Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 21:43
Static task
static1
Behavioral task
behavioral1
Sample
423aec417ccbb120c1b7cbead4ff1c9f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
423aec417ccbb120c1b7cbead4ff1c9f_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
423aec417ccbb120c1b7cbead4ff1c9f_JaffaCakes118.html
-
Size
245B
-
MD5
423aec417ccbb120c1b7cbead4ff1c9f
-
SHA1
fe404c96db1da397fb909511752cafd3dd8292e3
-
SHA256
9ac9bb44ae9c5a0df17efea78d99912a0c4d0a295b3e26749a1154be36dd64dd
-
SHA512
7d19b34f784a922be127165ece3ec4eb9425d0f5d84990135ec486716e55169563a1eebacd4cd34c3613a460d6315db8338ebbac756e57fa8ee92b125ff73c8d
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d04a3303b91ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2EB8E481-89AC-11EF-9D09-F245C6AC432F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435017675" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000daae0e0e59ef4d490e22b235055179aecaa086e6736f174e7473489177eb7a83000000000e800000000200002000000032f241867d6cd256b59474e3ba9119bf929104587bc530b79d62ff7ab3ea741e2000000082c06776feba1d17710681f9119f9c951a56e2443f123939febdf42aa842b9a140000000a339c6492ac734a2561103aa71d081a0edafd0f96f4b3ccb74d9d665f2bba18bf6d8e512f66c63a488e82558a2264efe30ce01d7cacaf007579e51094afc4577 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2756 iexplore.exe 2756 iexplore.exe 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2680 2756 iexplore.exe 30 PID 2756 wrote to memory of 2680 2756 iexplore.exe 30 PID 2756 wrote to memory of 2680 2756 iexplore.exe 30 PID 2756 wrote to memory of 2680 2756 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\423aec417ccbb120c1b7cbead4ff1c9f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2756 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ea8571b25f22b53e6377587fdd29073
SHA17953e2c27f689f614ec75c519d3e58dd7990b728
SHA256cc30db78df177df9661df4a1801d50ef812eea8ed23f6b9d86fcb3030deedd3f
SHA51249af7037dc59c1bb34bdcd881348c940d55cd7237d21ff0bcdfea00f134c7dc7200e056905bb089dbd3f8df88c7af7b2c4725b01eac8c260fbe1f93c15c92d76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a94b526ee03fb96d3a79e5d63119793
SHA1e926c560f24083f6578fe2d2f772772075e900d7
SHA256f5e57a517fcdd2d56d33c24b764536f16c99a24650672a3fbae73dc08437b813
SHA51290703c52467f31b257a3a5d2ffb2387315bd647b80cf40072ed8643adb20ecb66c07602b7793ddeefec8a49d11f61eb0124ae8d18882ea656e79a469642ba368
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575eb28e5a6e9f2d53478bd69166ac618
SHA1df7c2d39bd4525ccd602138bffdf2e723bbc37a2
SHA256edec173883de0cd61b425a42822b883e4152dbad16ef903924917c7a753d384a
SHA5128f3aa27ad575ac0f0ce416b4be199dfaf5370d9a18c648e5300382a375397505695d8179e9b9d66b795223a67773ffcb4e28234dbbe1032e9720026073aba063
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d6b2aafce2cbf0c24fed201520414ec
SHA11597d876fcd2fcb55a263e629b16514d8bb80d18
SHA256c04a3aa5490f7d6d38681e50a5f7806d10916a3b4b054aaccdf792fc795fc43d
SHA512c69beb6aae5ac31e4663ade946c85ea0666dcbe1389a106880db8ef77895067dc960e39d2ae6e032f85f01104ba117aca8842797eca0f49c5d52696ba646dfc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7ad331a99ad53f0688828e1e1fa1f12
SHA13a25303745940c3ccc861d3b1c4b6283de88ad7e
SHA256370e9f317967efa62fb5b2cfaf207261ce1b0a814e4850f05480281d0aff3b04
SHA51263f40a3bfa776ecf945518f320bcfff56342d2b6da21c247a6371fe4e6017985541fd04cc022de01bba81df0c00649b60a4cd045713731549c8c323d9e0176d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5e4a592e1b97644b1da45a4bba13a1e
SHA1377141e3d2a243e98ae29e67aa96dd868eae538e
SHA25644461aa336f47f454a60fc3f59bad6848095ccba77ade6956b681d4b2d805f1d
SHA51279bd1ab1d1e3bd64cdfa5d28a5ca5e16abce478a7c53b398e84c9abbbb09c2849489754c1ef322fad4ae600fa956e097cefa118c1e0c5a0aefbb22f78178af0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501b3771dc7b7c6d14bf812953a60536a
SHA1be3e9f74450b5c9974ef7c6c20904ff90a67f06d
SHA2568b95ea4f09d387e3101d7460ec83ed912b0e5c117ccdfc4f32992a101d755f72
SHA512e5b771d2e7d6d038896da34e3df5be1d4cdb053d720a21bb01cae8291322d98fb7de5fe0e0c664cd193831a4e1fa91c7ca2df99125aed4b26e2ad9de1efb519a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af81a5dbf40d2fbdc9e0ed12789a2275
SHA1a8bda9a2087b3f6f7492b5d7385dbac2bedea909
SHA256debda78023e5350b1550bfa1f612843b1373257314166d37db5be2f287ff88e9
SHA51298e91b069e4159b9f8a07bd4610ae32161b1cd4d0320db9e79ad1ea30412d3ef105cb1dab4ff3623b5dff1b2f0eeefca871cee1871a6d27066571ca1356ad9d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571acc173dd010d9dc65a220615c10467
SHA1855dc95420f837a0968add5f8beb8ff6a2f9bbc4
SHA256597be242976e80f35a3a79c99e163259d090cf41db6020d1b2e0f8e853ad91c9
SHA51230511fa600c071b1b55761105bf9a7564b82f04fe409445029be4aa61a6851e4f33d88e488def7ec2af3b9969ad38a84486051f65c71d66d8b3d1ae71e0c5c67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5711557afd8e1fcfee81e4e56aeca6240
SHA1e78900b316b075da623dbdd5f72bf1d62f44a5ed
SHA25663039d6f5b66169406de248b7840ca999acd89e304c14f5cee000026e4725cab
SHA5120cc7460e5ff29dfc3a2fbb481dbbafd5d3721908794b0b29fa8091f2ed1b4236ebd3f8e49263437e7a8280e1e4bd8425e2bea6b9641a8465168c303f2ec097a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ec21e7e237e257066b4abb017cd15a4
SHA10d5c989fa3fb9f9853f4a245aecfa7004f9c2bc4
SHA2565456b19aa35c52abb17e38f8c1324ca4ba8198c48f94b194013c093d7887e927
SHA5127616fce57b7c373837e219ed38034f63447f31d0dbb6b06777fd4dffc291661564d359ca547e5603cb28172a2cb5ce7d60fd47161848c6d4bf1261b7ed1629bf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b