Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 12:50
Static task
static1
Behavioral task
behavioral1
Sample
136d2337a445f108473b67245da753e3_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
136d2337a445f108473b67245da753e3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
136d2337a445f108473b67245da753e3_JaffaCakes118.html
-
Size
10KB
-
MD5
136d2337a445f108473b67245da753e3
-
SHA1
1e4e7dc9509b062848109bc9528c67f50a7d0f4a
-
SHA256
9bd0c33e5612f978b4fe738349f612778560a34710c45bee811525c4965b8882
-
SHA512
85760165ce1d0ec4987cf0b22f0537f094f56be21f8e3c93da36e48bfbf8e4d2cbe124f3444305c56c30ee1f95b363b8991343aa86262bcbba0eadd8a7135bdd
-
SSDEEP
96:uzVs+ux7clXLLY1k9o84d12ef7CSTUwGT/kzUp889+ssZMKuKHlVHcEZ7ru7f:csz7cFAYS/1W8VZMNOPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{475AC121-824F-11EF-8E5A-6EB28AAB65BF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434208115" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 705c5e1c5c16db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000002aeae0d4dddfcc05b2e24e4f170901ae179644adb0cf49cb78ee34a7ef975705000000000e8000000002000020000000d97ebb0213d552f1defa75430c37c274b68db34095cb41cee2207f97eb7e18182000000041c518246cc5b49a0ec174d73fd6c3394b2bf75141350561fd6cc1e5feaf764f40000000f4e24cf2482b60d0de21efe8384a423072c7c9846beeaac377be0e48dca825fcbd43790fde960bc426fba0efc363fc3e9a333469065968bc76a4466c00e3bebb iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000005697f9276bab690ec88432e3ce296adf4648fb403ecaa8bbf657c3a48afad32e000000000e800000000200002000000035243746134252cc2db44997a848f67f9de1945fa714b0258962eb05b136eee490000000a71613ea12e0caba2fc858cc3163a48b7273fd728d66fa3ce78866121a7c4be562889498fb8d4ede6f85eb353d3c75c655c7c0afe6ecd4268710df13dc8d913667f0246c91b8cbf6a512a243ad7968f240b5745644debfd6ee3c9d2aff9bab44851a7fe7496dd8955e51d149f39ec291d5c91c90d875f4ee9100b6f419d77142e6ad4335c22fbd4eb3dfc4ad9384fc3c4000000083bfac4ec1e540f014b55c5665a2d0ba4a443eeb5b52ccb0e3c290c8e1cc58261c2adc7bec9e107382a2438bca011efb0efd3ec70e0058d461a4252ac997972c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2876 iexplore.exe 2876 iexplore.exe 2268 IEXPLORE.EXE 2268 IEXPLORE.EXE 2268 IEXPLORE.EXE 2268 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2268 2876 iexplore.exe 29 PID 2876 wrote to memory of 2268 2876 iexplore.exe 29 PID 2876 wrote to memory of 2268 2876 iexplore.exe 29 PID 2876 wrote to memory of 2268 2876 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\136d2337a445f108473b67245da753e3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a038fb69098fd0c190befc112e28381
SHA1f60c5c91d4ef2d941d1c9622ec4025b3dda7d3ab
SHA256e2e6cb615b9abf0ea2bf28dc925b3509bc69d2ae6fdb341400ed912bd759caed
SHA5129688b40a14225636b37023b7f57ac12ee14d3fb47b556f06d65eb8146ebfa2e69362d8e95e70339d2ef8c823b2cb0065a2e427f04db173f0d18d9d6e7be73a7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54737db58e290b351f44a0d3a1fec113a
SHA190702d1ca16c7eb7ca9bb1bd7ddb3eb203353d5b
SHA256422a228d18c567af0b4aa332e4cc4ab4a9152aee6b5b3da1e487773a6785c1e4
SHA51215bc21ab3a98bed7e164f202b59cc9db3e8d245d7ea94cd1ea1ceb4d5368ce1122a0d6fa336c93ecc805e7e8a89dcbeb71e71a66cd15e840abde08109d25d8c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5618efad7cc1ce49373e619b7ea4107cb
SHA16112bf7a1de6195c5d662c26fd0e8c26039a39fc
SHA256e18a5aa5b48305858a63fe05429a0c6b826bbb72b167cdd078e358f169bcede6
SHA51247ef580a51fd58a53462c956ac4f96186323e5fb464e608100eaab97a89347cad3fad3f5f4829e19979925607973af78898b0221ac9063294f4df7c78de3228b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517e31e4ba6b544b777b71bdffaff8bcd
SHA1e2633195f6cdbd3fe0a928e3c759c362cdd9743e
SHA2568de37919a795309ed6c58585e72a64af7665628167e9fb9197987b452779cbd2
SHA51215beb89e01e6091a7de18a4faf6a3fdb2b1dce9c63a9666288b7a89988251a4def5b6f8c6f7c04d14633d7640824a8425006a0d59acef36044c0d1ef6945278a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d374983534373ae5c4a3d132b3e912c
SHA1c24cc6b980c064bdde713d676406ee5c6cbdfca0
SHA256a51a285527acefc142a0387be82131748793aebd65251e614c30c6f19c43c727
SHA512290b28b034ef81935ffbe223828de8cf1a9d30b97b1cb4b2ddc512d9ef36c448d32ea84aa47e57f2d34c45d4b684f64f40023bc6cf52ea8d2909df20ae2b6f30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b4762e608c4df7dfd704b80f95c6dbe
SHA190e29abb6c61604d6f71251b129d797525d754fa
SHA25629193fc7700490a040f9c42d5e6e43b692041fd307e0c019443915ce1a4bc359
SHA512a9f63220c9cd2cdcf4f3ebced53c3c1e01bf6fd3899a002108c24a3f7f31e403b76abce4962c0b0e5325a3d49ef0e893ff022dbde09e7987fc3fd9471adc8938
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5000675b110d64ca05f44889c1af26889
SHA16eb69de0526bff021700a0e42d698d9a45db3cf7
SHA256e63908636c9e9aadb354042bc554d37d30a137d52c649c50b05eec26e7262410
SHA512532ed729f2667c9e41d55c396ee896fca660717849f4f40f7809eec519cead723ded1adf9dddab83f10fd17fb17ad1117c2f86cd41279802aaa59b9d1afc4c43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a85b9d60f867a04448bda9390fe3c949
SHA10438ac5f7526c11f4cdf2c1437cf18eae295c501
SHA256fa46ab6545615efe0697a008bfd21896e4aecf0ad1305b30045e2a33b26513eb
SHA5128abcff4e935ddeedf9d961c982050aa191b83698b6b22a2200e3f81d212920f7b651535dac6e706fc04c15547ea2e5cddf6e2a2d6f98f6d8e23bade92bc388de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521f1bfef5449c515d357aeb642dc1ca5
SHA1d3adf1146f1daef0ee1aba394d4a2669a77f5f55
SHA256aacee7a41ef20694cfa3e22a8c865d49cfd33f522d3e0cf50e4f88f03f637df8
SHA512b1ccce630875cac71245c8109477ca9cfea17a2b3ab01f009936857b20bb4aa34018c5b3b5605b8368a564c71a732beaaabca78362a75a02c69c0adebd239e96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a4ab654f5d313eefc77fe619b672d69
SHA1efd36d3fb8e076e7b6f27f2036e304ad8177185b
SHA25613930ee1ae80e6e7d68c438646d134d974f01dfe95d331a95a8d173545b4f61a
SHA51275d231412fb4a20e4433ff8dea6f73cf17d9971430891fc5c3fe1f0e42b94984a1f19b36f0294bc1e2fc1bb325b29369d8e6a1f0fe01d6e231812659b234cc9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59342954cbe9b04b59e425e88f2c1325a
SHA1608dd1bc3c99d4c20067448bbd0673d420e12a75
SHA25693f0d5c01fadd2a8c4bbe47889a372318e40898c61f518924eb8bdce729b01d6
SHA512633cc98282108e3b67633e9d67dd795c7527f85c9ec01e4eb2a9d07d309785f5326e49743cbd02f6c13705e817b4205919cb3b00198cd3372824122f5467fa5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5b597690991cb347d78ad70a4e1e742
SHA1f881e37d892e44b1bec8b94a90818bbb06a80802
SHA25687f94b5a9346223ce6f6b40e28522d5d8ca2d02c3df3f4a429395bebe9e25271
SHA512576719cb165b37791cf65a432a0a288db037bd27501ede2498c6f3b6dca3886190495fe88c9c9dbedf578e4decd1344419009d70a77663ad6aafdb94be0223a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b450e549d8ec58cdcf12cde6803e7bd3
SHA1c27a1c9538def6bc94a50a8bdd73dbd1995d0178
SHA2561eda79e4f16d14aa37b8e4ceb3ec0df09a50ddd0c703fb959483cfb8937e6fae
SHA512b9fe4045236e2eb1b50aba13598874bb75a8ba0208267f8b3e7399d8dcd2d068df449f45c93db604d36f744548831c95245443ad49194d79834d29c3b0c24cba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4b622b3d5f35573b0aadf1c47036885
SHA1b9a5a39ffc33caf0110bd96aebf8c9cd74ded161
SHA25629c1755358ca13d7f0b08570eed79d2fccfc0964ed00678eeee4c0144c3262b8
SHA51227201b64e732fcb6ecf72906d0384e807c75015e05d9a4a4780fec51ef6cef2e6a93573654d060bdafdc0e12e21aff2f199f9192254eaa593d919376a6857919
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d34d0fcc3a08da785e42c8396646ffd
SHA1552687929299e12b17f89a483e97e82166846023
SHA25669c588d37988da5949a0d3686790b46304af7ea1b5b05c394065b0e1c37bb741
SHA512a266e192159795380ab02a1b7958fa904fe4a7895fa7d7433b6b830d939956892e96f9c2cdd656e1f5073f5b091828f4f34157a77345d96efeef869d462e6a0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506e8644824eb8b7b0c6c71f877f7b604
SHA16efb01e3d77b0bee2c70b462f9ec9968a9ffd462
SHA2569bf28a547da0e80d41ebb5ff010a9369b411806763c4d90d5d036f846688f0fb
SHA51226b8af0c1595e9630ab99f0df0c84fcb71f1be8f184c2dedcb32a5874d79f763485e7c24726ff5127cf0ce1bb6c5818c8213fa74402c43213001750c2e1999b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d13a5fc8f32761560f4e1276f8a212f
SHA1da9bc7fb383c7e112abce0ccdf1db3998f453a1d
SHA256db59ff39108da117a97a82a013c3a4dc1b2566d274035078c532abbe91b8b459
SHA5124fb92392835f3446a25ae46986deca15d7cd423507c65f554225b912e8c60d2c918ac0e2ce468abd217bf50b6595ed3cbfcbf7da5366abdf5c66378c3e144933
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5449a588418aa192ecad6b1269ce004ba
SHA19051c75273052e9768f4517409f03879bc4393e5
SHA256294a97a296fa427e915c0dc7376f9515ed49da9474acee0877b3628bcba21194
SHA51214a6849ff20dc7791a6b6b6d8baec45510e4ccd70029a6ec31d0bc1ed22f1c079275cf4f91cb18d13dbee39a387e732568d7aaa7de282fef69d3ac8a64264bdb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b