Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 00:00
Static task
static1
Behavioral task
behavioral1
Sample
f71e9d934ac399487bad602acef259df_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f71e9d934ac399487bad602acef259df_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f71e9d934ac399487bad602acef259df_JaffaCakes118.html
-
Size
27KB
-
MD5
f71e9d934ac399487bad602acef259df
-
SHA1
52b9f725d93b723d895346d81a0277a01e0075b0
-
SHA256
3b3cfd5af87a4d2ed401352e62fa8e14311a8a25d92f9bfda63759b885d73127
-
SHA512
f8d91dde768208a958b79f0118415a1d8d86533dab96e9adceb612ec95b5de522badd0e2d577adae5224b22cd66ce8778c8525f53b88884a8860bbedb602e22a
-
SSDEEP
384:x53H8mf53H8mf53H8mKZfQfGuCjhPtXw0wZw3TZ:x538W538W538lIGdjhPRw0wZw39
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000002793fab887e456b9e047945bff9e738c2a062af4adf4ed9fc8dfb0eecb1a082b000000000e80000000020000200000001dec38cc775cd160a45f7f9986689feef839b7669900c5c88e5340a2e112a66920000000e2156028fe62f28df2c73f12b1826038099f6e4d4d6f96f60bc66b1169231564400000001e335d60962a52a64720a8be37bdf7fc89ee7762f077d6d19f850cb379357d733ab24a501dc6fe5c7426dd046e67c759578926d2e06d77c6cb8fda24e8a3f7d7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433470715" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{62B67F11-7B9A-11EF-9630-523A95B0E536} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a04d753ba70fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2564 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2564 iexplore.exe 2564 iexplore.exe 1144 IEXPLORE.EXE 1144 IEXPLORE.EXE 1144 IEXPLORE.EXE 1144 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2564 wrote to memory of 1144 2564 iexplore.exe 30 PID 2564 wrote to memory of 1144 2564 iexplore.exe 30 PID 2564 wrote to memory of 1144 2564 iexplore.exe 30 PID 2564 wrote to memory of 1144 2564 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f71e9d934ac399487bad602acef259df_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2564 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b53dc15738fe736729e67257015a5b83
SHA14eaa77e5aa53efcd6bb02b1ee41e7916faff3c28
SHA2567325d582c14d5bb5eaff221ec3403d70dadedd4c1cb5c8edcf99f2b3ab21dfe5
SHA512add9a8e4942cb2f6e453e3f82d721d423026102b813bd4841f1565d190cab4c1a0ac78c005508fc0c4e38d9c23f327438f6d091b0cfc709be84bb27aefa2e8e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5308b5d46e986fb42a501c1f77e3d0826
SHA1a3736b5153921867850ece7c4dbd2ea09f582ae3
SHA256cae8c2c3d7c957ccbe2c7e74838c2630797143cf2bac8106c486b59eb033eefd
SHA512625021d638dc5c2aa81c575d2c6aefd7b065bae36630607e5be69394972ac4a6e80c78311f592a1fe2873e87c7a8ee11936c0ea90a3ebba8547f60b565e8921e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5220bdc925a02ccf3c0dfc7ab722c8cfb
SHA1407be766c6dd6116cab736015fd080c18ef90466
SHA2568ef9e69125b0609ca44fcb926e4af7a2b2fe4a8d1e241490314957d5aeb6ce6d
SHA5128edd84fd550e0300474266faa4d788c3c771ce2e930c988282811ac3993a4c4d5d3326caaee5e95fe38065c6b9f98d3fba53ffef7e54264d1f97619a2d7e0694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bddff0507d48e94ace36f5d244c15bf
SHA142747e8a913c6e03b2044394d65762e43d3ff67e
SHA25608cd41a183c3b187d2645af355ae9d239a97838359b337193d4008fea41280ae
SHA512c9012b1d06c94a92bde06b757dedfda3b9ce79125a477921b59c81d41af0e103a816ea2bd231d51fa47d18e9bdadc1678a894201f396f64a5b58d375bcd86433
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5743d51ce437ca57fabf1de9324156701
SHA1c47b5a491beb52a795a182a95043110e7265a1d9
SHA256e3678bdf97a9639686f7bbeea9394c567659b5dc3430c6fa569d152af4ea7907
SHA512631b246e7b1f67e6cb33a012a666303a6d65359146a246290d7b0164754770a84c8d2e2704bd563ce01919a1a8ef3217a47142d752e4dc41f41aeef3c458a547
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ec69cce3bb5ab8d0ce478c5267e7326
SHA1dec07d7ddd591e8d4c07f0756ca2832542b8f839
SHA25673d1e099067b1478f86d1393d15be95e4480f0f5236f7af450447f6404684d65
SHA51234fa77c22e6831b2b1a2a628c5d3d6e765e3c21519fc066a5160ebb4598fd58d03cc6a7c83961f6c74b5a4bf9f9d70adcef8e6da1edf0c509def82d307bd6976
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a2d64efcd7868b80251129eb18f1297
SHA16c8651e767c6f026f2f5e331389c0a10a1bc306e
SHA256b46415366374ca5e477cd21ac5b152f343c0e52a4bf923d332808903c0842126
SHA5123e86ded91640ef040e55a763828c70493128876ab15a1f7e4249f6ca894606b8186656756fdc30f35ab2e11a26ba8a4e16823e8c422141a8e7db12fb92f77240
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea34b55c8ab5e1517b5e09c0527e82ea
SHA120bedb400bfa0e38da063850aeda6502ca3dd47f
SHA25618f21e545c13f5795bddf63e24be72fbeecb457f178c4dce23008e7505d6a140
SHA5126caa37ddb8bbf98d4a3b85fbd61a67001c6575c58a6bb645e95559b9ff3527ae27275913485879dfb881b0c77119f0a0fe6e05907df1527e7e269e4837d4d292
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5987e16e77d098db775698ce15c422483
SHA1ec5b7944d7ec8e8726a9d2a567ea62dd84049d2d
SHA256af61409cf14a90190fb3553d5ef9e9f59a9bb89fc345526fe75204f3ef3a3b71
SHA512efd353075489087db52acfeb04921742fc00e6c30810f3ed6acce14e0f1a39eaf7398f5a1ce7bfec0283de0d235157ab18a9eab83bf90428af4054c2d0055481
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528a2f68afead1baaa3485e6fa86c2081
SHA184de40cb1994cd2fc5fd10a6d5db40081e0110f1
SHA25657690b5214874f54c5dbf6869533007aedf4b8cf237c73e81cb25382d0a6f5f6
SHA512ec31fc60386eba96d1348a373f6d4eab4fa81f498d5a81eba85f03a127ea39b33eaafe11f6808bd1b7f2567af6aee5864da73f1866e778f997ce317597400b64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c386ca2fd9d86e9e6bd55f72cb64953b
SHA18995baa6957e62025664d5e91e14c7091a5cf1bd
SHA256f717fa0892b6c041df391e71246eccad2d161ddf8925b8afd549a1c8211cb5f3
SHA51252ca637dd26951e994f709abc6b7d4b46387ff3359982f467667ba2df831d6677c3555ecd3874da7e9094f494bc94205379332a4b88d1e0b9d328d1c0c87b876
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b47685cbb9f6a985f98ee17291017ea
SHA1860bbfac3f687520227ba099a0e87f330e798af8
SHA25607933be28a4fd2461bf1f0e09391dbdb0e0d52fc2ea22efac39b31394ace4955
SHA512242aca2d0cd76d30eb41391a1b7bf3845f5fd21df3afb8e3d73beb490b675eb9dbe9fe55f6b1c34aabddd5c699568b806341ccf48a37235249d414b04df152d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a3fbebb68997ff920999503e10d40fa
SHA14d0a370277f0ccdb82625901d7e8387ea275c001
SHA2561c3192c9f4c6320f87d16de148cfa0393c35aae5e5d92bbec1996782e69934f7
SHA51278f9b3412c46231484661be51634d3a83b8320a48a8f4913c24da684040effc700cb0dfc7562a564cde562094de8a805be72c837da8d856daeb15ba55317d5f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576bd3ede6b132085f02f0ee0c88f6173
SHA1adee73e4be497064b64c8de64106c9ed03698825
SHA256140ca58701b1e156b09d351577be99fbe61df7470d14dd18be5d97ae0d9da499
SHA512dc2df08da3c639e00a19ea296cb360e18dc6e8d274b20801439d192fd0608d5e24ea9d5ab4cb32db925245070f71e6359d2c7396b402bded59d45b8210c34e8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58113b51c8e48a029fe3c28eb6a9ba001
SHA1005c71a031b8329513e21dc991024efc805efbe8
SHA256707e57b63418c192c5e9677030071dc8096b8c5e18fc197b7015e0cd3286645d
SHA51284263290aed599a9d9f24fdb200bcba43c8fb58b53ab393048150fe9c180daeee8beec10023ec481c402900c5cd2fe2ae88ce3bbc3e11387ae2f71cfbc7ca089
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8034366e6c178cd702505f2bbf1819e
SHA1871815c4cb3a3bae26c2cab59651b86e316027dc
SHA2560670d7d615556394d10bce9c6a61c9b65b86eac50ee9bd9495319c5ffeb21afa
SHA512a148ca9de7d5d4742513299d29084a61089bc203e7ef4cf81b00d48ef805bf170d5cec77087d292e1e78196bd51fb90cf43c27e476c7534d49a7953c7b660b89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d82f2d133153f1237165b530d68631a
SHA140a0b4917deebac8bccd5bff1a863ad509350602
SHA2569529e7cd466be2058cc89b0e512d391fc1f8612baadb658ef2dfb6c48800c8c9
SHA5124b66cfe1d70f0ec61269524907d951700d477ca4429c4b93c977ae02d07c8f92332717a8b68ae035d5663beb2becd2c8c8f9dc66d3af07d0439a2bbd8d5d3eb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549577eea1868937a1a5a24152da7c9b3
SHA1957af0a9e212351649f1900625a43ed51d27d02f
SHA256afd7880086552058652d8080d38b5024e220a86e4b0f7286b5d3d5e3675f88ab
SHA51268225491fbe8a3c4383a646d328927eaf8acee91240207a6d0e6c29091275f10529bf82637777924c97f0e8923c109fb7f1caafc0220dae5182fc4ae3c7a1557
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fe9585f22f863b6ae6b2e7672814b0e
SHA111f8da9379dadfddcf823eca311d666f0e280297
SHA2563fa8b3f2587eaba271d48a6cfd4e1844295cf567b4b602e699df807d00000013
SHA512fca98e2450224547fbd36c2226226481a69702645f90fe4e3fc01d218e2051ff8c59b5f229782718f0fa3996e6f04de6f6d2120b2d933b7914beef3e97695038
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b