Analysis
-
max time kernel
136s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 02:38
Static task
static1
Behavioral task
behavioral1
Sample
2955dd21a2dfccbe2a8216943c647caf_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2955dd21a2dfccbe2a8216943c647caf_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2955dd21a2dfccbe2a8216943c647caf_JaffaCakes118.html
-
Size
214KB
-
MD5
2955dd21a2dfccbe2a8216943c647caf
-
SHA1
38067945032885eb55ab37e69c771b888eafacc4
-
SHA256
a540442c5cf335cd01ef7c830b1f157aed53f7019d407067a284237a690fa8e4
-
SHA512
1471417f7611575fcf7f07718a515ae3b8261e68862513383873956ac70eede4e2677b2337a93ef04dd16f6017808d208563604f4ce86737d8b5a2d21a9d9096
-
SSDEEP
3072:vrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJN:jz9VxLY7iAVLTBQJlN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{81A19731-862A-11EF-BA23-C60424AAF5E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434632127" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1972 iexplore.exe 1972 iexplore.exe 1592 IEXPLORE.EXE 1592 IEXPLORE.EXE 1592 IEXPLORE.EXE 1592 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1972 wrote to memory of 1592 1972 iexplore.exe 30 PID 1972 wrote to memory of 1592 1972 iexplore.exe 30 PID 1972 wrote to memory of 1592 1972 iexplore.exe 30 PID 1972 wrote to memory of 1592 1972 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2955dd21a2dfccbe2a8216943c647caf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1972 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ca656ec59272750b450f86dd012daa3
SHA189db8e5ebb758da53f17463f7add289669ef1f2e
SHA256e77c4efc0812531139343339108070cdc889a70d504842aae88568d9392089f2
SHA51284458967ce5895dfe796ae19c28b238d296f7e8cd064d9ac1fbf2ac317e9f065d2fc5dbe64c16a616d350bd0901ecaf7805d9f940089f88054b738d2589f701e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504d972d085c4f0f4cc9ef51884e0721f
SHA1a4d38f912d49b2804d104f9e407251354b2b4a3a
SHA2560761116ce8f7d88d4f974de525f4ff9b961f27a5594c0420421368d6af31070b
SHA512198b59c1b274ce46364ce6d0cd575bb804d8213ff5ca0e7e0d5f6288822147eaa4cd16cabb0ab64a5e58a61d7cd1920b209f4f593ae1f8fa4a02778835b9444a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db930ebb67932ce84b4df5660c86a7e6
SHA1106595ad1088e14dbbacb4a553edd9a56101620a
SHA2568d31afbb5a4a2151a4c7b8607ff9f4f3b9012b3358338c38cb929a745b91c9d9
SHA512f49f95ad18c49ac0fe7b2af26b14a871727c95f9543316343aaffc6f175f4a0a8a54b82121a7a067c12f57271b4471928cea62a7f0aa4441fb86df357160e71a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ace2d5ca2614189a426e5b294ca3388f
SHA132cff89157bc3164bb9b2af404862916f9dbdf1a
SHA256c15ad47a644bbf953585c13488df42bbeb334dc5e0cd92d1963eb37c0593a098
SHA51242d01f6f447222fe61e383f6570a0795de4acb0642965a07a3b72db7e3610125009ba5a3b283534d48b3cba38e9f2137fb125d4af7b30a5f4aca0556d2413580
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cac8921f9f69dc656550f89768f1dceb
SHA1e6441ccfe2187cc7eff335082734c53045941ca5
SHA2567e47d4aaed502d2e76def5bd01c58012f9db9d5b4fd390f4f7f5d444026b04ae
SHA5122ad0aff08f72d6464e66fb5f85d0a41c47af3e7e3470187739f3f3b00dfed365c1689adc784b7e2faa92b9f7d14350565401db4d6fe19588a14c96db5fbfc539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e99ed69c64ee4a37294d9c4179f527d
SHA1083e5e26886865e0dffd1115f79a2b52d8604b67
SHA2567b99ed25e5d4dae0b3c624c7f1d2d023a95b9df15d39d965b44b65613d14007b
SHA5129c150f935bd2fc7e0f62eb5a628784da5088d86b19476034024cd590afc3c2648fe9478071190fa40e4a77dce17500e554877824d19b881d784c41ef2970f600
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa579dbc025784499da0c09bbefd4af9
SHA1bd560c4ea06543237d76d73fbcf594cdbf553da1
SHA2568f51fa60897366160b75b67acf112437e3a6396f89c3450a37c55ae60a671ea5
SHA51237b5ebb15e3539470855072cee0d62af964b6eb210e39ff3fe359433a4d3890da41a2c4ecb78d8a0dcf43104086d3448dc105ec1b322f1c9598021a3a308c5eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500123ab9984c77240bce12470d0dc44a
SHA147843ef08a1f926c085952f3a1c6564a82c32d55
SHA2560ef44d070a16a30cab6120098825e81be65ae3abc068897ca9452f62ccf4fe8d
SHA5125191b040d170881853e69e2a8553fea65567335eb02b66de60b51fb623912824c1860118d13f80358cbc861ddbfb25ed6db7206be52e093023d089e7159542f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d5a5d0b2f6a5e106f6daabd81551cb0
SHA139225b451c1bbfd5c4e41ef05fff03609c543ff5
SHA2567d69a9a95e722fae410ba0450a49d98a55e5fc0cf34b541f35e0047f6b347287
SHA5123ed6bca0c6f65ed7d4bd6fd741631390f76d5c2709a217bbcba4d401571fceecd165f5d8bb836fc5e9f85227e7b7fc404fa7c045da6b2467357b7278eedc98db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d3db209c6eb6e8f21bacb9f491a9434
SHA1088f95191d8b5cb167429001db457673d3589314
SHA25650f6bb625cb75ca0838b19da1d4a2498a6d97079f0d459b755e92ba9089c4752
SHA512912f921831dfe2ab6100b59079eeaf913b91b141b00b87e6a895e8ffd784284b2b6c78dfa3182655886f421e56ace98976d59b9191cee0fe1d20dbb6d91ff1c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a09a9112a19d8cbcaae2087560ea8421
SHA14d97b273ddfa937390082e748b18f36041c0d748
SHA25635acef09accf4569ef37be837f0bc718459dfb779a89dc8774326572a999ae73
SHA5125850000053d1a1e305b1e55d989add21f94921088b2c1a175dafeacfb0574baacf37e8ab2e1bc68a950abd936539a8ebb2d85ff66d79205af57f72f7c9deb518
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545637b077f3e6a8068785dc9cb7bbd87
SHA1daeb7a130cea7e3c03f2b3b6ce03d8f759922adc
SHA2564796d3ded64f9c33fde29277b7519faf077d3ac9a970b55bb62426ed5c59c870
SHA5124450c801bec7d6a9cde7999257d1bf0e4b39a43c9e5a806fca8ad8e6c33d0ce16e2aee8f71f8611e29206b2bfa0bd58eff7b21ae4eed55646699c88beb8b2916
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55194b6a82496a2f7f79f6047de6dc5d7
SHA14ee2ad0939ab844319929e975aa50b6e26132ac7
SHA256edc8997180ec13691b88d09c6fa47a17c624b1c8e611f78fa080872239a1e740
SHA5128dcc8b0767a1fb469056a7cd9a13fd0fd8ecff190b86afcf1617ded58f95eb9fc4e3e6298cbb31bf435f39b169b246e54f27f2027b818824309030fa1bbbd00b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505b1b92bcdfbe9173037555047de253b
SHA1b5774507d81fc247412b5dae29481ab16769061f
SHA2567dbd2bf7c4e644cad92a5e037b7b042664f2f6f965410953830c9102e788dc9c
SHA512104e0f31b7f91d4bfd774a779d5195dca755dd3d68f26986edaedbc859ae38b507563060d702e1497613be23659a3b8f7b1ec732b28d390c50e00a5a9d0dd75f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54607737d53b2c1fac1541051ea2796c0
SHA1cd9c96f4aa7c7e7a2366ffff76c814883b0b9931
SHA25603cf53c2211b2a167c73096f51441ef4d895431d101f48f6d4d0e2d8fd698fd0
SHA51272efd438f75ce03dfbc3a46fc6d71fc607e5e72ec131cb25726464ead3beb484d601f5446a2a9e9feba13fec2a4868af81ee0db7ef4c6903825a16b0c5c64683
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe59fb5d2c9b9d8781a8a1d748a9f61b
SHA1217e1934fdf3389f0b14644b84d09a46f2eb3b5d
SHA25669dcc2d316dd6c1411c011fd78971fda092ef92547a60218238da3fb8b1c315e
SHA5126e4809ab6ab7fb10e6ad50a5777e94b0ad7d25e7ab9623dd3b0102cb5e28117353d8c237dbb33c5c7325e7a93c7e017625d50bef9af666ec2a6f2f100137d700
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd08a2d577f62f2c43f1432f375334f3
SHA174b70e634ef3aeeb8537a2f76648c4a3ffb8d157
SHA2563dfc15a52892d9326ddcda3c44e24fa01230e5bf2b8d0dd3d51ae4f2cb781178
SHA5128c9b746b7ea507f09b8add850c4bde47df3f468346cece977e92f2dd82c82ec74241c1f8a6d474e33151c574bc89e51eb698ae61d5dfc6fc5576c8a837819850
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505bd28f6b45693259f60440cfe349097
SHA14c60670dcd9637e60379a4fef71c9d0488911e81
SHA256e7a9c76d8be1fc54592dcbd5494edb7c30a54f0c7a4f7c195f499bfef7c3acb6
SHA5127ff60aac26bc9260e61b3f59ececfc83cbe62529969d6ee7c86d13496e49506e09e9a416bf6b930b2f00c53442cdfa62af2d19e9e73ba2d733139b5c6f1182a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517ba69ac94b5578a2a081cdb1c1d0568
SHA1061ae4c92a51087a34e24255bdadef1a64ca1f8d
SHA256aa9dbd86b59e27223e01ac7b4ac6ed4434e6e0cc12ab9a3bd98fb679a60505fd
SHA512606bf32c8aeb75eb01c73fb6fdb83a29a87cb1430cc3428d9e429be6cd271b3ea348c36f0fa94024a57d5793e5f52bac5f72c29b486d5e7e1dfc868309ca05a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef477b8a23be47a072a1c0750d8a2fd2
SHA18f48a93acc12946fb9853dc87b824b8cba63ee12
SHA25676169be0ec5bcaea39402b607a386ec4d1bb5835df078819027a057e67b0a4b6
SHA512e6ae28b37ef95d19c2a01c7fc5d8af28bbff985d0f47dc47fe368bea45c107252681a29b6db0e743230b209e111f3c0ad0461054f2e6dfa7a759063573b4624f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b