Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 01:24
Static task
static1
Behavioral task
behavioral1
Sample
28645dd7068cd5237a4d10d93f90987f_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
28645dd7068cd5237a4d10d93f90987f_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
28645dd7068cd5237a4d10d93f90987f_JaffaCakes118.html
-
Size
6KB
-
MD5
28645dd7068cd5237a4d10d93f90987f
-
SHA1
20cf349eac63f371ea4794e8367c1c8fa4a954d8
-
SHA256
bb77a705e0d3c8a001365c41f22fcda5ee4a1e11992401a91e9634f412f8a2e4
-
SHA512
d2c9b685e3df57d97c166987f2696c22823f5c50a6335b79226ffd30bac4b4878c48437ab5617b7ccd34b553b51bc153ff4955c12ade2516862500167d197790
-
SSDEEP
96:uzVs+ux7csLLY1k9o84d12ef7CSTU3LcEZ7ru7f:csz7csAYS/cb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{632F7EB1-861C-11EF-838C-C20DC8CB8E9E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30b8b839291adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434626063" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001cfff0429b34db47aaad7006f2921c4800000000020000000000106600000001000020000000fd9ca31a3a93b264bf9b56430e96a5f1c28f67df3e2da603dfa75de2fcef19fc000000000e8000000002000020000000b9501c167347629285cf6e94a3f87bdaf8f269f3464faedde4a7e91c5b22239e200000001a662d65d97f22768a39c9f64c38e963fa7005f6c76b742a3c20ff3dc4b165ce40000000688e532fc04f01a5f056283cf95eee95bacc4e47df18ce396d3d548e58d1bda702cfac14dbcdb5674ea78739068a9bdc094c7203e79104bb018346b3f20417f1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2088 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2088 iexplore.exe 2088 iexplore.exe 1620 IEXPLORE.EXE 1620 IEXPLORE.EXE 1620 IEXPLORE.EXE 1620 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 1620 2088 iexplore.exe 30 PID 2088 wrote to memory of 1620 2088 iexplore.exe 30 PID 2088 wrote to memory of 1620 2088 iexplore.exe 30 PID 2088 wrote to memory of 1620 2088 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\28645dd7068cd5237a4d10d93f90987f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589e82f8c9ac74cd1ce4ad380f1c5b9b7
SHA12fbc48aa1bcc6f39b716e82aec2c7dd24d701355
SHA25626e7370f0a20ea4d100ac352dd8def3263d4754eaea02f88b27f69100f96b355
SHA5122091c6bd489e38355816401dc86e787099cc77b6f5f0b239ca6b8bc3af4e7b1cde2e11864bb756beee26f99e38c7da3d2fb7eeb60ffc15335b6ab5b0ff46d27b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510b76af0d5eefe0e6c22513f7b2883ea
SHA1cf071266ce6ab7e536ba13f8a508e5367220311e
SHA256a66ca0f7f61d734ef5a29a12380aed4e59950440a373731d86f5b6e1abd6ae84
SHA512d699060c667e1860e4ef7c294e027e9b74b7e34b13d740782dbfe6e86993eec58b9941cc91e1ce31005e79021dc9a34a6acd0ac7d74fc23e19912d7e2463678a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc7b3feca592704587988272f6ae564c
SHA12a11312896f034e1d5e7e6aacd28abb05f0b51ad
SHA2569d79c6ad494183b0a8396b399708a9255fc71c8c15b7a7087fa02604ad920fd8
SHA5122dec727e2687e789fbeef0cb6cc15ee5fb7964ef6e02dd45e44e284ffbb90f6b0de0256226bbe4a75b2881354c79105b06bad440d83cf1466208f857c82f2cf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54435326e403c3709618fdc9851e37b0f
SHA1f7f92cfb6722d138b4046e061c01ca66e21cc06b
SHA256a1040c056a9e861aa9b342b05ebbda7800cff7519e8cb7a8a0276560dde1a561
SHA512fee04e9a18e994d57fd93be3e2eb5cb24ca1622f66c405b6e2c3b6c400244b2da3fcfff21f297ef5ea9a83b033c008c7bb542aedb582eeeaeb7ef07a7c8f3c76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe278ae6c08d22bd56894e596562d77e
SHA199f5a56718da623b56069e0477de9ffde5c0ae43
SHA256e959e3bca484c9b9709bd4c871716fd3c0391cf7a8e015e25e9b6d664ddd77e7
SHA51243d1513548b43d98281c79ec197c765cd0e76ab92c45447238d22b674d013790d220786bdb5db272abea158bf29fb1434a003ad38c80ae71487bc763fb18a86d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3879db93c994c033ba3a3c4e0b9e9e6
SHA1f47c12bafcb8171f0dee1e3661b23881c16f6407
SHA256032dbd5d35d28a66360a70f9ce0b11148ad4a649a0baf42d1d4567cf5821f322
SHA51216d33e99ab5e8590c0ed36967f63acbae7a381e637ca1d7ec44215bf078f343d857f5a1d7c8e1b02bc4ad8c64cd92f31dd1863fc8b15e65434e0a7523b974323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525ad07ad53849d2f09688de1ee36fa71
SHA1c8baa4e52dca6506cc2df3ec330eb75999a4fb87
SHA2561140012696fe9decf607e3df2f52f17335dedad7ad4fe2139140b00efd125c5d
SHA512dc520c0d5f4ec4e98740f7953b92f240d4940fd1a95ae079711ae92e9056471c2aab128bf5b978ea70e7174702a869b404847940a57e1fbe18041ac39b00fa40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f7a9afb4ea075bd871be320a23dd766
SHA1668895bc6a569cde221e67de5919d759b86808d5
SHA256feda87b3e1deb72a08d84c13a9d41da5126d23efe20ede3c6a364e77ec3c71b5
SHA512feac170af8a02ddadf8ac493a8e31345a58ecc2ba3a2b2b6afb778bd1cc1958ecf94e8cca82ca04cda4edfbf9e389959aed69eb7d9f836d1badf70bfc17285d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c67203a6616ab45deb4e30d31646097
SHA11aaed5e7693d26dafedc84833665f026380888bc
SHA256e3cb80ca9b82096b35992e9288ec1dc1e85cc7fda523dfbd0f0c43ab381df931
SHA512c085fcac6de146ba45b53989a43442304a5d7af2dc585f057dff3d83255df392cd6baf629a84fc957e10acd293e50ec434a0ba6c93e8c9724cc1359c2e0b614e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57621f1cbea4cb7bc16da1e34277cf823
SHA11262c967acb81dbba79dda47e948da7c3e629899
SHA256e6d76763d011608f40e56382caff126f99ceca7b803d16f4b7df885e82c9a956
SHA512b3a50c0f56a5459d8323966468c9095992d1ea851c2de2c58d8791f350e8fea01d59974ed9cc6ea13be5f9a92a6b90b1a5c99b65debd3d35696ff3430c39394b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d55213dfb7bd394e649182670d7e4e5
SHA1930fc9cad76b502f5d6ccd945e161dd04e2a7c2a
SHA2569c4d0097f3e87a8182b4bab3949211e5023ae81330a351d44729354a8452f08c
SHA5123980475f176c6820209ca88a295b2d71dbb45695c392a51c7dfc6ba816507121d3d01ba4ac45a925d177f257d9afc30e034e23611729d5794b48b748042e7729
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3119f4bf50d5bf2974859e75927678e
SHA1637760f046fdda948080712f8d3ecd8573aff687
SHA25695813ed7981a1306539f0ecc896208ee1ec1afaa73dec9c85dd6a64951f22f9c
SHA512af06d9d3640070bdf8913fa5d4d065afb98a94eb7fd92362a2514768a227eb2d5d4a2132efb8ba2607a00f0097d5678307afefd5fe70d2f3163af63bd0c2e05a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c652558c940c9a28f207dbf785e3ed16
SHA180b2bc3b830f5b801483c19aaaa42edd39fcdce3
SHA256fa38d871c4fda8fc52d4f8ab0d4daed211d404d717bb97d4c35cedde2fc7940b
SHA512109659d6d5222eb1641436927609200174ad625d591358a6d8d533561cea4fa4f9bffb75701860605d57eef5bf181b73557a4980a016feddc420af8261b345c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d828b7eba5bc44e329bb1e692179a144
SHA1b5b0e4dacb09f8edb43df600b5773b4591d64768
SHA256ed76044f1870fed3ec7d25b11e100cf541dc661752f0a4f94953accf6d9ccb6e
SHA5122bf923fcf3249c5b9bc431d3258648f5744987139deaf7f32a53e434e257134c3d94e2582affcc6bf77f7a8650669b0a2aa7614b70ee9c97b4d5b1aee2b2df84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af319c1b5134d5650c42e8acc8e4baa2
SHA1dd24cf33992ceb8d8a9ce4b2be587ba0da6979fb
SHA256a07a9eea66f9936c987413ca09c1cc6fd3caf0a75826418e89d05a12daed410f
SHA5126a30768705b09be9fea7870232690bcfd26bd0bdf7409ce31425d1ee73012ae9d886baefa80cbb475a59e9508f1ba19c6bfc95a71f1f1d4fcf03f36f4b5260dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caa8580c79fccb903a27cf83783662c2
SHA15b01ead34e428ecaf80d0a145bcdeebd932f1e5c
SHA2567cfbd85df25375bcb4246ed8dbb5a7f0e2121cabd00c5683e2f9e74428827de9
SHA512683479bc72eee5cbbfb74ade226c73703484a307980390d639da893622738e059db137c45a3c03422dee97f955d95b14fbe6d942217edc62e8cc090f6e6ce2ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bb48cf1a5237aca51701fc92bd5fee0
SHA1fc3225e89018cbb934076ef287395afa5f5c156f
SHA256e4bc8d3796cc8b62302d3dafb82bebae5d76456738d1e9eaf4616744e1a17ad4
SHA512add692f78253019fa0ea7463d32f02088c14f9b57719e434dd5ea0e50cd50a05ea70c1d25a8db31df59497a2fd29ffdbab872743d5f5d1e2bbdbb3dec6d541ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558fb702e567d551654d377cdc04cd548
SHA1f9ddc841c016055b6af860ecba8bf56ce86a8bc8
SHA2560974818e056657c000b044c06a6a5e63caa2c7cb532ce490edaab6735a3fb947
SHA512c4d47ebd913415d16ace590883483dc346bcb431c08413fd1aaaea6553474226894eb4d8593e94f284d25fde30cecd9c2d253a386eb6ae0f47d6a40e35191722
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aee9aaf6260e7315a6a736153f9b7b26
SHA11b7c23f1a9d7c858c1097b2778b18350e70c1a41
SHA25626b9a1073e044762698f73a4db8742a1f49a8779b8c8b222bc22274d8d50df14
SHA512b0042a43dab27ad5cef38ac2d325b5489f518b20caec40e3a7316eb9631f71cef8b8ad0c6e868096408f32c8e437ad5c02123af506015777ee23381774730f32
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b