Analysis
-
max time kernel
121s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 02:01
Static task
static1
Behavioral task
behavioral1
Sample
28dbba6207fe5f602de7c47e106b2b09_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
28dbba6207fe5f602de7c47e106b2b09_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
28dbba6207fe5f602de7c47e106b2b09_JaffaCakes118.html
-
Size
53KB
-
MD5
28dbba6207fe5f602de7c47e106b2b09
-
SHA1
ae9e39d6ec1ae31f3030a57ecdb767776b8c2340
-
SHA256
b34832ac0982d9177bb97a5d5b2fe230083f79373e4806f994f07ca67141aa25
-
SHA512
cc413a8529dea173e41c5c33278d546d8440c3e90992e39835b9bec1dcc2b6a569570248bd62e018eeeb8a9c6efe5d0a575e2d00dfff79938a8900d49ea639a3
-
SSDEEP
1536:9kgUiIakTqGivi+PyUOrunlYS63Nj+q5VyvR0w2AzTICbbIoP/t9M/dNwIUTDmDj:9kgUiIakTqGivi+PyUOrunlYS63Nj+qB
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434629215" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000007a355eaba4ebe4b3c04f7d5cbb2942ad5927df29435f53c1632842348f893c53000000000e80000000020000200000005afaa83f91a127b6d5de63fbd42da1b072b750a83dd2845f88eaaef8d279507e20000000209e9353427817aeb77712ffb853606470f3886c7991acb870b71867bb085db340000000af1c219911f9e4e31356000afa47553e3073d4bda27c11b22668fa14acfa6b2bb58e943934e150c65bb8e02822243936399807d1a80d7ddf45fbdb97b2e89390 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50da5a8f301adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B9F4B471-8623-11EF-AE95-527E38F5B48B} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1868 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1868 iexplore.exe 1868 iexplore.exe 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1868 wrote to memory of 2784 1868 iexplore.exe 30 PID 1868 wrote to memory of 2784 1868 iexplore.exe 30 PID 1868 wrote to memory of 2784 1868 iexplore.exe 30 PID 1868 wrote to memory of 2784 1868 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\28dbba6207fe5f602de7c47e106b2b09_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1868 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594b096e314728910bde3d3b2b30fa8b7
SHA15962ee03039b277857ae35f8224b6d9814fef38b
SHA256f118f88858d5d479c4c930356a2466fa7841924f70c7ee709aa8254acee6052f
SHA512db64c9d578ca2ab70b61aa5704783c2f904e37c9450c7422734cac2066d7decaaf6eea74d30f433fdac04a6ba141c013ea16e3dcb00b394ad890cd79aad9454f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc9b6690cdc64ede8f89341140512314
SHA1dbe665de4638bfa5e3eb53acb781720ec3c1cffb
SHA25694c36df3c2aed776f0f6fc20d87ba5fedaf2a7f9c76bf3550a40599336630a38
SHA512a1d57da2753a52a9540aed810ef4cd55d0c692ed5e671cce12c512656384fd6be043e9139933fb0bef086582b2a54a342942f5b94b05be8fc855010ffa72d773
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581894a8913ab05adb9c553764b579b86
SHA1defe6019de7529356a941f838a51541704663266
SHA256a1a4d9e0b7ded32299719f4a32c22b37637dfe6a33fc1ce0a1a37ea45c01382e
SHA512ada5555e28dad363689695d4428d32fc43740cdfd74e407706d806ff5cec1da9d2df0432163969b2c79babd7f63a07c77c747eec841b367e2fe27dffd7c27d33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bd634838b8c8d67643a3200070ede1c
SHA17b828365b10882ef5fe2532ad38cae1b89854d27
SHA256d4c8ffb337cd4e49e3bfed6350138f19ad7bb3d51897df882f14bd5a8be74ed8
SHA512b49cb8d7125ed7e98d88e6612118db7df70c2bef743bb8cf8ad07644b360ee45996e5340998a642cba23bcde0a9bac31db2df55ddae6c418a2c3a2bfa1352fe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c88a85c2f9a842cb39a535b028423fb
SHA1ec6eef420093e2b33cea0adb125bbc1c3b8cefff
SHA25642451290f4c358d5c3fe5b478deea259ff844fffd64733ac13f63c0e6b0d6e5c
SHA512b90ef485a59f0e7e2e0c439f7c4bc0d8ed19d6f1f6c36a2e39f50f9f167090d903467767d76bb290d360769c2865b7965ee65cfbdd8854b67fc0c7b8016188b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561454d91e3ab40a88d88029ffda3104d
SHA1376d2afd72679b5600daacf5d5c9b51c78bf0bbf
SHA256b0f271e09ae96a52dacc6a84e664a6a76252541ff89eb5eecf1665f416dfc525
SHA5126b2b51447d8ff1dbb776877769a610b745036847e1a4b50c8b98d2629902b77087f296319a1f9a2f2a9a6c001ff137c22a13262e18c440840e12ac09a2379478
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ecad5b716a76ab30319a590e78462d4
SHA125cabc22618e756055488cf4ab487b800120325a
SHA2561f25ad1301bd202886c711236e90fff198dc4ca7644c948dc3ec80cf107ca08a
SHA512a03d15c471a36ad82702e0fcc9259f0c472e677f89efafc60c747df0e23278e52c34089211e4984c8e7e8bb52dd47f77a434110c1d7d10af604d3bf42d6e43c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57261237668c28d4c098986d460f5d9b3
SHA1e283a2af807c11cf7a515754108eda95da974466
SHA256b60b02d8a0f6b8c94f3c5a007d41b37cd2617eb6687a857bf668a1d55ea73607
SHA512f37b41bb7fcc89d1f5b7736e3d1be9cda710e55eaad369248343616a758b414004291272a8e57f8fd292bf3cdded742c4f79d994659b462b640bbdf6b6059d44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e65afa0ed26c9eea76d2e9a57b452b8e
SHA11115dfdf62414ab45a8c8fe5b8ef9f76c922de29
SHA256a10153abfcc101f449446b1f7c031846d731f84ebbda42ae29dbd422025a0d92
SHA512f8bdf06458b2384a022f1cf355d8f19978d629f784a05a97bdb8e526a36604e0787952704820f17ffeeda6ab0f1da4357a6d76e45b880d72c6d3b9626f40521c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bdd1c8ead3f117a33b6c4bbdcb633b0
SHA1c6e763f076359a8592eb54a6bac7938e946d955f
SHA2566bed4987651f33f7b262b004d43f2764c0e594d1271ac505434940d262273ef0
SHA51239ada33a0fced10aec535663c9a2ba622d2bfd071033eefa486f7556bf2ac2eefcd424a7c77d05b7c053479d40f6e15115c910acb15d9f832018b8bf55bac2f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ba546c3f78618932bdffb4b797f8cc2
SHA1ecc3fd3361e2bb39a49b4d0f57d240da98f579a1
SHA256cb9757377386ab2d5a24400a007264e6d292e02a50bc49c0481716956f3099cc
SHA5127f12eb1643c4be2d8237d86bbbb212316353465964392b09d9f96b0b3ae37c8cbf75b961b2e3943ec177e8adf03e164479cb09bb7e92636fcd359eda616ccc3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db44f38acca13f615f5687f9b4e46f4c
SHA105ef1f905af055ab7a35ec561f54326a90fa7966
SHA256df4dc94953d39d947ae821c2fad1fa4888f24a1b9203307f0c614f0d6eecb3cd
SHA5122727390d8fb0c0525fc875a8c19e66dd09e5e0b1e71dbdb31cc827c1194befd3fd130c35a6836f957fbf8569e5bbdc7967cc882764c69b46fe8c483b1937a8e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b2d0d39174ba9ee24e94f7bb71736f4
SHA1a4e9ca465c6a87192197505fa48a700cdbfa1259
SHA256c7612cf860b4a2486ec6971d391addab393806d17da46f3f751bbc12d2de0c36
SHA512e93197445eb8a587e80ecbffe3338a9b9ce9738885f63a6f7f931fbc32d418ff6561ea63803e42241e2dbe64ca75ea555d5523e879c29408b14a08aee901d319
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5542dc799a33d854413443659fd2e7eab
SHA15259b243d66f298782e336fb81c241e39cc38020
SHA2561f00915e402f78d2d6ce69afaea912e092dbdffcf9032af04f72468f74bfa6ed
SHA512d1f114eb09b495ab12bd811bc105bfd30332e9170b60ed86585ca7240690b08114741a41690c8c94c29b0121c1f6d5cd7895f39091f5276b3e8d3d02cf2b640e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533a5b86342bc2054f808ddf8fe8fb7cc
SHA13552f558267913ac5f368a1325d6c46ebd5095ca
SHA256d507f8f15450769447824df6bd3c493e9be23be57087894431656671170e937d
SHA51249912e072d10626ba1841eb9b0696979005b9cfdb598b5a6b82e96a8c99b1b7b20c342d18141183199a92cd2a104478fe165142a051beebd71722d5479132561
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c3b3440f103e3c245e855833cd8b9bb
SHA1b52493d84e415d27e12bac8e62e7c23130e02608
SHA256793e7fdf9d606e6924631578ca1fc8455e0d4da145d61cb7037fa63c5416f87c
SHA51225b3c9f7825f61565113ef5d4d974f50b9b5e70950e1597f44874776b8a9a451b7336b6cfc8964fad3469f3966d229cfa9d527b6a60bf4f822f1110e41aec8c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5544b99565a1d22d6227c2c25c0047455
SHA10b433ddfa56df8dd6456f6f73db4d04e2da6507d
SHA2567db5e1d64bdd3079a27f0e75ba9138b44b7185f78a6f5c44009d11e314a5c989
SHA51293efa940f8050974c07b50c1cf154adf152298771465e0c08b1f133e6edfb0c15a2d90ada4705b25a33a71428fe09b28cf8dd32fd7224ef0466776e0557525d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ede540f2d9ca0e4eba84bafb7efd494b
SHA1bbae8d3452e06835e775a3abde203a6038795871
SHA256a945586d3b905132158f2925f73fd6c380d33a82f8c3b1e32f4bd3b1945fcf06
SHA51268c0e65387cf768b9d11ca06cbd6cd1d77955017768d050b90a9cef89080e158786d266b6529f734367cd1cd13e453e315c68576c8bab2378022a5ae112512e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c5d9f41e3b9571cc3070b107d02489f
SHA18f1e425f920337d74eb04f1189e3ea3f7bdf46a8
SHA256fdda8a62938053e9674e14d0738a8f7c5d2b5662bb97340c571bcff2cec585c7
SHA512afde9e4f199e46b866e902ee2619a07bc6df541a34af5718e3ad0751bf479d8b3b2cec0f20bfa7d5b75860c9bd4e3e05d9f4b5079f61237196be9abe17fcf715
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WCATT3E5\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b