Analysis
-
max time kernel
69s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-10-2024 00:13
Static task
static1
Behavioral task
behavioral1
Sample
156d84a3b6abd2406480edfe7108d456_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
156d84a3b6abd2406480edfe7108d456_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
156d84a3b6abd2406480edfe7108d456_JaffaCakes118.html
-
Size
10KB
-
MD5
156d84a3b6abd2406480edfe7108d456
-
SHA1
cc321319a94e73c17d1311d25928731e8cc7cde0
-
SHA256
5ddbdf1055b0840241cea495e0ddc36f61b68c469ac3853e62d121aedd382a32
-
SHA512
6087a354ff0cc9a71c1166e90d91f778a92284818b30d0be4074107303168b53877401af55faefbec2ecf96f8c05d32cf893035aac8b361939d25c5d41cef647
-
SSDEEP
192:fGzhTxD93ScYr/8+lSMRll8kpk15Wfc62xQ8JieM+xR0B3XHmlZww6BI6nlkF:fmDOJkk83Lw5e6nu
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9F519111-82AE-11EF-AD26-C60424AAF5E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000eceb80499375f74c12a85e54f362ab1b27d77013d1a3056f06b20ae9b0bc9093000000000e8000000002000020000000628528d850e427cf7b8652981d37bb3ce602c3b3b131337af510d8181652392e20000000153c4a1925f9b82f09998e633f1f0ac33a7256de04dcdcc6a0bfe3099fd100114000000037939627d3fc78a4ccd3a978ac097131008683a357a66051ff253fb231f3d97e754e889b7c7ead906bfba4dc2369228975433ed761a90c4433e3b381e9ade0b7 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d00ddb74bb16db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434249067" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1972 iexplore.exe 1972 iexplore.exe 2280 IEXPLORE.EXE 2280 IEXPLORE.EXE 2280 IEXPLORE.EXE 2280 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2280 1972 iexplore.exe 29 PID 1972 wrote to memory of 2280 1972 iexplore.exe 29 PID 1972 wrote to memory of 2280 1972 iexplore.exe 29 PID 1972 wrote to memory of 2280 1972 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\156d84a3b6abd2406480edfe7108d456_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1972 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b00b010f98422834a6a190be276677e8
SHA156c8999472fc31debe48372fc9b6bff87171aeca
SHA256b68aeba6817aa2fbfa2d644f98d16326644d51d1672e8d40eff76e6d6ad20ab8
SHA512c2f6b2eb7999f011b5e0b5147f446ccfc6db07d92f8df2a50b0cf8181bbf4e52634f53b59b0d7e1e3065a93fd84283e604636db82e9ea6529a341d166ce4d77b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9a450d0ba21bc13feea67538ff463fd
SHA1469e6f22c3ce96bcf5d437b6e86d086a8a7cc8c3
SHA2563d4c1e767882922f6fb5faf516abbf414c1ef9294dbf0f983a9a07e9b6610bdb
SHA512bfd3e5d479f87e1037494111e32f7a18c5991bf9933522c26a0769410242e1b2cb60ce54d429703b070af0c19641b2f3d7a56a7e0eb698ffe0a0cf5c134b7802
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af16a26044aef3182ae59c59d79cb91d
SHA18198ec3e72b32b46fe7c80f9ae7a39c2ef6f3c70
SHA25667de1cf640d59143a84ad03c7ae11ed17130bebadc0076397be8e9d0a50975c8
SHA512bad0c86a5b121fbcc71c725a54e495027ebf7210d4292da880e35102aa65733184ad65b5b4393d0a64cc2b66651e63b916d3d1f08987b1b34870290c5ee375f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1b5e6d5ee718d4414d275c672657be9
SHA117cc4dbe704c45bfaaf5be2faf09bb905d3fba2b
SHA256ce569f14e4a239ca57b8063dd7eabd691bd9cb69ade49bc58c4794090934341c
SHA512ebf4dcadb5e46fb70eefeab83050f143a01292c778e4be0aaa8ff7df5247a19d883b15991b9248c008cca31f05ae01db9793c6b2a085d9809ed6276c33c1c579
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540940d3f7e1a0ddf5abba10f97a997fb
SHA15350279170df7206a8787e1207edd1dc2572abdb
SHA25625fdec8d0c1b922020ed49421b856f63fa20cbf3de1ab2374c08d38497a706ec
SHA512909b7d2e936a423125851ad9970fa3ed4701541037a49af2b6f3d566bbf840e9835f6621c23f182decd768c70a2abadf3c6c1d31bafdd0320b7abc5de9be3b00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cb8fed2ef679a11d95913c043ecfe9a
SHA1753f8033bac437d44ccb8fd86099cb483c2d516f
SHA256e583a777a74950ad9205f024f96c7b221194fc57728bde26cce96dd48e87066b
SHA512763b7caf6fe98c708927b2e38dabd2b272b3ea4170e03c2df23fb8c2f11a6f440fbaeb142d194ff2c1c770eece48e6612ae5b78e8518ba0d746f628d21acafb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a9a3cd404499db75701090752a58068
SHA13b7e64e0666d613a62983c0b9034dc523b4dcc4e
SHA2564284a35e925748a992e84a73d722d68e05170df19110a563b9084607d84b1f7f
SHA512e13dac2146cb4a5dbfe972c775190ab377a46691dbe7b83bc38afe3df64806bb71480ef8ee171235d02b611035c7c90aab7ec78678abd914162b0f6e2449e954
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6a29e0fce7f2b815fa94469f1dbece3
SHA160c646f427a0798be54609691ffeec87651a5001
SHA256fc74ca6d02be867d63ddeb1433e052fe9366886001389eab5f69a5667f0d3c9a
SHA5120ffb5c29121afc446553cc83313a3c22729b23edca0e1997d85070cfc8a2d3e0663ec39ecc0b524fbacc84290f744b0c086ca0a8276ae57c33ea2dbcadcaa3cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb2dc5d3d160e7b1c6541bd9c6934ba7
SHA140feff0c68212b9bc866a158c23dfcf2ada7a17c
SHA2567f7595f03bf3b8b0a81aab7a3ef3c02b95d800780a8e6c42ab1630cfc338024b
SHA512dbfaf46e56f64fb4749d18f974f239fd2cf942c620574a3e65127ff69e385bc112059610349a42f0aa3d56f1c6c2c71aa7d3ed6485404a4858d1aa4764137d99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cf58d9e247a51eb6b24efe3c2d905db
SHA146dcac422f32f3fefa5b5007875dab1debe4276e
SHA256e990abbf4a2f33047d1c6bbf7c57b3d89b1b8ce1bee72a6198caa2bfdf24eb1f
SHA5122d7397ea7798ecc0fb0f07c7fc9a6ba0b66bc255cb62be241de67d46dce29b3fd9c02d793d397eff84346a59d22beaf6c7eac5cd4101ccdc632c4b50fa5a2664
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5314ee56c90b352b761b98243e9d1c7f1
SHA1e1db8b4026ac21ab45d3910726e2fb0e0c943ad8
SHA256dc7f38c68c06b61a1b2796a87e801f8f5a0e800acdaa6e2836870b7c9762f923
SHA512f5beea577e6cb0475f4634031cba7648cbbbf982fd79bebf6426810041ce5b39fadfe1cd405243ecec6530910c3fe1c0cf4ec99ab78e7a31c3a0d21c1fea5a39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ceab674532d3551ae25fcb890bf3e80d
SHA1f7c19b3d7aa10d064150532e99f312ea501a396e
SHA256cd806b4c131819af3bce0028ec565e3fc3a3df8094a3c29151c43574c68244d0
SHA512a71eab0b36a4952ace358099dba78e93705f5d410bdcf15be14c6e91c042f672eb30533cae25e09b6121e14c6c96b37d3660cdd0029c52a4a6556b6e2bc5fd59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544125149d719db9daf592274c283e215
SHA158a2a91a70bf115f06d56b7d9f41839f602c9503
SHA25635597ed38b34c5e3dc2c968ff3b95096869274fda32ed84f39740edbf7a19b30
SHA512ed2d84e66a706d5eaac9080fdfc5603bbd927a48e85bd4dca49b47a2c075805e41a973f186c5cdb4a08ad5290ba6ca1cbc04af910e8f2a205d990108733087e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5788f1b01f1bfa983e4ab181ffbf883c6
SHA12cf0b63d64fe3fcaaf64c60183b9e10b29a7f64b
SHA2560086ddf46bd68c3200f12feb4a9235041e88857f36bfe5c63652649413240fce
SHA512093160b5d1ade49f55666253464c7e1291b918f0ea003339cc031ce38a4df45abc3894fd7ff70991f88f5599af2024bc68d70cdb38667686e3a11cf92fddf331
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd39187213c86b7e5931c0206dfd75e1
SHA181d44923dfa9055ef264edb9bce57eec6877fc2d
SHA256b25d517dc55491b96503b6d9be5c97b0b8cddc5347ee05d125ade14c0ddeec6c
SHA512a8749046396cd8fe3e782ad886f70e669817cbd548c271a9efdc9d1baf0fc11c4618912ec9437d1ce840567e5cb46ce9433148e768310747e68fa40cacd81181
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1608f30b01da0b038c26e293653b328
SHA1cd5448e5a8065e6a99449be6f0cea04edda8f00c
SHA2562bf82c2d61a76a3d9c89b436b2458630db408f488ad53f4be3534a0f142076b5
SHA512c2f8e288b93b2eb7c3a6cf1ae39e7b112cf95e714462e51d79a9a623357c7d7f2e8219160037ee51d3d99434fcd78390c78fcdadb9fdce49911020fe6e596543
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582c499107ba3d723d0623b1d55213952
SHA155d70e5e9e6fdc44b6f7aab69ed856f1ec857027
SHA256ce4a2dc96c597f8cc764cac7466aee358fd9784297d4d2c3c3b37160411009ce
SHA512cff9000abd492043ba6bbf95ff082d2892ece4c36940eba610e2f1e9e63ddd61388d7fdb9fb2ffba4f3f57a57bd430d895c2b738cc3f31b8a0534df032efea77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5709cf3ac7556fa1cd10ec73d5266c389
SHA191595b6cf455fd46aa47029fba51b016f26b0916
SHA25689224697bde0bb39c06575b7da8c41df819fc5e76debd2dcef101a03e92302bd
SHA512cccdb3ae3db13062363504d15ce5177d542edb38451975793005bcb195f21412e5064f59b1fc7a913a404afec28aaadee7ffbd134b4319c3e3c26d90869bbb5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b73a0d2529c609b6537b106193c7b4c3
SHA17c3226d97feaf3b16b95077ed57c1e4e2fd2c9f6
SHA25639d484afbd58a3c2ac36ac82fa544d3342918b752eaf222d76c3e9f24baa19a5
SHA5120a327f4b2ff5d924154617d2e285b4b1908a00c8d01232179dddaa311f1701692550c73f7fce2c317a8b8d0568d34e9c2581ff5d5a012412cd5bec86e3eacd31
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b