Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/08/2024, 17:22
Static task
static1
Behavioral task
behavioral1
Sample
9406d6098fea697b002a8533089e315b_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9406d6098fea697b002a8533089e315b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
9406d6098fea697b002a8533089e315b_JaffaCakes118.html
-
Size
53KB
-
MD5
9406d6098fea697b002a8533089e315b
-
SHA1
63d6d7f79554f69ba4990d4353a817b06c7e208d
-
SHA256
1bd8d2ce9655b2ce3a2e3cdce7dcdf75fa469e575685672f386890331f045127
-
SHA512
e95975981dae0e09112ee3dc6f3a308b513756f4e1b749570639b9d8c80e08d6ebdaf018d2546d1ea94d786853db46994a3c41b104daa7be422081abbedd38cc
-
SSDEEP
1536:CkgUiIakTqGivi+PyUbrunlY563Nj+q5VyvR0w2AzTICbb5oW/t9M/dNwIUTDmDP:CkgUiIakTqGivi+PyUbrunlY563Nj+qN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{99DB7461-5998-11EF-B34E-E29800E22076} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429731610" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e01fcf70a5edda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000fa684c3b1d863f9344a2bdbc8c37f79daaaca7708b0681b1ccbb2dc1e0f650b4000000000e800000000200002000000096499f075dabcf982e445e997beaf91c6f11acac079e1056870cb5d06fdbc06120000000175f09d62878a34f4106ed5f544bc75d07933cfd4daa5321dbcf46f5edb87ba740000000bfd9100104da54959ba7358d9752ab50061e476fd0d1eae046e48fde20f4ac9ebc3cb3ea19889b7e51775f733126cf03e5d3eeef8e75024e40a74390c83e12dd iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2932 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2932 iexplore.exe 2932 iexplore.exe 1932 IEXPLORE.EXE 1932 IEXPLORE.EXE 1932 IEXPLORE.EXE 1932 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2932 wrote to memory of 1932 2932 iexplore.exe 30 PID 2932 wrote to memory of 1932 2932 iexplore.exe 30 PID 2932 wrote to memory of 1932 2932 iexplore.exe 30 PID 2932 wrote to memory of 1932 2932 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9406d6098fea697b002a8533089e315b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2932 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d9720a0110c67ba5f3e6341a72cad3e
SHA1f8372dfdd141eb08f90c2207faf9ced25771bfe8
SHA256bc640dc706425a2ccdd2c4709119f6db2e41d2cc35cac400fefa240260960ab0
SHA512a61964cda85763c3ef347af43259ed471508f43dc0eac7bab6f9fc95da36f437f7775f24701ad32450405f24d296a7717ff658b70556bb056bc575bbbf8b828d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8703b2240b3b31b1dc1fc3e44cc00e3
SHA1809b463d6b369bdb541967883f4b7c7fbb004242
SHA25636d2b3876b497cd1408075665c9c46d121ab973f14000540054e8bc02cb3fd93
SHA51206ae27a848b52f688f72877a5c82493297fec6fbb823dc5c9abe8d16a606c0d85c7a6d7f151cfa65288fa63280f78de414fdacae8c1f5078fea0214b15a7214e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a3f4b1ae9b5959404324750d28f0105
SHA1a463c6e442ecad199e750c0617563a6640785b0f
SHA256da1ac2bea18c7183f3ccb15d97eeffe5d93982b6877b8f96fb0e0c39f0974eed
SHA5124a2b9e8f197dd550f02371390b7e040a4c553e68525265451ff75cd8742401ed412aeef874706325b71af431f931b1ed23bcb10e62b5128b4a1146840f886ad0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546570b460244d0c9a8b6892fb7964635
SHA13e8e6d700a1e93c988f6456b2fb4553f0a6a56b6
SHA25637f51dce955521486376edc17912d603263a295a51a990c8fed1f9e78b10eaef
SHA512f5ed05e0391bf74f3b9e7b7ef30767b64ed1cdb39deea401fcef1473f9fcf58235d3dc2a531963b1ea42694105e8de47d61f3ecdf1cfc81e18b1738bb8384b57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a13b3120a59b88e79cd4135e8e532a29
SHA14c9215b54f9f6e9c9a3c6c67dbcdf27027e914c3
SHA25622e99a29c5df06da86cd38381ba373ed437715130816e71af14158c924bd8563
SHA512eb2b80a8e13894f5eb41f5ecb458d270754b0afbcff057af0e8408fe768d77c0ed17a1b4b0d20b3fa788f5bd5abff242d78e1b4d3d87901f8e59b5d474a9f493
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b530c43a57f6d1be6fff84bf7b98ce4
SHA170c89ec59b54ec0b76348637f8235a8d1874ba53
SHA25694b18c1b4fecfe34cce8042c1a21f76c29e33f0f6ccc69b61f2a83b9cda06a8f
SHA512eb4a875a698beb6fa29eb75017302a671585768e0ce3d6d264f145c45b389140005b3de203625f76e8b6934495b4583353a4e21952f28f03b8d2490e840b913e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfa6c0a8a08f80529b573ccbae444a66
SHA1bbf8a9c87f53fed9ba06614509d31ffb16f58edd
SHA256ad3b522d4b32e53190600df71de8e2d4a51d12b4103ef8df2173049d11ae8836
SHA5125b3305e9d33cb81f0fbc4669d13846e4aa779b9f19908df9884b81e648abb97a84afc86a87711736646438c7317574bb09463cad3564572e358cde87c2555c14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57440d02f748565ff362573ee18fb295e
SHA1dd4ff93d89482ee8e998ad0e8ed64f57db34e1b1
SHA256afdae6287573c5ac7873a72e7e570789910065ad9a0c8003389696b5ec39dee4
SHA512be1fcffd9ec90c2142051c84b1fc259901daf68ac6a10b435e011d53db440876fdff3f984c37e7bddfe4374d8144ec64c740c42920c33261ea0d0beb66ffbeac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9a7e0a70c0f8a20a026c6bafa8ac089
SHA19b6880b43424d33569e354d810a7ee485a5a6093
SHA2563489e56c463594bd084185635836f5e4450719f07427058c6e5cebd7265fa08e
SHA51267a55248b105b2ca427ecd5356e6022f09810e6335aa57e6197faf941583849b391dd76ed8cdeb71d9c1ecf41686f34b773d1c1635b5130dad5ebd6133d44ac6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4727252e7d9843fba327bb9cdd47bf4
SHA11abec1e49223fd997f8efc23ad70cf7645968222
SHA2566076417d1f20436be1c3893917f0364f587fdd4c5fec155af333926db319c54c
SHA5120fc66dfc14ebad775f6cf905da9a183fd30c69ba1e1faf5106b36be276598d5ec421e4721e0b79005fe6b38588a56cf004d9ca219287239691462efdfba004f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5328e386202529dff1b8f5bd2b2393b0a
SHA1dfe8a3b5131c294bcdc065511106b1c156dca5d0
SHA2565169f5b24bd9e61e492bc441e9374540c4da7143588a6857cd4ee08bd81f929c
SHA51238364e23d8ba0c068c89ca0f900275dd0a3a9e148d6e8d1a62ed1cf8aff942ee1eed4a3f919018123dbe9b6afb52dbb1df7fd9235e1a46b947c06db083e53b9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582c81fdfa0a1193ce1645f78f835ce51
SHA15685b64ef3efe517508467e88390e44d315130b6
SHA25631c9f31002f3bd53dd94ab87e9286aaa2db00394d392de651fb689186684f297
SHA5127b44dd47c92e86a58decfd936eb1de249498237f4f06e08b656c5f013e9ca93e897c19fa7dcd739e5a180d20fbed34aa62a7b3905bbb0615fb4f4aad05585aca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de6f6a82ae9a6f58426bded5180dc4a6
SHA1cfbcfce0796b4988147b327a77cb314db6170734
SHA2568a03c933cf2864b44596ebad4f4d7ac01253a76b65cf9cfbdfd9b9450314b528
SHA51239738677023b74ddb48f1ee28c904ed955d7803226202f69693357da64adf24e43383451312b0aebc701e0d8949edb261cbfe750de0bab7e4c9b04dd1d4fcd6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55eb6fad41a6b7ec6af09c2d98012f243
SHA1272f691df53776ed165260c0289e35929ad2d286
SHA256d6f4024c95c20e59bc63186f95be6b1d442d08bc6de22c970a4b0e901a2d4ad8
SHA5126981eb56237fdd40ec7f30ce9477699984dfbafc098dd004fa1d8b1b223c032404342672e54b309b36200ed9a1c0cd6c3efcb27919889fd013141d4caeed4ab4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566a67e8a5130fb5006133088e7c00ae6
SHA18aefed5d2f1917fba9f7492383f538caddeda5fb
SHA256c5388b7b3d0807cef9b8ed575195afa58800c9b075c5438ed407ccc63b5254cb
SHA5129a7e8f34e6c7fc11f20172ac84451509bb47a6ec92c705c4173d9c367192cc2ab7695d35d925c9a68c26faa8717bcf56112dd0b7e425edf73847ac7928a8340a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ea62c0bc0c1a45973c73548b2520b62
SHA14cd62c709fc28d739ba0a262316e9ac6a728cbd6
SHA25658f66bef404dabef75690a74ff2b871af24edbeb320aba147bd5b56df3ea6489
SHA5126b1c9f6ce3f3eb3be0aa0aff842df2245f02857bff95a7fe1dab107ed1c4d388f0d7aa6903f61cdce1b27b1a86d49454d76ac30184f9137936a7ef11c7992a05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f60423907d94c7d637ac68760057a2de
SHA12c14ee3230bc419185a9a02dfd7c2e224e9460e1
SHA256d34f4dfe02fc2d051d231cca3eeabf9f6d3946bf8987cd05e30c318ed7086f16
SHA512318f224e39f25554a06811d642719ac298a7c1000ca158f9c7468a4f57cbb5c0883cbc23b0f8ff76759acfd5ed2a313e0f78dadebe6bbbe3200e01bff30d5bd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550f9ec0d2562e5ca51b083afdd244380
SHA1b6602247b6d18aec5321e94429ab521584774fd4
SHA25668604cba667327269e2c762f31ecf12045ac4ff58acb139009f6db72abf3d105
SHA512e3e5f6c8ae4f35632ba4984ad9b06e8fd69d60c3cea58e8cfe19056b34b5c590e068703353a52b905456c50a3950fb61f74a4c3f0a4128a49e13fab9dc9bffee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553bf916f9c487caa8608d03e9011b837
SHA1383e064552c9d8afa0bbbbe5d597bd88cc210886
SHA256d150cf096d195287c634a34455d5690f0bf33afcb41d42bea497becc07b918fa
SHA5123e623ec6d1ec2f0d9f740b441d939317a2013a3cdbaf6086da3661101b9a05b84a46b9e306053ab926a16838c89b94bdbfce9480d2b4808a5f48fcc3cd87590e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YUF3ZB4A\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b