Analysis
-
max time kernel
121s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/10/2024, 13:32
Static task
static1
Behavioral task
behavioral1
Sample
184a959abf97ac44e88e2eed00814d91_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
184a959abf97ac44e88e2eed00814d91_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
184a959abf97ac44e88e2eed00814d91_JaffaCakes118.html
-
Size
53KB
-
MD5
184a959abf97ac44e88e2eed00814d91
-
SHA1
c272f3bf0c4c47747d04f07e7d691d163af39970
-
SHA256
b8395679fd8bce5a386e53c0c5f0ecad122a19d704f27e74345a133522a293ae
-
SHA512
30a8d6b850bf69b6fcedd002c28633150fd4e5d25400a37dd52c205d739ebb40f59bf31456a61c31843b8a7cfe0b0bae2e02eafd5ec19023d14be49dafd0c640
-
SSDEEP
1536:CkgUiIakTqGivi+PyUnrunlYlK63Nj+q5VyvR0w2AzTICbbTo42/t9M/dNwIUTDs:CkgUiIakTqGivi+PyUnrunlYlK63Nj+b
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434383417" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80249546f417db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000000fd982179f6ff2e583130277c62b54f1e8c24b52198b0aa4dc8db4db9450df2a000000000e8000000002000020000000965646610a48ad1d7a9a594d67e18cfa3dd5f86e9a9864f1495103bab06626d020000000ef87342f97e18502c69b05d033db79ea63c4982463f92d64de2b9f40fdd6871b400000001a6eb2e10f33508cd6ce25611ef662e84705396a77ef652446e0e292fb7f002c300817afc9cf535e5ad7d226315977e22997a0c513ef68ee3e84af8cdfb27a33 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6F89CA81-83E7-11EF-ABA3-46BBF83CD43C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2128 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2128 iexplore.exe 2128 iexplore.exe 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2128 wrote to memory of 3028 2128 iexplore.exe 31 PID 2128 wrote to memory of 3028 2128 iexplore.exe 31 PID 2128 wrote to memory of 3028 2128 iexplore.exe 31 PID 2128 wrote to memory of 3028 2128 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\184a959abf97ac44e88e2eed00814d91_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2128 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cd52d35978aad86cca0628f12e45879
SHA13655ad3374c6323c40bb0dba830c9ffdce0451df
SHA256b70b756979c30f28743e020f92f69d8eb1e630fc33f5d924b6b12391f8d159b7
SHA51255717c06730aa21b8f851f2c63d9697c74d246c359e45fdc84aa97c41a6ea84593d2d5d169cde85d90c70d82da326034ddb732b6ec756d171c236a34b9ef0cab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c5b174979dc62ea96893f526d6889d9
SHA198f3ba0162ed2f3a23b1e8e4bbfd0aa6e4494de9
SHA256486241f04bc087e643d54e8f6fa6d8349b382547bd570bcf52ba69cb649938cd
SHA512817d555baafaa2fc0ef3ac9d9fa32acd854fc44f8adfcd04b529ed72b66dcacc73886df3cb6d512464923b1ac086b34e7657b9edb192903efb5ff49f7d0432ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f45aa83568ef5d3988dad2db83a6fb61
SHA19d735cdd55f3cbac78f83f77544386e487061ad0
SHA2564bdb86096caf236b854c2439e50a5882c78becaa2270b1c1a8e057bf9ba4e460
SHA5125c63ccc041630e03eb3ba4577ff0e9c317584afd6f79b81d580843e8eca234bb64fe6ff0761edf8433efa0e6e00ba6350df16f86c887c7c16caae05da0c38fa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e04b68d57b1f7a6b8910848840172b92
SHA13d403bdc969cdb6031b43f9c2fd32fabf0ac33e6
SHA2561522bc5893b9548e6e281d50c8f708514ab9468f141e4900172dfa77cdafcbaa
SHA51229b0bd485c10baa9121cb87f0dd7757fe79fe6d0bb87c8ae52810c502e6a1b126d016d7f0c441c972e4b722fab3bb8d20716a6bf6e1ce19387b7b6599129bb4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5703c0d39337217e899de2565620f04e8
SHA1bd7b5e68691f8af4f923866c983c4b869d690701
SHA25694d9b905ff87a5af704c7225f3d705e573310c5d8c3da1c0892584d8fa23f703
SHA512eb9dcb998c48fb889eb24c0d8d0e03183f40c5332de9db62c35ca756022cb5ccbb84963fa031682b10fe28559c91920b74fa02f037313f3a5ee770dd3c56678e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b215c30b23e582c4b71275c1353f8111
SHA1c2b2d3ec1ea07085d35cd15497e8e613e9f85cf9
SHA256952d0f00cfd768570aed688d087a718133d074aeafa08fbdaff545c3e90779fa
SHA512a78df5e8987da94653200439f958e4aceda2ffeaeb9666c2dd11ed76580f36baefe433d574bb00ca59984d05ed606e7787e0f4a77701ce09a3381e31effe8582
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dceeaed35e7758dbdb49a746d35079b
SHA17246e085a01aa63e644e8bd73b79cbbabefc7158
SHA256153fd61d97132fb9392df28ae135be6898286d11fc54e1114a03bdefdf558efb
SHA5122702c827f171098d06dfd624bb79597b9926de7ec2cc40c59ab92dba555f8a963f00144366ac6157a1cb094f57136643d0547f195893f6741ffc1c5392e4a8df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fad5011de4a58547d6e00ee2296cdf19
SHA1e79de97797dc2617b6c8420dcf7bd6f4aa6dfe19
SHA2566b8f4bd6337bb68abc0228028c3751d0273bd066d0fcf7b6dc2b16a5fef00d35
SHA512fdd154adb80c28d5dd2b49e702526af2c59ecf3603644ca691fb542b9f3394181535cf98f7d2f320ca413723a5ef9310a6352ca15bf53c17635dd2a06edc9bac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbe8a71e4ba7a3b211b79446e2f70144
SHA105debd9dd591edf6c3a21b1627b438d00693b27f
SHA25647acd669afe91df59124fdbf19651fc4aa19b47e314a694d39d54b6b7b836af8
SHA512bb783b7d21d1ad06abd77a31bde33e578808c6c46cd6bc8c2ffd187a27d0442a841832610396358f839a05601a369ee0574224784eb36bf6b0ce9eb4f87b598d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b040349856b7511e87b3be771c419eaa
SHA118a9aa1be5207f36744dd7354307be61b2dcbab6
SHA256248ba1a513eabad8a2445889ccbf323dda9fc3817bce65666c20daae61641e66
SHA5127249dc480570eb137b66f4f1a5558551906394ad2b1a6cd494669b211e349d5ec5e814fd66d96e4a9558c39053fd6f90fdf18c716d9ef593f25cf5ad949a5200
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbcaced376d4818e7be6d7d796bda7d6
SHA1175d069090060033da405b150f86d29aa227c876
SHA256292a0ff4160108b3a6cbd885e9fee193f2bc0e00202d081186760da92665a816
SHA5123e955d68626396812286bf9407d67b8aa9b229d55c1f2be9d56661d172a4f94259411782822ec5524599a22b61f6b953ca063db1201a3f688fe075f178761cb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e82a9eeba8caf35fdabebcd08770d03
SHA1adc626d05b3702bf3d9f051dc4cba8b5d577dc6b
SHA25643e9f6becce7e635d305a27cb7fdbb4e0f45b5b62f8f81a2511dcdd79b0609b8
SHA51230eda166cc95779a3ea20b7414e71dd529b600fcf03f156ee19d89d26ff6739021d2cec986640dd495820995159d453851dff025a5cd51e268123fb2d533ef3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa364eabd9fd5352586903ffba5f3459
SHA17a39bd4cc06bdd684d58fcf57320dd0b6f9cf9c9
SHA256d9d80da003b06b2f440c4f35c360ef97d1a477094a4f8bc0660fb38221a40231
SHA512d117638bb03a96dd252d2219d4709fd31d0ead0827b57227b821375f6ad913d29bf121fa8416ff50fa792fca968ade3d5e15f59287fc4d43e58bc579c2572cfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ec3d502e74694f1fe51faf0c66f5735
SHA123fa66c3a1abdab1ef378e6ac1428d4efc5aeb65
SHA256ffa4dbf1e005d3c00696d5f75433913fc34b9755c0ed62125844d85582860789
SHA51202a01cd0d2caa511c54c19d00d15fd6a6583bae51e249719c808f3297bef339cda246d62c6edd852f28e5d34ac216f396caf31471643a75a643273d3235b95c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe8c4850e2c0b5c28e8dabc995c129c2
SHA1ca3b95a9c43ae6bcb5373b201b3c40f700cdc2a0
SHA256b1fd39f9f1a579ba6a2df09986564208db5237768743957b04dc8889f95aff15
SHA5127a3c80980d10f0a7ddde8e01a6c3fc10b9dda8a3764cb03a38b1f6e868a3238163fbf9d4b8e6738146d8c8e09a43f53dd2033805d5ef84002cf5c222f0a4842f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b71f267e34efe3ef0d2ef06a08a00a6a
SHA1222916b7f92b3e8a886bf0d2f261f4563c53b173
SHA256683f86aad977a712dafd1e644794d4ee7b9c1acf0c7224ed1834c911104e4c80
SHA5129ce305e5d251114fb785c51bf628da4f3903aa64b1f44f43af425d354648979223cc1b657160dfbb4ad262591198b57821316a4c3344471617816b65e57eabf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f400db7d1d6674cc567ea27d2570002
SHA1303d51b8ae2e0cc77e3a0bf518a6b70eda2c7bf3
SHA256542fdb0cfe80376ef74731c1a86171fadd6f35a70945eb7a3d9eaa4b5a78893d
SHA512cdd3bee1bcdc29b707bc07b1577f26903d68161d1d957a276078be251c90633c1209bf5a02e8be8d36166c00bd812a68da2bb0eb95b57af12d95f86274beb013
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e3b097fb41eaea821ee31e56f8fecc0
SHA14e843a674b9b0cee9afa670f41eb0e9c95b6385c
SHA256e0ff984bcfc44734f6f81783d1bc01a05c712b1919dca31cda49bbae9eda4f17
SHA512a28eb7c6649fd9551d3c3b5a42d152a3d34be9b128fd5d0765be8f1bc6acf144ea10cd261109bb3fd9e46f1d1f08265c8961f7e3e101af487b44efa4939a3ed5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\AS91FDNI\glossar-js[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b