Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 08:59
Static task
static1
Behavioral task
behavioral1
Sample
de1a1080ab33f252e9c037b27989cd99_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de1a1080ab33f252e9c037b27989cd99_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
de1a1080ab33f252e9c037b27989cd99_JaffaCakes118.html
-
Size
9KB
-
MD5
de1a1080ab33f252e9c037b27989cd99
-
SHA1
6478502795ba8a53f1a8ee565d11ce37455f5ee3
-
SHA256
03ff2af81299e90ee89e381f66b2dc608e25194d36fabc0908e3283a476a4f36
-
SHA512
39a307030838149909fa14a6189f39a8036f8dc123acd8af639990f8e268343a2f912a514b89e8554d46ab45f4d5cc9170e6dbb2f304ef45fef33927ebc0492e
-
SSDEEP
96:uzVs+ux7qeLLY1k9o84d12ef7CSTUOGT/kPsdpUlVHcEZ7ru7f:csz7qeAYS/TmUPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f5420000000002000000000010660000000100002000000084cd8de2cb2ac049a848ae3aee916b1061f7fea68e73d6581a9eee8056719d86000000000e80000000020000200000004142fd6b936b79d86003736c87f1b428b4066c112020bce653e2fafca7763c4620000000ae6084391d58fbc6a5a338adecc1d59d776a067cc759dd20c3bb08d193ef1031400000005ac270666a90b5aed0b473d04e82cc283f0a150fa97e6d9bed102d39c597155fb385948bd5589724014ffcca43a5387a8712ffde1e2cfe8d680fe60802131f1b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e02af647bb05db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432379818" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{716C3DB1-71AE-11EF-8287-5EE01BAFE073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2668 iexplore.exe 2668 iexplore.exe 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2348 2668 iexplore.exe 31 PID 2668 wrote to memory of 2348 2668 iexplore.exe 31 PID 2668 wrote to memory of 2348 2668 iexplore.exe 31 PID 2668 wrote to memory of 2348 2668 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\de1a1080ab33f252e9c037b27989cd99_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f3899846ed52f17b3c85a3d416c3b1a
SHA168fb8735942f31a2bbf54d0506f4bc062514af24
SHA256a5f68c5c80a94038d3fd2ce65a791013a8a0617bd7d4644dd8ec93ea80167022
SHA51249ec9addbc03545bbae14b27c23079bbe88e29d3a5496c5033eaf12bb7bbe88bda6540cb4db2b7b45af030895b59b0346c7c16b93a68d6be6f93e9224f1e3e13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c031516e9474512c8ce89578d9d99c4e
SHA157ecb631584a964c086b95e36566f08e89ecfadd
SHA256a1ac360ee3b88a4748c2a6d1e4588adee06d31f561f96c6a22bb439173c61199
SHA5120666776b7550ea569a27a5d5c352efbf90dbaa857eca0d9f2b1f951078c61e4ce4d16772701be00a45726d96bdf88e82992341ce2c27d855e40f17b41e8db14e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595316490c9e20fd218cd7c6f6ee6b11b
SHA1b74cb174080971719182395c5285777be30baed1
SHA256fe47e866298c89da3540d1d899d9ae261426c20ba4a720465b05add278deb7e4
SHA5125bc76e57e95ed8a9e5402a311c159303e2643f880d8d8d533f27734b72c3dbadfdc518d6118c600935892e53264cdf8b5552f7d24a48fce98f8066162c7166f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e82f4e186f6040bf23e8e59bfca6cf7a
SHA1ef98b0304be5aaf3ed708be9f9c1d6433a398663
SHA25674378d98eee9d757164f715c189de74b7656078002a60ae88e311fc9a47d4129
SHA512407b4ad88f2332c40c63639193b308bd45f8d510e4c7b115484500cf45060ba302d9b025633b246f4449ee3bd1ba23605fa1c606d9159a8067b275cb51a32312
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d0a1f5f8dcc33971bf71f147c31f196
SHA14f664d5146126eb5d857600ee3becf894c6e4c26
SHA2562d1c4bafe1d9f5716061f8516a61278cc9f54956855d7dae7f974e81bde00f39
SHA51209dd690202750b8896c38f81830e843292fe411345e4cf5bd5172bb6afab79b1c3d3fc9f3434e70e2279f078222a412f94248975b6489e606cbfe2c535c4e14b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9ce6bdb20d3c40ac350be8c1d2a538e
SHA1357b4a95a3d1e0040a9c0cf9b19f506d62046331
SHA25634a4d78c5e78d53e6308372b0d2b823759d29d5feb2b4d1b173361a2992db7c4
SHA512121893610a997c222c0313ec18c9b77e95075fcfb0c06c022db207383541b846a5fcaa0d80fd85ba0f12633c341a239bb1ded626198508aa139d5d718c322775
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caa593e6872355b27d2738fa492f9fec
SHA10d3c04afa1c99e7d7a62e4f0781ffc56629eaa9e
SHA2567f1e81994e4a3cb8c0658026dec3605b40784e288fac58cab531cf900e9deca0
SHA5126e110ad31f3258c179db08f4c8195477248977f072b4de93633085345efe1e21a3abc26921b289a9ec1b9b4e29fb991836fa8c17f9bc9e0717fa7e508f43c3bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e0fd75eb68f66335d3db92763974c7f
SHA127f00cca7ec1d3172cc368f90c9759286f3dba22
SHA256bba398b55e58e057bc9cbd92beed7ce9ded4c02ab5f87cff6ce486e10ee127d8
SHA512902a58619b3c0ac9e384cef97551c41e30066726105bcdb1d981cfaada667148546730e0035dfe83cac2f54ad5351e61097ead2424853d0031fb46068fe8cd30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afdd1c5ed886d13aa778b6b55abbf503
SHA1f8d51b86972b965bc13535596d79923ae0a7bc75
SHA2562723ed468f58da77bd7fb07082fd62145bc540eece612495cff76b8d35c817ec
SHA512b99554294ea93504a35c0c52e469baa2670c029cf1c06ea4275fed7a2548cd983d7148957ee4e99d149676db0fc12793ecb32cfac918df9b74d8f8044f3744c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec3f306b93a80984556352574bd0e5a0
SHA1c8ea91e924451830f0f6291e2669f05a5f59d694
SHA2563820bcd86e62e0f4bf0ea7451a90865145830603de512d8b57748fbe14b21d42
SHA512a729a2334c69ed57983d4bb4d26f3c76a1b1d5a0c634dcc774b2c01071e24bdab38211982b4c50a3914b1f0667311089bc801ba1f5c667e2402cbda27a4fbf76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d30ab6eb1ad256558c7199888d4d0dc
SHA1fd731eeb767a91309df74f50687b7416621df0e2
SHA256afe46a12ee4d8f44599cc9936920abf59b8f72d9f3cfb364e1ff3b7ffd19c466
SHA51239a055d9972217716e4700aeb65a30d18dad52d23d11fd86d262feebc9d0cdc197a036e1e462b466e7723c5b26f6540873465ad1db68eb524b3c76abc67e5381
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e3757ee047ab7d99c6a9415a683d864
SHA1ee8bbc1b6fbb0e9d6e81b5cdad052bfe84038626
SHA256c8c28aee0dad2fa443bffae1d3fda111c67ec0f41c2774adf7670f5e5b0d5304
SHA5122249594b189977975a6041396ec5b7562612aee112acbd51a29e3d34863f16e25ec4fb4becce803f3f31fb5e702cbb3f806c47ab8fcd8475d80eb2e6eef4701e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c4fafe7bcff93a55b16502eda585a42
SHA1b943076606f69824f619396ff42533bece42df0d
SHA256da079196092047287c64c24f859bab698452634131a098824b84a14a55afc79b
SHA5123493c439d89f7add7deb9366d083887aa6fae60f370db2e44b129b841ed7c94b0b9ce2d75f5e68eabd39964c4771413f74e0aa55b065f0bcc1b986aee474dcb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530714295929b050cf9ee284ff1faf17c
SHA1e71275bae6efa1b07241efcffa8a41747c7e6732
SHA256624175a6d33df4f7f8889212e990a200de33dd51eb0477b27d6c89cb6e5ec7e0
SHA51274e856d5a779b32aa550bf9d097b0d76d005c3bc181c5ce7d89fa3f82da267768d324443742cc59daae76e4430be50e562b8ca567a2a26cecc13d6497981676c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6f261694d3951decf0840763e2e680a
SHA114c0e82feb5621a20081cff3e492d58daefab433
SHA2569368b4301fa8745a691c99c6cf40aceb22a5d28b8c4ac85bdf007f697240a6bc
SHA512425bc7690fbbf801d141ddee8952f471d1c88eb5beffa4879f30e3d9c2cb3339f4cdf0570ae27cbcd76c959da7177a8daa8a11a07cbec41bc3b13cfa74f03d78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7c3bbae5787297830b9cd91e88fed6d
SHA1a967c174cc7b2572ad0c429cceb0946d798d2ceb
SHA25664a6f79ca9c7c8ee043ee0b77133545fb56594cc48807e34aaadef29eba7b2f6
SHA5126a5dbbfe608ac25dafba218e074a1db83eb0dc084d6ae75bb65d713153d9d8818440dc0d3edcaefaa799b19b49b9637df22a5761aa649b6cefafe0917b585078
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521d021a00845d108241568c591a14bee
SHA1616cf2418ffc95318b276f9fa3ee1d999c2cbc69
SHA256406059920cbe7bd4c5bac36d53cc218c197fad188f7b309bcf736262963d5cbd
SHA5129bc0c267aa11dfab3962fa15412a21c5d40b489c0153e34ccdff0b5d93e0138776521f74a9f8431e7c499bdafec6d63a012bed1913629351918680f92b36f0f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ff741e01d6e2dbb8fb14565f5fdc5f6
SHA1055c89e06d890a4280c7b2caeebd83e6b409bba8
SHA25622e7de1199c1c6e2b2e2a0b956ab3fcdf40fbb2d6d63820bb23f7fa09b405c5b
SHA51228c70cc3a2c48555001311eaab097ff377e15433cf388eb0397e4ea2953090c053cc463726d7dc13a928c7936b61aa3028dd8a13d32f6ec5d93346c980ae279f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5499e954b991d4bad399b3f624fc47337
SHA1c05b0b21ef14b9b1dd9a3fa78fc6bec86d45b36e
SHA256aedfd99dcf5cb4f3ec809fa2e28c04780aaaf51944dc874c23fe695526aaf2f5
SHA512fd7d0974219a4ef662e50b9c139c170138f1ea1cc93426afc8861a65392b8c04d7d2c26c4d4aa4b32bc9028814783a1cdf866c15c8ca4421bd96e09e297d2613
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b