Analysis
-
max time kernel
135s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 13:52
Static task
static1
Behavioral task
behavioral1
Sample
139dae5e06e088a10b79b781da787a96_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
139dae5e06e088a10b79b781da787a96_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
139dae5e06e088a10b79b781da787a96_JaffaCakes118.html
-
Size
25KB
-
MD5
139dae5e06e088a10b79b781da787a96
-
SHA1
52149d798dfd6e2c79f5d878e4ab7460418b272e
-
SHA256
9c5ef6cca04e526a54e5ada5f50fb8caa8999da647be83392f9f75c6aeb4b06d
-
SHA512
d1a1fce1a57b5469f09ff2cf0ba1ced6fe805859faeef263c4c936fc4a7b66af53081f105cfc2d21cff2d7b983eb7c93630aae427e2ad3ccc5575ec2d9de55a4
-
SSDEEP
384:xy1R1QREDBeCliO6h1jBDkhE5Ca6XYa61lsVK8qXHROYuouCPRrMO77OM0TCtxYs:xy1R1DeCUOm1jBDkhE5h6XYa4DV77OMr
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434211857" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 200124d16416db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FC231D21-8257-11EF-AE16-46BBF83CD43C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000b0d8d0b95e61e0bd68bb9e2f037ea90bfad6f45582ec5a0367e5173514087662000000000e800000000200002000000065de4b89b040d67036d9129d727391ebee4cd48ceb4769e9c87eb2673a011cb6200000009fe517288418b5a10bd8614c642fcea67532374055d0fd2156deba98f5fd9bbc40000000ae1584cd4a87dee625d39d4146801a3433084ac74e5a5196913b3587a7e35fe29feaf50c5b490fa360bc6fa80435676b980e6c465231d61c268e213e5f922247 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2132 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2132 iexplore.exe 2132 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2832 2132 iexplore.exe 30 PID 2132 wrote to memory of 2832 2132 iexplore.exe 30 PID 2132 wrote to memory of 2832 2132 iexplore.exe 30 PID 2132 wrote to memory of 2832 2132 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\139dae5e06e088a10b79b781da787a96_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2132 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50905ba7e0cbfc44ab43821974d4dd616
SHA1bd8a8ae0188b74fa6c01bdd3f1bacfaac262c289
SHA2563dad78ed6c1c6c901b51db7f98dc635cfc8b03c5565384295e3bb0d3352e95b8
SHA512bdd6be71a2ebdaababb97f3542ae41e3c07b185282d92f7250054418ef63116fbe3f92328364a062c02f8a58f78c759e1ef32a7c039e73ecb09323d28060964e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56479c63f13a204dc0aaf6d9b39d50941
SHA1d2c52d681a4a4d242e85bc6871ce5ca5cbeaf6a3
SHA25661923e56ccfeb38aecb13eac70b8b35c3441f5d5e39b88f0785b488fc278a14b
SHA512ab5b773a92a933fc27abcfd753998bb390bf042acb7c07fd9fad16676a6ffbdd9934f917817589a9f34a6eb7a502fdbdf869382e7975f54bf1ca7497661e6f46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6aada9068370a0ac5b3b87fc4b61f85
SHA1dbe4faf3be16619ff39eb355fb67e1ad4a4f8d77
SHA256367fd64273880a8e070ca75039b6a110c7c96cce10c326ebc9102016cf9d4d33
SHA5127071f500970b1bbf46de9b1d6263c53de407f80f066f9b5bc6fa6224e9ca696da2250ff0b968345ba643fb0e3dc5389d39211c658f93e203bb9b13ebe19ca382
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5677bf2cf13697c719f0830e2b48f8a7c
SHA1466782b39e5bbcf5dfb602d2191a1a83060b07c2
SHA256db19e342457ae97121cc9c742e40d82f6edc0a34cab993008336895404a63a9e
SHA5124da3df16dde956be2bce59c7ca8924913a892722e2c1cfd9a4602eb12812a5fda8dbda3b02753c972931b0501066949ede4e65c755493c1b986ba78f64f3c4fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b6f804612e8b7af73ac8a1d91e93f43
SHA192a4398a968bbb5c6dcdb1f6578c96065ce22903
SHA256b35cb4ebcb797d0a099c88190ba8e142cbf478ab1b42fc166f977e8f73514972
SHA51285b1f05723bc6df4279a48d3d252294964ebdfab10a48a5a37061bb6abb388da81380451570c4b2c607591bd3885b9a49b3c0473827a0f776f05b675b49fa3fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1929285f1a3c8275ca0e0d6d7d9e567
SHA139e960f2528c85b105ce361ef99e030a70326153
SHA256b257636c7eae0be228bdc30604ed139115c0420ef3789101ef4de837149b54b1
SHA5121e729891f9e76d4bd27ce7f9956c5767821fb1eeb0a9d17a9e827ce572e8c471eab8147f62f98b2a28ca32b76f3827f922fa6c0f6f90ebafc213b485cca496e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57802dbc85fe35048a07f83e919f616f9
SHA1756c916026623b7cb715fae5ce5a0282b6bc9056
SHA256a5af68a4af46ddd472ae88b514f89caac65d3b25c14142157862db9c9fca9336
SHA512823a5095dba6b2f0162de513d986e4b9f65d50f00de26c3d57c210353773eda2692091bafdae3f6f0068a60aa847dc98e739008f4997dd564abe48bc2cbf0acc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9cc07015cc8093d008b2bb174ccbe23
SHA18a6d5ef7940dbbc3373ed2ea7be62b7b3fc84dfb
SHA25651b23d8acaecf1d4af7213527df2af3f2943f04830bce27de62180fda25c72bc
SHA5124bf814af6e855d7689e0a4e2ebe4c41c73c310d346ba811f0a9252a9dd79ce91fe4567068bc89d2bfc12b35994f2126a8ec3cfa377c4f0ae09c36e97977e1f2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ed1b179f6ebd592bff74ea912f41271
SHA122b2bffb2d458c1236f10711c4cef5215f7b5e73
SHA2562e4e920418930750ece37b0a0bd0dd1ded16456b1f66a1fd91f73ad44daf947f
SHA512e340b66d7ce02762028fcb58cb1b39403653058a634744340cbf78e65aca858d561d68e00069ae12e815c0263628098d49f81038fbafe5781925aab171a2d284
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517f995d9955d7cda5450841c26a51f22
SHA1c98454391e0ea6384aa0014a4b06ab9119856374
SHA25671f9a79b8633c70e7e27a05a33a953a5e8a65111690ed51650abfa8a44b74380
SHA512355de86a4420bfb3cbc3a37631055e874dc017cb96877fc28999672ab7b87bb2f6a26ed885d3ae30cfc792046494a083c2e1167201f8e55094ebe501a1b68c14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5104abdf2ab080697505bedea42c2fc57
SHA1d6a484869127b7987fdfe856984de9fc02abdba3
SHA256c9261c2b604024d5600bc17b73d89f2f1bc30d628dff9a2a14167380dae7b491
SHA5124e2a6d3ce5f77b60a2046973b4bf4ad489cf198f1ec72c0cf6889fafe033faa53ec5a7067ce0765ae957081e6da1a8562f9f66e1487da7cdef1ca790f64d06c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcbeab5cd8661088d8e63c0b024842a1
SHA1ce0d01c286f15d67587f4477a7c0f3cbc76ad3f4
SHA256c2f41143bdb6b3351e2cb5799157ab6cfd0d9f2e2e16dca0590959f917a9a1cb
SHA5120496bdc844dcc9fe8e1736787cdc16eff55aa39bd315d7c72b069a318b07c6877ed59e1fefc6cbb85b3fb54d33b64c156384991763c35916e4152855b6f199fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb2284045c8f04824d0fdef9740fb892
SHA10130fd1ea6d3c4a0384423d47d36f56ed33594b7
SHA256c1de9af8d4d45197bfa53d4302563a19bd5550a6bd35a254c0dd103cf3dbf88b
SHA51259bcf3d9d131c042adcec6840fefba0d558f9988dca1a8ed0897c11e35bc0ccba1b701e07d7253725a0eddb8a050d876ae23f4848d990279f2d86105aa8f2e14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faee71a710607f482d19af7bb299cec1
SHA1842f1cc6e8049574d89f1c0fb262934a8eb1f4b2
SHA256cfc359718171049751bb4063b54957766bbe142be66a934a7e555bb8a76794b9
SHA51299e4cd84f94de2f23fa8c20525ec222ebc5c4f720ff838474eaefbc6839062adb8771a17fd55da2425ce3d8cf1d888a0d65b36ac3c1752d113030cd0932e9a61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595f4c86125b7fde2dd46b178400b9895
SHA12b7da6dc151af1747771cafc69d645adf5d3c3f2
SHA2561776a73bc29a91ff517b655375e368c2021978c80ea4b89d584f31763d870e60
SHA5120b7acb865e0ae089b4cfc787f51b1c56815e332b84f21ad0d92a98401ec78dd5838c0954f787a8bcb4cfb1900c96f4e5ab48150801db2e58076cf2e343230cb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ac4e2e6acf3ba0d2740f8e98ebb04d3
SHA1af3f6e12b0b85eaa4cd6ddc405314606a3c565d6
SHA256c497af311b5834832d608f1eb2c8bd1a1401a37a41ac54b6409b6dc7699cd22b
SHA512a38f3e758508c0fecf8ec98b43b783f1561480400307b0bf321900fbc5f951bc04dfbf39ff6ab2776a97da3fc3bef10f4b657b4eb74e4f4b5611f99a1f17bf77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2fa03f09fb284c3ad9899de3dc45323
SHA1a2cb68af9623588e22afc179eeb90f4ffdceef51
SHA256ce86c69c2386e7ad3027e8f909031563f5041cd270485deb6e6bdc3ce0d86138
SHA51200f8a720861fc6a6a31b25435c41d2399eae16d9c50741dc4b30ac3533166c12226100c76db9a4735032da88b5bc313a485367ac715517b63c9f0d3d27590324
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f27b4a58dd324bb698d13efadfe2b942
SHA1689a69c007a71b31ed916813a8b37b415dfd9cd7
SHA256939ce01ab838171b35dd97dc19cc3b879d908b8166ac4205967136946277ac53
SHA5123aa59be21a3db25c3e9c0435cb77cacb159121193d9823739b64cb4906868a448ab887b2b643d723dac917772addc0bd9db2cd1b6b5dd032e189ee91824e67f6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b