Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11-08-2024 05:49
Static task
static1
Behavioral task
behavioral1
Sample
893a646606619f196f76a32d93b07649_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
893a646606619f196f76a32d93b07649_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
893a646606619f196f76a32d93b07649_JaffaCakes118.html
-
Size
23KB
-
MD5
893a646606619f196f76a32d93b07649
-
SHA1
f28dd72c0fba6a04f46d960e352f2edbbaea94f0
-
SHA256
36a7ee413707be4d8d9af38abfda4b4722708d1b78012465848eb93ebbb1b502
-
SHA512
ace841450470bf9ff975cbb3e16dd8d303ad3bfa3aff295f989fb4a8690d3dfece6ab5fb70707b1f793d9a21eefa81bacb4f498dc8e99b2e7dab92e77d2dd8bd
-
SSDEEP
384:uXBa3kkEgEEDDLNxgosEEzDxcGWylhdPKhEoxhaouauXZv7nxIj425KPcaCyvx85:uXBhCg71zvIqXjILyts6kTvDjtwcynCx
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8003f043b2ebda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6F737281-57A5-11EF-8705-5AE8573B0ABD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429517220" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000067c13322940e6d9ba9c97635f5502fe81b0717c71aa8db8cfed14771488b9c3000000000e80000000020000200000008232a827d30243798d233ad2907e169d950f14f41e635c659b96e16b71257edc2000000035cb980fed232c705704c6a53069022f16ad9c06ee35084322e69b0c0d0b824f400000005643ad13faa9d2d6b4c60e052cd2f1ab403760ddd4c6cc55d65e3bb3403368f3b1d59fc672f9df11c21063fa26bdb2a07ecbf7b30946a3fbbabc144f2ec7ea9a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2060 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2060 iexplore.exe 2060 iexplore.exe 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2776 2060 iexplore.exe 30 PID 2060 wrote to memory of 2776 2060 iexplore.exe 30 PID 2060 wrote to memory of 2776 2060 iexplore.exe 30 PID 2060 wrote to memory of 2776 2060 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\893a646606619f196f76a32d93b07649_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2060 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a66c84225e4283ed3311a4c3e5faf57
SHA1565bba05211f711614a3cdb1f5c6518eef587125
SHA256f0c4531aaa9120ea1c3dd700489efaef05e0aa5f3692e3ed07fe63e3eaecdaa6
SHA512c3bf642de0cf82ca040e25c7fd33270555d1df6b420269e4241cdbdc50fdc4f1ae07a75070040f1c74a2fb8f17cc7cf9e06ed4103aa48a96afee48f03ba44579
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbd9cf902e9c8921eb51d2a50e191717
SHA12ebceb5175f8b62d0f355bd0051b52748cac59a1
SHA256b43fc836ef72a71ed8fa58b0397cff087cb20b3847ecb10da055633f2a7286a1
SHA51212b1c1f4107cbab83731278d26df47905c807e00ee2b128fddf0ad6c77d4a59bb011a32339cf9b9d555fbb46d1ad6c3604fd043002049422e330fe60f185ec2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579b5152eae3a8c1efab4636a75a00803
SHA11de7ae1c8e9aa2f814d77d32a692d337f452c522
SHA25667bcd3b6848ac43d6ca3db9a4c755e8cfc3321e9d0af37b7c6a1d788d83f29b7
SHA5123007c323f83fa01a99823d4909801b610e141d2df76d851ed5a0dee50c0ac49167c2a92061decc94676c00b227dba48d1bbc3c0cbc3b276d069c3ba820b1c2e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56491b64526bfa162aa70b028c9f9eb95
SHA10a992698617b3611cb06ff13bd15a57155d5fc23
SHA2565fe4750a53105f4d35a2359a3a5d3234366817cff9c667f0eeecd6c7fe2a212c
SHA5128d2a2f4437ce04621e35b96924b62dcad52869cb5fbabf6c5ef3d656f859e2d7d67f22dfdedfb39f56ebd7222150b5d2e1e3c032dae4cd5c451c82adbcf0b083
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b5e54a6c4a592e502f748a7b77e6591
SHA1152c10ebfb9220c77f26e87b1b1eb0f06046bbbf
SHA2563c083b74e1405e99101b49f46084d454bfd73a3cfe42bbae25cb275fdfe2a613
SHA512d01b4072d83cda160b8db20b53638ed54a5638786909fb3f0503368533d6c6939ba121842e697df8acaf7b3b27590060c82da2d2c8e074ad5d198869236dc8ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e30673f507c92154e8dc06617ee24eb
SHA16dfe10d4edd84e73586e3276fcba0cb09070238a
SHA25640eb36269263fb1604a8b0e63f9cd423a5e0c44c9114921ee4005b3e1c4e419e
SHA5125fecdade60a5c9ed19cdd2560dcbe1312fccff182c80472ef8666ff51dd95808f895cfe6753bf1e9813ac973b644345ea293afc6c107fae738a97191923de65c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fe6e41d103b484d6981bc799da903a5
SHA1db1c4441df13060a1b9a1a2a396da75755bd84de
SHA2567a1b722f59c7200f948e15fbe4c375b301eade9b0c6efaeb4c6022dd96f0ee9e
SHA5122dbec55904c29c1f6bd003bf9d24a356a01d681c3e82b510c7f7125c71d700432bf2c908d8489362e997e5507d3418fd0021931174f1eccf43a023770c4e2153
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559102079e6cddd9f5cfed48f2f4bd31d
SHA1d1457a9bbbf65077a856c170176f08a421f2d726
SHA25687b9a65f291e5c70ebf44901937304554314e2d52614796af2518f7b6d324d5d
SHA5124b0b0500d243c8f4264095171ed64fec2f52d69d0cbef57635e6603f78d4338c7f41d4936686b37261a93c779aae5093154ce1a58760d3a3be2025c2bfdd5228
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e1de16242ea1d58e9bd5a873b2bfb0b
SHA17fff9dcab8bfa2fbfbc7f2fe8454723054f27fad
SHA2563ecd99b7bdb3ae44f4c705085e12fbcd7c3d165f43417098b44bdee4b8ffdf69
SHA5127d8b209c4c04a6e1eb9fba438a56b30d2ef864a80502978586bf93cbfdefd665947828ebc985c02ca8bc242afca6bf870445cb69bb426d63c4435973e74c3ce5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c87ca2d6157705f623a1112c06c41a4
SHA1c461205abfc74f7684acab6bbf3ef831e72fd693
SHA256e9d537e29a1f3229e853b38a03de03fc0bac429b651dfbf25be34ada3d4c9682
SHA512e52fd187043580da20c79409659a5ec4a4ed1814880e1d2fcb1392de8b8ce0f35edda8dd8d4b0a7b13533dae38bfaeb028ffb0b1df4277273ad1851954218a6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5602d038cc2d6f982e8a0076f37f4982b
SHA15ecf72a8a6b11b2ddd9aeb585095b142e3f624fb
SHA2567f57b21f20c12aae371308e8aa2dec04d5934cf2bb344fa1c7ed5f20c30ac6ae
SHA512c7df92160c2059fcd870e3b16d4854f2eea057af6db74b4e6eef10de340e35a8f3cbea8e4b8e38572d563f6b7fbc1b1d943f747a05c5595d7759b568ed7c0538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ba2183369fefe91266aa04e238c93b0
SHA1ad43b1f51f61b03ddfe7e138d16f465e61acc6e4
SHA2566a456f5b1345a0000a5cf97e27d1519c4d2b11b8193703b76e17f925cce4871a
SHA512a05184e600c05d0f8ae648fa047774dcb8dae11cc2596c27a5e412d49dde5239fe6ca8c9db7ecc211d5645d500874195e6f2f5b08eb4715839a0d5ba5a570759
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a058dc574925bc5e8b4051dd6bf02d79
SHA1335ea303842ef47c4ab3bfd0dd949d5c5c1e17c8
SHA256cb6cb73a7715690785858016a49b4ff4026a2046db2413182d47694498bc6b9f
SHA512075218db2981d337b58e8a6d94f945b0c10bc477e66bfc1bf6abfd7e0044217c23e3ae709a632f089cac52abf05eecf780010e3116a706719e6ca659b2c06643
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b703d578d8c4ef79ae8a8ddc6fcac16a
SHA1f706ec799a64e0f66f1d63cfaa526c5f2f878f1c
SHA256e002f2a17519ea1587ed9cefcb47e4dbff070a7be23e5031f5bbeda34bb1d985
SHA5123cbca0ba1a20cf6804325394ce20473639d70f7cb43a3cea30576c7a33857cda3843e5f0561c35fdc67060aac0be8d7ca7b5926e6a3852f53d816fcacda350e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e9d6dea9f3e75d0f3fa61464dc94721
SHA1ec33f11f119ff3e0b482405eabe7e08de99f9579
SHA256f09fcba9e2b56fdb114bd03d300e922683cd57a84a99211457074fbd34406a56
SHA512ccd323af76253a28627e08b6320222592ce3859a2f048d1c9a1f72c0a5c76f9e139279f0ade4b98376381463d2f5054c8564731647dfa7644740fda85dd676b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a75b679d87d800fc1006b43629e45a12
SHA1a82e1ae30e03cc6ef0fe299e55107938f7017ba5
SHA2568a3414de3e8c9f207ee669723b8433190ef1a548b2e9e53be3f56c91dc16139f
SHA5121966ea17b9a81ec3fde06e31ce18d5be7215cb2fbfb79590686894f985875727b9b00d9f7a451c889c839503026dcc4cd9aa98fd1c1c1274e6e65cd4cd78ddc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bb44ecd843a1547b6ff0a48619c4a12
SHA13009ec4c9cf5ed8064b2ae6f8a79f1ad17b0383b
SHA256bfec16a8b8fd3448dc7fabb5df6d1585ba2bb59049367e32fc7de2ad450cbaf4
SHA512b6a9a6c06e33a2e58ef830af66d92b80675d9628c83814a428b1d7d7f82d39681fe9cca032ea06d78b49928aab7a7a96149b841850806893174951d6835008b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55650a3e1c0f2703e7f4fd9803d52aea0
SHA1df5554fd3fd4a290323c4ddf5859a12a3f6d60ae
SHA2566b923f63806b7cc8312e61afbcabaf7a9b3dded57d7e9d43023345ba3ebab386
SHA51292d92473080ce7a96d7db378311e34ffb8133e8e41949b84588cce058380f50e8c8e8387e44a808c011973d6b3615c43f301427737b7f8b61ca8e6b45191ef59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa46b7248c6312971ff6c36318f634e8
SHA10dd0f344518b0dbd2cac21ee733b2c17770e8570
SHA256888823755ce74574efc983ce89ee89984ea92ea92839b6b88b0cfbfffee29fd1
SHA51246acb4946e0f08d2ca6e04c6cacd6ad868f1d3358b3e45b164e1dff04d0ad5e3d2154f4404ccb166e823804c9753af90b87f38d7b9faf1261deb3e7f6bbaea46
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b