Analysis
-
max time kernel
137s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
06/10/2024, 11:28
Static task
static1
Behavioral task
behavioral1
Sample
17e6e094d0ba84f04882f980dd4fb713_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
17e6e094d0ba84f04882f980dd4fb713_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
17e6e094d0ba84f04882f980dd4fb713_JaffaCakes118.html
-
Size
90KB
-
MD5
17e6e094d0ba84f04882f980dd4fb713
-
SHA1
0273022c52f673920a62f3ca64f1e91c177b7cc5
-
SHA256
b370414d4890a1b8ab113f2d9316a41268f0ff4d6b798bf25ea59648dd128ad8
-
SHA512
236b0f5c06a183dcd89bd478b1235385a5f878ab38c77e030c76b72e688b27f7d7a08783a18eba49df07a6ae83ad85965b57e1ac014fe781536e85745651c584
-
SSDEEP
1536:gQZBCCOdY0IxClDq8EB2YwOP3fTaicmHytBZnI7nadZEnyyPSxrjOufaH2jNhWBj:gk2q0IxhPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434375999" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2A097E81-83D6-11EF-9DBD-525C7857EE89} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000d1390bbb114832a6b0caf39dafc9a15c851b793c11eb226d9407bdae5474bf06000000000e8000000002000020000000f7b40bfd44e7a7b9331a44aa1d060d1863a3698907886e97630445ed706b554e200000000c2e24a8ed1fc2f43357c155f47818d158ab2432e700f4d85914a938d264bfa94000000064d6d3bd02c49d1ae556c5a6660160dc2f99b5c96502ef2866208e19db85ea3f6f302c125533668028a1f827187f084056dda233a0a42c5c1d6d28041da1a088 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0b478ffe217db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 568 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 568 iexplore.exe 568 iexplore.exe 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 568 wrote to memory of 2320 568 iexplore.exe 30 PID 568 wrote to memory of 2320 568 iexplore.exe 30 PID 568 wrote to memory of 2320 568 iexplore.exe 30 PID 568 wrote to memory of 2320 568 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\17e6e094d0ba84f04882f980dd4fb713_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:568 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a46f7aad3f52a6f23bf1c4314e523aea
SHA1b2600c636decbf1cc139201e6e4d939a9433c11e
SHA2569eacaf38676e933d0ecfea8da0c4f59dbfae18ff1fd1bf1dc20cd9257538767a
SHA5122c423a3e1c05ca1b31483f9b04d8e8e494e7e23a2524001c02ab289a01178eb23a6e0188428210057ec76d2a44f74d6a15626e5c2ce0ac995d37ee7628911a04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592543864d8a44fe2cd9d8f159f36fe86
SHA13e4322b293558a57da4b99aa54049da568c81528
SHA2569202aa3f0dee49866ff6829590479a9f6c44f050e6a42430b1e928ad2b5881de
SHA51271b1e50c5f73335a8f9801c23046ac19d2ed81ce0657fcbfa34c09312aee2df09d0b2b4e7efa87f93e39b924132e058a50707b94bbe4b0220437b43e676de09b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588ad963aeb11bccd552d7dbe46265819
SHA1e63701d54d6715a7da0046cc7d6b2df5bfb5cf2a
SHA2563ad2e488040097314cc5b957aa3fe2ec2c0e73147ea2b13e4a5028a8392ded0d
SHA512a7b1350b0652e2ca3e123d6e67e95d8228ea6a26253ab382193c26e749ffaf4c449ebd5bce25d1ba007efda58d5e3a4323a01c4fc6734390940e430f03940dd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e16f48f64dff0d3c98da940adbbbe04
SHA13462ff6203e59b0aa0b2b9dedb59d98912bd92ee
SHA25638e839cdda1050164b987e6550c31dc0bfc35592ba8cbd922e4581e6b14c2a24
SHA51272c6cb0e67f40b29eb0f986d3656b9894bdafd84489d578ec7c8adeaf5284c1edd67c2a73ee7011f717dd6f9b31d9704e3589e8b6830618a4dd40a995b13ede9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1328e29d10a6b6d3b6a97dfeaebd110
SHA1b254694e8b7dc1e16ffcc1c124a5a2e4fdb3bb3b
SHA2561f70f7807238065498358bb69846f5e478e156880659aac625845237dfca37f2
SHA512d42c55f352d4a9394f7cecb818898a7beedb56e6007ef5feb5417b5721ef886c6d0af0bcf6fa97e7648da900c62234b17ed3ab29050b42cf6e40a631ec856440
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550a88137eedc5cf3b18ab7249d2b9aad
SHA12349c1ea4bf24e007f69fa067133791ff590fddf
SHA256fee14e359c7993ab77d247c5cf4a8fafacaed8838172e09578381ecaf0b72190
SHA512686e9e7a62e43eb01e2d6aa1cc12ad691def9763e3cb753d56648f1a495205aa93f1e77a30abe14ba8fe084446a7989c7042af6435d32a809380e228abbc34f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c04813406ae79805aac2538d5a4ada69
SHA1f8499d457365bdda05cde0378622c414fe81e2ff
SHA25672c207c5653bcdffaa2e55aa9a6a966da96693e6a1805b6d74a945040d243e96
SHA5127a09fcb784f8cf4dcf91b3f8a9f331a571a2dd361d6d735c17a6a028c8dded140b0dbc0a7efdd6242285271e84116b8df049503303246068a6e24e4f6da77ebc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dbe53a672c6832bc6c06fa5e599ce3f
SHA126a5f3146f5da0c40b158715f4fc8b4f3d24bbe9
SHA256f4eeeaf78279cb926c927b38726f852ac496a606a0599f586899e45cd8eba11c
SHA5121e8867895b9e9f39e54d96f13a1f93fe967f32da9d066c2cecb747045479dd1e5be65430afa4e9df1da84a26153cecdb5e1ace57d3f70c6aa1bceaf88b302096
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594c4d93f4c77145863ed372fa66d1d21
SHA1821a7499467b45369202239b86f64c27f9cc614c
SHA2562aefdce4aa7d18c868d1241decb116d97e187abf88ba184f341d1a8be76a4980
SHA512f19c14b1f58bb43732ab4a98b1259ab253348f29cde274e1387b2e77fab190349f2d19f4dde896fd6a8350d12a13176f26d4656380b51758fd0f04c6fb252c2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc31463162fc98cd19475070c26351d4
SHA11c1ad2b0a51ad50962d57935dfec887f7c7c5336
SHA2566855906c6f596b55ab28b21a58e3f0a6505c4efee2adcd5c648d11f9663886d3
SHA5121e3e041fe103c3d7991a7a5c952c3008c77c263557d3092b873d4afe65626646f3e71685b1b0baeac1e96320758449001f4fc1e31860c780bfc742ec9e48f091
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a49120fd8f8f460bf179a1034c3ebb35
SHA16a7458c59584534d490f5325f8a6f53ad7c13ac9
SHA2562a8ef8b23fe92b0525cb448402921142e00aead5fb1edc6b343ece96a8e7accd
SHA512c3918dfd8ab94acd2a66de720b58c7c5a7938bf91da29ad0660547ec36224d5dabe576a661652da73f501b3a7c10f4d151c4f17527b384d1929d7c9c5ac8ec7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bb1fcec457e2722b0e226b3428e7848
SHA1c6fd678f97c0bbf3a31c24d571dca1b6a4416e71
SHA2560ec8cb8b4a34aec28f1774f747514e6472b1eae3a21a178b45e427bdbc422328
SHA51236429b9da4fc504799c5bf3ba4644aef0ce72df23c45a869e95a04ca30696ebba12204b8de71d0abbaad2f4a4fd8337603218be737c4127d62d5d16d6edab989
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc69bb66be52fb50ba309f4212b782fa
SHA1bde77ecded788cd6741b6525acbeb99575b2ab3e
SHA2560ccb5fd333845a58f5d5ff765d3d9075a477e45d3fe1a0caf9319047a182b36c
SHA512ae436a650651ec1c7c324597468f016985ec265ec530cef3ffe37c3d58a7d6a8c444ffb87bc19be459b0e8a68472c0565b9ec2915c97e98f7802fb320219c3cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508361e4c166087c7683dc8595f498109
SHA1df2e7b62f61de03c5a6e795a75652546312f5908
SHA25662e8517fa15b6c4afa7fc0a67f23e399c9e5d30a96d3eb379c50b0131f57c375
SHA51232b653f1a7be9d588fd5682fb27b6fd81fd2733fbf4c73152a53bd0f6ead667edb4b22d454666f5db273ff54cb59203200a7fd532da3fad2c5dcf2b4bb57b29d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b00f9f90884d3820422330d230b2c364
SHA1bf3cac94c32fee9afb33a242c6de26a062da2413
SHA256721f6ceaf3b93e0f20c611d44611df505cc355035fa9c9c084fabcdee03b18dc
SHA51299d7866e02454ea006752bf5245f5271a72cd7c4b8a4d788d0d7fa3734c03a86491495ebe7c85688dbbf8351367f2b657dd6998ae14171fa0172b2dd3842fe2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f912e661de3b8f55bcb709cb99796c60
SHA11f33bb90b66be64934af4423bb6547396f039ef4
SHA2567501b0091e44205f3adf4dad28b44f978820c3ce5582aca72539d9299439a5c9
SHA512b4f28eafd94384c1b07886e8bdad6b495d547be0fdd736de2e544a62aa3d188935c2690525a27ff493613ad38f950cf6d6f82b32c3eb3a9bfad801bc0ec6184a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebe9f5e17911a37da0cebe2cf20b1e34
SHA143d6569da787a00ef1ba1b15e203e59f63b1b4e6
SHA25605ae18726f2328ee18a3e25f94fdd9c9b84fba5744a3f1c8aa1cdb659b0f0317
SHA5123f17bed59c0eb9c157bca76d002eb332e56fcba828be212f3dc9e34a27d90782e3e6db9c43ddba0ee3614be6625baf6abd54d3f06d06811d16ebb6fc8576bda6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564ca78727968d27bdd34730e37301a7a
SHA1c37b12bd84e917310635e44ae3dbc9f5ee268c52
SHA256dd8e18c68965101ff24f8a529f85dcca61f638f288384f44e37c27a03eae9f42
SHA51212e205f88564f83ded467272708f83c688f20f4629c6a873a3af17eec4f5249535cf599392e04e3dd6ed00e275f83509db44b6f45b0319624edf86e1b8fe56f0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b