Analysis
-
max time kernel
138s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 03:37
Static task
static1
Behavioral task
behavioral1
Sample
1602b2e3db123185291736f88a085cd4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1602b2e3db123185291736f88a085cd4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
1602b2e3db123185291736f88a085cd4_JaffaCakes118.html
-
Size
90KB
-
MD5
1602b2e3db123185291736f88a085cd4
-
SHA1
451d50b0ce89cad61deb793fb44d4e98e0c74349
-
SHA256
68ddca273387d9ee989b3b3fb4757f20c5b95ac422d816d1421316404573587c
-
SHA512
6d1589174d8a63476b1b2fcd751795c9f1147bbf2b741c6dc738a0169b0e9073b22880daee47900860470d376be0ff81f043858ea821e095ae6c0a3b4115a732
-
SSDEEP
1536:gQZBCCOdU0IxChJcWw3cdb8d+qTEU91tdSoySiYQGQq2mNDm3Vheqt0XvCBh55vz:gk2i0IxoPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000b8931f59017023de69aa099c4ce2e325c1df8cb153c2d39cb52ca934621237d2000000000e80000000020000200000003171bcad620f295a43143965290a7225828f905f79c22cae1e7a7f261271b99520000000976f273bbaf4531b39c6997879e99ee9504ded106b47d2be0b9cdf29fbeade13400000001c455997773d8d64719d454e9a7d16f4abd1591b53d8522b699b5cddfab1ba390bdeb85a8a09f25e35e4517a1ac1082b4eb8008e64e72480d04684f162af76a8 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434261346" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{36F07921-82CB-11EF-80EF-5A85C185DB3E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0b24e0dd816db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1592 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1592 iexplore.exe 1592 iexplore.exe 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1592 wrote to memory of 2140 1592 iexplore.exe 30 PID 1592 wrote to memory of 2140 1592 iexplore.exe 30 PID 1592 wrote to memory of 2140 1592 iexplore.exe 30 PID 1592 wrote to memory of 2140 1592 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1602b2e3db123185291736f88a085cd4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1592 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528f4024eecfaa60ccc3693cb74cf8707
SHA14a95bb30d570d861bbffdd56722065153e7264cd
SHA25619f2d424a5d4176e28c43e1a9383f6d313a2864668eefeee02af2e3131ba3d95
SHA512ea4543e4d2d504c6e0600b74e63cb9f489b249bdbfaa9b85b6b476f8b1f2733094e3cc0c192f9fb83d886f535bdc0c652fe8b39506ad79b316def5e6738dac40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfbd201e2ac042b7d7aeba32a013c847
SHA14b342511ab0122b149b4bb0b486f5268f9f96077
SHA25634a08d9603713fdcb6dc21fa8a45ffbf429735a2928fe60602c6b7450d226d3e
SHA512191eae6f7b757ea24d53dbc1f16f5f6ec6ccaafa7d58cc1a08fc15d8ba29410d8419a041677c19212bb9a8f222e50c8efcb20c990a89d5390adef521b6f41bd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c3865b0403d9d0ba96c7cd277602beb
SHA13cdbf6c372ab24dd8c7c7fa2ac4fe95bb4d9e673
SHA2565b3610014eb4fdd4e8c509bf13de60a0e1ec6133fdf7c85e3d78a8eb011a7910
SHA5128fd4fdf431e6bd66ca908aec67643e43cbb7a2cb262f22d028a6ee05304391d3a3757c946890ce2a84df58e5139e5759a5231cc4c600e6c7d18b4c3e4d092cc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fb61a7715f57a7834ee0f5bfeb0ee05
SHA17bf21f3a20a19e434c18d3634f530b36ff5fccaa
SHA256e6f2a0ad9dc9877a0fa6f5231a217c56cd0c6af4716f0fb834ddb22fcb020e4b
SHA512b312f55f975b4843347fd3ca963f378a2a29898d291289d787cab6ebd8271013dc52ee0aac979a97e1c803223fe27321858659c5386e6970fedc905851b1efd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59def051aeb75201988d0d90ea35836b6
SHA1a939a7b3141652aa326d7cd7ceff9c976e9385dc
SHA256d9c7da5c2c1eaabfc7b38cf988efcaa8c2afef2b7a00600dfcfa125f3e926ed4
SHA512c3b2ad2e28570dbfc744af9808cc4438d4fce878b7d4dab2bba08630de6da4ab9a39b5ab36e6a0256a2b76720beca82eef2ca8bdbaa6da31351eecf7ade8153b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4f34fd781629bbd524c10c00075c8d7
SHA1441b1c884a83f7ac6adbf04d551762a5034b3eb6
SHA2565a1b6fa36a65afd61480848ac3690cd69ed7b3d03956d18c62550f8404acf6b5
SHA5127bc7700946c8502f5e1af4761c135eced6d12d6b633cf49b0c61b7e6157d238c6726e29a0efe159793f80bac42b38ed82ba7e86233e91d1953a8d054972ecb47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c216b6c5f2d1959fd0366772fdcaa82
SHA1949aa74610dbcf51e1dbbf63da9a2519f9c14a93
SHA2566bc4409af227856974d86d07266226a277f962e10b43158c1946790b50d81c22
SHA512a93555507f0841c152735b2ce530d54a2231cad25f0c6661afcfc9ea1c2060616abd5089eef858e2a70550a703fcb0da1e8f7389028d0658c670cc69b03cd647
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a72c3f2f58bc7dbbc68bbbf6783c0c19
SHA187a3af1b7853822adb283cc377b5383bb49a189d
SHA256a3dd2142beebeeb0135d6807489fd87c5f04c8ec6ed2298cc95492ecb355a498
SHA512b7412b805414b678302199c1d404b521476df20047e03532e8dee19765c1d2d40db51747c4a38d7c1ddb54b252452d8cf50187ee5b06127a43e4a91ecd3c6dcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfa4d0c82c57f68fe250f7f644898f96
SHA1657f7e06515664325ba5d7c715a33c015692978b
SHA256fb09675723a4b2ec8d09331986a884451f6943f9daeef7622292a7d0546de5d5
SHA512cd3fa023c1880aea36015d45a53d33397dba118350cc7df86ad7b49897c48e47308ea733c26c2cd5af8b07837243df84bd3799a4e7d18e9a2b7bad29fc9e706e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4d95aae893117e6c41a66f40f5b5e91
SHA122f0bf7c867cb985a1001a9db3fd6d980c8efe99
SHA2561f32ddf5c50f7cc8011cbfe0d0e0ffc9d0bb6d65e1ed4f579012855864306f9e
SHA5122c1ea023e38ee78f2397d670b257852824b3cae48674427a992c48cda3f7c2ab08c6631a1cc663d3c8140dcee40df73f77e121c8c19ff45a5fb7aad832a06bd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b0c8c163aa5e06bc2609786f046e96b
SHA10deba5b64470c2d151f42994f5a500b502cd9090
SHA25621c3ba531d1333d2cd254b160f2280bf2d1d7f626b4c837c335aba22cd7c7501
SHA51253d089d0caa4d2a54de2e0228dc98593d56c80853db39b199f257bc8c0fbf999172860ae81cc97735268024b417ea688965f81c0652e8a8ac94f3c08027a89ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557c0aa54a76145bc5adc5a4368f7bb5c
SHA1468351bc3f9d11994d813badba427831c00e31d3
SHA256d7fb207d2994e436ab44fa96a97dcca31dbc6acfde12803c382d453dc2a67bfe
SHA512d329ff0011922f26100869df4ff46693a71f75b289df9822630b32466403ef3c514bbc83db6b89f4acfe367bc520b7af2022922b783554d0b732a48873c5b428
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c612a682c9d1eae3e5ac28c7d81baa3d
SHA1172cd5ff164b5a924d4782ecc542a8822cea4091
SHA2567d99baa0dfff04b70fc538e83bf0023b125db9bb2c2ef156c226c4a3cb38839e
SHA512976f8876cb659cc78950e816389be49bb06af5ff5f2ff7b28173a1650e19ce3e22742779b133d919fb9cb6d47a5caca42e371e61d6323e77f4831838a2a7232a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bede12fc6a42e9f9accd26c1db0b1ed
SHA149cabb7d47899bdec5545b3051fae253e68ee356
SHA256f18032a00f2533b51509887c5bf17af2fc7371d8cec0b835f2ebb2e60713019d
SHA512a4a6e0c9e9e4530f015c7c053063ab6c77ed1f30c75185c99657ded9ad325c0df0d08d32e910bfed7f97fea6e7769a538538492bedc85d6fff54bdf8cc5c8617
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9d151dc2c0c63de64a9a2365b2cac55
SHA199932f51b71a21f9ff5606450cfcb175964d4167
SHA256b2b8bc92e741b0f84f41e236fee081e04637f553792e1a376f6a9ceb008b233b
SHA5127e57133771863580f77c85a5d468c4c3e748349d5e85b3841785f0c41f291d01c4f3c8bf90d9e4281708d4342ab627eaed08cf16edb906ec87fba8eb9bad95a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534ca48849c0cb6bd80c548a1986d668c
SHA19d77716ddf3c41bc7e277adb8172f7d8a5423799
SHA25632ee3dfc8c611964fe556e07fc70ca59b6cb4d1f2c4e43892938a7cab913452b
SHA5121da8e2ecb37ab43191f91658af9de2c1ea2d5d277a6ac81975b72123f48cdf3cb71759117d8f4e7eeb3f5301dce4e041b05040702d47d73b12e004493f0630fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf8385cb8f06a62d6e557ae911d4d2c8
SHA180a02486ce5f1ca8a439b052265c6107774ee0a3
SHA2565c6ac8910eb07885a80ac0738d347ae44bff649ac775d8579f8c481abac7ed45
SHA512bd17dbd4308cf30b775cb7fac69ae591d820ef1ec168f8d6de897b37bccd035db4e1a1219aeb513b88f815240e65cdb5213cc05050aa74c7d6493998f0f9bc66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8919b86a0c48fdb904a35341221be39
SHA1e2bedaf739c3845840b4224fd83beea31ebd6206
SHA2561a962325555adb4a6060119acda2cafedfbfe79bd228d1656f81a5c76306f34e
SHA512ff0e3843329e1c23f8923c5f91ab138acc82c6dd6377ed8ecaac29933b9d5394f85442a96d69d2ce49519ad4ef48dd85a12b44109ce6ad531e52e5a01998b97a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bc126b08170b77ab64e04d9e6eeecb7
SHA196c9bb9b1c6bf1b16200d5f9c106c11077715ce7
SHA256d00bec7ca03511ce35644dc66e2a8542198035ee2ea2abaf59ca238cc6bb3257
SHA512ba2740fa788f77c5492f1501e06d8f58c94e1d7bad370b322c37aaa67dc7df2c5b11b0b1e84c20afa55156814ebbbedb449f10598cad26818e43af74d96bc804
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b