Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 07:12
Static task
static1
Behavioral task
behavioral1
Sample
ead36cfb5ccf673a60ddea74835f3236_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ead36cfb5ccf673a60ddea74835f3236_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ead36cfb5ccf673a60ddea74835f3236_JaffaCakes118.html
-
Size
22KB
-
MD5
ead36cfb5ccf673a60ddea74835f3236
-
SHA1
548966af97c9a35edf19bd0000f5a3e19ba5b52f
-
SHA256
f4eb1cdb94ab776d0217107d36cfe3c106b56d83d2ed71f5bd72f629672a5a47
-
SHA512
961358a062dfe9a5e775ede768ad88a1a3046eb798a7d2f86bf393de4f5283d98fd3c8b2876120140bfa98fb7a66789ce1f36217eeea4c252f410b12ac6cd35b
-
SSDEEP
384:7CLPXXi3iZKpKrPFjRgybGONFCD11V10RPnvWai3iZKpe:7CLPXSyEGbGONFCD11V10RPnvWDyEw
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432891830" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000000b8b4c68407395c0c51c4455b47570f97000f808f9fc7471dba2985c23e92f47000000000e80000000020000200000000071ca033c1451cb9b48b20c275cc660cb5b5b99d97445a706dc58be1090babf90000000aec0ca4c239726d10fd13f2ad964caf473a1cc5fa8962963c6ec3be3a293f5de2ca68f63daaee5d08da41f2e954575de34f64d1e23b8d13d766ba13b6b8378bb17c13fc93518ec5fc30dd248c122050dfac4cc3ef27622ba8655ebed701d1ce7cfdcdfcbf9ebcc282c58829672b779a5221ec995bf3e361df36c8c2bae2d9149887379be9169886e0172d5dc93b8a35f400000009f943eb51bd4fdac6acb488765a6cfe9dcb05b9558d341c288c17efd9ff31ed6b10a273782197c951f93620ca9db737585d47a38d4d21ff144a8b6526a584634 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000009728fb6b2c5fa6feb795b68258c058978ea4d4f6d664372ad2e401983f82fa32000000000e8000000002000020000000d05b85fb9720126150143d81e9ac1754dc2bd854b5ad99af16d18846a45eb32d200000001832df48e4fa973cae6f2b22db84b0b78f8a6dd499375ef45bcc98aa76d7b25e4000000028b96ec8bc3e4d5b822bdac9108c805d36947a6cc90f8814c626e4ce1f632eeb9ca70a1473b70f9100179b77abfeccb0c0afbde03af4135c5fb7a596a3a3a32b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{905FB0B1-7656-11EF-B56E-465533733A50} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3086db64630adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3056 iexplore.exe 3056 iexplore.exe 316 IEXPLORE.EXE 316 IEXPLORE.EXE 316 IEXPLORE.EXE 316 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3056 wrote to memory of 316 3056 iexplore.exe 30 PID 3056 wrote to memory of 316 3056 iexplore.exe 30 PID 3056 wrote to memory of 316 3056 iexplore.exe 30 PID 3056 wrote to memory of 316 3056 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ead36cfb5ccf673a60ddea74835f3236_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3056 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bdbd830da0d74e48449cb85409aa08f
SHA1079c3a44866c00b2bc56945b72a84fa625b7a32f
SHA2564b8a60aa2c02ebd0c78f2ee9e90db8b20e77698d821bb624e76da1a635d17385
SHA512defa32b54f6fbf97b41611051430174e91dbf5b1fb47cb721f8d7304b3978eb026840c685fd238f3eb1a17ea92ea9b35708da532e6cefb43695c1a1d39d641f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bec962c608798453cac9f8fa318233a0
SHA1eb5130c7bcd1d18f0e9b7c37b9d5cb47c64f4664
SHA256e8d4b9d3e219918e5cd9baf3d6f1d53b1c3e709ec54aef1535b99abd183c6f3b
SHA5120c25e7ac466444c0fb4859ae9ea5594548fbf67d5a21e6149c4851838b413030261b2bc3cf40035ca8437f9347250ff803a1819f8883eccb27129c9bd5e3fbf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552581dc36ea01e5a18fae15b0b772322
SHA16aab25b0e2b1d58deab288a70c8ef38d9e5bb64f
SHA256155d2dfee14be3763238ddbfeebc138e3083148fd41763a15ccb169175ffdba6
SHA512a78bed43caeed227d4b95c21195cc57b1b3e393fde256856928bb591053bc513cf95ffc81aa23618e389f7fccc763d8a57f8552a8071303ee33aab98eb902e07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d91089fc4d2925b4f291628af5a695df
SHA1d9cea98f80fab02217a86332a3d54eae9feb1479
SHA256d946776e2ad3f8200695fb331a9935730da5affb49e7a486bfdfa1614f9af4ef
SHA5123cd70dccebd29050dc6b0a4fd1a07ae2430617351fefa9e5ddadef663c1d90c2c84e10df9081a6fd0c8ce1d68ab6342685f967c3754c05ca52b665135bb27e6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57aa721ebff12311199b735971b8b6edc
SHA1c1c3818b46d557c6c595986df2db4a671ea604c6
SHA2568dcde88582576be8348827488e6d3c8aa8c125a58bf8f65f517d910a3e0e505f
SHA512303b6ae4e46650c0c09d7eb8d03b458ac9c27e8537524dd02f81a368bae3229aeff896957a8891d7de546e5d0190bf70e47987885bc1e6714861ea85108f19e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d63d13a54414e27c5b6821ef4c71941
SHA1dcd4fc8c966617b150bc006e06054b2f382b629c
SHA256ec53fd56778543f617731c0ef9efe3807ddacdeff7780cb68cac85f96efb1974
SHA5129827762c73faed1be7c70e8d893f00cb6f4d0ae99cf6b70efcaec979865097c3358a28ef81457257a191905cb2750aa2fe28640eb8ca6fce61d1fd654a04b2af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58deea665e7713d62c77aead5356e3de5
SHA1665bbcbe70922bd36389b386e591d8a77f14d83a
SHA2565867fcc4506e081e847717cb9573c58dd50914c90d0a345b3a5b2c2c04afbc21
SHA51262b367039477fb6a9b02a878a5489777f08e8d8908305150fb4d345fbe302e680cb46ec44a1a3a0d2a2a1d5aaa2d1430552789d910f9d7533ed586020b821e4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b80516d2eed2728883a84233f254b524
SHA15786393eaa3d1555d8ebbedfb4861b9fe3419a6f
SHA256f7571177643c9726aea81329e805972a0e01bab9c2503e8a15cb74aaec741138
SHA51296285f252f9abbcfd48857ab2f069cf3ad784b2f7b703c5909946811b6dcc01d8fe50604b7031ad3905e8b6bbbbb208283c9aaa1ce0cc200fbd6d5fac9180e1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5516aac007f48f1e9372ae2ee9d583e83
SHA1b11c896ed890ac5b81667e934ffc9d65f867cd98
SHA25657f7d9bb1aaab995bee3b656b99cf4586c5e2d441046ab8d5041691abc389db2
SHA5123ed1d156757fb05b0708aaddf59c5745242601e1fd812b2ade2acf9b439958d50f022c7194736ccf16f8b4b8156681cf0c4943a571e27034cc3cfd8cb96f1d54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5362400c2f73d8905813915c1677a429b
SHA1a6b330adbfe841e29b3d175ed8e8931f28c6822f
SHA256831fea012038cc6ed18c954cdd48020efbe99293ea80e0aed935d32cd61265a5
SHA51288d3a2d1b60ac0c88ae17216e23715b993f361b7b6cb5f75a0c69560529f22fef06b452cd9487c9685f73c1dc2be47c14128b5b0a3aeb10e139928ea3c62c2fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e0d8ccc225da53d47fdbe9cb59b7419
SHA139cc38e02b4cc63d37def090ebe85a9bdd947ba9
SHA2567d9435675e7b1addb23e0114f8571a290c0b94b08620c743182a1eea3a5d0c1a
SHA51224c319deeeb2a5b89ad617dace69f7542f1b4dd8d68d02a059264e3557d99a3a08a04bdd2e59747bba53082ab5a384e77542390dc1204915f5d349b82d5affe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a630c88e985ba591e5c15ce12f187af2
SHA1fad41faf267f421e7ec5d1ac0d1de8b0058db83a
SHA256808e428c86b34c23fd630123a965ec718fa5e23386c2c1feb3ca9a823dd50832
SHA5125de5c355aeb51dbc4485cb9b8eb1c11988822b4bb8bf1efee0636989ccd6e2df1a993a02b26fc37ba692b25f1e84f3244516e99e6fc2ff40b483241979656825
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fb148c1802f26d0610227891b004786
SHA1f6a767ad0292f8747f0037d171a7b7d9baa63dbc
SHA2567762ed8adc6d63cc4a10ee926f351057a45e44bb873ec8a2c328ee439ae28529
SHA512e4dc4684fcc3fd9e3debf04be786ec7c483ab643ae578156fd09905bb42ea6ed55735e00b80bc70d3268e33312e26a0406513b81916f74bfe07f02cdd1d1a9ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56120d8d31064c7483fa970a140fdc007
SHA10730cf88d69067ac518fb08c02301b0f5373df99
SHA2564e6e8f5d481483dcdf9387af212d2d5662ce745c1c22409f03ae407ca57efb3c
SHA512f367e1ba5c1e236c889c637e3ecf28d1a8d98f6caa16b8d3251b8df5ee837ff080c6aff159871e1c4e908f28b4140bd33a8055fac137d31d037da5750a50aecd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52796c889afd04a549c685239f0d6d06c
SHA19e2efc416237b38ae824ac1f8d76d53259b0d2bc
SHA2564df4c52e0e7bd76885fc6c1f0efa0e9ddca75772d2bd3c4df098d6586d99b46b
SHA512ba34ed02809c88c7d5671c6f412e876a8ddb594bdac54598e76c4437b15dda72a4d3d24c8f778cb9c3ec2130e3b62d8ada96c894908e5fc643bc8ee4c3b8ff5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509261c4757bb28bbd6db4a749b5f01ef
SHA126f9b115d57f1113b5f49725c118d4e7e289e890
SHA2561cc7c12dbf511ba28eb776459648dc11c76878f138d45f03aa2f5ccf5eb02050
SHA51229a25a3335d647627c22a06091ed9a8028624b27e4f70a4f7d55f153e5d90f48f01b5d4f4c4f801f8c69c502de4a2a6708808b66421231cd18a2461d2d13e7a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce1f45100989594c7e9646b4805ac122
SHA1d5411fb92482d33cce07f2aa64dc4e70994b7e48
SHA25657f7bbe7f1b49af995c0928d7b9609ebdc057baeb426195fe41330517c835307
SHA512416e1ef802f6d9028eaf3ff1ef3f0e7e1b348a8cdca34049cd7690c355043d9fe0cf802d690fa0261fedb7e5b24f6613881a2a0ef30493681c3f65941e9daff1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c18b7a160454125c59a3da6843c133d2
SHA1a155fd93cdb64172bf42f1100c184f56ec528755
SHA256642b81a77a4f426caf8232a815ee81e0f931b3b84b2ce805624d89a105e6d539
SHA512c248668d0908b6207fcf283f003809b4cf76c77dd19de3b911c1f2b90bdded32e731c37022fe58d96e7c75828a14159d2e1061ebd1ff5456e84a2e0e8a740e1c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b