Analysis
-
max time kernel
117s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-10-2024 23:33
Static task
static1
Behavioral task
behavioral1
Sample
2719e6c232c7e79d85fc4cf0fd19e801_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2719e6c232c7e79d85fc4cf0fd19e801_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2719e6c232c7e79d85fc4cf0fd19e801_JaffaCakes118.html
-
Size
11KB
-
MD5
2719e6c232c7e79d85fc4cf0fd19e801
-
SHA1
1bb82e66786d7b35a0064d0ed9ae38beb27666cb
-
SHA256
63d37d2932ae002c66393bf947e7d75f5fd5c3f36a7a77bd7afe11d95f361923
-
SHA512
267efeee8b9d3093bc7574f6dac2a18d22ce4cf84cee8c6917ee4a5b1f2e3954ecfa67961b3f2cc1bfd2a38ab382d9575dda80c94c635fc172465bf58d539584
-
SSDEEP
96:uzVs+ux782LLY1k9o84d12ef7CSTUcGT/ku3pYepFfrUMzqzFliFHlVHcEZ7ru7f:csz782AYS/pSYCfU0HPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000006f40c698867ae2e88c3b94206ca281e7b416c1029d76fe4bb6298b953c7d19cc000000000e8000000002000020000000376ade0243c6f63ae62b77dc0308f71a13d30abccc846e8b2fecebecd2b02c65200000007b8eb12999beca0a76d8e5d08d7b0c17af3f61e1a2063df9f8d918ee29f80f0340000000263b83871988e1443c22c444c168f8d8abf912ea8d64a913123da2dddb625e5601527e49824b74e8d2b5c66f164eb005f27d1acf03305f11c0b9577a218894b2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d05f0efe121adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{27855531-8606-11EF-A087-5EE01BAFE073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434616515" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3064 iexplore.exe 3064 iexplore.exe 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3064 wrote to memory of 3068 3064 iexplore.exe 30 PID 3064 wrote to memory of 3068 3064 iexplore.exe 30 PID 3064 wrote to memory of 3068 3064 iexplore.exe 30 PID 3064 wrote to memory of 3068 3064 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2719e6c232c7e79d85fc4cf0fd19e801_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3064 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cf4b1404c5d849505ed148fa2b718c1
SHA1c752fac90330a0202f37a9653e2ef731616cdcf7
SHA256c6a8e5763677d93a907cda751be9b7aee1ac31f215702b0352a71ee4593ea5ba
SHA512254dc2e97393040ab08a057ab8accb2b7b74f42d5665940930f146adf69b286ef0abcb7acb2e92fb6437b8985d9e43eb55b14cf60491853a9751f479ab057f70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56817b253cfdb90f5b312572bca213ff6
SHA177a8a3904e26147db912d1ae9b35e4ebae09bf1b
SHA2564be14fd1ac9d430080f2e37155b946c642c442afef39c9e8749c73b8d3ea55b4
SHA512d1a1f685da2e008347d7c614d68844c45aa384da7d945f389d32f6f44d2d91ad3758a2f3a8b078e71f17e574c42a0af10571437b9de0cd48294c31ff65e68112
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebe4a6a813013fdc474ed42df09c7ec9
SHA1e8cbe247b42c945cd8b3d3131560752fcac4187f
SHA2566b66533f82685a8c39089148f00d14c747a264de6c24becf2c7e571daad30f50
SHA5125897c734e4ac13da911136ed34454a5014683ab25d4b1bb88c0db96a7f18a01ef3ed90e411cdae0361a327ff7c67152aa5f1b96b660b290ecbdcf4a543cd092f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571ad4d0c59cdac6a9d11cd9ef3c7645b
SHA1444103fafc1105561eccb21e12c8a5574091da7b
SHA256ef636b66aaea6127d8fce684714a6b49d7566dfa08eb76096de77334facc48a7
SHA512eea286e46742069c46587ebfb12b791a005811f440b0950a9bdd78944b69922d0b3f7ee2972273196ddcb10cddd8ea6f643c0a1bcaddd70fc7a24aee15806b87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ccddd855018924dd6916ba24d43bdba
SHA17cfa4b295ea2c208ba1698a91b0cfcdffbd0bd47
SHA25639dfd915a97982a119eaa9bae37389083f4c5c0d3f4054fc9e345329a8af83b9
SHA512bce36d1a46f2e43806cd2f84b84dc3173b7002d7e5a252267868267e481de4ce2befa1100be717230ecf50248ca9e998c2b246dab1efb7ca8553a729c008b60a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b907344e86d6850d52f46037eb32fa4
SHA16c6f15d4df303bfd3a4fb4b02ae90a839dbc8c75
SHA2562fdac9aab8d1cde34c1803196f076875fc9c2020218804591191e08fdf06d9f7
SHA51221c57e5d689fc7a70761c6f105b79480287aeda69914c548dc7c15a77b92ca7597909f9a7386cd29ed695b3371d4ff25e1f628a60a0bf4bfed1c63fc6e622c2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5534d44933663ee6bb2da386cbeacc871
SHA1f95b3a03aca7823f32ca5307c4d2b6f31be9df86
SHA256846c40aa878de3cc2a02fa193d699adf1f28641aa849ea3c3e1e21955fbba861
SHA51214bef076ab8f93e1c7eed64d7e54dc5378f2e93fb4e4604e29a173fa960e4d76abdba812a784f3987e1725ab37573cd3df3309ab1f832fc8e2e7e160c7e54681
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505c053cb11de468e41d93458662255e0
SHA11e43fbdf8cf6b185f418a14d48b5a664993d1f3d
SHA256fde6a74eab1c4478419dfa63b7353491fca992efcbe75a9f81a793425d30a392
SHA5123a660dd568a4e8a83bc5d09af39103a07cc426ae2ef1793851e2d1ec9d05d61bc87748e6b3b0b5be5ab54e7fb38510ac0e5c26ee62ef883bc9c14ed2c13204e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be0b1a418071acdd88dd9380a63065d7
SHA1e2fa074abd29c3c4bd8472075a1661599eedd677
SHA256c1a056127ddb6d39a903cc8e2d71cc94bde34997a99572b58b284db823eb7c08
SHA512a753edc50d55fb6d425111af0bd09b52ed149f4d76af4dd584475c99f13d826abb8e1d6596ef1742eb33a7e841fa7cdaa05851d668966bd45ecac286b0f0a539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1d6c60d8fa1c92992f749dd5b74bbcb
SHA13ce608f8c65cf4a558631910b7c7911f3b185b32
SHA25612c895bea5a6c8d213b6812642a3c2a723890bd2d274eabd9d59f02e2db2baae
SHA5126e12f479d7aab6817e5cafe4752897444dec3bcfd41a18d0c601f67b19cec1457d56d48fc825164a12db5046146ef3b1a2a33be16ff61c197a6a2b8fcbd51944
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6aa7336d80f1f35dff28954fa1a7d67
SHA19e88fb5ec4ac99ed4005f317aacbd2ba4540fada
SHA25622ec1d4c55c594ba36b2565431816c38fb512fe6faada62215afaded2ca6b86d
SHA512afaee53df126568e1678f83072ed26314fe22917cf55bd3f188f77210d8b2b1af9a6a7e8ff0a009a9bdf13611f1846c51cfc24cbbb03e254c5cddd435a43608c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5259b7f6623b0779da6b8c246d0ccbeda
SHA12c1743f493ac1d7b95760bd77cbe7136fcfae7b5
SHA256a01dc10792e7b35363ac2452eb21280cce8f6d18ca5d23fe79991b24c0f63fc7
SHA512a8e1006d036a3dcbb9aec091664f32b75294524a1c633d10d289fe7cc8b125c6d80d3d8a9180b489b6097a9e2020dfbdb6f079069539a8e49cf14a86f530bbde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557338a9b1af98d6d6aa8d694e4ef7c67
SHA1677e5fae4734326deac605c3b741c4b72cd116aa
SHA256e10cc6851cc305e08a784b7fe373c720c47bc17eba74d3ec46d6f72326d991db
SHA5122fe8bf1b24360658edeb3eb91882c9a3ebdd443a371a998259a5d83abd26d15824f2e302b1e4355b2cee85811e56e9b3ba53914e6a8385120b89381c39561767
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50775f35a6f12c5ade8464ee944c05e3d
SHA11c507ef4ecbb376ae22d1e8656c5d3fe273c824a
SHA256371454d1bcfd8cb3a21b8a0988e1d0eba152bb3e3ed0bcb7af9aee5ab7bbc453
SHA512a93caf4a261a5e9f150790c52b4a4a8317955112cd678529283edf4b6b24b9fdd0208eebbc4e31b444fd361ee09bb7d8ebf56603a2f672e6a908c2cad24487b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ea0ed361198db75c2077d67935a1e81
SHA16538ed4aac67f9d14f698364de9db9c55351e23c
SHA2564bb3558c3794ad400c2b8b22b12c93748b805b6677e7c20bafb7832dc48cc733
SHA5120ecaa76751a295b1aea4d96a5c1c306ea5d39307350a410644d1f03dc2db00e8c320f629b86a2d8d1511988cc56896c7d61c0612cfb0c9b7c0bf1e54b9bae86e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a383cdeac11c0f755426486616056023
SHA1e2c1addf140224e59072b10683f7ce9691d1e5f8
SHA2564156c05624d7d8d956478d7eba3f3ea901ebf67e9d43cd36c53223eaafc78382
SHA51245851118c9de1971f028a21fe20d477acc9b3b6560c816fbac059b9b81dd30ee5b61922a453f454fb444066539530939a6bdf274438619ee529dcee8d7ba105f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f56f85e17a923878793cabce2b31aadf
SHA150db91dd369bc24bf6963f37cea7d5ad9f991330
SHA256b103c49d4b585ba96da4b6da60707d6b0716410e3b0b93e1dca6e9a56fda9aaf
SHA5127f3d879186ee9e263318ff39fed71f57603107df9dff55c9b8d0e96c6252b8514b7abc1c3fc5f233dad94cb03c7d6635d28ea9e27ca51e86f3e5a3111967d399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c98a4b1a7869626a9c8098429bd42e6
SHA148bc64b7e986ce7a242f348ca8fe22652f476be2
SHA2561a135833163b3ed2bdfc876dcbec569842d2a13575e240db35dfb0371299b014
SHA512406260838087867114285d93b7f52178389e1b4a55ecafe26565404c19f93b2d05a8f7f01c8bbf74427cb5885592bc8d4f8e923eb137918ea740f40bc24f20b8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b