Analysis
-
max time kernel
99s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
08/10/2024, 23:10
Static task
static1
Behavioral task
behavioral1
Sample
26de3589da24e50fc82ee6afb437d234_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
26de3589da24e50fc82ee6afb437d234_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
26de3589da24e50fc82ee6afb437d234_JaffaCakes118.html
-
Size
55KB
-
MD5
26de3589da24e50fc82ee6afb437d234
-
SHA1
848f81fbba375df8de69e70a29bfa04e2aab423b
-
SHA256
62419daeab3d641773ea2869e344a0a8579804d775446bfd649fc9da88d9644a
-
SHA512
ce79947f900638e634024065fc3c4f1b8709552f67bafbf0596bc52f55660bd08f09f4b2d98a41a232d5ee66f5622fb49d400c70026315b6323ccc654a86d218
-
SSDEEP
1536:busIgSzEZdRI7reguFuVah9EKwFrFEXgaHNkTRD:bIgSzOORD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000bf5d010586830e360e0db5b1881fef523ecdecec200bc8fe09821bc885ed3f1e000000000e8000000002000020000000aa371b34a6250a656831ac3ff43300f52899badd8e44d14c2d88f613041a9c6a20000000d5bf15d6d287070729e46ba16e1ff511d34d36a1047398dae15c5a972a1c826e4000000048606e38430e7cc1560a80b1efd585036c59502a9493aadd3289464a3e887e42707ea21e835f7c6f627f7404c06729b7c96ef572b7efa6cb769acaaccaa3757f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434615385" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00817e53101adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7ED9A781-8603-11EF-AC25-4298DBAE743E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2144 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2144 iexplore.exe 2144 iexplore.exe 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2144 wrote to memory of 2028 2144 iexplore.exe 29 PID 2144 wrote to memory of 2028 2144 iexplore.exe 29 PID 2144 wrote to memory of 2028 2144 iexplore.exe 29 PID 2144 wrote to memory of 2028 2144 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\26de3589da24e50fc82ee6afb437d234_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2144 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5888005a4a0e0b6af4690a4dd3405e42c
SHA105c6c8a81893316fa1df7966729d25c0e68df600
SHA256b57299dca6ece1a55e8d84228ce7102d6d58463c89b793bb51c0b21c5ba90e02
SHA512779e6c9d4df3d9ba59f47db904daa66cfb8342f79c23973c75745a5586b8d7e20f3fb1724e82019e81cdca01ebd7692b5dfedb162c138c4dc54f67b69ffe8781
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb6c7c85e96d00ea33936e35b4211728
SHA170c88d731406581070513d74313f2d95ffcf6eba
SHA256cd0e2ef193863430d452b49297eb58594a1f0691a7a32581436f5d37207fde1f
SHA512d4b182bf412ea387c640bc11276ffa2054d4f78eb19a7abcaeda9a1f6df01224c4af2278334c3f55e438fd0f1ab5dfef3f1033199e7828a347767c46eca3dc64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a67fa9d01c6a98557ea26246cbd3712
SHA19348afb1d58777c085b5c50859062a4c2735855f
SHA256f02a62ec553be7ce3ad873ae4d4f78f8e9ddc8cd810702e14492e1aaacb2f799
SHA512117dd7ba2bfad7fc9ba1998c815a4fbc8ff057cf6ddd675b9ce24dc8d9e198483904c096c2f2f8cc2f218e077f6f5886143e59ca76ee0a4df57ea01bb4d019a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570368f3846899536d3dc50cb5dcf927d
SHA160ca7d469ce3d82752e856f595964358d1255f36
SHA25629fab7283227f89484d02e996a05b6dd2079c272edabd629a1d9f4d20ad12583
SHA5120c01ab9c1ece212b4babca9e9374097eee551d2aeb7529263eaa0a341a12d637b22ae382918016fe385e6ebea5156c9a08d8f94d43cf34febda50509e275dabb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56081212b98bb4ffd7616e9e1d9d470f9
SHA1299bb0e89fb91959bbc9f291b87c511b3eb29def
SHA256d5c9fda6108369e2e1a19dfa662e6b6cbb130ab1a90ac54a3deb4497812f889f
SHA512be8e4a0c3b68a27ae9e6a81935602139882944dc8b7faee264bd93f67767b028bce76c167301742880cb3bdb408f034c966b6031a7bfc9a1174e6af0872cfb0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e8106f4eb5f2b7b4e009947a71c5b70
SHA15de63d1b830716cad96c89716e69725fdcc77a61
SHA2569a30f53700fbcbe6ff027d2abcbde809afc8e07d7e73aa2bf865c7785c2965c2
SHA5126f3a68e282972f73bff51edbdcf43cc63f0ab1c1f3628a43d9426a8fa8750f7400274d13766f95ffeb40e7e3bf569e454905446973dc79f0ae203a3fcfc857e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b23fe8789f3871450c07e76630c2a57f
SHA15bc7204edf3eb21aecd60b3252d790b0ed240681
SHA2569979c0a53e56327eadf8e71075acdbb9cee64518b7a8d906bf31b80a74f5823c
SHA512d8b5d24de4649b29345393373c89d1ec8cb7327e1de86a6629ea31bc01060da98a34939f3ce4492d0b9495fde064d1f385b4b0eb10235db2849dec6b90f9e0cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b66a8dce3574d7b4a03d108ef07e40a4
SHA1ad9b24bde88d161637aed00321e4b6f1f9d4c335
SHA2569cf7194973fbb7f747d858d5b43af67cc8a689e428cfe7d2435bf38aeee883e7
SHA5129b5d93fbbe350523d2fcb44b125e2717c72d8d6dc5557ebb9356f5a87956517b2e02ec0aceb09452abd78d888d29da7064fdeb53281d50e1e0f26fbea2239597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5606e1658509662852da016b8d9cfa493
SHA19e23ad2fba18c2d441cb818d1b623db8e4daed38
SHA25624aa7190fe9821c6a040e9ac35efe146c2dc5998cebf72d5080cba7c44ee1b84
SHA5124016bae0b43c980e2efc511cb1e3c2e9884d6aa8dbd4ee09f335d1c5821ad7ae88be8a29bab65189e09a6c7d2f4b675d8475352c6f1c853585d1603d40e2d9dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a67f62fae34d15188681812f1c8c95b
SHA1b67e1fe427d3e72f3094082821040904ecb21602
SHA256dc4fd9f570e992c6dac0c486a33ae6997b9e8b96203e165eb51ad74c65d5795e
SHA51237cdd6c6afae51bb3de66e495f4260d6e77a0602538fe6aeb1c7d49d2b289d204443a372e20c727446a208b4113907455d9ece3c020f05938a7b0debdcf45485
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6647fb90a37c9871e1741f8eeb42486
SHA19666416731d913f6c083cb9906b23bd25526e353
SHA256c805b19c658e18a910a624ad2e6e06227708b97d740eae6c9230e6d56e81fc5b
SHA512c102930933a3bd28cf63fc65a0ce586b4bd9d27786b1f1048c5300385999a64dad8814c2b9071cb63cb4f1feb6e5fbb3c7b9141c1253d922cf4db8f6e1b38b1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5796ecf36701585c6764ad5e2cd70edca
SHA16c81cd4da295b43828d55897201559aaf3520034
SHA256b33c5dfe622593172d27e05f7d39cadf682e57fc89fd88fc1a7eea2c0dd572ec
SHA512a4899887d5ac8e4e22d30cb8c04d4bd873ef6aee9983848df58ba4d81289ba2f489f9f3991bcd9ff594864d363d1f349a0017918e7b846f8145ea04e1fe84981
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598a29a15cdbb25c7a7f539444a9b6294
SHA1a01e2f46ead0be0ba7af879c709391aca61b5ce8
SHA256bf5a634357de2951c78aef2bbe77716bde0e62acf152063a33af66adad938c4d
SHA51299d7fc0334788019953f0c525a8f5b760976a64fdfde08ca85a943c5cb4bf75a1348706b7d2f43a7dc8bb1a3cb6ed19657dc41763bbbc0ec2f4c353672cf7b00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c79de421df45f903cc794f83c672fc96
SHA1d71a79e24c4cbbb5f48538f696a09503eedf34a0
SHA2565321e010fd8ca78993f7c90704ebb9403316160bf7bb2299bad21ebbd4ff5d34
SHA512b0911fe89657d58bbcbe54bb9b381ed28635866c785b3ebdf849715fcc31354573fc84b6a690041a46cfe2139d65ab2c4e6dd3a45b3821bcbba2c4751b7d99d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548a0b946e3e2540cb2d31825e321f168
SHA19dc37a2ee937c36fdccb548847f2f7c0c3e87b5a
SHA25636ee5bf51cd408d63134354768572b7a6914cff05c644b57255b1d48fd1c0552
SHA5129c823bcf0d750bd6b8435b9e70f2096b55e5cd72d55e2832111fada85aad6131fa311fe4e355328e2840ac66525beec7e38041345cacb3a0f7cf0550fd29765c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df03acaa6ec7e99915d7e8af02c00a93
SHA15f8720311eb509264bd6f58b44c36acd549e24ad
SHA256785187523179d0420815c2cbdc61ed935b6be4c4a6411998e88c407eea9fc3ab
SHA512ef73dbd9c9b36706633707cfff35c0283eaadf20ab582ba896ad7f2e0eb7aa591df0eda04467364f1f80f2659fedb3428849325dbc49edcb2ef1fc96b908a252
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f52b5571080c88632ae236888e899dd
SHA1bdc8a28cc98873aa2a2aeabe4f30828829e6d575
SHA2565e81711f6fc5912ba3b1ac9a2e0fbd37ff7debf8ef0393a8512e31d4a4cbe2d0
SHA51203de9aab3186ec85ad4f0b7465ea60e35bfc57aca9754922d70940f65afe0aa6749b10f7f0851c919570c5f9da6c1fbe53ddf90ae1539c0ac5ee66989fcb9c41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2f821ccda0b975a027574de082f8663
SHA1209ce3b56429f79a8f878b5ee1ce5fe58a695f94
SHA256857bea752484b978bbcbc03fca0f35f4f62e780b826cb32b2de08be731a24406
SHA512a701b3e3b142119395188165918eceb267d433d112590abab39148bfa9d67930a600757b1f3554e5df6a26dda1fb0ba8062477a57629ed7255c9ef2c7396cb66
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b