Analysis
-
max time kernel
138s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 13:24
Static task
static1
Behavioral task
behavioral1
Sample
de577c96951ac3785f7b9812b91d3b00_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de577c96951ac3785f7b9812b91d3b00_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
de577c96951ac3785f7b9812b91d3b00_JaffaCakes118.html
-
Size
153KB
-
MD5
de577c96951ac3785f7b9812b91d3b00
-
SHA1
c44cea3c0c4c65eabf0a75801043f4493497b7a1
-
SHA256
60646bcddf3ffc088921e102fa01f5e873fd49ebf6512397c94c519c77261300
-
SHA512
8391daaf4adfe5f53c7eb8d353552a75bf8375701b30c1b02bdbab6ac3296e9b5597c2754b8c9f268957bb1177ddf00278fb1ed6728c4542863b83f543b84f57
-
SSDEEP
3072:SFwZxW5IJhMoyfkMY+BES09JXAnyrZalI+YQ:SFwrOIIsMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a024708ae005db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432395720" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000b2639661112018cfeb9aa772812196d349dd66316796776a12db683c67876782000000000e8000000002000020000000d8750c593a1835303f0aca756100264690cc006aa69500ddb9e8d6f47ae339fa2000000073ccd8a5a531da82a53c92342afdbb9d3b630ca65d9b698399bf8c4b05cc1ba6400000005db5102d1e6cb7a4da0f09fc29336fc835d16e4120c192616140861dfc53e02458b45b05c6306ae9ae67aa5ebd54f543f15771e1fdaa3bb1b94093f4cc56fea4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{75ED1AB1-71D3-11EF-B6CD-7E918DD97D05} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2140 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2140 iexplore.exe 2140 iexplore.exe 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2736 2140 iexplore.exe 30 PID 2140 wrote to memory of 2736 2140 iexplore.exe 30 PID 2140 wrote to memory of 2736 2140 iexplore.exe 30 PID 2140 wrote to memory of 2736 2140 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\de577c96951ac3785f7b9812b91d3b00_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2140 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9c806e4a2ff7503e00e4e7be2fa20af
SHA16c7643e4f983b15884f0534d29bddd2c928076c5
SHA2568ea650771e7c744e28a26265b8c38add96bcdfbc7dac1c1175594eaa29f6f9d9
SHA512843c593e6cdd0cecc0be2b43d149860e755421822e59642d1e296f10d9f5a7d7bb579433a30f3efbee9d34074d98bb59cff812e67be276290b9d0a5f6de968c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504e2ff242166611a63fae0a8fca8df54
SHA1e3a66cb30d08222cd4e769029c6cbe5dd5dfd115
SHA2564558669622b61d00c0743f06aefeed09e50d0d7ab6a15d897f90ed045e395e0c
SHA5129744304deeb22f1da503939b539a9003c5dbf63028ff728f196a91ca6b0e82becf8646934c8832d4f9a8883b709470dba9b3a2db52ae4d451b32656d07c6a8fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d818380a6881defc416da49d219da95
SHA11342bccffd57df05dacc08f4d7d1668edbe98a73
SHA256343739711db17f0f32c21700a82809e36837adedda2c53d10c16b553ca27c687
SHA512db78d2b96a30e1c38d89745f3f2226ddec782339b607069a6bbdf740b94d6e6689d7b8f3f971390f438bf3fb1d42a49d79126c70ced49082bc65bec01ecc3a19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537bf2ff7d2325b4c6100299049614e93
SHA145da7c99c4b47e79e109ce9abd9a2ff485d22986
SHA256928dfbdc19a30a0a89fbbf715d5f2211e838ed76dc70291ae68dbc1500799fdc
SHA51212bcd1fdd62105b0c59775b4b0a769f072cac0cff14583d2bc31efa55ec66794682abac79a320bab76016d0fd37d1d83a8a2469c80f5bf59a3c532c91f362980
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5721baa158ff5638ebe783d495be8bc4d
SHA1460e150220fe23e560f2c2a56535b8ea39db31ec
SHA25621475140043ec6dfd1df03997f6af7df198e39e599eca9b1323d8f75481d7e41
SHA512b81e23acdded672c31741e99824530b6e5ca9daa597e97062e12c569930dca0d11965c3f9a17ca19ff161c6ee2a328f0a81e95ee26270ed6d064f3179d8a156e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5618fc72757fd0c33cec371e6f9e4a37b
SHA11589b90677b37a147e6f98f3f53b6c1bf3073177
SHA256cbf9c5b9876bee2944950a08c194c8469822125fbbe4aa741a87508c6c877a19
SHA5128a2b4fffa5a40e208ae8cf6679ddeac15cbee6f34a7e17f5f22f0223ac56080abbfb656439aec0e259e257f5a207e3d282680ff141ef49c605af7a34d1de658b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54805ddf59041df3a8506e402c36bffea
SHA1dbc31882209d6aeef62b425ff21a80daf1735c04
SHA25664f5522496996a490381462c5a406129ecbf921d83238bca68876213c7f2288a
SHA5124df800bbf5ad51484dc9c50bb1266f7de5658e12ff9dc0701123505059dbe11d8c3ac7e2e0f2a0402ada56f42801eedead4beccbf15018ae3af75800f1d2a498
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541f90bcf6091b314d5ca53dec8baeeb7
SHA14e5c57e8dbb3c9fe78dd6ad0cb038abe296d7fc9
SHA25678e49611dc002b79b192bc61dee4fd5f4be35070884628cfd2bf5e780fa925d5
SHA5122df4382c898d7fe6267e1d9fc8f7754d7e9b9b36a823d847a903c134bf8da4ec0d13fa644c359aeb32f69a413f182cbd588d436d4b3511639fcbfd6e4465aa55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562310c067037ed4fe164e2ae767e2396
SHA1da1df033276034e732b1014b4df7f177aab85b6a
SHA256ff14b725e37bb1241dd80fcab910334cbbba49c61d1c152be6e967f79d907325
SHA51252070328be69c33728dfd330a2acd610d6e547bfcf48f20b9f3a4c06b3905f8bca28e4745d2690a66bf91bc8373546f21a5c685cb4a4bba360a17aea85511e37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b01cd0c08c75aa8a4dca57c0c474715
SHA1b949478392c8da911e48c70f89715861936b07df
SHA2568732a8da2333d55cf500f8845c3a4a2c4da63ad6be42b3d1160e8fa062d1dd6d
SHA51224dd9a71dd3e9f1e47e991e9b654bba11b50707a14f0f491304fe3ef17e1fa9f27be4fcc333d64804b3caea36b8401846a8d7e2e1e8502e338cf749f1cd14958
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a744c7e92d64db5377d42d771aa3d715
SHA1403fd50c33d5178b00735384f954e067ba3db781
SHA256b233f8256597ee88a75220282a292e6df54ca3933b82922217b5ab0aa6307356
SHA51213e41bf8b5192d2bacad86f53d34ed33da9a51192f719fbb72b0b35388e0fa14d57c9d926899a13ac271dda9e61d1a3a9e070c5235d82b62f644c990b01e4f80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b63cd8206ed9bf38fb91c1aefd0c446c
SHA1c53bf475fcaf9cfa897d9d38f253c174e92e6dc7
SHA25649cb11a7812047acd9c667a0e1ef08fc8b3d5f6dbec24d88e82b742045cc68ad
SHA512ac5327c82941c46c85bdd92dbaac4f0b114167b1ea898af65e4a332fb9639915045e073bf79a221bdf79e3942a02dcd71eeeee246f41632a6989748485803bb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546f5cb022e363cf7d447e7fbdf7b8641
SHA12d3f46c3fdc8322a892c8aae8996109de1559293
SHA2563227317312bf6bada7cdf4a444e8ac3fe37c59776f89ea6c22bb454581d77092
SHA5121563834933a4c1869ad58151bc49902d562f1f2e741942c63dc16d8e4cc67bf05f09c19e0005756d8fe1c79ad9d775c8f1272f2c411d0c863377c17210fc37f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1e17fcd31a1296438c967a2b86f014e
SHA12a1844272b4c969963e81aa1e9e0def993b13d31
SHA2565fad7cf8f4b39ac183145bda2ea2c55ca3b9952305a76027fdf99499d2090a86
SHA512d04b795cfdae1801c057c91a4b425f9c199a3b643e1504ece3486ca9af6fc63b00769deaf1819d1ef45f9f50622620ee16be05d811e3a4d80bea73b498de1eff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5077b6b41930dc8931b679bc53d1056cd
SHA10549440395d042224015b07427b8a92b1be37700
SHA256bd6e5e85d8de08fc887e233daaf4443effa9de707582b12e11a50284eca3a715
SHA51206fa683e02746d3c11b71cafad70d943edd71ba9ddd1263425a8fe7f1eb43940f6fc2437fd5dee2351be3287eadf58f4279cbce157f0244c1c12a2b66d476bb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a12cba534e9f61a2bd04f6d5ba0aafe
SHA1be864832b27b7bc3a5ec72b6364b5a9bf14ac1da
SHA25665cf82d445011fdf47ff5d6d867c9f15544005488713d9a87b5fe1fe4c7c9fa5
SHA512ef8414decc7c365a6f9eac9660c080472cf0dfe10fa84727e3584d002a7090ae7b4762ada6d98c31341f6030d72a360cbe3fa31771085d2376fd9521aeff136a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519f47dbb68ddcbb9286197d941053d5f
SHA1af98d9c4531dace3b4786d857039fb42a5f0e482
SHA256dd9bd4027eeadf7d96f9c158de5a5a152455b92c9fe92dd03210fc246c30b3ce
SHA5125394081977541e1f3d1f5b399a4b66a9fda4fdc84293a44ccc4f16c1cb172bc4a64c22f520ad8a6d20f649cbf13c967cd526628aad96a823dc4ee73843f86a56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56eef16fc71db0584a17eab4aa0195893
SHA12e316baebce50a2468f33e0913b4c6f0f4ceaefc
SHA2561aac1248fc2bf36a0a0d38ff94df60fc61f3fdd8f84a8ba2e360bed6cb251949
SHA51273c295208bda0f1ea658e82f77b29e315a5ae265d94a17808f02cb4b2e63a6e8b438a090dc706a6177ff25047259d0a15cd6f836010af18b7dd0b324ce96e0f5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b