Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 00:22
Static task
static1
Behavioral task
behavioral1
Sample
27a399e8bf89bebc07ce9e542005ae04_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
27a399e8bf89bebc07ce9e542005ae04_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
27a399e8bf89bebc07ce9e542005ae04_JaffaCakes118.html
-
Size
11KB
-
MD5
27a399e8bf89bebc07ce9e542005ae04
-
SHA1
071354af03573d99ea3974d1a932eb878e5bf2f6
-
SHA256
f24a6d631f20a3daba283ccb701bad35b496d797dffaacc934e3f8f1258aebe1
-
SHA512
91c33bc3c7a241b5c650edc35a42ab824613688baa217b4dcd422fdb26aa2dbee050fe2e87913fcab4753db6d2515fff533ab18ff4e3a945907735431813b6f4
-
SSDEEP
192:bYNUaqzJQwdZYLyDOUzY0LEEM+uH9KF7+9TGvssQWn8Xj6XAdBSiqdcW:uUaqNQwzqUlfoia9S/QWn8Xj6XAfSi8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10dd8bea1d1adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000688120948d293c4bb91d39385d58ec4800000000020000000000106600000001000020000000184ab76c2b65f9e4f991478b0e4918525cd0c0621a0fc45deb71d7106f66fccb000000000e8000000002000020000000f1bed4e6a93c95976810241c8826d2959c1bd8af91616e0bbdab92591d97241a9000000010d39804bf1b0f7d287083b7804f2ff11cc7f9acfe9566a81999f984e641d000335ba19b7cae3079a62406acc2139a0c1d4d05fdd014a8ddd0fb0c528778d24271b0addb93f0e789e7f3a6f25ee21033c9e59b7801b8f69d1cdd30840cce23e0e970fbb0d6f4cf91cac1315264341cace6686cd212945daa1ec3fcda261e086358bfbd1408af8d64261acf9a3807043d40000000c67ce30b1adb0ea08d03f04ef20fa64b7c5ea4676fdc3e981cf2cd24ef997bbf0c93755aaca29b7c14601014c59552568371511b31e3b1c65972b6c690ebda2d iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000688120948d293c4bb91d39385d58ec48000000000200000000001066000000010000200000006c8e64666e880b09cc5815bebddac3a8b690958e76701954fe3a4d25b6efd546000000000e8000000002000020000000ac1cb0321c1f8635e2bb2f2ef78f807196cba7199d8d747a323f3f3ef47226ca200000000c9659d839af7367afc8395b2b20009697c137ffbd6b29407cebee00615064f0400000009e34355e13cfabd1980277c3c906e0462826087529fa91ec046b51944fd0a127cce91006ab8535e0e180876ae74dce309c1a6634a387ac785443f0ea58d1278d iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434621218" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0D080C61-8611-11EF-9D58-7EBFE1D0DDB4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1244 iexplore.exe 1244 iexplore.exe 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1244 wrote to memory of 2148 1244 iexplore.exe 30 PID 1244 wrote to memory of 2148 1244 iexplore.exe 30 PID 1244 wrote to memory of 2148 1244 iexplore.exe 30 PID 1244 wrote to memory of 2148 1244 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\27a399e8bf89bebc07ce9e542005ae04_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1244 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD590d396c8f2da3a5e9048b51f6cf5d7aa
SHA1b05656e59854aa8d0d9e1d6bc010cfa38efa925a
SHA256266704a2b03a78a09f3bb194b60af2fde5d2804a3ca82695d42f54af351ff17e
SHA51268a418eb03b4839eb255d16ce27ec58f015ea7dbb8e69a59708591f007c773162d7107e6ddd022e6d8980947712b067b6bb4b7843b119f6e468ef660ae621747
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f0e6d349cf07f1e985363cd4624d420
SHA1d4d268b54c8dfb00d396d02b651be00bc06c759c
SHA2562d324f7917b9dea5c542da18dec6112408134208eb19e402d0f888cf1a16988a
SHA5121fe06873a3125801b263ff23845c23de8b00bc5f83fd1d134f5872012fa7052644156f5e6ed2c7d41881d637808f22c3c32be36d89a070c4ff43ce32c3dad1bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a3badc638eaab0b8f61f514a287d749
SHA1fe74fae86a1b4689e139c19667af9187cd3092ab
SHA25647daa0693ce29455573ec0873d67812b01a5e44bf8c3f84a47edc78623f26f75
SHA5126c2a563efeb5c37d0bca3f70677824170780eb30f91a11c124ce4df3e6b65bce90d7bd7c663aa5e8c0ca2571d7dddb82cacb2e743dab16fd3c0ad8a38246c151
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5301fe94685ec8cc6ed0c34ac1f6024db
SHA10f95b3af1f4e12c3ed696974331a47cbbbc15b15
SHA2562fc9d3ad15e770baa719c370fdc6f3ba024dbc0610f0a31447e3c31ae737f4f5
SHA512c8bdff9870defe0db1e3abd66d04900d72fa394a47b4b2bc2c4ceeb5ec35797766518dd70fbc13a489c6cc9cab251950a2c472a6146f2e46e36e2df5ef48ed65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dca840758d316cfb8003618fa7603ff0
SHA1194da43ad21a770a504ff5d9e9562317740138c4
SHA25600688b154957e45979295ef85afed393e8f1b613eae979c816433835cf39102f
SHA512506c4b75a3b532c522685dfbda24d46f9a98357269cd5eca4a3ac2df556b2def4fe40339bf6d459734f5ad09a57ffba874e2744eb929065f75c14154c94d9d15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2bda27b4b1af6f2e16f950c1e87dca1
SHA1dbc1cfd8dcf75c96977fe9d47d59afa67a0a913a
SHA2564e897bd39aa9d6410800ad893e4fc1120b2077882e2ee24d5971f9cf71612219
SHA51272651336752c6e5deadcbbc80b543b1cb01818e0fb189596b6e8b922647d636923b609b9100cd90142d348429be54bd23168afd2068a224bb6106d800f47acd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f68ac6c3c34c4ab8ff1faad111973df5
SHA1ee70dd8542212433ee29a28444cb13cc57620a40
SHA2560f49d90349271594a9d687735b1193262001255dc68422419fb47abdc40dce51
SHA512a96d4323c19e5720f11852ce694249a332d4379b80b3e6d9aed526ae7da1f8377053d67fd01701989a2e0bea7da309f6eceafa2dbfdf73001db8706f6273b735
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c98cb0a89fd965da1327326d1e1f25e
SHA19d801e997ec89e4ecb21b097c4d95cf322e56643
SHA25629c3dec103b96169592349f2f730d3248af2911f2993eceda04d39c616b63639
SHA5127f3ff1c7d1c515d9656b691622674216a63a14d36735aac9ed78369214f0e99a29edb799fd36cf66bf9ef0e659222642efadb36f01a2fa317b2b71d0e55b7cb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c31e376b2804fc433e6c4371af602556
SHA1fb9f3ce8ceb040d2231f04027b434d0978e0498b
SHA256409d9e174089ef4c1d0c1954f477abf156d6e98ed239efa9e51a6f93985d8838
SHA5120145a0236cc78fc214111b112e5da584377fc7995b0c816d602d73aff3a95bf253182f12a344750078184c762c3cf218bb8ecca24f108df6194c05d4efd8239f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58831e717db35101b70f6555d0f7b5519
SHA16f4e55e30e867a0856b367ff7c6efa8773cb88d4
SHA256073b71575d568acc446e89c715accc622e87d168802f18e772ae28d7bee0fd4f
SHA512323027690eb755b7639d3f3a213e25be3f7bc007ea4aae0e983f2c2ebdab321521ee2a5579cc96a346af7c87bc2dc262fcdd81ab62159e0efe1b3f072e885e35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bff0005a4268f882c81d26d9f560bac5
SHA1665ec17f44dd63c88e6e8b607f715cc6478deaba
SHA256fb55f857226fc95589d58e78aaf166ce87dc1b243a8085e6dbcad3bd76af2fa8
SHA5126dca76dd33f402d6c50e8572e4a86c986d488d9014249c632ee751b327c66ebb2b6e06d81f8b686963b267ac58096018d511692028ae243b026db2e653876b41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ab202bcc750989923b22e49e1224200
SHA1b5b5df7a3adbaa032db98bf67ab54f81e486d1d4
SHA256597a2fd272445effb0632a6a5e60ff0603f894d12d81477c326c3805b4414b82
SHA51275e7e2a74be61445dac4f397f3a07eb7ba7ee3ef12bdcf1ae2d5754463f1b9c76f59bf63cb76a8557d510595827c60748949a5af13d5af3b92357064c1127245
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f87bbbac73cfe728fe933f931749717
SHA10f371787ab6b529f6aa763f45132abf6ca4a2625
SHA256e42230586e5e60e03628b795558328281b179e5f5ea92644b72505d1d4ac63c8
SHA51290b1de98bcbc3f653b718ac042a0ead741fef27b22ff7b86d3149f7488feb7a6a7339fefb57b66432aed61300b3dd8db4d3e904ef86fca7606f8e7ae246389c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faa29f3137a24643acc89d213dc3c86f
SHA1fd0ddedac9f863442269a8906ab02a3ae3e300e0
SHA25607e5cd6e7aab5510f43d780443c7c3dc357962ae1481f20e246741c1251472f5
SHA5125584b3e52f2cd418bbf1defa6bcfcff52047d1c829049de001916032b1585a07571087028efc476d4ba0e4d7b02d93967407e203f91969b3e6f67ffca387a756
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b40e524746566c50ffaac9aea289d06
SHA1ded0b6304ea51c53eca51e60c9ba1b21fee2a7b5
SHA2562aa2b8783d4ed8b7d882119e5c7cdaa07f3facc74a2310b7b5963815a474330e
SHA5121fb9f35ca127f722e38e8aa35e8256226a1dc42c0a9db429c03363122447d3260dd4b7f5f1d91abc14d138381202779144461cead81b04a2b3b5b66ffbef5075
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f9a927d9e966b60e3f61bf7f6de9198
SHA16d2d97b43359430d87caa788c9cbf8730149be19
SHA256560546a22103be0021cc7e889851950a0b871fdf1c8120ebbfe9ef1901a13f77
SHA512ce0fd1f0ff3573b95a57828247ca2c871f3eb86557df2bea7330ca8cb8c9a5aaaa04ec061b466027a7a62189c9bb297c13c563b41908298e2f800bcd3fd10898
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5236266c946ff3ebfa23fb980231cedb6
SHA18798944b418cbada5c2c8af267dc9cd51b6af99e
SHA2566e4d7d4bbaa181f99cdec27519dd80bedb53cafef202ed6c9168c2774ab9b92f
SHA512aa6ac01226991b691d05b433d26d44c531286273e76682b25029375429fb88da7d670377ddc61f50d41f8a41decc120022422752c6aafb8bdab505687e402991
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b