Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 11:16
Static task
static1
Behavioral task
behavioral1
Sample
efaca29ba7606555a1eb999c5a6bf180_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
efaca29ba7606555a1eb999c5a6bf180_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
efaca29ba7606555a1eb999c5a6bf180_JaffaCakes118.html
-
Size
87B
-
MD5
efaca29ba7606555a1eb999c5a6bf180
-
SHA1
3644a6e94015b83ef80ef259d699fe9e36333b72
-
SHA256
e6328f2d5d75f918dde08123fb09b6b16b5d5108ec8d2d818f19496d8bf87440
-
SHA512
cfe8b1b052c0b00c0b3c05336ffce2e7cf5d5608dc42bd7d163ebf0e78af059e5bf8cce561c00785e8a5f53ec1769dc28d0ba3862a0455fec288ecacc7e0d1a3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F55C1751-780A-11EF-9F30-7694D31B45CA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433079260" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40cfcbc9170cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d9070000000002000000000010660000000100002000000059f1845be643e614af8c0d15098d4077335d9fdece31fa91d59f7b5f85429b9b000000000e80000000020000200000001f96fa83946f3c29ce4b49936c459dc0af5042754aab57db623f4d4ebae73f8f2000000007859402fcf63c540f960b337158f4187860efa9b3a61e73cb518dbe9c4e9997400000005978ada56be76c2de60923a580111470d7a0ebb2f41d231c13aa62974164f6c2c8405c101e2a930c52764ab692496170d6b7a393260944e2a9c3557034076dfa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2068 iexplore.exe 2068 iexplore.exe 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2556 2068 iexplore.exe 30 PID 2068 wrote to memory of 2556 2068 iexplore.exe 30 PID 2068 wrote to memory of 2556 2068 iexplore.exe 30 PID 2068 wrote to memory of 2556 2068 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\efaca29ba7606555a1eb999c5a6bf180_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac5cad2ec011a866d8614cb5cdd494ba
SHA1c1e71cdd367595557323b856abb10b11ec377bee
SHA256336650e428af2927e43c6cb4801682f62e25bf5234fe2560b9233968df86acbe
SHA51215111de8a6649fa9aad01f1fd6ade1b18c7380fba2887e10db412b3c7dd7d842691b84987daa6810935e37a9fda0300fd922ab70d05d5835214ada0c98dc9325
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac91867911df6a6729dc0f8a6556df28
SHA19905922e8835dc7fe31bce1d11beef41758b4247
SHA256e59ec0f826c4c6a7bb043c59543ac160350324644997346f3a520dfce8874235
SHA512fa766c00378bd47ba292dd06ca0f0cdeaae83a7fb2c598a2e5981d5fd4a2872b0c0ab4f93416796ad3ae88064e10e0abfccb2d43aa09bfab9a2754efe0af3655
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5205b56c4ff1bed9d4968849287f4a522
SHA1a4a9aa0267c6121441f17010e433566b9de0acbc
SHA256ff79425212dd54cadf58405832f08eaac66351b786aeb0e4741bfedd7da4dcf9
SHA5121fc24fceae145553e53128314825f859d3dd3764d54bde03ab93b51d309faf5db8fca54a8095a6338b9f80390803d32fada66c14149d4bde1a7a2ede86df6a60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6d145b4c903af3cdaef5f8c6354ff3b
SHA1c8d23340458ea2f395cd91363f9719c0a9b5737f
SHA256b5cad42d2f5da4ed1aefe62bdc5387c588df65fd91e6696979452329bf56f29b
SHA51241135c2dfcd70a4a7f5d05b3e8664d62294e38565f1f478271e23edd080f01963ff17acdb986b92e3a564e8ec205f24f5504c22e44933dab9d539dbfecb45ba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fde0b6f642452bc84d43d076d7e7face
SHA1961eb6d241696943e8227c8e2e061156a2731d18
SHA2563f0d8a3dc004b0b0f1f522a9a280ab3df9faa43447b320c3146baa76e1244fbe
SHA512354a9d75135196d519bbbfecc468e9ffb853fe0ca74caad234bbea896f3c47a8e2dac66c100be6a18cce07f443ef54220a67705dcaa97a87f0965225d334ecac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588a8e6af2288926484da4299414c4f77
SHA1c7eee989f7151641fbf12429e4142b1c353f9619
SHA256bf23ce07a5eb5b03fb5809ad5e2d7174539ca2920d70090b0b74476f2efafa11
SHA512f0132efa07dafcb319fa2307a3f95061654cdbb8e7e6066b7aa380019b721ed89009ea017189dbc163f7fd9cf30a6bfbef32c43795f2f8400bb233aaa272525b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfb2fee69b20e0418dda990c352821b7
SHA19d596786789dac720f8a5a747703bf7dfe9d6fb3
SHA256c032a3464a04cd6b36333c36e8d444fbe0cf887f44f903f355f11a33df11a975
SHA512ffef2c1cd58fbbabe5d919793f1a6e3bd6971e00dfa830283010e82132beca1502221f5bfef540b0bc56ce00a578e344987f586a99a6d7874c1d69e64163cd47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ec6c7753c8a062e5df401fc77f82409
SHA17469e1577916fecd381c3f3721f0393d4f31f7e5
SHA2567d88b3d8d0ae64ef3bb3d58ca24ad18bd8b7ad1ce6f93308faf396c58b854524
SHA512701db1bbd170add6704e4ea848bfce479fad322dfa02a0e1f93e09f5e79061804b43c41edbc4b5508cb3c3d642173dff16a4262df3221568f8b01186532e2663
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad4b78615f07e0dc81c9c79b481cb0c3
SHA1fba43d70c2846052500a7efdc177b7dd8e0648e6
SHA256eb7fe7028234bfeaae2b7264ebe8fa4002e34ca09a93b526d8f2a28436408819
SHA5124064b84a655bca9cf7558bcbcb9f9c6d0f5be2dbce335468b4111b8e030422bab9b3e60cd13f95f4fd49f0efa6b9c7d8f613fe42d3cb661e306f5d152986bc97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7af0d7f486d300e9ba39f357202f16f
SHA191c6ec45a16e11e5e4b5f18b1181ef950f57b113
SHA256d634cf5fda5591b1a1cee8ae81f3bf18d7b0aeeebf63b9b583f8f027e3bfbc96
SHA5121664d9f066d8374fcc17a3bc96299b2aee2857c81c5de137363aa80f87078edbee4db4a517fd1f03cf54434380f06baaa5c0c2298f9c8d543207bf376e11982b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520dbeee0719e482559eea5be29c3e054
SHA1c867475fda61218ff33923160d7ccce2a984c8ef
SHA2564a564763031e3ef4e7188af3dacddca29f21bc07e9ec4dc761191b8022b049d7
SHA512f6bd58c6560e235ceaecb700ddb00c5839feaa67ad4ccd32cc01455def64c17be936980a9500d00049028d63620efc38f25631761382d023fb5fc3430d6fc0dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4bc4b913f0ab2389d5f794699a6b1ba
SHA1829c49604bcbca3095381118fcbc5cae79b6e9d9
SHA2568e70239ad36199c572c2fd2c016039765e99fdb211bf166b30c22b8e09ae5b40
SHA5125a20c9034a78e5b3773841ea8bc16cc65bdbd04607f9e3d7dadaafb3fac7518d2576b36e1e0516b19cc6066caaf804edf8348176d5e734d2d4fdabdc6d905e1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1fda4b6913dea1b289cce8f28027447
SHA1a380be56a9bb6100c9fddd783c39099a3f028cd1
SHA25611d5eac1603ac7f22648d92265a903eeb6ef9020ac122e3e728488d646130cd4
SHA512c696a3ced8b1d06592ddd4b5104701eaf5fb9cd11a05fe81601e48398a9e572be5f4b22a2af24bfd480d7669cff54c12b360e398c78866ca6d1b1f6098278a35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537cf64ec2a2a2609df38f2c5249f3833
SHA19ef5fabd7c8547bcc2626a20882c2f518d0857b6
SHA256f5687aab85e37290a2b1c978ca561fa325e3694d0c31c0f3ebba6bff1a410e36
SHA512b35d8387861c7d19ba105930bc25ae9aee6d1ce7de87204502e43a8a830343a14cef5a0773f08c01cb22684ebfe43d8a57c28d96e44c5e32652073c77c89d4cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57aad1da5cd9ad2bf5c46e332ea14f3ac
SHA160b20e4b2c2f431332a1372c645d7057e4c685d2
SHA256df149081c79a835b630084dceec571dcf8077980a3cc37717f2aab58a238db17
SHA512364495c44a802e5f7ca24fbb3863bcf8df29ea0e3e26a7f4e9fe5a783660e852b10d665447d32fca438e1e9d4e39bf9fae4e568b35814c099936f9525d8dc1d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cd571d842e2f43cd93b450286cabf5b
SHA1b0867a95d36d69b02f24a1d38c404bf6a9d91d20
SHA2567a00328b8d10f1689f503f56032993f5eb980a72b8d98e8e587abcbff82380f9
SHA5121bf0089c1fba4a5487e0724c44c024e51b98c4550e71b6f7fe10d49c7c8ad6151347ff5e71e1b687656cf291e4dafcd50037f6a6a16795df216abd932236efa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5246ea563b9be2e0f5954c60828459138
SHA15b46a972af655e65e2594c36fd8d07d3c93b5eed
SHA256e59e346acc7f2b110ad0c45e469648cf5f1e681014779f0f11d9d11368e24eb7
SHA512eef9d2716486f803886904f04f590f72ac5eb3424c7eb35dfcbd9c5cfd98762b6928ea502ba248db9530069ee9844be7fc30262cb88dde766e3f222face35f19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d27f8958db9fe8999a7e2ff047ef6c49
SHA11bc050448f990ed7f55c0eb0f005ee447aaa2747
SHA256a3e2379f329a48697bd454f300d350673f1c46f1b11808a7c9e0152542c67672
SHA512f00f793cf1a70e1883acdc4ce70092d9fab1f3e5d717e08183fbbb0d6b55f80ce2c019f2d21605379ae4b2ffc7818c0da140b09f3266aa8e2111cca8b89b620f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e41d6743ffe0f3e170f437fad1e88513
SHA1aedd417bb15e3c24c4b7c22b589f9a65e1dfa8d6
SHA256841e07cab0d1ea551b7f03d83e31a96c77a3f2b3ea96e1e859d3bebf70e4f78f
SHA51246ddb03fa258f9a61426f5d9b38ba7ac2faf38e31bf7a6f406c4b4aee742229b4285ec1d0336d97b55a1414adc2846bcb8d60d730ce4a3fe7305455e15561ad1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b