Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 12:12
Static task
static1
Behavioral task
behavioral1
Sample
efc44213d2341c361a484e438465101b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
efc44213d2341c361a484e438465101b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
efc44213d2341c361a484e438465101b_JaffaCakes118.html
-
Size
6KB
-
MD5
efc44213d2341c361a484e438465101b
-
SHA1
0538f815bf0ab00a74c09ca89183d2e04f9d87cd
-
SHA256
0d1aa611c6ec4d37a826ccd02d7dd75aa8e8088271390a4c8867766868f640e5
-
SHA512
534afac70805456263d1cb92e730dee37b0bc62b338d397b6298621a37cd563720669eed9f4f445060fc6a3d8c2c5353bd3623dc966307708f7280c17d726a13
-
SSDEEP
96:XhM3sHfjqRYAQ/lhQ6ghttOGUWhWJ05sFZz:XhM32o7khhwOGUWouAV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000d3be8ace734151dd9e64ad7b670cf664b79d314746a857534dc396d9ae3af74a000000000e8000000002000020000000e470b7688c08779ba0f7aa3d49f18b8cb53046975de6a5331e41a3b0abc7d3b72000000057a57896c02ae0542edd77e1d8315ef8e7360c5ec01ff30e8143be664cf0aaa2400000007560a793da389d2661dca9b525a687a57e995a53c90cdfc346005795f5e800d0b14e65284d0d3b6969fc8eda6b35dfb7c69adfe7c02768b6923d59785c135fc2 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433082596" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B9C3EBC1-7812-11EF-8CD3-5EE01BAFE073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0725d8e1f0cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2532 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2532 iexplore.exe 2532 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2092 2532 iexplore.exe 30 PID 2532 wrote to memory of 2092 2532 iexplore.exe 30 PID 2532 wrote to memory of 2092 2532 iexplore.exe 30 PID 2532 wrote to memory of 2092 2532 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\efc44213d2341c361a484e438465101b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d97062cb9077bbd16d5bd5d59542c7b5
SHA16bd6a4f934486bead158422089712e4117ef1da1
SHA256f4d5f39e8f5f9dacb6e8b6410933e65f9df31984b576f2a44aa62bf1a06e4277
SHA51211a07c71ec380fd5973cd90390526c6d3df138fb1992d05fb4f3336eedc4cafede2bf20aa05ff47945e4ca67b9a5f05a7a5249fe2ced99d6e19fc2b8cfb8bc44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dfa7bd0cb4d4f9d8400f166d40f37f4
SHA1b0c9c6e65f7c5e9313298a283ba7187cad5829eb
SHA256789aff87579ef9ad70bb8112f3a9b21b27fc2b9ce7486a24aacc46cb2e9e9ee8
SHA512485c3c640ecce499a81999813b7530abc3da36f7ce4941ffc897f6d6af504837c88fbb57dbf9eb158d636b6ee1d0b84240e2a2afa9059c78c2818b6908d07430
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f874c5a8c8418cf9de01c641a9e16ae
SHA1288d0fce49025a1cf61113c91164942ffdb47b4d
SHA256722c692b44877db8113a97b7ba428ae088f52c0630457bc1d262f01d7a0bbb24
SHA512fa00fe4b711808784ed2e97571323bff05a24f92c03f9956df8df641ef436e89cf8222760ab7433025cefbf5e2c6067a7801c29943a822feed5e6aa9e5334bde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5122067c697e4ecd723902cdc0e21fd04
SHA165af6c3272a86a9cd41a297c02bec502c561209c
SHA25684801526b559b87859d6deff10cb57acabb44dead7e35b92ca198c792c9919e0
SHA51278a3ad263aafc18adde4556b439f78e8ac10c266fedafcd12b732c289f01d1a8feba8f5d6f3b3289c8e07b2112bd881085ae12a58b420883d0975905733df1cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c02a97527d49978f77a51500546a1faa
SHA1d75c9eb7e41cb669282e1ef057b81dadaeaef48a
SHA2561cd01356d6f6cb0ccd475f275b22e23654d029b2dc75143a94d6ee4c3f73e373
SHA51254d559cbf9c6272bc321aefb0894f45d31944e0b748f44babf861a0d74d6af7b82c1184c1b76166f63cad17bb46f3efb31eb35af6e01c8b34dd63a0ede1163ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f25874a9ab56aecc1ab16bc14676310e
SHA192f97482c574aabae49fe03b121259b38522ba4e
SHA2561d389adf3e798ee76bd2055fdb4e9d9559c26f4657014f00359a3cb5770c9fef
SHA512ecd02bb5d680bbf0ab5fbd733861f8df072f23ebf67265272b29acd90db109980bd9a25fa2ddcf6b339614066921dd7f8505a5d6d3ec6b7ddf3577afea8709ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d339eb82d65bd853385a16c09d30cb3c
SHA15aae191c46319520bf73603b8a138727995a2112
SHA256970f656816d0bf6b51d1361032c4c47aef346242ee194c1ad44f6e1e43cbe151
SHA51267d2d4df7c3c327a3eb196f4f5fb37fab6cd3f158d32cbb63ef53c2cca3f6584e63e30f1b7f6faf871a1fc7c883bc213e630c98e2e3f835eefa111af12b3107e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ea5614e2db1a3786b5333308219e32a
SHA182f29d0f1e9cffb3e9cf5a19ccc94edd436c8af3
SHA256d129b78701104a3f884c5f14c78df8bd3cdcffa1a270d194bb227eed01495532
SHA5120418d3d4d653f7c2da00483ddb561611ba7a5a1ed1a5724a8c4c7caa89d8d8e0c1c4f844bebdab3585120f2966184ee6d41b1637ffe9c5aeee3c24a402ee7874
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501636ed90acc8d651d84821499ce2e07
SHA15cefef079b27bb8e2343a283978a24f32a6e4760
SHA2563e616494346e7cfe4f4ae9e1f670d8478d080decef0b93c5901fd84fa2eb7e39
SHA51250229384b8baea83c4c28004a394b50811c898a165c656e2e8afa084d42d7cbc60bcf2e9ceaadc16bdc909140c97e36cc937a661cab860b976aceecd345d8046
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5451ff57efd5dfe5a32e87c87256de882
SHA1aa62f6310843dc5175957b4702cc790eaba21b9e
SHA2562c955f24c0deccb50c3c91c422ab2544d294e8f74fc6fd6d134498991eebc452
SHA512bbda3785481c583482d78e05366fd3122d629baea7192d612d71979d638a4aa7f715645c6e95a4162e46e3045a1bcb3d9dd59de8a723ae82ac866e02c36d00f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cec71bba578d2dc9af985c1e4559ab6
SHA192fcd330171799132026b622394abe8ce4cf71ce
SHA256655512adcf9fdcad79be75d3a30cf11c25aa8967958480715085f8a553235f09
SHA512d3e300a91e5f8d36468d8081f7ac26c650717dce0dad11f45d4c6e1d21247cbd86b395dc537bb0c6179a6f802d2567d48a0925dc76abf0769a1c0588b72d169e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5496d94dccdf6aa5d4c4d38b854963ee8
SHA1219a56fc83e54c405b57b47930b58b8c2eeb3da5
SHA256eb453bedef49b96440b89d11441578b32fff57d11e26a622c500979e8ba5dd9b
SHA5128edc5d5766e361dfc90ce8a2efec32b20e11e70f69eb166b12dcc934d6d9e3157118705ae7c770b4b05fba8e43747e4ed0668ffd00e031b3557845a881d9a6b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5442217238879aa542e300d717c3cc1d2
SHA121aca1e4667c21b8809f1afdcec7fc33e6336e8f
SHA2561a8fa0fdd10d4ed828708dd65c3cad6e8125e239b860cd96320360304885e96f
SHA512f5734ccf65091ae27ff3a119e947537e8889393b6bb85a067e36e5aa31df319caca6cea1320344ef8a2e8cc320ae294205dbf4c89df1f4813127e533cfc91f6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550d541eb9794f14c976a3d85c7c21e3c
SHA1c9e5a29c83ed669dfe2f0a88fba60289afbcc73b
SHA256eb3a13945b577b11a839df7adde7d097c7222c42a15f54dc47e7fbac734c809a
SHA512e9a9d97961111e2eca6b0a380999715420266bd3dea437f951f001a6465d2027b48120dd95b26d8971d279acf432f8066df659f690cc1381886e10efcfe4a465
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1d6570b43ae6c0716ce8b6b0b9d93fc
SHA19278b6a2ef3a75cd518f308f97dc86413c58ed45
SHA256a52bd31288da5581a68193e47de2c142fb8404327809f25bb984dcf47b6edeec
SHA512232eb90a8d6ad5860efc5d7b766f472e6e71dcc5ff4fa792e58c32b67f8c5743d1f8e2091016ee6805e28661ffc565d113be6a16d70ecc90b980a2aeae7c63b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f081e3b7aef71c53a440d0990b3e8776
SHA14f76becc0ed22d8bf92abc89c8d654fecc5569a6
SHA2563017d6b2e6dcb500747c45cebff1b6e51ce58dcf656e57e3752e8f0aa9778f7a
SHA512236c54103825b58602d436fef63284074bac149eaf2df54d1f13c1cfffd56802682fbd351410b329ef20f4463994a0342250754b7ef917723cf4edf730ba312a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e83fa002c532b1c9a60519ad5da84ef9
SHA1560961d522aa1b278c84552e22bee4f1c642b133
SHA25630188960dc4dc75b19f1563daeea4ba0c059a84bf0754931dbd8c52807b62fad
SHA512b101cb9132e89ec2ac7f948ecaf45cdc1a65985f6ccad43a1621358e1f63ee43dae190d98d9cb8e7d806e2dfefb0ddef08528297df5331054b6b7dc9c7a04a2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551dba659d37c1b3cd0509e3839bd627c
SHA141478c1f2f3cd65d6e1e2b512df01ef54695909e
SHA256ae6ce63f95b4e2cf1bbf578e2cb2abc4f168d1d6cea65893a2e88628a2e333c6
SHA512a2a49d7a763d00bde1d8a001582b766a7a5f788fb1b76eda35dbb0720efa3ba238d8361832d76321b7713d9b89e9a6a1b15405ad45be4ff9ff63c206dab73e5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511a774f5b2836374751d0548f6a763ad
SHA166d02782c7b85605202dd0fe9e8279ab673a1657
SHA2565ea453264064fd1a1f858579c7fad6934e435f4b786b8d19c05271c370119a58
SHA5122628a7c2fa1824ad7b09a3579c520290d78072eb1688e20443dd399a9cc39fb982cba3d7e1b6f8c0819329b4ea4e572bfa09994cef05f5d08eaaf478325fd12f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0c3f99e48a2f054b3fbb8be38788902
SHA1a0884cb7e83021778c2215992f46d1c94ad85e92
SHA2569dfd6d978c7b153016dbe300f0beae7fd24f5cf538987e75a4ccb2ee265e911b
SHA51207edd522313c27378d62e24b673a14cfc5e24c95c5940fa953f43b21e22c43f34f667258a00b5008078feb33814dc83ebaf578b8349f2d02fb885ea468a5175e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b