Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-10-2024 21:13
Static task
static1
Behavioral task
behavioral1
Sample
2588d4d0ad9431ef082a21e74a2e0fc9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2588d4d0ad9431ef082a21e74a2e0fc9_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2588d4d0ad9431ef082a21e74a2e0fc9_JaffaCakes118.html
-
Size
46KB
-
MD5
2588d4d0ad9431ef082a21e74a2e0fc9
-
SHA1
5ea10741177faf04667e0a990e806f88639ed916
-
SHA256
c92b62cc2e8fc0a71aa7029831fe693c0f599d5df1af097a3c32f5f2afc7b123
-
SHA512
8185d67afefca2842a1840d4a431e1fa8b5e984d0fad0be584cfaaeb9bbba2e4931472e8180f5f9379c158f0d0dd66e494e663300216d4de6c0cc7f0ff4464ef
-
SSDEEP
768:qUc0CdUklZf4w5cRqHpBPMAxnx11ylrUbp0TJ0q9DH:o1D95cRqHpBzxnx2+F0Th9DH
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20557f85f819db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{86961C01-85EB-11EF-9F10-C28ADB222BBA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434605076" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f5420000000002000000000010660000000100002000000063aeef00368a9d742080f1927d9c14afae6e67c02890735f70a54e182d3ff4d6000000000e8000000002000020000000a6d98c104f27ea27c4fbe95e56919c9a824546ad79c2f4f0acd13cb3bac65b032000000068b354205085c642efbaa85610903f800a5761ab17eb6eb6d0a42f6c2a8629ba400000001888917f3975dfa78fb92a33d4cabb05b9b07ca6bc8c546286a338854f0f623bb0354ca5f83001259781a4e1e377b103bcec64e53e20000a4fbb302bf0ecbc66 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2244 iexplore.exe 2244 iexplore.exe 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2244 wrote to memory of 1708 2244 iexplore.exe 28 PID 2244 wrote to memory of 1708 2244 iexplore.exe 28 PID 2244 wrote to memory of 1708 2244 iexplore.exe 28 PID 2244 wrote to memory of 1708 2244 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2588d4d0ad9431ef082a21e74a2e0fc9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2244 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593fa6a71fdf98b1c812d5b4d2e8c9782
SHA15877d3c03f6e5815517bb648eb548899ec5d0c4c
SHA2564f14aa18996abb58eebae2937ef15fc0e8843f239ee018aa3f2a53a218fe39df
SHA5127da48f3541b7fd0d354820139527eb8d51894095020d13655ba41af4cd007580ff94654aeebec65b7dc8b2e45098abf16667470a39e1f3cd03c24a4c49704681
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f1975dad99157f76849c6561ad6ec42
SHA1255049767a4a02dcbc977f7412aabe6df943aca1
SHA256b32253532107d4ab916e7e22017c21e1d919185b9ee4b4d4e535953e8cb5b6be
SHA5126ebc96a56e3141db693450fbb6b5a5eb2a9eac738ae4133829e024b3307cae89786808838a2455b084b5e498ff1c6d71079663e1603b61e876f7fa6fe2e5fdf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1a1d205b1d347a1409bbb3d7425b4ff
SHA12987d05f045bdf8e486dd9b1a6afbf8ff3f237b5
SHA256cf480d1f077d4ecb15c81eba7aed6448158afc809f318ac5fe9c5e88c026efa5
SHA5125d1548ca96a7287c23d340dc391c822fc2772e49206d46f6e5b6e010263200a23a3280ca97bc9fa3ab1e6b6326dd295dec02f033dfec597dc64b35804b754abc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb241ad0953fe7ef53d10d714606201a
SHA1ea5e9fd040b815067455727ebf6fac804084761a
SHA256814d60d87530817fc01636edb7d87edc38804b8ff31073e5859f1b0ce10b42ec
SHA5129787eb18b8a1cdd25c6500b82bc759435b58e9c7fdd5148e5e9528b5d332471d269158e33d721d8e211dac1b3f4c2690fa786e3932702a7ade72bb8d77569c08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dad8228c80d0b31c69a6baf9a70cc907
SHA1cf17b48f96c04bbd71994cd23c5b8d32ba994358
SHA25603c8dc062e94b920e0bbf12808e1d9fdec7e3839ba9aa70669dcdd2902f506a7
SHA512ce8bc1316ac78f6a6a29e0618932c89b1b4924e04b528413d40c1eed0cb2288369353ed0fb56dc6aefe432285eadcf9f408895fd96d3cb99a45b8921f4aa5be7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547ab1f1f3702bda6545393067eac1fef
SHA118dc23d2ead0e7a22b82e057767f9542ba23ab8d
SHA256e7023c2651684325fb76ecfaeb2884bcbaf25a1aedf9ae76a8268c4e827b4e63
SHA512cf5d13d22428dda7ecc1f9f282a83180d999b314847beaae72135a84fb4bac2245dce6bb111c9370c931b1f54dfc38ddc28ab012d4aae461856ac7a8f539485d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa80d9c08e251eb5c261867b2adec25b
SHA18536e09cb290adf96941b39b5154af6a33778737
SHA25622d1a7451973554fb3386b7a91f545c9977921089fe813fe8a4646cffa313b4f
SHA51204ed176ef59bdb319fa1abb6678eb0110ccd3084225f5d412949dbc17e36131021822a4b1708d8f8cb8e92f297d0e709ad341fecfd77b7b59ff8e39ea39da640
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5011aa66190026e65c78690e8473ce849
SHA1cc2aabb3940e580214290261a2fcfe97a512136c
SHA2563538fa29f568b8ef1fa1b089da04335d62fb8b3e9da78daf11d106b54bda76b7
SHA512356291e8774ea78f65867b84c445bc9b3cdd491d56361558cadea4adcce4f5d2f77f4aeef0a71ccc293eb85c82871d9d00e2c621530dc21ba8e2fab9b11b5578
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579daf601bcdcbcffd3da7d4076d2d985
SHA1ab991708fef0b610fbc280d12091d285456c423a
SHA2568bc9d0c81bc4ebd68fda1d5d394646f6ca6f77f8d1d0cc1f808a9f7220b5d8fd
SHA512745c7ac7438fcb4624ec04f24a2a974b9ca455b390fb9eb8e87847d72f83ca6d3b5587263a6ecd43d04133f828c3806dc7bdef5f33a8b8ac6af7a986ed0b79c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5161c40c392767d4573d6c2814067bc05
SHA1afd8d312ff842c2be3d3814aa18b2cfaa42f9769
SHA256c1dc5e4f1cb862a87d20f6db64c5308b8e35f66dd3d8cd55ad4d600ea0b0527b
SHA512a5d5525b6a0a77a434114efe122982d2d8554f741a2651cc9302ceb367c622af63b81b556a8c6d19ff7a3711d89f95e57e8d7e0ce355ac0c4f3ac381f6bc046e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a6d122ff82e3e9507232f903a8b64e5
SHA1aca7a174ed2894a7899b43a2acfdc01f61dc711a
SHA256b8e1b0c99ed1c4307217e60608e8952f1239de4e2816291d90a75e759cacedcb
SHA5129a4623a46ae982524534ce1960012e2a16fe423d39824e0ec255d1953af1c037ef71eefac6e769e2dea5b313512191e612fe10d928ea5d7e3ecb2b241b9c22a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5234a3792b546294fc1afc343dc4a91f9
SHA1a1a56d53ef49cd889222ed4e3ab19c2b4e0e74c2
SHA256fab413211c8ab8123f728446200f61789e95a1e0e8d298b1814dd89c80db3161
SHA512d9638e901b2f9f94d386d7e52a2cc69f0a39731965955161b7bf23e4ec0177ec5e0a481efa6e64f96999e4eafb2c95baf3637ef1bd9daa7a45e9b94d28ac8e82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d3c7de406a8e3878296ee30c31edb7d
SHA14f84464d4c8b944ea36f5617aa2e0d0092094d0b
SHA256876b354c1012fc6e09a232a7f7cf1fe96c8404ce58e16e16aeedaefa99bbd678
SHA512080ba415eb6349ed650e8c6b3d677ae2ea2f0125b63d0c6d1611ad3d0e7aa299e7089bcd4022e37c7e3bb471dc8e2a502048fd95601f67b11971e28ac036f29b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cf0a2d0052b9d533d09739ea3273cb7
SHA108f54d3f83f5d40013d2aee6c088cb7e40c1853d
SHA25600c44ca74978215be7d2ed3310d6d5ed2435801c2ca9f9893bc289a987272ad5
SHA512db96e80539ae127fcd37b9a23d82f03fbf537969886770994a1664b2b6f7440bcda700ad210e2d79b6235e6b163ba78329abfec18629c53a3abb05818df198f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6c02b1ec76073b5de6004e79f8258c3
SHA1e56ccbfb4634a963b47314c59a2729113df24234
SHA256f2cbe89900afa0ead0a79701f3e601983380696928c2c8280773bcb6ac08ade3
SHA5128d9896cdde2a01d7b411d870ebb74f26f2ce6a6dfc2b5a660932c3212010f0b61e9f0bc38e0c92e20a30acb9bbf4c489dbfbce7b0de76783f218614aa5fb478a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e8eb2a974c788a0661a4f55bbfc6fb2
SHA1b009c387d8c4013b5ec04b5601e02b9d91ca3a73
SHA25650d74d3c53e93b729b91039951b3cc4ad13826b13d108a7c4956f93ebf7c3c91
SHA512acb425dcf8fd5e30dafd67f327806256efad4c08d6fecefce52a6073f927874497f9340199abe775888c5e520ea01b12e4a0d76f1cd39bad7aff1a6f9b2189ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5467b1a7503d70e5209169509b1726a90
SHA105bc9ce102f5d3f17a96524c9db9404fb69a2346
SHA2562ce02d5143806167a3fa4b43590c76268ee0a3277347e08dd6f26b2335cf7e00
SHA512e1c61282c9fb56fdc75e634a56f63525a7b3525e825ab92350e23afff4e964571b38f82ca0056dab531a795862a345f8573aef7a4a4fac26948ed3531ecdd600
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bcaa969441f5871a03c39611f80a618
SHA1ddd3c84aaf2a9b5883d52a512f0e1d326fa83bab
SHA256341229155ecef17e9ba04318b0f832ee594a3e140c0e4376600a31adb16f6cb2
SHA512be22b4ebd441907c5f2de55a92e63e2835dfc2065dc795744fd32c8252e94d31ec361051c10695b68b625be6b9415cc5afa0b2021ce6acf177f29bd844f20ab4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f13b6938fba304ea50751e86382e37bd
SHA1db548049dca7551f6404c50dc62c0ae26503176f
SHA25601c13321a42826929e7d80768b93166efc8a932cf673bee32e5db28ad400f532
SHA512160d23c521c64e728b9ebcfc9ebae397dc18ade33ac3f99d424072e130425d507f44393ab51ab0479d04acded02216f53900c55309626fce7cacb1b5cb65e18c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b