Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 13:38
Static task
static1
Behavioral task
behavioral1
Sample
139204088262195662d41677d8899ade_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
139204088262195662d41677d8899ade_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
139204088262195662d41677d8899ade_JaffaCakes118.html
-
Size
551B
-
MD5
139204088262195662d41677d8899ade
-
SHA1
2ae4e2bf581215729a53e2aefdec7bdbb15030f4
-
SHA256
2263216eaca67d57b3da4893c2a816c2d878cb0f9dd4be6b77393c65543ccbb5
-
SHA512
f6da46992bd171c3ef6e67cdf25610d897578ff27031b3a693fa5f87524ad36415f6eeff887cdc164a3e26a0042e39a69774895363b01265f896480c07564ea8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434211010" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2004bf0c6316db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000006ec42cdf75be096790284fa25db4ba1da77f775b2ffe8c58382f2eb081c8f0d5000000000e80000000020000200000002bd90250b2aab3a73aa017510aec648c723fa764c8bdfff9a43cf9c180e3261720000000fb4c5da7fa94ce56684ccf13c1ca83fc9b44afce62b58ff0c107984b720d5c6d40000000482e730a4d3b2841ec8278d53d77a706e77b6abaa70472c8160694e1483f51808d8c39d8994350f671ee8d40188ed8205681fdf338a0b3c1fd36a6985787b5dc iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{04588861-8256-11EF-AA6E-5A85C185DB3E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1708 iexplore.exe 1708 iexplore.exe 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2028 1708 iexplore.exe 31 PID 1708 wrote to memory of 2028 1708 iexplore.exe 31 PID 1708 wrote to memory of 2028 1708 iexplore.exe 31 PID 1708 wrote to memory of 2028 1708 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\139204088262195662d41677d8899ade_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1708 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acaac404b14e0c7e5913a1285fa0b7af
SHA1d86a242ea6d089b837650baa5f82b6571a982c15
SHA2568f3bb24dbf611b58e851b0866b2cb3eb1ef580664d630fec1f093cef34f55323
SHA51208e7848355ae220b3f75218a515cea5139ea3f648ba6c962bb87fff5f2a3525bdd7e3e08686d34aaaf1f645933ac4e573d55d32dde25c5ab296a8fd22a674015
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed0e4fd9cf7508d1a9f90657b365d239
SHA1ecc276c81334861020a1ff64f51b07d709110d65
SHA25648c347a5e8bbefdba370c9368587590c1652005d789996a273571a20f7d400d0
SHA512528129390feb164d109530fcdefb3ce0bdc369d113e0340028a80862b0bc66329ee298a4a119686eb0810c120d09e8235da6a5cacec2e048e55300ccaef9675c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1d242c67e9aeb57246b48be4610a832
SHA18abc61f4e978185ea5801291468e3d52e4efd2bd
SHA256c5ba09f8b107374f0d9c0a1dc25ebb337c9b889bf8ce4a9b8a49696ec90e3ee4
SHA5122a42b863a7b0f10316eb71b8177fad7b4087d9fb7f3ef60866f1f712cf2b9de342cdf01bab51dfb7dc2061b7dc5091b3c5e3d41c50656b624dbc145b5212ac46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57932dea0ab798ab8f6d816f084032813
SHA130883d7ca98f9cb09c63f02693f49ef0a3591ddf
SHA2560c1e67da5418c82f08606af91515228c77d5e41db54c26d02a2e27c24d15c078
SHA512c3fc9bcc8464f2e3e9a295c65ebf01da4d29161d0035373bf3b51af891e0a579b2d1bf7d6051e636d29c4eedf5e64d5d76de6f035789f35317a7a17e59c2826c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5c164cb84e44aa260f00a350d2529a6
SHA10fb402ea49222cc07b086f7d23aa6636c5677f61
SHA25630c4888df1ffba3b1938f2e6bdc037b9674ad4f8eab402f303688920db036bfe
SHA5125b61bce12791a231f95429a9edbfe533f77dd60a68da9f56a0f424b3df30d2a3567385e7da7e0554cf5a748d33758d0a5db951af5a476b49699d64112ecc8f09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dd0017bc982377a9136d7ce853ee6dc
SHA17e96b672c324af6fac4961d7f5f46a3d61f41491
SHA256dc889a7928140a6b33cc8b9dd766d0565629a5237c245eee3ddd233c369a9088
SHA5123539d96941d40351263090946138528765cd3c34d963b9ed6389786fe5d1af1a7f1b8e5a6e9ef56f84ffdc79cacee78392fe1bad701b6f069d81a0477c9b0a81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee88f184976a0c5e2533079c83cca80a
SHA16ca309b7790182f8da8c932e9e484158584f7214
SHA2560c8b52a9751f14ba622c08920d8d8a234cb7276d73517e2e8564de079ae237e2
SHA51238bcffd9142fe3aee8c13a87f7f1f363eb9e739af3454423aeea1aab71f407f3d05b8ea80bd49e1d0c2cad5a7b29a81ac0f5fee5e7a0efd8738c7e12becc5058
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c35986f9327c8684d8a7e1c432f2d1e
SHA1f8aa93f0bca48ad02b978ca77e98edf40e8973cb
SHA25664a3c3c0675e14b2c5d879eed70dedc5d0c11f98c14b8ddec8d38a8c67be2170
SHA51285d629e05a981de29c86c0cb512c500417d2edf0ce935a10345062c1947c53a45b8ed78d4d13615c2c1d27f5618b0602dac8adf727145f9bdb3b2cde3e03c475
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b58c12aa6ec81dacdfdd3aa3a7a93155
SHA11cf700b2da816f24c2b524810c025a2cddf5d5a0
SHA256da24baa1fae60d487005f05d3b5673f1cfc64f1161c2fd4a69e3557938edd6e0
SHA512b26c2c506e5e76dc3a8d6925e7081a1409bb7bb0e5b07a6dbdff8760cbbfda2fc57d9b6ad8c266da7a0c94ae78f11f427cce03929aafc8d9e28bb3b91e029161
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588f51ccdadd4d9512f146486d95ab2b8
SHA17c1367c3677d25eedf2c6fbbe4f37f028913165d
SHA2562064c9fea1b8491a3ebf93f484518da8258c987e0a32d77c04e49bc590cf2d3b
SHA51218a4f1360269fcab1a883e1e3d0612dc300637c1564d5b556ccb293621e3a6e9b9540dee93055ea6ec214646f06146c8ab0f0d23f3c2f343ade3200158196e1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d674ceb332f33834d983e2ea0728eb9
SHA1a7363a4a4b187e9f16995b35e53bc7676e1b6afc
SHA25653735407fca1e595a00a677ec7483e2c71ac90ca3b13eb4d83f4667a2507fd24
SHA512abdfe5560b60ff983782cbd7d42d925d66b230ab379ddd15fb33139ef4b69e283e400817675476aa17bf701ee08c172b1b3ec489b8936485d104bef332f31872
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e395a1f11dbb64a284dbc68ce009240
SHA176fb620888eecaa8c71c726276a10e1e3fffecc7
SHA256b7b03fd7785c97e6420d439cbfe5c695892f6f168b3a6452a0000bb2667a3532
SHA512656ad2ac50ca84e2c7617cf58ae58de751e7831adbae2ddc0f80bd6f29c5cb7d91841e9d076510a757748a28df7cfa1d775b272a7f8d0189fc5f77a19da723d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bdabd1c648aa586b65e0c1742fc9206
SHA18a3955f02f136e807900d747797db6fefcaf0fe3
SHA256bb04e5ce96c28fe4940745dd77865d7c2139b3d8dbdfd5eeb442e157e33ac80e
SHA512e7434a1ba13b39403a24d925487f1de0a4b057dcfa63fe12cf2f4beecc80bec8c3f9a64ae11e09c2cc1cc1754eddb4c1e0014b8ec486885485836e099dc11ccc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5648008000f70d6525e13e704e1dcde24
SHA157453ad51cbd1d51a1f17e56f2292084071a747b
SHA2569e601b7d6631d32cd030bd14f4411e44c22b9806472feae7e309a932fbd729aa
SHA512b2ba1bee9b4e578a5ba2b2af6f9bf21c4425efe997283eb371be39b832fcf09f61417c4b3556d0ff496a2544497301206f88eac2d1b0fec72a74ca24b07ca6fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568bed8cbabba4343e845a1b7e8a3df97
SHA149b750c67b92d1b1e6a85e2fb0bd7622b3927e9c
SHA256dc33f24c4d728b2a3ff9b307e53018a125177d7e0b10ab6f619442f47fd5ee64
SHA5124c087896d87660d72222770be9302673468ef81a4fd2f57749d2f8072fa24135813698a42857d6c095278c8e7908c3f04d4058d97eea1698a1c503d8a157292e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502cb59b2b5889bee5f189b4a7d827472
SHA1aa99f22254d6477472f06ba6e8559f20bdff3b58
SHA256513af88e4dc10fba956a450bba3b06bcf9008e78604bef2aa555685bb211ccb9
SHA5122a42ee660b17531247ce07df1210fc89d6237c4b46d2d0397462b5e2ebf7efe8b27bd96ca6fdc6cabb026cae3d2e23ccd6de2147685ba8d4b59160c720706358
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf8e9dea732203ad0fe6f94d430412d0
SHA1ec7bec7f40a3345e30334f3b9fc037314446546c
SHA256f9e1757867d3f711430cbb1d70343db59e981add2c71c5058f83d95def31f250
SHA512acc749a78916cbc528ff4dc2db2b1649eaf9b6e16ca8d4b8bfa1d7dd061190d985bdd0b181e6a2b083324c430d3b50e334e44da064f1e6a97d33e4cf7dfb0c12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed1cd64bee2468f074ffdcc14f9be28b
SHA1bbd0dd74fe1f287497d81fe52a9e09662dfd85b7
SHA256ac0f02302b45fae2a652869a864b5e29b84de6e0876f7f47a263518229438383
SHA512d22c27f244315374bbb0b263efd9d32196be941c84532dbcbf8c3efe6ab60d90dca4e8127d96856b8de0d8f48640c1badb67016f9ad7b0e4d5134f4a530d0246
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c189bf5e2a7895a76c20a44f3cf9831
SHA122420a3e6276ddb80780d3e785eb8eb9207bcd07
SHA2569173fcedc9a121fd530dfc2ab8f2ae8e14a924f41cce90c5fa53b197780b0e05
SHA512bd3c7c15d9a7aa67f85c7c1f30067b99624c8f193f3d16de5eca807f05b7dd82962dcdb10233332e3b9da68a7209e2a39be8b5999280f26b6f26bd786250f6fe
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b