Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 11:41
Static task
static1
Behavioral task
behavioral1
Sample
0121a5a67897cb1552c66c89b7929fcf_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0121a5a67897cb1552c66c89b7929fcf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0121a5a67897cb1552c66c89b7929fcf_JaffaCakes118.html
-
Size
6KB
-
MD5
0121a5a67897cb1552c66c89b7929fcf
-
SHA1
237d1cfd92450a4071fd8f73f6ce25dd8d2e9128
-
SHA256
b27098af07cb14616138f0c6d6ffa414bcf654fa6bc1eafd99a82cc0dbcbbd81
-
SHA512
2734ba06f9df54f59994a2200779559f51289153dd92e2e062f74838d7a928c8ac4e1839db42e8956043818d6c717dcdbb24339117a8b35765ef2972e94bac3a
-
SSDEEP
96:uzVs+ux7dALLY1k9o84d12ef7CSTU3X/6/NcEZ7ru7f:csz7dAAYS/Y4Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000067a85409f8c9f717f741685d4adbd1f0dab24e118efd90437112cda75b0038a8000000000e8000000002000020000000669e926d05d82261d549e70a9a8e816b5509d203756f8eacb5c699703551719190000000ec64863f08014407351ffdb67212db8910c6c507d3a9d40c8e83a569757d81c7e884c9f1370fd1e1e3dbe2380b83889ce7b615b929b628f9da2ff17a601a3c30156edc3d31c8ec2ad445e3f51d2bebc33f79983da0db109d9f22167a05ca17c2558027e5838f9b011aa221d2df8b4f859ff4f3bed606bff643e8fdce25ee34b39623d635dd50fcb90068b68b7ab5b2584000000012429b72f093a67aa153be2b7e10b2a727548e397c54a184f1b4bf15e3f7d8915a7a9d67ecce793f65698f73c8e2b4a592b14ebfc5b6ef74bbc0d5dd48cc2b32 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000004c8ae0f49784d9c09b8d2a6e62fc728fc125ff79a2c7f6aa5e9c1e5a5b322074000000000e8000000002000020000000fb6c6cc01370c5e3b7ddbe4202773a0977c4e6d8f314f7a85b5e6d56eb073f8d200000004e6d80c530f77bcd83e8a45adfbd3e75da44b85c38ecdc8e1cd2ded2fdf7841c400000001dbb5c6a12e2cb6032a9efe24b53a647683e912147d39dfac3981cf7e036528b78664febb5b1e7874b50d3284adce45450f07fa33822f79dae6119f5ab3867ae iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433858340" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0d3a9d32d13db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E496E4F1-7F20-11EF-A444-523A95B0E536} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2528 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2528 iexplore.exe 2528 iexplore.exe 1940 IEXPLORE.EXE 1940 IEXPLORE.EXE 1940 IEXPLORE.EXE 1940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2528 wrote to memory of 1940 2528 iexplore.exe 30 PID 2528 wrote to memory of 1940 2528 iexplore.exe 30 PID 2528 wrote to memory of 1940 2528 iexplore.exe 30 PID 2528 wrote to memory of 1940 2528 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0121a5a67897cb1552c66c89b7929fcf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2528 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad2bcdc974b4833bdb34a92b3962145a
SHA1942e7bdc08e8cc78006ed20eaa33cd1e1ebcf19e
SHA256826499d2f1ef78265068840f62baddcc1f90c64992098edb4dbc2d5edd90be63
SHA512beef11a15caddd2a9d2bd1bb0e3090ff20945daa2b2b89753a8ac05f6670bd5dbb08f1cc35dfe0694198e5b5524383b858ccd47dde152ee0b6d5654fdb569dc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564f2930c64ed889b38242e7e210677d3
SHA1c9021239a13d7f04dcb0660a30212f6235ea3cc9
SHA2565cae8e957891430058e544134437595b8a0b6192e4b04f0de7e73ca9d75eec1c
SHA5128a503f9d387ca8a18f86b5536cc81b45d776947dff5c60a51614a3c134e0ff425cc66edbbe824446aefbbdb44208b2ce1e5367c9b57d789d3041768af1154d6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518e0d1b17936715a5428ad1569306a15
SHA1ac4b06985a66effc1ba9e28f130df014fd34c286
SHA2566f4c7b3623e75934a75df5132ad29a86c1c6d538b740e21ba3afe90fb8b0afd8
SHA5128b738909a2303243898d36bb58df5ef6f3459bb99d1a48362ff87ffdb76908addca73dac25a3370db6af26aadba8940e3ab9c01858fcd363c8de615b619b417e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b856e2e0bd8baf9c371f1c8fb14d98f2
SHA18b173fd95a7bcd28ff9e3483f9ef62802d6f4c39
SHA2569c91412c90ff0a16475841315087a9784988cfff69ecb361e936ce4e84283987
SHA5124f335fd38aa2880393310144542a5d6bf20a59f26d566a197b0030b5d5bfdfb6d1d38e3d368124283b6089568593bb1e6cd69bea8b36c35e94e5730ed34f72d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bee440dd870f8ddaac3826a26db641fa
SHA148da10fd2db0036ef3a7e949c5f48b34ff94595d
SHA2563390c6698d2ada108dff56cec6007c88bdcc4c02e60394f42f92522777f9cb96
SHA512a8daf172b5583a18bf738056b60ec9b5fd449b28329ca820a38d00ed94b94b188c4c03778ba736bebfdd72f49609d279b5163d2283a1a00d64dc95f3455cb060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56715deb71f9b9817756d5c8f03c281f9
SHA1ee952e13ed0ace49f341298681545abd2999e5a1
SHA2561715ac89d46210d2ad27271bed161da906324cc672e664674aa7db6cc6f148a9
SHA5125874d87ce5635dd91b941a0ef9db19ea827f29bfa979ef1b32925213a9865af8247f3b74d8891c09290e133b0486b5a781294cc9d9a0df6ba272c6fbea1561b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5678ceda54c623ae50f98b7a9be8b6042
SHA1118cbad56031a8665d791ca43c7f5a654eab7bed
SHA2566a17ec43fb5da4ec37f7484b20736297d77159642d11f473cd49ccd91cac484a
SHA512d0320fb18ee1e8886eefe75c41ecfe2a3c86aced1692e15077c2c0e0cb36f2455e67376599841d79aac27005df4043f9b52858dacfdbce6fc7782b685238edaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d967a5d164d00bb149a33c9265082d1b
SHA13e5da3d071b2196fa1818d84def5cb3e37de47b6
SHA2566fdba62de347d81209f7509dff73674477498986ff2e7bb8489d2e66e874e8dd
SHA512a089e8774d40d6df3e022f7a32045444479218ffc3133334d9b678d28b0fbd054b5d5d7c5059903ae464e7fba8056b5e783bbd2925bcb59f4c4312e7f2673ec6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565ecac542d714fe82ac70101bf0728af
SHA18ec3180ad8d3b795a81e45ca4d23c06b25cdb341
SHA25693709cb5475389ea0a2b37ea3e82fda67042b3639b6b0a79088c97eb8c9212a5
SHA51255d15e4baa38abfa0f73c5eefffdbc75b6a3d066f92def40beb208f38da161232074e6f3605c02bbee1e4d5a9f620b48e612a70a3d7eb56b47709a5c9ebac133
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5ed2a26fa89773898eb1ddfccdfb8fd
SHA13d3512b62e45121001d2f40485f89bd7f3fbe35d
SHA25602d5c9aacfdbd9907c6e64319e49f297c5b1ec89f09f17240d96d60318af3fa5
SHA5127453079bc19ca630ab094d031395c6ad12ec88d6ce04e3b05341c7737f01d1f7cd14e6d8eb6f7e749b42f87905130de0f38a4e68bb328c5a6968f77eb0a8aff7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526a8e08a26b6d79b90c80c4c308a5008
SHA1d7110f67f71bc7bbb202900a29f1097989ac4164
SHA2568f58aca30051b30cd535f6aa60799359ce44a2c0c9bb927a8787c7c70be156ab
SHA51203ed69759d90ba84a5fe830f244022b5c2782323b58b7f4ca10dd71110f8a3c6d59e56e91dcfaa8b0306ef50dbce6fc2507211e840be635b538d1ceb7a6093c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc07332a9753590b4b6d69a390011d1d
SHA1578ff1d787588a3176e9972a1b8abe871ce5d7df
SHA256de9a12ddaff7907c8ef86ffdcd96c80c23fc4c50d16e6eaf3f58ed696457f7fb
SHA512130879ca8674c979a20dfebb6d80e89ec9e2bcdecd8b1aad8df8a6d2e785a40ab7d73ad8c203514007587c24e22923653fa3acd3c63a392d37dc43a732b11116
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab3362f55a198257789ff044d68da3b5
SHA1372c248486d434cd5fc9946d78686b88edd822bc
SHA256d0aa05af799a8390eb7eb8f96ccfa094c91df551dc7c148176fca84a0a361a96
SHA5120421595ca3003a24ea883689801c26796088af24826cfbfe1c4ffb34b05533e08da39ee214cc78501cea6850083a855629d0b3f7a0e59d644ff70e5601a9dcf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4f6fca4172627970c70f4b915ae4be4
SHA106352f981040a0b267f2d7f4a8771e8607609afa
SHA25684e4dff99434b56683ddd378530c8b9ff27588c7cac9954646619db6951f1e50
SHA512fa227aa693cf973801f2e77fa2ab5d858cb7a013865df81056def1b177862ebc73233fc210009b101eb8840e6f782b9a9bdf16f6ec25f9a0549a381ee9ee9fdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5728a0cffb9e38e656f7aabfaf404c242
SHA17af30e671d0c93e5b705a1d5536ac4925d06fd8e
SHA25607d8add3a66f75028f66fcd7b413d907d628af29226becaac5a10a6061e31302
SHA51228842c1bb633e0b04685c5d055158474d0ec14502446d37787fa6dca37c2262c98e48cb80b4388eb368bddcdfb3cb796c9258af3dffad9b332042882d8fe3e88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d48a1be5044155484d99f798eb3858f9
SHA124ddd4bfbbd78f97409afde7ae0d82a19131f8c1
SHA2560202061fef1e2006614dae0dbf71ee08aca8d4683bb4fdfce6c1285c6943e289
SHA512e519bf882a70020e7f95683d68a2ed6c36df21f8ac37fcdbd7d00845e5756d39959a0cd9c4717bbada4f2f0864e7ebddf09eee8750e0aec3bf4f65a1d57d4df5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e753b55d99b5449a1ebfec13d3c370d3
SHA1d092bef44460c22366cb2ffc61ecc5862053d63a
SHA256b2ef99d73e287cf2f6c8e5c1f3612095a728803651b1726b0ccc425619de9818
SHA51295550074b88b87bafd2da47fb6e25a73c636cc680b983b683047b058eee1abc57459725331d20341c6cb70b4b2b9910bf5bf20984504627dc0e72145a4cb22b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f579cfd72d1cdb8c5a6a593711e0ee49
SHA11f18be5acd0562b2d723b299d57726cc24ae1ff9
SHA2562a7cfb8ca2eeb3c62bc7e3397766c01b5a2dd371225dbda3a69e1e52a3e53a62
SHA512d098f68733552ee8e5cbc3d261a4bf2b963f9ca940ff00d3dbec5be56abc0eb6b4295c1f755da6e23097219d5bd09c044d763ce5edfead49e77cfcc4b2520794
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b