Analysis
-
max time kernel
116s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23-07-2024 22:22
Static task
static1
Behavioral task
behavioral1
Sample
692e71907297fb40f3da5b7afebdd323_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
692e71907297fb40f3da5b7afebdd323_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
692e71907297fb40f3da5b7afebdd323_JaffaCakes118.html
-
Size
12KB
-
MD5
692e71907297fb40f3da5b7afebdd323
-
SHA1
32b46c7792a939cdad5a7ca940b3e86a18ba5aef
-
SHA256
47c9dccd66583b2cf7bb3181ecb90918e8e5a4b4d8ae1b3d1ff7c3380a0dab01
-
SHA512
2f3e5c4b8eb13b204f9f4ebcb3c016945c8f01ce784be635f7b4ee5813c3ead30ae5d1db18dc343cdec31552305ab6e1b018c1d71e76014dc0bdfb5bcc27be08
-
SSDEEP
192:2VElIsr0KXyJdVC+N52L8k/w1wvqyoBHZPndoO1i018AuBuLbdU8d:sElIckVlj2d/gcoBHZPndoO1i08AguLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000f4c6f24e85a1d787ce7195f3af3ac8852bbe872bdf516cac50621fbd6d2ae436000000000e8000000002000020000000343ad1db4ff8ce8f965b86997e6a010cf7dce1b6502aa671067be886eac867f1200000009e18fae8bd33ebc7f47d0904f91b5ac97fe699c0a913a9c2cf6b4b2d45774116400000006901f0e7a281f05f761db79a792774a4e63ed02b9d0be4ab2f401fc3a42bf37698cdcd5bfd6d925e925bd72a1b3466894a66a14ffdbc8a183d93a69287d4af30 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427935226" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70a6e1174fddda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1158B4B1-4942-11EF-880F-D61F2295B977} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1848 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1848 iexplore.exe 1848 iexplore.exe 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1848 wrote to memory of 1936 1848 iexplore.exe 30 PID 1848 wrote to memory of 1936 1848 iexplore.exe 30 PID 1848 wrote to memory of 1936 1848 iexplore.exe 30 PID 1848 wrote to memory of 1936 1848 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\692e71907297fb40f3da5b7afebdd323_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1848 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9f853c6fbf61681dce311961c7ae77d
SHA13daba82e96a1e09843fccad0e65b23c293eb2e8a
SHA2566a3000115309e82e6fc9174af2b81fa00a529e9ec2fe1f37f403e3a414cb246d
SHA51215a40df9235e6e703889b864a1d6d0076fe8b372e24a9e0da28cba779361ee9e0eade21115fb807c0dbd43baf86be8ace426ea24dbab429cda06bd225f1a62a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a32f0182af2f2e6b6f12f2da3cbf8ce
SHA14c9691b3e239f3d7ed88ef54e06b7fbea3576eb5
SHA2566595822ef3c0cb0010bc143795739263308517d2716162822d3266c935e7fd47
SHA5126874c9f7cc85a159f59b79afad1ce5b399e17edce1d4636d32e2fae3aeb0b6d25937cbc3f3a040062cbfbe6213e9c7cd3b9d31bff709f42c886e20dec6c01534
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c46e1baf20be27093fb2a33cff02a31a
SHA18bc9718a898071f693074250f792c4a0e9c87815
SHA25691834b219615847900d0f1beb18ee36c66dc9990b39df6acbae4512cad8e6e16
SHA51245e86e298bc5603c5b62412d048fb724b935644f14d3d2fcee2a920780deebf6a66d3b7acc6891df3821ba4b965256172193248ceb3cba0561e6160f612203cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d13858bd60e9a109b430e19825f208b8
SHA10b7d66c8e12770215e1762b235075478e2eae727
SHA256f4ccc497d5f140c597c31bf0f6eb08c7c5bdd4f0454e944ed54d389691e18153
SHA5129020e0470e7454b5f8bb3334ef30f51d1adcdfde87184a6bbe19efe9e352bfbe6d571c3d820f4edc98d0f2e65977c3b06ed990be65e811e6e215ea4aac9c711a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa762ed671dccae177df2d338f2b29b2
SHA17f0124076a0b53be60cbee913dd13a9f2adae779
SHA256a02194d0568aff6b1959d9de6b53d9da29e656ffdd534c6cf74bbf2f69033b3f
SHA512ba2ad2e1cf087c7ac85c62d185c739949dfc6772621461990e4ba1b06c23ea6ee0cb1bd1e37f3da5fdbedc943a65ad3871c83df6b117da74cebb7c3368beeed6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549a97105fc7ae3efdc351d7daa1652c3
SHA1ad19ec3fe1e152c6a2f6232fbfe527327fa8155b
SHA2560b2951af45af5ca73b1008d5c0c18d5fd4a85c1725c9b9bedac52cff0bf5099b
SHA512e5c105db35fa5b0c56b096c81aeee2231cd6d6b0d1da5799149d94f009b93985e988f8ad1b00642244184fca90e5c1928930b3ac517842d47ccaed75d5e2eb21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591a1e40e56de24313ccdb3794df9456b
SHA1bf50542fc1066eda0a233a34428c6afc783be0d9
SHA256bbbab9e982b8b96593da36b3f3551d62e60e7c219b042c899b5c7c2fdbebc869
SHA51261c193201059bdcfebcd17091241bacdb8a295061f10e2061d0da664afbc5b227bc69133f66642eff766a5632b0cd87c3dd4985cb6a0f3ba1a55290a4f3320c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cd490ba1a3281d414ce0a706189f80a
SHA14ef3c4252e9a8f20408dc233b87afcfe07eaea80
SHA256899fb65911734175c1cbfd5ce89bc277c2e2d91922dc57f5a33af21c96c9d294
SHA512c77415d607c9c6640b3350bdc6e8c30299b2719d83539065e4a3c135e6660a4cccac6cf82b563ab159ead0f1ee40520c2fbe2bdd49d96b4b1275f4c00dd0753c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d022053fd44ce1968ecb35ee16b8aba6
SHA1d53b076a0d8530b3358d1242323f71a57d780dfa
SHA2567d65eb1933e7deba78862de8790e1d227d6b31a03f61978e036f080ab38db570
SHA5123b9a111bc80872b916adb0809bb6e114c0200dde59daf1faf47c7d48a7ef31c07a37b75605257061598cd0de579f370f292318cc8d8d46c919f23532d4647acc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fd55ab32c519ff8f3c78d79995fc4c9
SHA1e65688659e021c82d0887fee30503b292a01e059
SHA25691dfefa6d7ee650c5de53ffd44d6edecfb919fbd5ba13cbdc4b14452838dd108
SHA5126dc41a7896ed55bca94d7acf645d55fb8c13780f92dea829ba8825874521a0f88c31b438de19717e57ab0def5405df1fe9634d9daa5739ed3b2b1b0ef1cb79b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5787fecf8177ebcfbaaf5e4def7c19187
SHA11c2b293f7007e902fbf5326265b363d847c9842d
SHA25698cfc22dc8d48ef28644c48cdde1351e093916aa85373c2d1895843b79e898d5
SHA512f4c7564c6fa9d51cc0ba3d703fcb95a401b12fadef28243de2d7f470968cc754aaccb820d6dec04489a57bf85f1aa32ab054fa53c54267da056880280b7bd6f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5accdaa991a73824cf7896e46b6730e5e
SHA13a058575222b7a55f0b80b74e716bb926971d938
SHA256c201bac882c465ee0d375f78435c1be0af8b601aa9dccc5878b95b43c09530bc
SHA51249167a27ebaa2712355c173ee38c5914051a86fc4edf99566405549a088e02d23b7f295a8d789acd0ea961204ca8d606cfc4a1c9c29552da15e9aff7fb572ab0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb440dc7be02c775016d243becd00777
SHA1962f264b7a59081a222a52d2c3ca154a4df81ddb
SHA2568dbc98fcb3867d2e3a88815782e501f0391760e9b3b87c1f145ece9d34563da7
SHA51274eaf89ea14f150b78cf3e4eafbb52468ae5f5c9adda1397e4ccf660a9eb5efc26f023b05830cf431b7e59f0634035c7a3b6089e556f64f23c68b79f68b609ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc53344b0307725367acccb9d15b4766
SHA191423feb937f079d821766b77e4d8a7635036322
SHA256eb793c3d72cc6040c0c45f5ebb5d1fc522cf52f85139a2f3497bfeca7b422c94
SHA5125d9dc69ffa71e64464832f26d7dcc86fa1afbd7d8f1be81a469eaf118239e0d67c4f0130a0ab5621b37cf9ed093e01acb361bdf48d56de55912e7a9d7bef9405
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a49e33b0ae45b8e6cb6808a13bace1b
SHA115bfa19e5f6c70ebbb319393741ce886b2835051
SHA25607cf2d119d2c1a8528b4247052f80ee6218be15b52142a8b65fda7eaea8940e3
SHA512b47ffa3344ab24277060106037e60cd63122af86e4cb5593590b48dae06f57405de0fa95ac453e3290d68d9358e0afbf5c123917e22c136cd42579efba8aeec3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa14d76fc80d928570363783cbf7c192
SHA121b3e873812e3bc1ca13166eb56d63246c5ebcb8
SHA256f7e0ee810392e5f35d6a1b9895b02742447a339745bdaf112c41523182f7cba2
SHA5125937f6be1312a1ccb5bec38a47db90938b250248e0961d96d472bd7fea9bf14ffe4729b5288e9b7253220fd1fb70a4e9acfe8b342fec55f04b957ad54c09e457
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1414ac862f15817c6cbe987c05021f1
SHA183fc9f930696e348b9e5c7f318f9e9b488a9c1b3
SHA25600d0643069de6227c56fe4f1e9c97c3b151740a1a4510a9252810eab70ea1ffa
SHA512ee17db374979f253d36e5886d6234369de9b26962776e966fa371ea255d1d2a0b5f904ed12bd9520d2128b7f900208836809e239a5b36b04497a65c920070a24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d50daae4b45f677b8d04bf1521738a6
SHA1906a5055eb9dd84be63b96f693ba9e3786fd2948
SHA2564babf203194b23afbaeb80dfcc04ea54b0f0469b39f9b6a494b270f5cdc80ecb
SHA512ab7e4a6954ed9f4495d3ef07c76da95be26c2de98c3b110b1055f50c6939c9912bd3d1da82fecdc0434e9030d5e11e0b00eed4b623430447687bc94df9ee2506
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa27d7b2b703d71926ebd2a4dcbaa5db
SHA138e8d4901307a6eca7f3982d08367e59a0b7ba35
SHA25605cbe8f551742c1afe700b3849afa954b0824fa49fc382ff07751abff0e9593c
SHA512a76e2545bb0f0c28f4a363d4f5ac61d2989974593709123b981ec94b1013883cdce95ad8acda45fca6b231ae240a8998b109e744f5061f3991ea57eff7bcd393
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b