Analysis
-
max time kernel
122s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 01:17
Static task
static1
Behavioral task
behavioral1
Sample
df3bb145951fb73ef768b2c360b190a2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df3bb145951fb73ef768b2c360b190a2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
df3bb145951fb73ef768b2c360b190a2_JaffaCakes118.html
-
Size
23KB
-
MD5
df3bb145951fb73ef768b2c360b190a2
-
SHA1
075f5ed0e7f36effae0ed717c8c65472aff529fd
-
SHA256
16b693e72bbc5f9a105c369b73c728a0595fa1b439c8fc644b87c49d21065fd2
-
SHA512
1a03fa35d13981d47270621eaacb7fb9015972578435ad035c94c2fd0b88e475bc4233324b068858b5e1d2e0dab7c47d606533779a09b0e1fcfd6c8fc79bc86e
-
SSDEEP
384:OzXZ0wX9uOBiZEh58+J4JBJtLlVkYe3L68zHdq+aXQyhyG65cgFPHR:wXZgOBiZEDiPkT3eyaXfoG6515
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000830b725430cae41391500498231ce8285d075a3e0881d3b99ba0d42819e9c052000000000e800000000200002000000043c482173fa266293cd88b84180ded2743ec7f158684cb7773fc835ae82cef5e2000000022e7a3a94c48f0c9e33910cb462b15117f7e778912cd3461f91ab7dd9816f06f40000000ff999f8a435a9cc223e9e9936e836003e61ab97d1a52f8fcce13957476b9030eae627d84ad2d9bca7b1d049f13a3ff21f6fdd594e74ebd672be7b78da33e9a26 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432438511" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 401b68ed4306db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000037f600c272a91d75b29d29bfc8970b20e142e570e8937f0634477cc82c926e5c000000000e80000000020000200000009fc21518a6b4b7ebab84f953be729ed16ac0fcff1b9dbd5d816af1645498090d90000000ae101f13aab9bf894f3b33a9b830d4ed90456a961fce022bc54fb8f0adef645d3b2534b5e9b0a35544c4193b586928cc14ca8d465090b61b7e6a08090ca16c874913cfa98d36d8c1fb971c113c90e390ae3c6071a1103583499d01b684b171927bc9dd5a82a76c2d2580f682f5d9e5c684c0206cb81aa51f03b939fbbb947cff2d1aab6dd15646a39bd0e9886c4a53554000000092546aab627691cca7d471f9574c9a4f8608d59b561677df45a1b651891f492228d8bd818ef65b7eb6fbbac8e7e4907182ca9c1f2e5a477be292645a322c315d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1806A0B1-7237-11EF-9319-62CAC36041A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2992 iexplore.exe 2992 iexplore.exe 1392 IEXPLORE.EXE 1392 IEXPLORE.EXE 1392 IEXPLORE.EXE 1392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2992 wrote to memory of 1392 2992 iexplore.exe 30 PID 2992 wrote to memory of 1392 2992 iexplore.exe 30 PID 2992 wrote to memory of 1392 2992 iexplore.exe 30 PID 2992 wrote to memory of 1392 2992 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\df3bb145951fb73ef768b2c360b190a2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2992 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7669a97ad0b91af63d15e4952eb278b
SHA182c06033ba1e0e07a5c0bb2e1b01e83115dd9831
SHA25671ceda17e42c7449d92a4fa58d155c1a911b2d79845d6f377338c04de0d5a4ae
SHA512b9f5a3ec953712feb4f49e7305a25f0391efff68101fac8d501f43f954bf5db6bde3413f3df2808b02e5ea0dfe306c9aba46ac40212d4936cd1824a9bee42552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584022656ef3d181e9d86a6446df9f064
SHA1f769ea15e278358690ccfe227dfd543161a43a8a
SHA2561ab50ec3c00b5b17be4031bf141b34e223df70f24250a5018e1e9624efcae8ec
SHA512e6e2f80de47fb31508f10d3ba6ac46125b3f72101041f8cebe68da5206340bc8f99a5d945aedbeadb5e3b54f3e73cb8cf0f31be46a605db00bdf3f5ff1ad8962
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dbcfa61943d7b9628fb41381bbbdf11
SHA10011351a9318f2debf893a7de1deef6ae7375fd5
SHA256434ed703bdc72349d3357fd556d0b7e967228dee3babf2b79e73c0e1576d162d
SHA512ca6b36effa65439f1ce51bec5494dc002513824e40bf7a422cab1e214e047b19ff7ff2561706d678184f9b179fdd4c871277c2df5c156525969d192d75bbaba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5266ee3741af75c1b9b505381d7778d92
SHA13197772500653afe69a2b4a63fcadd4176e83d3f
SHA256fcd821e49469a295d2f549c574e0e3f8e6ae13e6a6f8fe566a4c7b118198e4e2
SHA512f7b7a519f3512766bbbcd81051f8e5fdb2659017f91ee023269e645e8e964182bb368986bf34945d582fd3fdf18a9f41599d64c37015a64b754a585123b420a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5569b4819ac41e33635a240880fe40122
SHA16ebe4a257b8066ec32dfc2a3927b9e0a2b38c822
SHA2567135a71541c3c71dfc94830042a95d08676dee28ebcd9ef0b91aab1c88ba51ac
SHA5125fe87e0cf1450a10dadc52af449381f1d7ad7411ac6692bb24149ad4a46f68a674f02643bc7cb1209d262c42ab715d7ad74fa7f95201486ece4711afe59d59a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d3ef2b4b03ae62064ba9096b8b34e67
SHA1173a721fb2ff9a34c7b5bde5c8129448997e7232
SHA256f98d65f6efbae637eb221f6e43ce46ba22697b904aa938bed7535f3a16d41ce2
SHA512027044bf7c46b9996e42eb9d0d0e94c103834be4f2d34cf030334502e95715f0b90a83de630d589c51cbd95f02da93305e43fe68ec7a346e0c195ff6b5dff9bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524b3d7ac4d5154664adb20bc12ab69a8
SHA1c19c820f17c1082e353648a52ec22ee257458622
SHA256bd895d93f607a6762b90d7201661674055f35334d5e33864c6051413fc54a91d
SHA512a32a452efe41b85a9bc34be134005939f0f9c3b455222140d57d9dc340b6562203458bdf2c392b1aca89fdaee60cd6a04d588c82f0ee8153915eea3dc401bb0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fc6ad9619f98f3f20b0fc8e72e7903d
SHA1b7431a6841958db950e274150c0ae500912f5598
SHA256d8295fc9b708ccb1cdc54dc7ac207c2c916356e8d3d832d13676a9354fe14774
SHA512402fd19ba5eb2aaf73a3838702260735d49040622718ce269c512bb83048ff2bc1a060cfe44f5554327ac18bf3eeed4a18afc7baae9252427679e34dcc7be6e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576faaaffb291ef693b6a966ccd27714d
SHA18fa156395fb00b2ca2924ddea9b4a3ba191b723d
SHA2564ce80d6bfc9f78cd52e638a5f0a3e8a3b69afe48ba47263f0ec75f251d2869d7
SHA51223a0f40d6da0320feaa6fc0f90a98a4597e75f9ad318baa259abdc4a53d03b72e780d0d0975cf2433122d18966b8b610e06e27f4f455ca94b9c67aa2235df573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597af911e8978cad7fb425e97031ee0b8
SHA14c75b0a09042adb75f5f61523985671b6d0d1bcd
SHA2564d7fd29fad92e74c574895a26410b1d8aa10a67c0c0ce99326f16177785ba34a
SHA512e80d546113c4b2006b10ad47f44354556273ce6ca9c8156dee25afd09c8f57c1c6e27da3b6d86fbab79f3f2784bdb578a7cd5e444440d4579e2c3c5c37072760
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5171f007bee811ef43af9436e96538e4f
SHA17ed4f02fec48d640faa9e45bfb1d150693e1f2bc
SHA25648224a47d520eb160df5a58d18f2743f45aec1cdfef28fcf66281155fd9098c7
SHA51210014c15814fb2c1c61ee27abdce70067eb314cfd8e435ce5a780c4097145073f5b838dd1f4726a9c8fce44c8f3107f608c518a703ca3d530c6d81b884a7e2af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54868ff23d895f88011be99cc5351a39e
SHA15b8e62dc5640efb90ca9556fa5066004a9ac1ee2
SHA256b5f1b14bb157dc735d32ba0833574e7aa5c09962f1df72647e67847df53268a8
SHA51206d564d14704687b4f950d37fa1b8ab90a17fa8553a28d964d5ac84d846251b6888d1729176de733ec24588f1960cf711de7e2e23e4731434eb938c015557e0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5318c5dc229acfe42e10db39d60e36810
SHA163492015a0f1d3bea084c7ff0de02835285b33f2
SHA25618150c80c115c82d01af04076d2059cc8632bab2784edda34d31ed8a6f95acba
SHA512ae8cbdd1be3a4605fd62d7c1bd0e85274ad4a37057afd5f680398ecbb93b3e5645f860d835c4c743b887ba00609180235bc248158a79ac7076b062f2996bf3f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52baa8f986b908688c16f692ed7201951
SHA1d922a0456969a83be60d0fe7ff1faa4294cd2fe3
SHA2561ee316af20b5895654c40152c85870a9905f10d4a06689b743115a733d72c55d
SHA512326ce00d8971f1aa2b553ba37d8c0b644b2b5da84ee9f42b21eaa26a5aa20b6e8248192e6c1e26d51de5d6de85de00b622ac1aef9c03455177fb50eb86a9170b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ab73abd703474223098b2d0b7cba08b
SHA116666dd6326bb681da521ca40389df896fdd39c8
SHA25601439e886c7974d88c935ceca296b4ba6c63e0d4e7cf3dcac0863fa3af7fe858
SHA512963f3bb31558ee72cfbc58990fe66f1c901ba3353c6dc4bd7b039cb8dfa6426b9ad94a1d00ef86c2d26db57eaf9690816d702a89b2227687c44751b814f89ede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f8f6b5d3b66e092c37228c457cefa97
SHA1d652cd8c8510992d2a45cd1afbd796e3fa34e4d2
SHA2568cf509aab54ae92e508c7f46fb1495ea923f9549535df0c6d270b80947d3a594
SHA5123a211b9bb6e7937f9138e1f080b7ec9f386dd391f876978a0472ee47491197fb9e1cd44c37ace8da579fefa6330d0deca4b4fb74225ab71c02f46f38369817d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b6d03de9b4adcdaaf3502cc5ee026e6
SHA19a851b6ee261d4e9ac40143b9ca00926ff6e3d8a
SHA256be4ba53302c894d2f85c91645247a530899572d830079e3045374f8b7de3e1e6
SHA5124da7f02444f3a3ac2b543bafef0b21d679ca97564fbe2ea859dd27cf1e9744eb9ec5280b97f85ea82f669f5c6f9d279fc8aba2461e3e65dadb95da3a0b65d136
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57793bedf244e9fb9dc13679a8266a661
SHA1dd63733cef760cf7b8b0317a5a85c86d7ed9cb47
SHA25661c512b0f8ff3a056bc37bcb0c8504a95d15fa1d234a6010c5047ad37667424c
SHA5121ff270b6a89a26031b388881394dc84afd2fdfe14a3120a99656799db504ede7f1da09568c8d5513ae912b77b7020d1f180dbb43b9df9061da8627e391d5b61a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b