Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 09:12
Static task
static1
Behavioral task
behavioral1
Sample
ef7a9c2e4fe12e8da36a95a86bbd4b9e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef7a9c2e4fe12e8da36a95a86bbd4b9e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ef7a9c2e4fe12e8da36a95a86bbd4b9e_JaffaCakes118.html
-
Size
461KB
-
MD5
ef7a9c2e4fe12e8da36a95a86bbd4b9e
-
SHA1
e603217a7ff2d6100674ea6d652c20bbb16e0b1a
-
SHA256
f0081b0f7c143f3d7d64ba5545e169c0c78665db4d963acd01643b58a754bb6b
-
SHA512
46221e58ef4c31063d5b049ed149574c0c21c10cb264e3b7580476cf4d8fab13d3cb22c2819dd1c843f3e94a51fb2b052a58d5f363a186eb09c2f402670bf609
-
SSDEEP
6144:SssMYod+X3oI+YXsMYod+X3oI+YEsMYod+X3oI+YLsMYod+X3oI+YQ:f5d+X3t5d+X3k5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000495d710dca9422204866aa6b2fc2d6d6899af2c57d48d2c4e4cc9f8ad23593b0000000000e8000000002000020000000369f455e3cddee875dfab9e05a8051efb097326a629cb124be15169eceff5cfa2000000058e275e5bb95ef34f158aa991aa33ebe0fefd0fad94c7948aa83a7dc245de6a140000000a38c4f1434ce3f876c9bade258dd578d84526e0998f906a9b9d270b8dc3e953654b6e81cc1b4077acfcb30177b80983aa79bc0ca2e5be5212765a5d04d3fc6a8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433071837" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ACDFE0D1-77F9-11EF-94A4-62CAC36041A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70a01e87060cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2156 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2156 iexplore.exe 2156 iexplore.exe 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2156 wrote to memory of 3048 2156 iexplore.exe 30 PID 2156 wrote to memory of 3048 2156 iexplore.exe 30 PID 2156 wrote to memory of 3048 2156 iexplore.exe 30 PID 2156 wrote to memory of 3048 2156 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ef7a9c2e4fe12e8da36a95a86bbd4b9e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5651678b30b7bf70cdbd72e0d7660ca52
SHA156454932c75680cb3abb7975906d7eefb74edc3d
SHA2561aef1edce0e4c315cfe71941fa57918a858e298b20e0bebf7692bebe6766820a
SHA51268cd09ce4ed4a8642246745f85c1734d2286955d946b6f345806fac645cd33fd85d7b8b56eb35c562f39842e3c4349e00db3ace393876d33fb50b5b32dbb50d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d297368967f844c414cfb0415d5fb411
SHA15352e8395e5812bbd74af18a049b520999e2de1d
SHA256b73d28eda414e8a25922205bb6fe24d233b5f7b007fdb6525a355edb1871ebed
SHA5127c841d95f0dba7076bc2a2e1f16d26026f6957fb42adef280576be8901082877055deca3c6239a3ea0af0e5002ff1948a5578df30f5cb765bee24f29918da2f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dbf7effa7e4e963526435a09d264d5f
SHA179a7140fbab8b0c2c0f41303f226d6dca8ca7867
SHA2569bb9c9cc712967188f18cd91c80f266c355d4d53c82f3eae17beeac1f77a7a0e
SHA5120e98230eeddbf3f26a83e3610f9deab75ad4fd456a7a8a287773a0031df7b7db0062759c0bbd0a5501afd01578c0bce8dac3b3015866f227c57e996a79d25b8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508740a3281c1e2f7ea660d64396f18e3
SHA139d8962298d2960bb32a42f0ac0d97f937d39dec
SHA2568b2eab70b29adffb88d9d87ed11d74ecbe0961053012a33bf8f4e93ad16f5ba0
SHA51241653d526a3467de238430a5bcc146a81a669eeae6a57866c311cd02dc0a15c1a1bf3ce3c0a5e5960845ec8760c1e1f4816ff14cae14704cbf6cbb415662dddc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5667c7ee0ba1c1b2fd0b0bf5a7bb0492a
SHA1507f51fa2863899f0656c4607cddaad494e1af6c
SHA2568b9fae92b96df2a5802e5c55c4287dadc290894a5c40a480fd93c7f11f7c459a
SHA512ba3ff5fc570274a556439519a7057112a4059ef4a3023db8ce530bdacfeb1e9ad86523f59ddefd0428eaf5c323f367a25432463fbed665777a6968067e2e174a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5361ebb428c74ecad9a42a9297463ace7
SHA1a7fe8a6c717c07f7b3440b7cca238987e401759f
SHA256286b5d69f3df494f376be5c7b13dd1fe5b9ee37a1357728a200bb7cdc0772f6d
SHA512bae39401444286cc7acdc9c1d39bbcd36c8bae49c1405d62204231715056e1eaf096dff5dbd64ca9fc5070c211a00637db580102a6c5a2878b589edce9eac99f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577a2990b5f547ff23cc319a31baf2b67
SHA1409435b4402edba489fb0ee0914770cf7b422891
SHA2569fde5e4f3b9f377ea374bf07980af2b357896e3714ba09d1c8bebc65dc4db24f
SHA512d831a57e807ef65ac1492fb7a71c7d992151d377a28f2d01a361d04551342454cab8f5a3efa1941ca3f2534fd8ac3d1f17da4ec58f0316d4a9dc8a9927682058
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543b8e78e093ca28f795ccf8368ea5bb3
SHA1d12f02787bcecd456a56e9c0c0aeb709921d9f18
SHA256380c873b588270548ebfc0949d4d95154247445c53dc05eb25b6b186b671c538
SHA512cc7404f1708dd11a3f24af540929738bd2abbeb64045a382afca7e3b45ee4ff1bd3172477a2238842f04f2600801f26b8317be1f56134dcda4f0cfb04e3a3bfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d58b67c9ca62f1a5f609c66467e050d6
SHA1173b6421b66a89ab9ef1e6c351623bb4e6a9bf2a
SHA256e6f16d46813096ab842d19f4d685a9ea4889618ec999433157124152f3dd8174
SHA5127f4b2abf51932a849bb2a8c286aa338051c1ea73a1175a776772894962f17c59cb115cf3d59cdb614eda1edcd953db3080fc805b697a69597e24c975f7fe719b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c825d9d1cde448166ee014480a57af8e
SHA12c8c1e93d80dc777a3071ffa467a4f5c7cfbd72c
SHA256a6b96d364dd93ed99fc7413ad2af3c318928bac8558d2f6b3983a6332283dcd4
SHA5126dc97ef1f57ff99ba80815dcea0784ccc904e7f64df24e054d06ea311a590c2158af4e45ba3704ef6d136ece7876b4bdb0a0b4497b8728590df5dd69e127f8dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2b355d4608108783e6408687d164707
SHA1a7e99ff7e2f7eb066c49f0bfca36a3581c305d7c
SHA256612d92646823a3b4da182906dcf441c928a4acf78ea057147028b210f4bacaa0
SHA512182b65d9fb998733aa5654852632b47f06c54f127f9a4944e6951c8a7ee4a770c9614c7cb184f56ab0df797b5b682a3122cca1cc77d4d1664f3c7b46ebddbfd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5952c74d812b91415de459468af10aa99
SHA1914f224b4dd98d16396888f70a4c4fc48db92bf4
SHA256ad6ba73771bd22b1834072ee26f185c854c0d8e4d6a2dd75b544fed269f06a4b
SHA5120df5bec417c6f87aeba535a5e7228ee033c2ccc182ea5218b7b35efb6a738273baa56c7d9cac898d91c6e7aca6e848a8f0b7fe3e84f126d57e81f93081734ace
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fda2b9c265460c321726cb0319516b7b
SHA1815581443acd1c7d8fef5b05fd26add028bf5a1e
SHA2560452ccf85efe3d5f7c6ca6900692840d2fbe87ae9012f52d25e5d73a04276610
SHA512e0e57e28a2f7e0c1ac7b19c0b31f4641d90daf06ddd30c63d1ea8e07ffa198e5c23e1b962c2c39f69d1df93753bc377b8eb7a43b5251a9a554d823f5ab394ec2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cbf1fc094228de305d330b4f3c3ea03
SHA1454d2252f346912d436df4b5808c535306a1e272
SHA2568aa86edc452be48d1c9bf188f43527ab4073b88037b77f4e63ba5769c2380fbc
SHA512de48eedeeb2c9ada464074ee45e7b21b848b5c89654bf2a4d34d61220864b2a6267f430efacc19a9bf1cb8b67404f8560ed03f2b822d3495dddf4dcf35f194ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b527bfd9e5a143835a00e6d57174c98
SHA1661cde8043bd58fa47e0d46349af2ee9691d19aa
SHA2568b34853eae3e82fe55db045a66762b1afdf5d3525496e7baa92356565bed7156
SHA512a203905225c7f0d2b8cc6f918026077013988d7df9b2f0c577933338be2f7559a06581b01cf336f59a34eaf5063be4a7c0dbfb579f6c774ce22dd5b1036030c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5842c123dea1808841a80a03e9ead9ff2
SHA12e3ba909b9b32c8a508407520819b2bb59f2fb4f
SHA2563f00850d19c1d20613e4099eed18ebb8e39975687236d999a7aa07580e92268a
SHA51255f624cd51687ffce711b16eb6a46626c226b4d233c65f6aa990cec8839725716ed7646a698b1430a7f939105154abd235aad23a87af20244597403bff37ad74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fb0afc54e0c70c2e3dff7d334e018a3
SHA10f5b1edfb3e82e3730bb470e560857d175d99565
SHA256406d4064831fcfa08de67b172f83cb0aab05313a6f3dade2bba3bd3c531e6820
SHA512b952445d4a92cd52686dac47574e9d0278d99ff9102347792b526f533ce0cbf6ace8f2c1260d2caf96d6f91919b3f49b673436ba7bf18483221a3666f4eee9e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d82c5dd669b0ed0700943c4dfa1b5a1
SHA15ff54eec230ff32a18f5bf48d4d5857607dce4a6
SHA256c99b45dc9d00c630a502c2d3e103a3a6d6fa7dfb5fd4fd6af042976a35f89c2a
SHA51296694917a4dc09cca964016763b8afb4deaa1dc601a04a32f668f37594a991c57f0d64ed3beda737b1719765b57b8e077dc092269d7d8bf8c5e7d33977ed06cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9e2392aebced1ff115355d298c3cc12
SHA1d6dc75cdfbe870a5dc3787fb8d6a5fd10fe9cea6
SHA256d2415d7c711f989f11fd2757aa0603a203449a5d896347f4dd8cc962e0c27c91
SHA5126c5c7b094bae594bc957e5fe5c7e2f731e8041f3bc3e34680d4e5cdefc3b31864dfedf90c2f880058b6b28604f07400f61c1d4dc2a2deecf38508b084f67427b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b