Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 12:08
Static task
static1
Behavioral task
behavioral1
Sample
efc21d602224965b3be78f4440e2bbe9_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
efc21d602224965b3be78f4440e2bbe9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
efc21d602224965b3be78f4440e2bbe9_JaffaCakes118.html
-
Size
4KB
-
MD5
efc21d602224965b3be78f4440e2bbe9
-
SHA1
f3ac663767a22f4f65dc4ba3860f78fd2909da04
-
SHA256
9e5a9a2277c88a15aa1309f3a2adfc8d14c20a88e13f9d2e2aad5195400fcbae
-
SHA512
48d633fa4e40b46e2ce460955aad69eff89c7f1b7579f2019a8172dcfd3217e4e922fb36cc208579efd65e30e9517fe95d2b67f2ae13902dd80933cb5a8f56f2
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o/fKd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0b4cd081f0cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000d4d2adb9746980af7f3ccb44f033c9deb1d1f268bab4570449e95729488cb887000000000e8000000002000020000000b637a96c79b192298d9eebe3522869fae8a4124d2ddb46a62c07873eeee3fdb7200000004b8770d5d5beabf2c2c9b781a16dd4bcd2e54a9eb96073492393e8831e33a4ea4000000022ac1eaf441381d2650e74a175dcf38db8f3e42317e8e87307e30b039dae3d55f881612454782508ae169e222dfc5b8af51aa0ab5c76abb0ad4ca74d1961c62e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433082373" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{343C82A1-7812-11EF-B557-C20DC8CB8E9E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2624 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2624 iexplore.exe 2624 iexplore.exe 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2624 wrote to memory of 2792 2624 iexplore.exe 30 PID 2624 wrote to memory of 2792 2624 iexplore.exe 30 PID 2624 wrote to memory of 2792 2624 iexplore.exe 30 PID 2624 wrote to memory of 2792 2624 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\efc21d602224965b3be78f4440e2bbe9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2624 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5635c15fd4e32ceeb5fcb7cc4b7620821
SHA1296ac0236514769b53f63c2d63ef6eae06a63039
SHA256fb619a9779dd588e48c247b9e0d2c708885d0d2110bfe32f1340c2506910d012
SHA51248c1b52bfedb30ca2cacaca6bd8a2fbf231437a2dadfabdd19fafe84f7b4ec46ef91ed82dfad3bf9a29481fdddfb748abe083293434450992ea61306ce241a61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5990ecfbd5e9cf1c2c72a607500608355
SHA1aca608f4865cb00b05e8ae2f55423bd68f6231a5
SHA256034292f34da53e66d177e0db3e72d8d0670321271f719a20420af6d120be9d2a
SHA512b2136a24e3285ac06b93d584db4fe91693baf7c02e16640d3434e25f6ea0d099fe6511c0103a34ac710e645736564a9bc01fb6dce08986538e2af951986b91f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acdb8b5be461a58fae4a6079d58cb6a9
SHA1fb6bbc850d44c162cf80704e8b3d95e91bd1bb29
SHA25600ac0fac46c01ddc4a3ae7583eea014130def5e73a594ce97a411c4cafe9f6aa
SHA51293025187d16936defee19ee5ed9b6f17136eb85d94b29e61b486076c47bd6e1ba9fae909f7627e78d2f66b92a8c82fe672135d39228f5593587949d4ac853a1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592e4df58aea508d5ea498edf44dc6bc8
SHA15b1100d86f2c95c638c7a80aca606f67188e304a
SHA2569249ff1e13dbfe73acfcc2ccad6a37029dfde27946f15283e2b63d92b14f13b3
SHA512d14fe0c03f8edac0a7865fc53be10a7ef287f2b51b299534126575a03e50a78d4b05ef5c12e1b1ec74705c73ab256da0a20ddc8c0c3d1ae1ec12b1fde5e78784
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554aecf6653f274752e3d84069141eec4
SHA1ba5e8a01a9275251963f2a19ec34911a6825015c
SHA256cebacdf5becb1db4b747408a4e163414753c54d35cfb70c6d2b23a10c6a37bba
SHA512f6f5e468dbd1490c40d9e8e11ea101f4f3d269ad80524d52be6bbaab401c1a70df0a789e6416df9be30be9c029b2f6655a9ef3e003e9ef35d15b1685f588642d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510c1b471ef9504d837a037901d093a2d
SHA107e81d10cd0c2c295c2ad75a13d33a3c84473ac0
SHA256e260a4ffb5f2f55f4f50ef1545abb2b705ecdb3d71a681d99ad677ba13edc294
SHA51234d042f3dc4916bcf3ed981167498efe1682e34c9fe39928d509c71ae842fb834c968bfe0de62020003d1c000c0c9900d10c8fa550f0125fa3ff9be3783aee22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d5eef32966bdd08c6af0ae3ff3d1309
SHA1146c051ab1609478347926be9a3cb8ea2423f108
SHA25613aa2126f25c287af5e1a81ce631b2b942d28406a0c88ec5b17f0ab1df454d25
SHA51263aa18be9b41a266eec5b7acdd6a7a7398bce0c8d328ba5196b295464cbabe2f521c5dd9d985a151d908a1556c68da7b6352dcae4a3c74b36dcb505196ceef85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9e24c2a5d4ac5b2937f9ff651fa5098
SHA16236e37c0ee15acac36902cce6af68d0e6d4d109
SHA256c63c7fec7ffdf349018c9c78a6d03631ea82d6d60e7825e41888c80ec9b2d5ba
SHA51274304feb12332ca18a44a2756447d4cc932cf3d755638ad86d28683128ff16ed6a453fd7d1d675c53b166a16fcc2a5553120e27fb3fa1947d8a2e9034dd24448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d68b6f9d11bd3df7ddbf99b1926122c8
SHA1919364b8dac4b72f3d4c452d27adcbf3a5175ba8
SHA256811d425b42e791d88feadea969da1998d57a1843b4c1e6d0a8ed4dee8cae0847
SHA512bca994f3b226bcaa4ab384ec2992f888df902973bd8cee9bc393a9b3b055ae5a0977f7a6025f57c008231c7b3e9f58a4af3cdc6439cc7250051acfbf5817c329
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573ff5b088768fb0f345cb3ef7a24c6dd
SHA1355f77ab96e98211cbed9a0317716082bad3249b
SHA256f6ff8176fb9a3fce411fff9a33cb1ec2ed06ff9279c181b35908b111f1fff06e
SHA512c77f6f463c300cb8db96679caca35cff8757977a3bd0070ed583d83bbf8f3d5f657ee5cd13afb6383b9f8e82d58f9bf1d872cf79cf59daadd3e6b17356743d2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5052c161b7f6f7f7f326d7be7172a897c
SHA1281c50e53b2c043a2b5b54d3784837b05c08c51a
SHA2568b2a9d4f5738a842461b3b1e7eb316e8f53039ec35cdd6fb7b6003bd8aadcf58
SHA51299cf7e5b5f261516aefc1aade6ecf075927fd4cc3dbd715f2b962a42aa77a3398c8beb08d7eec28d982eade52df07f4a158bd1e44cdcf0599c0bfb09fe29943a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51feb3c50750bcad04f7419da05354e8c
SHA111f357966de909649706143a0cfe0512839714fa
SHA256eff861aa34d496be2d8f4482e7fac902fac8a5ed3d313b7cde37b8050c92cd0c
SHA512d8467efd732e6ad5da08b0d66c66cd9672ad38e06e7926f05504ff479bf794c85c63f146bca8b84fbd08cb7ab08a06c895dd20ffd377ca3b6c8a4e68e773e2e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545523b4c71f0965e120bba6a8d8ec07b
SHA16cc2c57f8bb92517e99e276bbc5d9cf971d175cc
SHA25672e233bd9a35d647a59d37486d8df0dc172adeb49a100e1adfdd6ee2a341dff7
SHA5120272a549c9b70a076c42d32f6c57fc48c63966ea9d6b06b8047f59e92a98f05cd3fbe551e606f5499d252ce7a8c7925c0e4ae5226a0141d55a6f6eba9a5eb90b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8157ceada472401141cf1285c082d53
SHA11972c06509b30cec0a2ed5227b63803fa22af00d
SHA2560cf8cae86834c7c2d704e0bf77e32a8c64ed7d3db75ade4e58bda49560f3a75f
SHA512682e600b200404a60313ed6fc25afb70f4aad1440a26ce37b3947a11c63e5d6b9f50c85f6d6ab22a7730ae678d11bf6b129b78da1259bbea2255263ce304bb9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cafdecc4e3c642acd01a602fb551facd
SHA1794332841a33bf958b794d4989194e4ccfd845aa
SHA2561b11178a4faeed50783feb3f4efefb1508a7ca49f5d20102af64e1203eb2204a
SHA51244eea148ce525396f5c228dd331ed04c18c497725fc87e3c75fd51de1d16dfc58a1744c39834faef14191628871a1d06834918fdc55df26ccf23e58e23730550
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533d71f685719554aaebe59820509d04b
SHA1bed80127dad14b58903867094639a9663451e298
SHA256d90a3421b31e5fb10dbe64341b1710c59097e2811ccc20234d9e02e3903ca11b
SHA5125538bbf66775d20937d3b622ff61754d6889269687d0100b4bab7455db32000f952505eb8aab089e3d2d815a54b576fb935552e828600acebd35b018e79da7b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531b7723c11793cebfa2cf6da8d39f845
SHA1e6f536a9f246eaf52a6357b366eeabc5f8a7a7ae
SHA2565d3ab7102e92118e3bceb196d292a5ca93cc1873e4fac6c9d11bce792b2853da
SHA51288a84b812ab4b3680335409a6f032d0f42ef4d7f7ef814fada2203cff09077f9f48a6300e65256066dec4c74fc7b292415316f058bc217835ed2b9e2a57adc74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cfb8d23bae3d6a29573002fdc72f452
SHA187613e2ac7ce50db9ec67b15e985c80b132f40c1
SHA256d5b7e349d0e6c0d195d360055f4251c6d4c098327c27cbe8fd15750a91775adc
SHA51277df9d20aef29246e9ce5a1e007feb144d5b31cf7450838b5de8df6d0e2c8dae23122e77d8f8c87367c3540d7762b42ad4c6fe1f43300c0ffb85b8e17cc80344
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c39d2d6ad20c4743227bfb5aeb716e7
SHA12968598fca9227b0a53aa7ddec1bb13369072bf1
SHA256c94d48300a5de41c89c91b3c3781f6c972942eab8438a86f6f5cb12e67dc1a83
SHA5124cd7b413253611ea0f1e37cfd43378aab5c816c0c9b15f4ab1d8e750be937bd3f37f680e433860238d63298b0e3687ebd16bf657396360e09552b3ba7c4de87a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b