Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 05:09
Static task
static1
Behavioral task
behavioral1
Sample
ef1f5576353e0e873d0580bb14040f68_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ef1f5576353e0e873d0580bb14040f68_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ef1f5576353e0e873d0580bb14040f68_JaffaCakes118.html
-
Size
55B
-
MD5
ef1f5576353e0e873d0580bb14040f68
-
SHA1
519552a28f4f9bcf75b08602f6ba71eb5de128cd
-
SHA256
1a8d4eb56ec9d9d415471491aa465a1cb9898734f3e6766ae99cfa17073b54ba
-
SHA512
ebe699d964f71b88cb328093e229feed561e9f9bafb692a9a034d6578c2debda00e71e81b48679d5933c9401a71fc0d8992f6118d04d84e6140a052a86963181
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433057212" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90de4376e40bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9F14D7C1-77D7-11EF-8AE7-D6CBE06212A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000007d39367da37b391748b3024374557fbe70b25622a939f687f30ac071aa8eeab2000000000e8000000002000020000000e37f73d923fd08bf1fef3c71219a9cbc58a1a968e381fe74727c81854551bb0c2000000066bdceac072990b95ea87264b512683c2fa31f6afe5d3d025fd140a03663498d4000000054230ca985e0cef49ce756116dfbc558fcb5ca144a4757ab88d0f6c1cf912669c53bee81d79650c633062c888589e9da4f6ae35f19971f8120241ba668018b1f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2184 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2184 iexplore.exe 2184 iexplore.exe 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2784 2184 iexplore.exe 30 PID 2184 wrote to memory of 2784 2184 iexplore.exe 30 PID 2184 wrote to memory of 2784 2184 iexplore.exe 30 PID 2184 wrote to memory of 2784 2184 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ef1f5576353e0e873d0580bb14040f68_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2184 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e19ec31137d1e69be43eac0a310f4e6
SHA14c4e74af5f153418be5f074fe0d691f81ac72827
SHA25639895650e52d04148226b83c44e6791eff5de6a1becaf10aa39bc643b29ed04e
SHA5125e2b847214ce8e567b0602abd454c86712bd8c45ef79a95c450130ccf974cbbda8f7470be4a030fa925f08d64d58eaf0225b198ec04904ee4646e7c59d73e118
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5a4ccbd174b9e12c102ac7d11e80a85
SHA188a5733c15ce76d904c01f2fb0f4e3d8891381bd
SHA256dde04e4f0f8147eded6d5f35a5285daabe679def7ff6b43093b2fab15d0c9749
SHA5122b1ee38aa14a89d37ff05215ceaf5bedb36b98ff1d050cbb83f7212acb23d9ad32d9a7eaafe5322e0f74c9538ed90ebfcc205b4ac05740b9b03c6506a288c11d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552c4be630bf9b77a433ba1ee72d6b2af
SHA152718d37a3a71206a7ec34aa0922edb7fb13e7b6
SHA2567acf162112fd984b93a7f3921d54c0c240b3a6987147c314a6d6abb42f404622
SHA51240df773df2086e29a26e3f148859ea48fb0be8646ae4c46262ba9d74374ad528b78f1e49ea4d3aa279b0809226c910c09aef5978fae58da93701c60cd4461f4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a1d61342b83100b9e53a60a52049b2a
SHA18479a8f5bffd21bb3e6f29a317e7cbe770033cbe
SHA256b86761c7f082b52c1688e58149d6ee2030372552eefe4944a25e413fb0be8e86
SHA512abe9364ba660a4391746c1b6ed665b239186f81f9600bd6733b79cfb8e1badf4419206f755d94ed5c2d63fb67e280019476d57fd4ff50c27c5aa37f79db08101
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f10c14564d1e93ea6cc4c6925c41e148
SHA1b6d6acbea8be06ea7d70acf9963e7f9cd1179358
SHA2566dd0b3e9e7d14d3592a1acd430fda0f136a442909986dc8f7b368d81618dae40
SHA512f5859c23477ac086a373618fc258c10ba7b632426814b0459dbb8e8c3e3580fa20d84b0431b35ca7cb85a181dedde0120b2c903b915649ddf2c1d310b3384941
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5336307bbf8867d8af03c89f23dc264c2
SHA1a72725119b55650ec6eda2abd73945d422064c1a
SHA25620ba911b434f25ce77e776b19e7008fbce1773413ae7579c196691e1f6c4cf7b
SHA5126c537b1475314d9a339bc0975082768dbd38586ee0afff5d022eb9ee8ffd869bdf49d443452cf4164577bb52bd79b60a53d2bf5b0f07981c919632d65ee096c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58907c2801ae2453e3c3d2384079e59a8
SHA112813f94c498fbbc6d907025618b71452fa144ca
SHA2567636e13b7cac7c220e31271b5d2286fca1bacca929abea115a2986ece07a9565
SHA512f1b1dccad1f70d8f14b85cb1a12fc97b8a0bb28bfca33f574bd9d88b4b39acd0048ae388d12e63d79ce92d2bee48c19f93fb08000255cfe110ede09186401e1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a29bfd0e24e5c335d80fb752501ec7ef
SHA10f3676f1267e8276e7af4970bed6eb84f547a2b9
SHA256a075f75cedd63e5f33169612264310b830e4303a0699d32abd7855ef7cc44885
SHA512885d35afeab5f739c6a9dd671ab6448b4227ae846a512ce1bf5b0d2951efd5b8f32b14c6d037ae7c253192a4072314758e079403ceb98893cb121039020edea0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f26c102898e9f9278ca1884b5e0977c
SHA1df49b3c93bfc16ca81a751a410ab3cc07f604922
SHA256cc8e57426b7a1265fd789ebd592b77c8174042132dcf5d65ce8cc896a17a2242
SHA5122b5916b04f3436d32f25a9f62fa205e177e6ca6e453faa60615ab8c68ced4830eae8ca6e132537e067feb48aba733a2e978b3ba0b8be461d77acbde99b5b1821
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a9170ccc8cb384a43d3e3982b221224
SHA14d35dad088c34494d977f3abc2f835334950f363
SHA256038e4794608eeb321c9298074c5eec0f04e2a03d0059a014b69c0a315aab59f1
SHA512152552767df269dc6553839169bd6b31ad2e4b7b50c3622a94fcf0cc61c2b24d237d5932f8153d7e1dbd5c8249c2b887af3556182dac23fe9eef4f565e8d697b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a4bc7a680de28458cfdde552e0508f3
SHA172e1f15796eab4310036efc2b23199b9a71bfecf
SHA256e17da46bc1416dda3692ccc8009a579e72d000abb40a39a26c36a0bdadbfb0bd
SHA512c9fb8018b8c1e02d7c70ab82dac4d8ae2236bb87df8cc8654412dc77e748b4d111b06c7b959fc7a37bb1a0acb41896af93cb87112a82ad28a205f72eaf80ecba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540e0e4a2f95c05640d8152bc5628864e
SHA1d7f89984e47e195d543add8ef77e7c1fe4d85006
SHA25639b0dfa4effdcb170b977cc645d37ec044fa68c898540e5b7c55902012c28e52
SHA5128121becbee5cefa014fcde7abf8c54c9ee05f874dc172a741c0267c5c50d4b9597af0163029f3d6cd37476a50e42bf15e8bc3d7cfb008ba75de04e6142d3e6bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b09f581d412081ea2a75deff7c7bfdcf
SHA1b2244544bc831465d8519b116bbb55338d2bc561
SHA2569103e663bd25893ab81d7f201479c26ec685588a869c8b5f8f1bdbed0b6ea3e2
SHA51207dabd2bd00c9c153900f8ab4fda05d9c60e2283202c968159156ea2466b2da7cd9df2429f890a43bef4e9705ee227d5e00aeca1b911e916d9a10c4d53cc404b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514b115063f9eb137a5de0283b8d31df1
SHA134a2cebf875bd8cd14233123d9fc6f2cb44afab0
SHA256e24dce7d10863ac8069c39060802cf19cf5adf3c712d1b495578964a4cbcc398
SHA51282f2bc15f02da251fa15a25c353dfdabce9c26e1542c7682d37de544d3a0761d470b361f0d0db0d183fb51a063656bddfa5530090d58c9f83e81a20675953eb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518a425f08509ec24ddb7c087a4cb0289
SHA14b56e64cb5eaff7522e47f34ed08f92a0e86a9cf
SHA25684fb0f2091fb091fae34eb0760d60b33bf8ab17358af1da123005ddc7ab65c93
SHA5129df37e6a84d70f82db8ae5b7a2110d5d1f44d7c3af6733b7be134b285ad1e13da8b74b7d950d66ce2a9ad542aca33e4ceb171149868922ddd16bbe3826d492c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5407d64e26c4957393d40b0e24957677a
SHA198e3118efd3ab1a0d1e89cce4ab5da3ac2c4ca71
SHA25631fce1736c8eb9595f1199e463d558977e1f90a29f2e25fce475e2327e492296
SHA512ba77c969725c8eb73f07b73883f1da845d2638f84254c359b1290c9f16d51b5e44e9c87d7ba7cd9dfeb53ea701bae6badb8741df008105992cdc349bfc649727
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5620ee73a17a8399d1d1dd1f35175c49f
SHA124f1235de8a1e2819afdcab53d40e617e1338aad
SHA2568729d7d401e0740e05a2b2d9dbfa07cc3b92cec046aa7467127a637620d1fe62
SHA5122cc218c2d3578517ac9e26fa53f6c104f758f24bd861c074382911612057bb8dd39c1b326637f643251ed0b61506f9662f84b685b4299ca6f068937c0b06a94f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58feafd706aa26dc1d91f527fd3d7c91e
SHA104c2cc1188aa3a1e01e5b41b286602c9cc551493
SHA25666c35e785b0f8ea1f417988013c1e3d404f2c436fe07a032f25c04a79f50bea1
SHA512849147683f8518c9a30bce0254f6579bbc72e3f1e637e1924ea30abc849f7293557d59bb4d37cfbfb5e193e5688b627ed8edf16b32ec566d5019382904d5519b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b