Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-10-2024 09:52
Static task
static1
Behavioral task
behavioral1
Sample
17323f2680d398af691864be9bda1c1f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
17323f2680d398af691864be9bda1c1f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
17323f2680d398af691864be9bda1c1f_JaffaCakes118.html
-
Size
34KB
-
MD5
17323f2680d398af691864be9bda1c1f
-
SHA1
290028926a0d3963eec90b064d7deb86714a6cfe
-
SHA256
11d1447ba2fd86130b0e8bf784cc1b6652eb2a22a4e2098ab9a759f089faf1ea
-
SHA512
5d2f041d178bcf085c97909142357cd9e68547ca026e2e95c7dcf296207e48474c8490af227ce8d0e4aeabfef8dce6888f8d4112399f165c1caa3bae5eac6c8c
-
SSDEEP
768:CDdI5IOQOdtyaRZzzzjuoR7+/nUoabKaJlTQXr6qrcXCMWekTBSPoGM:CBI5IOQOdtyaRZz3iyq/1C3zcbPgXtfi
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434283790" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5069ac4e0c17db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000f5355cb111ffc1002dd86b4132cc11a0caab768a29cee911fdcb2397a51ebda6000000000e8000000002000020000000639b7a68addf34df4bd7d68c9f081e3d9df02a98f2696c0b66c68bfe69342336200000008e223fa634160574437a75bd844cf470b77af41ce4cdb61b5681aca6be4c43a5400000009126e53a4b92b480d7c48030fd12386ce1a21490eeffc6f5e62aaa546105a43f1cafef27ab7d35ba5577f68ae0d7ec84b0fcba130188ba893cf892a57258d7a2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{788C3A71-82FF-11EF-B729-F2BBDB1F0DCB} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2668 iexplore.exe 2668 iexplore.exe 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2564 2668 iexplore.exe 30 PID 2668 wrote to memory of 2564 2668 iexplore.exe 30 PID 2668 wrote to memory of 2564 2668 iexplore.exe 30 PID 2668 wrote to memory of 2564 2668 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\17323f2680d398af691864be9bda1c1f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f8b9e41b13de8a615c1a673d03f249f
SHA16756a1d1a9297ae6b0261ec37f8942b43cec8fe5
SHA2565d7be451b61732d664ad72aed11d1d37c82b50b323d6a849ab88bd8e4e252654
SHA512594407947fe3390044a6f7e30bca7604bd8b8e38da0f27813409a6d9d685e45d6766a911e78ebcb9c2e0d7b102955d10117ac84392f2497394928b0ee82b053f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50369843d431e3ba85999a060a50a5f6e
SHA1087d7b217af2f531888a558dc8672c42653609ac
SHA2564dbdbda21a20e6dbd74ef57ad1fa559b74a4849ee4a6e92eb3791dc4654b9379
SHA51225f503300b9bc757f6c20d1d20461548310cfac8c92bec28ff4c331b201ef94261abf99c8677f2c9d310c69ff8246e2022302927e039dfc8d39595486ccd37b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b40a2c5f0b8f63266bb1ba069969617c
SHA121418bdddb4fa2ea7a7edbda73348e50ee4b6dfa
SHA256df42ddd0198da0427df02f7891700b36943a728128a1e6a8838c1d554e753b7e
SHA512001c8c1c809714c9e0c1a727ccbc504c8f76be5be42a5c2316560c9a53bf805a71b926e2f0b8f952f7690a01ad1f3dceb5d2d945cdc7a4676a25f466be929789
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534d063c2255a5d3455dcdf52b2cdfdac
SHA18ad7930efe73bdec43f6ef7475a910bf9e8329d7
SHA256760302cfa4d97c8190a5a010490debb2c11dffdfb4d75f2fb39a54c23eb6ea93
SHA51296d50085fea03c39d64bd6794f86d635a4119c5f041b6ce43ee03af50634d35036d6f4d0327daf6ca6a4e941ccabac4fdd9fa001470e15cae5d34b39be07f4e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4d57454f316ab47aee9febb18884e2b
SHA12b401f132b7534c511ad753c746fe1955c446360
SHA25660136ad5ec9c0fb6e53d9590984e9f3a975f927fd6f47895bb361b2ae458d5dd
SHA512142c8eb139c70382f9afd22668e0ae9b980ea66513387d1a5ceafab4a42f2799e7dac6773fc0db5d6a48c1f85393330b2d66194cc7dc2d23977c22d7231218a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55507982b2c67df77c89f6c346f2a3dc8
SHA148831bec5a126fa951a54bec37fad51da78ab208
SHA256bc39e605d515bf262c5fa97a2acf5e874768453cd4862332b08aeed398689008
SHA512c3bcf50ba18c8f7f2ae0e2553ed0cebd6711bf771a31bc77d97ed9d8dd0e15b06cfc5c7421d1d89b374b6f9c191466ca545adda681838dd9741b5d06e073e637
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5426e9e023510e4df114f0695103e2a36
SHA1248098c313e9d71eeabd959285bbd47fcb2ace2e
SHA2568d08f85a36fab2117d82bd400b54f0bacec8dce7fdc808a609bc956713300caa
SHA51201f7fcb39384d3b6cdec80f78e62c2fa53b1c3498cec2ffc2f9de5c38b05e9224104f56556ef8818a414a4266884157c4cfb8e2f169aaee66165b89e513039b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f14175c271f2213f070bd56eb2b5c13c
SHA1a9bc4c9077724bf2174f99e6b5c181495b1f9ffb
SHA256c30e488b2597e27f223d2105a4b076f899c70f38bb5d9898af7fded0f58d079b
SHA51223c46267851eb4c6d354fa9a52dcefd8ae68574e8c009587d00c6c9797c4263641961c23b9dd8d627513ff1cc4f4e14f268e8d03c9024dd76e4664ca69854215
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536bafd6d4281e58165f84fe6a062b08a
SHA163eba81f81955a50c5fd7d35d0aad1df3106b5d5
SHA2563943178dec41fb7f07c6c0755130d066e5e511a23e424794f495ff47bcdd3400
SHA5128beec59e5da6e2a69e707e2fd9c324d2854251a3c5a491386299e595c22834985489909ee2b015a983bf9f397417e78cfc136440307683b321e159ccdaad902d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d15178a14d5584d552c65943a424fe6
SHA1e54dac6934e537e506bf9cf2b23d093f048cf001
SHA2569c7b9b8603da35310ea70909de4649020a164ec2428e69926d2146f32085fb0c
SHA51247b968a1926861cd99a4e36b23685c741f548452436c3e777d1b7988e830ac22a968d4380d0b2f9bb7b51737fa7cb0428807b2ebbe27962155f9fda704a419a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5489c1bf1f56ad708e353a28bccd57567
SHA15a4da802ff8afdc1680d762430f75cd225465c6f
SHA256ed3595fa06c7ae37d9c9c0d665cf8d31b80a50feeac4d9193a45f5ac1456290e
SHA5125a9a438a2c4be99f263a8c16934d65b3b933b400ba185b04297f30969d7a3218ee4095b8a094e491fd9df65b41781616628d84ab6b89151c998c3cea8594991d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d352865e5cc35a65dabd17b43c6e540e
SHA150c358c3c2834bc5d5f888cccd50020a573c3577
SHA25652cb223a9d519d2a70343cb73b9b5d976fb419ef068ed33fb0b3074a806d136a
SHA512a9b0dd78c6ca3d442f5afefaa2ede5ed628c2f7bf331bde912b310020bbc5c914ad6978d58d7874a9ee89c38f9588385b9a96d32e48a11de53fa6186be55806a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d86bd7b3d91ce49e6d3816e20fb75e45
SHA186b4bc054c4e9b9265a5942df4bf768931ac2bb7
SHA256692692ef37131599c71c288592949e4216c6fffdeaeb7aecfd5da5a678e0afab
SHA512634bca93bc11079100aa992304379cdc627b84872d3a6dccbe2861fd6e6c7433db29400a3e144313bf92412d2e7e552e0c733516741ecbf77e934c7356d620db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caa02d764d214f370cad29be11604780
SHA11fb4855a20cfd297c93a8f0de0a29c217f8591b9
SHA256450333442ca436c004486854e5cf844abb0f43130d6ff5d2b84ee11f020e22a0
SHA51299b50b23d5c81f98306c4024658f54dce9992ae150abe76370823e531bdbfb1bd891cbd9a27cbf181fee1c369e5225180b33cbba5b80c7c2515f71d1d0b9e4b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504993431a105e09d23ceb414517990c8
SHA1d367133ddb2f1d0893d317932572397b39dbcf47
SHA25691ad02263f2c5d08fb7eca9f5495bc21ad03f610abdda87be40e653e997dccc9
SHA51238fc7e3f3ad06c79e50cd13d3895b3199aa340b4ff2211415768a2ced0b139fc0613b79d9a919897661c2680dfd89f2d302df7c85c32a308eb8926a0fa996174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa51340928686e3ed7311a9781fe82d0
SHA1622dc8ac072e61bc74ff61f33ea4a40594a162d0
SHA2562ac5aacd957a660879ebed196458ab1efc8db124fe1e2e2e7c2932aca8c029a1
SHA5120bd0115d143e52e7ffd3388fcf4917ff55cad20acc00baec508e945ad04bf7aff439697bb84bb199b169aa139e451d5a115e92a689b12d573aaad72ce2ccc67e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bc0c3d41b6cb57c83f9855b505afcf1
SHA159fc604bf22b226c2c3ebce5525cb28034fa2535
SHA256b5f3af63e578b701e906c8dee98f4bd395d3d886837f9377cf25fe37e460ba45
SHA5127e0cb46182df910a5cbace5be7be2cf5d0170b878df3a96221bf62269c2ed1d89a1f5013d15fb67f1082b91fb88aee7e4a5470d7f16fcda2212d2dda7e93f48e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6dc46f11d211e1625a08292086a85d7
SHA1e4185bca14f7d92ae7defd127a1d78800f8cf4fa
SHA2567336c99e298e3a15416a6e4b556aea405e804bbab172a0a7275dcb8a156e4b9a
SHA512fdaaec34ba1edf4bafd8f3af399585ab566357f2237396f890125e69ff6ad41638c477ad948e7f3d5071b67812d4249ac1f5618078c0d13349fba0cd719251a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3f3e5854429e7ed49bfa7d6f19a1747
SHA1ccc761aec3382c09320202bbe11cf7ac47344ae1
SHA256d40086549301e442164aabe1b60aebcb9a7adb5b54bef5ffd867ed1b4506bd88
SHA5125882f342b342f44d1bcd51c4fdee5f64721d1eda54bda25f4028526c395688413e5bdb2001258a86bded4cf924f5dcd599f186d850d2f8a1d7229191594925a6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b