Analysis
-
max time kernel
69s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/10/2024, 20:29
Static task
static1
Behavioral task
behavioral1
Sample
25057311e3eca6321abd5c8387bbe810_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
25057311e3eca6321abd5c8387bbe810_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
25057311e3eca6321abd5c8387bbe810_JaffaCakes118.html
-
Size
53KB
-
MD5
25057311e3eca6321abd5c8387bbe810
-
SHA1
db95b4902f9e02ef81958d3997e26ae2c3f14076
-
SHA256
b9fc1e1de4e79d4623403666a8dea9d1dda85acab9969aa85bee87ea1a4ac5fb
-
SHA512
5b217782dbe3c4aa3c2b9c42dccdee2450361b47753dbe0ede34466657733fe3df04de19422a1d518415b7461f1285bc2b24dc34084b57fd99e8b60241571955
-
SSDEEP
1536:CkgUiIakTqGivi+PyULrunlYu63Nj+q5VyvR0w2AzTICbbBoX/t9M/dNwIUEDmDr:CkgUiIakTqGivi+PyULrunlYu63Nj+q7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a05d3eebf019db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434601882" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000bf63bb3eaff50c12dcd92472d300d07fec61ed7ecd94bc48763b02142047fc35000000000e800000000200002000000078e12b3ed65231fdec878220662a74d32c47fedb77e14d49a2f5fdf73ba40bbc200000001bca4dac5637fbeb6bfaf8079624b89270febaf7a209080b530f272b77410109400000000a132081d38979d22b05a0fe246dccb41f96244ebc0d4155e148001bd5065708ea5f8716bcd56fd2c3e424b5a14370bebd37953b5f51e38910e184c7396f9a9d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1528B611-85E4-11EF-B2A2-C6DA928D33CD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1956 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1956 iexplore.exe 1956 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2700 1956 iexplore.exe 29 PID 1956 wrote to memory of 2700 1956 iexplore.exe 29 PID 1956 wrote to memory of 2700 1956 iexplore.exe 29 PID 1956 wrote to memory of 2700 1956 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\25057311e3eca6321abd5c8387bbe810_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1956 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5088f4a4e36940082451bc8899739f0a1
SHA10142d5e01964039a639ebc063742888cf60720a4
SHA2560f93effbdc01890f3a199412c679652af20644c28f5c0a3c299c4c96b6233704
SHA512b83fd13c084996c8facc04a1cbbf260526c27316cb63d95db5bc11116da0f0e52c98a8c019976d3d41302f922036a8cff1c1ede5bdb8c543017628321f6c10bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3aba1dbfa6721967e22acfff6e46e68
SHA1323b481dd3c6992a419b1df83a20b816095f17e0
SHA25616b829efceaca4493255ca221c45c04a40160f099ba33f0cf3e72674479e0e73
SHA51228b1736f52d31e141d16219589a1dbbfe3deeb9c76f053c5ea79b143d3315f93a8a1b0ff7b81e988b5aa4d1de4ca310f111915f510997a4fab35729a075a2a2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d15e8138aff6f3f4468325f2df33038
SHA1098f6627fc0c86a77ade0e0917370465381e9533
SHA25687963d9bc93d2fe4bc1961a99eda49855b53256096f2e968798af92764185363
SHA512b26cdfb4e59dfe948d7d4685f1ba41442e429674c50c6248939f296767b36a8d14f58bcba83a2bf8515fecc9d8611fd3850dc84fe812bfd6d4c636df0596cd47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce2a9fd69b1b4bb4ee47cabb127caae1
SHA1eb39e11e5506052653673c89c2d84c3e8f0840ff
SHA25622f615f499df32c1095c961f5c1296c69cf1bb59550c60790a7b11e7e936538a
SHA5122ce241edb99adf63a09937b840ab84571debd075c9507e6e415a03d485e9b5ab1d4e7672ff5799915996b74546695f3c11becc52b56af3690ffdf03760977c61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8cdaa63c18122657f0c7937056aa6cf
SHA126a38d3e6de252f334bb4c226216a9b1d4a35eb7
SHA256939f45f30e59c9194f9f5ca86eba30de09710892981bb29bed4a64b577efec66
SHA5124578b13005023968615a8070c2986667cfb766c97998bca5bbacce7750e667e099f863ba0bac1d21f27995ae2902f47ec9789832aa069385d32450d625686bf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b74153077116da26fda0d5c4a0954f6
SHA15c92feff4b1ce35908723e781ee4e04df3d8e786
SHA2566ac027ff8c5c1e25dae7d177a7192692090988a72768459daad2740c5d907f12
SHA51277401b84b003c8c64c847df8c29693cf054f03f30f25a4d906b5afd05a00d2386acb424a7b6e47a221b655a6b024a3e29a010307198a7ed98e28b5b7c09c9ecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58af0201faf82112957106e5ea719b661
SHA14c372f1a22f7d101b48e6dc289a8b6a45383174a
SHA256c8eeda2dd7bcc446482bd33cc68a160c5392eaa46df261e27c98dfd71a354a29
SHA512c698a467097831b9d52f2176d05f5deafa93bade2ba3eaf90401f96d104d40f85883aabfae7fc8177efb5a8e85e6a48ccf44f06109fb6d8e764ed95b1384eea8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5625a4edfc0c807d7df4df3d55ba64c30
SHA170812f763f35b137b8a45849d2d52a49bb943573
SHA256f02dd4da6a21afaaa9bd553cd114711f3a0fd00635997eafa761daf349c03ed2
SHA512ceae57117314232919ef95910c40f50fbb9957e1e6621c4eac56fbd7c90a3cb8457bed553e3ef44f5d95a37eb905ec570c7168c8a5608a228f6300d3ffffadc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5100706455bf3ee4a46e12681173ad6ed
SHA1e5284513199249dda5fb899290fc08cf34ed7975
SHA25695d8dee6690e35b2b1e7fd7f0af07b01ceb8bcf52bc27758b7d62eb7be962234
SHA5129e2cb33ec2d209ba366b8f83bd1d529ca98a7d9055ba1bfdd69577f9d67cccf06701e1370e27e8dc62f63eef3dda4471947524722db379e4f5f394a49c59b311
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5710bf1927aa8e93a2783e2b9411c8750
SHA104056b2d33921638c614273ec80c5f6bc609a5ed
SHA25690f6e0e41933233ed1b03f9a983b8c39f6dd6509da5848c09cd061651465d903
SHA51226c7eaf7b5486bd2d0a763c6ba821aeb5104aa921ee517412cfca6e8dfda4d38cfe221707c6d6ead2acfb2b73a8420166c5a23da3bda2663b51d913ca9804dd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acae079c2eaa63a03546c77cc1660ae1
SHA13ddc133b39ad9936334c0d9768fef8d7d0ee7cde
SHA2568a328044085bbf5c2a07a86928ba667cab425db809debce916170cd037bfb2ef
SHA512e3b381abc288b9ae8fd6daf123b3bc27929368f0640558237c258de1f95438b7cd109ff9933bcac14acca0277115de60e620b2cb809200607a80736a954137a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae6f4f407c5003d4b174fef42e258977
SHA18443b380ae30ede2b0c100c558ad91d513611325
SHA256c373d9897963d772f2a2a3f548bb75f263fad74240b01e46b02fdb91454cc2c5
SHA512b7663385412e21758cb291001a554583ce7cc72066ffbadffe8bb65e07530fea9a3ffe4724c058483fe36ab3a7eaf45e2518c9d628ee4075cbafe47f46e20b83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cf14021df01fd8bf91e7f08de0c6476
SHA1d238446a942ff620334eb02f56b56a6825d24a9b
SHA256b2aefaed3cf63bcac1ee545529102182b60702c1812ecde3c731c0bf6e3a85f4
SHA5122db51a96ea7b55732d497d3b11002b788e5b0824b82befdf64adc70a2cc6b1b28ee7450d1f6c0585fcfb57ea88303dbeaee279ca2a800c12103a4fb66b20d252
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cfc5f9aaca3a89fbd93227c068f6dbe
SHA1d1d25b910fb82db83f06d223f549a8647de781b9
SHA2568a4e784f912c999e04ec97e61db59c8dfd4bd4f56d0df0cf262d2eddb38d71c7
SHA512aa199457d63a47c77f927d742f6f4f1901f72c09c81080d9b849bd4f272ba8322653754e6199be3a18dd367d7c6654d40a9ccd8577e87a38b76cf5aa8c60b17b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caad31b5af9ad9b1a549a81a12181b3d
SHA1801cf116a73264dbf3959c228fd631180efa6bfc
SHA25685bc980f8b43b558c4c94f6bf6f8a95bca1e27df76470fa996f07d01f9c10fe9
SHA512b72166d6e81e763f5a4a7bcbb31cdf9059f7d9203b92854afdd4448cdadb4f1689ef8956ce3e74533e39aee20ff9a99790407328188072d3a1485632f0c9f596
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504ac5904e575140b17a28fbc3b12a39e
SHA1aa44051afc7f1898cb82050106715a4a593241c4
SHA256526454201f226bbcc74ec83b6a5758002ec3fd09b25a893cf748aa6fc8204b6a
SHA512b8c5df33f20497c06a27285a2b0a7467f4efccd3ed9661988291ac6d112a190c1d94cbe374f3a3a21aa77f4c1546830e3abefff20bb2dff18cb77055fb15d6b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf31fd5c85eecb300b8e624ab479baef
SHA10ad89557311dedd60a438e2c63515569d6865196
SHA256ff935a64c5c8499fe000d247a44d8f73c4b695beea1dd6435ed1be4030d94841
SHA512e96b81a44ca7b0c4566ef65ae6a8ae8c9843d884c37f8adb8a43d05d48d927fa1b010469c060295e3062697025a1c2e7f688d0633b9a5200a9a3ee58eb6794f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589941bc17f408988827414cc3ad7765d
SHA1889fa2b5f775e6fccab823e31bb86340bec77118
SHA25669f043eed5b1fb4f7f162d9026734a42f77507cebab4272274b2a467bba4a3bd
SHA512ce421a5ee0a2691fb42562b94f9858a13da135103dd0c83b9fb278b53c332022ffda2c1ed018b7a64ee1b3facbb9cb5df2035913f3b5a7d932bb1ea90ec2b547
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578f92fa933ef60458685ba58372daa31
SHA10a258144ab2020e60aae9bcf8ac47ef953bb4f10
SHA25685437a5c7b6f5f80c5d157be06ad1f849c6e6e84e873953955f49caf00783111
SHA5127278bfa186e9f34f7077275b0abacd6f26e392a87fe00d45a01bfea7ab5c0fed9c86183ae83404f2d1740a245855844e7370ea8f9c3bd027a3669bd8a7c4d6be
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\56KJ964X\script[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b