Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 01:51
Static task
static1
Behavioral task
behavioral1
Sample
28b926dfdd7bdc24332e70a7bbc116c3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
28b926dfdd7bdc24332e70a7bbc116c3_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
28b926dfdd7bdc24332e70a7bbc116c3_JaffaCakes118.html
-
Size
7KB
-
MD5
28b926dfdd7bdc24332e70a7bbc116c3
-
SHA1
ec8f2c4eb2fccf0b29fa71c9138be12e80ca0e6d
-
SHA256
8ae86b442d0e5bc6cb3f0bd65181e65d8c59238d87af0fd36787ca1502e16d2d
-
SHA512
1890a5a0761aa9b2f509901b4bc091cebf34ebd31ab872c16e4e01907ff06a1cda5e2428b06a999de3473677fc1b3d37ba6ffe561e658ccc393ec1400babe056
-
SSDEEP
192:BMbqJGnz53UqCltGI+nf5EUak7+XEKUhD/yX:wqolAra0hUdaX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A04A78B1-861F-11EF-9A8E-4A174794FC88} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20f2a7772c1adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000007ed0930d8fb50d534bec09c5f48d1b8635c4663f37aef62554ecc095f9d94356000000000e8000000002000020000000aa67fdce0419eaf622b0034479fa6ea3c526430a6cb9c9f71dc8c8ddb1efab68200000000aa4c224b5c304e010e7722e33bd359526854a029dfbe2ecad02bc1b822155bd40000000a22dc4a3a9b573dd0555a66b812dd6b2c8aa64536a50177b0152e036d54994da703c8d75481d21ade3b1bf33ec261c84205ea6102aa6b64ea424a421416cddb6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434627454" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2932 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2932 iexplore.exe 2932 iexplore.exe 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2708 2932 iexplore.exe 30 PID 2932 wrote to memory of 2708 2932 iexplore.exe 30 PID 2932 wrote to memory of 2708 2932 iexplore.exe 30 PID 2932 wrote to memory of 2708 2932 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\28b926dfdd7bdc24332e70a7bbc116c3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2932 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d7e42ca8fec0774bae0de9078ca4904
SHA1900b6b1727ff1b661688a70a5c838fbbf61f1e25
SHA2562c0f028618dc1271b6e4ac6483c90885e896471099b5bc6b3de72c0a1f233546
SHA512d62d415184c25a79e343902a7d8e750ff8e3153b084b9998574875d88b078963f822bb6d3d9f454f7597c9d3d5ef7cf43fd6ca3d763a01003bdced27c633d889
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d796e57b834d45c602501d488297dbca
SHA14369516de68e67ee6747b68c05ebd11dcecc28fc
SHA25620c55842a555ce33f7f8946711dc72e27d77039cf4dfc446a3805df768355de9
SHA512a2547f41d4e48182389868b7859460b613e6a216d5c63de431d8ee5d77e1a6bb34d99b54b903e997fdb3f2097dfe2ff119a385aec708371dbab430187adfe65b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8dca7ec8c5b9c029d6b94acd2c9f3e1
SHA1532e5924808e0b654c41afdcbf89360505ea512e
SHA256f713c46bcaaf72e600761242179e4d32ba6be603142af6c6fa2b48c844ca9ece
SHA5128544cf65d8bba2b92aa515b4f53d3e3700173a44e017089135deaee8f9d0a07bd50cdfc6fa87976cb4b593b48bb48d54d63a9549b9fb7e7c5abf32f75f1d6c17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b159ca3c60d8b31ec3becc7c52ccccb3
SHA129874637c98854c2038b0e48ae14619148240cc5
SHA256ec29d3d803710fa61069e0a3037bd6276327c0c53570841939cd78dfc87246e0
SHA5123f7cd608849ab6b05521ca5657115c781407695e743f73b8ce4774b201a6c018cb401694d73676677a7f5661f6b2ab67775b8a9aafad7ad3da5043ae13edca3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58535dfcf0381f85c43624475dd9eebb5
SHA184077f3426e494c99a3ceaec9e655bf035f7d4e6
SHA256d643784c78f1ad4468c10982ee7dce7506d775831a6c34f9bf21c8af317e243a
SHA5121a4ae8a8dc61dd79fdf2cf6481ad3081d8b9bf9648be452eab61f07448b6223e8343aa985978788799967fb5876b725b7501d4230344d7dd16c6d058817a0afe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53475a18a9658df374ffbba612d5eab04
SHA146b719b224ef55429f36c041b40d782c95b83413
SHA25696af191c7442afb6912219c925a62e3bdd8a84ccc38d70ce3a716de72d986f94
SHA5125c57e99d81d58b85ce93d1f3d52b05788dd5a94b0cf7b03a15c6c972a16e5e23be0f62a0cfe2f65e16a09ecace9a1ca04d9ce695c6a1ba6209ce30d6cd4d3eca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5078cc673949881c75a644dad15bbfa6e
SHA19d5c78502cd59a76de9496bad40fc321825c7bea
SHA256d3900f7616f5cdbd18eed6d3fe07af52937d1fb6cf0d773468712750d0fe1a62
SHA5128e3d715bf73b870451ac5bf210267c5d7beaba22df9b3c146052ed648ca93edf7a9397ad33cae0571b717dcb48f470262b4f4417b85810a3c854b60aeca02f62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c42d0b271dad48d25d671682f32e52d
SHA108240fb5dd1dde59ffbd499319195127f12f8898
SHA2566cabc96c89bf2c7ebf52583c7b14f8b4eb0589084cdf2bea9e973d72c0e0104f
SHA512d315ef10033159ffa88fa4c40fb1ae99666b33b602b6cc1c6dbdf74ee5417ed2b3f9cd5eb6ec7c38659994b5d7d7659369e90b8e24136b89f808fca5617d61be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508326dccedfd2bdd2c56c8bf80d5708e
SHA1134976d2e945c88826acfd034c4fd5fe20e01529
SHA2569a36773da8d37feb0783c9478cf618fb611d6c2add37f22e51e66c45c551f9a5
SHA512ef9d191aa2cbf8282f35d810845ef0a59c16c7ffcc7251017cf23b9d380c2c4bdb2c70130572d96b541663046b1aa9af49d0c26611a382577cbc1faad29035d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533bfac20f5704d790d46c8fe5267a633
SHA18c9d7faa14a602a3ecc4ee9263bfb6940ab7b245
SHA256fc1cdd73f2a39b751a330c3a1517b6d21c05432f8f969546c96378103f8c8f2e
SHA512d921c6d87a0c2dae11faa28e9686a3a25021748852a441726fac5d1f1df61c42ff4cee98bb5892e29b3d4953cfc0602ee76dcf8cd64e869fa42ed000801c59ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54751521f3e56734a6ecdcaa4ffc33719
SHA1c0a7ab3d7e3368fc4442630cde27892b4eb5fa46
SHA256c794b109764e4547d407d50994fc0553e822fc4811fa5bca181cacd2ffe37963
SHA5121ad3c503a1a53e86cecb7eb1831b21398ae76e563eb6b06eee433902e4090dc56ea9e6a091b4ef85ed0ac8262af755087fbd8048a3dc4e0e8a666f0368ff776f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552d8467884872e3706676c9dbb50e3f0
SHA17b002c56b7119fd0ed09352cd837bac0378916a0
SHA25630b6aa0207f093b7d3fe1926f454087a8e76005852f3636ed526e9676b3ff02e
SHA512621d9191e7c61e7532c4bad7a79a5acc63ebdb995fe7e05ef5e04817c987aa0722d7c784563f773110cba99b382caadb5082eb5356f366baf31b2d92a0b12922
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed353a85b5520c4cdcea0f11a6d05723
SHA1920857aec97a4b5e5632775d7f8ed354882f5281
SHA2560219b1260de87cbb1f2fcb8029d74b7bf84c7b90e35e6bf4bfb6e6bd7597d8be
SHA51200bb0f6acf41e2586ba4e14926dbeef95a2d8ef391c91222bf842ae926521394144d39d1cd36f280fd565b662716301783408eaa629f03495d6b38d1cdf6200f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532dc20d8fbcb44ac0a47fa19cdc19c09
SHA12fe6258c2f22f6e465a0e27ef8b0745945ac7e77
SHA25682910a9fcf282345ea70db23dc3fca892f31b45ce27d17459372b8bf320b4894
SHA512282e59d99c727ace41d36dbfe3afe0e849821c2924f3f57b8ec67279a534055995929d2ce546e262b2bf1efcd3852035c2f9271793916f76c80988666017b892
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554496750160f6287a721e693cc7edccb
SHA1fff3af6a3dd24026d87cc1694b9f753147991e7e
SHA25673587fbedbc5341ace1f00a10e2b39d09691f07ea6aae2ef142d6b31fcb674af
SHA5127ce6c21f60d6490c373a7dcbacc56dfb706a3d00965c16221dadb60a2eba95000351b81d6787b17ddf1aa3c1a8f5f46ad8b7375dcd7582987dd50af7f4192219
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5482927ee278f499134adea390bb986ea
SHA191ac0670dc08f9d649c659fbaa7ca585f8e51ee8
SHA2568c81187c9aabf4cb1c6bb68f118563ca0f1423b5979cfe6a9347b33130ebe0fa
SHA5129258b50e906ac116575e4f891df876f602426b194e36b03cc8a35e4a7c61c8fb88a4c605bc852966c2b3b2659fd23affcae11876f049a622e3f56af1613204e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53aeb9173e264b46000ce87b07602e24a
SHA1c00544c1e124d53f780322b1c4dbc075cd638994
SHA2569893ba17fe2c87e9b4c83a782ca5c01b4b67f72ccae556602febb8be6a69889e
SHA51229feb58a3f01c33e7960c785aec6a23347437d1658eab63c994a2d9a67f2292c9950b0cddc7c746d48f85ccdf91e41063148186ffc8a231d84eafb3a8249c3b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b83b10a9b36c6b36f20f16c48fc62f72
SHA161681f810d00e941ed42a97b700ef6439ad65af4
SHA256d170d8663a7966ed7b1512024b117e991c0eb7e927a73ffee64d4c4a5cde60f0
SHA5125c8e2d2ec761ff1bdad1bf3682b771d5b7cf488a089165726e858a1aab9c690de35e8662d977367df970fb100d8ce1b216280bcf97eb346ff501559c5019f24f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5661a17b1e56457f28afb1ca8f71a92a8
SHA17009d69fdfad68b04ab309f859142f22cc9570ad
SHA256ba10ee5d01d3e9c8cac2a6163d3f1f58fb5b31b52dc9c849ad60bdb63d14614e
SHA51250b185021749b3b2c9b83a987d7d735ee744b5cec7e65e74c859ece5aff9b51c7be39f21e577fed63b39f0492c402f8997601c1b2466ee5ae620bae3b6d62851
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b