Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 01:52
Static task
static1
Behavioral task
behavioral1
Sample
df4715a5bf6894bc5de8e9e30a0ebc2f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df4715a5bf6894bc5de8e9e30a0ebc2f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
df4715a5bf6894bc5de8e9e30a0ebc2f_JaffaCakes118.html
-
Size
26KB
-
MD5
df4715a5bf6894bc5de8e9e30a0ebc2f
-
SHA1
e4a665f540e7ccbb1fc73a0f65c38c54eea4ddce
-
SHA256
f2b87fcde4c5935607985384ab06e1c9b506b2eea61f014bbfc5c8bedbf78d32
-
SHA512
c1ae8a2ef57904919266cadf43f5b371fbaaa680a89e85da683c110534210f19055801495efc5dff8d52b9d2165eb2144b6f433ad1cb20958f86fca64ec7381e
-
SSDEEP
192:uqpH/hb5nGqf2nQjxn5Q/enQiedNn2DMnQOkEntWEnQTbnhnQ9CJVevo7NtcFo+X:nh3Q/YD4ygc7nXW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000000d564bed15e742adfdf5690b8f5075d37fc01331a7914ed60d242b81c0366ebe000000000e8000000002000020000000f54ebd7547533d95c5c5067a8333513975903ccf85f45d29e84cf41a2ed4f9b02000000058961ccfbfa387708038e588f0d741537b8e1824d85685139633eee8a3c6e6a14000000028c88c7124d3ec4eb0d109f9116e22c271c5c13d6c67409ac9df2fd5167605fe589b4aacfd7b763a39b86e6d4b02f94602f92900162fabbe5a7b920fa5daeefd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F5BD94F1-723B-11EF-9F7F-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0ed6cca4806db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432440599" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2372 iexplore.exe 2372 iexplore.exe 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2836 2372 iexplore.exe 30 PID 2372 wrote to memory of 2836 2372 iexplore.exe 30 PID 2372 wrote to memory of 2836 2372 iexplore.exe 30 PID 2372 wrote to memory of 2836 2372 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\df4715a5bf6894bc5de8e9e30a0ebc2f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5110729031f8cab7fa30dea8a3f1e16da
SHA1467d1fe94f04d3bbd224dbcf0920439fccf1d634
SHA25662eca2c6b57a1554bf7e23453d81fba120d7dab1057a69e67a1f202ffb8b3db4
SHA5127e677366c9ee0f8a6b4032d310563276373de53c76fc198b974d824b3fc6cf69b69e65cfbcf54490ccfd92c0a2b6690cc9c629d334fa1d536abc5122128d5a2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f23a1d5133f680ad5d38d4072146f2d7
SHA12a01aaa90f71e34cdef6cdca365b0c75e59fc976
SHA256843756a060e234748091456ccc85c2dd677a99f264255ab38b688b77abd65621
SHA51254abd2219b03df9269af8f0cff131470793189f842e5c17df9b52234f233675f3a388e35a0f576051fe1e37ac5d19adae3782cb0354e284e7f66720e1f0527c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d42c762bf78ec4bf5e41a650e3522e56
SHA10609a6bb57a45a767049d330d44e93608c6311f0
SHA2562dca9a5693f26be280906bab9e4916bd33a94d18f75b2420272bb1f2be398351
SHA5121d678a6fb09422a5267fb9088e519be29c17d148d0dad8d91569cba07eed16a3863542cd830b3d63e4a76c2841aec00744d6ef8b6c2a5e3e0505c11cdc83fe67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdf87b8cf4ebe4cacbbd67ca6927f81c
SHA16d0b4212a9e13a875cd921ebc3d640a25923d9d3
SHA256424e4c43a2238ede3d3171f15e019471b95ab358561ac9e1975bd3d788bb045b
SHA512de1f06c6e6460e86c49467035878bf7146502fa157711757f6e7ac8be5b58dca8e7c1254276ba7b387395aa56e6867c3c0f5f54752722b8602c7ee4549d54188
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1074ede86461ac88f47faa752c9f46a
SHA190c70613724b728abce85127f68d18c8e5b8b134
SHA256cbd15c123eedce9cdd2a7b63212aedb01c371259000df12c99fb7a3d47029669
SHA512bcab7ef16d6d4937185902d26bde3bded7dbdf5b6cc7afc001ad95eef841b6c58dc8dc0b3d01c34f0273f887f800dcb92d96479ed8db92c09baa5e23236f5388
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e379986fc5217c0e0e25bda998313db4
SHA1199e7127d6c28d38bd9c96622bed9d9ba152d92e
SHA2560b3d1c561ffe9428a8d66061fb24f8f4432a06249095bfdc0cd235f949937b9f
SHA512c0fdb75eb5d2208e6ebd4573292cf561cfe0be10d0266d1ea50ad7685fecd97a7f413f159b59f46099784909d8b23e178a53d59e94927acd09cb0f7d0eda0aba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e23f7ed8ba830d44e341d9331a5cad0
SHA1f9643debfaeaec86d96b57d2b7200e4611ab3014
SHA2560c91e174e07ea4f59d52bc7bd2f7d098ecb11ba14007bb719680a504ded60efc
SHA51252de5f9c00be19943466620597067428d2f38c1f05d36cf38b37e62cb3420781c5fb981b4999e702090d74cc8550184cde83159a1765d4de3a2a6c48cfb7fe56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ceae6d5bf058ed2ee2b86792793aa3c8
SHA1c2141d2711b6f467294524dde85c84127926c3c8
SHA256edb019c25ffe7060fbe3bc54c1a853d8fa6d17bde66a857c9dc6c7f8d5434942
SHA512d066e5b490df1f3352a65cea5e150ab984620074c09c8222b49b8df805b21db31154cccf7ed52cf771b4dcfe1530ce084f8484ef1a5e76ebf67255dcc0580da1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ce325209ccbae160d667d2980f17018
SHA1a17f83914fb2876bc38062dadad9a519191c84fb
SHA256e921009501b7c69dbeb6436b246082bfafe2df00d6d16c900e6c2213c8601c6f
SHA512844133390b2593a130b2266383eeba63feb6bcbaf2a818674cf3a1edfa7caf3ea6be7eedddf75ed82caf9716f904c044e8c11e9bd2010fcceb152f8fe2bb23e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a9dd499206fab587c84aeeacd11f22d
SHA1ddd6535f132a1338954f822c9ed75d46f7267d90
SHA2568132514c0cc7c5dc6efdc7e61d4d214753d2ab0c26e06a01129c21d419d59ad1
SHA5128063b77a266f14f0746af61f85ef6241111efdd0f2aa1442bcc5b954cb916b9a4be1bd82c5346603f9862725a2b836094b477c5b05df5124f1a1d7c752de72d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cb96556aef6a10db8d22f7fd6cd425a
SHA17847977eb5674ca41f01ffddac16cccaf663c7aa
SHA256cc131038550e36fc2da66b5bf3a9ca9cac6376d25a49c2d5fabc56364adebf76
SHA512ff845d1199b9279613ae081d81b1b97a5801b8754655135b3630356199232c6a47346eb7792c379a4dea89700619036238ef73874e173e2b05ec1c80f4b79677
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54883dbd1431c777616a9d4e6f78d129c
SHA15055dbc8423794aad49f50b5f3d8b6a76cad33f4
SHA2566cda3b32cec7c88dbd906a4edf13c9c924407de5f708c3de21502d2db03aa619
SHA512f850e61d5ac4d2cb44adb3ffaa15edcef0ad37713312e2350dc82cf5286bde8de8abbc7014b7e194cb90247af68c98145f1750bd439c8ec6113cb659eadfb7cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bf14bd8b6d9fb357b12f40353f4dd56
SHA17bfd26f42f95e75863179d44ee8afbc37e93170a
SHA2569112ae3740d20a194adc7804df1cd9b8a2ae2b499c9a5d3ef89abc245c2703cb
SHA5125a5ccf8be17a264280eb4f72d787f7f5634321d26a80798a3e8a7046f9c3557a52bf77d69868bdd017bfddc9f7edd9fe25110747bacbc89e59b2b1262c7f8b4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53555a2fabc9f77bf07059de65505e73c
SHA1883b7209a6d9c0ca39c4650c29b5183c23ab7a71
SHA256b4246d316994fba26da0891378bfb81accb4e6ee4397ddf1d8bf59e4e1bb33d6
SHA512ae2cc9b663ddb75df489a05ff15e1c6dd29cd13e67004f8686def64db29217b98b3acddd4939b0847a25015d3b13de3d8d87f806c45f0d760335da154e378559
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a67508dc8f4e0ea8acaf865e39336ff6
SHA1fb2f1c5722a7b60b234f70375c0ee793296c7fd1
SHA25639b634edef40270427baf5a0adb6d91343f899ab19dc43d52721957745f68a8e
SHA5120b898f4842be548539d564c4e6c3930067a4e78cb6a1e128571c93f1e188d670831a2f1c8551e1674967fa65501cf9cbc016cc6ced480ab83b602074f752d233
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dcb493facece731a52dd3b8412af9a4
SHA1504e1a5c1bd3876cc5ab8e42d2c1f4b8dc05a0b6
SHA256e47d54b8e6722493510b9471a82043332fcde3b961b9a85ce95b01f411164b1f
SHA51249b038581c5c659f6a6f344b13329b290ee1f4916b6bbc1b3e22bb9bb28c081671d121fdc8eb600029a565d877389a80802813c71a73fc11b808a169367a994c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5361d9a9f0e68f16050140d23986dd7eb
SHA1fd0abef2794ff0a68981469656938dd21cc92c72
SHA2568e7a8b8d249c72e4b14f4eb9de49beca39894590a00365f926611192f2cb8586
SHA5121c8ec777b26016c2958aef66aca675d72ad8a1f5a8331904e723201bd7d02c15f95996048f81ee061a9b615127f6100a86a819758420dcad7a8a7a678f1b2785
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef816333a4f2aa06e5d02f574e226b3c
SHA13d3a14f1c9014204cb679c97859ba4394d17f194
SHA256560442a94054c7733bd603ffefcc837395eb3b6457aa5f3f823b96a5aa9787ac
SHA512a32f7f95c25fdb3500bc9734565b2aa4091e7d31930a6a4ff6654b3b7b3caf63bf52f4161729d83a96dd65c1f4fc5578df50245fe112cb92a149101df97dfd50
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b