Analysis
-
max time kernel
117s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 02:33
Static task
static1
Behavioral task
behavioral1
Sample
2943f7db1ba89895a8b3c22da72c55fc_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2943f7db1ba89895a8b3c22da72c55fc_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2943f7db1ba89895a8b3c22da72c55fc_JaffaCakes118.html
-
Size
162KB
-
MD5
2943f7db1ba89895a8b3c22da72c55fc
-
SHA1
445b4b05eb724667fb1bee2d0e6138abd507a1bc
-
SHA256
9b2f6f8e314e673f8d7ee22fa33fe47aa6358b43efea1f69712d9d8478c25df6
-
SHA512
88b8cfceb7bcff7d9223cef9c4c129b8d6b5de1e1ba3483cf63e7a810b221a80a4e5a776cfdf7243a9d2f8624591483053e047026c36073bca9c366a8740e936
-
SSDEEP
3072:S+zzCJFkL3rU24rxwIWYBZDp9ja3z1eFbJr1lvAjZUCN+9yfkMY+BES09JXAnyry:SyCJFkL3rU24rxwIWYBZDp9ja3z1eFbK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434631645" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{62ED59B1-8629-11EF-931E-C28ADB222BBA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000e5f44565ca0a98b60916292801fe12d72c39d44745d7679572326e959e9a9b07000000000e8000000002000020000000a4a738738225da72f18ab2ce7336ff584eb735d6f159f05aaf2994ab9c56a59d20000000bcb46c44acff98146999a73958a16ae63d7fd5a50a9346b2c2b25e2d485f0f2140000000b95bb44fd5b090cd10b9616102af52ac23fd85dc0ab8712885aaebb665e623f74c0af8a4aee2baed418039fee28fe4135efbd037057be667447b3dfdc190911f iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c042a552361adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1152 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1152 iexplore.exe 1152 iexplore.exe 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1152 wrote to memory of 2868 1152 iexplore.exe 31 PID 1152 wrote to memory of 2868 1152 iexplore.exe 31 PID 1152 wrote to memory of 2868 1152 iexplore.exe 31 PID 1152 wrote to memory of 2868 1152 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2943f7db1ba89895a8b3c22da72c55fc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1152 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecbdf40c82ee820712416680edaaa146
SHA1f91847acbcf7dfb2c1ded380f499a15f0220bf5d
SHA25655d80e647bfc39f7f0ba7608bcfc014306b2015936b10db65a360df9dd75d89f
SHA512f7463caf5b6f90d584a10aebab2b9d416a5288199d78fbf929dd4f0eac011f41794103a67e959f1f965a9f489a1cce9f409b97dd7ffef8aa8911683cd3f95743
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519890a051b78483b50806eea7ecde296
SHA1c1ef693b820645d55b6c513af34e38e12bacb43f
SHA2563b107c4f13b700207040c213c745b0c41ae825f5b553a8a08e6d02e58c106378
SHA51273c21b9cf384b9078cb3d9d96b861c45c1e48f38013eda7389ef3d58e4aad002a561a4c4f698a43212da3d5321eaa5d6d1e56e3a3723e94289ae8ea3187098b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536ed7a8bfa5af15316c6c9bb6e32c785
SHA131aaf31204c9d21098f4b44d0b7aa2d6823e4b9b
SHA25666a1b0791e07f53fd8268d7080a561732e587d0b5937eb30fcb3179e0e01cbb5
SHA5124e362d0c75dc34099acf0be7cdb815fd96a16c21d2e49b19620f6f75386f9ee25aed28f9d0456d2c724152df95d04c7bbd825bf216c0a69b823756ba75526be2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c59bc4b7cb5bd9dd0f0ec9fefad6a53
SHA1acac7d1aa8dbb90ab256bf063655061d375ad85e
SHA2562aa65dc90fea1b8124d0f7737124cbab2f4b8b30d698b51b00af306850ff9c84
SHA5123a0088126d8b49d46ad234656d2f903dd9edb8dc1603a7827b900634bdbdcbf82ba791d36664788df9b5be65ba71f56b7257d9d37640cca13c0e46d35104bcba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d669e78eedc48eab2e863aabf694dd4c
SHA16f7720c18da1d59898c5e2e92fa9ae0a2cca628b
SHA256f42bc3cea0566a12cca513130cd9f38ca953fc67dc31e4f6e36faba4856f0e71
SHA512fd510e1b0aa1ae63d203fd67a7ad1f94585320a46e3c38ad93e4e81314e9f738128533134f3a629cfb428f2250726a9b0e77ea5bf01ac65b0e2d567a642ad634
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5611c7b1e0ad4a944ddc3b46d2f158a37
SHA1ee9026f8821bc7e972c813afec86aadf1eab07bc
SHA256b2a183fea834f170e9ab5739c2457cfd7200bdfa78ba7785c9afdc0185dffc1e
SHA512c811aa0db688ac4d4ab1b143c4f92c7f0f5d5a6ac15b655e68a4457f8a9b71a0074dbd5adb93eb3958f2ece2fa74631e37deb51b739a42e5a75037aba8c101b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d63e9a859f4eaab9a183b4fa1d940d0
SHA1c28ccad912691bcfcf1622b9e9ba3208612805f3
SHA256f88d30150da58226ac8b8632832b2c9a34c0e41d950df57d6c6a9c9d8359ef5f
SHA512568289a962e0ad3e2ca47373ac54dcfadc504989b5b5a2fde6a1f4fe64f1ea03fc32cbc857da2498086a611fc68e30566f4f0738bc3920659d0555d6d990afb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54aeff05719aac0bece93a35e507fa705
SHA10c8b0c550cb9ca42771252577a36e97cc0206eb2
SHA25615eaad68bcebf94ca423e0246fd4ffad69d2fea6c6f0b490f187b68ef3949246
SHA512fa014d62a587c9a6b26d8749bec876f59fdbceb1ecc865fcd82befd6d8c49aeb0be4ea90b87ae2fe91ce2322e33ad3637566fe856a3722ca5f87d6e727f97ff8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5211b548c2310003c062eceea8be0d010
SHA1f05541c44ed187b6ace5cee0638432cf4c4666dc
SHA256016f9c9105937da9d0e2e7b4e719bb40ae09d305022fbf69bea4719b6c020454
SHA512e1ae81a7a6f6959b3fd10837479ab3dd359e2e034fb89221481c440d925e93eb23f2f522e3ef5d0e58a1f11efba6f76db726dd1ddb59503458a6c8cc2ed81ab3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509fc895e7e8b4e31447a5933373ab810
SHA1c8f1a6c4ab9e878a51a4e9c648a38aa075672de4
SHA256f91d95cdbe3eb501cf50cf4b6b1332f147a55a8c025eeb9bb2dde4aa21610f7d
SHA512c34556f20b4376527ead77523df2c657ed041c96f56a1f01fd18a46c60407bd284d60edb03fb4d0006717d4e668f275ecf007f5d2bc5abea64f506334dd32805
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536195d1c39532a95d787201dbaeff043
SHA1be86b15cf6446b52f0b6e8b5ba27bc82a4c7ae92
SHA25604bae5585b1fb0b109e198c2b1f99dea0282b7738fde10f681e9a58ffb28ef18
SHA512dd930fe391794204572becd55673c001144ebb51d7ecfe9b180246f4ffb9aa1cdb4be068c1cc8dd7cb428159053f195d45886de2cd20ce80e55d6834edd2feba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ef12bb145dde044ff9b05c3b08ac0d7
SHA1cb3072ce43c35f13cc44ee055e1739d2a5d24b72
SHA2562edcfddebad66b13bb26d7d8731bdbfa28be78174348c1f4c5b21fb7772fa8f3
SHA512120aa40b032f19c6aba2fd85c47027485545041e0295e70d5ffec6b26607c9fa67a6255a7c611ec81ab2ab96af432c12770047a585483523e49b132e97a9f8b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f11123b85f065a25050251d329a06441
SHA16f4f663d5db7798ed666894c12aadc434c6b4012
SHA2563bac0bf5330f62e867c6d0574b8c5d3ff25e137af1263d2195cc3e017e73bfc8
SHA512f6285879c6f3d15f4af01172015f2f6cd8e95200250ab4ee52b112bec1fd993ad1c87cfb7b1cdc0ba3462097ee26f984f9caf9536c9a5802cff5849ba399beb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ce2bcd603db7ab5c4d1c3aad9118191
SHA19bec1e9be3de64dc97bba615c5c893902005f8cc
SHA2561d733ea4a2b13ca848ecca3c49051e1c34f99421b273b53517780e99935cf14d
SHA512e044999b5249583df07b810701ee7797ed6f621ee48d733cb2b5be0ee185b5ab7f7362884d337ac0004a0ca7b2df98709a98aaa89ea295ab0ba109604fc3d9d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f9eac93e01e553570c00e18dd4d0425
SHA158431e29ad4bfa9bfd5cd29c3b18a41d442476f6
SHA25609c6e5ed8a1fa052bd741adb722fcef39b1894d20cb7bd13662fb9e854f46887
SHA5120d65861377102331701bec926515bc7c815d52eb58e63758fbdc937ca3e53594fc8d118755e616208f51e1d51830faa2e1d9dbebd99e5efe2b83dc80547b1131
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0e695b681fbebe000db9841d51c0f6a
SHA1b0db500ac6c52ac8a7c4e9db46d401a1dd16a9b8
SHA2561e092eaab20a75b6bdbc2d8258ab79cac520843e7fbb8d5a80674b805ba8ee05
SHA5121d6fed7bbdcce166ea2cb613d99105b40fada70371ac7129bce06cc4d4cf03ea37acfdc2701ba49eb6a0dfd6149f0da48e25367fdc580255476a10080ffea370
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515bbf689530a7bc37c751b84f3944990
SHA1aadeda2b0d1e5a6414cb1b6921cefdc79b3ef5ad
SHA2561222deec5d213fa2cb0ecac4865792fc79db603dd708fcb38b2f56b6eac5becf
SHA512bbeadcf77c62183de04633ce7ce4a3f0b7114c59fbf139b6f09b89355b629979176eb74cfede8e50d26d61b58a8b3dce30466408384df751376fd8bf3fede774
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5430ba6892ac7704795ae117f5e9f6a71
SHA1fa45271ad786f4ac10aacf7b8368927803a76eb2
SHA256fc6bf8d5ed181c038635885f848cf893783fb206fc286d9a3fa811aed4160fc9
SHA512a6220f27c03c976e4eac71836aadb88a538b5aca311305ff0a69718d4679d3f14d48fe5312a8ca82d91084f1c6734e1611194fdc5eafd213197dd1c83f25b957
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b