Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 17:45
Static task
static1
Behavioral task
behavioral1
Sample
870885921cb26f52303ba42d5c81721a_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
870885921cb26f52303ba42d5c81721a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
870885921cb26f52303ba42d5c81721a_JaffaCakes118.html
-
Size
6KB
-
MD5
870885921cb26f52303ba42d5c81721a
-
SHA1
dbff143f6f1782d2809519aa016f23c23b8f0d3a
-
SHA256
2f0b0c3fc535b18c3814817cbb35b033a46cdc68e64cb0c2c7916fac1e0a8297
-
SHA512
485662275f27e82199f3eaac8348de8086b3c363958443e347d47eb452079a1be2707cfd88be699de7ad4a419490bc822fa92600dd80a10bfd78484a55554b72
-
SSDEEP
96:uzVs+ux78jLLY1k9o84d12ef7CSTUrZcEZ7ru7f:csz78jAYS/+b76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e03f90304debda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5A1CA971-5740-11EF-82DA-D2C9064578DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000368fa5f176580c40d5c7e3c53c1f3e5812a6668fbcf8e3103bd361fceb9ae312000000000e80000000020000200000001a3aa793f6a16a0c459d332be90e0407fa9935be8482e439823487370f921b72200000009337e4d5323ea2adc2c5f37df93ee0abbfcf30cfa8474db8136522df5597b25c40000000cd44c04f51b149ba7d0cd7d33b59f0528aa2843123a0d4b6369ab292fbb736e120bbd0688defd59d508598b42b5ded9be5bc8138bb382881440b55e7ac480e4f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429473804" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2544 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2544 iexplore.exe 2544 iexplore.exe 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2340 2544 iexplore.exe 30 PID 2544 wrote to memory of 2340 2544 iexplore.exe 30 PID 2544 wrote to memory of 2340 2544 iexplore.exe 30 PID 2544 wrote to memory of 2340 2544 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\870885921cb26f52303ba42d5c81721a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2544 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4f35f68ca3ec181a5fee76a567a84fa
SHA11633f750a686c963b3779d7ff1e7c469de11fdfe
SHA256e521a6802c62f4dc2f7155e9c5be6572b553053b6491c573f29cd16746c6b248
SHA5128fac01da3debbcdf73133e727f0ed5cb49b4421b470b071bc7e97e3768528ec35b025e84e42063929b1fad97096a3f44e66921f15995a1215454856b3b7a961b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54393d2b86afd5a1bf564b161a3cf242f
SHA1c046757ba373601156a347a57fc938bab1955e11
SHA25698396d55a219e4d4c85cb02d34759309f668e88dabef401b9f86b606f3617025
SHA512031128b7e704b856209d0d66e376e0379e1a80ad3da5c2c2f1beaa44de5dcc298c227401b5740712498de0ec02640e8dc84f0657319d7727dfe36ed0c71bab39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ead678d70b2b22553e085fef3b6945bc
SHA1caa04a89f1ecea0803bcb44b37263aef9bb1b1ea
SHA2565f0fb3ab227ed446223b427e93511c1d0d45ef12f72e18addbcc378781eaa73a
SHA5128355020c0b352a81b5ad88c09728092cbeac389dbe7b8e94c14e5f7e7ec1986e887181eae97df7c84aba2b45307e09fb129cf5082a3751b69b4f9809653ab3ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae834d8d19da22372f37dc2ce5cdebf6
SHA15d0b994482136c5e121f5ff3bb791f208f67b037
SHA2561b52498946366ce4be07b830875be3a1d31f0c2725fee41a2704b9a36594e5ba
SHA5129d5dcebc09cf79118f4a3831e77a5ff0ef114fbe3cd0d402f95d304d14ea1cf4e1845dcbdcff652e64bebb1983c1876aec99b010be16e3de8323a776d0e1680c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c96385e4b66ac41ad154fe7d09dccdce
SHA16d35112949d7d074220a889683fdb07998fada44
SHA2562e4140eaff2afd1083005ca23f6121bcdeae1e822be0ebc711c344259c1228ac
SHA512acf37e8986d8d8b136d664773706f311406a8faf39e2c8a411a0e1f12506812fff9f8791b2a2c13da2aec02ec4ce401c1a0955b51cdf8153f7f8caf48b553f50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5202f706f9c7298ee7d7facef4c3441ae
SHA12b7fc4f7bf599a66b91adb4d6a7dfca79d81b520
SHA2561bbdf60374b3328f90982fa2dfd53425471a9a3d6531f53382a83cc062b1b0c6
SHA51224f43ab09f3d4016f48ccdf54b1386ab1ad4b93f5d8058f472b60e7f1d23bb8a1c4b2bf7f255e50cf370ae337eb1aa3f86c8e901b37e2d4a92394d3e49931720
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5206ecaefe44661901aa5384e76578a18
SHA117221aa943d631bee4c89d61078f68de7fe5069b
SHA256d9ad053215657241407a26e1da1a78ae7e918e0008faf677fdda6fec62cda36a
SHA5121bc1a187ae9ad09c1dad5b61873daebed2a1a91b80a6999f5b8a150a3ee9891e1269bd2ef900c0dfdd331922dbd6cf994bbc6e7e9dc3d548ea31ad1ae4bd2c99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589cf8c5cae8739f344a262c9bb474002
SHA1532f83f34e4366c67bb81d5132ebf94409881636
SHA25644b6aefcd937617345f0da72d678137a16e9c08b5a0cb2a0838fcee0a6185b09
SHA512c7dbd3ecfddaeb68b7e2a7aa8cdffeedb19729e1dd586959e242de1b9bab6f3f7bb460524a5a1373711b7dd510e80846ed818d4a9f15af52b6a32d221f1b4aae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503fa3d0c01e2811138fc0d70070638f5
SHA1e3437acc2d4a77d2de17950ca9db1328ec824256
SHA256dd521c37b5fee9ded72fc156e2dd19f80c9e03e7b3b41ddc7c4d30f69fd77242
SHA51284bd756691a72028f0801ae47d70fcdbc8492c238c3a4ac861ecbfa7cef5ff7de97904b8a082637e6528d1f5e1e2e3f78afef0a47c6b2cb838d3ad7f10cf3803
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acc2ebccba5b48404d52caec4368a346
SHA1a6b69cb09702f6a9b99d1615c17db76d7a6301bf
SHA256d943d21b1a72103cf18f84f19d447571b5fdaac47ace49d89dcde7702d0ff342
SHA512bdf60df7a4c60f594fcf004584f87ab84061938cd0e57c6a54eec7c97ff7ee5fefb28b7d5702aaf19bb88cb6328da3fda9f95654fe817bca13685e6b5dfc7188
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543e6811db280abc4dc485e7133b6b644
SHA1d8a07b19ffed13ebc2659ed94ab28c24047d6dbf
SHA256dd320f01631c0013eb72be2a2fbd4f70869afb96d7730c10f3c3e0143ecff610
SHA51285d7be22500da8c3a86c78c70bee84b1e310236199370f25d9dc6b0389532548d87adb40ace198086a32b33660b5e3a0ef75fcef9f1c535f844bb9ff29e726a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cd8e4f57c932d5eb5cbfd868f448172
SHA1f5e118ca1110d451b3582ae5b7253a116181422b
SHA2561c410682cc4878d8881e718f6f1d3a7e1a03f6ab5dffcedc175a72ff52c130c9
SHA512f3f39153b750b35d402987d45f96ade5a1cb5fc73a498672ddbe517a110937d0925d14fb5964abb6d2ca5427d850639f291e612b640890c4fe5b731eaecd0d15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba0dc21f66feeaa47bd284cf5904f4cd
SHA18e736ef90b95455b74c5c6b00ff9f578efad10ca
SHA25674a54e7bbfd5db249043c28e451de523f35d1cf90172f422a094d1d39aa4aa80
SHA5125256a13efd7b37188306651a6e089d5450c6ac4b68bdaa284fe85bb14105cd0f085bd2bafe9a65a5248053b93534c91400ba0403e2e63e34e1a8cf4a223f17bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec15d060614f5be7b13466b4a4d01fc3
SHA1fb54e3dae288db014ec715348fe724224047cb07
SHA256d0b44969086fc35045ff5e78c04b2f43d815b99e81cfc3456bc7c0d441ac92f6
SHA512254af77a7cbd7550fc64a19de748a33948d07601abc6a95d4ba5ac208859333a692710af58c37976c5922db427bef85b612b7447581da81d2649083e1e05e457
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a47b905eada2fbfce44412874451c562
SHA157fa74c4ebbe87be7ad3c3a57fe32fb75b9b009d
SHA2565767927bab7dc97478a8e8e3e64c8b178a1b1d14d200decfa4d62ef41db0e999
SHA512be8ebb81f99c2e2fb6d472d318daf4477b2c5f5f2d00537e7133136dbaf5a8503d55929a8a6101f7dbb989f2c4bf8523a387c6eb7717f2e7be6d1d521b8ea6c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab0248d86cc1a479bf33efd70b58ddcc
SHA1c5762c01d6776d3187ffa50b5edeb3b659ec28b0
SHA256f83664206f4f6e292a5df042e9012c11421acd73fb05ecbd4dd9b2a0d3deef8d
SHA512fd167b16e94b91f26fa726e5d47f0fbb7b058d0e27c723191786b794b5d6962a939b7a8e4bdd0470ca26d64f4d190d36f4214ad1fa1f99f9657ba9aea49f2a2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5077ef3ec62e7aa3ccba7dcea09bcf9e9
SHA10757c8cc7c42d18a10be08c855a8907c6d7cb47a
SHA256a566539b0e1411d8ac82c365f6467d353b1ccf7d203d0523c2f9c24843aaf894
SHA51281ca8895b61e5405393d413b36d98dc07b4b4b4b5e217fc54dd9f7472de1d2bc1952e003e70b434750412d6afacd95b2a85e4700723532fb451d1d8e0fa52f71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f4bf991b8088517522a91c6cafd9ffe
SHA1d153cf76e6984a55de163827ce66f3be497c81d2
SHA25619d784be5a4c0da317ed1ea018007ba05fe16b89f317cde782e9066b997222a8
SHA512b3ce8e427c94fdc99db45614af2bd253205387ba8bab7e014c01f63d29c8c84229f87bb94af1e51240f1e8c852896e1907fde671792f3b69325fd613ea021f73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d14d87dbbed3539f2cd2be0298adcf20
SHA166fb292294c9d59e0a6a3dd5dbc0c93610315f86
SHA2565053d3c0f9d570db8e272a902dbee95a8274c9b8697e3844dd8d248a0f0b0692
SHA51288d4fad3f5a4df4c0c3bb480d2d60b5559be53f22db36a7d2045e9a6d0d143d558c48d8f68111cb9afd6486488d4deef94b012a6be887d731457be60d5d577ab
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b