Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 17:41
Static task
static1
Behavioral task
behavioral1
Sample
1453890e09b06c6cbcec3437db6fba10_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1453890e09b06c6cbcec3437db6fba10_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
1453890e09b06c6cbcec3437db6fba10_JaffaCakes118.html
-
Size
53KB
-
MD5
1453890e09b06c6cbcec3437db6fba10
-
SHA1
a3aa7d36e842fbf227626929e99f11310d3dd238
-
SHA256
bbcf90d4c85a0774c066a1d03338f40bb60b7499de601cbc0bc131ca1631a165
-
SHA512
65c9bd5d3d6a4b87a85e8a27bda8b1b6cba6dde5f6e42bfc1c66481908aa493577094d21ad6ba441e46fe2fd445735ff6dca8de98e28b3cfecac2d61f44e5256
-
SSDEEP
1536:CkgUiIakTqGivi+PyUXrunlYC63Nj+q5VyvR0w2AzTICbbdoz/t9M/dNwIUTDmDZ:CkgUiIakTqGivi+PyUXrunlYC63Nj+q0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000bc6087417130e02c665f95260dfc352d642851386a2e758332f9c96b430d120a000000000e8000000002000020000000efcbc936c47a94b95b934f62d16797af3e2e4313c9e97a12b957153420cbe15a900000000f28629495a805d0f14fd4166e14f2d056b82735fd081213f7fe8fc41e62c5a6d81fd6f032b05336acf846165b8f4114d0c4fd4e11bc5f32b0e6c8cb5cea94a14c0e3cb8f75d529b355e2d2ef517171d32e46df8a4f0a332aadedc4bac2174e5d9ece0f07dd9790c92f28addf9eed61ec5460687685810f74d3bc5d6fc45ca5b56de7ff8d2be2fc230e51562535cb1f840000000538bd39d6599ee32caf244f1fd8cc691ebb6155c881babe47d35940241a57277a5b499939018522e4f09e405666c79bfeef96669f947957f33f7a37a2bb5209b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30803ccd8416db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000d260f8ccd76d5afaf12763e48c4319b3a97a48e52389e3e2d87942d2b8d8b7f2000000000e800000000200002000000075a2745fca0b89641e36cd0aa03431d5af437533c243f74f9ddb3c5590912e9320000000312f3355acf591f8b5becb400646bc21a52a08c72e2ee5333fdc72c8e96b295a40000000beb564f164cabc476bdc9bc15f9c2ccec683e15168616e628ce161b9c8059c847e43c97bda02e754f52ae691c0401d743cb49fec808aa65e3bd7a15cb536dec9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F742FBC1-8277-11EF-9917-D686196AC2C0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434225590" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2400 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2400 iexplore.exe 2400 iexplore.exe 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2728 2400 iexplore.exe 30 PID 2400 wrote to memory of 2728 2400 iexplore.exe 30 PID 2400 wrote to memory of 2728 2400 iexplore.exe 30 PID 2400 wrote to memory of 2728 2400 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1453890e09b06c6cbcec3437db6fba10_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2400 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b393e3764f4ec1d761ac9dd79888e0f6
SHA160d614e6d7daf7adef517e03b1d1aa967478ff09
SHA2569ac54d8c7857216323f9f8ea39531b3d9d02098e2fc3521570eb9e22cc6675a4
SHA51201e9ab3d33cbcdfdfbfe8688ea940d22d985cccf6622675db468edb5f2b4c013d6e1fef811068c33cd95f1a45e257352d84b51bbd2a7c886083343e48bacaa8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516ca6e0b7a476a31178d2131d02c32d1
SHA142786a711183eed474b2a50c93bf4c59b2c525f1
SHA256762a0a0e1a4077145be99abd6fad547bea9c540d437978504a8441d4c89ba973
SHA512596523dcbd5ad63fffab5c2442289b328f5841e0f8f297ad5db6df39834f6af25decdb07de1e188b4c09883e3d76f931cb6841960ed0f2d444199be1c657ae7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53965edf4e42e2874fe1bef4075459a2d
SHA1360f8187a2cf4d51087a53ee8cd8ee5528f53327
SHA2565c0f5ccec0adc8980ee74729c24f7d8aec5f57fe22b4ac99f7a3b49bb5dadf5e
SHA5128fe233d99b703c77475f98b658f44b16be39fa0523c6f8c593ba52e80afe424f8c601a4617cac7e57e80fd1aea5132f42465f3285b907a7b9883fb236618379b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a93c747a49fbf6f5f62b578f5a6dda00
SHA139f6379a0d13655c7557b40833ad716d81edba55
SHA256d20c369da9d0a5fdf3a99aea0a35735e52c3abbf2e6b01cfe140d782ddb3ba7a
SHA5120209a20eebe8fd7f7b2413d147d24ebc249cf0ea3504c23bfccb4e59d89d1e53eb80d305e296b348e960d3c88a3871ad0dd065bdcd56f7fab69c1919fa726a2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580ee865596eff5054caa26c45a6fe7ab
SHA16ea388339f131ad86cfb8edce6147bcc3829f4c5
SHA2566e4108df9f4ae5ceccbcc4fcff753c0c60b162a843ea22745f2734790991a119
SHA512fdc54998724415023a6a327cf3f5d429cc539d16f1cf3cbbfa0dcb7d818eda52a8f3e01b75860dac44052fd4019e256fa7c69ad1e8875d2202d7a9f919ccd110
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b5a93f9024c3cb1678182d956c0ee58
SHA1069c69dc90f4f2c062177b3031af8ba20550439f
SHA2560eb619f9f800229df114af8963b5604381d7d613752d6057c5b67b790becd4eb
SHA512f3104c916f8dcf66c85bad72cbe93a0310d56dddd7c6af42161d8e7030439312c8239cbe8394a8e4136bc39e33bd1ec76f2fecf791e46feb907b87281fa76044
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5570d039d7484613ab6cd17860d74efe2
SHA199db88837d5db5f2ce6ffba72b258d409d481037
SHA25696d171c04ea0e0f75b1a60dff10b418b3bf846769dfddeabc79b88770b0ca86f
SHA512c8e27b908c89fb222e3e76779e473e517ac731b2a14b785909e73a8fd322a2f490098ccfa3153f1a191dd62341ef3fa821324c008ac64f654b7c021fa6c358db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cadbdd9f00c0832ebcd01dd978dc8b5c
SHA1c97caa1cd38c5e3efcbeb697c8ecbe83894b635c
SHA25634f72260ffcc2b51bef51cda2aad9adbd9a98027838b35b23176dd5b198c25dc
SHA5125964acb4ee54b008c948bbfdf3d9b796b3515ba697583d2b45fe53462e66a61e71a72c3d4fc7cd80adf62ce0bdebedd6e27a91550afd213c7d12586da64db8de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5136a5588617208a952d83b635d674316
SHA1bee629757e28eb11750c47d60f67811029ab4a9e
SHA256a43e319d161d10f57efb53e916d3b62d9ea705173b5728b4c89c647c5640b67b
SHA512b3064075c64f8e1170c2da158db608abbfef1e44e6a6a953fd0eed1a5a979c49dbcaf4a45de004efda803f72d9b6ff6f575f5bb2b80df25e0b3a6d8731a6b27f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559635ab783a9025e1f0b7981ab5c6bf1
SHA12e283f85d93e7dd8f67025149e59cfec6f1ad8c0
SHA2564d5ab0208151a32ec01f4bec48ccad6f049a7d7e30b2f4d96e55c52dbf9c172e
SHA512e589de02b139b9f9683ef0ab337be1d4f20997bc17baa3a82a094ff1074095189e14d1b4b8b4a3331da23d53c0908b2635101de38fb29b7bb8cf3922a02d6306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564174f9f2364045a2136c80d3bc07ef3
SHA11b6deafbc49f118d97bf056a2f604976aefb1c28
SHA256ea1781dca40238f8c8462b9b1ac84560021e91c3fc2d69da5018dbda95c0424f
SHA5121e90022975a4864d419dac32e0a400852166e92ea6117ece30ada2da1c1c33c7a5fe0b292cdcd1f2aabd3925286e4324979ba518d5043149d57990e18ae2c687
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55546afe7d95773ae7fd5c86c12dba93d
SHA13d198af9e51f2d7c592e2db8bb1009963f178d20
SHA2563620e5941964d45ddee46bb97d5c43f0bc2b755fc9b74f47fb442b0bb6ac2263
SHA5121d64576e6f3fed768ddcf23dde5608be2cb71fd29a26036fec398cdc855a41d35d06e6c51b6872de5a40b0607d0e7ad3d8903ac84d9e80d0010d08bd10cb2e1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b240485080aa287b14fc9ea6ff246d8e
SHA1a256ac849950790dfeab6f4f4559b532a1b16dc0
SHA25697cdd5c3c04cd12ead64b530914589e69a54e6de9ae2ae93032d15dc9828f425
SHA51251e88ed384fdb6f790f03f0465ea6d138da5000a0669c04ff95eea9ebdbce2473d0846e3543b2f01fa84767673edfe643ae27a76fd97f01216dfb8ec7d6e6f81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599c9e30849d74ddde1e0e9e12cfa05a5
SHA16b592a89f172f89f5bcc195412483f70860a09f4
SHA2561e2d71c95b8caeb904800d4e6b0aaec761711eda7793befa1a58dea5c9aebbd6
SHA5120e1eaf2a981e7db2d6550e8efd64ae4c415629588451c06d5d05cf2d5dd0c436e9012f3bf29f61414144ede3380be854e32f1a7976a2da52d8f0f84b03fd32d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d81b512d0145181e1809a21af5f36fe4
SHA1591134b0cfeb54a63c1b8f887037381b160ed12f
SHA2567b08d5e1bb2e3b37251010035b268e40ebecbe641c5562c8b1f3169ee7fd617a
SHA5128562035467299152a62eba9f7127f0a79c9a5cb370a39c8c22950a0421e50f3b8e7b774bbb6303336deb4b93c1bffa2de6f5a82b5d6a050cfdf1d2de85a14a8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504bd1cf39fb964143b7663ef8a7bdbd7
SHA1dfb4d18161c24f57e1b03e4b92090887d0fda24b
SHA256fae6f69e06885c222c27242d785bdb0f3bc754d240336429ea00bc4edea40ff2
SHA51295749eea99b732491c86ee00766b2358fa6f6f962afb0a08458a1ebcb736206a5392a4a5c9cfdcc6b66f76aa5f3b220242f364466bf8ea88ed43a476a4572cb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc89674078d138badb21e3af74cb37a8
SHA173903324ffbb06e8825c89f149aa168804bb2f7d
SHA256144d8ea1afa984ec81e0669753343669cde8a0acfca6cb8b45d2e8f89ccac4d0
SHA5126263a350581f0a8f527e849b3ba6b5c2f729c419cb670974fee4bbfea2f651a167887aebe18c0e6029ab44639fcd5a856d4b2ce6517c30ac8547885851200857
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K3VL8XEP\print[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b