Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 04:54
Static task
static1
Behavioral task
behavioral1
Sample
df868a9ed632e9b37b013391f007d694_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df868a9ed632e9b37b013391f007d694_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
df868a9ed632e9b37b013391f007d694_JaffaCakes118.html
-
Size
20KB
-
MD5
df868a9ed632e9b37b013391f007d694
-
SHA1
371a967843ba85cfce359a41e019d456d31457f0
-
SHA256
07cb32d65827eba01f6573f349ec43ffd890efbf086bc3d7431c9f1d739c2146
-
SHA512
d08230dd8be86120aecb8a343d6edeb801eb1bf6def5b8f9560746267601121055f55deea18c002ff456e23db39a7365de2809eb210896d4b53bea9e3e4b4f7f
-
SSDEEP
384:y4mzpuZ9Yxg0KFKrOuBWdwSSGDyQpfexacEzkBCw4oiTfFjF0JFPTvPg6DN9t2s:yxzpfKY6ZSGDyQpfooPwriTfFjF0JFPF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000008ac994131ddc941d24bbd2c39566b66af02f38617d8ca9c7bd473dad2ce0918c000000000e8000000002000020000000ca44dd68d81faef25e8eb1f78e7197b136f66f5fcbfcf9c025b046b0ae2c4ddc2000000041245aec69fe8e379e3ff88185a16c30656100fc521c15802c3a8ae710f784f840000000b32c4c268ea73429d543741d950d5e90492b77af3cff32fe99d1ad7a2a14002a104098c561588a968d23ba3cf7ac647572383a12ccf82bf7be04916d6230c01b iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432451512" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5DBF27D1-7255-11EF-89F5-527E38F5B48B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7043d1356206db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2104 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2104 iexplore.exe 2104 iexplore.exe 2980 IEXPLORE.EXE 2980 IEXPLORE.EXE 2980 IEXPLORE.EXE 2980 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2980 2104 iexplore.exe 30 PID 2104 wrote to memory of 2980 2104 iexplore.exe 30 PID 2104 wrote to memory of 2980 2104 iexplore.exe 30 PID 2104 wrote to memory of 2980 2104 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\df868a9ed632e9b37b013391f007d694_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2104 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbfd9948281a9f62011b8a8d99b9c551
SHA19e8fdb06ec0b00f9f102774f7d7e754e84c9fb74
SHA256dada422a4f0105a4c26489204fbe97adf200eb5805f7837f1f0d0d3a2938c854
SHA512be2f3d3dfc777fa960f4a5717db43a2ced7a7f6449abd7b289d59d505ba6e89af7a699cf62ba26b075fde34f5a2d921d7b7323969f49e534f68ab46e44f54629
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b87d2b6fcde128f53cd23f26220012df
SHA18cabba27b4192eb827a34ecbbc463c9b542cae3b
SHA256f7caec4e83b499b1348e3fd0c5d1a13b007891ae878c6e5c2a000ef4afe48d22
SHA512d890817a067df83df4fa207761fddcd2d6d6a6e89adbe2f58f68c5f625d468a54b683c64cd6aa62e0a7a9614096704ceca9a0fa57e49aaa2d614bf0ade0059f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fda35a477c726014353e57eaa47f1377
SHA174c7a0bfe5173e2c5902b8de482d5f28f968e0e5
SHA256421b75c924993c8252ecc6ab0c3e1741a77561176bdfdc00b6593169b83291cd
SHA5120c9975c69abb777d2797cdc960a33ae4d35bca43f2063a2886c4bda0858113363b93a2fe937a0cffdadb8230da1b28d273b48859c699cb85ed64a01632694bff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596d34a98e8284fb9711d588b41da07cb
SHA18cdef858457310b9b3b91f75877ec8f11d04cdeb
SHA2569dc983f95082c8f358686f13146edd898859b081ea33547e4d5f3c938485081d
SHA51252c37727a7741b445e8afc27052146d48db3df2b8d9ee6082531fa2a345809eba23785f9400c0ba6ba448925cac7451500dfdcd87a426ae23dd44aa73350d02c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c334c43f91448d382f00d065340cc25
SHA10945e1ffe1560b582a3cf7e7151453415fb985bf
SHA256b672104d63a9523840dda704b421947db944e56f9e0b0313e0deffb3454324f2
SHA5123f301e3d31b251e5ed07158264d178a6ac037283c6334484fe831bd0ee117aebc17cc78a4a1e39747b155dd111267dca79b0d5b51da9113e25a0243a4dab63a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5354dcdc18a7b8be9a643fed8583745db
SHA121cc7caab6e88fd81bc217cb64870153a53826ca
SHA2568d343db9cf8c46070e9b0527d253b1e2c31e7531de6afcd9bd536f386521199b
SHA512d36651be280b8dd2cce5f48d3ec1e6e210eb47745e5a6833af9d72f73e69f989a4b1db1175dde72fb217826e00882e154f2a1fd69f8c9cfb39cab1d7a8009e23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7eb7723cc2c08b5b9022940fd0604b5
SHA1fce096e78586833ad2a727b4dea5fee5da6b748a
SHA25662fe505a2a64332f67e1e86d3f9e55098ec86d3dde512c43d73eae124844b8bf
SHA5129a430280adced57d1fb43484897e3e5d77e093ca657f474f08e746880795860e5f1048c5b3262230afb84dfe9e8e2027a23888df2c0e2b3db7c25a0a550dd2a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5569ecb52f17051f056c06044f862daed
SHA1ea892f564b9f3b375f3a9eaa32104500254669e3
SHA25656d002c5baab6afe6ba0de413f003118550a93d4ed3d90ad61ad08ccae6678f9
SHA51286d78b4e9ad0a6abf122e4604409bd0473c24cf63a159fa164fdd01df52dccd0e053a8ffd9a8ea55d8d330a2632cfdd2c2745fdb51317e12756ef91f0435bec2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50deee4aa2cc16e74bfd90dae1c8506a9
SHA13b09f629bac8e5ed61c6a9adeaec729fbdbcaa31
SHA2562ed3ad31d0d61b137434cb44648983ff7e7428aa2d1ac6b1c3fd19cf6c84addb
SHA512329fb2ab2ec66648f4d974fbef4be8a966fc8c4702b40e477b77727f24a41b1b13061f95bf00bca15c557a3c8a58ec1ea037280af898fa6eb88972cf6b114dbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557d05bd6997a3edfeac62391b786ddf1
SHA1e29ce489529afd4abf686c49c7ba6ab4a13babc3
SHA256644000f94baa0bc8774a98b17a72b96f5aaff2bafbab7da18f6ca4b2fe0b6c1a
SHA512643235e861c2cdf90a1a657a6005adf113308b494d9e6d1844a76db9b63226150f3ab1d126134346998553cdb01b1638af02fefef240def7a40fb798b365872b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522e38a75716088d90404f1b57dd8034b
SHA164e880c379cccfdfc48441df539d2303004f815b
SHA25615120d10c9f533354882063c431ae7f2ff2442c8bf332f9a7668d187fffd3340
SHA512d3563e43109b9a6e4933089d75057eba07f772992b8a8ca5db7454882807065f0682d900b8bfeb6ccc6e96269923cb34131ee377a3e3e9b46609dd2050202e2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ccc8b28a58f0a9b2fa0a82db05cf429
SHA131329f3494191b81d4ed8f733d9ab2ff1d325e1b
SHA2562ba99eaf21f3304e8c69ff8a2c486090d011d4acfa378e78d8bd140833280a2a
SHA512d9df88dd9b413e24ce5035a219beba6dcf00c0138a5e3ff7b725dee4475d037c031930fd230e2efa7196d548d15a363d07aea7104a245e29fea45e7e7e4128b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc3ce0d757b5f942053884ed0a6b9b83
SHA11d5450c7c5ba9c5002a0c481d4cf4676ab3c8395
SHA25659e08734a45df26fdb6c2a45e6d7cf3911565afa3522ea7144034d2c23d35bd2
SHA512b5f89a578e943e6000a7a8ab23a2bdde70d8d6848a75a0cd248419468cdbd6769401d637b294f3e6c391cae8e0600f52c49c300560f3897087a98c334c24cd2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adf9ec3b1aa05f12e533a03b36a30833
SHA188539f6df1b5c45bece508dd341b804f9f7e9b27
SHA256d3d08c04ee889056ee272ef07739afe3e13b55d3c88a5f24fc5dc00c55efac47
SHA512554adc5f2908f8b2c438b57e1e442002d856ee316bd2313f2eb5e7209be7170054cd6311588981dda5438a15c661646be6624790e0dcb5db1e531272bde48aff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4199a7646957906c45766496155be46
SHA1b01cb2b27f656dd5cbb2bdd1cce0732cc1fd9d2e
SHA256386214b73b9bbf289eea923dc818374a0e0a024cd76a0defb3405c87eae47125
SHA51242afc9ec080943f0732b749c7170ebbe7f64f866cbdd50987137494d483718fef209e2d4b8dace255a1e060847f4ea71749f30a8b9cdfb034a64ae5b74794aa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512723e62c3fa78751c5e2d7eeef1be57
SHA1ee8944f420f9b08a844b6140e7fe6102a1775830
SHA2566d23f929f14220fede10a92a73b61569363f173c235a53f3f0d5535640cee193
SHA512d2b532317edf3bb57bde688b2374532e6293e8535d045d42cdf15be2df873cabc4c9133514149ee37bc2829b6033f92168e8ca58a8370c2179b190d020c69b51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1d7d2047e8ed9f9b5bd440f61d03e2b
SHA111f6910bf17f2433ebeb7be55bed4dd618b2bd4c
SHA25621d7f44122b9eb2622ffc56149ac30e87f67881159b75ba8eed7a7a5c57e80ea
SHA5123f388ff5032f86a62af466cbb58f27f9e85d0a898044cbb5b06e4ceab0445c23f2cf83808724a5a3336948c964c3ebe2991c3d30f084fee28e163ee0f75a7c0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b069205666481529eff1d6052c6e94f
SHA157779071c45e32feb84e7e793c6d739ab7879eb7
SHA256dd4c4dd22e12a0f3e8cd86e5d4f827a0fb47a81eb6791bd73c48ff8a4925ed1e
SHA512d44f9d32af0464df090138a42aae1461627bf8674bbbbe02a65e3d90347ff13a4321bc17d25a2dcb64942eed1f41875fece4b6af80430115657b7d2bba542e6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da84032f115171f2e08fcfa3e60cd216
SHA13b28c71485a8bbb69fdfa5316715af5f11fb9338
SHA25647c256a4ec0987df968867f149b1dbad799b8b5dcf1409756bd95107a2ee5a6c
SHA5122a1a47d08975f0c12ca727985571234857611e107c105b40ed52352eebd0bdaaf21ef2649282cfab21c1fafc0b281460ecd1c84d2b3848fd11b40bcb1e0a25ff
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b