712145bfee285ca6a568a2d5052fe27f31ddfac8ec163a6193564d2f54e7d2757ec39cb8ba41d44185670e8be6695a6eda83570c5e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7bb1ecc2eb94848062e5adfe2a183b1
SHA17c34b2c3176c9b56f7f0460cda69cbbceb66d8cd
SHA256a3f07f03a56312b31ad6fb430a06b9e22989cb7ea963949581d569e0d0a35d95
SHA5123532619f26eeec13ee5dd5d5f71743818e440e331b920cb7bdef7d86983aac210bd7bd1f1ee137140d7f6bdd4ef3804b2bc01ddc5db6f945072700a41de84c63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562acb5934345dd857b2d01cf0de40f80
SHA1dd177fcaf76a28fc081fcbb165fce23d10502ae6
SHA256843b64d517871e8e12df8df6e25bec38d4190884f1817cee62e124eacdca7e9e
SHA512c7a48a9f246962237d258b05cbcb2612c42f85db34dcccd4f55b1ee1180861aaf3e4233f3fd0ad6f84be41a0d9b7e8ca0526bf216b13280dcf0e2c7648030573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589fe5c798692d8f9cd2f0e5cf8984434
SHA15fa711e03147e4848009af45e955bbcc3dd157b7
SHA256018b64461e0c0ca7df4ddf0e1b8c52a8f01c32b9201c89dd40ca29ec93b90dfc
SHA512e35fe87e2f9403f39f612c2de281d2f8ce8f048daa015bea8c83cfb2fcd1ee70b85e9024485713fcb7ac06edb654c8abf33ae79900c438755592b35b3f37ecf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d79c0589fbee6d336badc3f5426fd1d
SHA161cfc014ff30b5cd8539096cba431f4c3ed01e3e
SHA256f5bd52eb247062f315385a04ec2eb2f3507ee86eabcc1f1efffac91652f5f4f9
SHA5125156707a1301467ebf43b18d9c6e8b587c4c5c970629cbf75025a9ffe5e81eb6f0d96c99ec37e591035e2d1face4cfe086708eb703e01e2532d998035f158410
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ccb1c5a21ae0df7b5adcabb688f2e3e
SHA18b4271fa6d546f1475a0737dde3c642903ab810a
SHA2561451d100888cfc681f432c601e565ee034171cab8616273000b9c2b37215e734
SHA51293d18b3cf3bc231fd494637e00d0d8468a856bfb774917fe99a421145eafc96851d1be237a841879dbf533624be7f533f24fc5ed3e49d745f6d1d5616aef632b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fc2975e8256dc6577684b1f9d067f21
SHA17fc62a79bd7f0ea2210fee7ed3d67ed5c9190694
SHA256f476d5a4f46f7a450d5a910dfc7e9b4bd80a304b6f406536248d438d61b8eda9
SHA512fea1acb640153b5e8ec2697ea17c9ab1cc08e0ed998f04854ff5b2c04ed944fcb8637e9cad39cde0053e12224e39187d75dc198aa0092387befd2ab12e82b46d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e89b0200f852c7ca1439656a65a18a7b
SHA1f8f993a2fd304b9d8679964939a3105cec9f2a00
SHA256db3a8d4c5a43c6ecb9b6ed80b2751b412bed3088f348d7598b0069239a2695af
SHA512c0060e63755b05f07dde6263d6cf7a3265e3a181cc5cdff8af1164795b0e7867297769e4391e58cc86f074e5acc1d62f796118ff38557c0ee2263ac5ab8e6130
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae637c3c96da59f5a1d37c0b4e8e210b
SHA17948bbbd8de7836ca12b73beefe01618a7bf48fe
SHA256cb68b99351cde76dd7c66741f7c364ba0d29ee27cc0083e00f695b619c35e20c
SHA5122b4e7490823e92bf4e1eea1def57c7ecf9460387f2c3b91b81ee00285b61539f9232b5d8ed2e89d719f25fa93b3e4d26eb38a05946da9b41613f86b6af2f9bf9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b