Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 00:24
Static task
static1
Behavioral task
behavioral1
Sample
27aa6813794704a31e5ca7ad45bfea91_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
27aa6813794704a31e5ca7ad45bfea91_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
27aa6813794704a31e5ca7ad45bfea91_JaffaCakes118.html
-
Size
17KB
-
MD5
27aa6813794704a31e5ca7ad45bfea91
-
SHA1
6cecea1f309ee13353fb5a3663a9edfaaaa2e098
-
SHA256
65c39fb2fdf5d9002ac51d767b5df3e0472ac63fdb7f0f5f1daca916db0d61c2
-
SHA512
ab93f161c131adb64afa8cbffed28f60f3fdc077aa66866167e8e47ef9ef79b44a18e32e9343c0796a533eb4d9c7fb9d33f0972bb185ef9d0e947cb31718e07d
-
SSDEEP
384:va362WNR9CpTv+DYYEpVmOBHuKoqElZvNw8lilZcg/LO5P9WfEfUqFpxCIYs:S362VmsOKo7lZvNw8kDPTO5P9WfchXYs
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 402ec1741e1adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434621436" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000059bdd50456729132969cc492272fdfcfe372fbd7de4345f2686f01b311a516ef000000000e8000000002000020000000bb7e0d6b5d2bcbfd1a65d0701ef3aea784e21d4f4be45c91772c1ed76899137b20000000043fa2a54b2417938a3e2323f09cb83e95a1ece314b43ac86c67dc6eb74f73db400000002102b97035246b242cd11fed4e96e9d2392f28a70f7663329baeccbbac89e71780e0bd90be2a0d7e0dfef2d49cfb699b05d984a71b936b00ce61b3ddf2e3074a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9D45DC31-8611-11EF-B0B3-6E295C7D81A3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3024 iexplore.exe 3024 iexplore.exe 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2672 3024 iexplore.exe 31 PID 3024 wrote to memory of 2672 3024 iexplore.exe 31 PID 3024 wrote to memory of 2672 3024 iexplore.exe 31 PID 3024 wrote to memory of 2672 3024 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\27aa6813794704a31e5ca7ad45bfea91_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5996e1ddbc4ab48ae01b0ba05e600c4a4
SHA1c1d3b015f670539d9de3ae397502f2a7a49996ed
SHA25656699fd275f166fef0d89e99d05b3a73796b18bb1f77c3e232bb2728151bd6b9
SHA512b4a962c2f2e99494cb84c0519af0a9e00cfd88f1be59f3255b1e4a53c760ad4eb333281bc692e3cb03da138e52b871850d64910b1ab35689c308c9b3b97c9028
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53053e7eb14ac150eb58ca1b1131911f6
SHA1a41d5bec142a3ec9881f008b68e6f5b0d38c2dd9
SHA25699be0012a83bed658a8a0ce99873157090c4646c2a1029d553249790411241b8
SHA512a1a097f6172554c549c5b76c40359f99c9ad4a858cfe872721124780c2e26405bc861dba88cdc05a3cd04779ac3c3b2242e238a27744df51bc734a6f59e3b9fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc4254def69291c2e03b26a454d89d58
SHA13457f45e05ca8734064592f5e72240a737678a50
SHA256839802184d9e3e31026ce593f78e1bac7255cde5d2e25a1415fd21ca559f2b6a
SHA512f0f5e94dc717c3594145c9e981f18d518501448eba235722612096c31ee7bb9ccb11a9953edd4af477766a7f15f82260a38abd17a739e05f749956829dfcbf03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59459e9bf93598e2a94aaa2e20f943e22
SHA18c6279c54535a89ae31e9d7d858a6e190c4a8be6
SHA2561e9f84da2ba6bb687df11de72cafec51dacff11615152d1a08c54835fdc3029e
SHA512f23f6ba737b102f669a80cafe538b7a94239033ba56183e4731b76881746ba830ba6cb12c0a1ff066161b7bb7cf792ef28056643482c61f6fd9edc7ba881ac0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57028c034fbe1a444fc20cd3c4eebd57c
SHA17b39ec157f0773e1b66860d4b62d0aaf3c0cd55a
SHA2564a4c26cd1b250b33322730995a5584cc8081a41793576f3e176ead0283f0514a
SHA5120f122c49ef8ee7634041bb97df8d32a147a0b7d1a95d7527662282e9736e58806d0f4e09ba333128cc8e8ec335b84423cbe61990d51c284b7e7aad8051126fad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523b6961d346953d635298ec70b8e85cd
SHA18ab17273a688ce594b629f2560e4bfd77c6366c3
SHA2567cf2c1137f404b8bfd0b048ceb8a79880f07350b6ae3584f2581134e193bf995
SHA512097db15416568d45d75f3bdd2ece1fe3a63f08a1923eb1ba4b20a94b1c3239b9a21de45cc8856c63759a3d31b4801b1951309e683f5120c8bdb0ab4fd67ba3fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f69c84152efff839e586f5ca7e3dbbe8
SHA190351acfc407606b850c3da5b85bed77fb2cef36
SHA256d8b50244a221dc798876536bbf975a6b97e0f4dfb6995104c92ecd2b47a4cf8c
SHA512768a6d02b9ca14ba7fcd39cfe9941e8d15d1f6f8fb9a5e20687c8b92c15484ecd855d2c9d0521fbb60637c8e019b1378f7e23e590468378cdbe4f10eeb2e5447
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5310a0868ef25d9ac924548af2f3d3d85
SHA12f6f7aa1d1afdde6f0b5938ad0f2494ce523512f
SHA2561c1946282b3b490bcf4e13360a463b7876ae0e043b62bf48ed630bcfa5e8df21
SHA512b79901b6075951599ef4574400ac1eb75b0d06465c2d7306dc6f5b56b3a1f3f8e3bd7688670f051ab1d58fb7b814c5a9af345f65bb6d8704356c12538604491e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b3ebe5e3144ddf1e2e4158cafc0c298
SHA114f510ad534b4537fff39b956718756e3ea0506b
SHA256861af0cdadb8b3656cd2bff968acbc18da509173cd775d59d81e3ce571d4dc4c
SHA5127dd670e5ddd38f6b99b4e19c69badab52350b6b5c5fe08494aacc41752a2752753ca0fbe1b735d9006e36f74a693f86b054b5469a0f13a77fa0946e4d0e97149
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e8ddd9e0325f34885b491cdb139f2f2
SHA198612bf182048970f54158e49e6669100b55c1e1
SHA2569875761aebfc8e3fb531ffda00ee93aed4c92c313c1fcd1a7ee8c3586c1a3927
SHA512df2acc888adb6fa017bb62885e31a7dd2974479c1f9b96d75e863c1bb28ad1b16e7ce3aad19fde6f4f28e25132414491612e7953377d7ba4fce3af125eeac969
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acf2428b1ebdd4b0907ba83490397404
SHA14d7d319f6de1763f4aebe9bd550174e4c5c90484
SHA256dd0f08082a53b49221cb1cabd55f06da557effe18afd9cbe6ab998c780239d37
SHA5120516b2d8e3bf3be855e67a2b6768db025cedfb779acc3890631e568d84daa9e9ceb3afc19d0dfbebc4679095edbe9707037bd4c7b19f93293fda4600f6b9340f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515dbe442303bce342985267e4e00977d
SHA1ded1fcbae707eeffbdb49bd9a7087926586c4311
SHA2568b320ef61a1fc554e4f38d13f79cd78b3ba375917a3d68f538b3b35dc9513a5b
SHA5127e6b495e80914390a33d8510bc841af9da0b2cf201c19d87933b59e0e723d8a93034540041501753cb45c80aedcba45705381354bfa0fcb7c1416c1cfe022caf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3563b04d426f32bd70367e0158ccfc7
SHA1f8408e8b47ea61276f2b46fbd5e6d3f1cc98c2c3
SHA256df43249474a626b0d02787b24f05238971895d23eaca00588f88394d18e549b7
SHA512a228f3078a18cb209f214ab14d4f4816da22ad3a1eb8125d5de7a757f6719a89053a9c52e078e33b9eb2f93cc8d2cc5ecef7d90aecf05d279d2bd35dedec85c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcebf98ad0343f81f2a95cc2048012db
SHA19fcffc6c7a3b294dddafbf064615c000096c77fd
SHA256277c99cc0bc440831c65799e660a204eee3cd4f1faba44c4150409baa0da25a5
SHA51250b1a20f929571f84e083897d8c6c33e0a60f93b5bfceda3f1f3df97d3d725c73c4900b257a37c2ce292b619ef18239c983691db29c9c3d19b55aebe3a978df8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be851b4123fdd2090cdd9ccd8163381b
SHA1c065eec0808fe1b3b68da72ef86ac8c12b233df9
SHA256b7d0f7ccb92cfe73d008807340f4127c638c7891ad133bb3411110acd133eec0
SHA512633f30e43b2ab78c142f4a65aaa04f953e55dbc43122b4ec4fdc7dbaa8991db018e34956fae7f88136c8a121067555d9f2d08ff967e7f64c4ceef2deb03ed419
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd351cfe6fe9ffbf810b57035c51828d
SHA14b840748e1954b5df422177ea9f7944fff1339c3
SHA25656879f7c93af90510ef5b74c55786300815fab43f1fbfbf610e0ae2030880c5e
SHA51202fb05826c146c2fb6b0141f3c06c093fb05bf10d6c8786a159a1d0aa8f2342fd34d807247fc68e17e6d7406a450d602a3d0cf948906e10d88b3944a9920c19f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1d9a0ee6c0565b943de2f3651f9cb4e
SHA172f01389b9acc7208553545fffe99e2eca93e5da
SHA2564e4a5fd844d796d716968c8966f2d336e6d1c081de25bd912a057e4d1feedd57
SHA512952bc09d19e1e967a516b539f748bcf690c25513fb56d462eb89f573052025f964ce49c0e4f162e74edc4ff9ecf77982c4092ec6b3a03e368a242b08245dbf5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b93cfc7dd6acbc0530257b0def197668
SHA1783f183c2f8a64c726d1e1a349dceda11ce4c3ee
SHA256dc7a5e37918cc61b61668dfe08e78d9c94f27fe6a4f768b19681b3ebdbcc4f9a
SHA512d643fee9ac923adfb31acf86de20d526b0af07a4b69d864f9d9717292809e38c9529e844dc1642d16ad03340a71dac86ef31060ee0035a8deda378aa005d1534
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b