Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 06:35
Static task
static1
Behavioral task
behavioral1
Sample
04b561a5807e05332c50597acbdbb4dc_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
04b561a5807e05332c50597acbdbb4dc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
04b561a5807e05332c50597acbdbb4dc_JaffaCakes118.html
-
Size
22KB
-
MD5
04b561a5807e05332c50597acbdbb4dc
-
SHA1
2e10697912e20e54c9c51be2086243936b5f54aa
-
SHA256
885dffc06b134670c84d162d77bb9addc084c105e2cdcdd466ea0c1718394694
-
SHA512
023e0dca5738326810682bf7a01626a235eed087a30912c337d0d7d6443924ed3f3cf59262402b02ce8015c98c6ff4426c9b09696b9b7bd8e0dddfd73c6f9c82
-
SSDEEP
192:RJ0b08A05o706+0d0C0D07Q0ab5nY0G0z020Q0n0u0/0S0n060P0X0ZnQjLntQ/2:qDoXfQ/AiU
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7076c72bcc13db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5594D101-7FBF-11EF-B4B0-E62D5E492327} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433926390" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000e6fbb1a004414166da0191aad4dcc432886860d9ec1fd23b160674e4064627a0000000000e8000000002000020000000c73e4a4abb2e4e2ce58537dbdf4461be1e31b4c768fe01769b326970758b1ad72000000072db0e9cf732ab3fa7cabb28395efd178d27136cb1b810ddf5b21da1018467d540000000739a1409d081b9b4b48ff9c965dba5ce397ac16cef707e7df762c8add51a10d0a3f850e0b9a7f103905a49b546eefe60787b03a6a0bee9f00082f5237e47a721 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2384 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2384 iexplore.exe 2384 iexplore.exe 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2912 2384 iexplore.exe 31 PID 2384 wrote to memory of 2912 2384 iexplore.exe 31 PID 2384 wrote to memory of 2912 2384 iexplore.exe 31 PID 2384 wrote to memory of 2912 2384 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\04b561a5807e05332c50597acbdbb4dc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2384 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8f35231b0ddef412329e6360f52ba9b
SHA16da3bbaef39ded3a0c4bf896866fec2d64fbb86e
SHA256b455455027575cf579913bc834b27ed3799d7a2b8474d53d8439a9c5ac396334
SHA51219390bb73c015d850b19730f293930dc7ea1ad7a90e77b8a0b101f17306f684c6b9e479f41ab1ff5b1c4352bfc7c35d2f48c871b380fdc60082e878fedeb8149
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584cd06d45034a77af4ff1b94031e1fac
SHA116d1355afdf6e3bc27757acc3f054a34ceefe2b4
SHA256f3ca17d355f5e9fb7611be36d02c70f33536d5b23120940235005e8804fe7c28
SHA5121099808ace63a544b558c23d4b29538e859e5ee8cb3742fc69283b3960b9ab7a9208245a3ce99184ff747e6421bc5dadfd8c6d2c550237d90a7f7264571c13ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57768475c2da90d8de9c5f73092bc6fb8
SHA192d86f2c01d1a678b7a11cc77a3719bcd25242e1
SHA256e1a47db8422a4438b8e8fedc8b3f6658e8697791d93f73cee4e39e239b7eb384
SHA512c99cc3a53da8a49e836a85e285d372e29e928eee21f0eebfdad0e9210cf10f4f40c0c335f822d8b06bc8adbe8c0f5f182f37c146ee4777c66be47cdcc6d98f5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a269ea63f9761cd88bc2fc9b4660e82f
SHA1f7df35265a7234f96b63907eb682ab32418c3abb
SHA256285131988936d46d2f6b69dbc4e4563b1aab530c0ae890454b13093bafbc579f
SHA512383e2003e2a7a3e8d9d908868bce7a1b6a51679a438632e08e509b35bf5a66b08ff7d489a1e49a73838e984751176373a48c7d15d190b9d858d2eb85a5ee5cec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566e3cf94e527575094f56ad024dcb8f7
SHA11c373ea78a9a80bda187776c4ab69a1a6dbbd387
SHA256fb0ba66304137d140f9360ce709448c219d8307e7e2e866557c5104f527ff074
SHA5123e1716a92cb7c28c458a04d3fd3469781f937c148cd0cc92a30b41e78d8f99f8bb992be4e439a92448fad2d4dad8d8586b948409efe32007cd6d7b806ede2aec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a95f27b888203069001729ffc457d074
SHA1bf6777cd377c7aa46f0dd352f08ab7667211cb93
SHA2566d23824f92fd40e9f391eef0fed33c329acdd3762c677b8ecac55dec29e5b5b5
SHA51246edd804f721ed5ce273c3f5dc82eb5dd40bc5d7eab4177ecab2673c635833d633964c4f054e2c9fa6a7fa65a709a63865f02738c5ffb47316c3a312de75412a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad4f39b78daf290c2ccb9c9060af2e11
SHA15f0315f1571c00d27a1fe02c1d2a64155ee5b913
SHA2566a8c858ab2fe6389d046c977cb09d438ff9fe753794268d9d01d7aa068c34d8b
SHA51291f74907345178106b1276b1d029845b2b7e3b83af3d89857a965944dd88f842a95fbfa80798ea22d06fd2d84043b79ffc462561e09f7a5d01bfb49e772e484c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb925c1b0f3cec5d4c39a87bd8c5aabc
SHA147537c3cfaea8561756a18324773c5ed8a45eff4
SHA256cb6730411067a27dcf587a89ef3524319d61e964d3aa0a5fe0c65280ad35197d
SHA5129b5a8b0704793aa6840ce633fb6d1f35d7aed0ce55dff0220b5adcc7a5560acf00372a09e2d00b0001bb7c59f2dc879aff2a3824e11fdcb00447941009396707
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57287e63e2e2326a997ce049652490355
SHA13e544abdc03a3c7c738876db8905bf5561cdc53d
SHA256b6f8ef121f84be25937f5350572c080d5c26dae7b933eab3354c20afcddbaaa6
SHA5129e86f35fdb9217c9b029c54966bb042416490bd6ff5a0df55b36f1f1dd5df1d96a9f333accd56d99543bf07921666ec1c9e75420a378326ba559382d9d1ed1c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d12f8452cfc0ee6178ddc15f76baed01
SHA1294c341dbc227115f1c5c886b3c67885ef1099c5
SHA2560292da57fd24de85cb4a36c7ebe803a23a3c5f06ac2db6fcc14a4221ad82d812
SHA512d3dba9543bc8ca9dd28ea8b25daa2a6ffb5cf2bd2111dbfbb6983eb6fa6e74d46c4214e5e68f4645a6a6610a51b143bcf9650b873c7bc9a3242ef0078216f390
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524a50bf770d3552fddf703f3fad7e5a4
SHA18dc9acde7e1989057c45e18a440f74c3e2f74cf0
SHA256511763181c578f936ef788504e43faaa217271fada3969906ebf98e46bfc0ea6
SHA51252506bf9d2524360c28d0565f7f2406a223d8dafa33cb2241a8a038b8f07012fbb2d569e748e0a66cd33a9420d7f8db3b410956339eff85e9fd4e8704e3a250c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bf86c8256ca165902ef5443d5111b45
SHA129e9056136e4d3e8abbbddc448168bb40768d984
SHA256e98d9c7c60e46a247e7ee4e26bd7cd042f99a0b0b39468b67f42e248ecf1300e
SHA5128f8046e6a8291e83c3651d0165fd9639610059ff3383c2e81d78e18ac13ba4f172c0db790d152c531a476949d486f856d5a20a464ede874c4ff22b21e19511e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570b71a19029fba80010c3ea9dd8a4ad6
SHA1f71c05963dd71b6a2790fa1a7aa52c8d4b2228e1
SHA256cf9d6b3e87b17018acbed27ee57ae44297451e8376e55f93ee6421e78169b9bd
SHA512c96eba368a4c00e89291efa89e713855c42367b12ecd0d267ae995daa9af25a72f0d64f225e3ff275e0a0e9bcba6838c3df9b292e0c036cf17e9924ad60d5973
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576d06730afad155ac73b394396d455fa
SHA14293115fbc414b3009aceef54e2111273735cf02
SHA256e6620c7d0696331fa9264b99240e14b458ca00a7eea627aa1ca37726f225dc18
SHA512a54be7a8c9b91b405295a234bc7fd5674ee2427dd4e0630e5da668268bb7cf57bdaec98d25d20133c3516cc573d4acdbe089d4db1f82dcda544222589ab5b82a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d3cdec7333b65d6a9ab60efa777daf1
SHA1d9c11d7ad1930c523b5abd48e38cbe3a6107901d
SHA256974ff68a72a9b71c97409cefdeb2bc4090d59b87ad46ec14849a74881c7d0d0a
SHA512dc1d422a7dc5a1235d8f40e230b991519f000c61564bee89d2ee7bc88ae7e7dc35a4f7cccbbb2dd0f189da9d9d15e31d2f9c89d851c563d2c9c0d6cf3e2b8022
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c19e13e6929c25994c9473a73e54301
SHA1387467a1d64e691a458c0ae7405d009180ce746a
SHA2565b5315e8b075d302ec7bf80490024a1c5a27969557c94a7563a99ce1a16fe760
SHA512901b9decd2af40af5a1389bf2f6f2d458afcc81bcc416bfecd000297d355cebf48518468abac4ae7d9ff7f6e88474061b2134796ff7429325b97dca179a09587
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5597b710afe04b2134e0cf852a32ce1f0
SHA1ba96c4162d706147893165f82bfbdfeb4cb605d6
SHA2563c6b0144e87ab4466027087e3e5afa388300f315888fe25b8c84a5e5f0bc7170
SHA51277f63eac1588ff3948a6ade9b8176c154359b6c3388940aa298e39559ddd8bd6878f269f3e3b092d095725157a76770f8e3a89c66bcd5f57abc22a80c57d36e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f59295c4723c1d1fa639234a8fbe875
SHA1f36b937a65d6a663ca8435e539dc383e475c62e6
SHA256478363804ebfdbea30513350c7fc4bcd901de23bef730ed195e77fef824d8069
SHA5121aeae1a3bf816b117d1f7ff66de543429e9b1771b34c078a64de64b0eea2ae7e61c21def13e32e22cdead2f39f298a88bbeb9ca789885d3cec557c35633a0fc8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b