Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/10/2024, 12:56
Static task
static1
Behavioral task
behavioral1
Sample
182c2443256907605a1927c736f9f690_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
182c2443256907605a1927c736f9f690_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
182c2443256907605a1927c736f9f690_JaffaCakes118.html
-
Size
6KB
-
MD5
182c2443256907605a1927c736f9f690
-
SHA1
75e491a913e7395c6519fe4fed83b114ea045a98
-
SHA256
7af98afcd93486af06dfecb2f7755dc2d2b4ad0774e6ce9f29ebdf1b7ec2bc25
-
SHA512
e5cefe45737fc85d1de3ed479345bce31bdc37aa9943ce6f5aa2442acb77e01ed432be13d6a4313af62ddcfc9c0989e252cf80b8bbd53dddfd997afa8cb41522
-
SSDEEP
96:uzVs+ux7EpLLY1k9o84d12ef7CSTUiecEZ7ru7f:csz7EpAYS/Wb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{68058331-83E2-11EF-8BDE-523A95B0E536} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000ac7f0960939969a36bd7e3eed5c5ae39d3871e4d07f5ecf923497f5334ab8849000000000e80000000020000200000008fcc0cab8513e98edca02c01cfc9a499daf4b68ec44bd9c7cd1afc0427bac66020000000aad80ec742a63656cba8927fd19f1997b2390d91513c7d2e4a8d4d785900fe27400000004195f370cab77df1dea1bc7fb0855fce71d88d823098046b4934439102523d2c18969898228e8dee6107dce0beb402404b77ef64c4408da2088cb1c8aad51e2b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6000013def17db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434381257" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2904 iexplore.exe 2904 iexplore.exe 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2744 2904 iexplore.exe 30 PID 2904 wrote to memory of 2744 2904 iexplore.exe 30 PID 2904 wrote to memory of 2744 2904 iexplore.exe 30 PID 2904 wrote to memory of 2744 2904 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\182c2443256907605a1927c736f9f690_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2904 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5244fab6eac89429e683eb6e67497db7d
SHA14e39e4e11dd8d9f476125fd2d1fca29a0650b528
SHA25658dc818df1e133393dc9f5a274276a91d6ea81867c3865fe401ca5cc82df240c
SHA51297c00ee4997e5511d144fb3f4bc77cb960c40bcceabf6812ace99135884396ba0f9c64c10ffda4882403973143c6b3c18a056ffb937d679baf233989bd3cdb9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565abfc9ca7a271080cb18dfa254db665
SHA10782f83997e1e901c3cab0462529d21ed459a2d3
SHA2564670f899a171a2e542b2df1282b27bdbc2afe36ab6857a24044eb7fa194336bb
SHA512528bd51691bc934458cd060cefcaec75ce17ae8159eeda09484ccd612930aee15ae6015a42c1d2bc518afd7ea445104bcc9f098c291a367aeaf436c128ab0130
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d49e6d7352d848fe653d225abb614393
SHA1bf8029fb14837136686c8d088370586632f2ed79
SHA256367039ebb53d2d15d4df23289f1d2cddd9987e3812eed52b7eebc5e94e9758e2
SHA512aab7d9326a91b345592e7da4008d3d4aabb7b8daed6cab4ee6d3b30fa8b52a9a3e9fb724443ed0f2ad923e02db965c2b939573bd6faa2af95dbfa4f8926939aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5710c921f1291708c763062bf61e9e763
SHA1d0e2224c9f6d08c3bd91a36b7eda790a0adf3580
SHA256dd9b8dae65437c72bd83b873395f749bfce9e5395eda201100a958699bcc93f1
SHA5122b6a798c567b8861670ed8672bd46a96d5ef10b254ee0f3d7a247cb986e1a899c695023a048c64456a6fd7c7ccb21768e2a9d5173afea566aa59d863d4f22444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c2ae350b2980057702ce1e6b2361229
SHA143945bdc8d36f8e90aa44cc282b33de356fb6877
SHA2569cf86cd29b5e4326400c20ed2d81a3c597d4d1587475cfbfaac2832b3f8243b7
SHA512100214ac58eaa57753fb43c7cf3f2338a120795ddc139307540133f6e8dab37e0927d8650b08b12fcaae3dac753e559b631436b9182c89b375f90c0d2631be12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f257efdd6dc72b6d53d002b17f000c0
SHA114bd99a9aebca33b3e6e2a33ae1a776bfbaa40e5
SHA256ccff434461a2d6e6320e321cbdc36b424db8f9c28f887ed5a7e19a053823ac01
SHA5120bee2a287ebdd4897ee0fca980a45e2e6b2c7d9ee80d0cbf644cdfd83f626f511249e627eb06885d0c0186a224db1db73121d604d8466c8106fb1f4d1134a4cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd78386481c33e9bacaa948903bceb71
SHA1c5fa2717a583b1585602cde053a60a518dffd7a0
SHA2562e84b433b254cd9e11c99cfeb5f3496db29346dbef87f6a6e800e76a1bceb43c
SHA512585923bda2a06aa1280562ff6fe5febf4f857e2024766c15fe11f38ed6919721c0fb70565cae48491e77dfeddeb3b39b86676f81419c9326640b3b714e965961
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f29a33f5352e97389acd44f3a6ba5ea
SHA198b725b0ec0c1305e8c4b9629bdd3f0c0bf82998
SHA25697ef81cc4a6787b68384b2ddbda1a9560f4bc5b6e410a7adece25fa823a30653
SHA5128b98e43076dc3e597540cba56bcf1fdaa69263a8dcfd7acc24b25317f86730c1abf7fc91d6a3a3c14e52c78075bed8492c06480fd91e959609908811bd90270d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df2097435beed452545f7b9f2e21ebe3
SHA192e2f3e4d4ff7553ba1357cc8dedac236b623d87
SHA2560bcfaba47a324ff1c085a19b7a8cc345d9c4d5fcf1e63a1b36a2d4589998d6a1
SHA512e228a8760ba0c87a3556833916c3ff47f353303ae09f1b0a6544cbd5b4d30aa3ae3b3f6c6934c6420c70c6087465cdd18a04c537e1353e8d23849bb597ede08c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562ce29a2c72042367434defcedbaf1ad
SHA1a9b3211d7cd206190ee8b97cb94e7da31e94604d
SHA2565183842185a97e94b3a860e4c808b74b19355927b91f83f63a2be5977daa0040
SHA512cbf37a5a5a5f1d7b9e8236fb1f1befbd1c7f27c1624d4bef1f37163bad7bf45c3a3143028cf44cc9ac278e4f27f2e3e047f49ef161831fd734a4d94dfd95eb2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553fddf3cfe943ca296470450ff97091e
SHA16014677f5480aa4541edfbc5a957369664a52628
SHA256cc524dedb276ce7e64074b858a379d89aa7f67300d518c5a663c7c9061139f8b
SHA512e573b1be22acbd5da1ea8951fe56a3fd56c48f3585bd1df0dd66c647d7217d14542a8b2777ba114ed329049768bebc7a37ce4030551203cc2fd6b016e845a60d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e213c11eba39b654f4e6b07ba9aa05ec
SHA13a3a65140c5966e94e07004e71c91072b9a2c610
SHA256427dd02df952fd05db7be207e426e4d7e58ebf8858e5699bdcf542cb5a7232c8
SHA512869b9079c6416667f10734850d95468b786d3ee3bdd52d94e22aefab9fa6430644434f79b1cda8fff6e936867495bc509e5a404942fbb615521dba0fc43ae440
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d02c3b4df55403dcaff4dfea3fc20c92
SHA1c88e4dac8a988d58843d794896f3522cb84c0e3e
SHA256fa633031bae5d2e2c04e77ca6541e579c8217a1dc6e8741449fab826cd9013d8
SHA5124c602a0dabb5970b00818782bd21c9554cff9d2ad92e1ad777542f23343520f9a55848de2419c3c1c9e1d4790370684df5fa98f59e01c8472ed02a8ffae935be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dcec1bffbc7ab5853101fb4d8121f0c
SHA1f1cb6cc4ecf2db695052aa2676e857e115d5d862
SHA256033bd2f38f5de70001c0a4af396371eab137f200c259dccce06829cc9dbf5805
SHA51257b701ca513d3532281dfe78bffcbfae4af209b4da26b2d3487ac6cf57b1358e54de4fb2b83957c62f388ed95bb0fdbd6541686eeca531fcd1c723cf70d6c27a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593852e9ae1d10e339fd64c0bb3d2c940
SHA136a7e5a58daa24ea25b729602adcc3123740a707
SHA256f881768240e811afdbc6f2ed97022b623f5a9483b61d4f289819489f750f07ce
SHA51212963dd109f61ec11e2209762c5a3f0e64f1803cede212d4f580f09f6e0efd1e7f6185042347fae4c59d9cfe001f77c16ce02f3f5036875b6e7ca19e34e7e6d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504d2022ed949ec5bcc530caf13263a0a
SHA1be58338789938e8b7c6550788a954051d7f403d5
SHA256ebfec398f63bcee999b8dc88e4361a4d790db96edaebeede81821db3621c0e79
SHA512abd5f1a5a8268044369b1483b46f8524d5520905105cd5d8e6314893404dd7c6e1a1ab18304c4686869f8a44ee62b896eb91648332df9dbf748f4ca12aed9f38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e5104f86e6adc4706df16b52c5fb2ff
SHA18821499e38f3110789009bb97836522fe95feba4
SHA2561c9c49262a4e6290b317d16aba409c6634241e97d7068b85f1b72cda1b6bbd6c
SHA512330f3de9192e21bd92a6695db604b03b2637245a14a5d763a25426893d8e401b76f26d5c120eff84a1a2adb4722c3ac26b867885d17ca005aafd499f2a0a6cdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5205a0ab7877bde2ed1d986f3e085f15b
SHA148bf24f2fdc7fdc1dd9438b2e26f7ad193cadf80
SHA256d3b3e171de3764f1cc65f9994b5c4f10b55940ad9448ab650a9682c5bfe8a1b9
SHA5126a5181751cd9770c9507a7961a7a672b519c335b7a08c1b2cff9c1328b2a3dc30dc8241c0e2a508e047d6af478683e3cc7c0d0065799fa30e4a6197b0cbb4fdd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b