Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 16:04
Static task
static1
Behavioral task
behavioral1
Sample
1407e568703031113f30bfd08bec87de_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
1407e568703031113f30bfd08bec87de_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
1407e568703031113f30bfd08bec87de_JaffaCakes118.html
-
Size
95KB
-
MD5
1407e568703031113f30bfd08bec87de
-
SHA1
69be120c5116944f3ed9b19b06769586ca5fb4aa
-
SHA256
e347c10018137f28d40c858b20e99d5cb7b5b6ce49d036eb79c9bcb4f58111a5
-
SHA512
2d84aabb53b8a672bbe1943283050afea5db23ff6b1ec69b3d20b18791426a31c3f9923c07aead611feb6097fa7e0bb78420e3e5446f2f342b635a0a3f35eb16
-
SSDEEP
768:OVDeI1Gf1jgF/1jTpzXBo0rYmydxbo2bEsfvQ:ODlwgF/1jTpYbo2bEsfvQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{602553D1-826A-11EF-A9B2-6AA32409C124} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb90000000002000000000010660000000100002000000093dd26e50ab1e7a5ffccd955c26cf69034f3a724dc9b374b56013c9b670708a6000000000e8000000002000020000000066fd8eb45ac7bf9ad11c7be8bc09fe1b53854d4020219522c51b92970cd0fa0900000009e07faa492ea59da92b1785dbf83cd0e245c136740ed4453e5d298e3cb57783f1a4c87adb68f07b9db2602f8752fee274760005daa5078b5f3c286335fed3ebea1c035a77b4fe2041bd14ffd4bb694f41dced819d161aa76e1f03284aaa026478366d86f292647d42fe2a0fe28c1af782e93897c04e3424c66737af733e97ccf8f104887dc9601a8299acc0e3de560c34000000088ae1965d627e4a615ee5fcb854f5324d3e02873cd6dadc3126ff6e546c3bc263561800d5abaf28acef1c1f134ad834e9d3149443e6b192bc957fa5e013ee446 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000004aa2311c644889023fd23a2a142d652b777f182b22701ad186388cb575500799000000000e8000000002000020000000e2591dc3dde3c35d91ff8720cf9d2fcb1ef2d1ebbe69263fa3abce9b464728c620000000f9eb0cb282eeece06b7b9f3689f20786e01af494d8d9d43ca32be05a68795010400000002798ea7146679939e8781a3e28a61a89448a1dd9e4c679c3145c5bbbdbfb3dbcc7dc95a90215dd743e9d791edf47a14f64594f734b0af0b8618974abe98101e4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434219754" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10125e387716db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2308 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2308 iexplore.exe 2308 iexplore.exe 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2984 2308 iexplore.exe 30 PID 2308 wrote to memory of 2984 2308 iexplore.exe 30 PID 2308 wrote to memory of 2984 2308 iexplore.exe 30 PID 2308 wrote to memory of 2984 2308 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1407e568703031113f30bfd08bec87de_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2308 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaa9009ae979f3951f74accbb5465318
SHA12ed6527d9ff814206a871fd486515fd10fb54db0
SHA256cff3d27d49441366e8150cdcaf1223703f11825db7e55ff4284a586f54af297c
SHA512131adff5788b6e00a1988c17a05886d7f0bf022ef89e47ab822a3a3bf87fe9d3ae27f6f91a84ac8e7d77aaf27e85dad5b7a41d160f62919273345039c47a896b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b138bb4aa32264358e4b46c8867da5ba
SHA15828019b628a5fee2ac71b7478ac5ae543f29cd0
SHA2567f5ece16e9987cc53bfa75d1623b7f328a9dcc96f5f7aaa6d1367f9638323f42
SHA5125da4bdd63cee9c9e674969c39d64be168cd1fffbf025bc18e797854c90578bdaf1f06c2b6655e5620ab68ef522ff868a6097344ca36e0de6a51675780c260ba1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5704b193b6e16bfa9ebda7cab555fbc58
SHA17c9fb32fd30eae59e53797dbfbabb1b03b9139d5
SHA256a942527226b849d0db227f50a5dbd833263913969ee906b58d55bb218bbb1bb5
SHA512fa7eb2be551b811e1599a9aa73c71acb621d23069c47493dc3213b567165259b2b2acd056ab4f2c779460909655bb4b470f71c8e2d623f2272793e27888d77d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539aa4ea2da351fb0b0bdcb971bc75e47
SHA1d8b9054b5998de9855f29e68c2ab1cc1594e3886
SHA256084cd7e375708ab8e3264b52b63117485700ab209e3e19ca22c887b4e133236e
SHA512604435919175dd7fd51e0e1cff84d717c76cdd04363150469adba2c4b0a46b40472b690bad9b8a3d1af8779a3716b3b895fcfc2da7749debc2a84a9149c502a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a956e3cc08041ba51426a97bbcbad67d
SHA13bf55d0692e60107726f2884f604954699f9c0ae
SHA256656122ef3f8321c07a541e67ea953c46b365e895bcf5db4cd164fdca0798a1d6
SHA512196b7aaebe840be2e4aea59f46da1c5ca6abe51382d1cc91097e29bda5d640c8c8824b412248b27b68407d96f59a75063ef030dbe0d6afd85c569fe4a2fea74d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ef22ddcea443b0ed7a7ae1c290bff50
SHA1959b7f4a99f50fa2b8bd2b3dc1bb53b1a32fdbcb
SHA25669c6c5a7adf775d349211d23a8f919d473a3ee0cd3f277b90dcc4d9db3507409
SHA5124f92cda1518914b4302169a96a56af237744b42b1851a52239398c59b74ed26d41a4a349e88ad904ae766530a4e8972bee339568ccf97cde656358e150f694a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8db9ad2e09c4666c5c9b930712bb6a8
SHA1b24ed4ab3a77b99fe2b184a5edb417b1e31d94d7
SHA256144af2e9bef42fede48944aa654c0c7d271217898240b1aadfc84e4d351831f7
SHA5129fcb682e9bbb62784faea8cc038abdb296fa96f2bd2837eba99aa22d012484d472fbf2d5ceccdf8148bb56bd2ccccaebe5d117d61be22bdc301e5287878a20a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543b747cc5a6ff976d4500a5ddef2e5d4
SHA1dafb85a324dc4a686088163cacb2dbf456460567
SHA256874cd8fea48b211d532aab3a087502bfe5c2126ee9021fa1623b5d3124c08209
SHA512de7e06c8744632c4f4f4899d05e489693ac257d99dee18b01e6429763524563acff8a47be27240fe2522245d18824f440136905b82e0f966731dc02c9df3c5a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c423ffd3b5dd871e8062d9beeb0fbcea
SHA19ccb93b0b9d7505b04024d90109e814636fac92f
SHA2566df0704080644ff0e718f507066d447d14e232f28fd4ca373a3bcfe38bf4acce
SHA512450fbcf0da2cc649a99c735fbf4beb00caa9c583e9dbd3710d8802d9cd25030cf5b197c4f430db09b73a9a1d91036431936a8e7318a6617285a1ba83f2aa6066
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5314922605a3de8165d9f8a52b1e6e67e
SHA10131338eabe2714794bc6cdf241a72b52ecb764e
SHA256073fa8fc21b302c334dac667e538675376e46292a810ae726c7b0ae16f10a4f7
SHA5128b038df3f905a36a6864cfe2c9443227af6ab2ecd6bb93e37a9800e52e3b1c1d72396dafc1ee5f1c89fb76b967dbe7a2658caaee6ce7cc186d67b41c34c01566
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5906df06ed59c382078685e50e1fbbff9
SHA1324965e68e4fe2e125ea457eefd7f94dfd53767c
SHA256a8783a18894a26e061df185c8903adb1632297b2d79d21f21af7b359d01ea8fd
SHA5128d851dab1f419c2b6e4265614bba212e7e7b579fec0826016bcc90d01597a6b6028b5a6753f531840549d9d228c039d9f9f76839157bb08bf2b956be32feb4f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5843938dfaf029eeea5d4de91d3c74957
SHA188e6c9c675d97647f6c84519a3a179f4499260d2
SHA2563eac3e7cb612d258a74a426df873a41f2df5f23b14f1a95f2b8f976dad455990
SHA512db7292dcf97b1e2d808fd7151ba4b9d4e4eeef8edf385eb3d5387746a9a877eff9573796bdf631def90330ad4b5ac0491abfebb7427899c5b9146b9f3e53da57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd415329bba8dbd977d9ee0f6b0a8017
SHA1d92b6e0909db135a7d3b6cdc04d816bf1fd09fba
SHA256067126b343f228af955816b50278b0830db44a1d5cc807be12e3650c0f19fabf
SHA512bf92b5791f7364a57cc9ab32071a68de4a430ec2550dee20ec70b0fa1d22e62cbf1b6af049b11fd3d59ff0011830ea34a424ba0b958e7bdd3086206e2d789aaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524fe8c8fca3d5939f858466a32e565e4
SHA147ee54a28c8b2ef3b915aed77254ac8f841e4b1f
SHA25643ab5d2607cefe85eeeb380120926b6894ebac30d8dce602a5e63a0149e9add1
SHA5123ac037484476e3185df15ec576207ffc624b3d90ba9231c0d5319b26444bd073d74272695dfbf37bc1ca7046eda8e78cc1853d49de96149994a3a5cb0b9f5e44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512bcb3d0949070307742d0ceee8ac03c
SHA194470a3b7e85c8aa225f9b0346ced91fdf362ced
SHA256aed15a3d767c87e4759523e1a38a010edcf561eb1c39195decff40c02b3c5160
SHA5121a5b1844f9c65b07e38dc8e8789d728707662566166fde37f0dcff99cbe3ae1b5a8098e39d3744df3dd09ea79e2aaa8ea51e9d5b24881647d3da8e654e88cf39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecb7f1c1d3ebed5e97a8b4e0d156ad3e
SHA18f02082e1bd35fb16fa09735115b7340f775c936
SHA25646d53227c55bbfb633d494ae6e52e90dca912ac36b9377586ca69c8dc8de8681
SHA512020c9f0d40fc82cb162eaa089fef439305ebb1e33af8eb59cc00f4326847600e1463cb6f03566f70cb7713e30a17fb8acd47068054a3ccca59c60524d47dd6a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae8aea015010a279ef97a43b1e0eae90
SHA1445581204b76176aa8fd0dd319c91ccb19efca31
SHA256f87274579227dda0545421722a297aa628404952b66d87130236115007a227a8
SHA51272e2b519a6286ffecc0daf93402310f70f21b7afe6cf6a5a31e64fe55852c2a552e291436b61f5441b33a03685ae22a77657b8331eca744bcd92d849b4806178
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5926fd273fb355391743b11e0b21a3a0a
SHA15c0c56ac1e02de4e3370765b0ed0c3ba64a27f5d
SHA256b653d10d541c13e79044a2f4a2b1f2062ce525d486ab99755e08b574eb9eba28
SHA5129e4142c8bd481f8ef426b853a32dd6fd6119d6df1d3d206c827115010d8a5868195bc178a55ce80dd20fad09ff34cb1426b4bb130310db40737ec3d2e9159399
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b