Analysis
-
max time kernel
121s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 10:27
Static task
static1
Behavioral task
behavioral1
Sample
2f78053d2e4223d69a4a17ce03ff89c3_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2f78053d2e4223d69a4a17ce03ff89c3_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2f78053d2e4223d69a4a17ce03ff89c3_JaffaCakes118.html
-
Size
53KB
-
MD5
2f78053d2e4223d69a4a17ce03ff89c3
-
SHA1
4e0decef6ea1b7cfd8dcd1c23627d03206b788e9
-
SHA256
669f449512ea1a72ce2eb35e6b4bcfc0b17bcb6852846ea43f862c3550a16387
-
SHA512
74feeb5c3ef06d102eedde3f9dc40725a8b605c1756e36ac1ead8d4a750eae1e5dec0557744b16a501ae5a7db831a042acb06b36d8edf27442ab42b0b49580e6
-
SSDEEP
1536:CkgUiIakTqGivi+PyUgrunlY963Nj+q5VyvR0w2AzTICbboou/t9M/dNwIUTDmDN:CkgUiIakTqGivi+PyUgrunlY963Nj+qs
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434678303" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{04B507E1-8696-11EF-8BBB-46D787DB8171} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001db82f11280ad546be0f58ee9e2471b3000000000200000000001066000000010000200000005fc5fe752252e7310f6e9a70c81d31926939f7581e95754936e141161ee174ae000000000e800000000200002000000020fd4ea81d205334427e614f9aa128f0a1ba40663bea236a2628d811098fd31420000000d95c96e7c3ba09ce6fb84f85384c0ed1c20d3f411e92f8fa855c13fc7c641cb540000000c4f87b6325cd1dd75f342a00b6870392571544119c80dd7cdd695fa6325904deef06934ab57bed41f32832b0bb79bbdf13bc72d402ce99b5b8164e1b49b1081b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 004710dca21adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2272 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2272 iexplore.exe 2272 iexplore.exe 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2324 2272 iexplore.exe 31 PID 2272 wrote to memory of 2324 2272 iexplore.exe 31 PID 2272 wrote to memory of 2324 2272 iexplore.exe 31 PID 2272 wrote to memory of 2324 2272 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2f78053d2e4223d69a4a17ce03ff89c3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2272 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4012855e1945b0269171d0efea74c14
SHA1e5fa7b95d9ed52992dd936761dca2c1c1edd26c4
SHA256b01cf89f3d3e2bda5296f46661a03c19ec7aef01a3826c94705689efedeb0230
SHA5124eeb81fde686df51f0119130b97edfad02d0fa8a54fee18fa8bb24f29f4a318e8d445b527e0e121ccd7e14e115fa8b5510f2a95f79309fc5c37299f621a34b8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551e31630f48736e1c5a4f79b2929be31
SHA1a5e875c7a1162ca84e1db85b369268d425d5ee8d
SHA25670acc4d02eacd916c65850271a60d42cb3729075ace2b8848a4fed11a330f723
SHA5122f1895657fa1b7aab07d3edc538efc006063b865b9e17c328c21c3db4ef2cae1449329c66637e5ecee80b338f97a83ed6980ce8a57a9a44004264257e505e5ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e108a9f8ed202f47723c91923420165f
SHA13a95ccca9cab13a835048785c70dd35b175d5ace
SHA256f980a32dc293816af6509fec758636487b297b60b337a971467bc756d2f3de7b
SHA51261ee6a06335ee2f153909000f4f81bdf79ba3068d4576b30215c5edffae068c247c96542d125188bae840bcb092a9e89069194299499d38b1b42635574da2cb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e5f53af9acdf27aa98093a7d27c0320
SHA1523b6b76deb45deeb3bc47fd3ee865a8905f5244
SHA256cdacfe800d5258d50a267410536cac1fbd9eebf9eb6354260f187c3b4e70949c
SHA5126e5df31fe27edda4858270589e8b613d45591331f60003ca47749291d02a343169fea9d70f8e2f4dd2b52fa781deae758fd3c591edaeea181aed2ba2908de313
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f7588786f40483853bf2e46aee53522
SHA16d300f23d3007e693ecbdc29b54a6c0c1ea46636
SHA25646401c958ce706a89b2d7cf681d27034198b6258ef3a6ab8c8152aa94a078c11
SHA512c6b126a70dde6e95c4d86025465e5b7961026b65ca061297f60d70dbb7595de577830c29e3e97e441aaede069b52fee102fe3d60ecce383645a22b40883988f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a843f4a8c3c510c8928653b77cb7e68
SHA1653cc4e502fd20837f3934b7a10afde8d22cef03
SHA2566e44547e2a42dda06c43198d99cd052977fb80ae13f85b19d776f691797c4d3c
SHA5121e1d8af1b38464cb4c06cebd95f980e7947d6f8b0183949056a487abfe090af907384bdd2f413e86b9f868b46c1c81a10f879e9796f9a314facf0ccb1eb21165
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5757e2d7c207dcf33ecd721c154f9d2be
SHA17d7c3fe201874ada63ec442d0ae1edc598056f3c
SHA256093894f72c21431768fe588e959db21664dab2fdf5d8084e489820c8f1676fc3
SHA512415c251989b4390a070d5791351d7e372c65e549ca4c78aeee4677eeff8766f6c089056d0128191ab2856366503f6ee4fce669db709b409e91459d2efc145f8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517fb63ae2e7ec290308bb4152d3fca48
SHA1370c480dd761f41f8f5e637ca997521291e62506
SHA256e3d69068b07ab2dabc94aa796fa4b8f66c080dd8f7f72dbdbfeb659e9e20c85a
SHA512529e9001ad041b34ae22738d0c38fca79002ddac12d82ed726d4feeb6ea491fca4181ecfcbe74da84e01991b0bc156451d00cc1d500a553c420af609dc3bd7f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5709af2b7b3090a24ea9fcbc1b1b86c2e
SHA12d1b314cc445b5376f21c97035e4e6bf3c45ace5
SHA256e357c50018cd65427e0981706be7b51a254e2d1fc9344e8c4b057dc973289957
SHA512b280722815ae00aa91193e777de4e81a75d3824bf344e8f8b2b091d019da2a54df0c9d3216bf832dcd7f250e97f034e4e1befee909019ef36da0141b0358ec2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59954b2d621f39abb903432607d4741c9
SHA1a8372801207c9a508c16c7d1b33376ae0ebe7afa
SHA25659d2b448183f07a1790172e6a96854b5f157e8af9cc4c6984d05f9b48bc55e44
SHA5121a7ed8fa859066e615aef408a99d167f1a4870dfc10c52110add941bc51bf540e9999b8de401dc188d3ce63eaf98f554b685984b691284fb51868addf1fac6c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58aa5f7ea7fc366da1661ad9364807935
SHA1d43a68e8ca8f1018c9f1272b489859b38dfb44cf
SHA2568f2f97c47ec04a19d93500209d0401a1c89de8c53030b74dbc82beea6bcaf887
SHA512e1f1df59d5665a8de5c580903c936571bc868ab4cd047965a1a930f817a504bb01ba5a82dadb41680045c393537746ce626de5274f2d6e66edc1e3c111ec2bd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5893d296982a029d4138f92f3cb89ae1e
SHA108a38bcd21c04058fb29a5c0c7aae895e24b51d1
SHA2567370e706935e6567cbdfc4316fdeead3d3e747a43180ae9a92ea034775287b3f
SHA512ab88de8f4113093ec6bc69883f0dd53b5438ed81873ecf53bc52877b8834d56e22a574bbf3d7ef850924f3aa6cf34c619cb0bf305327d37545d06bfceeba0b5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5157e12fc9df54f9d13c9a4f21db1fdcd
SHA104e452d294080b223249a2080e2a512d83daa12b
SHA256f69488e6efbc1346b7107915921b698273e08a4148fe960f8cfa21073417d5b2
SHA5120ff5cd02e14e09395156ef41fd3599e4b299f4db849468223324003be65579e889a4c492240cde502e6970a6d6aa18072af635b509f316d23423890410e53b66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587dd5e0618b7fc129271133f7e312e7c
SHA12c378b95f36c26ab8f2b789fbf39ef5b1dace787
SHA25649467e4c3b80a7c9c1e35630f5d8b28ea62cb9d6a6d00ab24df802b50002c894
SHA512424b8d0c0aaf66f4ff42486a22e2a216706b9942de8a84e2a4752386a42012d429a229d98dd019f863d8eb1bc4648c2909001ee676b10069cde28d905fc8f8b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a46e7ae1fba5fb19b6d65be5ac11d9c1
SHA1591e0d6bd66430f70363f2b150008652df448a59
SHA256bf22a81889978495a222e9cb43128ad753171f38db935b9db2fbfc51793e8f91
SHA512cefbfa7642607e2e1fd9251c74ae891f55c8638c38b17067fde872898a12ed31b541338ea1e72ace8847818f88ea590470fd5ef30794e6a910619bf8206c97d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebb70eedb02715f10be80d62653d8ee4
SHA1645ed1c3870efc2c0362d33cbd00330bca1b27d6
SHA256fd1d0675cd7b2c07cbcb001351a4ccc708ae81c155d3495238d305e2fdf20d8f
SHA5123a87a68c603c41af1c31109ec2d05f309b31d62bc0e94fbbd390d5d7a23c8194285f5fbd2895660a5625779c45dfd27c796c233ca348acb96cf1a6d72c156685
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c41bf6931c7d3a5fffe8f99e788ac021
SHA17f886d7706f1d71c5bfe428e26e5d02ba13833d8
SHA2567281a45dbbd62f7c07a6bee32d47c9486ac90e81575698c1682f27210a22c066
SHA51204b649b82a1064159793f0d0dfa4ae86d8c3611f944583825d9240608038f47594d7845ea98deb3eb6fa9ca2b28098694652a3f5a68b9d5ea8a4fdb2b1cc8f77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f014af3c56dc9c3d506ee8a4df3fa479
SHA1891ad306be5982601092ee91140fcf459aa4f11d
SHA256f8d3c65f6a811ccc79ff02fd6158b7f7db224d53a63bd2331bbd83d272d55505
SHA512dc6bacf1cd71bcaa55ffd07d235ef91e51b74f761b4bdde07106da485a3227654ffe11509c4a68b854f617029035fe4d302db1a0a570c5592af87641bf5d8a5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5130ccf91e7fa841e1542e7174ea3e950
SHA1ec96c760715bcdb078c0317c115603ed4ff6e169
SHA2567de5b93a706ce49d0909c4bbd0559ac062190b086d0831fb681aa0b7673ccc43
SHA512ac2b349c37c6abb4be974f6090aacc96f99b424c6c6357a604aef4c696fdd8d2127a31bccfb6a2fad95bad9e9b2de749676afc626bab964ea323bbbb7f1255b8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6XUZ2JLF\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b