Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/10/2024, 11:39
Static task
static1
Behavioral task
behavioral1
Sample
17ee84bbf613553cc29aa4197731217f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
17ee84bbf613553cc29aa4197731217f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
17ee84bbf613553cc29aa4197731217f_JaffaCakes118.html
-
Size
40KB
-
MD5
17ee84bbf613553cc29aa4197731217f
-
SHA1
8843fea83d680e4de3ba0e45164b54ce397c242d
-
SHA256
5d2bc8829e0fad72c831a98f7e55185d66d47348c7a8d3ca43a04274c4060349
-
SHA512
28a4bd2ec820553ad07c987b83c3c00129e42985bc3b2683673dc5d7df4c101cf456fef0cbe8565ccbaff6902736c205817c7822203ee5220e98a09bb2b12728
-
SSDEEP
768:/nQw+8oes8Gh/8av7toYL7g16z29j6ts+fRia9r5Kk1BZNY90oOzR1:PQw+8oes8GpTLKiK6ts+JiEqnOzR1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80927977e417db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A1799DA1-83D7-11EF-B2A2-C6DA928D33CD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000b233dc77c27f0fc6744bd043b3819e6e83ff5919da14f7b6b87bbbf4ea07aefe000000000e80000000020000200000005c7a61a92db02968ad65dcda60ea048add3f92d3779c31f48a831e7be9561f41200000008440765ab7e48e62ca91e9ad76db240cba07186332f8fc0e7b936a4a6a5d8a3940000000ef9895fb7f68181f6c9cf6ef191b18ba291c7a22405e19a1e950579c21cdf472133cf338c819bf93b37107911420594d6640135ae6f2f3704bf45ca26edf70af iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434376633" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2376 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2376 iexplore.exe 2376 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2700 2376 iexplore.exe 29 PID 2376 wrote to memory of 2700 2376 iexplore.exe 29 PID 2376 wrote to memory of 2700 2376 iexplore.exe 29 PID 2376 wrote to memory of 2700 2376 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\17ee84bbf613553cc29aa4197731217f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2376 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5ff601560ae2acb22d3b661c6e7dc29c6
SHA141b7571615529b3b8925bc8798cc15f5411b5202
SHA2562b6b71dc18823322d5509b8e4416e7ff31e492d02d2576092c38d331cab1034b
SHA512b39e5d0cc93f8586e1feda16ad9ea93a2a13725c8dd533f872c7b6be92d7c90dca2b5031557a2a71e436078e8d949d8bc2bd94eeb7c06e4aa973f3dfbc01f8e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f012bc6ac161d7e2a0e798540bd3535b
SHA176b64d68bbaa56789b1a4a0b0f339695b74ad427
SHA2565bd84975cf00fc28dbe13d47c71e90d03c7437455e261c9b178760bf2572897a
SHA51207361812d531b4074e52190940e3067374f828082c5e5c4f09c6a6d700cd780d469fae0a16e0081b42127b8e5dbc7707c5e30d92bbadc2fad897f210052f0b97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56570c435f833d514f365cc21543a5c24
SHA10d3d7594c8899f81ebbc8b5ee6f5561d00142d3c
SHA256ad54ff58b42162a7e81cb11a5129cf601cb6f5c850ccc06fc6eff122519a0adb
SHA512dca5b55650fb041b4151a135e875d27b76fb7ba4019296ad7408713fe65ba9a33ab1c04da3734d5a5307611f5a12d748482aef8bc59d15f6baf19d34c5e06dcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ea71a371640360aac832734b3cc464d
SHA1db841077e6a53b273e1accca59ad69ddf52c972e
SHA2563c9f23b9c40985ea8a6bab11bb554886e8558fdba425bc2b317587306a97c736
SHA5126666b0be8c4e384b579c510c2cc5ad77e7fa61e91cecefd39cccabee6a4be10a10ae4d7338f928e89baa68cb71a997f119b22369846ba6bb4c3632136d7caaf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f66738c41359875c0d8fc594d0989fd
SHA1243f466cbd0298287b45df05d7c42b74b9cccfff
SHA256c5ba7419340f08bf4c2b2768ce19406521f509e9b6738c04ba0d06c4872baf31
SHA5128588556ad397ec8eb333ffcfb53e4e289264655155f2fc2883a3795af58e7063af6ef0ef44c5c065a76185ac215477c4aaed95297882cef41d855fd58edc7980
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518f28f460659e3087a82119f44052c4e
SHA130938a66b92397914747b3f6a8801282db4148c1
SHA256889780e99547076b97292829400b86fdf83a7168124ee402adc70eefcba3db00
SHA512d47c6b7ce7f103cb4442820edd2d3964af175a25d7faa361b4b1df78caa5c7eeacc00aaafc562289af951d6cca9ff747aa20432d378f54c33eb588e089b08663
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5707e6c7b977afb015a6605b70db75f
SHA153746307d19556b69eb42493783b543e70fc7e56
SHA25662031bde2c4d604d3d2a03fcca3d34445649a06edd2ca5b5e193aa911d5f64f3
SHA5123fa83a0b4aa1f009ebfcf53446fcd8ed230005be916590fa4cf42461353c862bf2ec975695866ca03f8cf49d07cfb641bc2f25d3eff45e0a11146aa113fd265d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553d8828a4b8bfc2d009818c32bda56cb
SHA1c82f6cb2ab3d5e2a9c49fca95afaaa0b02caf38d
SHA2565b22e39ca09c50d85a71795b92c361ab72c8ac0d66e2f556bc3baf27b2716c2e
SHA5122f9e16a0cf1b7ade9a826b261831d5363f7819f3521dca0d37b2b03583ea6de0d0e751fb8d857c3eb78d2932349eb42ba673b10847622ae5a1c6700761bb6e58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fc1c70473484e6808d1821cc7d52766
SHA1eb89a0534f127b5bdf34a81402a6c870ed239e5c
SHA25610841e82e6f3f8351bf46d432f2bb9e0485747c8d2203bb5ffa1d99c0492ef6d
SHA512f984e4e7ddf52df69ab8cd3f4c470938580411e4aa39d09a36f1503fc5cda36b64b55a0e77eb7faa48077e8d42c1f5908ee1b50e24a9c5a46782225c901d9f74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c3ba282821e08bcc909756f6c253ddf
SHA122712a54d902a32794bd5168fa81b234f133a8d3
SHA25605ae92344135ba556c469a400e679aab5acb4d9d80c2f60162ad4f9b02329e22
SHA512f31c852cc9a6888b4ff3b673e851fc6bfdbeefd5dd73f3433ba815281a99e02da417d97dada72aa890b8a4a46032cb705faab07b618d6fa13de2a02ea1fcb54f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51efd1037681de24857b0a4697fc520ac
SHA1e055daca7242c4b1235f5baf90e5acd5e3e65e1d
SHA256d8fa76d9092ac4250ce331c711219ee793386e14f988d078f5bdd0cfc020e767
SHA512a4d4a531b5f96ba70305881a107762c3c94a9948ac314786def58f6802f36649b3b30958289a10ab09c1712ff2deb7ff315bb4acec0a446546fcb0b22f1b5f93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f08fd6b24a410f71716770965e7af8e8
SHA19e61b23dd9eb7ad2507b81073a5c32fc4557a748
SHA256e2c713b880dd36873f18fb2ee3b392d00ca2d23c6d4eae56666b4143525d7742
SHA5124c260d911d1b8b23835b9e16e093332de1c8c9aad17b69f7ca18a041df5d553cd3c223fc6a7a98ca40fdce7a96ba6fd5c3d33d39c63bc8130f57975f28131a8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d2e71cbc65668e707c541ed6a64f23c
SHA12f43459654b25e62d2cd79fe545b5eb4a32b2f16
SHA2568b9a1fba19d996c29e0a76f0bafe240738280bd7c6d76797985f4e380527560b
SHA512eaafb9046d9fd3ec6532d16090ca54e484c6afde108399a7ab62a2aec076b94efe8500da687d5a2d3957d632ce21fc39660a69834f72604e4caa0b34bcc134d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537582d383ee3b24e904d366c9dffde02
SHA1ae609e053d397d12b21f0709eedb8276c13bfc8b
SHA256a321fc47e3ac6464f39f5b671dc962ab8243afbb28af138417e03013c02a58ba
SHA512fb2aee9a80d8278b8357b778265ff982cfcc6cfa55afba5fccb5d309b45efc993f01be817bb8a0266c030d083166b2f5855c7941746d54823c1ab17771b26072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d22eeec9e9e3f3e4c260e17fbebb81aa
SHA1195da4077874c6591e61abe77bbba9f3f8d66484
SHA25631e20471686ce201ac8a641cb36fe262bebc37df1c432ab3921e21f532a24720
SHA512597153980cff8225188f21747079373f64aeb74e7190e4ca6b157595c48ce70d88537eae2ccf50d20e3fc39a43f9044086db9c787b644080fe2453342da90627
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ba5dcbfcbfe8c4ef1e579358e267591
SHA193eb0dacfb8869182b8614bfe74d0981623a372d
SHA256709501ae559ca7b3c92664afd112b8f02bb02fbde3b4a508efe0e2bd4f50cbe6
SHA512629defc40c07418543b2153295f1ec2442c6fd399870356edf899219d359020a1f6f31e74eb9aadabea25e268b3b972cc3daaae099fa0799add62064ad562ff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515f920afe5f8251cdc48fd0533d6774d
SHA152ffaf7ec8625cb6b0ce3012ee605efb0fd76334
SHA256207972082b9bce1163d158a57ffeac10da954ee9b25e714b9ad2d1a6e0b7c60d
SHA512a6c7bdb259bfbb7b7c502cd53825b389dd792ab5043bb30f136d1aa8d8810f3ff2c2cd321703fe0cc880e0c25bb3fe866ff83b961989ada395224f4340c6b1cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2287f65f05cbf32b86b0cd3fee56c55
SHA16e1c8384ce6d64670c1b7665c64d6b078a9c14ae
SHA25620f7839eaf6d69eb9f14bed95d59f9ab99d3302031e5e20eefe9b9417a597ddc
SHA51252927ccefc09277b90f84c3b22fccbf69b3430233b19b056548a63945f53ad07d1274718ba471c123430e9d33a21a8394ceabeb605c06699127b35bced0af2d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD50e22b2af428ddd798c86d313c48dfbba
SHA17974937ccc3392e890ae17fa1f14b005218b1af8
SHA25663a848345118aab92bf9dea2d3801683b9caccbb8d3c9a34765ba830d8cfe033
SHA5125e76276ba8c92b812f1d70c1730ca118267383b8f33b95a7eae44fbcbf55958d35dba6f74b0a9bb651a1ac8f8f94783ae729fe0af69911429ada46eeb6595d61
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b