Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14-08-2024 14:28
Static task
static1
Behavioral task
behavioral1
Sample
9678c3852b621661281502a1bc143903_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9678c3852b621661281502a1bc143903_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
9678c3852b621661281502a1bc143903_JaffaCakes118.html
-
Size
4KB
-
MD5
9678c3852b621661281502a1bc143903
-
SHA1
ed35cbb4bea2ac139af860ad283dc528d5d9f61e
-
SHA256
59b89695df7c52a6b6cb7ffbfedac1dc97494a0a08ac9ef44fe932952f11cb70
-
SHA512
69f1451295a829ad3f3f7e823cd2d6dd20f2d747f917469896686cbad0c7471dc2a931405e5c7f20f9ce32689963f84af38a5e5cdfdd2d5f32816b22a95bfc49
-
SSDEEP
96:G8I+ZjXd5skSb4c3ccVzAJxGLJG61JMRdwn+cQ+fPSjiOKBD1kCJ2qCf:rEkSMkcmzAOM616yrQqhOKRTA
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c087e54c56eeda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{82B170D1-5A49-11EF-8920-7AF2B84EB3D8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000346229798926e05172f2eb5355b22c146860f3f784ba76482d9f7701f8581e68000000000e8000000002000020000000802b45a48cfb67e4bf495e71f13cf54f2aac97835a8bccb1ecfc36f2c1d5e4662000000028dba21263bd32ccfe6816d81cb146656296ff984befe5d6db37df3aec2120ff4000000008d0c4f9887d700ac40f4f6aefb8bd1c635f5264eda1a5976b7ff93d81fc5edfc2fdd0002b8e8f470ac2e2c5857dfd51c6ddc662af14699364d2c83399342e3b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429807592" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000dc5c52e3195049a0cf7e9172fdf92ad3cea38532e48bb35f47e9484fab939e45000000000e8000000002000020000000b5733b765860354cb0a9b3258a24ecef4f4a6846d43922697e3f942471af6f58900000008baa51d8d985ebe2f5c68f59446ed916520a88c26adbd3e8e6d9a76542ac98f95b00091d232f9931c4a8a17d218b7eefab752e819ee6fd0065a7265694ff6839925fdbb7ca7681a37405638e6adb8feea666737e44ac3611322fb66871f3de019bc036685610e5b494594d35c4e14dbffe8c686e27eaa3abf9ce3147810c9529c476138ed1208458ae6fd289d00620bb400000000e36483a4762b2166d925985d788aec0491f11ebb24fcac17db286992f6caf7b5e539f9b0d02edffb706860018d2d4572a126e9f20a8bfb04ee76658d80e593b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2692 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2692 iexplore.exe 2692 iexplore.exe 1992 IEXPLORE.EXE 1992 IEXPLORE.EXE 1992 IEXPLORE.EXE 1992 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2692 wrote to memory of 1992 2692 iexplore.exe 30 PID 2692 wrote to memory of 1992 2692 iexplore.exe 30 PID 2692 wrote to memory of 1992 2692 iexplore.exe 30 PID 2692 wrote to memory of 1992 2692 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9678c3852b621661281502a1bc143903_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2692 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd96d334c0be7055a387fdf257c30eb1
SHA108c83101dc13d5f45fe09f83c15c26872f6560c8
SHA25690a84b259e571606c5fafd1c11fabe620ef267ae3b95937a0f46217c756fa575
SHA5122d98e0432f5618b57eaab1be96a4b55061c9f3cf6934d55db52b097b82e50d384dadd2b037e4868dde9c83ceb2323fad13430e6c3abd9c872c1bdf710b9f31d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552478c97432481591a4f29d03d338e02
SHA1d1753d75d38dd98cd6c38f1eca57232b42ea492c
SHA256c809273c1dd5a6fa3e643941df846458a5e0356ff6cf4ba2c141a769915f8098
SHA51258130e89649f07479744f7deb3a152037b76c66eb77795a5fe217258a42cf3afd4f82b9518f94eb1e9d9c07359bbdf80d6ccf3b203ebd5fc51dbabd10b6c40eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d80c07b3b699ffece2ad449489a58576
SHA1ea3dd7032d11a7a6058a4eaaeac4bdb9d4e172b4
SHA256f2458d0bb6ec801a7b7c160abb60410937a20c742356cea0fcfe36d801a05584
SHA5124e3a1f161dadb9a94a9d6012ca565004e0717b1982067c7d575914f5aaced6586186fa2f29ab8cfb8caa8862f2eec98e26d8324c1e51525558b6cdd6eb00cb5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5363e3c532a93228ea7476edf7c986f60
SHA13ee8c48b01d2d01304123a824b277e6d96bc198d
SHA256f63feb24b11c438bee7763c62917019fd99ec38f53b1428ab2f220f2e1de2643
SHA512ce4c12bf3a9f51dd6b4462d9e3b5a95e8236d5c9459e9ff0afe56e48e95d18b74981820e7db15574d265e3513106d6f773917cdba1ecbe1d3237603ffc1aff06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57295c2b796b016885216b20dd5f1ce4e
SHA1da7b204341221512e6d1d882c1b749ca05e213e3
SHA256e8347c3e7f921cf00244345ad02ddebb71e930c23884768091eb7f1f855b439c
SHA512b6b834ba4db66b8bf10b64f11cb81f2dc6ba179ffb797836ca57c65ba32d1b49767720ba6b986bd55e3feed305524358b21225e7205efa217ffc736b865b78ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573f2ddd7451d4f7365a2b4af3836c5af
SHA1746e47f7c9f8985402cb59f1ba75d02bd0d88114
SHA2568bd3a3a595c12dd9c1d40d7ea6fb5af0d6377e428e40e404ac8e390995e803b9
SHA51217ad000a1bca6525eac03bfa358aa1e3716da9fcc154e4ce7f3b62abd4858d904347b0e1ffea767f65fb7fc8c24e0c705250427be44d42fdee53fd153d7fe105
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598233922d2290b332f6ad5dfb2695baa
SHA19d215bb8342d30586aafff030c7ee9093344114d
SHA256be0d31b1dc3153e14ce408271a840cf8184b4091f82e158e0330f46e4bfcc9ac
SHA51226e82002b02bc73e83f131cd1a3fd61464c40858c7bb6e45382f6d811b273d1bbeb04f14be46c5fa500d504e11adb0aa7aae9015eda51f3190410e06f15b24f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8b85263a96bda1b3c001b75d3436df2
SHA11c061d7650a7bc1defe8fabf91d09232f5533a9a
SHA256bab8eafa488623464f3ef80fd03e87fe43f0f030b40f25ce2f52daa7b4966cc2
SHA5126cf1015685de9559c42b7920a34633f93ca0672c25b96da516ab3c3ec28b055bcf6cc2699458ee754cd79c7e376cb7c902a5a99e741f1ead94da0f98e94918a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556bab47e5b764bccfe0a0855798a1ce2
SHA1ec413388b3550cf87342893095593fb85c92db35
SHA256f297a91e75db6fe6cb20a701a3e410b4643acd44f06d012a39f9c4eb328a436f
SHA512957e118c58f2328ba9a57f99284d396e5c2656b580473ee9928fed82843aa20e484908c605851bc5bfe363e9dc6adcd50d902ce2df836d0a6c8d1946f4fd83d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e99e1cc444c95c72dfee9cc48f05c71
SHA1c3909e3e98121d7697da12153317248fe12677c5
SHA256981f1b46bad682296203203e44bd34fa0606b00fb9d4182c794865063ae324b1
SHA512a83cbac51fa09b8feb51114c6599b432052c6d057e339419d8a7cb335d00fb4673a664ebd6d56008b678f2bdc24ea16069cf4a5ecc8ef4f7e73d4649ff2a6c8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9a7d8224f287a05951b9e5f661bd6bc
SHA14179d0f04f11c549d0cbab330502e3606a8a6920
SHA256573b427fc9da8e5ea5beb42fd91f341d777b9467373ecddaa610613a40fb4952
SHA5122ec97645f112b8a3a85153e7e4ba81a600aa07962c84fa796a9cbfa44bf79d34decc920af56d84177923769c9067b69fe0cdc60a88e461f51138bcafbf2af47b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585e1d82243976e364fb65fa5f3dee854
SHA1b6acd8e0776cf5427b2c265ba300a27eafe6baf9
SHA2562f5d5f8283ec335af78b2d7591c901b61028f925711c72e324dc82ba8a9a2c69
SHA512bac3652eb50086e62f5c37b9797ff3938702dff8bc8d0b5156b6afdcc18810284e0584a6d6eff9d147e44686ce487b1c5c2b96083d3e1e17d9a29786ad153a96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc8b5806a7931e07888d9c20ee2ecdc1
SHA175901599962927f5082a0349d359d66133dd0156
SHA256e0c5d8ed86b800d1f4ed877a3dd46504bcd47aa54e11da23e26a1ed6ceec61ae
SHA5125765bf2ab9bcdc93f643bc6a323db0e61f9883567c883979fa82d869795b54985ac1ff8c8aca4b0bf7a9a13e7643653ceba4e43b8f0120d03eac2c8b8a329a08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff4434949a8152f9acddc5803980d56d
SHA171ac464ec238464aa9e01281e6b81ebd32c41cc1
SHA256a1b16ffd9ba5984b4aef6ba5494050a068f3226dbded024bf53caf8b31c8ccab
SHA512f06d3080d948c8bbba7b7d2d8a81c10f3a3c6f31ad9badc19887311df53fe2560191f9f064f76eb11699037676cc8bf2fa3eb38ae783b4006495341a443f78f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569bdc7fe7c79e453ae182887303f1e82
SHA146cdeecc8729b436f98a1e6a855796e8b0399fbd
SHA2560d34ca5d45c43582a68643bfe936392724d955474dc62c5da5d6439349f143f1
SHA5124d76f2b55b0feae220cf865f68bf6311f6dfedd8b2469fd0619411c4a4d0c21dbaa106e7d2b2ec494e7f0b7c5ea48fb117f50635bf92053ddde3ad7cf713a3d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584f262bbcb019903c17b37e96bd99683
SHA1067c1e6218d9a56e55350f38e3749c7cbb65183c
SHA2567c23dc9039bc03b2b7782a924bd58ea67e0a62cec9717d1a62664e527d452f9a
SHA5126caf8a32c78148183146deeb3eebf7d114a546abe3a447fd898b0d1b0a9a2f52820e7b754aa57f93ca47e7be3437eb9fef32e38e284b6502dd89d74e64c26212
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5267f4ebc41b3dfaca7952ff5cc98c266
SHA10fc7cc16741d31e62b37029d9c451b4dda660b26
SHA256bd00e584e2d48ddce9b5004cdd467ff6cb1add223c97c18ab79daa8d54ef130c
SHA512c8b6e4b8c5ff3235732be0caf758ff84020aecee24097cc2f020c120ea0b9dcb9c8d87dcb3f3c5f0164af75cacbb5e03f7da3d8041d3c3137ca95bba8edfacf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5690133f8bbf651e7179f7c0d64756d9c
SHA10de99e5e454b3bf09bdcf5199e99432d60f7f415
SHA256c1741d560d8a0cbb08a26db70216a8220268dccf62bcdb7663dfbffa68b18037
SHA5127aecf14b5e97e86b673112290569c7883cd6833f636d0470f135abf8ec6c6e21eea037447becc434511506e529c039f98e0507f4f50b11313bc7d9093cdf5b7d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b