Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11-08-2024 10:05
Static task
static1
Behavioral task
behavioral1
Sample
89f485c15fd7fe4c944d7274389a2a8f_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
89f485c15fd7fe4c944d7274389a2a8f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
89f485c15fd7fe4c944d7274389a2a8f_JaffaCakes118.html
-
Size
53KB
-
MD5
89f485c15fd7fe4c944d7274389a2a8f
-
SHA1
d172a6174ae2bf0d8ff5c7450778b5f9e607c2c2
-
SHA256
2dcd8aa43baed87b9d4ad713a1908e75d080861c29e59f20025a790d93d54f1b
-
SHA512
d2db6e3bd79e5e3cb2d386ac9448fdc3ededb6cab03c041bb318633e195808e725a96d4a374a9881a797d8c1abaa7716fd558ef11b7830720363ba4a11fe7f36
-
SSDEEP
1536:CkgUiIakTqGivi+PyUqrunlYIu63Nj+q5Vy0R0w2AzTICbbGoy/t9M/dNwIUTDmd:CkgUiIakTqGivi+PyUqrunlYZ63Nj+qH
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429532571" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2D589DC1-57C9-11EF-902B-EAA2AC88CDB5} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000005145c56a69d6303d491fc0f7a93219bc2d4954831caf3da81735a3ceb4990fbc000000000e80000000020000200000002a2897c4f7f492c46e8a5ab12b0f25827fefb63cdc4299869efe9e88db57284820000000059da0fbd395a341651f7f6df9cd502574786e9f9b50b2d0c6f9271e35e28f2040000000d16c8c37aa25a97ac8db982a201d73b88e704f2051470f353c85923c4dc686d83ed1ca0f8465b241eac62a40331ff586969162a9a01f90777e3c9fbbb93fba8b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c00bc002d6ebda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2532 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2532 iexplore.exe 2532 iexplore.exe 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2680 2532 iexplore.exe 29 PID 2532 wrote to memory of 2680 2532 iexplore.exe 29 PID 2532 wrote to memory of 2680 2532 iexplore.exe 29 PID 2532 wrote to memory of 2680 2532 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\89f485c15fd7fe4c944d7274389a2a8f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552dedc67f091eb1ce622f25af5721100
SHA1d6d5abba3fc10ee79b0f00dc710036a181db4da3
SHA2560acea7a4e0a36b04ad2591383ff796ad93dd949f800c3ca4ff511700de4ffe67
SHA512f8b05664652de82289826325733dabcfae4a4e56a98e646ae53fbbeaae6e86ec34b2af2f1bc876849d943c23be0a4d2ebcc1a54cdd124b66e33fe1a0da88e6da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb9159fc47f98ce9f24f672d79e52bf6
SHA1f3681c37ef9f5ad1b622b1f81d06d141d283c75c
SHA256ef70c9b3ab2be0a2bf678b7ae19ff94e43a438756a6b3e49f70e65504c296204
SHA512ec7a597f45de3b1e1be305545ca343b882972ab97409698f9f24885c38652b6ef5048561ed66d4ad028002ef904e978dcc670ee4ec4e15f7b05ad0cc1156f717
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa3d2316610709457b5036ddf3bce6c1
SHA190e1198416293408d737fa79941226112d7381f0
SHA25694d1b3d631c6a2a0594fd6a484c999c9933c6a378bae2c4290babccd29784417
SHA512e410f1a88a5a44228554c5e70dbf9b5e0f56cf3628956225bcd65e138cf65bc800b19ea87e30b2d138fe056f101746f87b5f10d1073f58b09e6091d2eaeff0dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b2b9539dd8823fc5e0d0600d031542b
SHA19426a17faaf5ba57cd5d48c31b899106a7e722eb
SHA256e9cd61a3fca1dee6f144b0e219294414117ee2c7df052ce4cf413133536ba92a
SHA512d2a4be6f43faa058e8eb7ed8ac07be9c9a8030796e3c6558244445b0064f7888bd34556663fa372b8e9d12cb47f3bce421d62452cc0feee3a7f996bdd6bff110
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5734d17231b449b5cebfc624296fb5147
SHA187378cbf31a9571120d50b3a78846f4da600da4d
SHA256227243495cf4dc0029e462c7ead2ea014565c8db936fad87d7f2be521cb5901f
SHA512b53b1e511e9027cfe8bab3fcc159c711b95620796006d28b71f369c600d515c1e94ab625be7b176c9309391772b6dbccaaeee7dedef079e1f9a304e531e95279
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503bbf146b98cf8635782cafc9a094788
SHA1f81dda528c0f068642032fe83abb8025e10647bd
SHA256b1fc1f6cc38675c92a277576ea0ac8a27abda5287035068f0c6f2f2dd5b19e0a
SHA51278f43859fc8fe06a4c887804f77496dce645fdbb2f11f6ce2175e10a8ebad53b6da20eae57aa0d82b9a9d8730874fbfd95bada8c5eb669976b21432b0c1d4cda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7be372922f8de6eb61fdcb77ab18529
SHA1d0302becd1cba41fab2cf5f80098a67df6bd245c
SHA256469cd483da29151fac91fa9655c7f416f035a34ba4d2196645c35b7d34593327
SHA512186b41c4ebb681f1b9efb1832002c83f3a81c9b47a43877ff665cac55f2c88fcf56303961f068f99fb55bd431a410d3150a00c93ecefa49ead63c8ece59db066
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af1eff86b3729ed70839f9c1feb4eaba
SHA129927268cd1e4fb412e8cecf751040c91ef09189
SHA25675296c59e6b41de8be315c579aa3378b98c7c34597d4aeee15440c086c9cdea4
SHA512973e611ca4c8709bcd1b06554da9b2f06360d6c51c793fb89f29175030116fadcc53286448c56186d9a717cfc0a380473cee95f372631bda1296d1ea7e44a975
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bffc0ef923e6a65e99655070fed55e43
SHA1f881de45fd477984181f4cc1028b822419dc2a2c
SHA256a38486d625d71cf233fc9a4c16fa79472b4a80eca8ffe54b2fc97b4590bba46b
SHA512d644aa46b6404adb26901ef52462e7a509ffb53b52e4c671222323fd25a5ec769345e0e5e1d9752bf92fd77660f34a3328cbd161dce773f3054e93fc48b65a48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e754f471c0f67deeab3f13a0f03450d0
SHA1ce43dfe56a3a1698e786e3995ea34cc34b727072
SHA256c552b9c0e129e54363e95ea65d8398dc03ff1242b1cbb6fd93a1479e86115b95
SHA51241a82cae562df402eb81217abfa41b8e57b8fc5c3d7fafc0286c1627d659ce7951a78ae8c750dba428f034f0d63d10f0c821e4f8a239e8ccf952cea7fb00fa8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558ce8c36963ebf452a54ad3eb0e23858
SHA171ae52ccf57e193d8c08a19d50327e7c543a4885
SHA25602a291a0a3b6293ff1bd7b2d4aa900850e3d28eb53594f7285b1994d08dc16d4
SHA5128c53e2672953ba59d768e413acbb528c31ab6f70a106752ded8321de9c77877055afd003c934de35dabc733de190006d0a33c95f5e87e2678b7d538d92a0b1c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fa0a811acbafc59fc2f13a66954e03d
SHA1cd68dec8b892113d3ae3e8f77930b3d51fa41203
SHA256e29a5f4ef22ce445e77af09ff6e99ee8f940a062a7cf90b60a0711249bd83338
SHA512b65398d5ec9c28014b0313caaffeaf3c236ff48dc204dbc0310edef39a964950a3307cde7ded512e77ec3831ef669c0ff14091015e31ed9663231069e1e555d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bb6fcf300f277076b48bacf6c7445bc
SHA15325e2e97f51f64e21067ddbd7856b30b1ba799f
SHA2569877a5c4f1c87009948d900eb6b961d83150066199d6dd63d1ca8589bfcf3d1c
SHA5126b2c3d8acea8e96057b8077e32eff2f51b84b199bbcada37a0664ca989a41fb84fe8fa82ca1ed79a4fd55eca105e45090f231c40e66df426439224fd744fe787
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58acccce4fa861c36d1f96ff07fd2123b
SHA1035d646a59a0db5cdb3db3e5ca847177dbad411d
SHA256322efd17b63df3d72d8b1ff7cef9298b6a2a4ad5bba7b516c766724b2af14495
SHA51207b1b3234bb36a084fbf6a302dc89fe832bdae1169ca7b18901f580dd3c315f015879653b6a00ed217bf81811baa27c43b0098f1bc8a0dbfac2110d36d248a84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fde483f3fbdc7827d8c4f0418fe7f80a
SHA103b61c5d1fe27735eb9a5bc2209696ed01dcb9ad
SHA25686a5a7fba17b0185a01689de3528a12e65d182e2bfff6afe0f83593671e44bc0
SHA512e8054f3d907f3e48f7a6f1758a06597888e3a5e70f66f3538d41c4b497172694c97f4d87bbf6bcb68aca25e8296964c900e04dd92030737cbf5c8f18def9f1d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507ed8fcba99de42a8dcb3041acedc798
SHA12fde312b83e5a5515c871b8a96cb4e1c0d43a658
SHA25671d813ff462cd0905aab37b1a99320005155788eea0bb18f78c367cffb53a074
SHA5126bfd8d956ccca971079ad792d9924b90e27eed332decf0940727944faa3850a53d0f5613f444b51de5425fd6fa70dd59c744023960f8e004d876b6a7e3277da9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c58b403833d7c184660eeb6dd403dd92
SHA1a9e44cd6c18bf689ed22863c413eeb37a7494d8f
SHA25608d960cd0c4c0b9a2d02413b68cf87baf4e0b401dd98d0410bee75c4a4e9a926
SHA512bbcb299afb0ae9a328d85e5e490ee9d8a3f02d623fb2f7c4e3f2db8fbb95911ce72048502c98a6cf048718a65e1aeb3c12711ce37044354c5481b3c6b3272afe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcc71ae9984f2dd61d7820f9399d1a06
SHA140147571ca0944800a6022c429751bb798e057f1
SHA256d6b56bf777d2d436b3fa7341d36c9260c87e42fb25503a00e4e96cd67777ff6f
SHA512aa4b52ed87d5a321c4f1aabfa6e5d0858971351ec836871d2fa572c230c7db31e035d811c0b8bd4021e2ace27b2e465c21012aec96569561e4756d640360099c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\40WV1DY9\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b