Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 07:12
Static task
static1
Behavioral task
behavioral1
Sample
ead34b923a1b3c2633fc9ab055cecf82_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ead34b923a1b3c2633fc9ab055cecf82_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ead34b923a1b3c2633fc9ab055cecf82_JaffaCakes118.html
-
Size
75KB
-
MD5
ead34b923a1b3c2633fc9ab055cecf82
-
SHA1
34897791ca7e1a765281528d34b9222666084cca
-
SHA256
228162b3e7e33b48204327c0c94f5abfe443d2bdeab7aa9fb2a74bc66d8edb37
-
SHA512
96fc872c3801f52a2318586b0ea0e765e259f73b9bcd25eed265e2bf639b982aaf1ace241b268e06542888fa051b0119edd64dfc70046c11a56fbcacdca53f91
-
SSDEEP
1536:XDlH/gAnunKdY3TejhYAuFpLWRikV0lVDotJwfmj4qii2bfNQe0dCPUcHRVAKtwY:XDlH/gAnunKdY3TejhYAuFpLWRikV0lT
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000f90956f4c4504948a5bba4f42eb9d9d7f673de6dff26df185ec5e645cf2a4787000000000e8000000002000020000000c543319f117b87cc039a1f20647fd8e25eaaf9c86f47e3dfe021e79c77b06bc4200000008d7991a90294063f6dbc0e08d9c37b8972953f9d6d63080bd42756d9f20341224000000015f76b95d2696d02f7c07e3f0b2da50acca8b53c23abdfd4a142e014f18f09c31a070b2e1a0c16eb1ece5c8032265b0bc1709714afd79f1da6ae5d1383272b42 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 702ddd67630adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{876D29B1-7656-11EF-B432-C6DA928D33CD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432891815" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 548 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 548 iexplore.exe 548 iexplore.exe 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 548 wrote to memory of 2320 548 iexplore.exe 31 PID 548 wrote to memory of 2320 548 iexplore.exe 31 PID 548 wrote to memory of 2320 548 iexplore.exe 31 PID 548 wrote to memory of 2320 548 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ead34b923a1b3c2633fc9ab055cecf82_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:548 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dabc5dcd81300d91906a642bb08139e2
SHA18f640c4a02a2f2ff59c1d4bcfa25816c0f59044a
SHA2563d5a6cf1898322bc02715b977559d96d7d481675d2305dffdb475d25778f8d3d
SHA5128ee08753ab416c9e53dd95e71ec273381c645b354964256abdcd5534d602344aa6780bfc8e9026bf06d8ead2b5e84fc81c5365137b27e5897213ba0344bccabe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565f80a0788a32267df41b68145890f60
SHA1926b6448061f660b56a10abd8fb890c08fe21d81
SHA2566f7e949af3d93cf2b49f7a40cfa3dc7495988652baf6bf3c0e8fef139d4bafa4
SHA512db81144bf58a31d55fdbd7f540e7f97b78b33182b06c3167685d112ef48d1ed4ea8fb88569b0e56ab13fd45870176cbdc2525ce622b491aaa3d1ceb2b85d0561
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c8bdd87f7733f5a62eb699c756ce86a
SHA1db148c6d06680f0e070b4336b29e83dd54d9a213
SHA256103117772ef29b4e75fa94af71bbed7aaf8d6e8018383b8fdba126a5171ce705
SHA5124459fd3a2bb945c77578e52b0a927a74c3a73a2cdb4b0acda96484d1f721eae4442c93fce081ea530d3d9797f4326cc6c510bf2f4b217de7ac45cc23111c0a79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3426efdc9a047c7f6c749726e8d2405
SHA1a499361c233f524356bce5609ed38b15b0ff069c
SHA25674dfee02e6674786d72320971539c1600862b9e22166f56f4a0346b6cf2ad926
SHA5128408104249669f6fb7e19545557c1170caf5104780f9e0410dfd87a3956cdda7dc07ec84bb9b2b5eb134fb21b9a1b7c5a3ef7da95e7d82a843822aadc33c38d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f92c4e1d0416325cff7d16c353618643
SHA1c602aa8f55cbef2efb08cfe76a45a301dfe19c60
SHA2563999c6441df67936e86299735b7f7b91fed620c9f9f2211b79d812a0bc8a4c38
SHA512bf02fd9b0cff13df4a5481a3b54d1dc1bccd8311c19ebe646cc7b9abca734225dea85f17c52084cdd02fc1cdf69ba15eaaea2a49cb15fbd76e2f3b6ade039d5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579e026b318a33208ea8ad8f50564b865
SHA164588790f90bf0552eadfe89c8b681318d370ec2
SHA256e084fb31a409805ce39a08fd4fc522711ffcc857c973800b6ca593fe22748fc1
SHA512b478d1bca95b5c9c0c6ff21d9a12a4150f6c04d9fe1a20322df5a841b95e02f24f1be46c8cdd48fb15b1e39ccf8a3b711927d5280f845a3ce8c198844b652531
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5699236e5bf9b743beb1e78a77d9420b9
SHA1fe20372cb019217d46cf87d21919a5ed50557baa
SHA2569e95d249c30592c49bd6aa3435d36cd034e5133248602dd0d05c182faa5a66da
SHA51243ed870baa6c6d7286f13d8db6969dc5a6d7f15abac723b832331e7956a18e68a6b65abf4975fadc5ad0e6a7124a0189fadc736a4d782087d72ac58c6122dbc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504173797986f90b7780c287f4527aff7
SHA1f1382eaa049e827b7414029e01c18cc624adc019
SHA256b7a26b96acd61b0fa1077dedd93742e84b46ee6e0f10960a149e56e197f72585
SHA51270658f2df38215f0a67f9c6cafe27a61b98721ac5ffca5e210f1890ad9144d7cd685ce2b4213d8c946bfe06b7cf4517af403b0f519fd7224e1d262a02dccc883
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567955dd7f83a7072b1cff941c727502a
SHA15e374a211d7c2aab1f9ed6aa6eae5d803cb84fa5
SHA256ed57d025da38b18c1fb13e34d7479a44decf2e7546a96115275a5387b7b09758
SHA5125353c4849fbaa5897ade46da778b3eb9efe694ae5f38c43ac9eceeb1d17e7bad31cde9570b1e15a546a2e6be911bb3ac9c4b8c1005e2afc74bebf14d27aa19e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540492b37947c3ac2308f3b6c915e5522
SHA1507d24d95ed15b0330d306f03c903fd4f02738bb
SHA256ba5a2761ca82beb5e4bb6f9a339a35c68eb130ed17cbdbfddb39e4eaaf474223
SHA512dcabb289ca51cd14b6f88ef2473d5b7ec05b1d3b35d7e558aba14f73334c1b057e7609f723a125c3508af38c49e9fbe1f83f6c6f768e7e0b4c459dee9a5bc600
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537f6421e536be0a0b540dc2bb31f2c53
SHA1a21e3ac962608fec3d6e7617799141d5668788d3
SHA2560eebb07a996518ab42c2aa99ef9fd14c91549165b6d612b83b3e1c692fb00d5c
SHA5122a06dc7d8bc1892ddd805055ae35a8e2114567144b1c665ad5ddffb3b0ca3d52ec770fa4cfe565bb8afcef48fbce01546b95444b991b08c59f9a11b96a64e2b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503bb55562651cea0220acf790db35ea4
SHA1fbf903575720b2b3cda333a9cd9de051991ff737
SHA2564a1abfebd7405b3ac22ffd487fb1e7457c3e12978b37d5cae3618671673711c1
SHA51248c8946aaee0fe3be7a3343d541659a80d2b2d8afbbdceae2095bcb400f164d40b35fa33fa59762c5269917c535afb0b75946eeda11681bb8c38f2fd07193f3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc1def37a849631e07165630c65b697b
SHA1c0ecb5b049b13138e82524e1ff19f0c24cd916dd
SHA2561109b044f47c5ced1048a850b01c560fe1d04fefc769deac6f861a2b453732e7
SHA512177699a2bcfe90065028a58c62bed9c69349d4106c19578b217624c80dcf59d115f7ddc85250dbdee9bd18b40a1d717f5bce722236037b66de25f90b4dc3675a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a45d19b1b6d6e152640cf8c132f27706
SHA107252e1fd8cf51027ea5b26c235b13751fa4b311
SHA256d2f51237a8e55d9296c0a3ad82ad7f2a9758317ff6c17ec437b810b19c2223d1
SHA512d902b0bb0ea5b22e369f44c2c4679898582a03cbf4f735cc4da6371d353d32d8474bcb339405612d704b5021f422150d825a6899f4b7bddb3fa572acde87ccee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5271665ac4c03b41c2d976fcdc1c5ab6a
SHA1d65fa4ca98246c4e04466fe055ba9b40691f05e0
SHA256f86b807701264cee246e63761ab2e5f9c21020bf3f8c151152a9a4438e21887f
SHA5128740424236324b833c995fce447d81b1c7266347b33e9573b3b1eb07d85d7eac25be3f3d3ac09b4e1a72bfd5bb99576210bd501d8dbed3e371b1f18efb219aa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af5f2312e9af12183b5bb82077e80496
SHA155b2d97a8fec7894b663524b780f531d272af9b8
SHA256e31e733547ec1c3de241a298b937dd0054ac241a4eb8d4c213ca506644d5c66c
SHA51291564e0ab224bd2e309fc97d77cb5feb0bb0fdd43cf244dac1ad4b849aa61accb9906e0ed2de9ea8a3050e6ede5d1ab25ee56af1a2d01e1221342b5d1799e988
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcb3f27dce714de77ab91caabc612df8
SHA1e0487983d82ee6d9730480af7ea4da624f8f0f6f
SHA2564ca6c4a853d90c1729e802bf45f55eb07af520e9ddb082f245961b8afdd5cd01
SHA512855927b8089f6382b4e55e98fd017491aee2301089396862aeeb5589ca104a795f03ad9459c949dff3986a564bf7aa17b380d7a0056a67f3f283c94a8db9e5c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516e6958c3fef9c4d1c4ee28a411abcce
SHA1412ee26271a8df54edab11700f372417512dbea0
SHA256ad7470ce402478dc6825ec3eed9bddc4dc9633c1f520e22c210748eafdf3bcd6
SHA5127dc09d40df1041e4ed214f675b4929e3254a152ce3ad1108a7ac51f1f2dda594a2d16ef10bf149bb2ed5a864d62f29755f2c8b789124a25f3a8e05709b58376e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5c231235227307b9c0bfb2b1765f583
SHA19d077fb02a517f96370eb380ef3c8622f4b2c97d
SHA2561e8ac2d61586ca1b657efd238d8a4b5b811fb73e698264d84dc9dea5a13a1580
SHA512fe08aa0819768a7c3c698d8a114b62130133229bfd872c415915900ab63f9de5fb6d840dccbd89258138ca53b6eaaf39046a6f1e09993a2fec8128ad18b5f14e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b