Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 17:37
Static task
static1
Behavioral task
behavioral1
Sample
8702090b9c54c841cb49f545ed6acab1_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8702090b9c54c841cb49f545ed6acab1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8702090b9c54c841cb49f545ed6acab1_JaffaCakes118.html
-
Size
157KB
-
MD5
8702090b9c54c841cb49f545ed6acab1
-
SHA1
252d9e5bac41260317428fac14e7624cbe9f205d
-
SHA256
6259019f6f227debb91c4eeecd0117444c778def0c822faa6700a0ab43863ed2
-
SHA512
27372ad4e643490af3cd8dc7c475f5c68094f10310b84c678253f22c91853f30f60debf592240fef3bc29c6a4b48dce99c5b1b56cc68409dcac1fc5ae8ffbb68
-
SSDEEP
1536:SoLANYhzuucgQIFa08C9IZezyYAKmlUdR1GHXQ9ZB1doU6+Yga8BJr8JYo2meXAh:SEz2DEyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d05d78044cebda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000005d4bdbea02d25b534cb6871a98a321a80c095e07fd70726fc4d1080b40db2cbe000000000e80000000020000200000008397af359aac1718633fa47e78d89d36335ae585692fcd1263bd3749c5c7258a200000003f1110d86f5960114ff871279442cf92209eec1f3ed71598ef7fe0343b4ec24040000000d0f09c203f81d4b40cbb15bc614d1800428d3173e528b37377bb3e253ad00b2aa7ea727a8748b0ab1ee066cc97447c2c245025f8d3eda223843d5d6b843e2dfd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2E4CC511-573F-11EF-991F-E297BF49BD91} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429473301" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3044 iexplore.exe 3044 iexplore.exe 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2068 3044 iexplore.exe 30 PID 3044 wrote to memory of 2068 3044 iexplore.exe 30 PID 3044 wrote to memory of 2068 3044 iexplore.exe 30 PID 3044 wrote to memory of 2068 3044 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8702090b9c54c841cb49f545ed6acab1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3044 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e007e1bb744818c4f95d9a9d23ccbdd
SHA14a6e49447fd185ecb2da4f6a08f0ab7526833556
SHA2569607f82b2a1dd17e096825c6afa20ea3281f49aa8c81db89ab5074562def0fa6
SHA512ce8242b9a222791c27961ca14cead291c0e943071697e55cf2a14874e11fda21f6e74f34cfd692e328547a1d9534796fcc4bb81435293930dc4e27862c8e5fd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544242aa8f84f89062f008d727c998d74
SHA166dcbb6589a64200e336e30984c15257b90d4ad9
SHA256cb6ddb449f9beefc9e60518ecb8b08b118ebab9733086ec97b049a6ec9cf3e9f
SHA5125cf074f4a801b1f931a4f9867ce4148174c9ad7f51bb26daabfe825dbe4ebf3a65dbf176a56ebc1401753d75ff5fe29a8b93b2ed9fe7754f0c9bf51471188212
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4a31cad830893c2ef8b27768fffaca4
SHA1715ab20d12e3e44ad00caa90f1a32ab944cf2eec
SHA2561f78f3c3eae09bd47c9e0885658f936a3653fe6eaa900c14305bd504e149060c
SHA5123661394c7e48d59e98aa6ccae3f622d1b4dc0be53a9e1a42c8abe5b312f9638200aad3c32e88a7d5912fc51337cc6b52e2322c7f9f23c3dd8469e733831b9d3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c332e0b50c27d78c84e2fe8d5472b04
SHA1c79ca37682a1eee74a322dba7cf7e2dd611e91e4
SHA256f2c223146ef30925b43e935091f33c6278cb2bd8ce20f46519cc3454980dcd11
SHA5127f7d7a7a494eaa1cab48e562e216b2a4fee88ec68ad7d101bb3c3ebad04f0fa786176dac8d841b8f338351b1c494669601cc8e0280a2170e1c22b8741710a991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5487e1fa85060f2d45687f3d925454e04
SHA1adc7e062857659942db01405c4ccd6222ccb1ed0
SHA256831611737a2019fab7dd0f1394140ffbd7c9e738677d7af718c20015cf7ea1d6
SHA51227575635d010a48aa9b1ee4eea8f49c5007180f47e4022e92a684d1fd262b9866f6dbff4f52556ef2fd39874e4be9306aff033803747c2ad3322eeaabc0f1310
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac7e9b39de3cbce54353c02c964877c4
SHA15dbcd3a8f27a5949900e10bce7194bcb66060616
SHA2566f211d224fad4352d7700e1477e8f9ae5f71662d84c15bee7cfa7d494e6be92a
SHA512d99b9510d1e87f5698b68cb8ae5455e5c49ae8b2f579fb0d1bf3b7905fb0fd8e414ad879a268c0813dfca09f2245b0dbcad3334d2a3e98bc7ac90054af7f202f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0368292d478f4b26330e454edb7eaf4
SHA17e05db0ca291d61a1abfdbfb91cbd1f813d563e7
SHA2567e0ce5c66918627e5d29ef484f199756dcd433b4d4eabfef6f6138262c49209f
SHA512f07d06df2f4acd343d57dbcfcb60ce9836d142bae9f283b4fc3ee058ccee2563449ef97dfb8e71c89ae0bad24f645f381c920af4803cdedd558543fbf8041d3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58850ab402995a22946fd5c36093b3816
SHA11ac220f45a0f4b23f776b1bcbf8c7668fcad5942
SHA256a175905eeb29ab78edd272da6b22c35b80b44c1e1c5e567cad1cb25ccd4f3d12
SHA512d67dd39992a5ea7b6b963e9353bcd6f38e1604df5d8368357f79e79d7946cbb36aa804e6be6539640ebd08ae333b765bd272178e016fe6669bffd31436786353
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e8a16f8d5bea2e35bed2f62a3ef5f7e
SHA19780f951612d40a103965a3d2edbdd2f2d0cbe0e
SHA2560d5a9beafee08fdeb84dbf2f4e4d1e4be7c4993b84bdc07b5f4825db3634a87f
SHA5121c83ccae339940e8d47f198b5bc073ea916e825067d66fa05aaa35d4ba50a4a983b408f16254abdf27d475edb408ef23bfe4ba8587e34d53428e247af5534b62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1e1866561ff950b742b4381b45ab756
SHA13b33f8fdec13d90a0ce562fb02fa2023608dd8d5
SHA256c8a9c43d88cdcd5e1967a0dc6251c25f7dcd71d82aee1afdb30a44aceceb2eea
SHA5129d6b2b5bd441d3122bcf6f2dd8e3c78d0a235ee4f2225a44003cf931e47dd91b587ede06f8134374e6fd2507463eedd4d29a4019e492fde562fb4de646c9469a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe71bb78a077108e81fe39ef22817f00
SHA1d4085a6b458ad9665dc360dd7b4ed60f35f68595
SHA2565a4ec0992ac1d479ceb579e69d4d03c82f9ef90e146bc20089b01edadbaf9b17
SHA51231c86e79b7a64ef49f11693ed31925ccc774206f8c07fda76663caa532ed626cd3f100ba6c0220cd8ca32461fd8447dd30c89938355d66857cecf66f4414c394
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5307aba3d91405c8907108a3aedb2088c
SHA1bf1b9e988703e2ff2a6a0effa19b477f80bd3ffa
SHA256e597348e5a6497aba1045f3d8340f36271086b0cedc947c4aa633a668da41efc
SHA512b109a2d66cb1feb33717fa82494360402a6af02941217303813e34dc733bc3e18f46e87bba6c4adc9533fbb8d35c2f7ec05c3f77555570dc273b52c6710c464b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56eaa59f7383ddf924c19e68f4b6960aa
SHA1f8fecfeb186a511d26fe93b767a08c2371363f78
SHA2565a86189d83410dfdecec96bdc3477fca7acdb4bcbafe7143ca793d7e6388074b
SHA5125fc27d939d1bcd0398a441559484cbbf67d52f90cd31212153f1994f98f58a4f4b68683ba1b1c2f04d055df56ac7b1bc2ed391dae7d4cad7c9432a7a9b00c438
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ec713daa998f7c0d0f9318279ab4dc4
SHA16a6be3172c43358e60d45118aaf3ea1a1df3b2fe
SHA2564bfd4dc7dbaefdf381a7e392bf751cadae0c3a410ce5594a069f62029c5104b1
SHA51292d10adb48f20a78fd4a6be1cbba1fa42e5bfdbf02256c0a2e0cbe10f6fc5c30b77ba7c969d76b81e64f4c58fd9f33b34cda199ae545182f2407a5cb6d3eedef
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b