Analysis
-
max time kernel
138s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 17:49
Static task
static1
Behavioral task
behavioral1
Sample
028ecd5930855e23663e152634e0dde5_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
028ecd5930855e23663e152634e0dde5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
028ecd5930855e23663e152634e0dde5_JaffaCakes118.html
-
Size
40KB
-
MD5
028ecd5930855e23663e152634e0dde5
-
SHA1
9a74a8cc7039e4b2d687aee7c53a4d03c89476b8
-
SHA256
9440a243c3d01abf7fdfd92d32b64d50dfa7cc592789d2bce6f24c6d35eed57e
-
SHA512
aae50a660851e802d5781d2f141b42d448c941fcc7e3a9301f213fa8bd08ccccbba48def9e6dbe6f5cdb5d55a2f1d239e7252323ae15adfd1ad885c745f51a5b
-
SSDEEP
384:+TeY89E6z+qa0OJdsZeRmAbPPIyWt2YCEccbx1JtMtwkYhhvGtVOtMtmwkYhhvna:IcgRFcIzTadDWQ2Yaw75S/A
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6491C571-7F54-11EF-86C1-D60C98DC526F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000091c6bec1af3414ba409763dde332955548d4f1d5300b994b928961e581a3c0b2000000000e8000000002000020000000139b88a3684d4a0eba75e4f5e3718176e22f4d54b4250eeee8c039f8bc6faebf2000000041719472c15dfda6c1ab5ba327c0b4171f1b9ab33fbddeb2f82f3f05270e8a3440000000a649be0cf0f37806d6f084ae7617105aa21a1c1979dc8267ecf6b793d631afea284a0afdd9562b992a92d98beb75290812a1dfdf2047a6dce527e400d1765ef8 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3033d93a6113db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433880459" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1928 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1928 iexplore.exe 1928 iexplore.exe 2220 IEXPLORE.EXE 2220 IEXPLORE.EXE 2220 IEXPLORE.EXE 2220 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1928 wrote to memory of 2220 1928 iexplore.exe 30 PID 1928 wrote to memory of 2220 1928 iexplore.exe 30 PID 1928 wrote to memory of 2220 1928 iexplore.exe 30 PID 1928 wrote to memory of 2220 1928 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\028ecd5930855e23663e152634e0dde5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1928 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5483c0c586c96296bd765fa2b3fbc0263
SHA1599f091f4886581a3e64fef67d757276c475cbec
SHA256b10c43254b3bfda43c56ae47b3e77d01106f66728a70a035dd1c3193cfcf278d
SHA5120767ac3ea5204e80ff56942e046cd326f06c3ef5ceca4aa615179eabdb8d548b29479dbca0e4b8fc4389622eef52ea8f0cb3c4ad514903b8e0fe84426306ff21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589996174fafc5f843b6b7eb19661d972
SHA134166d50d04825f77a82c0e911cc4a7de23743ba
SHA25601f45c5f9ed21772e82c4d7903d44878273cce49405f896cd81648eada172491
SHA5128de45369324dcd9073688f6b3289acc86ffc5fd346ac811921853357c11064dda62d5b9404dd758393d8a9267e00836ce1c1307354ec6a78be95f6262f7d9c00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535a037d97aaed32143c5b0d6388c846e
SHA145e65f5deb0e4518b7901bed1db357da576ed938
SHA256cdb85c572c6f72124f64bbf47a2c250e67d9978eb82d56291619a2fe4b2cdf87
SHA512176d30b15c4dba0940e5eea0d2851c8f6834e555f9696722aa600c7db11e5bd899e61452245fec8b9e960ef5bf3e3855f1a2896b73560a8bff7e24434c52ac21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557136890191e7e1bddc3af3714220b48
SHA1e7c99fb95bc5f6ca8734c97c7419c61b6a129544
SHA25686456146cea1976a4c52eb3c38c17df4786bb33d57e4afa5e2bce5f58d26be98
SHA5121d6a3ac734e887a1f408b462c32901f963e30ecced496ff9741311739e2e03281566911926b2386b3ec103a60c68b5e6cc6ddb32ebdf3030feb3150e772d1485
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533216bc769d024a0a6e8d85825cca2eb
SHA1edfa119ac963bfbfe8bf6a6c84047312c58cd978
SHA2564b7ffa070ff8fa7e1cd41719937f246e1c60bfab63de6377e745d154f3fce2ae
SHA512540bbf404e32e08c807db7438591d4f6fd8c574440bad3938c82832abbe4f232cb6156acd84016c2ecb4478a699d3fde419b0731a8574d3888984cedfb7490c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b94d661a04a6cd2c7c4a70de8c1c7a30
SHA1278b9f42a1f6f42db61aa1b5a21af40bb3dc0d63
SHA256fbeabe8a49dd5347cbe6587ff5efb91460adf962f8dd3a03421b502a43f9ca7b
SHA5125a2d1d261b6e9f1ed2ae00025b6bd232bb82bda297d62ca434a4f141e907936cecd3bdaecde70e335a112fe2d8d28d57c51edfbc62e7333ab1fdf5b8bae15978
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a757df4ccb27f4c923db97ecc610877c
SHA11c4066fe7373d1b3bfcc02918a7d8cdef1dc0c65
SHA256f089239f23e163bc7765719d3a34ef367b463f1fb4185746fcfae77f0d1b074c
SHA5122facddf52145a594eaacaeabca42e64608bd9562dd5fb5289322954198c3f72ffc27f8ce07b2320bc0eedd6a8b64e9732b0feb073f3cbc870b2c7528aca9057f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585de922d48df86a47a92fad706e02500
SHA178098c3f72acb4b57b27440c1c5adf6bac1ef972
SHA256afd166f53beef5ced8f5915c73bbe95cb9cb937b4d40429a7c5f114d6c4afc7a
SHA512085457f071db065e376441c186b49a40a8980c0b91c88d200a3315b5cc584c1532bb163e54bf06e313fa0cf9c4cf1cc486a1f1a553a235fa579c0504bba7e230
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b6a7c5bb958c135a03ff151f94289c6
SHA1ede875d32bca9be167509250fce7b3aad5dd6735
SHA256db4a52b35b1a1d84033d0ad89a4c6963a3b64c3b5289050abe2506a973d752a4
SHA51257a657285caeb6617d29779d37368bb50eeead00c05f0a06c4b4562177de1045d899e71398886381dda33091b51c32a6abe88dfa745893ac2a482998592e51ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d1a573b30a00fc1092411003fe048c6
SHA12e0196b498213ff1952e567580c36b0f238031c8
SHA256f490e4b0b0c70355553555149ea24db3e8190d88883551355ba7906e2e1b0f88
SHA512b7825fd8cae29dd5f845d011e649ac5f1ad7d89174afa78a83d97ee0c1aba891bf493ad04ad0c42e77812851bbb9a92dc4a6e689ccfff37a79fb3c0020a3a2aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0a2128daa7a03ed4bd4c094a15eb6ff
SHA16a24df7bafcebdd8a7edfd5d5850eb7b42de7652
SHA256a96ae0d91eaa18a21be93ed9f5168d36aa2a1b0061dc50b2025245ac2cc5b7dd
SHA512a91dd67b1df38a818a9310002d79fd7e6050190031350633cf58ace69f3824d89a9faf73c1429660914ce438c0198442d0e746f4b03fad19bc9281dbc9afd639
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5359b0d15c8ec3d1a0940249fc66e017e
SHA128ee2cd4ee1f909219143c624f508168576ade8e
SHA256786273993adc203b89c6e20aab347d5ff9500296ae8953a12bc5feb6895ab46b
SHA512955d4ce141fb53a118cb096055637ba32f76e661c64b1176bc3f79e0a1c886d28164a9d299be15bd5e21213cbced5136f48bb1067a6f44e97d6be3a5e2cf92bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffc2ad06645723051c55bb88d57d884e
SHA1ebdb2c2d564f3c55191e45a8efc7051d3c8aca13
SHA256946a90e843e55fcc0f5a53d8380841b759f5ee34042cf8f246fe07159bff5433
SHA512b7cdb957c915c1b545cc891cbd775b04fe710b91c73ba178441d552b9b0d0fbc644d36df8716cee0179901cac7499da9d2c86e292b2105ddb8e89e002671ecbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56967c5769c42d06ef8fee750b604b208
SHA1829fb6253bf58fa727ea2da586bd01ea3b287cfd
SHA2568a66efd93040d95fab1a52bc3efd0d0b39f423d0d00b00478df7fe27f9988c61
SHA51224987dd77db60a69ee5bb9bd76aa175a780f98fa2947f1dce79834c8fea3ab8e0868678b2a78b55d4d804723478db8f6281ed73b2e91c098b989311dbebacdbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523c7df11bc48fa6e3a85ac36aad33b78
SHA15c2812e3a7753fcc3a9586cd5db1ca1e3eebbe40
SHA256e952ae09e25f2f9a02da26c29ef0fb558edcebe91c81d42df8118b415b3106b6
SHA512bbd513e87af5526c64a1428b4dd58a1678cfd1fa88f54d1f7e088f9e8228a6f21fdbe01b70d48579e0dbf116661af00251861d3e2a0ee01dca2d2e3b29656c88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55be8a4454a4fa00f33e3741c62c0b1b2
SHA1d639fdd57c1e0884891f3980f47265fe94760780
SHA2568e468857b15c2c92160be38b77e77902df54bc39f92ede094e9aa6195da07ca6
SHA51260e28975253c9fda24566c6155ba41794cf5513bcb016d89ea4965f0c966246811039a2d836a187c0622e016d165ef22036a97501999f588ea2e127c68e19da9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdae47ed840057a6ab91e097b417af96
SHA181528bcb280927573e507ce7aa31853f778ba670
SHA256e4c9dcdb13f611cd2646eb9e59f04cad66f09b5fa5300e7ce1caba5a1417526d
SHA512526682992d289fcb15e3ae79e3ee3fbc323ab07fcba8702c24c932fd161ddebaaede722e44ae996205627fe7821de506f1eb25b6b5b7bbd37fb9314f64c630c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516720291bfeced909ffcc86cbfc014b3
SHA1daba85cc1ebcaf4c1469ffaad3d4feb6db942432
SHA256b3981453b1c59e0a9246de3b51ebc62002464e0c6ba8761853e25dc7fdfff0ac
SHA512e8c44b51641420aa30c0118751a0e022156643f98146e741322ccc35872a028745cbc2e8ebba2e0becb9f00582e9f56556aabfda7a2addc2f0620d43fa88c309
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c1f179e29d8795484d817de9c591f47
SHA16ddd82916b6e31d84c824cf5ec91ff4700aab907
SHA256520ccc3c891f3f2772e8cde3a643d98a69b852d151724b7b2a759d4579ebda4c
SHA512056198c4aeef1b721a63bbf7e989f5a4f4ab2342c49e47bf6ee4150d7fb96394a76fd245cfa906702e7ce44e82e8d7c6f8f6fe431c3574b8c0ba5ac3d2d33f93
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b