Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/10/2024, 20:18
Static task
static1
Behavioral task
behavioral1
Sample
24e3a705b31799058c6d285f5ab161cb_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
24e3a705b31799058c6d285f5ab161cb_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
24e3a705b31799058c6d285f5ab161cb_JaffaCakes118.html
-
Size
25KB
-
MD5
24e3a705b31799058c6d285f5ab161cb
-
SHA1
1670eae50cae19edf52959a262401d561f49da13
-
SHA256
525f9ba9dd7234a01aba6a74e1ec840f3365b17b7b373176a2d80d36f3da3c52
-
SHA512
e783a0ac19bfc22dbcbd23e796b7ffb72e31c86b3e87943716f0d8337c5734c1be4c8863498ec8a80d91f9e57190b6a4899fbbd8b8a688f0cada3800df7f08f0
-
SSDEEP
384:DnA4ywrHp9wEryztvukeKXXTuQwfHBshASLIWQQ/U4cR1LeeIYECdG55LkuxOk7X:T1RD8tWkekXAhNS1k90t
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{299A8381-85DF-11EF-9EEF-FA57F1690589} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 603a57feeb19db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434599767" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000068e41b501c534c44bbbee53e28ceb0f700000000020000000000106600000001000020000000de103b3e492da9cf1f455ff39b9cfe28514a3c5905dc1533c9f488d9e551f07d000000000e8000000002000020000000b89489488148ade6d3da8d920e067b3b53ac2ed3c775fafb1fa92707811e68b52000000011329559c2a8b1d81f2db7cc857521bd8032bb2e4b81d7a743480c46360b804540000000736e15f4c8f409292409a4b3a3cb853f7f5a9f92a4d33561f9b5fd4e3e24f65b92a0a39348b74b67bf31c46a98ecf1530e7d47b1942c8f77ae33737256202be3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2820 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2820 iexplore.exe 2820 iexplore.exe 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2784 2820 iexplore.exe 30 PID 2820 wrote to memory of 2784 2820 iexplore.exe 30 PID 2820 wrote to memory of 2784 2820 iexplore.exe 30 PID 2820 wrote to memory of 2784 2820 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\24e3a705b31799058c6d285f5ab161cb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2820 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bf80d65de786ce8acf580aa77e0f5a9
SHA14da7344d821555d50b7c184553753ef6e523a0ec
SHA25646007eab17ddf59e042da9801f98e369abdeab4276048897488e31565761fb2c
SHA512552fa7cfca15cac9d15febf3f62ea3c83c961ad9409484a1917e7f7bb2c8dcdee417105c7fb4691c42ad3519ddce2ed850abbdd9d745dcb2b33bc7726a9918f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5099f130fb23730afc2551226cc3f5c0b
SHA1bc2ab9d8e0048bcd9d086b46580ad52fe580087a
SHA25683129d226f6e1bba21983d676d590799180aa2d48756352b7f15a75ebdd8d8d7
SHA512cdbccd1f5209a313185953808fa84a33f35bc8a37a456b5a38c19ab3ebe2bd4c429c86f53b02969e7641859a9788b8d908b9c0a71a812eb63a09c6310a6acfef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53734a793798dcb6f39cf53b77599d9ab
SHA16d02ad06848d0fb96aad0a2eedfdb97c335a7c1b
SHA2567f4204563733a9c8c3464ec70e54fb1b838a15bcdaf137c6088784051ebf0137
SHA5121c14d4071a3eec9970392bb89652d26284650d1b15f37ca070910393ffd9954eeae4a70f6c6a25717eef0771fc3e3b68ad0cf45ddbac62af3e59a69fad618370
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56763d9aa5e28dfc9d02861efed47583c
SHA1ff9522296cca8bbd06c3de2f0f1a53e41202d821
SHA2562d89134d0de72d0d180e8abf4b366c84d3ec5cd7bf2414f64bccbb887c7cd29a
SHA512aec13171c1ada7bc6f4618e377456355c4a53bc7385c746c78c902640c1b5b1c9002c1654a9bb0ac0e114a85cf7c86506593304c85b0d72d73dbaa92072f121b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52257581d3b3eb0576cf2668cda23a0a8
SHA17e33808e94620caba86e1e176c4ca48733fbbe95
SHA2565dbf0e76ebfcbe93902f7ccfb8d6229b3613f245981b5c5b6ac4915af91ded97
SHA5123125bb2e8ecc1a5e075bb2501a383fcf62b64ba383cccc7ace50fbcb29fdee321616c583a4ac7465f4152351b8c1b63cb60c5628bdb6d1a9081e4a16fd0d5357
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527137f838159dd31e9dd38f3fd61c82b
SHA1256e137906e525bb8bd8fe94523e2f7f2583a397
SHA25690cbf0b07899a8da6da13e06cc16a1bf844f7c7b52e89b78645549405e2fca74
SHA5128c2ed237003219fcca1169c84c72621e615381d5afec24495140000e9ef85f39e3d7599c6b373a29d380ea6a2dc049e55d4f122ff58962566d512751d55bb0b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549037a728232ac7777850bed2cb6d204
SHA1ddf43c711f36c2c6732e875dbe194cbd084f8a3e
SHA256507df58aa8b14d5bcfad18ee67b4e1c026aa76d1be3d3b0e405231a1134cd409
SHA512fd5374315a122a633546ed34527142213b66802a3f94a5477497febd9f7e8c4ab8f940078f9aa94a53da87653b012e88e53a7704ee0a1f61c5fc64dc63122d01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ece44093bb2ed1e89742364cd1d3f8b7
SHA166907c26747406b7178e85dece8363bda5e45f5c
SHA256bd10ea0dea09adecd724849f857ab91acb1f47838d4f99c179a2c87ccec4f4b2
SHA512dd4f47842ddd625fb09bbe63414f5c9da189932670c7f25901b86540218bc690e257aa85ecdfd3b82213bf0356edb526bb8724e19557e04c54a28b547a9a4441
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530873043b0e68d10f77bb76582fffe38
SHA1b409f203889795101ee2ff8180e8115596d66297
SHA25684b44937db746ac5b79478bc5bc23f8b079e710a6f0e9290b1565321b82e50c1
SHA512dec748373c7702b1f8022a48a222bb46702c13240deb640ba6943d5fd4862b19bab606bff43928adf72da7ee18365f2c7cc379e1688ef9285e719ee08064864a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5112546735215b9bca9a14637091c9ccc
SHA11ee8afda19cf47c9c309b0bdd8733731a9688f41
SHA256b0dc4aaf8cbd6ea4c40ad8d4e6e9276ed5776c1dc45c7cb1e78f1877499bae55
SHA5122a2d7a2844d0ed636948cb09988b90306e5ae46dc813bed64f59d1f74cd52a113b2cff22ebac968094e1a49ff3bb4941c938294e3533730c57b9cd4e99ff3ba7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca97ab954ce524487e5a32de7156699e
SHA1d38463389a97c4c827dc5b0ab812c30e14eb095f
SHA2567e43014605e86d073948fa939d363af291468a0e52334f8fe863a99fb78227cf
SHA512885982b3164a6205a4423a63ac3da81fb2bc1dbfee8a0466a668c17b827948fdd4a599c24a8185966e4243bce6213b3b15989ff85aff69093050c1ee1dc8abcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5973fd0179e64842e3863b205ba5c0c0e
SHA11cc473f72b1cb28333996481bdbce2dfa59dc0ea
SHA25684b10d7307e20d5fa5427b598d7a467a3aeddd0af3f057128d8e3b5e45da02f9
SHA5124d7e450e0f3fb72357be46b4ba4b806d3fb724657b89b6a710901bd4399c051b85f64e0f8e4a5e41d4a3d1f0e540b2406fbe58c0db81e4f1721c4117557af5c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbbc2ff23b9726ed6f2df7350e84947e
SHA11c5dfa42fe0a037bad67f9302503bfd12dacbf93
SHA25602e67c94159a453ddab3d829a5068496871b7a31cdf214f4aca10ae9b821705f
SHA512f6a00bac856376260fa32509ee511ed7d90a9bda021eff4f56c8cc736ac999b6c3f8e039218fbec20b7f9853f0bd6c582ad8be607fca8af758dfba6c99c7b138
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53db52347f443833b2190414cb2a3f624
SHA15f6b48f9f1d643ea92b847b43eb142a1110ae1ca
SHA256ed7ee5371b88180720100cb931e6eb9c52c85abf1e5f34bdff29c23b684e432b
SHA512eca0059f279431be1ff7a12d7cdab864ba351392db90f89d92ee3376c7b82cdaa5310ffb907883e82fce7fb4192d290e17f34a9c6d6b8043d52aa7768865bf31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5200e0a5362dea0a9bde8d7eef7ce8e0b
SHA19d3c7e40801f9ec5fae1cba8c2da74869a3a5a4a
SHA25695515414b99a08ddc755ac8e8958354c8f7b753abed4cc4e7c6ead0cf6f2fb04
SHA512848bb3bf5705e86e66f25dd7127c0ce21ed7e1c354f855f71acc5c6e333bd8dfbc5b0dc34a5e349f1526f35784f92743fb51e5be5a8daf470c79ba776abeabad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb3cb0c4598556dda9fe0e67f40c8fdb
SHA1514a7e2ac8558505d66477ed5f685b38b5b5ef44
SHA256395afc518f5f235ae8bd3830cc1b010f66ae2b5e2c570bc3e5cf631c455c6f65
SHA5123264186fa740f63b4e897884bc34deac16dc9a74afdf7d3df4fa4e0c3455bb1d1514b9a1787caa275b0055a17521ba6d519968d0832488a7ad57f5e72f844819
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5973bd7dd278bcbb31a55a198a9a9a9b9
SHA17488a62ffa1183faad802320fa78fa528280af15
SHA2561142547b5695be4b26f4664c88d8723a172563cb656212d9acc45e79067f4801
SHA5128779c653872e07e51fe68426e81c5e42d7e1b7df4eb9a737d807a179296da8fa3974fbc54569ca5af76820bae92013e5606704a3bd5b9979c22b7e7e4b657056
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d840578f8e886f4924ae4b43f5ce9866
SHA10d9fdbb7883db09aec3cecab2e3002854ea1e1cb
SHA256df955c6299f97e9383ec9f25fc1bd6a05e7b994894f1bf4e49b30d31abd44233
SHA5124d27ba5f7dc27e2427e470f182411e5fa2adfc332c845eaabd05776690a03bf9686da34f17a7a72d236ce2065cb9def708704b140e908b86f75d75faf65004e9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b