Analysis
-
max time kernel
117s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 04:51
Static task
static1
Behavioral task
behavioral1
Sample
387a4e8a3e62b188182bd2bf7f10ff95_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
387a4e8a3e62b188182bd2bf7f10ff95_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
387a4e8a3e62b188182bd2bf7f10ff95_JaffaCakes118.html
-
Size
11KB
-
MD5
387a4e8a3e62b188182bd2bf7f10ff95
-
SHA1
7bdfb6073d53e2e1b204614766f58ee424f1ab84
-
SHA256
b72a88a674f06dd256b0d443847ddb7502595f40ee7404a138975a9ea5c7db28
-
SHA512
f6d73a1ea33854de03e72c5125bf25ad3dcec619969de02db84d838544c299ba25c290583bf876f9b3c1bd27b991fdc2e1303d2243a886749fe74a6587a7272d
-
SSDEEP
192:2ValIsr0r57M4xbT8o/w1wvqa1sLOXuBuLbdU8d:salIcIQ4xN/ggsLOXguLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A893D8D1-8855-11EF-A27C-4A174794FC88} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 402af0a3621cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f5420000000002000000000010660000000100002000000087c560ad9c62c9a227a30951aa05f45a2529e89672f5faec6042546065a03f07000000000e8000000002000020000000c12b0efe3bc22116fbe00a224a7477f5f6b5d8d039c73f998ace98c40656427a20000000ee30fe6e53cd0c79f4764fa8342f0c9e9ddef0b4b3b5189e3c3f64804e86462140000000ac1b670a408e464114444024b26555c623094c1b5c5e8273530d5f7d303d56f13b09efe667936f7ef7027598b041a01d120f86c1cdbea440933f26f5c86201ae iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434870563" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1732 iexplore.exe 1732 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 3060 1732 iexplore.exe 30 PID 1732 wrote to memory of 3060 1732 iexplore.exe 30 PID 1732 wrote to memory of 3060 1732 iexplore.exe 30 PID 1732 wrote to memory of 3060 1732 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\387a4e8a3e62b188182bd2bf7f10ff95_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c30eeb25761df1158aaec6b52c55f121
SHA1588dd9714ef0bf7919771d993e7b3ca5ee7bba30
SHA25646b5d7d5403317868f35c4e1e194a2cfa03616f91dea5ad923a7bc3c06b68823
SHA512f64717ae428f685528d29034d618e9ab52a035d5a0746011f2310d861ad04418e5c56c69ab613ef0c883b7f781d2e10206310d4a769504cbbdad167064f26048
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e92f19e142fbe9aad174293a397b72a
SHA12055f373e6b94c4e38c54051827337ad52c84280
SHA25671d3801215058f51767896555df83c59f3c56491df3dff612051a8282005e8b4
SHA512b9352057770452f9a989d3b50f494321978b49af5b9c8efa3430af78d3824783b5d5dc3618d5462fe96e0a11749b80eb89221654c88776475907c62535bf24e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d4bc772e52e12857c66c5a7bcf2b7f7
SHA166394a287536052a99c3d3dc71cb095ffdae2a7f
SHA2565a5dfbd91e4b428ba3b8f407e3e197c429e38b68f47d8afe14f732a5392fe449
SHA512928c7237b5a498647434fb455bdb4ab560bba5b38df28c2fb19c3d8f62e889f74f446fbe0cc60eff37aca2da979309b2b01fd432050a88944abdbc3bc62b0654
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524da507a24426aadf0a8bd934f0cc90c
SHA1895c56f46b979a15b5a5d67a43a69e6546aea065
SHA256f5225afb6339e20a0e1b6e8254409c53d61be3c528eb6daf17594132633727b4
SHA512b33eb4d67388074c323ca2a583a9f71cf63a045bc085cdf44ba9eee698f55f252abdf81f107e80f8be6d4651660548faf55d6b98c0838a9746f6315c3bd5ec31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1771a30969dfd648871a13dba5954b9
SHA186f65c8faa17d8c9c17fc29a6c55986eb3bee562
SHA256dc9d48c0920d7b24234c310a1e282a48cc36b61ef75ed1b3f8b4e976a4544246
SHA512b64908ee2bcd8e75677c5612336b41d01468ba6b1b03c3c3aec99f53c8394264e0c66bd49d0a8896d1323bb7dbd84e7def561fbae5073537b9d65de0c0d23a62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cb8e1c2ef88b274f1263f993cac4e39
SHA127a59adaa3271f9aca6e6edbe2b32bc83961a63e
SHA2563f7c4b7ecdc6c7d58fd4c4a56584e4b7c83fe9032305be8accfbf9eaaa446854
SHA5123c127d9370c321e033b29d3fe2692e00d41364043230919ff104651a19a3d034db7c8dbe2fb68a8b8a4fcc2c5cc98823106643341177bb1954eadc17e831349e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5049d3b20515bf9a981ac65cbe09b1194
SHA1306b11093ed22905516cbb0dbc1cec73bca3b5d7
SHA256ea0c029ae8a362e3717c2997749aa032c3819b9d2c8e07e8eb05bf26e864c4f2
SHA512e5b496e83446bda59feb3718b70aa02c4d9222b299d4105abb29d5822a6b82033caa9f57409a8e354c5cefc37099a8fc1470808eec7163f8c5c4f7a245c6d350
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c487e6f23876beb41e8aa1676d400f8
SHA1abf92e8d752088142ec3c9fae607616a35c42883
SHA2565a2be9b526af81ab7addbf5f6239958afba06420e3453d73e990d5661f6f1eff
SHA512cfe92efabac7f43bee7d94786175e38e8b5eb628dc0626ce029a7ae9f1909c5fa32c6a9dd002f3786574ea31304df3bbfc1fff884b6614aa635f204602bd1a72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4bb46e46089030da4d2353947f7e127
SHA1d3cdef20c2fb368c621abdb5b11c9fde6cd775c7
SHA256d5e7005c3c2e1aedd9e87a5b9abe508009e57686b166f576dc9503fec57dfeac
SHA512c90e98c4d903f1e179442320aace20c242fdf4a226fb168e0e989cda0672bedab809855142c884356c26f3f5ab884b9ba9506f6a5e749c5e7543b6ee75d13648
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521bf2f292855c8e9d56f5f0ce072e9d2
SHA144f7e9c56e92a19659f02bcf9a5ae83f3102c451
SHA256f3b86d97146cd8825e4e0c63e3c69a6236ac4243194ea9365812cb708ba8f4ef
SHA51286fcd846e0f4c6e6fb48f27519215c2a91c0893ebc8a1e7b0e14febc84f80563cd78f41351722e2deebb8c85e76d5c1ed11b4bd1bd9f032c7ebe74c559758481
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585a2bbc8e05c5b715d822f379060beca
SHA10debae8518e95d07f85a264b08cb02fa84ac8e35
SHA256e76a9854959b3ee6b6da56727a1b454e8bca4786ca1d9b6a90f56afc722f4366
SHA512847926b4fd37fd721485e150186548f052f2fe1dd541a781b5b483bf497b26306c71a3a26c41846d874bba5c8baf6fd912616e9c0d101b9c3fd76755c7173fd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52261416ec7116774a26a38dbb364ff20
SHA1325f6cb72c04fc002ba1adf28aa704db3aacac64
SHA2569cbbb47667cc3ffb6e5e8d3b5462a46a277d2d24ee6d4bcb840310919d471277
SHA5126c697cd6d27d5d5a868ef15d700f722ef934d8133228ef8c8a3556752ee5b3485718fce57ce0ff084ec1ace27e5d0b3418028db8269d9b7644f634e2c76d5582
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df935e6ed5cf6bbade8ffd24f1714c5f
SHA1676611f8accb223ad04e4cfd6ef23838e09a8acc
SHA25668c6f442a5efdf63da4464e535954bf1cc4388c9e72a80d45f1dad97afd1f65b
SHA512852cb3e68866b6815ca6aefbfec674801f4e18eb72d106a0c1c02a33e4b358c65d0e6563e0b12b438c8610290845fa2e8be67a97472d933318448505cd75eef8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4f169d1f255edc0538f5d48bfa3356f
SHA11f9cb18ccba2c058207f66c9344f05f37118eaea
SHA2567b4d221fafcc3c49fb43940909259c9638b48d651fdfb4ab2b0743b356940735
SHA512aa530a49632f6fbaaaa437f6fdcc94b554dcf9edcf8b24db5d395ac64e5e7bfd061e02037a43fcce17e06e5c4fa49894a7226da769e5bf21ca166aa1f5b8aac5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b4bca52fdbbdddeac7121f0ac98f945
SHA149d10d245930a1609c98c285a163411c4e4c0bf2
SHA256afe197b2497aa95e70aa46bfaaaef4b2d68c3c81539a01e72be5e3fa9db447a3
SHA5122b201634ab999ddd05d8903e22161b796688faea32abd5cd436b153f832180981c0fcf67f5e7d2be2a4805833a9f05fe9993838af53239a368f6c489f494b7c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54281a2a1982c25cf4f592ec8107b8f4e
SHA1d5180611fadaa2a917e24736513cece431734d6f
SHA25687445e646c16c911ecc5ccb99299d030ce797e889b67a5fcb564d82aaed4a1c2
SHA512c98eecfbb37916618e3a0691a0eb24cc3be91d99e5f928da55bc3e29dc7bc44e45676d5515b0e2e925f3c5a72a4d21abdfffbddc1c8689e98f28ee6b0ad6d505
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edd79449d5b8f6a9a42013d605752ff3
SHA18acbf9eb7d41764062731ebeb6e67e33e7f2c38c
SHA2565b6b348c06020be66f629e12a9ba12687efc61308f75cb4cd59af02f55fe270b
SHA5128486553c3b1427c1c1e29b99df977135434c6579a69e0af292cb28b6e867453d0c35e2ca2faf1f0b58b41ab21ebcb32cc4eb190cf1bf7c3e04aa6f33153a5d02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ff6a056677ce76f387f0b0eb1d7eb46
SHA13b0cc87acdcb387674a5b47ec8eae1e46f4323ca
SHA256e5b5f80caddea589ae156398cc095ef9b941f1b25ae2118991a1c9fa7d7cc905
SHA512cf481dd09708d1073d233607ffd8126f76bdd127930c5e0f841eab72561d85d5537f5c64b93101d06a2afc8f6133f62c4aa7bc15457bc216d08fdbc5344441ff
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b