Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 12:25
Static task
static1
Behavioral task
behavioral1
Sample
135a69fbabae13028f19cb4fb0d232e1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
135a69fbabae13028f19cb4fb0d232e1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
135a69fbabae13028f19cb4fb0d232e1_JaffaCakes118.html
-
Size
9KB
-
MD5
135a69fbabae13028f19cb4fb0d232e1
-
SHA1
b609829a147230cdcc1bc800c949584e4d4b0d11
-
SHA256
b82611c0fded001a9a91e26db8420d5f7277da82da47502361fdc9f73621724c
-
SHA512
5fb5b3d05a21c94271a1f15b15564cb40d04eb420b51a4d56a7b0c0e72280473093f831966d85da285e5cf4f11cf569ff398f31c82e508ae8df1c5fb9d1713f3
-
SSDEEP
96:uzVs+ux7n8LLY1k9o84d12ef7CSTUNGT/krYPp1abkvfzllVHcEZ7ru7f:csz7n8AYS/ksBwboLlPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B2AA8361-824B-11EF-A5CD-E699F793024F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000005b968a27ba96d593b62048f3533050a1006641c0ea99a90d8fca68a6518cbb3a000000000e8000000002000020000000d72f45134e1cf3242a86ca230a7293421852480ee73f115ba943490ab638abd8200000009fbd76d8674cedb2360a88b4ae227e546e16d6285abf98ac33d1e43c742a468640000000e64b130df6812206dd22e63b397481c4c31d204863eccd98f97cfd6fc84b102b24f9d31415f539c14e90c80b70b24b0115d281b193a0b9bc06fe2767db107974 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0789f875816db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434206578" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2132 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2132 iexplore.exe 2132 iexplore.exe 2608 IEXPLORE.EXE 2608 IEXPLORE.EXE 2608 IEXPLORE.EXE 2608 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2608 2132 iexplore.exe 28 PID 2132 wrote to memory of 2608 2132 iexplore.exe 28 PID 2132 wrote to memory of 2608 2132 iexplore.exe 28 PID 2132 wrote to memory of 2608 2132 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\135a69fbabae13028f19cb4fb0d232e1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2132 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4ccb28a75a758a24737915835645be1
SHA1ee0bec0f8535c2fc677fc9681d727e36f8fba056
SHA256b5fb803ef6619f2e5ffbab51133e652808320b444a13d03d2ebb167af6b9b68d
SHA51206d6e6877202ab108542ff78c427107cd4c1a23e82188fcf6934b2e02cff49d95d3c0b07fc991c3e1d0a3893133f55de2dfb6dac69ceeb2bd85b085bbd20b67a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538aa2f10cea881f7c5c14803fb00c480
SHA1fb374d97c0aa739946c81f02cb3ca91f775fe03d
SHA256667532492547a4f3308fa096f11d2f7189eca1dac424749506e9306fe9027562
SHA5125f96e66e140ddfdd2246de319c0552c2f9996a84ee3f9dd644509e8158b5893afef29f26c1c2b4729462c8fcff28fc1f0b502a0d4d61ba03e9c1ec00af67ad0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ab08dcce56c8620cac42b8fce41d232
SHA1536593cf6d1e9d03f74f42d855005f00f020152f
SHA256d10366af8e8379c12ff529d9cfe9ace5491b3724eb1ff44a9a8e7f4e77207fac
SHA512fb4b78cd2e4015843e18b83d7c59ea20d793919ec6e0cdb9cf22f1d14c26f242154aea06f95479facd49cc4abe0939ccb10918e971f4afc25e76cf4a436a7c3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ecd7c38eef3953a587f129fbf28a943
SHA186fd68075efe9de3d0a3dfea82a16832a2c58fa9
SHA25624f420feb86151e4b3cbb20e2caea42b55b21b99b3d3ddf07b4a285a6de78c2d
SHA512e8b2ab0d8498c8106cf25fad0952f3a88bf8879d3ed8ebfb1763157a9ad3ab5b7db780a8b85019104a5547b23d4b249efc1a7676cc6e1f60e92c9c63519008aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faa7d3de9f7e302b425365b303479794
SHA16af9d7916ff29995f54138e42ae0121eeb03fbd7
SHA25673c0113b86c8d3285ec82d4752a862b6d7afa94e95e30fc45f981d1896ee8942
SHA51214b574a44d1074d2a1a12bd64f676afd1b34f78d1d1fa4c6b845b5377e09a0c0eee3a9f1cdd52e209c3e956de9908ae9e24575d36040a2d0f54512ec3e978993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5326741b997817e1de2cb564e104b1745
SHA10f123048a3b0f2270c19358399bdca75edb2bb6e
SHA2567d7b78aaabfe55b2384c8c37ac2afc0ce28a9112a5aea68050ddc771da078a48
SHA51204991d02d8fca58839167d84f30900dc9f8c80223489d3d72c5bfaee4d471a6734e630a064530b800eed203b16fbe4e8435acac914500a512173b3a54c9e39ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a3a7238bd2af2d2515e136cc9e29d14
SHA1b56367ddc7f8acb10019617ccc0723c63953f9d7
SHA256ab6682dbb2fea35eea72a174b3fff6c9549c73c27b9e2b9c52af64b5374ffdb9
SHA512e96669a8c9fdf8b9abc7d4a5a27a9c6d359bd6361729e6b4bb33eeb3279c7ff166186367e23c40e566c75bced0bd5ba88d1fcf841028d8f40d1cf881748edbc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdaab55983576cc3fcc2ca174d9ee2bc
SHA103e4608b6c9279b0a233050d2c3e3b114e66db33
SHA256f19aa2fa7c1f83f36c37d5849f68c5a99f3d4aca01af201b147e276e393f94e5
SHA512d694a267b020e22f344e9eb1d6a5bb98a9b73791a585f6428da8ff779d227873afc26b34b1cbdbbc599dfa7580590401433b8eafe7e4bb84d1064d990d7964e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acd80bc62b8b249aaca2b15e43ca2782
SHA19ed7cfc876a538b99e56bc62ee0e4921f98a029e
SHA2566522dedf8e5a08ff172ed08a063171a5388ba64fd0c6e7fa05923fc71f1bef5a
SHA512c7c886c27621740eadbdf87a743097cc3b4adb97114c54cd67ef420ab592d44810c5158fbe7fa939c54607c7812242ca7b5f433c513da6e0eb3554d6e5e828a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8695b8d84456d8c78c40862434575c9
SHA1da2293c6a4e3bf0a1387a12975f3710e2d55bf4d
SHA256caa2b63bbd2f017488f71ce4ba553b8ed29cee5f979a95773ea52f4389625376
SHA512be93e84f844551eb8bff5dc7ec51aec1833f05a007745f89794daf88a54ef2aaaf0f6066c2898f25d598688050b50ae34c11b1f6758ef8696d6a42d2f963f3be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de11c0655ee3c7fd29da9d5b0d8f807e
SHA12dbb3162b56e2e4e305bc5c2775fe418dd51bc2f
SHA256ab6a00b8e3080b44ac363155b531d7b05605659bba3058b8a39b93e5bd581b18
SHA5129758f0625aeb7661da04a8bd05544db784c13228991651fc8e023b044d1fd49e7e9c7f959da687f0b677db2e8fe996b141b1e7e7d1cf2c3f559ecb9f6aae438c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b884e69542b10ca4bce2666334f9a62e
SHA19847b323ab8c49bfd89d9cd8dd9553f5d155f9eb
SHA2561bb6411e26c61941abad4ba6b9875a18657e0afc75de35efc500968e77e8320f
SHA5121483fbf0989aca27886c0ad0e269d5245057614157dc72315fbed8bc7c6cab0a877b51bdb5c351e129fab7f385f0531282eda6347d6c8d00dc256df0f463fb09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c720c7cf150126f913998b2d0017bc3
SHA13744e52ea2ce2f335278615930adeca71b066995
SHA2565d40b63ffe1ff8eb5e87ebb99b420bb86ca56413d924e0308645d7242a0315de
SHA5120dd2d125ac51074f1b23ebde2ea53907aa997eaedb645d26d541e48ba4586715846e06ce50acef5bf0c369612ec92f09b6e655573525ac21334cec650fbe4ed2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5793b8e237455acf90d707ffd70513a44
SHA166cb6f0d24ee9a97dce3469115b55b2fb0b01178
SHA256ce24bdccda2669a1a270399e49591f0fe8598b9d34664e2cf7a847aa07bc6c72
SHA51240adecc7c5ada7d78359c6dfb15fbc7a960165fbb9ec57061f4f9207bc48729c3508ef647f7dcce3c83d07ad1e7c8d491ab675992b4e7f15c41beb1ee9d99b9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552c06d83407643c062cc49575e96a143
SHA1f7bca338ee9849f3686df5ef97a1a024ab61df6a
SHA256fccbb437a5b5beb22aa455f92be00197646d172012ca13e02fd4c7aebbc25784
SHA512715ef196f5e31ebb5e512be26770f12d733a738548fa4a4cbcb0b694a4b39f69fa1abfed2436a32b6a0bf1fc339d9898aa13bddde5df32308938f82b62601d05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502c9a3cc1b41fa4b7a8e1af78aa5544f
SHA16ee3b582ea1b656641e2df96ec78bcfffb279012
SHA2563738c82a1c32d145477f72348e209bcfb05db94f5e940c2e6e2ae2737ba3ae91
SHA51237037480d6d67d727c1d40440b40fab05edbef470d10a2f3f554b8402168a0f38cac03e22850acecdec8fb1a2335e3e19d6126fd73c7369d2af82d8efc22b060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512ff278a464035ca3275498697c65592
SHA147c697ee46d1d680e1519dd15f172887099c562b
SHA2562045872a08475fe3f19e63290789c03eff9ad4074305e3cf0dd5e7b237bc82ee
SHA5120202e7eac1c941f3436d727ad6cc3428353ce4f6ec7b02d492aae48165d6438b469b7c3b4916cfbf2feb455fc7e4bada7dd37a4a5dfac740e1bfeba11490bf35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecd5fa20e76f1be603149b9c81e56ad3
SHA11d538a1bdac37a9363ef70c9a5626da6b832bcac
SHA2565eaabb785960bde1f8635e85f9c8b8d461924897700a2ef9b5b3f695980a9637
SHA512ac0f654191cee76b255b95733c35758f57d384c56971b31440a832ace7dc6b6d89dffb936eade53407cd6b5815294bb263e9a68b8dff683d0a663962f4d80c23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aceed78671012c68a06262211578de4d
SHA193bb5ea5d659db3ae231be698fff448d3ad15591
SHA256c70fed6e3c8d8626aed25eeb08f95c19c871c55c7343c4d184be831b20019c71
SHA512031d7c72ca17bab99a6a25d2e2d7c59bcf4ceceaf6ad5169f6e97f3bb36415414f463bd0278e1cc3b8d372559d9663bc2931641a5bb12313031e58ecc88b5f50
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b