Analysis
-
max time kernel
69s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 19:59
Static task
static1
Behavioral task
behavioral1
Sample
030c234ed57b26ce53bfb9ff6a11fa9a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
030c234ed57b26ce53bfb9ff6a11fa9a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
030c234ed57b26ce53bfb9ff6a11fa9a_JaffaCakes118.html
-
Size
12KB
-
MD5
030c234ed57b26ce53bfb9ff6a11fa9a
-
SHA1
c52621be9ca4293e9f940238ee3e77c2a78311a8
-
SHA256
14e56405ad909ab2823169b513ebf9c52fd4fe6e99a86fe33d8a8e6b5ef76ec0
-
SHA512
606f539c31f2f175cb229215c9a4cd97ae7ceac874873970c9054f81e7113e587c7442aec4c08aff5aa00ad214f5d9c36ca0e6bd70952115617de5dec06efb15
-
SSDEEP
384:MfUCfMSEz5hld6rTyv6Rb+nQKrlibQmYMH/pMF1E:stQgyvCAdhi8yfpe1E
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000bd13046f1ba3bc1d92bb24b85398de75e732d19dcec1e1dd95ad0cddd7e199b9000000000e800000000200002000000017da24064de0ba6d5327bebe90f916ad5251541ca7e99bb17f8c1384416bb4f9200000002bc7e5e4c1c6150871afe15c10bbfe441cfbbea1876c04a346ba24e8bb700ad240000000ce4a90d0222b6c19bf2f72193812be610d4ecb6f97fa8a4685bec6018ee74ffaa922dd0ccad71f0c178edffce221389b3e51704c69afb1196fd7ff6b0951f2e2 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7BC15411-7F66-11EF-8595-E61828AB23DD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000810b1767f342bd3c6f7dcb5c3a675dd74ebe8c5269665ded1cfc79309c08bb53000000000e8000000002000020000000a6f47e270d1dbabf43e2798b433672dfdce806889e4c426763feb726af17b29e9000000012bd61e0fcbec6c6887f0f5fc21c65092efff497b8e8e19b6bab2cb8835a5d1f9005ff71b2d414bbfbdefe2fdabece2f3586e7a2bac527ee580cad711a621aa49555951a089fdae7358374f1ff08e4d4c6184adcae545003f73b66735127ad60eadbb521a4993d8aa755b2128dfb54ccfcf5b193d8d25bbee03228d4fb0ad073d33fe4f5a582210cec2fab424ec44bc24000000030f8060ac5c0b33883902ff8245875eedc7b827a0e126b2eb62e588f7eaf56369cbba54655452ac1b177714f7f388db662e6ebf566512a30af7a7cc8c216916a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433888231" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 208cf9507313db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2956 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2956 iexplore.exe 2956 iexplore.exe 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2760 2956 iexplore.exe 29 PID 2956 wrote to memory of 2760 2956 iexplore.exe 29 PID 2956 wrote to memory of 2760 2956 iexplore.exe 29 PID 2956 wrote to memory of 2760 2956 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\030c234ed57b26ce53bfb9ff6a11fa9a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2956 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507381d0eb20a9ae40fb75674dc494032
SHA18675895b5f33ca8000674a3aaf7452fd550ea701
SHA2561509ef7921a44a5efba46c5b6cc8f17443427bf1f48acc4b9005706eedf69ff6
SHA5129c13e77a8682d59600bc6120427d231e06af480fd5360c05b143fc55e0c2a9b8bf1776845cac9a436533bf0678114450253bde18df4adbe0a9ede789d7efc563
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d87703c7a07a4317ba43c1245afb274
SHA17d12552d68169a132de1da288ef1ff176a45df85
SHA2567fbff23cb70dcd9511dc61f8b17f9fd07c5dc15b13428506a0fff7b6c2db3cd8
SHA5129ce36f0fa3961dcf438ca31a44a99274a34c59acb0744017051698688cdf97357b403e4202c12c8c09b271f89cac4e83f847548c4484c4dd05ed71b2f9a5c618
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52454f7c4732c749ff72b2e11ec5ff6cb
SHA18d5446972617014fae8337eb5c2b7a0a078a2658
SHA25677397c919ae3ab4983289feffd45a66cf2a757c842b6b819757feaf5ddaaa5e6
SHA5122c3ab697638243d7a33d2d5b16328d667b862c0054e003ca0216a55a2727f1d331b1cce0b592cf3c9cb634e0dc08dcac707159bfbfcfab0bdb32687398febc8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a3590e2fc60ff797a5e4b56555532d9
SHA1a92327b427271943622a617a0997770e173417f0
SHA2565e9ac4a754397054d196dd61d9f30ba4c89cf41b77e87d2b58b0b9871572c8f0
SHA5128d260b33c6a3d029e30ffc1acdba85e62070ee727873515edb3239dcfd9fca8e7eddb5683c9892dc45b679288e921ccd46edcbb14e39c2bba7f3c4afa2e0f1d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffa75c593f6d392f318a4a431286067a
SHA112fba7fee1ad755386fd3f65157dfa8607bf912a
SHA2561b13192273f0101917329ad95840d13e039691815facf425da3f5a72f8d8f742
SHA512f14d29052c31ec335345a4d801972c3ee5a1d4b98e070f7d8ea0fee1702ee0ecc6a5c3ec92ed1d66eb131d5e960ef18b85c1915e6a7877bb928a5c7dc73afff6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592ceed9a7df399928f9225a4b59c2479
SHA16d840df7a6c2401896ca796ee45350dd2b810063
SHA2561363bc8bfe43bf49048978c901d337da005bea559dab587c014d8c20f8614325
SHA5122b6e5363f68d8e426325f17bf1a1f95c37a893db1c366f80fb951d81ef7a5c7778e5c95f1734501bbb21c704e71a683c76a251b4b2eec4833128896b975c2bfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5828196dadfc9dad6e2ffb14947000dca
SHA14f20034e4bcb351818f17c50fe672ef9d3712f75
SHA25608447f76ae4bd27953f664022fff9c4bb5c2bda353258292e387dc5952310d18
SHA5121543e103bb9a075db4ec7da1d2f602f9d6ff0810c90179f32ac66b74ad96ec508864d65e57669718588a4b769a1c440a1c28b4fde0afb88c54e9ffabab6e721b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57213af7eda79f789158797478ea77466
SHA1c348e4f936a1a6ebc9cc857b99e7351e746cf3b0
SHA256427fc4042dc84f63c302a01677489148c1d6d7ea8b42bae2f0a64526f9fad986
SHA5123692d2e90111f48e8963e18a61c7680b2b15d4dccc1474d62b0f85f8006a21efc4188b95da0ceffaa412ef905bb87aab6b9190f8b8c0a84fff679cd3d8b4a66c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d01b30faa54de64364d0f1cc72129a39
SHA14bbefc5c414b056bed665b7ea394304743d4d307
SHA2564ea7d6eca4976ead1ff97cc8ab67e96fe5a99b44a94bcfc23290eb6a9dcba7e0
SHA5122e123130691c1a191bb4e934ac9aa2ff0b15d93186826b2675eac85b392e1b38312d3b7f7c8be9d6a8c237c6bf12e553c3394f7b626fc2d6e0dd2b6b8a9a63f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cabb3420e5d5dfedfbcd6e80a6bd2741
SHA1791f3738a70c26127101406e80f50bb1979e300c
SHA25680bd1f0cb510c8237d5cea498ee1f6292db55e26115bb52c2193a209e17dd0a4
SHA512ccb089e996a3413f7cf62ed86c3fa7fe521270e9db96785922011b96278f96cee1bd8a516d226806afe03bfa71820bab06aaa399158b66d4b85efca6166cd16d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c21f447acbe0f9700a58b17f015c8cf4
SHA1e21b59e545f75d42e5febbbad7a959f2f196578a
SHA25600a88590a4c9b2b5887f83f91b3bb02785ac5f836ded86a494747c154231b938
SHA512fbbbba79024051fd5596687dd4f4a39b82dfc47096b50d65c373b97ee778463a1e6abf99d004c2c6198cfe5918642b889f48e1334a7eadf60e966ebc31644986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a8287d5ccace91025b20fcace57ceb0
SHA18ffa47f4b977a51fc95d77f1a79c90c69af71ff0
SHA2561021f5d4e96ef74466f05b1801982e99a1a8983d0d7bcce254f5a9560bdb418c
SHA5127177f4fb7f33d692b67aa8d8ebdb940a927ff11df0a28189a2cc8b9759a92b7eaffbf38a80bedc9220dadb1210d38992ad2bc641f7ed2b9182ae4d3ca9b0eb7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5549eda82e8cf2df89ea6fd6f0b954d8f
SHA1a01aa9a1723e533f82aae28a3629328ee6f240de
SHA256bc8688d9f76ea9a1b40c747cf84b224132b7dfdacd5a9323b36ccacf79d35073
SHA5128ad697b62b3b61ff4843d336d13b36600c97da67b387042a9c2945cadc3f36340a6dae3b9452f05a696f5f336961b6b8531a7e0b955f9317818f8072aeabc4c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5095c169fdc57d0888f6c0dc0f89df7d6
SHA14191e06ce261c01a84efe18b125d2e1ed95c8b64
SHA25658625dd9b5d28c70e545b09f62b03e57c781f7824fc721d3d249f3da41c2880e
SHA5125bd4d27e93b9d67f9584a177f87c5af7b07386042da344cb5f56c1031219e171509cae9983dd915c0ff3103b75e1668b6e7320a820352e2a9dfe5c641a05bc3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e02ed7774770a6c59abb396e74223538
SHA18677fe8a1bdf4bf09934c44bcf4d2ce67c4ac914
SHA256414aa5c7ffc69bb70ee74dfee64f96a9aea379e817e65eeceda0cf33449a9159
SHA5127a87639df843534e1bbeb3d4658248e17323294faddaff8091c356c24ef361e722c23fa28d4fb87ded9729027dbdf1cf031aec82274865c6c909874dd256be45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5b07caa2dcdcf4c41d901e0a944caf1
SHA1cf880543c5bbed7bae89fb1ef389650576058841
SHA2565419149e2b49c37082a6330b6871bc7f483cbd99f002b0c68f0c0d813d9de6d6
SHA512d9de73a2e49604ab105c29d6b79245362c2fe02f63a67777da869dff65e6f6c417bd248b37d06da5f0dbed335d6b7dce806bef5b95ea31b39a8f83b5b491c842
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc10bbdd5fcdd267200a9a5ff8613244
SHA1b20b57e6c5707d9fbd993a343a88e44d80e2a936
SHA256b91381d1e8e39800bce8481bcbede206ce298512cc0ed2e0ce4bb69df3c84839
SHA5120efcc356195ea73150af16b2b7f09e227a77a1186679c25912004ba87ff9cf483f8358b1cf789213fce4a4be8f733c359178a2e109a9adbed757bfa5375faa75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abf7f9a832eb2eb1cc2acac73a846111
SHA135a1b3f012dd85856ea1e79d71fa78d74c20c0fd
SHA2560563b17cb927b479fa29fe0e0a4fadfb2a4b24ae418c4498c27df1d964697f03
SHA5125c335d0cb2110bf4d234001c157c7d94b67664b5c5b0bbfdffc958b3dbd7908484a15ec3f5947b6bd8c66162cd9f79b6508553c4adae7a7765f67223e8419e00
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b