Analysis
-
max time kernel
136s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-10-2024 00:01
Static task
static1
Behavioral task
behavioral1
Sample
1564f8134b7ef485aca8a6d5948aa39a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1564f8134b7ef485aca8a6d5948aa39a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
1564f8134b7ef485aca8a6d5948aa39a_JaffaCakes118.html
-
Size
53KB
-
MD5
1564f8134b7ef485aca8a6d5948aa39a
-
SHA1
465bc468c4a1a2701e6e539d0c7281b44694147f
-
SHA256
a75ce631b9ecccabb492869050e1029a41046e52d322295f94105e63b309385b
-
SHA512
0b40fd679442db28d3abad98bfeeafd59cabb7b36b5186db3bbc22a24fc24b34501d34e1cc52f3cf13766ed3280ed5aa170c81d6168ea14b49d0c60a67226bfe
-
SSDEEP
1536:CkgUiIakTqGivi+PyUnrunlY963Nj+q5VyvR0w2AzTICbbhom/t9M/dNwIUTDmDz:CkgUiIakTqGivi+PyUnrunlY963Nj+qp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F4C6DD51-82AC-11EF-9B59-D60C98DC526F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000090f30f792403c6d33b56f2a96a64a3ea93044cd06a9e01df56cddba54f477a7f000000000e8000000002000020000000605fd1d2c8f113e00a599a37b23c9a37cabb1b5a7748f8f0337b0bcf4d08b1e2200000008218caa9d05adefd25aaba3495b215b424c407871800def6ebc8cc13ef0452f840000000bafbce4ffbf58ffa055e37acdc936638ba0e728d924e1e5fdf04564018c11a1c1184c5d9efac9d6a20d7343c9d0cdabd68e89a0bbfe2f4cea46fe96de2b81385 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434248352" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a082eccab916db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2672 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2672 iexplore.exe 2672 iexplore.exe 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2208 2672 iexplore.exe 29 PID 2672 wrote to memory of 2208 2672 iexplore.exe 29 PID 2672 wrote to memory of 2208 2672 iexplore.exe 29 PID 2672 wrote to memory of 2208 2672 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1564f8134b7ef485aca8a6d5948aa39a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2672 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56710beb0e32b239284ce8d9f38078a85
SHA144b275f89626d22a3c61ff3af4c92a24ebaf0ca6
SHA2561ca39572e28278106719c51a720cae1ffc5f9e93b3cc63c5a12b287fa013bb1f
SHA51288837dfe50580bab9d8ad80191897f0b9c220911c72bba7930de9d50885c3bbf23eb79ab7213fb679b1a1ba6aff1f3dfad02676be8e8c532a65b89b20022e18c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b28d8129a77c4dae8f1b6f4da1d6f9aa
SHA1553c8e81738ac29de036d7887a002c93d2a1d5a0
SHA256f1ecbbbbe39283511e2fd722da97c56fb2df74028598e485bb90071087accac3
SHA51273dfa5a5ac9650f2023aaeeacd0b4a0c257862951bbb123ec9e8cf9d3ac40c28fb8ec07d5f6bfa0273c26c522adb2cdddad9fcb0926a2b209347858e25bea4ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd148f72c87141949713051106f089e3
SHA1d9e4d9b5679f8cea53336922e2434789cc22a1ab
SHA2569c433ac1628454879f4ed917de4868a410670ce85955dcbd1e36658f76c932c0
SHA5121a1c82cd343d498480192724e0491813ff6680d39b4b08ea5d0590850627ad8c966a85002c951111eb69ed8d4f43c96b0129ebad3022da1140996df6ca17855c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4bb6b7ce73923b66a997a88b9af08f2
SHA18fa858bfc321b24653a17a51db6c1faa1c8a8fe7
SHA2560e1aa1abb8a7bb706727fd9be31fc48ae6acba31b213a5f1ddf75efbaac9ad56
SHA51242b2ceb24a463624405d06203561665dce5e1f97b311cbed6ab04796d0e6088931bb5951048c0742f1b7e485e5f242ae8ce15876c6f6b2f2cacd6f9d71c10b9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58452a574955d0dfb9da1fb42d73a65eb
SHA1daee570411bb6e1eb93e542b5e8b9a8e577cbf8e
SHA256ba04a16bc69bcf2dfae73c33b75d2e5cd884122a876e8b96f8d759e2fe31f444
SHA5126aaad7268122195b543187690bf1b9de19cc0a4d5eb29f49aec1399a9bb7dd1317709e7e6ffdc7c1806f6490a388fc95c6abaf6f1fd3859540a19f20e91adf8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc234675d5a4d266a573df632e37b408
SHA163ee41e84791f195f2d06f01acbc2f63ea4a56df
SHA256e84a32e56dbbbd4b3430056474d296440c0645d1056779c72c711358f9ba3df2
SHA512bd5573c28b0bce1646723bf8c4de9674a2e062bff2a1184466047aac0d9f5525196ba8ec5a0f55ab89675c3d6055677fca0258f095d5b1d1f9d1c763139f21da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a867bfb4f08cd5352e968d20a484747f
SHA14fc996a46d9bc00e5ffd3c7cd5352f314b0a350c
SHA256f1571c38d0daa09cf58fa5ec6af57d7a3d322c985ff0a352b75d82a678fbddbc
SHA5124fb0f768682e01bfece40bf8a839930bf0010298b82095839aaf937368a1104396c0ae524a20e3a8a6f0be5f9a1425126d77f5b719d4fc567a3c5dfb3e0a84a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55faac990e6cac7418010191370b6565a
SHA1df9a178d522f722b5d8dfeefc2fcbcc2532c0008
SHA256a90919b2222ae3ae1630c4f8d37521f6dbcdde745815d7d52fcf8d1bf2e46f2a
SHA51214953d647d500ce84975cd7c604161f767b46aa7ce6e5c23557d087389ecc7969e463c8d10931b4efb1f042383f768438d5c86ae47f580384a932631ebab6bc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5991330910f5e0a29661cb8a3af5ca175
SHA176c61e5a400674b12d2353ed9727706de1168fab
SHA2560f16aa775a7d4a09b5d065167b37b219acdc7b9d25d3ba75f40563ff4b3d71c2
SHA512911123d690d589a98d37f6983f8f58dc4cf79327b29cb09fc4b0b94f481d865e53e16d016bff2cd6cf961dd46eb46ab8a007af332d731c42283b945860f3ce90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf7bedebcdc3696efbedf36c13f7d803
SHA1b06ac441df101c3de672d11aa99e6c34d174b76b
SHA256c807ad4739f078e3615da3d345e1e920d66e43f4580dfd7a4ea1117835915048
SHA5125f4c5511e841c48ff68c41d92f9b321430e3c217c99bc6775a32bab9d5651c27c59412809f73b084a5eccec32b934ee4ac756bc582892036faec8f27faa85051
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f3cbe60915b41c207b2e73c2398e6c9
SHA1d8cf1d6fd5abf826fa6e044af62b7cd909925a86
SHA25633a8fc2d6ab40d5724c5afcf1a6cab33d5692efc7f59e064c6dba8f035654a0a
SHA51236cfe2cb6b00f1639f08bee7f9328fffa1875d67a3683d1ffa35ddb0eb59cb76dc118f2f08cb590a4ff77c4c61b71c109db3eec7fd500b4a3957b64e8e5678ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53038b357ac8776d4c447ae3aa9fbe0e5
SHA1e2b7a2f519d6b5afb14edc075461ec5e6540be63
SHA256804c234cb6a16df482683b3c593ebce5fd242616847e8fbed4af298e57c210af
SHA5126d08019ef060f76b56d5249cada4baa752efaa300330151ac422ee47e86aa957ec753b32d32b5112da8a11ace1425f3f93adb27e5c28f710126126c0dd2960dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583f7a398ca87f9fb1d599d37aa22d9e3
SHA1d47e0c6aa3a71ae432c6e9fa06a06e833641b0e6
SHA256a1afb412090e1aea039f185b7e652afd629f026f14446e077e360b3652123310
SHA51287fa2a3ed380e52e6ddafc1bfe4dd0690b2f9476ec5a987aee1413b410a60ebbc2276552303ac1b6a4776e452a0c1f06ddc6e50ba60d574f6288b6f144f6dc3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5061295af0792640fc0520291dbcf5697
SHA1ee4e64dcbbe5026b3503f5d81853a033dac278f4
SHA2561062eb1e4474087b0e8087986196614262b344129e258be2b534e6d50235847f
SHA5123d05266bf572814452936a66ea4ed2a852294c57eb106617e0a7f870f78a18a519b1624e38aa1b2533a184d8b84e25519a8206dfa6f3d1db040405e637abe963
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5608405b350c0980918dd94c4513bd341
SHA17b0e5f67240382c84ab302310054164ecdfe11a7
SHA2565ec6a9d8eeb34ff753ea7d3198288d77cfab769aa5e5c511a429f75959302873
SHA512052f00dc1a604e7efc2e323514d9b8a68488a74d39f357161d9883404dea2435c214921a56577ebf8e08a20514f4ff72e8d84471214395c4e6e88566957c849d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffc63b10ac023c4216d4a225850da922
SHA1ff4fe065ba5bb94e03acf1fb55cbc5d941f99170
SHA25638cc0f9dbf381577c719d8fcd3d2e01372cec5680e5b532d0f23b498efd23ec8
SHA5126b2e5ae2b37aa1c0fd787470ea8e0302315142c6eb764f48f570ee108e3c1812a91ba90d2f5277b35d3e8828e3c8cbe83151969ac90ff1addd9ecd242aa94077
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ec8cf2f93ce86b43f0ed164c99f1974
SHA10871e7752a9a036c0175193a181b40f0b6d09652
SHA2560e5648fd8928890b13db0ec0a1de8c5a4b7bd38c96f430301ceb0a65c10c9e89
SHA512933096fdd728c0896e2315e335d72974f33978b4f832536546d8f4938b5659b3805e78ed885dcbd52ea9f699a71387c850b24eb068fd81ffb7e727f4908e472e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\56KJ964X\glossar-js[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b