Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 06:31
Static task
static1
Behavioral task
behavioral1
Sample
168a56fcf2a1cc20cfa98e0e98a40ad4_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
168a56fcf2a1cc20cfa98e0e98a40ad4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
168a56fcf2a1cc20cfa98e0e98a40ad4_JaffaCakes118.html
-
Size
6KB
-
MD5
168a56fcf2a1cc20cfa98e0e98a40ad4
-
SHA1
5f46e0fc16fe8208c69624a58cad75a56ffbf3dc
-
SHA256
6b584436171288702dce04f5a7b4740d40c8ca86fadc5cfe9d105ec7f1962f72
-
SHA512
a94089302725d268fd03a77fa980cbc62130dd3ef3efaf299ee58b0fcc7cdf1c0a42fb41429a99509f7be0da1b82235ed1f4d3a2f654a8fc6911e38f41a098f9
-
SSDEEP
96:uzVs+ux722LLY1k9o84d12ef7CSTUVZcEZ7ru7f:csz722AYS/Yb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8063c045f016db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{70BF0A51-82E3-11EF-BD41-DEC97E11E4FF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000061c3ea08f725c316eb8c1e2807feffb54dc20439d3efddc5af3b695f304896ba000000000e800000000200002000000028e3dfc774267b6cba5056f560614bca3beb01d6dcd4f2b71d9428d5fd8bca752000000046908e576236383171454e733a5c3ea19cf295207ba037bd10a8b3c593362eb9400000008bf81de0b38d5f4d12dfc47c7c334c6378288f3573cb1009475215cfe3b4656249017c21422721d2aaadd42b37caacdf6267dee5a3edadda0647a5764d13323f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434271750" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2252 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2252 iexplore.exe 2252 iexplore.exe 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2772 2252 iexplore.exe 30 PID 2252 wrote to memory of 2772 2252 iexplore.exe 30 PID 2252 wrote to memory of 2772 2252 iexplore.exe 30 PID 2252 wrote to memory of 2772 2252 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\168a56fcf2a1cc20cfa98e0e98a40ad4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2252 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce2b73a74b625df5987a5802229cc5e2
SHA1f84bc18bc2a607ef9413a1f8d95ef308b1b848e9
SHA256e64bc50373c664ca648300cfd4db0864b90be9f0aa0a4bd4de5ccb462d06e466
SHA512979dd9242ae3fa0ad4c2e81ae46771fbf3ae7ebf884c1d744d58ab868bba03cf775dd9a0c3c3e8c3324a7f5608b003e9dcf85f0229d1e864c660e14f2464a848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562810becc509865ca9feda7fe0862d75
SHA1d59d80c66f1483432a81cb31729f902804107728
SHA2569a7b618251943ce0630bede4ee053647fab1ba4f8ab460d99a857e46a0ed0ba6
SHA512c1b177b8b8d56d83caf167c845aa0d3c5288189579f48d2410d21291505f6199fd7e0883d9354f5fd0bc6a4172cbbeac70d3529f52d2bb5636cd691ee7872f60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b84c1c4a6b702eb353d74fa8a90f001
SHA173b9be7705b9c8cc8b1b07dd39ec2d76a51490ac
SHA256b805ec0a49c95b2d283ff24228bf357dbf803ea75fa953097ba4d41dc89a374e
SHA51285042627728ebc103c64911a953fcc28e317e904cb8558de9cb42354e3d49eb75d4129c06ba9d3ad6a4d16556d9da5b8792e02983df82d65de93f2781560a50f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b742774ea13ffe1cb15fd0cfe618302b
SHA1a18a510d5e38d44bc28ff087f2b4cd028d38df9e
SHA256e5ba44f8fbfc312f496f4cee0950b1481267bd0e31c6a354fae7f5fcdf2745b9
SHA512828b474f893d3737ed943b7a6d1b40619a944688d4fa84ebbf2d201345a6cdf8a5b636f70ccbe2072082062eb35d88e92dc59e8ee8fbcc9feeb63b70af4b5ec4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c904221a7fe033d01810992710f363dc
SHA14c7981c0307e8236b1241404e1a9120ef15f6b2b
SHA2566aad97d3720c94919d89dc861a0f8e0218cff41e285c2bfeee77b88e4119c9c3
SHA5120952529818b6634b604992972519c00a7729763d8462b1cb4b67ab5e6b5bcfbfaeabb5664ef56bc5c386c61e55b5541c289b85df259554781e0ed5d7210def98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5157a2cc071d62d9542e3d3ee89c1508d
SHA13c73181eccdc1ce8f99ff237ff303b2100be4b37
SHA256a980b7e20211caac196ba9994dbe511771b3bd58ac27b567cfd28c2d9070ec66
SHA512755edbdc447d1aac0d065c80602c69c79be81b03e2f340aeae7931a47c325bcad150d699926098fbc0ea1f40941572d286f15aadd21072b24881816cc1d14cef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6aadee6f42a8a1c7b6f9a6dad316469
SHA19f179e2b04b91751455cf118747d11751c884e55
SHA256e2dc093f0734978e743e1a221968ab7a0ce4c2174aebf824521fb2864ab14f01
SHA512b1e98b3fdc6f0a267c53284de8a89b0780b24c61aaa572cd1e06321e0904c023a839fa9bc5f49a006dfd2512e29cace0b183c2576ab99cfad42aab6e056db95a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53291c88da3aa9f17514c974f40557d1d
SHA13202d380ff90747be44eb0922ee8bf69c58e476e
SHA2564722111f998e71dd2c98a2499cf2fad7cd1d3239eb2f21d22b49f84882ae654b
SHA512a084641b6da86b69d1a32f581d20d554aa7e9c6d674a02a1483ce4bbbec4d5c99333a9c1b12d5a5f733d7b428052471be907962de65cb52894c0e2ea815bfd63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc4b9edd1299f321174ddba1f6e8995d
SHA1d0e4fd450ec22932ad9c349de80c0b75de21167b
SHA256a86f8e172db0e7f86a2e1c2e50c4b7ec2cf41897f637cbf9248bc2c89a783402
SHA5121058c3baeb311fe87293471ba52c28b12edea4a1c2250db88512eb6040cca92b64af4e96ddcfc68824e38e807a2fe2531a06766f41053eee423999a12eae3e38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc18ca7da9d4801134300ff115f69c7d
SHA1727e7f7faccfb269c3dc3cd42356c54450ef185a
SHA2564615839fc67c4448bb79cefad7dbc2a73f860caa1cb9103892787b664ed60720
SHA512ec40877bff83ee6726df41e722e9a033ee67c6e2a58001dcca36f3539df4cacabf01313a71d8cd96cf4876c1b4a9b731dd13ab23f282e9762943b6bbbb3e8f77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b986cd3088f076419f840dd7f0524cb
SHA1f65ad5020a57d776b0793285b44696d0115f264b
SHA256919f9f78d7e3c02c048950f3fbac232c9a4144ece3f3e611a090670bea018733
SHA5128460692eb09bff4dfb85c3b0bb7b211cd23d65e0a72c1bf84ba94eaa8917c0bf4e2994af18d849503b20994462c4d98a0b89aeb7cd008a650cc1537c47474858
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e1b01051afed47f24c15e2d6fcc1a15
SHA113c7e3038249fb17b10090fce230a4424b246cd1
SHA256351e21f9c6d5372ab269c7eb8717a6c9be21b34262b1e016b3f39e1416531227
SHA51289eb6865c652b462768b8086f7fb57687dec141c4b02ae1e69326cb44de20270a0c45a3bba0bfe53d480598c574a6939aede2525021b036779b508ea3aa53d51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5264955cf250a1de1d89bcb219ea8fdae
SHA13c0090a546a1386bcbe60074f39a573820a372f8
SHA256ab47aa00871b96a21be2e42a791afe4811dcdcfc549c354efe2c578471d146ce
SHA5128fa36f1e2d483c56c3d582bddb8a87f66cbe12d5939338102258ff0cb6a5c9bc924ae0c13d7d44d2b638a4bb79e7f74b55ac373be43c9e953fda72f083d01e14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5fd31be7b08ed569b07a3d3e661d0cb
SHA1a1fc45e2a7728eccd36f22908167b811ea932cbd
SHA2564937076138072f473f8fef2bdf07ac608b5ef0bbc0a7cfb3a000a7c99d4d2b0d
SHA5125824bac20d1be6bcae49964b56626557870ecd0e5563d466740d3d2eff0120117ebcecbadf67a0d636efe0db71bcee3cd2fe4a11058ed6d7affb952b73109853
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5f88b181d5e6e6291428e409594776b
SHA1aa9c4970afc6f3c1a883c89cd2f1ec262125a74b
SHA256a70e452be1c810d26f6199df3f01208488caa4580132d7972044b198c9e8e508
SHA5123867d137a0a3ff32898e822493d28a92194b010b216a0a5c552b10f3079685431b897f67f90396580c166eb3bf880387abdd8b031a521ca003bfeb79b3fbfdb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4c15aec90b2d9bbffc63306a41d1089
SHA13bb9674e4f8b7e7b5906e9c501ed010497f0ce72
SHA256551e18c8b293a007a16980b404c64ef81bc29c871c0c7b9bc0ea84ea39e673ff
SHA512b38667129e1a9c60cdaf139f15c2739abc79a6b10c494ce1c268fdd77796c6fe251c17e32c5af702d4abe0aa1a8bc09fdbcc6796c90152884d0ca57beaac4375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5563fc66a52abd742fdb87dc3ca2beaa1
SHA1860da321768e045adc2dc67eeec2c4b3582f7ecf
SHA256af93b1780d3afe090b9a9bca7d4e3f17b23d916aeff63118572a07c1f62b1245
SHA512699d6e120feda74fbbc408d2c61354b3bdb1e4c45be06c66b42c8c77ca9dcc28eb3d87c7c5cdd3acf31c3e3eea99ef5de78f241ad4cbe5c501f6b190da7a319c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5847c4241757ab68cccd60eb430bc3776
SHA170f2b91bb4d9bf78fd12e728605ea31d97b8792f
SHA25663765d96fabe90ebf6ee6c31c36c3a675471ed0921b24b1b6ff6eae612c8bdee
SHA512bb23ed0b02766fbba9b316c38f1e02e3c88b8a70320e4aec1e4f3dd21fae826aa59c72cab8f2c0d596fd616105cf11feb557f5b9aeb6373d7d49e9a4b4859c83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5789d3db8d8ebae3f26ebe16464e9572a
SHA1774fbcad9b7635f178c779334ace931342decf1b
SHA256b7d1cbe1080f58a2fee7057daf42f8da3287c7527324804ced51ac09da8b0a72
SHA512b71ecac73cd8270a6c04c77743f4ea917fd8ea421e2da136ed42c828f5c958ab0dc0b736dfb556cbf92a54c832a63444163f4b5926be914dfbd75dce93c28ea0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b