Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 07:12
Static task
static1
Behavioral task
behavioral1
Sample
ead3795282916d8777b95e8874a1c9c8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ead3795282916d8777b95e8874a1c9c8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ead3795282916d8777b95e8874a1c9c8_JaffaCakes118.html
-
Size
68KB
-
MD5
ead3795282916d8777b95e8874a1c9c8
-
SHA1
4ff6062441303ade0506bcd1a2f81e178224e1fc
-
SHA256
ceba12a31086cdebb43615db13aaf2b995fb337058da6967b4a4dfd2eb83c2a0
-
SHA512
841c857ada1c04e1694247cadd81e831d9ee1b7da38c708a470b15da6bd2cf14fdc5d4680aa569ec0b1de36d7ed9897b1d4d4c9f5aabc1a4239db5b0a3c8587c
-
SSDEEP
768:JiygcMsSZ8tN99OIsE06tlSDsgoT2SqQCZkoTnMdtbBnfBgN8/oygcRWQFVGys/d:JYW2Qx9TEPec0tbrga6crNnz8PJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{92BFA951-7656-11EF-93F4-C28ADB222BBA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432891835" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000047653738d57c18d16ec097490aba4296a0b92b50150ed7286d015cd28d05d10d000000000e800000000200002000000064ccf7a1ec66e81ee26cb747dc5c1a5554af0ba22114ab048e3f7dd15ba4e56620000000c8f4a35630de685bfd53f92fb4995990e95826c1daecd7397101a85bf744ab9840000000dfcdf56c8b23d82d6331f7ad528ac8b340d3010fd857e1c889d9d9c641f4082d8e19fb50f8ff37bca93eacf8220db1d02c4e8d7f6309215d0ad0f8dde570d069 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50916c67630adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 800 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 800 iexplore.exe 800 iexplore.exe 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 800 wrote to memory of 2356 800 iexplore.exe 28 PID 800 wrote to memory of 2356 800 iexplore.exe 28 PID 800 wrote to memory of 2356 800 iexplore.exe 28 PID 800 wrote to memory of 2356 800 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ead3795282916d8777b95e8874a1c9c8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:800 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a06cbe70ad6f6a1ee6705ee7198c2f7
SHA159b9a19587894526c768cb0acb99740748d82275
SHA256a58137a636442b16ea1d316adb50b13564540f0fdc67851801f7886ea7944c6f
SHA512e85618d1800bfb3954d72a971834b0f4f2138e2dfb348a18e8cfee33988f3bd074071fc3769a28de4c74c6998a1b9067ae62a07e09b5def798094a7ae0293029
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51562edb32c5bf2b30d2c9bf1b522e111
SHA12b2ac75aac0794407decda04fd68077d3cfe0268
SHA25663bb399448570b9c41923ebbc605466777b314bc6432b7bbab8b10460baa4a52
SHA512b1c8aa7479a4da7aa5112679e3be19cab048969aadf96b86afdd183262a6846cc162214d0e78990a6d2d2a73c7e3353cc5e9bdba25cf3d5cf9da372451021289
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a3a5f94f01065b076504704592e49b0
SHA1aff943eabefbf915653c410debbe43e1a4c808b9
SHA256678636c540be03c429feef06a935343d8776926033ad9130501cbe087354d62d
SHA512b27066f9ddbcc236f36ec98fe3dd1c5ed6829b098bb633f13ebc11b3877bc361d186f19cc607ef19aac9fde276f804c4be93efcdd0bcb20d4779101b4eb20894
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2e79d1d17aa92691dbf080f2988c178
SHA185dbf92f464cc2558e2e8efe123537bbf9b800e8
SHA256117df0903e4a6733551374cbd7994fdfaa7e7f1547918c6683cde85fb68e481e
SHA5120be5a6a637771fa206c960b334e5fae6ee4ad896b1ba7d89a52c7c9b6ffb2ddc7f4008132d474ffd8d2ab0b97831619a695e5d3f994f7308ec63a55af82fb7fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd1e5a4d4206b35afc5a87fd877e0ec3
SHA1f5a78fe9cfeb7935a406280660265878ee684713
SHA256fbbc02ba42689d15f80d0ec6f329ae3915085dabc80c149810cd64ddfad61c0d
SHA512c46bab2a0c2ea29cf30839ab9ae43235c04e5de1df38c236aba549a5d135104d883841cb2a521528d81c9137afe5e21ba2716c85807b5f4748fcf9b2c955fdb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b50bb33f229d0aab9761ae5c7871824e
SHA14cd088755be00db190eaa175401e2788859caed6
SHA256efeb1ea1425410b3ecf4e35048c20fda7259f38bf1e9dfca7ad8a1308c566dae
SHA512ca3c9eb8fe39f423e235d99f136e1ba398d5a34b0a58bc34b74ccf5fee4f88923e9e7858faf48bc47fe063ed81a3801a97cd02931cb219e4181bec7d41354a37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a996ddbe8df15b67d4bbd0125fa32e0d
SHA188dd5fd924b0c9796eda4cc959dfea6981d83159
SHA256fc81754bbca04fe164651bbf8a9bad46ff2a7c8b531b6fe4e886fde8b564467c
SHA51240a9ff591cc40fec5b4452c71f7c3adb2e47b2bbb9fc25a1a4e2aef7cfea3a43e607ff7f8c797e2d3241424c5880ebc24ee1e858b15e8879e2fb41cd63baa1b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1faf1b295d645483ac7691b3475889c
SHA1fc7f308bf57cc2726d56ce177437d7a0e6615791
SHA256c3d059f88359c79e9a8cad29a9b544a643ca0f90d4ad7a016bfa73e6c7c7d5cf
SHA512fd05a41ea0ba16da19e47d114334a47ad3a6e7748dbf9c9bae5d564f490830c631a0ccfc0fcc94e9a6c557869ff361e6854286f49731ace1c84512d798f9d9b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8e6694db3451c3d95f4f2174c46cea0
SHA10e65dd1da442a3314943ef48c92217ad7b48117e
SHA2561d3f0d86c925e9a77e64ac1bcca5fa992d1d69aa36adb0e3808b99e80ce481f2
SHA5125d7c0aa0846af0c0383b6846537eee0cb4354f161857abed449dbf1a1070aa3cec0748391d1bcb76c7fc00c0da95b1dffac585690438c1c622d29d6ced4ba619
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc5bbde54ded5dd3b47b5902ebbbff92
SHA16ab4e5f8b25ef5bad82b10f58d451da01b2c79eb
SHA256e64c3e31e5a2fcc7e30cac55acff0455be5366e82162dee9f836c579e717da3b
SHA5123d7225b7a3dd5ea9fad75829e2b19b8be8c4ab76e2779a7976020bd29f7ae1523c58a4bcde0a4eaedc7b804dd61717bb651d5cf54baa0f3416289f4142057ea2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531c18872ffd31d2b610ced99a9da1b27
SHA16ee65d1d8652969111efc845fcc944c375787637
SHA25652aa87134a2c8fc78b1913f5e77895e68911d9fef51e9eb880be65b5b9f9d8bf
SHA51208bd0ff79e8c288a4b8b5b0bbd630b85af22652d07db8b83309693d37da471b8ed318c3cdae8db1561cf5fbdc140367ec1b17eb2a8961453c36902a02ac6d924
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5014d30e23b2f0fd6f0a9fb49a36b9fa7
SHA1e8811ed2819929e22d2574f8f531ab07e3e7c87a
SHA256900ea14840da88bc9509ae3ccb062323b98f74b4e860a39b8b17f3e952bc1843
SHA512c4b8143a91b3b73de47e1c2260309598e606d95fbe3e08f453f4d14840216febbccc29cd29347bbc935de313705e5d1c37c307863a3bde03f4cd31da6a400fe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cff88aff50586d2fb0708fb32e664f0
SHA12ec27f8487bf2a0203010e7f8edebe4712916d15
SHA25616270fdd87d69c3a7213d07a480739b0a718ef106434fdf6b93bd5994ff44fbe
SHA51264db7fab23762bbb8ff0b46b376f22f041eed3ef9178dd9bd68b1a40dd2dcfcc059b665dcb6a71318d73363612728180624d4901561a9cc02427552747e68d4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f102c9a422ae6041b5d8ac5cf85db35
SHA1e010ff49da2be498a874e525e7850e0b591e376c
SHA256dc651a54a9fa5af2544931d054407c4d2fc73a5397be8811e61b93fc7874b8af
SHA512b7163a9d5f6963cd8c20f9627b8a406900c2ac8575e73054793c72a66148b3d909990f5dc2bb5a5146569c68e7ddf56574cec1fd80d06c0c84950943ee0c868e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50314280fee207bda2c8111a935ae5508
SHA113218f2a26fde3aaf437a8b424720ee4e53cdef6
SHA256469da204f4b617206cc56ffedd2d2d12aacd4c12d12c258d1e9c09c974a6af88
SHA5123960dcbeed4a42669b77903d4e295543aced89b4dc9dae72b2af3f6a1eece7c83214c79b2473d95e422feb4497a95d52ed6cc267a78370e4ad66674908532ad6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae52d18fd584b705101c46fd501b75fc
SHA128b9a41da6abaafd6bcfc60d1419617bf7b7158d
SHA256e7f2aaad517a40cd1f7957d838e3bfd67f66633347b365e7e357cb7f7c08882a
SHA5129dd356ef91d5f744cb176c03b328ba346b824a2d698e365cf0277d96e6b0398407b815d90d0e87a34dcd4d00ad715ec1c5350fb90eb08df5f2e5b311abae8a2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55798a752ace0673472a005288c505543
SHA1c24aac51258e79806c0ad21558483b7d7851b2ea
SHA2569e56210f15c0fcf690b0ab4dd8b62b32203c23381c3a21856a5409393d8335da
SHA51203223e737978be7e0fa6d1bc2af5951d34f4729fb553d2e09a72591aa518a7eb30a7b65a85eb9af8d78a599cebafbe7151d632e9acd737869746c01d9cf13d47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535fff8322d9511ab049f1192cba63a75
SHA111905bf276f0db62397f521fcec7176af0ec70b5
SHA256e92b6a5491ec5ea28404370942b7c6b08266a414c53c78caf045bf6f4d00e30e
SHA5124280bc75dd49667bb0d9b63db081d19eee6a42e9700969ada267433d81c389d3c7dac82e26bafcaa1f498b3b69385fe083aa09c15437eeaee860584d5fcb91ce
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b