Analysis
-
max time kernel
143s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 17:55
Static task
static1
Behavioral task
behavioral1
Sample
06d07d0c652264ec44de3e6bb0a2f20a_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
06d07d0c652264ec44de3e6bb0a2f20a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
06d07d0c652264ec44de3e6bb0a2f20a_JaffaCakes118.html
-
Size
139KB
-
MD5
06d07d0c652264ec44de3e6bb0a2f20a
-
SHA1
d40270ff2ae832574cbb5ea87fcac3ff199a0cd8
-
SHA256
b4e231c231bbe153788d992165fa4c430876a4636d45bb939cc156119f30326d
-
SHA512
56d0e626207b54e4cfdee509e7079eb091cafda3c1b033e2c730fe5d9fe893f365919de78abc812360168d1467db8cfc154ee3a36d11e73bef0db177f32097b6
-
SSDEEP
1536:SxN0l42lWQWrre7nMERlcTyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09M:Sx5pyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb90000000002000000000010660000000100002000000008834be0c67f438f32f48c052afe2894e83aee7abfcf47ca95006cf898d168ab000000000e8000000002000020000000619b31a5f8f64bdc7a1833c305ecad433e399916c8026895879495e5c11dfbaa20000000f12bb204615e38c44e7c5b32c73c76a21e80816ec1eee214ec4781f93d2cb10440000000cca9c2dab3577f726ddd5ba7551bcd9df2f410c478eea07e64c91ef94f366a5f9d1ffe5c0ec9a75dff93e976b8610a56c2a908c90b3d8c43e77733d8da2cab3b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433967228" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6B845E91-801E-11EF-A4C8-72E661693B4A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 507847832b14db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2584 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2584 iexplore.exe 2584 iexplore.exe 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2584 wrote to memory of 2424 2584 iexplore.exe 30 PID 2584 wrote to memory of 2424 2584 iexplore.exe 30 PID 2584 wrote to memory of 2424 2584 iexplore.exe 30 PID 2584 wrote to memory of 2424 2584 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\06d07d0c652264ec44de3e6bb0a2f20a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2584 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7e72af8471106778a4d7c0dc5b72017
SHA15a8cfac4915933b5422d99ba55d87709afb231ba
SHA25668c0c2d858167edd875bb3f9fcc0e97a281bc0a29180d45394302aa3716f19cd
SHA512d7bd74831ea5496fb363e91697103c881f22f47ae3cd819c588a6bff17beddf4a560eadc825ffdb55d8dd82e490b0eb29fa2ebb595cea9eb6c5764a1baf4d5ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555415ec3c6d5e779cc031ca8d011b59f
SHA154c8642534fe9d664367beb2735ac9d6d114fe63
SHA25693314b0310ec784de8be5355f4641e1463d57c1d521d4a4260adb1e17e36f960
SHA512117e269a104c17062ed128bb7c12dc5b43eb6caf21ea4c8c16914dc8854b2f9c4970780be92c40092898fc7e10b8a9b1673760ba7b0066940f615d6e031aa2ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57038780c97cd45f3250dd770be58fc6e
SHA1a2b365f7ac7812cad44407edd55f9f3c3b5eec90
SHA256f4a6679e5ea2b89f34cab21214f08ee64d9e1d9ae28b815b622b80974962ffe0
SHA5124587a76aa7ef664e0ad1aaf4ad22e93233bf59f9492c7c78102bc7767623e942f12abbb81568ec6394ae07e49c37ccf61d009e08b7bc1c5f3169d23c307eb41e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c179c8c94cc54d44867e4e31855f836d
SHA1236e9769b4e1d0287db70c8ca354b6f0b6d885a7
SHA256c02309af21c88032c8a8695942fc6cb13be2b41a970cd0414dedbf63dcf59e4e
SHA512b5a992ceeb91d4e7d35fc5b5ebbe08904a96e940e4eb63556df998d8f9e8c2dcdbf7b6f7bef71c4eab9e1d8992aac2dfe7142cee161a9f1375507c6ba9359c3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56466bf41ead6ee5d33a6f00e465b944b
SHA18a87b501a85a7f4a9efbdea22cab427e68949cc0
SHA2566c826a72d61312d1de6e9aae0199c11122dcfb31511b351b26cd192fe6f9b067
SHA51288a84f469f217448157f365cbe41b3a685d109ba68bfe5e75587769c46847dca3d29d672307cd8a5e2e0082d072c7d702f704d32eca28ac8c067d6d0267f0c8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7be1a28210411e8944ccf4ab8d60d20
SHA1a18449913b0672b7f3cf45bf0ebed80bf28dfbb1
SHA256df48015c92365240a0b905a692ec646142318db0f342eb5e3f8f1a809cfcf730
SHA512f90d57b139484e43f6c39590a6ba9ac2bcc1a5311b9eb0ddb51cfa7d9930f315407f5e35ffa52dcd5856b4ce6b3b28c1e8db106b0b8b20eb3c01cb69414419e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a953905bc557cc7e1bd975ee91fcf615
SHA1a879a349a80e9b405031a24e577b4b514f0c5e07
SHA256de8df83d3d52c8107e25fb065812ed19641f80fb37c8be5e6881e7af6a46ba74
SHA51248d8ed2e7992a66426671b8c948d22c000b25cbfd1de0cd792a6afa1ba017d23e6f3703e40aed2f08d0dd780050e13c2c94d933c2c3abe18d7b2738967ccf34d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598a5d43bc98f6e8f426d33805e2f2182
SHA1634fd31178949b8a13353498f43c97adfdc43a09
SHA256ec510dd0a9ae3412899f072e625ea5a6485246fdf2e8880a24fe13d1ead43d42
SHA5124bbdcc117256a3b5da568f730bdd8175d53f68438bce9030f246ee2bdb558a03af34a6a77788498f46ea226dc44a2cea1d454e269020057776eeb844ab20aa0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb1b14c72c3fabf72ef16e2a5337baf3
SHA1ca58a36aeff5cd30ce02e69cc5a19676dad13627
SHA2565a3435113c00b83ec8f2530b4309d6147656df430f5ca3d8217b2d3affe2e3e1
SHA512476a6abfa0e995ec900d3eb3037c4b0b2af1d5d15d953dd513bba73dbf84718934fa9664414e19a5ec621bdbfdb70d94d6a29079ccc4926af87b9ed9ab9043ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9fe3f28a665135a362e96cce0bfc9c1
SHA1bf23d5d8a9481443f9939f8547e26ef438f993b0
SHA2567a2f9de8da41ea4fed4ef332fab61b633b93cf2e718c1d7624ee2e3a0e794fe8
SHA512dba122a56b00c10e6697599613a9f0a7776a495f04a3a848c3df865c476f7405001d90621771e5945d229b2d627131f67b4059814de35691735e3d97a8458b12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b61d30dddbc9ecb0364cb53bbd53cd0
SHA1375d08ec7f522acee72fe40b0f1e357db006db70
SHA256250d350a228ab15734b1c69ba3b4461a4b837248a6e71ccf367480f19890a77c
SHA5122b3b90559ca7c6e88b3b06724a4d5438eaa8700fe49f898cc807ddd53959d7df608b678923d8b8cb17e47fccdcb25c31a15d6f034b03935dec00fa3488785006
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb619f387a21a476c534eb2175251d48
SHA1a26aa6ea9a5b1c0602ff907535ac411eba996f8e
SHA256079693d91953b809397451fd6fdc42ad1d628c8e5ee7af0cd2de750bb080ef42
SHA51225b175d456a06248f21deff1c1b4febf6a61283cf4af3b08ec5512b98156ef0b9836324e0e576f54e94fd08dfd02a0ff7be11ab9c1ce24062a6ae78f35a030a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58767ea6e4373af09bf7ced404576bb0f
SHA10efe298fc94bca267874e2635a4e49a65a10c7c0
SHA256239753b89908a298628d97ba05c441e96a75e73dbdfc392219714aec47f28f0e
SHA512098b5358da30c5438f421cf18039b48e0f7f1dd1128707dc5d983272ffe216c4cef7640db37ba6174d70e12f5dc00685ec36de3032fce9dec28e6ff2edc940b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fb31c442369a3454b46747a9335f35a
SHA19545d2ec6177a9912315144e3d823a76f6b4bd6c
SHA256d00b23c44eeec50f6abf083a8afa0b2d1fa92bdbcf59c1302ec54f6f7d502ac5
SHA51229f419701364c3814519e90f560fa32c719ea79762a04709ebc8b0809b468f1c5ba5b8cc5c2a5e53fdd2a6eefd257552571889231274ffeb508ffbf18eea8798
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547b52b7e9d6637637992b49ec026562b
SHA19dde959b944c9f61054ed4460832b48a98ca4210
SHA25636a2448d0b9b9655122c5b744a3b032a9b330b987a5a9653b54ba5011f822bdc
SHA512da3aed4a6879695a309dbe2c6b965b182b42a1c1281211f2cf3321823f257dc1d9e66834cd2d916caf3a5de261bd1ebee021ff6f2ce262d8943d92b779122fc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539834c0d60d3a8ced2197a1e069725c4
SHA19a0676ba58ca0452d983030c205c8ccc20e70f2f
SHA256fc3079aaa0511d41c496e4ef364c73a49cfa176b7d53996943b02b11afdb8162
SHA5121719ad3183ed6da812d9d6a5849a33ff39acc9f781ceab236be1c50e01911e987eb00a95ac9f0ebebe80217fec79d57f0cd4c43c012dc44a4cfad728ffc1a3fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51deaab78d7988baf04384e7b6257c039
SHA1542260daf97a1bff3a7337b42dabc41a8d6a5335
SHA2563f21bda8c2223b61a07a7142181c6ddd81959d58c1d7e8e55815aa9c8a222a29
SHA512dfa6e1eb2dacf52247221b4daa33e53c443b295231f9f70ec2fc77878a3452753afc9837a5e0f57695893b887a7a2017fe7cf4e1736288d650f2da9b9c9fc944
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561b4b98fb303111d4a343168852e6dc4
SHA1a6e33e8db10259f67b6a9b83ba4798b39e842b99
SHA256afc7568f23875c3a8c5a1580b7926e829c45e1f3131623914a55e21a6663e844
SHA51236fc929f2d825c0a432c996b210654fbb2242ed75fab41dab5a3716089bec54b03c1a557220384b40b29c05a5e2dc8ff5591561dcb90b8d7a75cc08eca2f1d1b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b