Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 16:13
Static task
static1
Behavioral task
behavioral1
Sample
023931e23131cd899b9e303015715bf2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
023931e23131cd899b9e303015715bf2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
023931e23131cd899b9e303015715bf2_JaffaCakes118.html
-
Size
75KB
-
MD5
023931e23131cd899b9e303015715bf2
-
SHA1
977e3bade1d56d99dfaa3e11a885c0c2f9399148
-
SHA256
b4e50a941dd6464e5816c99c9dbfc194253afa83f10eda91a4eced121e1fcf53
-
SHA512
aae6f6600f78ebd303aab9565615d2d51cf62c045ffb061f63c93bc9914fd37a72eb8bdc8a5831a1ec679b2cc3c9c3ce731572e8708c525f8e3b8df5cf854f9a
-
SSDEEP
1536:SoSouzTVMpxLmACUzZ2wQzRBkFZWJRigGEFhH2csw:SoSfVqaACnTzR4IigGQH2cF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20863edc5313db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000008d35b320981d4329a18a6c9b3521f6e53e9d392c1a4803d4f7f793cc6d4cff12000000000e8000000002000020000000b09aee631ab68d3e44fd215ab23e09bf0dc1ad158be385e9ee639e713e72892e20000000e45ce3bb0aa996e703c44c434339930bde6f96027c89c7833b9600480876f71a400000003205c417118b6f126047de148a8ee987ba1d4acbf5b75af6f98cc29db0a96d750a3cbbaa1a40ac7afd61d98834dd40fd570e533237d44472e6f1909ef7b9e7cb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FF5BA0C1-7F46-11EF-AF16-EA7747D117E6} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433874707" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2252 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2252 iexplore.exe 2252 iexplore.exe 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2668 2252 iexplore.exe 30 PID 2252 wrote to memory of 2668 2252 iexplore.exe 30 PID 2252 wrote to memory of 2668 2252 iexplore.exe 30 PID 2252 wrote to memory of 2668 2252 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\023931e23131cd899b9e303015715bf2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2252 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d5ca0d79d88ab0b1b11e30d83786588
SHA1585cba5e3dd7696262585d5a7b7ff6d88a03bd08
SHA25693404b449755c7e691a1108a40a14fd64ae7ce963bc6c6eb2846108f40bf2e38
SHA512e379bb16522f74958f2a7cf0a9dbf713888b7bfc8de87a2c80466d1a453d2b62204c2b75b00fe5cc4e07af7cc70c73f235c4ea22e14203e125e6694df079646d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542d22368704d0646d133eeef6d59864d
SHA162efab07d8291781d072dad18e3a0ff8e956521a
SHA2563ac90cc9e695cfded0271c87b06d9c16d4dba24fd11cef92b622cb07e240a2e0
SHA51236c41bb2065d5d48e0c9f114bc70ee46d327f4b3d7d349b37e7fb998f23ae5e38192a3661799c12301450c29112dfa296a5cee1495ec6afc50c786645eb7a8a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff5a8bb63b5f687e2b8a1543a20a8206
SHA1c6461b9d5d236b557304077ce69bcc454ba254c0
SHA256d7d04094095997082f71b52d49739ccbddb69b85885aef78c2bd6c59aa09f231
SHA5128cfbecd66b6b7b584300b23f213fd8129cc347d828ec036aad129f7e0f7323c0fc724c31da04d09750a516e9815a518cb33445d4dfe3ed5d87d1bcb3ff94fda0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4cec0d43e9e6503ab25d48352da5c3a
SHA10eb6c28e7c54e3884adc8d3a6942b51a53c3c883
SHA25601b34b9f17982e2d226d7dd9bcb481c531da848418a87c4cfe7d1c1d1e9a6a5d
SHA512bf9b952da7114ecb17f010333c09a391e850aabff9df204439e68e26a8e0244513091d45203ec2ba40e99bab6facffdf313951b5904e9fe8697dd9e7df8f1090
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc766f1df87848d1c6b180a1f0a8a31e
SHA1338ed55c551dedc8fc62f12ea4232d1aabd2a77e
SHA2565a097571e9500cddfd8357096a6983a3766a4e2e74b8d314858986a8ed9cb008
SHA512f1f8dc6e1c9ec907ebd33d91486cad24764127d59114b9c72c26ba6f26d09c7150ad65c605cc5ae7aed4bab1ae377b78feac5e38a7e177554cfeb0073ed5b143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a61093cbc4c311d02a2f28a72cbd50d4
SHA1138b5462f71b34435725f400ae64301b7d0cf95e
SHA256e0263d99c6e2c2324cbd816a58a66595243c58f15f50c551e3c59f7eb8e2e79a
SHA512b0e8872e1af0f4cfe8e4476169e292d54693262443501113ac7a6a3eddc12094ce941a5882e158c48d3130427922595f7b0525bb0e57d11019f82d4543b78fce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee9775bda942399ed3ba729094b3cd5c
SHA1fcc8bff9cc3fc2de3ba58dbc5d447a5770f26dc3
SHA2567b8e38ee1fedb60622180a53f9506932ac16b3bf3cbfd59dc090c37d8f1617f2
SHA512a3c8e2cfbcd39467ddffa26de19062b62a21641db5519f43388b7aeb02ac614c46d0d89d96e9c521f47a1f7c287cb6a8530543dc83b3d9f095fa8391d8c0084d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559de8855af090de8c3deebaab396ca30
SHA1bf0e4138a09522980279490ad4e0eae8bfb171aa
SHA2560c090fc8019cd073a66694c2d05ec497a4f71afb50be080872e7e7ac4a23d9df
SHA5129ea51f7b7e3232bc0d9f0b98d6032489dd5087c1ab828b76051cfbc61533fb25bd018caaa3b63057202838cee6dd066951753c8500bb8333ca330ea4bbb166a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5633d10d2461aa3d7a1a9ca5d08ff87e9
SHA144bebb63cb3a33e00468dc9b7f67e7ea28a1b9a6
SHA25669520d047c5b8fc7f1cf73d74c47fa1475935606dbdb703c1abb6d3d29b3280a
SHA51203d63e87d11eae9e0a4c45a7a6f4f97ea2499045ec1988463e3fa12347ede1e94f8786a336adb9b1149268449478bf386765b1f33d0fe8c98380136bed574f77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5f01a7ed669061063ebef844ae45772
SHA105c679977f880fd63d5ccd1869d5a7849b78266f
SHA25625a6ee3c67e13d29fc311d27b07d5f87b14d8f4aa6fde964353630b3bc7af17b
SHA512df280eeb2d3c6ec5190cf302be407b3224ef5ad9924e8810ed1db25c0c14186442fb661687181495000cff1e958ee2d414138270a5b1c0696758ec9d809bfae8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50065d1a28fba884b23d1a2c4918b31f6
SHA16759cf74609ce20417c105e8c9dfa1047934f532
SHA256933369006a101897f6a201e967b74516306a6a1fb83e39346835dfade1d98eb7
SHA512be1b514a231f7fb86277dc24825146286b028e84ab4c43a12a43563983b6d5bbc24f50cdb75f4af3eecfeb6c4e39107276f4e8a79cf98c35e8ddedca9295ce19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0b0385ae1a9b501522f77c02a2f019c
SHA1e9edbf606c0b9d5dccd578f60aaae5c7f80794eb
SHA256142a7f7f356f8ae91c0ee7592513eba0554c3aed2cae607d470c1403ef259a74
SHA512c48b6e4363ee619f3b92127a72431e7588933bbc14c9dd23a7a8d039f28173ed81eaa425d3b717d1815f087a83a0cf11e5b2404e4e03e1024c5ee28ce1d92c82
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b