Analysis
-
max time kernel
120s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 11:49
Static task
static1
Behavioral task
behavioral1
Sample
de44ba41ae197791ec7c37a7001a1321_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de44ba41ae197791ec7c37a7001a1321_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
de44ba41ae197791ec7c37a7001a1321_JaffaCakes118.html
-
Size
28KB
-
MD5
de44ba41ae197791ec7c37a7001a1321
-
SHA1
deb9efa14927cb8a94104447973ebbfc93d05e95
-
SHA256
ccc0508216c8f2c09d710c32978ddbb29024a9c617ced7134fa153e736cfe49b
-
SHA512
5221a83d0da2c605e0f6c6f98998fda432d1ba5a9b54abdc6dacda215b1789e9a4e9018fc39554a4b11de135bb31df4e2b763054c0fba96e957856a673763ec0
-
SSDEEP
192:uwfAb5nM/SmnQjxn5Q/KnQiexNnunQOkEntawnQTbnBnQ9eN1m66DpOWZQl7MBRc:4Q/kAPEpOnSa
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b09d061ed305db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432390060" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{47BF7641-71C6-11EF-87E3-523A95B0E536} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000007aa852f0b1b3158555136579366f0aba49e14dd2cf126c8a24adf7754842023f000000000e8000000002000020000000520d44863868a444c2cf354310c9a4c44e4140a7a80c0abd73c81b6c87068af12000000064cfa1f62b742b187116f811bd7026025b05917335f582545ef0fae609e555a84000000044ee1146a7268d3d415a70556da1766335413d76f992e808293b391e777b73b7ac664772aac25d98f5cef1b4ffd7697ef95da7e29a50bf816271883718230269 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2008 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1812 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1812 iexplore.exe 1812 iexplore.exe 2008 IEXPLORE.EXE 2008 IEXPLORE.EXE 2008 IEXPLORE.EXE 2008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1812 wrote to memory of 2008 1812 iexplore.exe 30 PID 1812 wrote to memory of 2008 1812 iexplore.exe 30 PID 1812 wrote to memory of 2008 1812 iexplore.exe 30 PID 1812 wrote to memory of 2008 1812 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\de44ba41ae197791ec7c37a7001a1321_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1812 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cac706d82ee1f7808d658c388c9b727c
SHA1a4132d8c4d0d514c9754ea384d7e3dae668ac1dd
SHA2566c38aba48b6884d86c4e62203bf3077ab9c135a0fd223f40a16cb69ab8ca5367
SHA51266e48c72fe2a704acd5f255ac2f89cd4fbbd239e13c415df412ef524e2ce1ce5e80a8e94335d6362733296cb200e0ba90cabff26fdc2d8793ba7c5536d538798
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3a73778cbc33526844a5c0026b54a07
SHA15e70eeb39292966981d5cdccc5a379a475cd95c6
SHA256bf661793caf2da4580a73ed7d04c37f2f4802334191ebfa6c22112896523ca4a
SHA5120e8ba6cb65873ada84849eb72bb29cbd541e1ece9f3e62af68fbe1a4869643d7c750de2389619f038819db56da72ecb47f69cba3377e82c74f37783cf8bb0dea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51840a2cbb8ba391a62f18c5f3349f2cc
SHA1d664872f12ac446c5bb97fc5557ec011aa3f92a6
SHA256c7235371b51185abc7a760db0f55d9aa02099bd8b19a9303d37d1fcaeeb3ca72
SHA512b4a3e1ee43ad3c1533d515724f6536d358b496386bda86b1954bf52009062b5646de9157d13530d91bdcf78142d5812590dd05f334beff6f653eb98ebd8326a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58faa7dbb83a02310615ef7137a4e5a4d
SHA1fdba608987472172d40194157ff2ea98c8a6b355
SHA25683a1c691fa2c34b8bda7b3671e3930ddea97f44e6bae0f2cd93017efce68c74b
SHA5123644908cd5d1c78c2cd7513436b3cf5d6100ed018a6dd0492bb6df93d527855cdedc2f82ea4792943245d5572989013bc26699d0d00e51724a76ba11382cbe32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58caa8eeccf156fd5b49842e9b3d1987e
SHA15429965a3c0560146116d7ef339af8d29628331f
SHA2564ba6161c2747380d37a00c9ec296b77b2ba9e98aa6b50e1ebb765c934af8ca7f
SHA512e6a153f9d5c691f96739f1dbee8fecfbb31f3a7db283d7118e45a39c037f8bc268219f50d644c8433f14e610bf8f174ff3f503661af288b7468337f4c7daa46d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509df6a8605fcf9b3c219d40e28f8b319
SHA117cfe863826e3d211ac196fbe5fc218fef12c9ae
SHA25649bd1ac64d5f1001bf3357e41f30e220b4b9ae9464551e13c1336afcbe3699cc
SHA51238b4716034e4aa5bb8a43afa1511b2f4b00900c57a0d6c8429799a36f680e4c7938fd471beb8feef68a9d4925e17d3dccb19cb7132983fcfa6b4115b2321cc3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554987f1172e52d26e23221d737a48f63
SHA1f35c282c408035184913d69a1e01f522592d8c2d
SHA2566f7ed8fc18259a74f353d6569c9f4441d3398f35166a53f9242f23a6c23a1654
SHA512418ad09419e7b3b975b573dd81ef379678137fd6a981e7bab00baf1a6fa7ffe15b4416621cd797ce679cff513a51c38b17cf154649f8650f826cd13f1e3d8310
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5684c33088895ffacd3d0bf0c12147dd0
SHA1978b95bc61b7ee4b95466c449f6c4add3b01d4a5
SHA25649981c91cdb07cb3c4df6c9db7caf3dbcf6235524a528c3e681089bd118de640
SHA512e373a6d18c40b36afac93223db1d8405d13bbcb022ceefcff0e616a9e54a99d4fa0c9c788c24c92abced8ad9c59d6792d5eedc1019eabf9c66436c7337d0a658
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5658ab5b0ed7d7b54796667923ca9d829
SHA10af1f49186e50584aa7568847fc9015ea67baa18
SHA2560e7636e49a83d6249911000bec50a376f283ee641bcab10e49992712bf295bdd
SHA5129bc82a6ea3e340ffa248d54b1184d2240207cd393319d95958851de9f2505de48a5bf005f2c63fddff58b5be0a9f5f52d2bede79b62715f22ff2ac5d3f5521ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d248de0630a42afe3fa1aefedca49c3
SHA11038db95ba90db10cc5dda1a8538a34fd2179a61
SHA2565596800a1f57ace5faec858b6b9f1f74c8d31cf77919337fc2baea0e9e01e62d
SHA512b9037405fb5f9fe669d57e2bf160cb43a3d4617e8737dbd9fe147d6b6ddfcc2e730885bd524ab30ac576971993f50870858d4d03b34679b022ed1bedee5f3640
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5920b2b6148c8617eb3f2f99befb81395
SHA11367aec02dd9f135f6858d81a619382536016a5e
SHA2564d4b3e761506a8c42611d0f30fd8498cd8ec94e2212b439826e12bf2f2b6aee2
SHA5128b51e948152d90127e5581ae87b5d8ac3e41d51c9f5955a04ddd872b8ce3d6ae1272351da496d773596ca66ff3447195cdebe688cb48bf697cb788bd89429e98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd358ccc73c1474810e9809c89e16819
SHA16a9c02223f36eedbbeb73c7c7cbad3e39a08f5b3
SHA25630221af33da2e0ea080c589d5967ef688b54bc0fe82061bc69034346e6e21c7c
SHA512f6a8e6c93548081d836792d99e4068e75b47cc9ecbd2905ed983b2ba2ddb0d591c8a63c185cdc692f31a31f89599b0885f13f6268591bd5c447e0e720731d4fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548d38cf0aadba32a78adb9b96285fd26
SHA1f9a39bb252cc703478ee28da0edb33137ebe2753
SHA256bebd94210722bc3bc8a653e4e8a2096946dc84ec1129c49c500611f2b78e8d53
SHA51267447149f8ba7f3dcbf81d09a2a5ed308fa975743d474210734d7309d97528e3f48eb66c3a6c3b5c11ecb333036fe649ad4a3d4fdd894c188e715425592f8b89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d84b247b9c1c5f64437572fa7ba62466
SHA1b07726b53c1f898f3552cdcc184238640d796cab
SHA256e51e372efbc69f50ea16db70bf881ee0fa003bdf301b27fb29cd9ab246b53c54
SHA512a2f0f952ec99677ecff2220247ad65677c254e93a755dda12e4358a25c0952b9be15157796669cd586b6ac3ef1cfe9ed154509cd64758c24e430493df6d900c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e3e4445ddfd501ffb23dbb5e9e22e53
SHA1ce7d7d0ff3e015ffaafcfebd02c945b79592aec1
SHA256ffea6c2a6083c78df4f016f08ea869069f092b5eb8ce58b5a21072e34379179b
SHA5129de3a26c9ac1ddf884d00db912e283a6f944f1ebe2c21dbab1a67b411b69a1f2cbc3163d8fb3b0de1bd27b7650a5d2ee7aae87f00d0d233ced4eeaea2d7fd3fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa856c9130872ca922daedab4b340eeb
SHA15bba6ef75b3a33b5e2bd2f682b1bb88e82cbfda1
SHA256751f489fa404da45622718cedd9d6421de0144ae638c2e420fc07d703e5c2a56
SHA51242f134d8b55a68d628a854101ea9219a73bdef27ce03f1dee01cd97da571f239adf6bce136f4e9d2e4c348a621ffa04c792fb8211220ff5cd6405616d187a86b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c5e7c991f388ce050c860e389f9f2e3
SHA1b4008acea9aa0b179e354f8714a347b3928fddc0
SHA2566d5703321557c74167bfd3277b9a27237ea6e2a7bb0aa98dbbe1a5d8cf35d140
SHA512611769ca5414a2eccf9e0d6be615538873606c5b6fb2e5c737e9e36482425eaa6b0580f9f6d41e9185abce20d9db807f903b0a59f18c279b1a1249bbbcfe8fb8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b