Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14-08-2024 08:10
Static task
static1
Behavioral task
behavioral1
Sample
954722a621d67fd96d1477aba86d25c1_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
954722a621d67fd96d1477aba86d25c1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
954722a621d67fd96d1477aba86d25c1_JaffaCakes118.html
-
Size
9KB
-
MD5
954722a621d67fd96d1477aba86d25c1
-
SHA1
b2327618f1f08aa2aee9201f3a1d370fbd9c38e9
-
SHA256
fec0b42f9893c3e9c2d3edf2c4b65b9c03a3c7c317a254596e85997130e9610c
-
SHA512
0cd2630c871f61054616246e9eb1cb34f8470f21b3c5912dfbb4ec059a39e01b599c1af3f103d95e1064403dcddd14bf3bc72d16433fc99aaaee8b27d286c025
-
SSDEEP
192:0Cv1wSW1Z6GqTB3BLhydvKw8BvgEr6x93yGukw:07qpCZKwLErKuR
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BDDFA0D1-5A14-11EF-A839-E6BAD4272658} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b036e09221eeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000002cd62114e41ed636bc53b3a2d96b307a200399fa5a1038444ec8c9f8dc807ece000000000e800000000200002000000053f3495bdcde736103b6f63dbcb60e603188bb40e35e3a0d5df8afc6326838a4200000007626ec7b6d156b84af6967a215d47af9c8936526464616fa2a6711f3820350db40000000ed9c237bc900c957ff449398cf89d07d846ceafc984632e3f0265c2de15a3c764088ead184da55b68e41193aae59049461ed6217bb9c533a917da7d5497f1f0e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429784928" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3060 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3060 iexplore.exe 3060 iexplore.exe 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3060 wrote to memory of 2440 3060 iexplore.exe 30 PID 3060 wrote to memory of 2440 3060 iexplore.exe 30 PID 3060 wrote to memory of 2440 3060 iexplore.exe 30 PID 3060 wrote to memory of 2440 3060 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\954722a621d67fd96d1477aba86d25c1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3060 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593342ec964956e954607bca5b7e6c0b7
SHA152063584c74fc1299e773f249339cb1253569a3b
SHA256b5a6e1ef66b3754f03953d0653e4124d21754630124b086d9f5cb7934497c4eb
SHA5121254e357aa9f6c64e93a6baaf7b778a401608e9d75eecaddad624d8657e775ca9469ad767118d6695256186efeef1294101c64f6b1410af722b10815e2665ed5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6e0a3de21a429ce77e9b17e84e3ce42
SHA180ff30e0427d2c015b4b766e4af29e8830719f6f
SHA256b86114d500ec25c2ff9c6aece7dce89854100033e7a837521cf06943f50c49a8
SHA5123a56b35a59c7af5c0b02450b90a608136d1fe3041ff8bd1aa0a5452d47b2549c2baae91a76905273903ae6ba49e07927da1303ae1c3564866b435876d782a7d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585064475fa4eee3d652502ccf8fb1d1e
SHA1ac97cf91af8f2bfde5743b1891ff8f39b9fcdda2
SHA2564a468c7246e7579c9e4c58ba687676bef5e37ae25425d477ae69af8d7b5aa2d9
SHA5122f0d479b2b055d2e5609fb7e06920dc9c5e7ca4ccf9d1e25bc205672f6e29140cc20c3ab61739969e47d92dfccd149eab515b4b97e3a03f7a6a149d1f35cc48a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5076075d0035d50d68f80c8c9e0484037
SHA176cd0826263974db7fe242e60c4c7f6044749c8d
SHA256f3723a080758142d9d29bc2283ae489aa7be1b743ac4323eda1c154b4b6cdf1d
SHA5124a35c4745b5c52540f9b4273f0e8c82eb4314e529631578b43c2501484a8e644958ea6eba19b485865acdec9b662d55cb213a7c96a006e3059476fff2ac04a4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5928f9d0c5ab7f3bf9c631b5b9c9c3d
SHA1183ff2322da7e98db4fea2165adfcfb5b074647c
SHA2562955677d9cc78852ca3918810d22be8eb5b7d3d3a71bc8ae96329eff6f91855a
SHA5126651d2961577b56aa08bac814108df92b6b7b89d49741ec8d97be8eb1f2dc60e2edac1b675d1cb089cc445892698cd416e45966496e9c3c71ac0eb69a9ee53ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524f4af7ac0c72d4d0c70e54ffa1ccc9f
SHA166a804c8b1ab5a0a9b04e1690382253f7054a9ce
SHA256aed3cb7b327b3d57cb2b4d12458ccadcf042d112d85da8e33b2541af5f39edb8
SHA512d9ff582c5dfa53ec1e7d726013670635469eb5c268f7eb87d81492b9388c97ce250609453a41f1d2e29ce18d0ac006db8c8d6f14b28ad046f3d89071fc70239d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5045b3181d4040dfa82fa4e22641c23f7
SHA17f9adfa64585f9686cbf8723e05c8cba952e1133
SHA256a1adf525d8a7c8002a203c844c6d6197721387be13ec98ccab64a65dae363ba9
SHA512c7b23248ed61d48a8ebf012616b5cd0af235079e381aaf1bdbecebd903bf7c003f1320829300cf4133bdf11a65e7c614604d1e8ec671916e940d8c6108185485
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d34eb6fbcc12c07eccb5165ae2b2dd75
SHA1abc10ebbaea32c52136f943e43030ff89a171174
SHA256c58a9afe026b624797d4ee6ee20b3ed7b034ab3628cc45a10280ecc9f6a88098
SHA5123863839df13a7948abd4d2523378f929edc37bd7707338088fb03fa893acb1c092cd42cffdb88779b72c28a9ff98127501e3f731ababc0bb89fb38d92ff52b2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d8d77d82795065eae5b0e4f7a1660ab
SHA1da4f2cdb186dd93f58758b212fd00c4820070635
SHA256c34dc94be365517c17d66ce9a94d289ed8c9fd9b03e73c337a08b4fc89791b57
SHA5120f684999f5411de3d6bb5d740468d707686adb8f699f890a2c9717211685d930ec96216a485f13cf1377dee34f3c168d59257c10a20379d487084eaa55f92997
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f722850a7216fba9ab4873ca31e18ffe
SHA1bb5bf545a09808f80c1fc20d29b7fe11b6e465ed
SHA2565b6d5aebc7495f5cdf5a29568bed3cabb6afc22c3e8c76f8b8f0903981cee3d7
SHA512feee91a5f08ba8752017d754a8b5fde1e352437cf89b42f2d87e3bb01e16b47a41fa5c3c38bd2e26f811b68e10c5f647d69072156dfd115593d4b98d8d44127f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a9fa4f61d901347996166263f2b8ca1
SHA16ab020a069beeb1d97457693efb5cd811298f028
SHA256b899e7edabae1b258cc4883b590f1b4f8fa55b1cdb71424452798cb09f206cdf
SHA512b4d0866af76869b5657c45ba6c8967fdcf47fad8c9545e6da2b4145a5b9554da063cd13ae35967d13f1fd63d9cd3d5c647de6aae1c71bd6551a3c0785e5430be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5427c5ddcc0b66e6d5abc9df57da60210
SHA198317674697879f262c21ec68b6c8e0d3dbf44c6
SHA25689cc1028eaeac11964bdc7e19d5db31bf500bc844bf8d71c2f20313ec4709b40
SHA512354c3aa4dbf7886487ffa3fd156b31902b9e7aacd582c901f5d3c4f88c60558377e7541c21209cf07d71fb84faf83150a5e5a672ef94544ce8d6bfd53a412843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ae04fba94f69b164ed2791cbcc6bd64
SHA149898730f5b5baef4c34427dc25530940be29ebb
SHA256af8d8afd8d71b5c621678792d4d9634ebe89391a14ff43149616307cc73eee34
SHA5126c778c1c46a5665eb1fd843ecabe30462cf7fbc96085082d703828dd6a8a6bfa9134d4bd4b7d32e143b87faff96e14b68337d061d7d753325b7a4c4b20e3e510
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ea465bd12d3e42af775c8d7ac918e05
SHA13e930e3473acdebae7252c07100913285596d190
SHA25671ccbebd485e8478ee5cda1fe149cf3d25d7ea301e90642bd2a80a0430d68444
SHA512cd8fa57f22ca776aaa76dc288c417a6e3ef390a6fd0d928ccf1452de31606e8e94c85ce2351da5bb4f571f7d9430513ce7f64e20abce3ac7b02a74c4526bfe4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea53d2a16ff6be833cc560dfaf6b9f1b
SHA1032264773d832a7acd47684e86110b40b4ac418a
SHA2564a931815eecdbf85a1983100b2f5912b626ee1d8dbb08b1af969a1247facd916
SHA51246fa6b93759c7632d33b0e6ab3e973a58db6326d8fe0c2fb434975d38b6a22d811c7dbf44d929eb14e5493ed57b4cffc8bfa1b69f756175c0d58930bc610c189
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c3a25378eb5efd6a282c536f9785c30
SHA13418306a225af56eed34ce4130dbc4f440543279
SHA25694b93d9e8d83ebe266422098528d9e7d706cfbffab3dc54d0f52a287402df6b8
SHA51245b12c898abbbce6fe727efedadd83c8fea5b49c4288898d4546c2806eb1b16cb5eaabe8407d59b4d592a5bed5f6518d14a2f0dd3f461ce8e6b48c2a12392e03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e949324e0a503bd7b895e6a293554366
SHA1e7b44ff58537a8c6d32a70fdd0eaaae07f40dd82
SHA256568e82e1dc7a3c2623a2e76047d73e76b789cc47e9ad6599b5a2a7371affee16
SHA5123c1b25bf8ec12c9cd6d5213d478b59064b632781bdda7e150add4e053a2681b67099a7296f8479f1dc5cee6a3579aa539863a60225e2a5e3e353666f677d455e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3117bfcb542607dde064d450d26d08f
SHA1dac01d2aeddf209f13f9c80e10182a4d9e991613
SHA256e229c5eb8bea739d5e0c4dddfe12bf79f3daeea9fb163d4abfc0c81c2c116949
SHA512469275af77e41e19615f1c22246a4b7e0afd690f4cfa6971997560287574ff1074ab432536a1e7929d0c62a512da132cd06661f0d11eacd2be91d1a9cdaa64c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a9329bbf494d54e65a1e76205438477
SHA1be2045a863ebda28b62dad5e7b3ff6b30f4fda33
SHA25653af7cc2d97cf1521da611c2f94e46dfc0a1e159190027bf0b278bea30124bd8
SHA5124c407645c6d67f180aeb1c5b50ee967e8af1c665255626f09313ec820a601bd804206fb3297617a4fa973523bc5596f192d119ca85471fcfd9edb5e42c1aa79c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b