Analysis
-
max time kernel
142s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/10/2024, 23:27
Static task
static1
Behavioral task
behavioral1
Sample
270693ce4bad9cf4fb99d0fdb679a0b3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
270693ce4bad9cf4fb99d0fdb679a0b3_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
270693ce4bad9cf4fb99d0fdb679a0b3_JaffaCakes118.html
-
Size
139KB
-
MD5
270693ce4bad9cf4fb99d0fdb679a0b3
-
SHA1
2e902730d494dd324178fc5ec16fd80685678687
-
SHA256
501588a9055070bbff7b6ff5bcfc0c6bdd63f63ed218c1aa2d2e6c587c5f0736
-
SHA512
1daec8ce3f08325db0191de4fe9dd01efc199c366dd81195d18a0653816a8f90e2e3ca48475473a9ff5db27d475fc2ce0a0d48449b12285cfb28463b692f1738
-
SSDEEP
3072:SmnF8YH6LyfkMY+BES09JXAnyrZalI+YQ:SmKqRsMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000305e8990b4717e9c385abf824b8d0830371ed0ebc85b103b4809805df17993f6000000000e80000000020000200000004b72766862431ff6a500acb1260743b741ece746db76dec221818c58e7512e1920000000297b6150254d755195923b954b0eb4e43a2edf7a4d0887f28cfb0d5c55609d414000000053c3d1bcbf28d775eee4dccf9d960468d94a49104c1fc6d2f7c00de8dd453974b8038a76d0db27467bd4d16bf74dfc7baa105d0194595397305adaa885296791 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0240b3f121adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2827D401-8605-11EF-AE16-46BBF83CD43C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434616088" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2236 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2236 iexplore.exe 2236 iexplore.exe 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2820 2236 iexplore.exe 30 PID 2236 wrote to memory of 2820 2236 iexplore.exe 30 PID 2236 wrote to memory of 2820 2236 iexplore.exe 30 PID 2236 wrote to memory of 2820 2236 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\270693ce4bad9cf4fb99d0fdb679a0b3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7991177c0ebb30858e859e31d9265ba
SHA1ef668d9c2e44bc304cffced99c2a00521f10b3b0
SHA256fa7beb31a6003a3658916623c8ff7aa27aa9c62f1b1fb54b706377e99f995dcd
SHA512eb71e2ba83db92142b170b2a09ce8e17d9bd9102e86e3aaa06266bdd4a97415f8676eab25ef887a6ecdfba41a20c5c69385c122d47a74778db0a47fe21d8d2a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535e66ff11d81f1331a9d307599a7f7ed
SHA11e31a79f75b1101475c97f17bb10e98fec542bbf
SHA25605270c735e55839c33eaa5f052c62d295521f4039329176f1636d63b94921ab5
SHA512788aa80a357103e0cfd41b052d168d92c256f58093f5243be56ce57a858dbcc847e19b642fba2d449c9135e19f5b944da3764542fe689b717369b3c2ab7e2269
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bed91162ca0d8a31e394855dd3f4204
SHA13c94f2e192a27426bfcddc6ad543f13b8618df0d
SHA256b8acac48eefc591ac0b053c2544633f96cf932d8a7c1ef506aacaf48f5b0113a
SHA5127ac473af3d9c2f4535d01ab534b99bcb19e1d25711177a2a0680b44a542e879eddd2071728413bc1b6e6151931ef9342345c63b81c3c8b15d2121096df08def8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513498d9fed89466376d8e1320b953f67
SHA15f66540fa67573ee222d8dd9ca9e8a820c0e54e6
SHA25617b883522fbc81c3093814a7b3238aa53f411ff059063cadb17a5ee2f9cd5093
SHA512a25110a02197a916bdefe8b26df8646e858f64557e7cae481cdabae5100670c5735ceb3248173a5b4bcd4487242c2beb92e0164573551d803f76279f7ae1e19c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4ae78c928c5bee60529b3b85e42ccfc
SHA12e9a007d95b79bee1224d3c539a967c58e7d3fbd
SHA256bb87e1974b24ba08fea3a764dffad6e967271a03a0b1c6dbe16c61b4ff2b3fc7
SHA512af22480f0dba5ddb0aa8828c6186f48628a5ed4dbc68e1938e0bd6d4f0c61b078b7efc7c95be812cc2d0e945352d8bf5f74ecf738e3e7b032f43a0c751d11d9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d17c814754e3521633ebf42446693b54
SHA1dccea9672072f8debbc3c7003451822cf3256efb
SHA256d3465a38bfe1ab64935ec75d809a352951a576821439df25603ef2b5beb8656c
SHA512698253e0ea25e4154cc7802176bd1c2b9e45972ab1f86fc321730b029850101307075cb67be3eaa63c0c0fffe3530bbadf0ab82bddef5c42c472e02b6e5117d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d83f36ddcd45d56bdf48abd3cc0e48c0
SHA155d0ac1492635e561aced56e387371c64bddb736
SHA256c1d938a1f98061a6f16998871f83eca226c3e0db12387d9ed12002a35f43df98
SHA512402e0dea43ab5d596989b5de8e8ee461be3c2e052937bd9971d5028d3712b40b8b7a71c1fd46a57ba788c196dca1f3f08314a6f15b45745f34a49754f0b12ca6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cd75fdc6760475e8608268939f1f906
SHA14d0c93ea0c6a696f03e1218b26d3e680b5fdfbf3
SHA256885cda5a780273c0e580bd671e006f944b886a8b71b599c7ab7531f71337ddc9
SHA51218bfd1b544b3ce386797b2115bf9201eb57eec665594938f54df38bd599e9c0a20f939fc433d3712c7e81a71b6a062ba207204f822220795fde309ccc43271bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575f97d0ca21d625962f5eaa7f3135899
SHA1899b0ea794b7d1ee5df07e047ff9e6f7cd77a6d8
SHA2563fb10220d69b7cb40e8486ce9e56f60d2b5cd60067b00a9046925d59f59ed558
SHA512d977ae45e23368fae18992097d84b9b78b4e441215a689c3d416c08fa06ca90b74a1868f56ca4798c8367d3778462e49b8d5c67d250b3892f8186c0580609e22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5782222fbcdd17cfff08c577a96541762
SHA144b6beada3e54b951b0fd2040799210954ab89ed
SHA2568c566ba8aac8d6531dc987dc0ad8ea1ef5be982b50d5d3f52952e1b517c5fe45
SHA51208330dbbef192505ab15e8d1e8b51345632d7aee790d050c71c421e7ee5678ead8d202dbcf7a6206e68d801d6461e4d5a0a79987bbe468caf7885efd0bedbe17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec453426367be5c032cbf30337374a73
SHA11dba0eaf051a2e1ba4cf3488a23066d8ffbe980f
SHA256b015afe780dba829d402916a95ad9e64b47668bebaeb206f1f3169a06df9cd18
SHA5124db001c47efb3d9c530277bd42306151846ff1c4d3efad3a5865c18257db801a2dca318e824275cc00c7aa03a8a167f57fe04f2582a7c8a978f506e765880490
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d337f285e19bfa6a22d6c58a03bdc10d
SHA12e48d4f819c0f2daaca438632b252358e751525a
SHA256c0650824c02b8bb248bb9a66990f8bd585d96f549c205bd7bcb8cb835259aec2
SHA51260993e34cd25ea80db59863212df419d6a097c350c0853170a9733d224bd99e9deb559d4d3cb1e7258a7ea2c01c5bf961307f44c491849ae4374984cc4eedac2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d02d42044af4d67b2ab8826b3c2cc0d7
SHA1e7a1dff6b58f51c70ed6a48f5074faae680bfc67
SHA256c5afc07daa9e4082ae53057cb268a5b1ab45fe4f30450a38810ccdac035fa042
SHA51277bd3e4dafb284b0bd571e7a784d831791cbff1908f18758c1282814c1ce2d642293114cdfb9db08997b8ea75cc761b0c122c61ba4f7cc1db5d87a57d08913ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c1bcea45622453dfde0d580eaea9155
SHA13826cbd83e998915b12519d8f6d7837d5c3bb6cd
SHA2569e8de6e886bfa9c27740fe057e715ceec70944fef3be9d24d3665408096231aa
SHA512adc006a6c453aebb31ddb1053daaaca87e987ecf210e823dcc078f6cbbc0dd1c0db09278f1c6f77a55325627873354c54455c04acdef94cc10f5e80a2d0381c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f78e349b232febee01b735b63c412c5
SHA1507151e2daf954fb1a6f7727c4462281041eb53d
SHA2560c5a23eabb915d883a04269e3f0897fd52b29f0a3802feadb6932eac884babde
SHA5129cebd3834197da7915a547fc52c04a2c0c54fa12fb6d09a5914ce7bbaf327e757c479e55e35e0afeec623949e71c2771b4cd28b9588cfc06f3e28ff06cb515da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c5b39f1f7437990706c1b15df44edf1
SHA1458851eeeda7ed4e346dc139866296f42cda3064
SHA2560e79135d850ac914c285580804d3236b743c83726bdb4d739832208a421c41ea
SHA512886067722d20745349b88772477784143e61c1cf8d1bf62e16e1981dbfb0dbaa17630715ae76d0669778a8c8db4fe2d363cf0775d298f0fb35436aef5fc1cd5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aed78b670014e296fd78d12b4175a49a
SHA1fd47a03d891dc919694798b6f59ca69038827e70
SHA2568005c35284d79af5a8c75bd598c6d70a7c4ec486fd8617bb16b104aa61787b9b
SHA51228bacf69ebcf2254b5f6d2f571680341f6409fe1d42113f493962e756be042dc06cf7eb47c7a6ee441b92c48e15bcf58efc5435cba3aa434ddd54474acdf5d92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c902487e83435adb3a516c1ffd99e01
SHA18a3f2cd66755fa452f49180e998f7daa06430acc
SHA25659d35018b675bdd86a4b1b341e4005da82a141c57484a96b2e76c68997bb7b33
SHA5126fd14dc95ee6b1a378e1ed10bedb3280ef6c073c25bab3f712e51d7a2869f602877dee0d958a73588cb5551f715dc0865bf9b073d912456f3beb053810924462
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b