Analysis
-
max time kernel
119s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-10-2024 08:09
Static task
static1
Behavioral task
behavioral1
Sample
826ad5ff61740f41f0dd7d00615f02b8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
826ad5ff61740f41f0dd7d00615f02b8_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
826ad5ff61740f41f0dd7d00615f02b8_JaffaCakes118.html
-
Size
12KB
-
MD5
826ad5ff61740f41f0dd7d00615f02b8
-
SHA1
932a4888efccb8220ae3d69233f10de3c358e9b5
-
SHA256
06598860346300c8a8721644232ea68b4917a1d65da93de986b9f51fd52ef3ca
-
SHA512
473e345a4131ef1f2a0d16c3a1e3243bfc1ce555c53cef58d96d8e0a18e48e1b5108d43c290ea6009552e1f3a28138fd66bbf2a16fc5d58695c9d4faa65b99fa
-
SSDEEP
384:CyiLJPSwLoalGTMjAigb/0lMz2TcgyECh:CyiA6jAigbslMNg6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000000bb785d346079e10cdce43b21727bca9a7785adddcb79414f095ee120ab55a28000000000e800000000200002000000096204edd7594d89e344647de0b7a4490aab41b2e4a665e246c14038d168aabad2000000087aa4124bb7c079833d98f75dbead41b2540eab2f807ff426a766e6e12803259400000000d02b8fff008eb9811b130172185006884323283a158290d82bb7fe856401415e6b06f467f198e2fea559ed646d5da808d1c8559568e7dc769692b501e80a6e6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9062c7506f2bdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{77D18E11-9762-11EF-A094-FE6EB537C9A6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "436525332" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2688 iexplore.exe 2688 iexplore.exe 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2964 2688 iexplore.exe 31 PID 2688 wrote to memory of 2964 2688 iexplore.exe 31 PID 2688 wrote to memory of 2964 2688 iexplore.exe 31 PID 2688 wrote to memory of 2964 2688 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\826ad5ff61740f41f0dd7d00615f02b8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2688 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b529d5bf5e44c0b4027bfd32330afd6
SHA1b35bcde9737d3e942f767d59dd2e11af5b3b583d
SHA256431c6734d03ef1d1f9c8c653b8afa1d5a1634e4aee3aec4e610557724de91685
SHA5125e7c916d875679f2a9def3d202391352f9775396bae00122ee34aa0f933c1b5759c2ce9fbde5cacdad023dd4a8b15b33768ac95c34e97bf034bc0775d818a806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54327f53394c51ad7bcb128ae9319bf09
SHA11b36dae9ad075f4555d0be8b189fa6ceaa8b3ba1
SHA2569db4aa5d133bdd1269052e4ffec02245d5328fa9986788dc636ecfad2401127f
SHA51255843711e0c652f542f30e000de8ca673e731d030e2fa1d808ec41b9f60bc290517cde21cf74f654348ea44e26e76b0ed959f4ae4d745c6df5d1559a706e9c87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5861f28958dcdb33f68ae8bb0034d53b3
SHA162a6fcd6e05f63dac455d1306ac617943ab31de3
SHA256b7b7db162e75ad5f818762ae13087bbfdbf948676e21e0fb25cbc63854f4898c
SHA512a5c569166e5b16f44555f81cf5ea84d76770482ae34511c1d3f49660a1c4020b76e3caccc1b382b104631d7745a433dc4e98bbd37a5fc6e7c3d654bb17d34e36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501084f1e3bd08cb8f3d3d71f8d6ca55c
SHA1bdb110258450794b29b2bf8e0f385b31fb01ca01
SHA256eaaa994f9718d308dbefdc52a1df6766930161efb077f3b09e74d5300516dec4
SHA5125cf2cda2df79f1a78b2c8a347ac4cead57594684ba72e26ccdbc6503a5ba4af0e98d1695a7912441c6ccdf0b74914ebe7301c30870937a43e2c0b09c04eefa57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526db7ca81df346348ccfd87f40e96d1a
SHA15c482a6053ab00c3f368b32bca9484ee68213dec
SHA256a5e34ee8d07fe7bb795c08ffe4236f85c0cc6ecb013bf42b3a378728c81936e5
SHA51297afc8e9566fece2fa0351231d270e6ca2b408638168d02494663a81e1ad1eefe91c30b2caec2fcf9d9d21c141fd1b727b3ce7f58e0e556af316fdb6897e5f1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520e57a16f9ac33c32864e237449af20d
SHA18120e0f0ccc4782485b3776de37ef19b1f9e5516
SHA2561a6bee91cd054e6b0dfe6733f89c2c11afdcec7cf506f51a5371759df7a0a28a
SHA51296171a59481dda1fe6ca4b70632c8dd015cb752c41c4ff42b737689ec38565aaab8d87dc90815d64b3c6fff2a755c8d529150d0629cd27da7574dff2736db5ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdfd38e193e9ada35937c13ac7743ebe
SHA18aa755a660b051e791e2984407bbfa8d5a8a970b
SHA2568ee8c952365571a29cc0fba8fdbd581b289e3d794d76dd135cc1b4b60d303658
SHA5128fadbb7109ada43e165906546ae050ae14c7d5ba5240e0479e6802f279d20944447da47ff90e752a899c69e78af397df82a70b7d81d9962ac5690655d1da9fce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b68a49ab66a1198bf414913d4e61efe
SHA14fa5e7f0509ab6825724e61686bd3195084d18db
SHA2564decf55631af99f29acb14222fae24a9bc54560b91aef2b61a2cf4a86401624e
SHA512e4d3796fbf26505fb097c413ba2ea4db8935d9dae6567f8c0939fa70fc5db17fd847e451f875f1ba18e9e64fd73060079ed9105e9a19b969f6b9cf392d2fb379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c131a1ff6059ffac632835758824936
SHA1f21ecf2352d1519c3f03d8cc3d4eef4f73fac7d3
SHA2564e920a1edcdadd751695e258fb092dd80b34311b44fcaaa1155d701638bbf03e
SHA5124909d38d8eb4761243fbb100eff9ed7a38fb434698a20509ccbd7983e309f30707b0d8f705e86bad0dbf43b012812b182b2d01724e95b35d0c4ddc81ce6de25a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510a9455d1a07d80cd8ac39108eb2ab77
SHA1e4edcae7b7e12d62d9986ae5e825697fb27955db
SHA256e79e5e5b391370bd3565d33ad64319bbf90e52283981416e675d28f5a7ef9095
SHA512ec966bf709ffd9763f1bf41d021a6a4b5b465e05253c299e9b71b01fecec82384af67e74bc45d03ed9308e4885ce12e9dce35ee407fc5af133540d42c4ae94ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f5c34647b523f231095450500b90ad1
SHA131b47a5bdbfb0019374baa943ac545d124de6e76
SHA256fa13d112e1ec2f4665a6304d8c0c87f4fd1c51051f6052c15a123b186e827b97
SHA5123ef7fbf65e47c621eedf0d96e4d3a775e36d15709fb4b51e1721a444084011d8bd7de0656e45dede0f57bca9bd57aa744274efd86e4e56d6df1be84f3b804732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5747cc60b66831886350a1416c66715cc
SHA18793920d7a90b7778ccb79860bc9673585e60d4f
SHA256a2de96cfde94020023697160ebb10eb5c0cfa36d189e08b02c2f3900e5e27634
SHA5128a100cf470947790de3216730ed5762a6de782e825c8f8bd767173a8eb13d70e0a1391aa637becd0edf41c3bd2d07965701051a971cf51b58e0937b17d124a53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586e81ec4013418b1167bb54ab130a653
SHA110630257bc997b8b6b382690f76307a91307d326
SHA25656c04965f948fb0e90d561f14ff695d01050587448a758544f5de0a73440e0ab
SHA512a6ea1ebf2f59763311127a5c49d85e1f1894550ad8a8c7cdff43242577a05b19004c8e9a4ecfdaaf215b6724fc4bc292f431715c727e808f32397e2665de1ec2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eba243f7e5f9142f478ba58a50055150
SHA1c3e104e2423c51151b3c4fdaf41228adeec5b6d7
SHA256775fd8f4666bd261f42ca76061248e84237965ab93cba7905606ffac17c839e5
SHA512607fe170b385b644ef2e436677c1386054682cf5eb1852d97b21be47d4d6580b019616210fdcd33dd543ff9c9c3e3b32f4a907765d7323612fad57a6b4ef3cf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543f4f996106635b8bab872d09fdb80fb
SHA1ab637770f7dd24351c6c9ebd194acd1411a16f1f
SHA25655b75e904b4a00aa02fe1faf5f4e3b52cba68ab0c7181e7b8ee6ecfd7fcea866
SHA5129b20ed677c7462e5f4817fafbadd0dd182a9bc2748eba8956dea1ef2b78a8710ba55183779ea1ade90c7a85b5f99d52af9d9eba05466ed0c16c7394f75b81501
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5418a8448322d76558cbe5dd8c740af83
SHA16b8a93e807d0bc9bc355d1700802962582e6fcf5
SHA256283e40dd8a33f88a25edb4d65072571a778eae5493c1d709ca8860ad86559fd5
SHA512ba09bce913e7db6c4f8349ff28d41ac91bbb33911e637c688ff60280c522002d2e300eaf1766f43bcb9f83f5ebdfb0c7ebdb4cb68dbf366e57e63a45e0a0bdf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b6c58ea609c2e59a985af09909f8548
SHA10050e9507be28895c7d72c5c4678e5d3282b4502
SHA256cf1e56cb10249c2bd58fd6cdd1c20816e04d36ce90e32ea660ea4b7a8823dc74
SHA5124666a9b844c0831159acdfeb953c0808b1534cbed9b1c8339e2d34d64dd20d7d48d240cd8c7bb17dfea0f656c970a6d468bc565c0fb6e8c245eac2f3e2bb4378
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb4a8355cef368ee5a929c568f46cbc2
SHA1265169b1612e4e98209b3c0d87c91165dafe6b69
SHA256e7e7c509e046c4e6ba29ed35b7773d845e044c22d7205584c403460ca6269e71
SHA5125daf6b2887126683ec5c0a6d30b46f4e7dd554f03f54bb4d62fdf4adb2d56c26b7a02c382570e2bf72d3d336397c9a57a1c11ca9e259aa6d6f1c544a627f220d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ff7b20bb7cc4dc419c7cb68c0603c81
SHA16d868b582533d2b6dd1f326c95308d230fce2ae1
SHA25604614827932c1e3d9c4cc3067ff304eec136c1a4891ceaeddfe782b305dd515d
SHA5122dbb9719879f8061cadac5bc06336a21dae8bf334519543aae44a86c21d918d47cc517ddc5f7d29e4f3ae3675eb2f42d494d9a70c03b721859c0d5a7b3683b11
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b