Analysis
-
max time kernel
117s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/10/2024, 21:10
Static task
static1
Behavioral task
behavioral1
Sample
25811c62d64966d38f843aef6488a9e1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
25811c62d64966d38f843aef6488a9e1_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
25811c62d64966d38f843aef6488a9e1_JaffaCakes118.html
-
Size
9KB
-
MD5
25811c62d64966d38f843aef6488a9e1
-
SHA1
189674613219bc877a2ef5f59be81a0835e88695
-
SHA256
9bdaf86fde7da04a9fc3bc689ec9c236319d292002723395f395f7117e1a13f0
-
SHA512
260e5c3c118be93ebbfa2b22c3b55a484b4eea6607d89068da120aa5c07a984b3895c14e7f9469f700b1b571cb8d0c5e3da8875a2a8e4059b9104d379b81da1e
-
SSDEEP
96:uzVs+ux7/HLLY1k9o84d12ef7CSTUkGT/kPs3pUlVHcEZ7ru7f:csz7/HAYS/NuUPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000fee51659b67ef02868750f1811c834d208d476c7318c7508d4d25cb6c4521bf6000000000e80000000020000200000005a9bd24275b863e2e527341e608cda15f3c10a1a5b90c386550e39ecdd3e1f47900000009dc9fd6ba68668b7f0369fd993be79a103d91bbe0093fc8c3507f49bbe4b22f0a5cfe380fa2ce1e1c00a0427f19a6e83839d027e586fae56168a8d13ea2d2343b7d0d0c4f58d9575a8bcb828b46fe9266fe8f55aa57efb4710d1179f63e33a76b0debf74a319d01f5444b89065783b32b9a0bb1a323faf09442d58125427f62d5c2dff68aa252b725851e621e285d93b40000000516ffef5bb75a044532fd63cce828de9aba036f565187ed5a9bb992651b0e0f5d196246df07744d1e6426efef819b11c8e01cf487dbc85cb2a34db6e4cbf15be iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434604954" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3D43B171-85EB-11EF-A7A5-465533733A50} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40dec513f819db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000a1a0a1db6c95c1988a93c89ba2890dcdadb992de46481bf1038de8b6a980a12d000000000e8000000002000020000000165a3310349adc1ca1c5f3dc26366ac9ad1d8c705c4eb00ee9519792a102cf312000000080c5324012914f840ef5a4e8caca8d83e2a9837c16d3cdcf861c7e76d54de195400000004dc81f8e362fb4ef4cf13d9d2f5fce07acd32d99a85502802724fff8f94ccf49172c1efa80445e1bbef5a9b752b56d461d69479e67ec2b6b4f66b627fc0f8a2c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2148 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2148 iexplore.exe 2148 iexplore.exe 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2520 2148 iexplore.exe 30 PID 2148 wrote to memory of 2520 2148 iexplore.exe 30 PID 2148 wrote to memory of 2520 2148 iexplore.exe 30 PID 2148 wrote to memory of 2520 2148 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\25811c62d64966d38f843aef6488a9e1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2148 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5199de36d9b317e6d4a47558821264746
SHA1e4fd89e73913250a61d0fef8765b20d77208957e
SHA256756b6c71d219d71c9e0f29fc181bd60d6d650aab085c7b894488f289571763c4
SHA512e162093bf748f43531303c435150e1eff519388be40c673b22e3f50bc11180766928f8d5801e0d7693bf8d77f83da5c80ce01797f2db587414a3e1d0e0d393d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9f5c297d86cf60c4fa306dde5f287dd
SHA1bf6dd8d2e29c7832cb0f3d8bf8f815019cfc388e
SHA2563cf2b93d755c3f5970c968ff11785a51f3de3a89d3bd90e671644178ec622b93
SHA512dc72d59fd0ff93a6788a5ea2781847515b95bfea92fc91f5286641e1f61aa6f0020db60b2483133076912aa7c321f2916856468230eea78e22009a9e4c4e3d42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55579185c299175fbabd6b3122ff1cfb2
SHA1c18e2c98c95b0ebc1d015ee335a19d048e7ca33d
SHA256a8e36a6777c85e13da0785b5c5a4d44dc0988776cf96426ae56cfb9f86148638
SHA51249eed6ebd89cd1ae79fda116c89949525e2b99db2f702d0ddd9ca97a5a7314fbf60c8bb1bc4393211446671dce0c2b15bd822414aec36b994703c144a85296a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c5a0cd72838dd0f752d43e9ba2cf64c
SHA12adfac9e42382e3be96004f592f063e35be658a9
SHA256d257012395b6a99be9377615ab46b73f6d9b0ca58650b2add7b9d8dbcec8fe93
SHA5129f40dc4357a7bf7e4826dcaf31fb4645fbfd31eeb687ffe3f67449da6a5fccb11088775e50d1061e165d41761360c22671641369b22c4b5c513a367cf59ee6f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5966f62575cbdc0ef616ee146fe227960
SHA16190a18a46a44aad8d74d877c8740b7ba1b26ea1
SHA256fe8fde3af91580e3679f609a573d0ad9c8f9fe8dcd9af8de51066573f02d2111
SHA51258b8c441686f0200a9b9365f529e57d9034aeff41a9a9a91b3624b2d665e65f955af0835aadb6853ef4106fe2ca02fd28b61104a8a0e58e0e7b16b513fa45c52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9f7373bf342d10d56a29eb2733f1c59
SHA11f4c4f82a2115bbd073386114ba6f912878e8d00
SHA2561ee07e845a8b178716ed1e5c14b7f2c5cbd35265292db01cdb4cc4ac6b21c629
SHA5123d835fa3a9e16e7dc8bd5a48bfb3e6a6d960f08454c98d9b6aacf12960aa17be9e1fef5a168c6f43a3d5d9ef468ad4acaf6c5908fb0574d2674273f03f213df5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec9d20f35433c827653bb11b082e2487
SHA126b8ee6290a8a1db15aa54012751654f4d759a35
SHA25618bf512a3733ed113a776cf5d52b5e5e1d6b0d68bf453b3cc2876997f0957c86
SHA5122841361ceedf24e1e8becefc79172fd99b6c709ac75f94b5379e83453658c582bd2913629aa15e0a2a194ae57dbde35a6ebb86d66e162e749fa8f933f2c09172
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a5ce6fe9391aa0384b4ec38bca9c8d2
SHA12c2a4f868c4e0a8b7b5a3e7bd66c79b32cd225da
SHA2567865e686ed046fa828b552af8afabed93cef5cf1c9d1cb8edf797a2f73f097c9
SHA5126b64c0215868148be33214832fcf35ad0a9923777d7c8d3a654379b14e6ccd751a5b0e53e68776adc6a1996400541ec2dc670434d2426cf6290840594ef6232b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1a889f9a0b756a5b584dce140489260
SHA192ae1e4a8eaf87e5c8e181ef76de430172b114ed
SHA25668292f9f74fb6b4ef321075de43e80d9e959e5ea5c0c7037cb7b34dc4c4fdebc
SHA512086d9a70b178353567b78a146bf161c91eae2333e83b8443dfa38c3e87f322aa1c27a6db0214addcd03ef42568ad812354b88da2d453d717d2a5e379d0b417a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e4d7d92b0b8f8587fea8c0bba778fc3
SHA1e3c3c05fc58c9d1792deccc44d70b0cc5d5721dd
SHA2563ed08b9840d0a485f81d1858d0f06456f7ad20fd7e4298c3e30fea555ed6ca40
SHA5120f1231cfb70d20e3cedaae9b7d347036cd6887dcb5706ee59e539e76ce7bd8ca4a02572cd475a563ae57c03348eb3ff6a37c3dea7e0b37c4ad6389b7f58bce6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9993598d96329f7e90d8812352ad119
SHA19ad0b09eb48cfacec303bdcce8d3d1aae2b01eb3
SHA256cf35a4dba2768383105550e844c60cfa06240c665f56c87a4125351d130169cf
SHA51290f2c5689dcb6d40e9ad0605c63a4a34b914df8522bdc8182d4a3311b593cf240ba2b5e9f564c96efae1c0868b4c3ed60b078311f70a96b0b46b0a7b8c0113bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569624958cde2949b831e39019d26ca5a
SHA164a3e3023a13f46c7915baeb8b6091c5e0eb6e26
SHA256179ab9f4c29dd6c8cf977344cd1c775f0bd746baa8b2067dda37c7b3ea85545c
SHA512eb7e9e0acb2f048dfec8494e85f3c6dbf66dc6daa3b3c0657f2f439d752aba53d22c061be21acd6b6204d708207304e982891a661f25eee60f49d5ac4795ce1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fd5502d1b90ecfcf56cc64c5c9c6dc1
SHA1753058ee71df04748716966bcfeba72897bab785
SHA2569772d5d61f73cdfdd8f623ed4e0d919b1a884ee81df36227927cbfb55a7aab2b
SHA51249451dd0d4eaf55f79b4621081f30a8dde4e22c8a64a7e7362c23f0cffa6870100ad47c4574ded8c1e955cc2d914b75f83e0581468c05a6298f21402545ac565
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5135339131fb2d91ed50d2eec17a31b5c
SHA13155c027529ff7e05f809fa470b29acbb501dccd
SHA25608ed996446b40c8d32e43d400bd9b7e0acc5125ea572ab696b923596c9f86731
SHA512906bdb18ee90ed7c049dfc203415b49464ca2f58f86addfe86bafaac5785524cf22285556ab71901a8743fed48957c45bc228c5353b6a0003c47e90b54143c24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c90abb6f2d7617acc00669bd5447e234
SHA16c31277e8bbb5349f24b3db8b4141affb9fa0a05
SHA25618eab8744dc6f94a290fd15794b172fcc4021163719fd6fa650a5044a9a4a391
SHA512fc0a0aad0f7c3ec1bab71145eae4bee178de848358ed2865ff7657bd0e913ef68544dde70f7fad311086e808710f65f6682ba22a0c178b51813827b221e6478f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573c957dae110ce31cf93f98bcfc495b5
SHA1bd6a5982d138f2068de4c003add9ecd6e3cae290
SHA25637179c3cb88af59de71ad80da550c3fa5feed73a96c49358c4cf0f9ce5b9a54a
SHA5121029b26d6a0c205c4c38a26acbb400c24219b6ce53b8eba015cf2d52cf51016860f8879e2de73f7166a7f92dc6b54d400ae5088637073dec6863e9446628de88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b9bf4188649560f62ca8a1d8cecd340
SHA16576ac95ebd5fbd67ab806c8251d9b13e8c58733
SHA2567f7ef1cae868ae715452d8625fb8dc9d05ca4f86292836ef2a668a578a8d4b4d
SHA51221ca55dbf41386888035181c04452c9bc3c93d6e7a0818d5278a4bfff0bb42beb9427c123851fddb17fa4191f488203232b63f3a2cda9405fe32b098afd7c460
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52446dc456539e622cb3d3f89589c2929
SHA1a8c79feb47e91cfa330117ac88c2ccb4b6f77f71
SHA2569edd60a507d0a0a32d6946d8de6a35ff31d938412e2bc80ce63b65c83cd19c02
SHA5122f2115996dbf83bd301b1636e9b8da48db76e3cbcb43a2fd69b6143c2d8896cdb974f9314caf18ecc4905c589957eaf917e65240b810ee46f3dfb7187070f203
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b