Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/10/2024, 21:59
Static task
static1
Behavioral task
behavioral1
Sample
26119fae1d63a06eeea6dd5b8fad30e9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
26119fae1d63a06eeea6dd5b8fad30e9_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
26119fae1d63a06eeea6dd5b8fad30e9_JaffaCakes118.html
-
Size
12KB
-
MD5
26119fae1d63a06eeea6dd5b8fad30e9
-
SHA1
2182bab22e621d42b9d19322f137306b32db646b
-
SHA256
be6c10cdbdacc8645e162ff772ca17e7fa820237ad3ec1e859f0b97db1150aa0
-
SHA512
0a8b8cbba134f1f5b4f6492f6822c168e52447782b1d0452b0d206b4ab84da6fc9b5a50bad273335fb7d2367fa56159392ba6b9adc22884acc7f63b2a731281e
-
SSDEEP
384:CyiLvv8oa/7Ux7yjAigb/04Mz2THA7oWIpB:CyijGjAigbs4MuwIv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000005cdaeb37f6c5d238576010e480afc10c8601233557bbbba8b15b1023cd7e32bf000000000e8000000002000020000000f949c53c5fe1212431712a905bb46a6b654927fcbd53eff395dfb18ac8ab5c2a2000000037693db8ca580c331990af31c0de1ccb34f93d7a94608f5d8573030048c999c240000000f8ff3b0028725421840988cdcf853d29c7033b5b532871b6e50515519e913608c4d2046cc06ba9239c71c371ebe117c80aace0d441b9dbfe5d842ffbbcdcf7d0 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BDBA2C41-85F4-11EF-BC08-7A9F8CACAEA3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0cc8196011adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434609034" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 348 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 348 iexplore.exe 348 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 348 wrote to memory of 2508 348 iexplore.exe 30 PID 348 wrote to memory of 2508 348 iexplore.exe 30 PID 348 wrote to memory of 2508 348 iexplore.exe 30 PID 348 wrote to memory of 2508 348 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\26119fae1d63a06eeea6dd5b8fad30e9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:348 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520037bd085d382960108207d3f852281
SHA159cd7aad4c009bab7a1fdc3fb21d3a0cbe7522ef
SHA256b8f821b9c2e5ddc363cc61c6e306f9885a925aab655c8a69caf30fb97eae3cb3
SHA5121e2cdff40c000ba2093c10bbf7c60bc63facdda851ede099bc8d4a189f27ada1e1f3ee25566456a64cec78a8c12585d277be41c7ba9456084d327a4e6e3fdb57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5309accbc0ccef49fb9f278528e8bb4a3
SHA14d0fbe85c05e571b5d81b1a415fb52d6c3597635
SHA25687619a637d1d56eff1c899717c4e38faf67ebf9aed9a5189cd77a41d75fa1a8f
SHA512f8dc17b20d057ee9c8d06db49b7c34db4c81169c8dc3a31b628218c443d6ef85d4fdb99149febab2a0c786707bb78fd2fdbd0b7cb0a27b7f3f602ae54aaeb0d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a848947e5939fb026e82e687830b4828
SHA1a255f3bc632c161d47ceb32943ebd8a19da134e9
SHA2560713d2733ab828c784e4fabd3c49ae161e017c5bb14d2066f2f2178de010da8b
SHA51207fb3af19d462c430c81b7f5c5f57857208c5719ea29e00ec9761041af3db810bce12c23f01a2714713dedd3c7822b04a2e2174f798780301563508f46265cf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2f3318e5acc49bfce27d59ca2d84332
SHA112e00f0098a7670d78776e1ea344783dc595b1a2
SHA2567819495028f1e278d133dc2d5b6985f7bc754baa11c33a17273944be63b178fd
SHA512506c574c595a85d12d2fcfd43c6f94b189cbfa300fce639c1e0718a9cf67c73a744bf5731f479d727bf2462b82ea3b717768b3d9caba3910e9d72c7469539e9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb761f8cf80d926a69306697f09962aa
SHA199fe3f3c0b7ca2ca45c3aadbbda8d1b30cfb8186
SHA25683a8258484152295d83b60460727e9ec4a2179b28d35be8a0e8adc11c3838a9f
SHA51241002e02bd2e96e1c7cf829ae2095bf4ab544dbadd121571098e87f454243880fd365309427edbf71c0a122a1e7bebe6f1125cb044d7258730e8a61d20603837
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c04e44740497cd6d5a8ca2fe827034a
SHA1556cdead0382eba5517bcec0d6171054aae75cdc
SHA2563fa710f2f806dc23ea6b851c9a2961b14e7d9460db1a7e50e3820e2679ee8e3e
SHA51251a0fd624919a81b3744d6697380b338f84795c10dc95c449f99253e0943dbfebe2f83ff64a0ac3c1315548abedd8c8a2ed7e83908ba8531a8910f3f4e25b23e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e83992d3a1255e740295da7b03f142ff
SHA11ea227554f776c6f20df71ebf9e98c663feaa3c5
SHA256fb4fc4e305dd74720b62ee125ed473ed72fc087574f988044ed85fec8796b96c
SHA5126f47356f555929bb85226fbe7086d32766e202360bc36879da62d7153ea9ee19382a581782899827f61d6b94e08d0b458cee2671b79e222ee3694111f5777230
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5d939997a4d28f1d76c85c89361254e
SHA14d5314fd89e82e0167591eebf56faf1c2a07119b
SHA2560da91ac113622c3a5e828f414adaa0246d80cbf6c1a0a0251ffa5932c19e55cd
SHA512e27afda5f7717a3c404e9f5443f53775dd09ef21cda378624e703ccd63606cf9a80de2a28a8a621dfff1307c15fbd8013533515eac62a00337636d8e66e3fd43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3a3a8095d99545342dfa7262b84d039
SHA12ff50c187734c4b67292d0860c0c542060f3814b
SHA256aa0970bb35a1948b30918d9316e3fd6fa884d9963f82eedfac8251a3056cb3b0
SHA512bd3deece24fe033835c85b963c720a18adfaa75f28269c3ad6babbcad85eb2929e868971f21054b6e59438f61f8ef0bc06530cd13f86bcc8035b70a49eb32c07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514425b4d23756c397b42f374b07578da
SHA1dfb75ab7d08780aff74a8106c9e3d16242d8c66c
SHA256793eabf1e8b82d05f2dd0d50e81c5dc2831db920620e343d72ddc6d130d2bfba
SHA512e5b9214b7c4e439c2e44095b6c7e3d37f161dd3685baf05ec0b3528191202a89bc85843186b317dec4d2dd9d61162eb1944f2c64280783c5c312c0a0143d8c9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ee7e56989c3cecf774c66acdfc8f33f
SHA130960c6f5c4d0ba3c42c40966d30a5a965f8e27c
SHA256527de45be4cdc3005b2ac54a877308696504584eef1c38cea71ade1f8013aff8
SHA5121bc450d05b65ae693954b54781338978e92174dd6082eba83c5ed63c6770c1d6cde8ed6eaa474fc0a652356f81f50764085688fbbab81c878584b8084103b17b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f52125852a715314acc462940d9449dd
SHA1dab0767818dcb4251f4fb1e9ed37b20d3558c0c8
SHA25633f9cb1b39d34df46b920dfb55790d82311e3c75a3d3c27184b5c0df109c171d
SHA51273999a28bf27cd00fc695e567ea5b72d6fa996ce9886c080372962bdd028fe920ce143a6728123aa6e6ea525b5622f15466accbd2a192f4e27cfe55d1b654e5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b294fdca2f414d747dff050f905ca59e
SHA16e4bc709980f08e5626f741b0a1885a1e9c0e1f3
SHA256cd664296c12fba441bb4351be76bff5446deeb4666ef3c86be3d1afaf2e97776
SHA512c36abffe160bbead8e7df4d71c32818ecf63fcccf6c88a1d09fd5d5f6f0df716f22d6d89c6ee93eb067f907bfe8d4be6ae5ad9fb2199964b8fd13ef7a7bb846e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517f30125d16b1573d4c1bba142ed0a86
SHA184b041ea2a86a81f6c2fa6a2db5fb37df5e7c183
SHA256bf9bda0b67a2bfea367ab506e12c852cf8895f504334c75dc3d37679586f8a84
SHA51297f601b7084bd783118ac2a1ca021057a3f17f57d37d8634d9b167f62e6ef14a496d0ffeec5b48730d7136cb37e854ed4c1dd6e5b10ba323ef56d6810bd84851
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddc0e6ef85f4f429005a937acdd6f1d0
SHA144056ab32e66cfe86ddac7f0247c3f2d103d08bf
SHA256bbefc029ec05b0bc3bf204075b2ce161efe31d21fa58f403d8b915b0cb7634ce
SHA5121086bf34d6a4fb2d26fbbde978a51d654210f71d122ca5ae6f9f376f6eed8f38a8e0a56f784c9f8e371257becf3f9038b9acc252117dc6b0e454ea3c298f1f4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f021cb4d3c91d81a9c2d0ff4e322359
SHA1540c4327f10a9479907eb1d0768cef846cf21709
SHA25678abafaf418b7a26cf3c1a7d7d416094198152c65616c6a0d3445ae10df7a244
SHA5125fdb72901613266de9937ae4e6f1913f425d599b8fd80279f5e6a16fcc2a408289233315c84731f6f5b21b81e6306473419fe3dda369d623e6a3969fe893e915
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500abf6a33f5da2d44da02b8defe41493
SHA1b2fd11961c2ab6bf563a5e8fd3cd146016d1073f
SHA25608849639848b6a479175ba4e0c27470e440df35c4b824e6df6406d59ce231048
SHA512ab8aae19287b9c112e450859450609ff05686f884bff3cc318a76fbd6bf27edec72ffacc701bd884236e898c8ffff1f067d754f0e942f50e81fb6fef5af573f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3cb1efbebdf1c3e32fb5481edc4abf5
SHA1861e9d0f7fcce1e9b18dba5deb7722ff91285baa
SHA256fdbe5b26b05e08c90a96abeace87494e5fee8accc9917a719a1d7fbefaf0e096
SHA512497f5964a566b88ad01de517b235e85270f87962b89d153b524ff008a24fdedb6d7c00cc6336c281cac481acff2ab613af8d6f98c3f53760b79385a7fbf5a191
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b