Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
18-10-2024 07:34
Static task
static1
Behavioral task
behavioral1
Sample
5632408ebb69de769fa530dab24effa5_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
5632408ebb69de769fa530dab24effa5_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
5632408ebb69de769fa530dab24effa5_JaffaCakes118.html
-
Size
67KB
-
MD5
5632408ebb69de769fa530dab24effa5
-
SHA1
0b9b89dce528a3ef6bfd34c81a0506aa73202626
-
SHA256
2329abef7310fcf35118e813885b844a3e55e2fdbd0a17348f4e55d2ec23fc78
-
SHA512
eea1d8faa412f67cbc943989f46eb7770a2d63a3e6cf14c727eb07fcced6625ab71d978191cf7da1a62bbfca2ca85725046372f415d3c71d3c24e330ab915f56
-
SSDEEP
768:JiFgcMsSZ8tN99OIsVaNeqoTyfQCZkoTnMdtbBnfBgN8/oygcR/QFVG8c//IjkKy:JlWCTePec0tbrga6cuNnzIjv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000390b7ecb4c8037d97c5bf4708c509dcd8bf836a07816b0fcbca6269903731f8f000000000e8000000002000020000000c413426d28fcab57a1c7fa1d2ddffff63343b28a424f670f6247490756741abd20000000333ce55eb0ea2220b88d24f8759bab1c56159a5096988321af671110d530f06740000000a2bf0d5011cffbb1a7a25f49285f058cf33f91829ba3eba3a6aeeace79097fe44588f853207cfaed33c6b4f6d4c477dcc7adf774347b968ae9b67ab972e302f9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 304234493021db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435398756" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{74AC5EC1-8D23-11EF-AD31-F6257521C448} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2268 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2268 iexplore.exe 2268 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2832 2268 iexplore.exe 30 PID 2268 wrote to memory of 2832 2268 iexplore.exe 30 PID 2268 wrote to memory of 2832 2268 iexplore.exe 30 PID 2268 wrote to memory of 2832 2268 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5632408ebb69de769fa530dab24effa5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2268 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b2f683d095910f90bd6c2b56a90651f
SHA1958e36e570ca7ce433dc4e0bd40c1ad5f4bdee36
SHA256f7fcf8877e7cb2183f2ca8ee544d3818255e6ec0b4f56e898fb8a2dce0737a09
SHA512a86e4b069f934e6dc1e6483d243792969c3c8223851ff4068caa92a96793d6b1e2ba974cdbbf8c04a3d94daac699ff5579336fa97bb7f2c83dec50063433a0b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51911724caf930119358a15cddac40cda
SHA1810fdb376ae76c226f6c634f13d5c615f6403b18
SHA256febd367ba0f125c35de21577730bc5084534b9f1fe7ddac2c97c318804cd9e75
SHA512bbd77c5c9dfc9f292faf55d00e7bc92ab34ed8d7df2152c0a53b1139a4b9107ea7e3365feb1e3ffbc0c40ac665d17ab8430cfc102bd41b471249255ad6257014
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55082309459fd71aa13d9197dcce020ac
SHA1dd7eb655c10eea5b0da01ec5085dd852ee110ad6
SHA256175143b63dca54da7839301859e008007eb66ced73a57718c6436f02a15d47fe
SHA5121d8b03a1b747a1fbaa3156e79ae7f8a04c1cfaa807ae4b57431480d9cba4c345d5abcb853c3c2ca706c9e6de3a35b4eab701f17e6c255c0e3455dbe484bf376b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0a88a8c60a9eede8e0eca2aa6c0f521
SHA1636752562bfa3e16cd84f9344f32ba893be10e60
SHA25682cec83dbcabf9b29a77efd700734fed9aefdc862604bc5eedbb43a09dd542fc
SHA512ce8c7ec7e88ae798b41c24a80e8e8969cab9a8acb83dec6946e629e214668be11e864c9768d7c95002df5caca332b4bb7ee0c0e7e6492622547dec062663af8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3570c625d222ead4910c35ae920fe6e
SHA132ad7f16ff6dad56e4df3d9930b4a738f92759ed
SHA25643b53408574e0ea60a78be5e9afaac76633237c47ce1698b25e6fc064974b22f
SHA5126b260f69fcc3d23eb686f07148ae56214c31b3df179316c47cb729e05bc389d781869f299f369fb9c2fb877e36720b044545a91895c5fd168c3635f0a03fb459
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5827e8a621dba76810ed5c20607bb2a43
SHA1a8708c0d50bc68211a062c28067ecd1325d52d84
SHA256d2a545ed0231378604a46b6fdf88e0f9830c82423b49f64edfabae3748b2e4d2
SHA512b90495876ff755bcf12a6c373132a58af1a3ae44da4e52b75ce2fe85cbc849674ea894cbd4d37899c7c2dd349da2244759d9daca82e31df55a757700f8f79592
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523317dfb56fde0bb5dd385b064f36ee3
SHA1afc68f22412194d6d872db02d1d6a37879941a76
SHA256a76115617f5bc216973082d3468a97ebefa99ad744bf03e0f19a49c62131b507
SHA51226542fc13142b1393dd976b5d89e46715816bfaeb592d5fb8022df5869f34b69248a698e6eca7cb878f17454e217a2c7d9012761e022db34e0d5f28f16951672
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cab7f646c57dc2b02d3c4ae1fd32451
SHA1268dcbe213f8ec6b022499ca05aafe0a2a4c2695
SHA2560f3d82c78e145235804a16b31da11c4ec8ec92e6bcf4ef19bf864bf344d7f330
SHA5125ffe73a77aea0628c1db2e0357ad9cf23afc31d9ae2e77085ea17755bb85b8b867c313e010c15273344dfe57151597eebc799a82c4caa2ac575e12bd978896cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f25cf0344b1a7a426c16c5a47b47dfc4
SHA14c92b2ffed3ce1b103257bd814b2ad7895d233f6
SHA256af704b29a51616ed0a3736779207eb52da10521ef7435613adb41ccc7b07d60a
SHA512f94cf932753f419842ef81327712b359ff426136dc7859d9d30496781ada30e11c8922a0a525f76a33c5bbe421eb4bf405fef1231b3c93a9b43f1210c9a19c6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534c89cae94cb214664d767a88adae86e
SHA15048bf79e6d51b7a61ea5f22c56495072f04e085
SHA256bcf2b1910c708dbba606bf5779739952458c659caaab7b3d52f13059007e7d92
SHA512ab52a0dca842438b77c9e7dce0e19fd5bdeecda703772ed33b35abe83116c5337187f2ba9ccab597ce45c3851c1d9134ca612c9fc6ba0406855322bcfe1c515f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5190c2e7bc4d5a916153ad7efc9844306
SHA1a80c192c5c7d480892336946aa1f9ad82c0492dd
SHA256292ecdff5dd37e7bd69b0f0e888c7af3d6492147686bf87ff446817851f6e463
SHA51273af487ee795c79681c5369c340f8fd9588cc2a81877aa3eebe06e93909271cc631a3f5bbeaab5b6e6d317f4dc004b462544c9341c7d4b97668847ae91cee5bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c138328b82906f8f4852cd15c82aa4c
SHA1eb7b4e2154b37bdbe385c66a9d6f84de8413af01
SHA25694f22980af77e36e79cda4bfd9e6f4022c1899d6f184fbd87a1c78b7f46da515
SHA512fe566014c44526df49f5f26d7d95b4cf18609e636cd9c858c6c41e4de391eb2b773e226bb3cc4ad8cbfc9b3f33ea248c2eb350ed0f4a4dfa0a804333cd9604ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7876272a2bb2e4414d548ac03336917
SHA163696b1b5d7500b141aa98a526ac971cdbcd97ba
SHA256ca364a0a89869c3c5c70851a94ef646b0201c35b82ec12bf1756376583e81534
SHA5125cfe7e3a4841dbcca4595c91d1821c3a21d6b88b0d49ed0f7602bbad6f6ed7c0de0b0dea854eabff812ac38922ad728657b6225f2df3e868a6a6c98aad0b4dce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9264d515a81a85f67d36992d059a9c5
SHA1c2b567164a9fbea409ee0e59220eb2d1ef9c1425
SHA256123b4e043db79f1fecac516ca8232ca385820877e5f72b0f6e453fc9698b4a7a
SHA512ed7cd6673e4c7231dedee7e529f7a93ba9885456b3a42824b09dfdb0954368d325ee354287cc748f81a015a8662666caffc05183f9913c4ddaa7d3cfe046057e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b11c60d654b31c71514df1e88cc4d4d9
SHA1851b684ae9b0050dd3dc04264674cdef364d0316
SHA256fe3e739ec5bcc861d7ad28ec2cfacfab867ef84e7dab29698bf1b8f03d469aab
SHA512302c78e8347d03b617b23b94bc625b7190fc54f7b45cbf7637298b99b83bc927644fae5de64c26d139b581222a912412154dc43823dff4fd4c75de6c6a3a7bdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ba5d669d891d801057f046182062013
SHA161a92abf476fa62f747696b70e7bf6c1efaf6311
SHA2564d6787944b95fdd283e77226ea88c54285cfdfd5a8fbf3f2895ea7441cf2f24c
SHA512b5b21524516ed859c20296c68530eada035a17b0648e820eb144eece447a29d959a331def5bd9f079be5cfd036d61d49c03cd7e52bc1020c086221264055a783
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5881da78dfe974173588e706dbcc96bb5
SHA1b4a5a1de93c38e47e27c621dd2b6284be9692a70
SHA25671f82446fe84e1d98a25057f9cd7c8ca1d04506ecce729923d02cda85a7061ba
SHA512b174ac972ba0dd604d9d58b064001df014fc94ab6dbe1d2e766e45e1e703a6609c12afc5f2d7097b443848aa52385c9c52e5825e57c7ef63a86a0165375cf716
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ae7d9ce05911d34b15678d6782ecdf1
SHA1c1ce8960c583930c8fa703b87b8e60a6e7770e8b
SHA256a8d3ab913caf39ed1ee615a119fd2ca5b7aea8f39cfc9c280a11e772e9a9f7b1
SHA512b34ec05378978a90ada226cd4862316e71d87c61987776df02ba66097fdd02ff7e2ce2c2c1ef41cb97c68ce09532ed1d3442321d4df5b140e8497f934feb0f70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce4878a4e35107053f77a088d8e8797b
SHA10a6aa551d7427b5614e1b23a362eb6c215be46df
SHA2567c5a8a46a4202ce90c9030e1c68b5490d0cf7b236cd70461c225ef0fc7d8b5cb
SHA512f174278b0bbcfafd7bfefce8cd1164dafbcbd2cb6769aee9c84e5cc3182df8a158282a51e38dec03576e8f4d2eac895809a53dcb8c00af3000e984b96de4c6b4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b