Analysis
-
max time kernel
76s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 01:55
Static task
static1
Behavioral task
behavioral1
Sample
28c5437a9f22c36a8dbead5d45295d7f_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
28c5437a9f22c36a8dbead5d45295d7f_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
28c5437a9f22c36a8dbead5d45295d7f_JaffaCakes118.html
-
Size
10KB
-
MD5
28c5437a9f22c36a8dbead5d45295d7f
-
SHA1
4a267106cf2617f3385d83d35933d8e97f3a7f9a
-
SHA256
a7222c8d0b1106e8c6d86f8b6e65fcec5f4dc0d2bf988c597e296f7784c1aee8
-
SHA512
257476c10181db21f1af3bad5a196de22b8677347722295b289b4529a2f7a4ce8b70ec4270c3b53f9f68fc716b91656ff09791ea4051034fa1dd8751b49785dd
-
SSDEEP
192:2VClIsr03nE8k/w1whqJk10Bwrn2vk6hu01y5uBuLbdU8d:sClIcuns/g60Bwrn2vk6hu0y5guLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002960c9d6715d0f46b689b4c62d517adf000000000200000000001066000000010000200000002497d347c6af7ce9f61d28f375df5937cb7f762c071e4476762fdf1973d3cfb0000000000e8000000002000020000000bc613a6f1f27e25a9da1a7bfa4eb7d0b5fa96943a9165c2290f8264f99a1be79200000003ddf9703db9b7593584fddf5a823cc86769ed6ee936a92e1e735cf9480669acf400000005870bf88133ceec8ca510ea6bdc1ca01d9ab1026c498ed2a125f87ec2349f7397817aadf6fcaa0fd873ba89c09d256a3ac41939257a357aeab290c2f16d180f6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 602e518b2f1adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434628734" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9BD22001-8622-11EF-A2BE-5E235017FF15} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2908 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2908 iexplore.exe 2908 iexplore.exe 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2908 wrote to memory of 2548 2908 iexplore.exe 30 PID 2908 wrote to memory of 2548 2908 iexplore.exe 30 PID 2908 wrote to memory of 2548 2908 iexplore.exe 30 PID 2908 wrote to memory of 2548 2908 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\28c5437a9f22c36a8dbead5d45295d7f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2908 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ed8bb3984540862ea8a1dbef2b141af
SHA1fe730258f9e6fa48355e5916682a0e92618197b1
SHA256d5dc7365564dc415d939c51497fec2a01d3468b6eb3f45de0c2b6b93487750ae
SHA512ea2489afa1953fda9d8d96702641be27f0efac0a6abd4b3c9d210938a83b5cf1cc8e5deb35fe07afd534c6014b7c520d89329cd03b5dedea321b0bca2bba3ca5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568d18f2b49d7577cc176a78c68b946e8
SHA11a2e2cbfd5195c132629df0bae81feb007b0b623
SHA2564f94ce1f61e7708c24967cc92d0287983357d1aeb8996de889a61b85aff45c5a
SHA51256d0258431ea3e1ca99722ac2411671b8df77fbd770b4c6bcd1c38dc4d366dbdb2b345d8546bd607f245dccf2e75dae58418ab01127afb64b0bca862223b60f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553833d0fc1c6485f14de224f3f0f8a98
SHA17d9d708f1bc17363829e0532caedd094ca6929a1
SHA2566c8fc04ac4bf9d7a5c043e50d00b87873920eea519e094d941050c41100f98ed
SHA512ac880b6912d3b62f379a27f2715f745d40ecf0e850a4cbe9fbfff18716618f2d6e90c86e77d5c2ad3bc03e91deb6c9b5fa4a0eeecf428ea4b4941d9e64839f71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554c735afb1c7435d879ef54590a663a9
SHA1a1245a0547d1f0a8d2e38eab12b1b08cc03011e8
SHA256ed8dd410c200270352697b40a4326216f012e75a2a149c52cfdeb51ebf9cf1ef
SHA512334dec78d5a8a8bca41c7fec2cc5c27ba6f658cfeb147cd4100e04f3f760b9b7fd018782d83341bfd6cb6b4eb82af5accbed9ea77338e63427a25c7c3c2e17f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ca99e0efd8b49b3e47145cf2ca3ad4c
SHA18a2605d15e815a74714faf6295815654a26e5851
SHA25665bc619261f9b0d9ceaf08b6b651c3e1bc6a68d7759a0e69728d0f5cb5ddcdf6
SHA51228fff74e7f0a6bc27fe2727cda094924e86208e5b0c533d21ce51327b846a9e63780d8dbec6a80885603f75aa2636eb4c501d7fffdd74f7a1111a8e628a3e8c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a86e1ab70c8d335ab021560a9e2efed
SHA1bfa49e59d2bfeb9f2874ee52ac3f7aa9b2c4e9b2
SHA2565b7ae1af8e9c8edaf3c744b97bfbbe016e13dd7b8201f26b5090a17b62a0f78b
SHA512b288dafab070aabe01040760500bb2a333e45e7e13bb993e9c51010471f4c0b8841f1e0f0b1c21e288c968c2a5d9e72a6433c30319f36c325fb61ff0546a9ced
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec88175c0479ea390de721040909cf60
SHA1590def2498e19c735cf8b0b4cec83c5451453389
SHA256f66fdcd96834fb9da713108719638a7778bd81f7a417aab371c2208a810dc2da
SHA51289bcdad67f83361ed93e89df4e390d35df0312ea1e8cbdec89f48d8d6355bc927d999e700f0cc0538795cda42582ac30f8aec5dad0762b496621883dbddf6806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de637395e3c9bd455f1ab62fe0e055fc
SHA1b409388274a9f1794bd1f1a5baac0ddc3fb8bf58
SHA2562b067760d2ba0af40a24e244b7b6aff42d615021dc39eff3cf6c513f63edb535
SHA5124c5fb0e9d897e9aef4bd7a7129dfa976a129275f04d76ceb8fd639f60c4bc3e5fff9e7606006677f05770229cea3b138e61617150130aef3559b5ae1e675b231
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf6efad8c4e43c6f79ce8353fa8a3fe7
SHA10ee5823de6b72439405f0a9860a31482433ad2c7
SHA25637c41b7f535f2831d6543e2b265389ac85f2ab69d5de91d1836c31e937168003
SHA5129ebc5d44c223ad0bc77c71f33c4b7b9e93a8e2ef9c010098f0f9fb24ac60381c8acb5f6971be23eeba27518f69e4012c375ee615d648006e46e2eb3e15b3a8e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565192165702362dd38a05e88b8e8185d
SHA199e6d71c247971d250f5a32fc94a3fbaad345236
SHA256b9422ef5ec692d089cac556896dc73979dda52e40d495050317750090a81ddd0
SHA51244789352df5bd0254b4dca2532f40501bf4b6d152b04de81984eb09856ba4e56fad992aacb9b31fa6f96f50f0ac218ff8cdb6d46e77fc4716bfbc4e73ba6d1e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5302f29e34413ecf37d008011f7151913
SHA1a2fd1b8fe3e7b1148ff3d5f29421ac410db77e93
SHA25689312e37333dbf7f23d1220dc5bc9883555c95176a565cb689ab7a11d4304fd0
SHA5126201c37e31985fb972898b80bcf7e67f8143e460a7130c8016b90f2c2fb8863a1bcb8ce15b4f66873ffffe19f9dca9e11d051d7d06ffab8af8ff3657b647e031
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b23652639d7ddbb784cbf19ce644fa9a
SHA157fe53ed2b42bad3c6bf822802c99be94969b396
SHA256a7d24ce0e641be10ff3d8b27e07cae795b20b8a60ceab5f92de1266aece69f46
SHA512ef61f660e3cc9743aa62e823fd1ce9559f5dbb19427a242bf125415e33e64b7bee13307cd21883ce08e11a15e745fde712154d6459716d51f2f10ffdebb1afd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558b6a66692b69a8781fcf2804772be1b
SHA1fb0ad8445cfeedf9ab5b63503f8716deb0682c55
SHA256dc5c7f0fb75bd06277acb5e5676f5eb05bdf1df1922a1b8bb7f1da1841aa4ab6
SHA51293c3c745b96162ffbd91819b5fd966b51fe82da16d6da2fa2c135cdebd2ba4fe075a549f7f5dd17de4af7f112ba4d027f58de3897657cc179e34fcb773c8a2bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59903a61bb234e302a179f8efa5335341
SHA113c36acd126dddc2f63524c4185dacbde35b2bbf
SHA256b914fd829d13f36c6c804125dc12ba1f17d65d7890f4ea5d9da7d78b842a8a4a
SHA5126a0e4527279bd94c1bdffed137cafba9b4768affb2785ff7110fed2ed385f6ecf78d019cf381e91d0f759154772edc7a8fbb0978b37fd8ca52520cfa46629c45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563926a44dc273796015af4bfa05c309e
SHA15634fc3d61cb8bac4a80a8afc3485b6b9aa27b14
SHA25682c236942a576f33de3073ca5f759aa35fb34fda4b66ee61c9f0fdc6d519a4a8
SHA51210770fac268f48270f2a8ab618f6319bed9c9b9abbf2b4a16cd1e75d3368da23ab8c82816f26de478672a6bc5856f074c45438072633103ed24237cd60fa3e74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535b8cde2796531b24ad1205332162c60
SHA183cf9689a9903c8e52b1a6c53399afce38553b21
SHA2565fec2bd52c835d35b2f76a853abe7eb04d5d6108a086b03049b225ab0440f52d
SHA5123947585f06be40ca2b9003eb2f3bdfa00e3621a5d5737cb27192c6aaaca1575f6704f501d12dca0e568dd9f979956ad8d09da012be0bcd306e88e5f065e6be5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb5bc5a430dc056cb9f9fd468d3db1b1
SHA13f9761695108e07f6cc313b00c387f0285b29ce8
SHA256d37b1802c6c55e0c621077aa66164c7ded4c5cae581a1d120dee89483b6cd5dc
SHA512f451157bbd5bc7c1a706fecbb2440ac570e22cf91bce698afa1e0ea4ebfe2dcb88172bef5fc9543570a75d2e68c4dd10b9f09e8d4b5925ad7eaf60b0b25f5bfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526bcc8d5c9917b134738ada07fd50971
SHA1ba3c146619d61e06bd71e96b37a86b83a74cf807
SHA2566676462a6b5eea4ec6a28a1bf8155ed700b6fb8b020f86f3e9d25dd70d8c7834
SHA512344278447f742a12e3bbf31472927e53263f138320ad983ed6931d0d2483d01b27821b202fc888a3dba9c064cb9410ecf5fca4fcaacdf456dc63e2e8f27e24e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5109e0813942ed95dc8b604db6ebbba00
SHA12c34864fcc7759d325b250f59f33acc7f80ee0c4
SHA256b8241dac912c1307f9971055e6df3e304c201dd841781c68d9cf6530fcb5d43b
SHA51237b65015422f243503260f3488eb18a320d33f7ac73331a149e3e91ef5444694c6d52f960e05962d1975a9bbbd73480616bc6f4739b32926dfe44196ab32bcfd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b