Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 08:23
Static task
static1
Behavioral task
behavioral1
Sample
1291a1a0392c3de763f927abf53a24fe_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1291a1a0392c3de763f927abf53a24fe_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
1291a1a0392c3de763f927abf53a24fe_JaffaCakes118.html
-
Size
29KB
-
MD5
1291a1a0392c3de763f927abf53a24fe
-
SHA1
5633294d2e270cdac5a71e9a534a0cdc0ef4212e
-
SHA256
f93f7130ec8415d1ccd447cc55e00e620bd81cfa04b572b1926b71b40c69cf86
-
SHA512
a0e53e8808cb7df1cdf5daf8e19ab9026dc907d6f939bea39db98720f3d24e73063db2e5e62e0295460c1949ec8634bc72ab12ad952a2b308234e1280a461787
-
SSDEEP
768:4R7begSUzvxUMC/nqja99Vlr2oGrUN5q1pNe46I/ZVPaY66mgjG:4R7begSUzvxUYja99Vlr2BrUN5q1pNe1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 903d8dd53616db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FE4791E1-8229-11EF-BA23-C60424AAF5E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000004d06f4263366c630285df0917fd51bb50328681bdd12efb35cd84fedc3716da2000000000e80000000020000200000000e096fecb8817882b06407f25be25e491b9e0f4f6353b2711f649faf7b122d3b20000000662cd5ec0677a821760eb7808d6d57c53fb6237de61bf2e2ddd16e5d99ff9a1e4000000059e47f888bc5d51f3925305b8d6a44ce40c7f1ea4b381d2a4efdaba243db3755d2fc57e92eb935c589d62ede6f6dfe76e953925dc5c28887a7c2f1cc80d3a031 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434192102" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1968 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1968 iexplore.exe 1968 iexplore.exe 1592 IEXPLORE.EXE 1592 IEXPLORE.EXE 1592 IEXPLORE.EXE 1592 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1968 wrote to memory of 1592 1968 iexplore.exe 30 PID 1968 wrote to memory of 1592 1968 iexplore.exe 30 PID 1968 wrote to memory of 1592 1968 iexplore.exe 30 PID 1968 wrote to memory of 1592 1968 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1291a1a0392c3de763f927abf53a24fe_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1968 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e62d054314d6d61861fa5eda4d4e0340
SHA1799157780fda1ec68d9b4c3991c8027fb39a854d
SHA2568bc08ba251c875ec47db1e0a36990298470d6ce4a447f0cd63d5a304b581a26d
SHA512e094f84fdd3ecea89e44af3db42333198c7b14e80e06f4028092cbb4e8debb6da919e1901d22e486249400f2cafe31f63f5cdd4bf41769612736df926ce8d4a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fb38bc6641831e90d8027e0bb0686c7
SHA197f5bb86f1bbb3ca0b60917a9f0f761c1125c8b9
SHA25625a201e76b3ec345ef8abf0020a75648811aee33a1364b2fc333d95d4da95d87
SHA51260a1fe3f37a0bdabed610c47ddb212fde758ee76d1af9fe466b7cfabaf1fe4fda791f26acb1a279576d9577229e9e271969408050fc0f6f5de332206fdfc3e5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5825a5226067123ac424cab3eb9e9125a
SHA12c6a4dd299fa173d4a54c1aed4943ac678a6681c
SHA256a1820e4058fd6673ac2bc55393d83436cd9274db56ca2637b8d700b77ba2c52f
SHA512f3f79ed6a980fa355226293219a670e480cc15cb0b81ffab8d59af36cd5b793eb7d040f270f10fc51aa7d26a2b92d454f800bdd465e88f15e58733eb9a312d92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5972a44ab7b409ce7f7612813cbc5c58f
SHA1f9f613c4c13950f962f4860023bfd4ba1817406c
SHA2568641ccd3d52694f619b081627fd625df6d4197b5107fcebfc4b61214372299ba
SHA512f3d051c45b43dcec250275ad1c4eb31efb10c63dc1095edbc822720a1145bcf5785418b79a52c69f45be80fd175ad36b37152081db71e87e3afd46cda4f93153
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e842f97c74a5284817e16150eabd931c
SHA11cc40a341c7a5c370e263527b128056e78830305
SHA256fa1993f4b47266d9ba72f63aa2e3f637ce79a8c56525e567a261dd4fda5c8991
SHA512ea1d053c225023118da0a61410797f02af26160c238ef17150bcae632b71126e72650f6e9d64a9d015503188c6015a5de46dc7a0fe3b360d87a3ec5ac6078cc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a21382a8892e9fa6b1034659f9ff9ad5
SHA1d16370fd94930cc856db6a6702948100827f631d
SHA256e25ce7f59d8b04ac16ea4cee9b1ceba8cfc3ae3f64788c7eeb6c34f83ba4f9e4
SHA512ded8f1bf0469d010eae39b78d34834b85a337010967849919b7694a73819ecb78ff1dba3479b05d2aad105fb43182f73ec9dbc3c9f20ae8f2c2c70483027161e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a9216483256e75537733674eff64aba
SHA16a1ab6f76003f3c75b02860f70b636371b2d9adb
SHA256f445850464dd38864c1bb08074b1d3fbf9362c7ee590e7775415788a8ff427d5
SHA512cf31d77afdb2e64af1824baac8c2f793fbc780030bced97c2c78ca037fea5dbe3eb4e260070223155cbc7ce07e10b963f9197f7bcb240156a347061c6282c829
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59380f9643dd8dd9f7de2a6ce4a5ef13f
SHA1d6fb56980594f0ed0f931078fe8896e41a65a5ea
SHA256b18b6cc9c3daea1aac8ef1ae64980ce166d3ab32bc21fdf4c87f958fd3e4ca28
SHA512ddc90cb57eb4c56fbf8c8f466344ea7bc2b23240a1c8f293f880a3508b66561e8e0ea734d524ff8e2fa0a6fb0e61fa6309d92485fe53307cc7fe817c25af9701
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b31b36406da5d92f536ad1d1910c9635
SHA1a3c20cd06129c4a034dc1b2961c92d5be4d73ed3
SHA256894638774c12d1bb43946fa07e13125307af47d219a34650bfa61553fb1f85ba
SHA512d0ba53b5583cd414905b93d54058fe8a7e12b688291e0de66e47dc7446d2ef955ac0e0d4e6b9332769db97a4b889792406523b9a049fb4f5c3da34e5c761c5a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1104b855e8d07c857b198c10e620f85
SHA1274a7ea7c4f2512d05ca034804acf242796bee73
SHA25644fb58df35f71bcc808122fb75eeda12df7e9007a4a7733f47faa3bba79367b2
SHA5126c0e435427bae2fcf5acde589ef0b43b2cf6d9e43fb23577012859738fe90eea60e6cb126b478ccc03864f67806e7b63db096f3f990736cce981db04f1f54fd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50031f3e6cd7743c31f0ae9a2cc4f440c
SHA1bc24a323c47d698ddfa5f2e1eb2c87d83328aed9
SHA256061113b671a0f990ff30ec55ae4e6ef4c5f9c47dea242af48db9fab3b1c3dc73
SHA512b809039892be4bd1eee59c32c570a60a92c32391d2ea5207933e80bc166d1a19effc6140931ff76f986340a52cbd308d4fd301ddd3380ce9daaad8bf294b0fa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5621ced62748c968facc0b754efe2a7a9
SHA1c0ad178fc9912a9e954d23eefa648918753751a0
SHA256b79364d7587bc668f10fa64f4a7e361823b5dd6b0e2ede90f4a3d0e4a14ac5cc
SHA512ed09ae60f32ae3e958ebad8c65d301e3b75784b7dc0cdfcf22171d07f93fc7f558c8b12abe4d9a5011f49154cc5487f067ebe364a966ef1a1d2bda4b23b20e88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533c4a0f7734ee9909a2e94fd78edb538
SHA1b78ab5662bcac5f8a093b7b515f647de570c44d7
SHA256bee89eae4eb31cbf33092aa4be32164ce31e5716b34f806046831882aa1f7860
SHA512e44853e9824712210aad8da09e4233f31ffb3e5adf40dc5f5e44666a45b1d64fe2325280aded3d21e4243439eb99f3100566630ed182126b28e7d9e00d1b2446
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ead59f90d80098596055ee7ddf59d31
SHA1ea5669b5f91c5323bfa9e8a9cc0b28d2bb7b1871
SHA256b4ed560008cc214e9683f6dc4081e03003d3b9094286a0e4d5601f79ee906f5b
SHA5128a63211516374f3f4528a03ed55dac4175062e38b8b4781cf6895a0d357103a49805c2a705890998c466485d84f4156d0cbbf3efaa338a2e822b085bbadaeed0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fbb9fa232bad4669b46296fc0723e76
SHA1839fda41988aa7ceca6da1e2bc14226f406c5a96
SHA25612a42c44b6b53f737e8ca375b556377a57ca76e065dd01f48ab6b0c6ae2e956e
SHA51209be3f434dcda1e8b6284afa640d9eb6027d62d8afabe1287d01080d3fa9530f596edc59323755a4fa818b8b48c58ffea16f46481bf100a70efa515c55e15cbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7c6ebd43fffae8b3b427dc830d6907f
SHA1183c80f60eec891f3f8c0775ce05ef3bee1fd144
SHA256d45cbfede1835595c5662090d9bf514f6d6529217291617a4985a7e11b43ee6f
SHA512d303f963d21657718e60d0527abf95fd0d387caf96d598347add9c7fffc9aba98f5b1348cb50d1e14a2789942744d2b7019c41b67af694b54f32065eea687ca5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d34d0d13256e83afb29f7c63724948f0
SHA1da184c629ba35089d77dadab4ba5d266162e8d3f
SHA256453a1bdb51f05aedeb210c2db725e4d0615ac84aa687d474a4bbd55f0748567c
SHA512f77eaccfdca385a84a0d77bc71d511975fe324a1ae3576b7d538931c8e36a2e11e20d8faf79d6b3147ff7d80029c3702d27ca2c0e740d51aba2bfb9c1449bc69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c421a01c342e17312e099b0fc783044d
SHA156ecc23dbbf595dfa9016fa9cac4fa28a07af495
SHA2567ae3e018082b6ca356e22e1282d1ea2dc80a0a9278eb15078b45f8a6c7077f11
SHA512a25218d400b766bc7761d627c7d78ab7bb756c4c5ec1896ba36f15b6e89bc03f64e5a1daa9db0b46c3ab8cab62efdc9720f5b54dbe865dbad8e79d314951fb69
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b