Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 09:40
Static task
static1
Behavioral task
behavioral1
Sample
00ac3e2fb7db50498372e1ab0b8a10dd_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
00ac3e2fb7db50498372e1ab0b8a10dd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
00ac3e2fb7db50498372e1ab0b8a10dd_JaffaCakes118.html
-
Size
8KB
-
MD5
00ac3e2fb7db50498372e1ab0b8a10dd
-
SHA1
3093237ba5a17b1cfae43a82e6af8d457dd600b8
-
SHA256
86360e92ce9620c8718bab16b56d1d40bcf4dab52ba7f376dfb0f8f5cb6bec03
-
SHA512
c2f956ba39f032d85dfdb765242952aeefd8d5d317547b20035688b2096cb1dffaf79c9d1449bc9bd995eb45a006d560b3f502e34f0879787dce85841bbe5dfd
-
SSDEEP
192:iTtnBfb2KncihHrUoOAEXBMt+3+/W4SHul20NX:stn9b2KDrUoZiBgSOPX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40d2a7e31c13db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000053a865554f43374026de9dbcea6325259b649f50e072cd14ef296fa407bd9e53000000000e800000000200002000000034e657a4a4330a32828487182fecd79797d6e2a903373d1710a50335330ea66d20000000e232ab5b91fd28dfe15b63d1ceef73a4f5ac007de9723406b1b6eb76042525ba400000002f0cf065a2129d489713b119d1c1ecbe652746ae47ad31a3ca727ab275363013b9be36f4619bafb2f74faefdbff6a82d301c649c559beb7dd061cdc6e77416d8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0D686B31-7F10-11EF-8C85-523A95B0E536} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433851106" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2148 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2148 iexplore.exe 2148 iexplore.exe 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2400 2148 iexplore.exe 30 PID 2148 wrote to memory of 2400 2148 iexplore.exe 30 PID 2148 wrote to memory of 2400 2148 iexplore.exe 30 PID 2148 wrote to memory of 2400 2148 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\00ac3e2fb7db50498372e1ab0b8a10dd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2148 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f9d3b68c5f5fbea0747bf169b1ba672
SHA13409c2ad5e7f3f2ed6c4ee987be5f11fc08508b8
SHA2567904bb84b6d04f4297fa606251436fd624ffe743dc445c1ad728c70f71baec96
SHA512ad3fcd2ac87c9e2748ce1a4fae6e99892acbd5a8fbaacfafae8e628040b72bd45c607c2266754538fb891e5225474b92d1699fd968ff11cd884932fbeacf624b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513c66dc0be1a019eec4f27ba82f891e2
SHA142d0cffb8086560920c4c445926700e38c9ade33
SHA256a423aff365130f39d45552f9f5c02df86179f0c330b113eed026e5ac1523642b
SHA512113b4e9af96a0e549d8af9aa2dd317a37e94ac7553ce12eaa424468a76154f76f18a1b2b4b0230d84bd650c14f3840c2e27bc8de7b716e6bab9d25b50ed1ff3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b00019bcdf34466e262d51513dfe0a07
SHA155cc60b07f706f34d3b0d4a0a69a68afb164ea3f
SHA2561983368bf71cd9048da768e33709818d0a3c2d894d2818dd62a7fb3b3ed1b8f4
SHA5129a37489cfdb1f072c6bf65f5e051a98da37c51f963ed1c2494e76f8259de567c2f67d94571da1b4ce2563615e6456d25c19082fea0fe19d1c420728076992d3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd32f6d9f2998c942d9b7a401727d1e7
SHA152d7be9b54f7ac3d74d68300f610da055ed96ef0
SHA2561f2d2eefadd72b4fdea8708106fd929559b6ed11d3e18258f22d7612dc503fff
SHA51290b4074343a1a1d911a0b4e66bad85428bd0d5cdb8aa2c0b388464f9f957a5cfb74ee30c0a6d038647d2e2c31d2e4ca2fdc4e38bd32e984d242906eeb33c4e23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590f3cfbbcff07751efdbb617541ce9cf
SHA1e10d4202ab9e2b9553be6c1619dcec6c4b8d1c45
SHA256556e9d3af6a294a6bf9b92c30d1bd2ba5f280307b785028db4bfee81c45b59b8
SHA512e2b153502c62f3618dab6e6b6d68dc205ac6ad070a14f8f38fc886306c6b6414563fa59a07949aef9879972613d8db95dc129b4155541c55609088837c87286b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a24e259d5218d8d2fe51e0d50ecc221a
SHA1ee67321e91afd5cc2cfa0b380197b596b74a61a3
SHA256597fee1dd4e15fe8951063b53bd12b4366a8eb3bb6f48d6704930c5e02c4712c
SHA512fd817122f7ea8e1b0cef1e3c5a1dc357e856bf463a5723cb34c1906f29bc4bbc6d7d6bee1037b6180487888b1e1d1f1402b9a488749f362ac52f0c6727dbdcbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf0a42ff3ea6377a36f78f10ddd102e2
SHA148bc8cc2e08a3960c591248f90eeecdfe4630d01
SHA2568888c8c86c39ae908100a66cc64b9ef4787e41558ddeebd3665f8f5d96209b64
SHA51296b0e1c1805106f1d89681256e6d356f392b3d99255bcf5423b40239fd1cf11d3966d37eabc9e38b8633c7e03015ff9b2780035794b86b7e31241fe918831732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5092d16f100d3d4aeaef1f6d05c4baa46
SHA151d7060ea0338580dc99070f20596b00de801ecc
SHA25663d0fbd66abd9e6fa8975029a206f7e630cdbb2ea62397d8597f0f7c766b0865
SHA512ac4c40edf319128359a8a4bbc8bc746f31757fafb7a33734f0133f1d48a025325cbec025ed161df7b9b7e74795021d9ef3032f986236424f2a94b2c6b02fcc35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d5d58bd5a1a31f187514a937298ed4f
SHA10f200c866e1c5014a5ae53c2ea629874f2cc4b7c
SHA2560400ace4c072940eb75e9a612ad6a1d5b125974cd35ff521336b1fdb6f1dfb92
SHA512acd716beb873ada8720297d23919fec7fd4b3ce4e80afe855ede749da098530885ecb6ad0be7aa79885fe55b06c09c42faa2c796b34040d31ddcfd723e46963c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564138670a2503b74567c1f124f804a1e
SHA1640b058891b4806e47c4b85654527900614a81ba
SHA256cf06b1a9930afbf1de141cf697534d022e9b627cdf243eada284ea6431ff8bff
SHA512d673c4ee7384453233a72ca7a3fe1a15dbc39b5cb444f4c77a6f8da6b91581e368a5eca34e614bbed3f558386a8bb661bc9625a8a9d3660866b69086d47adb59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c63a8b57f56cc4751e02a5d93da54fc
SHA1e6e91fb89230382b0a99246d6dcaefdc03900b1f
SHA25685263e3879ae3417cc82c2cf7d96c7d91898eaf69f5b087fa6128c100c7fd91d
SHA51271de9cb6e89a47d57d4287ab1a1a903223777367c2f5014d902840bfc1ea330e9a005ba8bca9bee7c8a3ead6748de78bc6ae38e804e744f87149f7adee1a99e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa6a07b8e084ad018a66168c1778cfa2
SHA128dcf0fed307c5e0bdb35f3c47f30cd6bc780ed4
SHA2569a0c06d6dc6ea8d4448a904d4d690cb1bdf47ef6b5614f00bc6a35161a793623
SHA5121ccff2864b0aabebca267f2712bb744c6d24b3d7509e925641ff4bb8c6b3deb658b64b86abe088d8efa6031d01e29e08b1f99578410aa7c1421a074d40cf2c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5607bc33b704175abe361620b616cce1b
SHA11b501fdd077846913e387a794591e9013aade26e
SHA2568d83c450af00a72f3362cd228ba31a8ed9db93cbdd22459b427f18fec3e81cfc
SHA512f632b551ba4467120e5a6e21620c6f8617d67b7cc9116e773b9e9484f5f83f7c30fd3a58036630c9eeef98defcd32fc8cc39ef546c9fa470907744fecc46e143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50eaf9b962624b4f0af6ef314535e2f72
SHA114808f9aae9f1ea0c6de439bc5cf150f416c7273
SHA256ebeb0067d147f1fdd2a0102c0c2c0701887de896c71eabed34d7cf2fb84ada8c
SHA512462041e1397f423598b788ba140d0d809c8d6d48a0f50ee0eab2fa6b334c11fef1e5a84f635ff23e60bd3a5c1ace3ec564d926b425f20a2c77223e65c3d4a33e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585570ed9af2b4f5915e7391934531728
SHA17a3ef9d5a68ae651397e1c69c486870c11462924
SHA256373ffe7fa03095bce9d25cf6605fd9cb670e0f26ba29a73016b7413aa57f8543
SHA512678f3eef4d48aab4b152e409c111c9a932597491871556e779e38ad41677a1227424838652711d1ed967c7a1de86b87b2bde72286b5b6b11d10dfd0349c862d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbf49402426c198c53ce2df8cdf43c69
SHA10f0d873d1307c6637bf69932aebdad4125fab174
SHA256d42af591669abad0a49cb0998965fab81bf117c58a845a2a019a91e22fb4de6f
SHA5127007838342d7f56aa573e6bffd8b91a23efe947e46645518159dab561b33eb05aa7bd4fa3490e1262f7a2a5f8857d0c5c1768a67dce3c55e968ca6e71f7fc7eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af70871c3f825a102fa09fdfc2164538
SHA1d2be1550c2c4b968e4aeb5fc56432b0e25483ad1
SHA2561dacc6af61355fc65f01f5cf9a836ff3866390160975e1de368da1885c5fd56d
SHA512139e976a8e4dfc48ca7e3aed6467886cfdaebf1f0bbc690be865d7d1149c528ec10e92eb725f453e3cce9abdcd9479b6e75a77bb6de513b34ce7ddf53c915979
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4dda3644deeed0b15b3ad23aca2b183
SHA1196e86b0a773e9ac07e857b05abebe0f22366811
SHA2562d694e0626e5b431267c5a7aa29779bd3f27a779d359e49773b92714db5d229c
SHA5125820fbb1e3dd6473ace0ca399d786877123616fcc6657a662b3098fede46d18dd3315169c3e2cf78e0f9366383b117d74bb12bb4308755fc00b0fe9a1eb7eeef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fedc0cd3995418d543d4ef6c56591836
SHA1e0e0a5575619a800505fbfd7024da6086538ba94
SHA2561bbc44a5fd118033d80762a41f6951952e8fd6301294ca0ab21ac09039e74485
SHA5121ba633b76e60767ce8818d69f03554d066b0bec9f7267b2cac253bf93059902641ea6029caeef196364912dcc7979e71e357a82e29855245bede3baefd414d53
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b