Analysis
-
max time kernel
142s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 19:04
Static task
static1
Behavioral task
behavioral1
Sample
ec004e8c58a3dcdc7dc5af2a1604dfd2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ec004e8c58a3dcdc7dc5af2a1604dfd2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ec004e8c58a3dcdc7dc5af2a1604dfd2_JaffaCakes118.html
-
Size
244KB
-
MD5
ec004e8c58a3dcdc7dc5af2a1604dfd2
-
SHA1
c1429934c81ef83774f210e19cd941471b10ab6e
-
SHA256
8bb4f433d98e7346d6fab1d3b2eebdea3151492869f5bb433eff7e556ff57697
-
SHA512
54e8ef47c2ec5f738769b75db012b46728eba41b08b2dd541ce329382b40682bc9f1611f6e5abfc2ed90be6fb6714711684e1001ffd622ade5364d4c083d75e4
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fc2iPHAqbpLfllF2kY7cZ0fjf5p:s+7lLokY7h
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432934564" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 909a64fec60adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0F33DB11-76BA-11EF-8C6C-D686196AC2C0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000da31a36a9ca3bbd6cc6de8c42f660b3641ef6beaf2902f9bcdf71361b3cb5e86000000000e8000000002000020000000d8b43e86eb325d2eb03af63f5d06024dd071b84e87ca7d8c6e1e483f4e8236df20000000c17bac6e78ded3bf82aa6214d82da5fee971fe2418e4b2d16ab0cf20b700850b40000000e5cef67b18cff11f16f065bbbd87b234071a21bfc83accda49ce70b6b907c12d48289d225b4138edd6f884427e3ce93782f51e5bad906f4bf4f8870e3682f2a4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1828 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1828 iexplore.exe 1828 iexplore.exe 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1828 wrote to memory of 2428 1828 iexplore.exe 30 PID 1828 wrote to memory of 2428 1828 iexplore.exe 30 PID 1828 wrote to memory of 2428 1828 iexplore.exe 30 PID 1828 wrote to memory of 2428 1828 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ec004e8c58a3dcdc7dc5af2a1604dfd2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1828 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56782c6ad5a2bda8800b787f19df7147e
SHA17ad7390c9a986a17ea2eb0fc99e1e32db86ef3cd
SHA256dd11265d8a30b6ee72f03a0012efb6299367c63e5adcfb2fdbdd5c792bc55055
SHA5123694d113c3a68f986db24749505344704f813e8441ef4555336215e772c78b6d192d9a24613a7710b39f183b8749f420f007991af19d81cc68e7b1870410178e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5277237cd66f4799fa3e5ae6ae3f997fb
SHA1bc2558b7f853561a72d69f37a60dc7cb4a4e813f
SHA25690af221e0102c04585c69e778e7b37f42eb58b0e947653c9dd8e90fb5dac29df
SHA51242bc11861d7f94abd9908a91cac3bf4c1d8b036f07d439e2d0fea979c37e181622b54474c784c1883674e3dd19e26af782fd31d1acd42300de6ee145bfe8eb1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597ec5b19544dde5bf0cc849f8afd1037
SHA1db8f25ffa39a44a6fdb08ea920c489582ad0ba3b
SHA25676bb507829d161640b4433cf811198f10eaf94f3a7e15039b9603b75c5bfc540
SHA5121d164f0a4934e36a55ff23658668f12b9ebdd61613d60c2067c8ef4258dab0107d958b9cecb53015de6b56d62579c8f5c926eec210bf05750ff8c6ec5313a5c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6130fc3779c68194019d67c3c7941bd
SHA1333130f9d53126214565bcfdfdedb8fc27f4bc36
SHA256c1d8d1dd3632bdc1ee2ee179f1a14b8e62477617c9b86dc6734db80ef42f26f1
SHA5122134704999dc67da38e7c41e3cab839f845bb476c41fb1839d43be23ad8ff520794a18a44ca17abec325ee3c5891874477bb45ddd50188c3bed801c9fd864ad0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1e157e1279bc3094e30e9f449cfdb46
SHA15816223ba61a39ee648a8175c1a6e051d7373fb6
SHA25654b1974e15167ce3fbb14c425a2767809a61d191ecd8737b04913d06d6db708a
SHA51259d2ee4ef378d08baad048b3d6e37d9598b9c73a9ea27f4c82505a89d8df1124962847604c054dd62c52331e58ae03a1d332129510f0e7aaad3ad64d59d916b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562e4ab90d75ce9168bd673f87f4b731b
SHA1f9a4e59c329e783737335d0091f75fa52be68260
SHA256c889dd362027fe56b9db9f06bb3fbe2df2e14a990fd4a47451cbf2d9306a1338
SHA512e17df97ce61a1eb234a606440020573c6c7c6f7c27cbad49c5265c8a3423b033e839a9cd172f9b1d975b1291f57307cbf8c088d5129888f235be139417cb6e71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557ef7b1258c75a7e674bd2dd4737008e
SHA168e985ce92d003efa57e413c4e9a0d0c4ecaa020
SHA2568d7f1912cf951fe007b3b441dbb3148a9312e71825cb4e4d916a75daa6e1979e
SHA512b92be48f78c8abfa37be7d12a82cc770b00469cf866e9c7d777356b0c01f7088390b5890b91e5bf61e0968cd14be24a49cfc139d87f373b347c6af463a9eb32f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a82b4b981d6f40dbd067a8ae8918309a
SHA1ddbc37e925b322b4857a0c97388ec5a143f3ffe7
SHA25624e8d4c9e6548c6e6c054bf9051138062bdcde43814a280bdd4e21aea03745e0
SHA512623f053884a33d8afdf3d67e2225314ee900c5871d51652f70258d64f0b72ef43b8960e2c78da03c9a097fd71a15437504f3c9ef7baac9fe9e1033699a88275a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afd1df3ac4dbb3ded653aeb8af4ba8f9
SHA1b2113222cce4e98cc155a6d74a01894e6bc177aa
SHA256820f891ef72e494d17403ad07260a28d66c9baa7b6d277f45ba38d4be8cedbc2
SHA512fb9d27711b88695f867796aa35930a09f0977fd1262c0eb12d99d57f2b59ed94b5a561bd4369f756ad5a32a34c76abea697a99b6ebc7ec00bb79845c89b108fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b81a29f9a197d03f0e47b3fc1b8cea0
SHA1541c1c496bdc330ee140f25c7737ef872223ed9f
SHA256b626419dcb5092504992b3aabceebe78e3869265abba5cd0c79290a5609f214a
SHA5120be7569adf471782d08184f8087c19a5b77ea2b4efc0c5a3d421c57db815cec55b69dc6dad97b1b75612aa8916afabab7ea8280e2807488d802e54c881cd6025
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a03b20149ef212daf28fdf65252395f4
SHA1b217aef95dc39811e8e31e757475113493a30bf8
SHA25659748bb03ff177617ed92700df90f6428bd6baf2c7d43b3e2605e35c3c7e913e
SHA51250cc9724f28d2fa1f5896bdd2597c75877332463bcc0377c3dd487b248fda1c31fe9a0930fa06d68b39ec9b22e68e8a6bcedaa47b67221214fbf693426ce49b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5619047446da9ca38b750beef2beccf00
SHA1edcd876e15ab7ed4a75c093ef7c5f32c931b2feb
SHA2566f114979415df7daf34f77dfbd1a69a3f5c8f76e38f381a7af3cef32c0537e6e
SHA51254408cfc6237c96d86708241b5ea1112f215036f286ffadce185c6ede7ad0ed8341f19a8e6c2b0e11b553fa57bc66af1cff4a3de22149651c0dee5b954c2d3e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553baa5224059c36895533c9c24423ec7
SHA1ed5ca7b0b282ffb9acda449c3be54fed20738741
SHA2563047ad2f2a5bb284f66b7e926d8fb756f68ec3ea1f2013b1ebf5ebfe9c1711b9
SHA51297f838ce2c408c440548207885794669e877f9c74822eb782cacf41679eba0884a919867a890b82ef4b37f043d272ae9ca2e808de4dcb91b93e548a0118f232c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f95c409867e1c4649b9b0efe7da8e27
SHA1a29bf9db63cf63ad95c7bb93d4a1145241748b15
SHA256c108228867022b7caa15863141c8de057441e1fcdbab98a1293a99f590a66506
SHA512f2bacf46ad6759c6b10835238bef5d2a7e7b7655cdc6a3116a9c5fc014ee23b068cfcd5cfe433d847a15725f534469b441a0142ad93b55a7b97f4f0b5de31fcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54776af01a77a5dd2607a8b76b9319504
SHA1450ded881d3a929e553add4d73e9197bfe59ef02
SHA2564351b441c7c74414f2fc73087e9a99025a27666c5fa32ecb34b7f28198b96fd9
SHA5129363e27d7300df961962fa98663536458b20757c1890d0086259a30a973430a2ebf4644fa0b3d18d139cf93aeea1480b9cae46d4ff93810d034cf94974055e7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc64c63573f2f24519852d134998b5be
SHA15e0f6342768d24ceecb29ae78528df21c11deca6
SHA256cda176e7d52e01493e1c9d3fbea42d81ccfc153c50888173ca1ff2ff7e15f133
SHA512f94ea70d988cc86662728b23c1698a1f14c30326071b6c9a85f0ee0c87ac58f09720910274d74ae2c1a446adfe05f08c28544de9af597b30f411454b78c54dff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ba4611e20b542df0773b97a044f00c1
SHA16bef919ef983ca3bc98d6f6bab0499b71c617cd1
SHA25612abc3f93b9589db658e31514170490350496a2ea6f3bdadb8c2cbfb15d89de3
SHA5127ae1d31377dd369142ffc44ab53b9e9d8db4b72302db03d3f7206246a7472b76dfdcfb20e5cd8062af1245b4fcb0e498111869c7eb3ee265daa975504316e704
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5125d3c3678012d8e32e72e7862109cda
SHA115abcde6623331ebf0e08028fe92b98754485621
SHA256a57ec9fc20a7dbd273c72a0db35f20afb90d8cef07b813855c69b921fb725f43
SHA512d9ef2ac34af6f3829a700d5a6866c3999b568755fa56e3cdc84255196ccc39b5bf7014376d2a57129c5efcc09e3403e509b0938d55b62f60ef73a9cb04fed33f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592c6b2e11c038577fbd140e857198649
SHA1f3a8d6c1964001e4d6ba447893c2ebae35b50d8d
SHA256b3633da7367631f115d01d76e24ef9718dbaa49bbf870bf15d5aa5cc1b24d21a
SHA512657d1f4223dc1fe952d8da41fcd899637a8832ef7979afa9108efebf40c4c5908ee13d456c0ac75d04773ccbe1c1165d25dd3d58abe16c4a96b75d03cf219caf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b