Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 00:47
Static task
static1
Behavioral task
behavioral1
Sample
1585b60519622fd0ab725fa54cd9a24a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1585b60519622fd0ab725fa54cd9a24a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
1585b60519622fd0ab725fa54cd9a24a_JaffaCakes118.html
-
Size
9KB
-
MD5
1585b60519622fd0ab725fa54cd9a24a
-
SHA1
eee45d5eb6421a8ee9d6399ec4220e6ad69b0e50
-
SHA256
9bcc283c3995dc5c8351c8279a4b23583473d1e853458e466e1214ef1ffc029b
-
SHA512
4bae2f992be8f3ffa99e8ab851c4d641842fa8b20920469e55f4c2acd0fe5673731e0beae0152eb7e9b83f87a5bc8a25edc01fbf51a322f3672a19ce9349cf2f
-
SSDEEP
96:uzVs+ux7kKyLLY1k9o84d12ef7CSTU9GT/kPsipUlVHcEZ7ru7f:csz7kKyAYS/UdUPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000001825b648b6ca0b91d26b0b881930399d37b5d2897a63032197a917426ac7bbc0000000000e800000000200002000000047598f670a3114650e4a4d61690c5b3c94182f86d30a72dc7f90f0617d1bae62200000005ea8d82ffb8cfe8b84dfda38f4b3853b8e13f814493ab040c81cbd222fd39b5140000000dff6fa7de50cc4a166606ca29d41d512b6c650d5c12d805bed75a4987af6aa48318aef079a973870c470b484be85562f1fb1b18d0f7ee2c6f230d43482676c46 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434251142" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{75760B51-82B3-11EF-8D9B-F2BBDB1F0DCB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e000fc4bc016db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2328 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2328 iexplore.exe 2328 iexplore.exe 316 IEXPLORE.EXE 316 IEXPLORE.EXE 316 IEXPLORE.EXE 316 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2328 wrote to memory of 316 2328 iexplore.exe 31 PID 2328 wrote to memory of 316 2328 iexplore.exe 31 PID 2328 wrote to memory of 316 2328 iexplore.exe 31 PID 2328 wrote to memory of 316 2328 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1585b60519622fd0ab725fa54cd9a24a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2328 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a7e41e0940ecf36d03a59501c022314
SHA1ef8d1e0745d5a480eb3f5668fceda71848466dd1
SHA25641876a69791391e1710e5650682f70a7fbcc0231663ea207f5b803c875d1a526
SHA5126ba545a25dcad1ea92d610bec7bbae3b8539f8c3c226b684caff9b9aa8002eb4239e7d1f926fafdee05fabe941f79bd4a3a4f0662665500c0637845b6453bb6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a907a91a54b4e51ace23a4631bd47ce
SHA1cdb671c8b55b99c9f759bbf7bbb89ac6ed8278d5
SHA256dd27cde4d49df6d82f53cde8e0e3e3a01c45b9bf89c0d27106e4a1a41dc4fb25
SHA51222307bd48d91803dc00c2013fdc76ccc0d8783866ef0b78c7657d924110a80546e0531f33c3e3c219d16d382062ccec8154fe5d6b964993fb8e7a7a47ce673cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5022c05a0c6fb9370e94a508cfdc4f204
SHA1ce07bfab24211baab7a1057d29f94770f9c36063
SHA256a2cb8410b48d46c7eb5d173a2c7d926ae588a30ac5f356431d6975576d7a4865
SHA512d6663cef19ce9166430a8341e8d061785c7fb1f09b12d767041498fad39bf447890eb647b93eccd930ddf5df7a161bba79ce38510aec7ff99f3d1886614d10d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1c8b1507d8a1bab198b7c817385849c
SHA1894b909cef834aceeae207570ffedcd02f0b0be4
SHA2560b9c95eb225eb07a75e4d942c9e34003ca7f4a15de263092a01f3617a9e1f7cd
SHA5121e49bd0edceb8ca1cc2b557f39329b25abc1d3a7dbcaf8c38c2d593e8bf4379089faf81dd0f37394eaef16ff3866bb0c9bc90e049152c3d1884c5c345ceec1e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6c394beff45bf0cefd7e206268fb56a
SHA1e941ebe8481175e39a8b7a4eef5c32590c6d15ec
SHA256bfc75df8c67db6cc1351a3392622ebe3937931bbe2d4ca00de952649d9dc670b
SHA51285e422cca350db20fb19419cb3d7a75c8009504079e04a871c58fb81f4a11ed088db22a30c8a85216e9d8b5dd3db551b58833dfc9b9fe4234a6171538b2138bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aab776600c20460a836dca4984e3afd
SHA16620850bca0cfd62e546d374d39c6d5a2d718fc1
SHA256b06daafd17819552e2f29b8236e919af213af4713de5f799286b90186c1524e1
SHA512fbd7f82d1b0fc154df3dd7bf825ef9ee63db69a085aed7cfe021c60e817f5652521c6f37edb3bf8bf56d189650d0f5f07ecff86380c97f6c1cd243902d1a45b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5080e76afbe0564608d15538137f36e68
SHA1d088824e34ab93a530e6639f1015802de2bc1615
SHA256cb22ef64673ffec059b22802d695c82227228e7a6d63a92d60fab555e6c70f34
SHA512ba141b08e78d0e5ce48110470c2ee1d22ec47350f61388b3f9d58647d27d8874457556db621f9a22a26f26646d9b93f689ecb8235461696344a9b2e08f33f853
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5842696cf16815ab9dbd9b7bd8ad5af27
SHA1ed0e085a42071dd4324dcf4d1a0f558e8f7eaee2
SHA25610e561fe04d9bb0ce774d01a433dc50830915635be9c17b0d0364c596f4e32ab
SHA5124cdb7ca58cb913e1dba20371c7c8fcf5d787f5378e02074f137f840ea4c0c70bbdb36788efe1ddf7bd00eedaaac00a487c3b4c9c885ea2ba1ea6b9f9f7d797e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d71ac800512155c3784cde9dc3ece3e
SHA1bd2d20db73e75ced95c009991f82618423f27129
SHA2567872e81f936000f9018598fb7d08b2484319abf31711ca2df14e3db4e228549f
SHA512ca5ca012a7ce7f8f1025c14be1fc72145ef2235c5f954f96fec55e3a3efef37247b9bbeb7473b3eac33bc65f5110c8b0460d0ecad872146d3db952acf1fa94f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58211eecbb9f957ffd8f3766556cc315d
SHA14c0b65cbd577a623b50870da9d2a033b770c3249
SHA25621d209f677098f98ae44439ed6c7d3ff78be2eca9f10d87db3e369ee07529183
SHA512c7957348d80b9be89a068a6f3b0f98caf909953a50da6f5fb3ffbeb1a1343eba5969be84ef96714ffa3bbceed94cbe1820445ae37e19b16f8a1655d79530206c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7f9edfc5a76c4d2e162e737ea6c728a
SHA161489a6a3c3f58bc6348dd9e1ae52a57d186ac1d
SHA256c17372abba8a0780a7729aae681f72d084c0e2c92a5e09c26a4fb6be3e8f1007
SHA5122f772cdccc935cc1bc1b6d68001ce0edcef2cf73b830118ca6c87c5c78bdc3c92fd83065b76117daab358e8602382a03bfa2a0d567dfbec7dd7ee230558783cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597f3f20e81c4da5780ac2928cff1ffe1
SHA1fc986e3a013ee586e2cec36f06bb252284cf6490
SHA25650b5b47efeffb0a307d711838bd86092e140c5892a22e2736cc6329cb12211f2
SHA5129cc351f3b3c1778807157611116d3cdbfe59795ff3b38acf6d8b3797a4f577f15da950ea616d03d18ccb74a98d0604fb3c868112814b891313b78b83818077c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7a369f193919fc7a439e0113221a8c4
SHA1765f62f6c4da6e13a77c0cc6f7caced261de9f07
SHA25630efd56a6f3f05b7f649a13c19a80c7a7beffad9dbd7e1a1dbc7109c1bfae9cd
SHA512b11baeca4353392c69129c5cfe3f005bd836f9927668a3730543c2fcdb98501d7e74b569e82ae8d1bf8201fb3d02c95cda464e69f0f5008f3b3d760846107a1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55670b2d28c003a2b0f5820faf3f216db
SHA1c2a4d75107127a6669845d51405c012f799c9230
SHA256989fb3bd41ceea6f9078c9993e6a9a0eb5106917fc139b24b3d920bcc5374805
SHA512e6a62bdc697ba4da0fcb5c18335461ec252539b43d1e1b0643239e990a210bf386e98483fdbad178b91e3e2ddee59e4a16efd6b532d01e2221eca462b3561ac5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507346a14e302ad6356a6d0321a13a090
SHA1fbb1bedb07884adc307a46b73d29dc8b8fc8e70d
SHA2566e96fa2e0288918793e262705f226d66e8fc834ddf6735a29761ab3c77d11fa3
SHA51268e6bc418e67462c1c70554285ad09afbd398a1c87b0f8718605c2150c3eb7fe8fd8fb27b651a0fa361a4a8cf110242ab45d7c0bc8ae9fb0167cd8a0b3cf88fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d7b9de1415fe21b81457e2f0587e8b0
SHA1d3501e08971ede22ae93af98f5ea637878835a6a
SHA2566058c5317f3203223742653625d1d1687e5dbdec624e362daecc62723383e557
SHA51239a32ba842a7d0025a3bef1bf445229c10831a53ebea1d4017ce051d594130b056b030aa399eb2295a274f5ce5df475c58b03eda326eb6d0f42c9a768b785682
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae94d34b7c9976cd1e809fd657898f91
SHA1e62af40ae9019cce090dd2d5b083b43b20f06afd
SHA25601d558eca8f7a1a24b38adcc366e23d9882fdb5a6290f5d119982e87e235ba43
SHA51280794dd5014414b6f87e98bf8ef9749208cf7fd63f1e7b9ba7562a5bfb1276b83cdb114f180b82dba6ba777605bdfabd9352f4a2b86c18734223699a2082b000
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d954fc59d1681306a36fd3e14f37da9
SHA140fd0599e20c10b8ab6890b8894d374a17743b3e
SHA2566517c4453c40ffb66f408869fbcb67e96a8b1cc068f2e8d21940341ae8470d8d
SHA5127f3e12cc0d5ce4974427a03ebf41891e29e7aeb66a83bf7e047dee2fbd2742c8291841029a7a811114387bcf0383cdc959888da6ffc741d23d1560bb097d80ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51faec7a84b9db22c20b6e3ce63bf2d95
SHA19d378de3e5c2476f884c1afa6dd7e8ca690c93c5
SHA2567f31e1c462b183f30bd55158719ab3b470b71d158155fc6c4ff3523e5a35e5db
SHA5121f8fdc93a24766f6697dab038a71bb86b0ddce23ca7435bb3156f72080316d9cb5e81d034115638db5a6252446fcbb09ab4ed190fbaad16b15f0175a12f54779
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b