Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 04:32
Static task
static1
Behavioral task
behavioral1
Sample
adde19c639106aff56ec2bb79bbd2002_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
adde19c639106aff56ec2bb79bbd2002_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
adde19c639106aff56ec2bb79bbd2002_JaffaCakes118.html
-
Size
83KB
-
MD5
adde19c639106aff56ec2bb79bbd2002
-
SHA1
bd80e062c9682e1f8acc805de7cbfb9e847370c8
-
SHA256
64bde828ded38cfe0a37ad59216a5aad369559b1bef73ddd167eeeee8b31d1b0
-
SHA512
9b9554825a60dbb671ce1e6707cf37fc7e3e68bb4a1f5e768b164f7488b2dd90fe15665d6aeaa699c572cba1bc6410219fb734d95376902bf344d8e0b2ace912
-
SSDEEP
1536:/XqJ3ysYSCdfqphrwT3oLnVbrGQHJ5XzYIRpi127FuExZLhz1Nc+xC:/6JCsYSCCxSWVBXX8ExZLhz1NXC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c000000000200000000001066000000010000200000009fcd013a9ffc2884f30a04200408965e5a3cdd5fb26cad370aa74dbe6a9a3db7000000000e8000000002000020000000ed22a5dfa587678a1f5a4fb33bb000622487cdae54aa234dbcd5e94d6531ae51200000009c238adde6a7e3ff706587fe3ef65c300693e307b6e3fa809e8c3b680244bc6e40000000cf5a397d60a18b8d6bdbe5e958aba8c5a953a60208ad74b394e5c3e2869b8c4e2b0ae47bce2fa0b30d1644762c45eae8266f2f4d3e9ef283b5281a02cfbbbead iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3B801E61-5EAD-11EF-9225-4E18907FF899} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d097ef0fbaf2da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430290226" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2516 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2516 iexplore.exe 2516 iexplore.exe 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2376 2516 iexplore.exe 30 PID 2516 wrote to memory of 2376 2516 iexplore.exe 30 PID 2516 wrote to memory of 2376 2516 iexplore.exe 30 PID 2516 wrote to memory of 2376 2516 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\adde19c639106aff56ec2bb79bbd2002_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2516 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d25f7b6671a8ce1cc0614eb6ad5ff880
SHA151b8b83cca13f093962349c3685e12cab1c3b3f4
SHA256e8351a3635a41180961bfb1a4eced7a7a147aeb2026f92d157a575634fac0e3e
SHA512d58002cd5ee0e169d5b823b86a80fb2147bd766e54f8e265b6f372c2c83896ca781d01b9b370945c001ea9f1c198fd27e51ec2a4c88bd9135751e77ffee17d4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56532f2489ba6116e39ce0530026e3020
SHA11bf51babe5f8f2012a93c94f0b948107d1bf0f1c
SHA256ec0ba66164c27f0e83fa76d19aebca628a5dd8a8782730508b96c330ac753b11
SHA51223addabf155e9cedecde5dc15d78ef35eb3363c3652c8e1a29a871aca0adecec257465a7b76fe6ebd65318211ae5cb3bfe38749e70e872c79a94936f45cb9619
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f2ccd417c497dba7882f4233cf06dd44
SHA1e1a01e3cc126ec9d838af315da8911d73949e8cb
SHA25627a23bb1b2868e5f6ff2d1ae3f11ca6f171a0f064f2cac3129cbd855a097a415
SHA5120ef30736aae0056981548c8ee0a5e4e5fd6e0625f992dd4e93979238342969260588483ea02c4702652b434ed9885c9a6beb62a27810c093aa044a7b5f7e1a5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53894241efb91c1e45766b0d3ca874ab1
SHA1993ce63f37dda43d004a2314c5b012f68337d812
SHA2568700dd1d05dc16733dba578bf90a72d02613cd1524fbab9b4a70eac51d4ac89a
SHA512ff2866e0817a3a6520a9f4f2420227a33018995a0b6ec3654d8efeaa5773190e6a6606f1a24e57d625943638117b39a91c2ecf1e6f0d1ac102be4c7ad4932290
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54e021a60ce7ec0e791e8bd3d095a23e4
SHA18fc177c15a3adceb1f85f79e411b9ec103e04f5a
SHA2568abf228af391d60b056873de0c35be8349a3c9c7ed3f77baa22d91db4476c7a2
SHA512aa4c29948a0078a12e5d713f795382612f3c70586ea39c6133ec16e56f47624e93a8e406a4f823962f38250059d5598ab59c2e490a684b839725c5312e3f2a63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD529152a9590e0bb527a78f1d3897a3ca8
SHA16e6c30cb7aa2ee660adec343690a6ae556553fa8
SHA256350e17b62169c38214c04bf325308e7c7d9503350ddb41705af01dce3dc50a15
SHA512f353ba9b74c9165a39480f227d454215a15e46036d23c78e94a3e2a38334b051acc93352ceaff4e6fc57a0516c1b4e8a1936f53dc7dee8963952d7e016083443
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5164fbe7209057ed4b6e36025f3998cab
SHA16f4f1217b09ee72a26ff4494ab879a1c31a9ec1d
SHA256f3303a4b09de34c2db2840caf2a79d237a66359bed6d6e704fb2f4f9b7def0ae
SHA512f3ae170a37e346141ff1b6358aad4a637f2fb8001efa2df6e063f4d74cc8c65af8590371cbd98f7b642b45c33093407c021edc63bb8ab657b1ac5c3bd4fe16c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD562e007429ec5d3b2fbb091e92b866f85
SHA1bd289dc1aa19be64a003be6d591254a6d48a3c6d
SHA25629e8d7f1bac43daecd4d4a0499cbd14588f2d895c1504b87e3c8a632104e1ed2
SHA5123b54172acbfec1585d88cae95fc5235af4d3a1e3b62c36c9896d4aaa9e935e28b212329cc47b6df8c8df852e81051006dbab583281aab5839fcfec5bf88dc1b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD554235e2b0d5d1d64c2d22456d666b8df
SHA1c578afbce2b2e91f4be280cf01954f96b5f078bb
SHA256584e614155cbf0fbd9f55669318562f56b25142f1e29545507f724c4830eb735
SHA512fec365baef7bc66770440a352e8fbed8b995f7159f3065f62908d07150374952ef49a24f1cb5d6a9fe797dcc0eb1f9017b1103d2806f67f342b5dfdf324544b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53534de321a2f1ef426e233e895e304f6
SHA189d9695adad7b4c6a58aa1a126f3c4363ab3bc11
SHA25623b34e906ce01df3180f63bb9fd2dcd788db79d61d3927b695eb2461a52afda0
SHA512b30876016e5e26a2d365f06b752dd884b5f4eb02e2ae79d6d71d9fb6b73301720fa0b4a8f9ccd2b09942d5be3d0322efe6de5325d0ee979fb619c3c81d0f82d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5841ad2e117a26d226d77bab86daa50e6
SHA1fb75281a683effe860eb736b71d045ebf54f3956
SHA256273602a4db4b40ec53ed857992c76f584ebf211ef38fc23a8c0c3658d67c99ae
SHA512dcd8087593de88e525e7304eaa4ef9230a88f48682d1ae860f1c9e9c215e7d4f8af9ebc098e49ee9dba73952b962fcf5970d0d938badd79f79c11556c4e6ca93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5312e734acf3c8d809ee13318e72177c6
SHA18ee77f9085873fb2f5b18d899e53c62c16de1c90
SHA2569f5c0a78b67c2866367b4d85b7b10a84abe2f9838e602ad12f7afd83de19d306
SHA51276760d4081a9b1b9f7defb1387ee5015754d5f1b023a1728d8b3b78b907fb3b33d07e6853e016a371c7b6695165a64cd0319b896528be085e2a8649dc3ae9963
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ed1ac8d6036c9c2bdaba76abe89a639f
SHA1128ac2559d5e914e228bbe1912ed64c57b314392
SHA256577d0d3568cb275707a35089fcaf451d606d6e7122635e07a9a5bb37b0698b25
SHA512a420b1ef9e3a2dfcef55c7bbf35c62709378b5a950901a5f0a713624fae656129f0ee10f663c950de360af251298a37fde8fd7318696333a36ed75a1aa172e7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD547feba8968cb04657517c1b4a4a0eb89
SHA1c0e0c72a913505e7a8dc6bc30f843da3ce34e9ea
SHA2560df4947cd39d7b869e77ff8f4da206c86ffbd4f69e3ccec111c73325f885f50d
SHA51211e0c7646bb7f56f13cabb45e05a737d3e469d4c7c84a60bf5a59a0ae0fd5e6742a61b47f338ff11a26e94dd1dd2cde2153d66e9aa48726e6c2058db42b22f9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b457af83d8becf60acca872d82de4804
SHA1a934c02cbff99de23638ef452f12f8ef80b56bd4
SHA256310ccd3a175ab6e06b73a7c1cb3b32484f7ab7e33677b0f60630819b0a0e0970
SHA5123b70036671dae8037fc802a1c9f9a8d046cfbc9c4563b348cb5589315d5ec55a0cd24aa72a6b559031252c911d15987295ae12da103ac73023e9ca7abdf91630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5715e3cf8105f58f96170f6db264880ec
SHA15523e7bbe08974fe9bb975f1d1c53cd4edaed815
SHA2563a6836f2645c2ef3f376b5130abab8a239043633bf552c36fbdf9aaa026d65b8
SHA5124518f790f85b4d2d76be3ba933b5f699f08c698b209d87b8b754eb39ff57e5da2ce65c428aadf7fdb6d060b61fd99baf1c9a898fefd8440624bc86ad023c354e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD571c3694d0dfd7b7a583f693d0c0bdb51
SHA13dcbae76aed257f276af6b1ff10fd43a5198ac71
SHA2562c115805926c77d58e92485c6ca9e0298ccc47d3a931d9ff7f6257a2558bf8bb
SHA5129c2230c5e37c3b461f015b69ac48bc5a29539d886088de3a44dec5b0226ba212cb3c0f31652337b02cefed96661eb8c7d6d6c2b2af3455ac670420365dbdd10c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD505fd18291e8dde123641f28b80a3d1ad
SHA196bfc72305ae0d27b2b967f3f300b3f84ba27456
SHA2567abede9b1e008046b0c267fc21e1b960dec37056adc1bd04cb3f3d5472dba8ab
SHA512358a4df4cd4edddf9531370d10099ca756163bc10adc44c7753f0af49c83a68b5fc0ba5334881d62dc2bac174ec9cd45b4ba903469fea38de6c3e2f7e52fea54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55245bbd174e043514a33f0b3673517e3
SHA1763326f6ef27eaa0508b77a46f102d40d7810491
SHA256e7dcafcfb9477a37fb8642fb5a6f6253a42d66e6cf78008a22908a200a31094d
SHA512d9dc1e28e95672bac6eff2ca2159db29f0f271fb069add2441af8a8f59f03227e6a1c266d254c6f63501a93107287f125fd900d9b8241eedc8ca20fae80bfd3f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b