Analysis
-
max time kernel
120s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 07:25
Static task
static1
Behavioral task
behavioral1
Sample
9524907463be6d1752f588cc86c386e7_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9524907463be6d1752f588cc86c386e7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
9524907463be6d1752f588cc86c386e7_JaffaCakes118.html
-
Size
17KB
-
MD5
9524907463be6d1752f588cc86c386e7
-
SHA1
bcfa48caa111013a740b33d87d347bb132598c06
-
SHA256
099929448cbaf6c8fe6ebfd8cb27a7cf05e8deef8d59a0da33ec8630af0dfd3c
-
SHA512
06f5c1bbe2002a7358c5843349ff55b4d374c025001e0739013f25e0587c32a5d9b043d00483478cdd2132f76e00bd2895fb0207daa0954c3974a383a1dc1895
-
SSDEEP
192:1IsuEr0u6jv5MDwHjp9rR86iESQ1EI5HTwg0RAMfO+ClsVLKNdqvE303yNL4Rr+r:1In5RFvTX3cETZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00cd44351beeda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429782188" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5CB89791-5A0E-11EF-85B7-D6CBE06212A9} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000005c54dd3c9c812834f511c0bcec8679168eb267688feab54d0518075df7914ded000000000e80000000020000200000008f859af68f5b3b96bdf006e77fa3215c96baa7c1597f608d92c057da2a0d885a200000008b66736b5b1e9edb8714204aef7ea9651a98de35338ac45ba13ba2610de93f9e40000000397b5da6d2ab46cc805cc4c2ec518b566372b59487522ad02bc7a40dfc79937680bf19b09fc3c7e1c72a0a563574601e1c53724bf3206a91c0421ea9f03b600d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3036 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3036 iexplore.exe 3036 iexplore.exe 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3036 wrote to memory of 2416 3036 iexplore.exe 30 PID 3036 wrote to memory of 2416 3036 iexplore.exe 30 PID 3036 wrote to memory of 2416 3036 iexplore.exe 30 PID 3036 wrote to memory of 2416 3036 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9524907463be6d1752f588cc86c386e7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3036 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6e0581f6b7aab83b8e5507122ecbcd3
SHA163822480bf21496c6d84f46e8d6219f9e5789ea7
SHA256dd8e91263181064e263f39e39798135f5dbd2b687c7804a204076284f205fbe6
SHA512303bf30ab8f0ebf8ca72ebf82fc705113c570187bce32b8cd2a74687dcd4445120b502fa7e5f03b4701eeda739fc27e69ab41cff546fc78c2c7c783620debbb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d496c44c8b5789b862e7d7a2d871e5da
SHA130715b7fc7cebd0c53551e2e8ec65a02ccbe798d
SHA2565e775e787141934762756623dba04cee66d2b8502242d41d30c67bda16c2be6d
SHA5120688597edaadc913f2de30c814fc6e6a0811fae49131d7c503ec57a68dfadae20ac40550e02fc4d05c0320b65b1218c83b40c93e931bb5c54eb5fca048b30dc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5340d05d4b32ddb5be30be601941c2c9f
SHA1d49a18d0c9ea40a0df08c1b6d9e6489e3212bdc3
SHA256affadbdf498d4281925143bab0f65aec0f7000f759270eda7e4514289bb00850
SHA512fd68341d754da5d34b3549d1c5fca0986303e36719de929b97e73a05b674625aba81fb0ed517c1f27cd7b55183f0e68e547f94b84adba06f9aeaa22825327bc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f74af888a7d7cba245c9b6080719d833
SHA12df7baaeb4c85acb2a366d553abb1bd64711779a
SHA25609a8762a6564f10d798c0b2e5275ba413cebac37eee43ff80ff238ab1bfc736c
SHA5129d18897e41c5fb3daf79311438f338743fc9bae672083c438e4c4c75e25277d5cee38c7d4da397774ae82661c58916724fb36ee0ea6448932e85339e18c0ea6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569eda3946f78efe8e6aa58ea9c59b9b6
SHA197c9a095cd335b3cdcb403edba1a9d54bfbc991b
SHA25680fbb236a569448280dd460f086ab88b681f466b5a090c224988c3ed56e9a57a
SHA5122e1e668f1c74e8c6f47b92358c7986b7a3ab89099f6a4b201cc3e475a118b7876d40ee750be3d807a00b618e10643a52bc17a3d724a182d01b42bc74bde495ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514cb3f521a0e3a0e87d53fdd7abc7081
SHA100c5539157aab97f0395da84319e61aed6523b13
SHA2566b980c7e1e793fa0dd4a9878ca4d6c504d2e28ba7bd3d5d77a8bf5abc14695c2
SHA51209bb5296a1cd8181efd9f9931789cd5a71177333c2d1c93ef3c4a78cfb9481a9a57699b0c93c04134cab10b692915aebe009a6dafe45a18fe09bfa5cfaea47e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c702af46e2b3ba1bcff72ad9f7f34b97
SHA10e3311eccdd60abcfaa0c5c31e97b07aaa2f817f
SHA256fe56686b5e5a1559bad718f289a50d8530f70279fc617b470f079f1628a3d80e
SHA5126548beae27c7c7b658984d694bcfb2fb2abfc60b92aa515a3b285daf79c1e1a09cf76a239047f607ffd9d03371030aa24847fae503af777a93d79dc24663d0d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a962550ddd18d08f10501eda5838d59
SHA1af6c58e7d31f291785c2431be2d93df453c61324
SHA256f49d1a7b8cfd458eb70c757caec939ae0be367aa826dd7842458e91f38d182b8
SHA5124b0649a1b06bb0760c745dc64fa105cf4b8e48c630fc063d8c7d6553592f1806add0bde4c64f7cb305a8d97d9439590e0bc56e9c80dd680d92ec9d7d740139a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f68e81b6ee05051df18370cadb6048e4
SHA1deb6430cff95b1c249755698302d2f55d8c5407a
SHA256b3e1ba23a81e188987cb2c6a4e24112bc98e8da175e7071c21a595385e40b126
SHA51285c49100071aed7fb72df54e7cc1c1b9314a57eb739c6804735ec85db95f1c2d148b18fdca042397460dbb5bc5af5ad425e20cd494ef69a70e7bce2660e38c27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51503badab136a61c06dcd0e5a3e61d96
SHA119ed9db20262049e7747b43b990c25aa61aaf738
SHA25662bcbad355330b6876101ec6f96d1f1c56140612431e4af5dab3f746436d4c50
SHA512553957e9577f8071a4767c610d22f57795f339a163a923041ff304d36a43ff49b8d90426080abe7933142af1d1fd841b3467d4648b36fb3653da719d38a3e720
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c9d5bfe1697f12c078d8221cf743e63
SHA13b8a688d3d4bbcaf1e03731cdc2866a76d1389b0
SHA25663629de280cfa722955372e56c86713116f5210c20f515d714fc3d35f629d99b
SHA51258824054c8b78c752b2ed163a701b49306af3cf4ca8d6786ef4af304a525c562eb3ac4125c8047a1144efb2d35a88c7047186f17399cf8d9f74df411b625eceb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590fa59e43c71f9ceebebc4c01404c67a
SHA17cf061131859b7dc61718a1ff99f9d35258874f4
SHA2564142edcae62bbf7c167a7bc8efceb8ddd82823934c53b1791ff2afa7b6a4ce69
SHA512079fcb3bd5cf901be9705e74811f9eb3095de2b6c31853013ee88d970a3ad6cf3cd66d011c49026e05c6788aff8cf856a602728cb6bd04b0b5bced6292a210ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517638b59f23b3f24a9ffa091dda16ed3
SHA1f565cddacbaba232f70681114c1ca1c6f3d12f52
SHA256af7a70c29c1c0c82733f4b2d87e572466f9a11de7e82e0c448f58839dc7e111e
SHA512c70a2ce00b7727030b2f04077696e47519ca1e01ada3af177ecf4bdc39193aa545df3a40d19c1c9c6fceae81cc2eefccfaac15bf225abdf8a8f52adfa7d0c27c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b159511ee287e8d91e84fb13b3a1868
SHA14955699634df3a01ab234bbc2fee06aaabad13c4
SHA2566a983737883ae9d82cd8583acc717122b7c923d8e40661bb922bdf9692e38213
SHA512fad2b087231b35b331ceea7178fa4b1d3b44c70d3282897beaa44c82c8ee14102e7e66f83d64dc53bb1772fd5fc3504973003575a30a2c808f7a383cc037db81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e03fe1217882b9c3517ff96247a0041c
SHA187cf2942d7cc2755f180a67e0734df2f00902a3d
SHA256dca0f701b8d5dba2d64813de34e361cf4d67d97ef81f71af55381fdcebd3b5df
SHA512e12582dcfd1a039714799ef0b95d046559409d41d6aefbfdbb138467245f8a20c3c15c66f1e13e69b61a0b4a3da8c1fed02bdca36aa9ea3ec9e6884bb594c1a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58991b44a535d180a1ff3f30f38bc6e54
SHA119734b7a86e09c63325d40b03a9af50452119d28
SHA2561d744164b13d662d3b91324b23adf3315098a7597ae3fffba767038d79e812d7
SHA51283bef755929f15b04ee800dfa15032e471976b8f62ba840b3e0336011a658cbf7306ddf0f9a372239adda1791fb3a2247b011829ce1746cb16b9916324bb6f64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7841ae06758c08694275cffed9f320d
SHA1f729c650c41b4db82ffd3a7de452828461f30319
SHA25662e6dce8eaaa4b346c2c0acdaa31b6a1acd22bfa1f14c6d3642cc5aa43cf715e
SHA512c61fb20d815005f386144f64d80e77d0366ea56be3a41907fb899b9ce4dad994e5564355305be7c774ee13f8e36f2445e9391de1de60e4bef146f4f1abc9cb73
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b