Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 20:34
Static task
static1
Behavioral task
behavioral1
Sample
14d53ab9cc71c9f1d49a9f0934f1e347_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
14d53ab9cc71c9f1d49a9f0934f1e347_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
14d53ab9cc71c9f1d49a9f0934f1e347_JaffaCakes118.html
-
Size
23KB
-
MD5
14d53ab9cc71c9f1d49a9f0934f1e347
-
SHA1
4911b020b5f093c9cc3ca9e18b6ff659e6558255
-
SHA256
e6de61c5f9695ab1318188d412393630d48087911b13ae8aaa71ff1bbcd8e536
-
SHA512
978647341e220ae489556463c660050caff5d618b663e6ff8e1fc4e829b2127f6addfa39d2840eb6a74a9a1168770c75441b20a60f7bb22df4027c028a5aaa26
-
SSDEEP
192:uWPcb5ncinQjxn5Q/HnQie+Nn0nQOkEntJZnQTbnlnQICnQtcwMBeqnYnQ7tnGYC:JQ/6Uq6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 703e2fec9c16db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000a378478632e8406cc45a34a5959b05bdf66dee18a9810d2a2cf221ce4022a911000000000e8000000002000020000000692dd908f2a03e7b9c946db0754897ce767d56e526e8538d7274c100d130ff58200000005d43ea233585c8ec24681144828943e1d43ca1a2e0da9841215a30ee7bb374e440000000c5c58c02e60661e2cf2271112929867402f7df12792222d543e2f96d75d040da44de2403d7065bfa3e08abf3a9eb6a4f4042fed0e14b01a0824c981276c2cd96 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{177C43C1-8290-11EF-902B-EAA2AC88CDB5} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434235952" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2128 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2128 iexplore.exe 2128 iexplore.exe 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2316 2128 iexplore.exe 29 PID 2128 wrote to memory of 2316 2128 iexplore.exe 29 PID 2128 wrote to memory of 2316 2128 iexplore.exe 29 PID 2128 wrote to memory of 2316 2128 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\14d53ab9cc71c9f1d49a9f0934f1e347_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2128 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bef52d0f51524ffb0faa521b21b94905
SHA18781c0a01bfd050c83d11c42c344c435fadb0789
SHA256a485d853f0121a48425d84051b03ba7baaf9ca362ff38374e36985b90afa8e07
SHA5125a40a9db57d72e1a47cde611d8e23f7729f136250a4dd4118f68b2ee24436454aa46e6a7ac9b80f85ccafac0638b743ab5144148ba918c4e6386016ef4e1f003
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550cfce03000d778cb9f5fe6db1e31840
SHA12a0d9492e5a1757d38d1c629ff365276c8e27c9f
SHA256274b884597f59191a9ae1af2e0f281e8e1af519709cd337e841aa17e2f387088
SHA512205846ecfa8abae6ddcc4b90d30ef6e8cb33afa27ed2035bedbaac6478c1b02ebbf5da4fb877b0bb1fc7206df7db57d806159169b115b73a251faf52163bb8d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a94bb1b9766c96fa6d8a4392fcad2cb5
SHA16a3308e31db36765c457115e4e313452b9f59988
SHA25662ed589575d0d6a8416452745cbdac1fe89726d1ea15b722b230bce13e6f397f
SHA5120fab6d393d0a63bc6c86b122842385b192095a2529a9bc09adad895463735be5fffb8ec48ff847fef50734206e1ec9c105ba5690986abbaed8187c399780ca61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53970dd5939639fcd2a826e0754f3fa43
SHA1d66d8a9d2dbee8160192e3effd0bb52d4297be6a
SHA2569417b4603b87ee52de2fd727b6b33b33e0188b52c41c9d9ead1d1404f124e969
SHA51281a190d0a518efe29e8019e995c337149a1cbe238133931ce456e3c789ffac076682671416f95b772969b478cb1a9090196d3b5c0c3e1e31508e4240cc7f3edb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f05376ee9f143fce3759945b53db80e
SHA1efdcc9889dcf96c9afcb3866c38f80b44381c932
SHA25679718bf003282b8e60326354b52d0bc9fc32388dfccc9d278073d48a31d1b158
SHA5129e8970ac0680413bba8ae549ccbd7e4ce8bf8309205dd3173f69af3421002edbb1670370fe9bf8050f7771c1f64d40c942aab83a354de5de85675cf7d6920c2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b21b092a488acaf98d7c973e493a579
SHA16a6a3c7beea6376628ddb4f1bd9ccdebfd044088
SHA2560b9be66a81f5eea4f040e19f62446cbcf00091e7e9363eb727528b6dcaef1806
SHA512b0395d9547cefe4742beed6d1bca45adc4c91c1244532a93c0a805c5c1f6dc772d68b418fe3c7caffb9f3dfd69d1dcfc3e1012e7769a259f2d1a273ab6a692d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5257e068744aa41f207342fee271a16e4
SHA1609a4664cbb56140464f43cf304dd5627e8a3cc2
SHA256533f94ba220114c0d1df0cdfbf8a7eadf7088c6e0d8942678365d3fb59f5e717
SHA51297ca3bc090977b63e9e3d7737e7d0ca94b02915a733cf6bd409a735b32f0a3982f288c28e73837d83ea1e4689fb3b065b488cbacbb3bf635c4b5453f41a152c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c047c14825ca26ba13155ce083074cf0
SHA1639fd0971d1b157215e9dcb63dff38232ed29099
SHA25627b578153c38e5cc42ddae4b22facc6c090bff6ddd35c882ae75e984baadf5fd
SHA512e477e7fd1b55f2460d6f1d831fb8f89c9db4b85d108776d7ee8fba848bd65f5424bd641515ed14644985a977d24c2fe02915de91d68b7ae214afc992fae81aed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e79cbb105a3dbf753973bd64e07f4457
SHA193c4365cc3aee8bda8817908ab16f430a134a788
SHA25634345b2456dcdf0b08e4c16d191b28bb3bb413fc1e7d0754bac5fa77f9b76fa6
SHA512c40316cd7a0246e7729ab170bc611ca7dd6c1cf3838b748c5dcc95045437026b388909763e1ee64cb3e0341536cf6f6da3fff18c29dbc51b513c14be18069c85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b9eb14192c06f2a53fba9a0528bc681
SHA1ecd04811c3dc6495760d74ef9c2e1cd04aaa1afb
SHA256d7e408e611ae9667886caa18a4c7a4a508bf9d1ef3e0a10db052bdc4901c1d11
SHA5127758b80c17df75daf4abdc06bc9de7b814763aa7d24364998457af239afe10d9400d350cd53092c76781f6e7a0562bb1430eaa61547f121e6f55fd1b71937bf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3c7400347a44749a0e2a0bf12840786
SHA13a4755244010347aad74a53a1983b955fab655eb
SHA2566175069dfb9bbe80b1ca8db1d8479d5c4d86db979966b3260bf5ce96210ba9fa
SHA512bdc0af60c46d949e1cb72ded5270b027dd5ab12d9ccb5b33f9edd5b8d521a7277316c863a2adec8c305d4a978553410c708e9f90ddf8fefa53acf47179187fed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a616d25c29ef90b375cf9791174b04a
SHA1decbecf4a12991b0923c578875a273ef486ec7cb
SHA256ef332b73e33476508302bfd2cd9dc7d1e45086b6b998863e4d5f34f0e4784b0f
SHA512fbbb10bc9d512d76fecce2e0f2dced900714e4f6c2f7eee77624ab3e2173a7016618f26bd4bfc271e11e4a6b7a1318f9bbe5b3cd0c6ae2390e53db97a28fd101
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ead3bb24474986933ef875fd47556b91
SHA154b9615f7f5c2e6a345a4062847635cf9dc42c65
SHA25630d57c3181f807482e9e4f48d0399670a6d00c15e8d10399737ef25693b85544
SHA51295de6c508b054497b7bda112253fd0a9df89aa8156c204e501c31288a84e92e6a0389a2ca2ac60a697ef10acc08c46166b2f2dc703ae108379fde95a812aeafd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5256d7ed2fe951501b4208ee4bda0563d
SHA1db3c18870a31cfa79a1e5fbc3fcdaca358b6e106
SHA2564de02b4ea1a3cf58e20ebe72d0582ef8c9e110f1e86d7df748c371dce3f6b97a
SHA51214f27fc765a7ab76bb21a905fd3475db37b9790d40b4cd86fba65af9c6e9479aa530e10cd7ef8ad7498ce8ffc04aaa0b6e069c3a2306e29dbf7d4b5f6996d83b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaf2507837bdf3a5593113969d8e4e67
SHA1094cec3d4b497f9d7c766ebeb6e326f127cf34b5
SHA25685fcfb976f866ad2248b34c0bd3b0ad189727803edb536d5e12133df7d8a6345
SHA512b272a1ea7fe69cde770cfceea1d6e416602001df912b0a061861bc80c381bc7f4792c08f5e7c0a7cc698f4e5ec4c4ce310c6454d4d6d8243e76d2eefa1a499e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4022b954060b0ae62f53994f0cd3fd8
SHA1f89ce5d51b40822db55138f47a250175ea67bf33
SHA2568e317c265d7983e9269fc79de3b0ea64c19418f313dd822c73df6f2c7c8d1bfd
SHA5126a90421ad21459056f391c21a33a01d691ab3751d00d7b9855a06cb4a1a4ebecbb4e2d4c9674d133c33f1e1336334409eed19a0ead79f80281337ad6eaf2db5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ab836f9eb88bbcaf652562aac9c662c
SHA1e13e21559d533fd2de14c5c9f80d3fd32c911a3d
SHA2564e36e005e2af2396c0165c64ef15cf0de0796e1b7659e5f3ce0f27231e951e8e
SHA51207477399e24552ddaa87866ffcfa566b9b502559106b9dc5737c37ce6ab3cebfbd9918797d2c115e1ae5417a0c5ee8494a61910b088618bab31cdf02ac1a8980
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c3ab8973fab826e380f0ef62e175731
SHA1316f4f640557671d8d57c8e3e84f71c24966f409
SHA2566812f6b93075b8ad820a386f3cc6847f97fbc1d6788dcc9e43faaa91adc88794
SHA512d3fe3ff29e34e621cbc662eec1bc82509088cf726ca4744ebe8fdadd4d5e8a57ffd0dc00cef25d1910b0ddb71e090e19d62812f3ca1399410c43a21a3c144a60
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b