Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 21:05
Static task
static1
Behavioral task
behavioral1
Sample
81c44117920310c5e5835b32677f4236_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
81c44117920310c5e5835b32677f4236_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
81c44117920310c5e5835b32677f4236_JaffaCakes118.html
-
Size
20KB
-
MD5
81c44117920310c5e5835b32677f4236
-
SHA1
df8cd4d8682782a3b069a63cb536b7b3a1c7d23c
-
SHA256
cdf35e25fe25629a0e49bb4ff57591ffe74504ebb7187cc3071370a0045f2a1f
-
SHA512
514daaf638058b3da146680b68ee97c7eff61122107dac2818ca13a05a84f5f2d22a0b6677f1a1a4d38392d1eaffbd98e2fa7d109b16e4105dfba889dfeb0668
-
SSDEEP
192:Hr4IqTR8Er1ZenE3uEL/3XJPrcrwrlSqYgukv4KeB599EOVxnZPZNb1qTsfW4pJ8:HrPd6HtCuwDpXRts
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f0000000002000000000010660000000100002000000025842ee54718aa6a8b9ea66beb580457aed40852c6e4af1bc7a99f6a754788e0000000000e800000000200002000000002df174945af47862144842a428d386671d7df11c7c6823eb57545202aaf764e2000000064e2a954bc2f72bb51cfa6b12f55c09decfe0afc6c3db87d0a5fce07e779eca04000000015595c6d5fdf8c254607719fca4cbaf0767ff2e119d514cdd1038139c2236659eaccbad44b17304683a024d4f9745c102085f3412bcfd42b7a183e176ea086ff iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428708190" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0068f49a56e4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C3FC0191-5049-11EF-991F-E297BF49BD91} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2980 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2980 iexplore.exe 2980 iexplore.exe 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2068 2980 iexplore.exe 30 PID 2980 wrote to memory of 2068 2980 iexplore.exe 30 PID 2980 wrote to memory of 2068 2980 iexplore.exe 30 PID 2980 wrote to memory of 2068 2980 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\81c44117920310c5e5835b32677f4236_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5973ac17e6646afd171a945c097a770c7
SHA1761b32012544d4ab4605e1fdc7c566650e29a7b6
SHA25617bc5b2e12932d31e15e08b1cf8b8f2d855c939694da466187d7182280aa81cb
SHA5124e9ad3614d14e1aa9abf37d658e33504530564f2890cee91e5affb9fb2f8303933031b707cee09f20a8b76c23d80a14db26a7681a7ca6a40df1a7e052f57813b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c246de2eda9b972a66e5aafc46baf4a
SHA14da99dea97112f4d1812e3cc914e313cdf7be196
SHA256f191b1e9a1c45e8d8f38e202999dc6707c32446d1c317c7adfa55d38fc262b62
SHA51260b5691b8578cb80cbb3156cccab56c0e856b980f56d2746992827e481cfd7b36eeca933a06501d8831494473306369a3ed5c2dd041bd2687fb4c271dbda7008
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a986675c1af05fbade18a15cfb1a153
SHA1aea7b416bb6784b30555b0ec0402caabf05dec89
SHA256cda45713d44e025281f6aae0270269930993c3f953c5973acd6d82e0593225f6
SHA512932b4d8a3ab9cb201da50d789e75f91ddbd1b0df0d75f789889c5930ad860da8fab1ebb840b060f7ede530fa072b7e2e599e7119f65428bf26c439e4b91b2be8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ee25da2271c573604b3925a855e9e3e
SHA106f06ef2ac4a25ca6affb04169435347ea692d3e
SHA25689a3ddc5c23de0be439d7ec2651178520b4c873fc73ae2579f164e593ee8d0fe
SHA5129db524f891f5f86dbfbdb847a3a263876c47a4d512113a70eab5ab5d4cc1e4b3282a7d8ea4e9303d3cd750bcac38d7c96c8caea6b50a9d4ad6bf0bf9e1f7e007
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b7009065f7ece406ec1c92fd133deb5
SHA1b64e51c0bba33f2454c31a51966a4f39d8e1811b
SHA25664e1cd1b584ca65ec1c4d19697a75b706ccb8c8681e8c0fda0b14d076508d0f0
SHA512b1996020d5d4c71bd593c4f5272e566bbac4e7ab7cb8986729f1c144833a76b69b7ed1b5a988a8f3c09d608c54304c544ed7cf221f41f529f8f5b23ee6eb80bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5448b1b5ae7348f4e863da96befabba51
SHA16106d92123371eafeefa9c5c916944fd01258896
SHA25633244cdc291e9de56337cf0c731a039b19d791abede2192ee532c0b2e3a10550
SHA5121b1a36833039522dd33dd0e2e7b70c50c4dafbda26ce3ef09ee1ecf92a4dc114ea3b77d929a1aa2ac5dc4b98b2ea09441016916058b8e238cf4658f6aeb782c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e88b94244121ef0ab23d8620cda0eb4f
SHA1d57d74a0f1cd4c7091a2b63e37d9b49b12e4f369
SHA2567d2b541de814a6af46235969ec4eee72a442e4986b3b4369f45f68301eb7e640
SHA5121a4fc32331cb735270051eb25192a6ea0ddeba62591724e13c878d8b803f026abfa4efb850ce013c1d28127b400cdd56e3d3363f227469c45775020d41c9a837
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb4a2acca976acf01d09e2dde70a6a5d
SHA1fd00a374168e4cd73d7a4f776ac75203611fa9a8
SHA256182363a4eea2bcd796e55eeee45c6f09f13a1c7e83e3ae841a6c50ccc2498441
SHA512527d30444b8540b2499cc45d74390a98eec36a0a3f27ed2f23e4d5d6d70bb68f1c5aa137804931d69b84664ef6045c60ccd11e378a607ef3d73517853c1fe1de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5d71949c2feb1b120f73f02fddcfef0
SHA1f19c423c9e70d467b46553432fc8b9e55fb034ba
SHA256775458ff59722f6f684621b511980a31b926d01ffc07bd65499ef750a798f724
SHA512a2ec503a8395a3ca9b24f32f2cf0bade546cd0782fe7241f56c06cda995d103ceb73939ae2b978d547cb17ec8067bd212d33a31e81d3d3cbfb9694605eb63619
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581114b31e7d718cd232a4f6ecfe4b76b
SHA1e3bec987a9734d99fc0e84184aef873ecef3b746
SHA256a4245bdf3e57d7c5a899b920ad36c846cd2bb39dc8ee9a0e12a16c521715edb7
SHA512c5f84ceff0e089b4f0b0a5aaa5f8ff7ed5ccd212e50736fd1a17ce2f7db793ae0fe98adbf7cdd221bb5c6c9d566a82e1c0300f346d3e1272881da060e45ce79f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51639e458b743f61dd9950422b91c10ba
SHA1f5af846acfcb0c5b71543c8387a614f4ae558f06
SHA25641715619f0a371437f2faee939ffe75ad225ed2e54608c23ff47c0dcb8cc7ba9
SHA5126b532a5bfea97fec6c7d635d89b672a9bd7727586931313b6db32effc21790b38119f11b23694bfef9dcd2f464c2df7e9044c791fb300b41bfc5efb85d3e88ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b78f0eb410b6808c9201abf1bd0dfbd
SHA16876af3eb3a76cc0a564cc1cd999b6decb70d76a
SHA25600ec6bc3dd055dbabf033de6dd21562846a6f143941b5d56a70799bdc694ece4
SHA5126c5144c43f1f2e710a5d4fb528753ead50efda3316583bb778587535f90209ebd19846053f58ec3211117d0ea8fa73c98c911a3f841d39ef2a9544758fc962cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4c073b67036d65c1999816951567539
SHA10fc60a740c6f1bac01a1863780797523527d016f
SHA256f1dfd626fe45d4e118504340adb33e6e620fd98bb91899924524777eb8e93c70
SHA512579d7ba810f5e74d75c46f1026cb08ecc26ec0141974006c29a8cfeefc687a4f40763881452bde1f413baa6644d57855c67b93d1012ce681555a599016145734
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547f8c978e41af9ad5ba3c935817b8986
SHA137164ecad174b9bde79237b554ca538cca4d8dd0
SHA2562817d8d593ace91858ebf98d03c6458fb5705ab0b94157b2f71cf65c7c3290b6
SHA512520669f3bcf5b5708b225650190b2f9e64a88a71fbe2dbc0c07909d9078e51274e949fdb3e1bdf6501b3dba43b9d0e4e25098f958d71bfa65ba0a08831afbd01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57858ae01b1c51e883ae9f8a6107388cb
SHA15aab8f01fda43134884ca50948d7d4221497fe1c
SHA256e9d7eec45c862a6fada18d2b9a41ab4999f5f080f81a2bb5df458b176ad87755
SHA5123e0cad0e22cd2bd0d1b4dfc420aa22175c82424986d4ba4c71aed72fa7e3ccd767a0bd40bc051f1f7a362ad0b23d67023c36abeb48799bf12e0c35cdd476bbfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e58e349a2700260aefb7ad09337566e9
SHA148662976b3f4df9c119c3a4a7e58f35549510584
SHA25694968f8a98691e9e056ff26e2033fc6cdf57186a8f730345ec92bd87e85bf275
SHA5129515a6db950afffa0e948de376d0ff2572c1cd0fed4d2638327448a4c6824a39dda4a519c54d1b744862393b1b1e500ca8cb6f6d2d0fdfffa982cdf26d97ee8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2d847bf7b8ad9a9f261033cda42312e
SHA11ecf7d2eb27e60f65bf6bd1b55961f51450234a4
SHA256db84f2de5f3dc92d2c1e5d0ecaff2f45072a7bb2ff9da954e566b7e6d32b8eb6
SHA51295c447758494b5c4a7879f6a76c30277c927e5764695eef5e7819ea30a96f4a3687c7f26b24476a62b900e7cf9edd2a8643983a2c7a4ce0f370e47f8d8f87cde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f1ba9a8443827e222cbb73ea6995523
SHA1d8a1c3870735f585ab63ab1fef4386e13ccca1c9
SHA2560862c7da235c17cf2fa48974f7a68b680124f7654b141c200638af2187ec9ded
SHA512eb26d3ecd7e1f8a74848f80cd11fd3da1b841f231e57204618a6848c69eed7df6233fc7aeb4fa817b66ff6bdcaa743c676dfc8e358513de3f7543e76662336c2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b