Analysis
-
max time kernel
140s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 02:48
Static task
static1
Behavioral task
behavioral1
Sample
df5a02c07e52252d838378a25dc58520_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df5a02c07e52252d838378a25dc58520_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
df5a02c07e52252d838378a25dc58520_JaffaCakes118.html
-
Size
19KB
-
MD5
df5a02c07e52252d838378a25dc58520
-
SHA1
6c1cbe202d1695947e183f5b12b3979532707bca
-
SHA256
6581f5504c1ea548ef72e217ede2b6788ad14847bd8ce418da6e9127ec56a5dc
-
SHA512
9eabb51b2348a19b67b870b86290a00729ca1dedeb2e8a09a508ea82bada6ff02f6b4365dcf031b478b322ec2b01c92033117d2ffe9079057197a78532e37880
-
SSDEEP
384:zisGKhgEScDVBD8ciQ3RvmRSTSr+PemLEXucfIk9xhe6OzVc9VY:zisTSGgcl3FmNzmFOIk9e6gqVY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D805E901-7243-11EF-B656-D686196AC2C0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432443985" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 106e40ae5006db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000a8084aba1eee7de7a811317531061d5f9b189103ff0b2b611cbc82bc3ee0b330000000000e80000000020000200000000fd7fe0197e255a9c73c704c9f94fed2bde2a5f226d3b4b6237efcf0822ffda4200000008fd68d0f5ca525a78c1a046f91c920ed3b6c41f2891bf25b0371e06740f2d8ba40000000a2e8908b1a1a772d265696f7ce960c6d5682052b70c5da4c4b07c2f2c663730ddc0c876a2f6333149d0226a40d7f1158cc7d8db9e1552d3a5a75a990a6dbeed4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2596 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2596 iexplore.exe 2596 iexplore.exe 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2596 wrote to memory of 2308 2596 iexplore.exe 30 PID 2596 wrote to memory of 2308 2596 iexplore.exe 30 PID 2596 wrote to memory of 2308 2596 iexplore.exe 30 PID 2596 wrote to memory of 2308 2596 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\df5a02c07e52252d838378a25dc58520_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2596 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2308
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2f9f4fd967c18f57a2149aa90792281
SHA195b1831e7b1eacae2e5d30e6eab09d83ffa56b78
SHA2566a4f392dbd47d1f560021a0bd32d8912ed615e9fee2680481edecb080ab3a31f
SHA5120c82ddcfaf60ff6bac8ac12f2054a9ac7ef7faf2e357f655b09576b3adab3683656ba79ecc0aa9e6999ec3e72711906f91dd7c541ac2d93982df75f412e5fed2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5173d671dd730328702e3d239c480b0c2
SHA17ce149e4367dbb34f40ac0f651f7432992079e2d
SHA25612a315fb9df7112b49933a104f94d5f3f5920fb7447f49ef72e51a3d242f941f
SHA512402d398d5cb293f696904bf4c3063ca925304e81ea2bee3f4d11922d7d86d60e5629e2c06f1f78b23826272ddbe1b68cbd19023e3a5ae8f23664e09380064ccf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4f252c191e67de99300dafff3503229
SHA19a1d0791f7a1e4d7d5d6a05bc6f9651c69ec949c
SHA256583ac6014aab4d8b1fcaff54e76f2c55bbc3176f7a4bc349ece4c3458b95938a
SHA512262843cb0447e2af1168e07192a6f4452c40214616fbcbda9bdf42205c8c126a35940506058bd208736f1a7416e798cd157c5b8b4173f913d0c654d2d01a79ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5823b27619a11d42c7bc4de3f8590bfda
SHA11384866e21630bc57d30f34e221a33be1eddbe16
SHA2561b40b14ea4510cb93a451038d16731278388649a4f7be5418b4d50bd261e458d
SHA51242238635424a46e4d2eb78288f11d31a5db3bb1253e178f9708785fe5acf70d47477b99de11b31d1daddce1b023b141373d5a6a873b5d6bf47afb4ea55bf191f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55662d8f5c53ee3cc23e09ac05d012843
SHA136a68e99c304736488d945d4484c62f897fc28e7
SHA2562a8fd3c91d867823aac102b60fd16ee7ec94e4792e66517d052b65a2393363b7
SHA512377b1de3abad536798546d749f302fa2399b7a057437b9d6866d688e49c9c1a4cd736af45c6df2dd5efc13687938abae5adb9c6cc0943f181b959d66f827a51e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c290341db4648cfff6be5e071134658f
SHA13b5daa82e4c127b3b808bff00f9cdd6df352e16c
SHA256cff79b339c793a0e135cd71168cc7f4be7f58038e1217dda83e8178321f974b9
SHA512dde7b5183f839624f366319ceebbaca59d0f4dfa9816eb82a8f671290f944d9f1ace6237d175fefcb1d7cbd3a0e0fd75a0ffca937e9f77bed9d25efc3855f493
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5192d1978f8f0bd999757c288184b6c9a
SHA1d5d10fc16f3d18477e9b721c9f8ff3b9b49fd1a3
SHA256de0062034554a420dffb29ea1852fc5516267f996a6e624fdff9df17f11f6777
SHA512998167b47fb3f906598abd6ceb68d0fe12bd7caf691ff9a1ab6f4fa171aec1f6a2c13147e2f38a363709bf1c063b9087a69653e94386dabea4897de33d0c21d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504e8ada943a343c579e930686d58f816
SHA101121f9ebc74fee605da6e04220c35146f2dab87
SHA25645e64c55007b3d53a7a7d97728be96493613a7dc4e9cd240632a1397354a04f7
SHA5123a85f4f8fcd29d997af3dab2e06033fdbb6dc7cd7e43b06cd0e8b8c95d6214ba059d543308c76abf8ae592823b35a491675de8f8ed37392e1674fc5adbc98eac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556c8eae3c5a81201b0e62f99e0fb6038
SHA1fd2413c0eed73f6e1f3ce881bb835927812cab5d
SHA256b21c53ee714ab4cd8b67908bbb6d8b2c4088a0b7b648cacf7a5f1bdcc05addbc
SHA51222ff332a4c4c427f54fb517670138ee8b690e18ed9ed2220f4ad736d459210d13db87f6398135e66d991e25cde61b555bf7e13ad583a4859db8e0dbf569d2083
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56db2b68cd72f38e356b10edc730a3a3b
SHA17690e312729da99ce1610024ae0271e98b154798
SHA256e77e90d9188eadff61b47f2f2d29b0b25cd882e8de016996d73c86d8209816f6
SHA512c34a720de3b33c92f4f911a01ccc8704bfa31e10ece8dd441fe7aea8a5a27662e33ff50e15ff5d80b923dd7a1e78cb5b57c58f7b4fedb150e592314b3a2650a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db768b4b5c92a15c508d2a9a15e1d6c8
SHA1999a858ee53ee9122fee8723fecae47f1fd5b1d0
SHA256ed64bed45a89314815f3679a495cfdaaa59f5e333f8720f8b0f509fa3207d235
SHA512dd77b818ef6329d75f6a870e25ecc0d6dc69e2047a3f5e1a750c2ca8215cc43b50982960e86cde4d7e32cba47fc75097e62843a117e4afecc1388e0c48a4b12a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531d15a27b5808a8209ce544bbf9c3c8b
SHA1a8194f6715f36d3cb2200ea928599ffd4b0aa0ee
SHA2562f32369562be40f5492128f565afb778e332a784ac7a3c661fb769b158ef1037
SHA5122c3a9db3d71d2493eef2204f9a08c1bfacdbdde1d565949e3f5bd1872cde261c5e85c87acdba1e3dfb78001a8b59f0364fb105c7d01a64f00beb095406a8ab32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ab34e3c3a5eb6c84db8c9cca16f070c
SHA1d6297e1be1d3073f19096476597c98c731f30853
SHA256500d7194376c76c1fe2bc59f836604aa0ec048f1a54808b531d048c9ad4d3c5f
SHA51284c12df48b4bda474f944ee8fbd0b75129a668e77a742eb4be01bf406f4c1a0d1403e1493d3b2c82a39cae02ba8990954d47cc70e18f0acae25349b7268e8d18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d08a64dc4135dc8928595db66085ecc
SHA13120ef70bd4ed01ff3fd53a5b7f9120d53e01f4e
SHA256d6f7054c682678b6c0e6508ab0099e4fb34fefedfb03f9a212f3132b02e0dff6
SHA5126f2162c9e170f8174a69b9ecbf43155d414a87d3d769526647a9a2080d1b02cc2ac9b0540b4fafa8f174678212f0decdd33403b2c502ce4b79caaa6e9d26de47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bfce48e5dacdf8f50a56778bae13e46
SHA1da950b090a0afb924379438c89096c0067113399
SHA256f278d5693fa77a9d11f3b452d2080025a68d92a51aeece26e31628d9fdc00ae1
SHA512e6cd4791c912062d3e05fe39cd2c4099bd41ddeccc7059a5c10d4a5743998e2896fb410c33f040f6e664977b7784571b65cf3086f81ce837d726f92022266bca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555ef5fa944581ad28cf165fe8b672377
SHA1147e136e783294b4d99f26e9c2dbd6b070f5498d
SHA256fe38bd1f8ce5b818448a54af2c2cefd2a6b595b9f376ad6606f2af0280091e7c
SHA51271295ed44fc23eb8a10e96b115dcfa782d3b77f8fc0b3e67ec4c314b505312f0c51551c1c590cae7e1355c1c70835346d01397147d1bcd73a577527fa92c59de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5960ea5702441e6d57302591ff52ff363
SHA1236cfeb8cc4ddb62fe62aa48b2ddea601d72b7d8
SHA2565d14507e3015c4deaaf62e80e48809c65942676bc823a47598deffda2d20a007
SHA512be8367f8446f1f3b4bf95f584f0a102a610a92ef7ca219ad53310cf70e4183a2c82a935303eb4eff55a0939f7e96224165353ebc567cc2ffd0948b4bc2752481
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcea00f6a2904a572e9dfaf605fe5b2f
SHA16aad2f96a15e6cb5a7bc5e3d9868fd98b04ba409
SHA25692994133bbac6ba2361b2f24a3c77ab588fafcbd2d41e1d6444aef2f14bc3b7a
SHA512e5ba3407be4afbc1cf7cc3b61feb01789b6e6f7769cb7db7ee1d887c468aa62ed75735ffd76705f29cc8b95d87ed5a48522c2dea40c785ac2efef48b210043c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef409c5fe70a6142fe7bce54662a60f2
SHA17343abb08b53c41c4976e14bd50d642a499dd67a
SHA2565222842dc362e5da2b48d0518b03f4c74642ffc03536e7b3348980038198aa06
SHA51203c7b92698b4e54479ae10b542022022041e980ee50fe75407013b21fe8aac5c780107a7efefdb5e67d7e3d547b4c8eb84ef3b72b388fa54983b901312720ac2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b