Analysis
-
max time kernel
118s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 16:41
Static task
static1
Behavioral task
behavioral1
Sample
14239afe2ef26c66ad10fd74907e5c12_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
14239afe2ef26c66ad10fd74907e5c12_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
14239afe2ef26c66ad10fd74907e5c12_JaffaCakes118.html
-
Size
53KB
-
MD5
14239afe2ef26c66ad10fd74907e5c12
-
SHA1
abe749d1c11a8f1d9c0621e76d8baf6a8df35622
-
SHA256
b04995e3623f5b9a0a4446d5ddc56cd8433e7d2081ed1f7a563c8b054f4007c1
-
SHA512
45eec6084640074f1e84aff4ca5f8ff6177fcd2b5e0f04267be4683f4cbf0964f5a795d670c3005868a00929281d447488c7533c9f81ef3e9ccff20edf71a31b
-
SSDEEP
1536:CkgUiIakTqGivi+PyUUrunlYx63Nj+q5VyvR0w2AzTICbbUo+/t9M/dNwIUTDmDo:CkgUiIakTqGivi+PyUUrunlYx63Nj+q1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b006b6557c16db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7F68C4C1-826F-11EF-A7B5-EAF82BEC9AF0} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000cfd235f6a9ec1e3e32229f701d69d6793af0897db06706cc55ff51b1b6ccbbff000000000e8000000002000020000000e9d3f399199646ca5c584c561ee060ba07f8c65013be8dc37166e6a1c2fef2f6200000003b936b70b38b785d2684d99d3e75ef125b65786f125ee9cf48b0b8d247ed96f9400000007895954ea4edef7f21e24e6c18e655a115d74bdcec59812dfeda78463045de9436424f27324063fb107b3934746edec5b037a9bf5ce40bdd6d0d31ddbc6aa6fc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434221956" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 588 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 588 iexplore.exe 588 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 588 wrote to memory of 2092 588 iexplore.exe 30 PID 588 wrote to memory of 2092 588 iexplore.exe 30 PID 588 wrote to memory of 2092 588 iexplore.exe 30 PID 588 wrote to memory of 2092 588 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\14239afe2ef26c66ad10fd74907e5c12_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:588 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5877f21bb58d8a822d454fafe77118c9c
SHA197798b9ceca1abab4c8b38aa2c34cc4ac7893706
SHA25698eb47dfc986999eae548d20626b6f518be384698119c72a2d29adf7a2d9ac1a
SHA512f2b43ac3dabe235358cf25ac49b2cdec5eab29758d3dc9fef6adb655b240c9e0127f95ba80a568ba68d8da73d5081cd16a31723ecad8282dc0b3a0b451d5bc25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5376cfc3971a92bc0d3bdb92c5114e81d
SHA186e0d1feec9f0539bb5ccd959a6ecf6951004413
SHA256a42d0cf3a0d1cb44f0620bb8d0c472cd785082851202fe10eda4f0456f544044
SHA51242ad5af518780edba95a6f65b2a8b06b28a46a2f152cb004850918b93b05edc1b5f0a3814764102b5f15d1b8f7935d5c3362c93897a071ac71aaf7575e4ba513
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b042a29c3c0da45925710787e08c788
SHA1f649495f2abab904b8b3c04a582c3e78b647fc0e
SHA25610bd90369309c52d712b37623c8de2ecc92496514bbd602d192e01e25a98fbc3
SHA512c1b3be165e1859f422916138997e2e772c0fdb333bc9da0fb7e5b406dc6dfc444b6fd1af26f68c6008c2a2b599b4eb576d07672f7f3aa7954e7cde3afac08d08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e7ef7c6c93f825ae96b05505fe4a89b
SHA183b71f1f54e886787e47c57b4bd11df238864649
SHA25623650a885989373416ce444d55777f87f7dc4f6798179c55546893f07c6efc32
SHA512887cbe552ddde46c84e0137f04d6733ed9f5774ae1ee2b003ff4c49b5cd6ac3b3f3709dde10acdf9856b2bc01da625401f46505bb2233922ed8acefba7288ab3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559079296ddd26c6985bb2fd93bc047e6
SHA1e2cfbc1f8c672886132b70bcd7d3ecc96061511e
SHA256a04f1094f3ed06acb8697bc80948ae67e8064d11f2edd01a157f376ecf90fe4b
SHA51282a991b2fc2ec51551bf73aab7288c7d1627b326f11c14f2eaf2c3099988fd77b882b5736747d8d09a377a6b001b6220954c794d77db7896ef1669fbf1657ba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fa239f85d80b041857b872561abdfea
SHA1e8b7d50be4c0642092090501cd306e7ec8cdb66e
SHA2566b6682f63d1e762591d2dedb47ee76dd166afc79572990497537998e7ba90d43
SHA51297fc95f46f587e0d954ad15fb1add4586d8488f893ec4539f7fc418372d150d0b7f50ff448bab1198de49b46d1f01633fc2b1a36b792c53c413901e4e2bae32b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51373e4cd697dea8568988bad63bdb1d6
SHA155667db60f9b0d56c8194d5cb370c5e081ae5476
SHA25636e2e1cad07dbe56cbcceeaadffe6170aa3c8508a37e24aa8b1ae393b4311672
SHA5120cfd60d7fb1d993980bfdab9a3ea9bcbfcb8623a412ce0def5d39a6ebf925e4cbecb879c4d5e05af551ad7fad1f7a1e6b123b1c04c87c2b708dd05919469cf02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53267abc61d55606ea44686626739b36c
SHA1b168eccfacdea770baa32650a0c7cfca9a674730
SHA25621f6585b0aada22e5b2d77054b27504164cd3cb020223484304a3075adf78dc3
SHA5127073bb1c67361dc11fa4368db97caee375fb6287899f0d2bf2f62359e5aefafe1379436a0d551e37291f6a28c9204aa4a44619479815bc2e3ffaf5880e4453da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525decf8b67abd439863497d0df38d04b
SHA16898a492c16a4ddaf8fdf3382a83e1237addd52b
SHA2568a20b4205b84204a57521b491d29786d628f41c366c94b47aaee488ab856692c
SHA512a6fc89022082dca75c338317361f8996c9841b2f218ede87ce3a5b223536d1a13b91bec30826f05cf5a2b469b67e3ec7b40228163fa7c3bdac225e7213b1ed92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1771902697cbca781f11ab117d5dd3b
SHA1fe0752a3d12df73f3c8324e0a783f3e0ae60fe3e
SHA2568a236aef8ef41070989b5dfd6696e0faee72c989c87b64030065a27866c1b7fa
SHA5122e73d9368bd3004e081a12bc041fdacfda19e07466820314928e380934baced3b3cb24f3fe0f901ee501b66da7f768b45b2daeaf1dd4d427649e61f93089931a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f20f3438088a709f657135abffc11bb7
SHA10de54af6a46158f2f31edf4dfa8dc3dcc72283f0
SHA2564ea7e50e50735133d83e30bafcad6eb7fe4084abc563ff5fb6073a943a62c7f2
SHA512c01bc395b2c25ce0338228c9b2d0e296d523f25f8e180a1b9d43e8d1b684937f7a770e6d69083416d0d8262ce283f7806f41d9f2d06aed3cd5bfdd36fcf20038
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531ec878a364b71734edb064d4ab13afc
SHA16710a3c26a583e972eaa7007c197a129d8b961dc
SHA256d4f90060246fcb90c8d7c95c4a024d7c45671e44e16d2584e965a736efaf62e6
SHA512df47db4834619088a0edfacc3487632bb94c071d2c59bd0c0b60145fcabe87fcdd9f10b81c87e96ff7a72adb4fc001a04c02f636ecb2713b9a953edd387fbdf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cdce559685a289a3a43aa22fd676482
SHA15239c96b3e0604202fc3bc50c61ce70cf137c43b
SHA256c506e6e922d6bf8ca24d6a06e86745a248f5a327f33f2e585227221c2a84564b
SHA51208cf1ac50b6c7043b3661bd47ddbe06d003af828766e4c377e6041058b9bce29d49c14f8be5577d7aab7ccf9c87f38e7179cbca61e3e80a6d16f6067bf72e541
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51226ec873049d02edf6224ee6b26a5fb
SHA1ba309bb922ef008e19f7490ac3458c25c8a3ca3a
SHA256a7b676eeb7bbf73b082aeb5e0e3f8d7bd35d2127c04d6c8c10c56e5da596460d
SHA5126530d40409b6b8d4a605c3e0c58e3beb6c356160ad599cf0b7dd06e52e3e2af5fd4eb5e0a8ee2b2bf38671daddbac3547aa89b327af08475d0c4319f306921dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6fdfd49d51fec9e493311870022674f
SHA1ab5f2cf35cf666ade2248b6f2230812c58e57a4d
SHA256b25475812dbf274bb1809ab3352b0d9eb327612a871838647f2aed92c3b6830f
SHA51248a253ce8c546f66026486d3d6317b60504280b32c67a0ae015b5fb77695978777890ec0b264bf706f6a5bf402fe8db83fde721bc0a6703cd039b9b750dd11d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f32aff567a2ec50b513ab0436ed86dd
SHA1cec2534952a1be6b07347290eb4035be934c674b
SHA25683238a05cc722142fe07367b9dda83d09985fc426328d33cae55f6b60b9c098e
SHA512dd73063839b4498092df0db57d8d268fb691d3e55f3b8fe113423da49e1e1518fdb91f124f6c304ea59d912e598f81913e72c86c96f5bd45ee1122a0d087481a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5398e2631441fe5d414a88e117eedf948
SHA1e373d4b6c635e84f2c5b1de164cf67ca020b229b
SHA2563a35f19744d18c00adcb7b85904f292f47557c15d44161136b00c7fe8a962664
SHA5126c252723160bab81016c8318ef3f7898ff9bc13720a805fb27118092220c41cbc48894a5d2f4debc5a9098b31c21fe1b3aee6c33aeb4db86b7d724d5fa43fe07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfb5f6b844ac8d78950ea90c38bd3e8b
SHA152ea287475fea03ec6d3311506252393701f99e1
SHA2560a45a816872918d398cd823c3f597a41b6dfdff965973343ed8c5663651a9d1c
SHA51286f5ef4af315f5838dfe6806b537a3515e9c65da87db18f2f6cf3a76f5e99852925be89e0542b17d36225f71a93b048df771d6a267de38bd45625f2f799d73bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588c3b2ecd0ba7cf5df6cceb8bae5d1f1
SHA193eac6b88c5a4063f10f4882a22716cc50f2b06f
SHA25692b0eb4459a5dfa1f221e9f0c71c69fa95ca4a20fe3658ba8dac25c052d71fe0
SHA51284e188cc0685b3e47495eb10a942f54e7c9aebf73414c52809a0cef421d3953b3de7e0184b8335fb24433ffe2570f6a15b1e40a13af5cff57a460b1f3169a17e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\56KJ964X\glossar-js[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b