Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05-10-2024 08:30
Static task
static1
Behavioral task
behavioral1
Sample
16f16805217304c758690357fe2fe51e_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
16f16805217304c758690357fe2fe51e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
16f16805217304c758690357fe2fe51e_JaffaCakes118.html
-
Size
66KB
-
MD5
16f16805217304c758690357fe2fe51e
-
SHA1
15f3e10c5374e0a49e4814c954fcd839c59873c6
-
SHA256
9edde9c97d5b1a87774c2559eb5965fb35811ceaaaa9c5de379bc807ea7b13c7
-
SHA512
9cf8e8ec74266cf703dbcaa0d62d907a08ab4ead285bd7b7efd7ae890929341a31a71fb613ab9da7763323b3cb6346a3fde1148949c02b9c184dcf4799ebc63f
-
SSDEEP
1536:SLSCoz4oXZovJA8CWzZ2wQzRBkpFbN711cX:SLSwi8C5TzRIFbNB1cX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434278925" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d01a02140117db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{24DA15B1-82F4-11EF-8B76-DA2B18D38280} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000099caf46b772e234b801cff859566472000000000020000000000106600000001000020000000d576f853526516bb50a707d62c3793ccd33556ab8e8f48dbdf1eca2696a54c3e000000000e80000000020000200000004b4e8e5e92c089405a6559dc7035c32cd2c1b46ccc8e83b66d8b6231d8d8fa73200000003fd527d4a4bf749f6485b0178a5183d2e5a5aae5cebe2d25137ea4cafd74d886400000005891fc2bf0e4f89ca4d7072e380ff251fb6338f2d9032064d6dc455ac5839af8f9433dd2b101041a6899314c9bd4e62939c3c2fad9a50de3622f9bb919ed58ee iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1700 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1700 iexplore.exe 1700 iexplore.exe 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2180 1700 iexplore.exe 30 PID 1700 wrote to memory of 2180 1700 iexplore.exe 30 PID 1700 wrote to memory of 2180 1700 iexplore.exe 30 PID 1700 wrote to memory of 2180 1700 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\16f16805217304c758690357fe2fe51e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1700 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ae67151a8659729e19a83fc7f6958fe
SHA1c9974dbc0d44df122bd721f8ec3147dfdd87bfc2
SHA256af6f0cfa3ac3657616131f45933d16befcec6fcddad599fd1da282aba87271e4
SHA51264e0fa4eae4d3e1408cbe3fed9d022442335b190ff7ec29df2e6ed76b31f40cfdc98becef73944572d0553581bd7cb6aef465244320352d09466355208720f61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593e9911e817331f7c6c61df0c23e2292
SHA1c7834b7ce596150b4167d4cec08731c6c02ef686
SHA256d48378d7373da1ce94a400ec89999cab1da509adb204dfb6761252330de0ad5f
SHA512e882b5219d75301c6df5c3eb251255f197a9df107d1f2fe77c2780881bcea3ed6a124a5d45ad6aac549488ef06d0e1709582a281f668ebf38ffcb05fbb5f54c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57afb733366b1b1997221ca8aaf6f777a
SHA1d9d751d31ca1cf3c8e76ac9cef3fa15dea0413e8
SHA25649bfe50bd33e4afde0bdf72791c27f62e380db6b458175002f42625ae4085743
SHA5123b21794da3c567d109f652dbaa9a8f4bb67a95ed6f0b7f7235c4bdc78ea6ad140faf7eb408a6db2e44557fc22c68fc8a39e187cfeb1d54cccd69f279c1a0735a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d19349b5e45538d89193f50792ed979
SHA1b9d91afb15d4a7efe1d3edd793573cc93b36e504
SHA256104b156d28013406b061c3528c647a9b7c8a5631dda53754b5aa96afc715159c
SHA51243b2ae822d866e8522b0f8699fab9822a4f5b2994611e5c30f1ad529d60074ffa6725b1b9e2cbcc26a3d4a3bbd18d0629259b3fa6968b7c66fb1cc80f8965d51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52159fedf7cc2fea1086964fba8e049b6
SHA1369e963439ebd234a27e2402fdaee58c157de5c6
SHA2563c4eaf41a7f0533e2a9d931cbdefb9c2e06b592b94e66c69914db226f35fc312
SHA5123c54c9e06c7699832b932d361c01cea8e754bb9566f8c5ba6c60c14f58796644397073a80e949d11bbc1a2d04aec029218c203b58e70f1bd6076f35a2e2c3bff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5269e70e4f7b7b1f655cd1a0904f25919
SHA15467596e1b27d95356c037ffbf81ed85876d72d2
SHA256493f47163387e5dec15c3b60e9995edf2116a7368b3bdb618ef4ad0907fc5e04
SHA512b57db692d26f5c7352ebebc339f1a0034c89fbe949c5f92f55a27a588c53e1580f171dd8fab247692fe5bbb723022a449ccfd44baedabc7bf9c4cb263a3732b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9aca6cbc4c53eff8bf597eb25c4ae4e
SHA1cfdf68d7ce2e4f6ed509afd9728426d0c1e99ae8
SHA256a88c3091cc3406ff1b862974d42f2a05b5b06cbd9cea97fbabcb9bfcef7005f0
SHA512cde6d27a9c21f46d3a50b11a5c82c8899e35b64bccf7a4a3c89de9ed17c3693a11eb69a0e555fda721da8daf958ab2c07ca1e23b53ceefdb209ab1e478c45c9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9828873efe1cf02e58ea95ce92809a8
SHA143a85cf132164b0224fb52156dee2e2f9b3cc65b
SHA25696461a1dfea44a23b8a729df73650ef4b373dc5f9cef035ef701583bdceaafbe
SHA512c2cab566a0d8621a734f45e1cc4500c14e7d323a55b22c546ba1290cfce158b573a72275516797eabf769d92d662943eecb7e1d9dee7bea2976de7f9e2771fad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54419014127845209ba39e2b895503918
SHA17bb7e1998d77b3a622e49e9cfd679fd0085750f1
SHA25641ff8f58b0781f3b91a5c3c62f034e24f5da5a68cf42ac7041f2cc2971d82cc8
SHA512c67c57c97b114866f9c0d3882989f5e327ae2684e77fec0eb1b563a5f024a6d6d3809487608da0e820c6a984a7201427584ea10845e1f23495c60def6e6fe0cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9d36dfff6692bb1322606e95cc95842
SHA15aa6c0afa20428af67c4d1c2b8b5b62694e7e5a4
SHA256a837e3f01aeb29ce2bafbdcdb261e7f3146c0dbdcab0f6b7ad5998fe4d9bfb18
SHA51225e9e493b8882f10c8ac5cd3525c4935e848f4d9f674ccade7700944064d8f2a712cffade6525a9e1b41497a5f82ea5b46a93c73d341d4d5dfd69beca8e9c2e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a904aa0b8aa6ebf82bc949b05c922e08
SHA181f516c3f2983330c7f66fce71fc40edf319cacf
SHA256177cced6bdae6e4dd086764e740d64bcb69bcfcc37ec17f39cd514d5c4b972c5
SHA512dc030a783ecfff85940ff12ed59f882fa4356a85b635d4a37eeb642bbea70281de4bc1466b94f2c59104598becce2447f100118444e96feee402dfb0a66c6987
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d3e819105a3eca9e6969e4b21beaeda
SHA1cdae22de0ef3ca9b6f438c38744f777581630e05
SHA25682fe20db1d99501581e6a26f75c5151d35cdc991ca05693e3612888565d2bbc4
SHA5125457083eb2b205be64d242a5c92a5a882a1861680ce91a84245781d396fa9dbecfb845ce08893297a4c3c7659b98544172373af8b8c8b7f1819dc0fe5d378801
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f663630b90c0010f5d29f042897e86b2
SHA121f4b86fb99269cbfa83c274ade142dcf2ee9648
SHA2561c207ba50a3b4c866fda3f9c0e7a92fdf37c18e07901767f71b8d5c8f98791ac
SHA512d7e8483b66a52a47508370480bef1713ace24394a0e35ec96b8f84256b337f3248280f43efc1cd4f54350330fcec7ec92af779c39dfe799f5ffac968303d1061
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b583cfdaaf4b019c5a603120fe254e93
SHA1f872d41864d34dfa15f923cec7413b21cfe32351
SHA256b5402b7cadcdef25c18a49ab8f1e82062b95b30e52a61d24bb079ab46fd18cc2
SHA51272e56b53997635bb8d4145e813aeea210e10f4bd4b4c5be15ba905c1ed89bbd0bd9807213b9be3d8cf2da72d9ac87f2973ab0aa5661afb7971ecc4582e9f1fca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b988a0d197e2ffc5684d08133061e5a
SHA103fc9da9c0a81460d2edc377e333344cf8a8b832
SHA2563a6526942fef039fb07a76a6aed4757472f99faeecefca910ef9380fd786cdd7
SHA512205e8034c993693c74d35cc53429d97001abedbd369c54dcbffd3ab3bd27ae91e9027260a1cd1e0523e1f5d0ff42d701eddd5a767aeadeff56ddba43b8212230
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc0b3170c54bf46860bdf8b0ea7851cb
SHA1823dbdc0a9c52caf7e928dd29aef659ce97c5c28
SHA25616252cd36dd8c47072dd485385fb29aafad6942c430ecae49ed5707ed32ef4bc
SHA5129faed16d87a2115902f1d00968f936ad2981a9402a6cb58e50382b31912677b1748c465339e68daff86fe4f39d84cd2db07135e57a2c6197760e1b9241234add
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec0bdb5763fb485f3c488a41a90e6db0
SHA1a8500524bf89717bab61946b8b1348e6a0fd94e0
SHA2561217632b73104a6046ca4971482e69bb6a0e09e06d2f46e43ad00894278fef8a
SHA5123d871c2740f3288e62017573b5a192afb0627d61a48ac4947eb7fe04670316cfcba33bf44ce0953f78540e2400733161856cb4e1c58e45ddc312e8e36ea04c2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558fffe301abea1dbcbd3da0d8387bd71
SHA118ab2839b46fce1692cb6445326ffb8ee92e422a
SHA2562e6117b9f3c4045d6c5d9c9216cb71a022884815a7985f2da6c29d959fc26ac8
SHA51231723cedf5640311dd496723313a815f26d794bd3b43c179c4481f63e835a85985e645b151de2559f8569d6f5aade5099e3fae79f34f4444e3911a448e2cf8d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0ae12b82d4a094759068a27114ea7d2
SHA1cde20cb8d695902a5359759b125d5f0df5eaec2d
SHA2569da914320e345269f8ac3b295e53ae8e29f52045255b94126f55e2688f22d290
SHA512b29e40d17831069dcdf2b40ef6d1c42f66db5d2c1c6d3d9df8d1d5bdcb24af18c8e0e58968b1c74fa35997389af4998766b9fddd9c543c829b5d92999597e02f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b