Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 02:12
Static task
static1
Behavioral task
behavioral1
Sample
28fb4171f354cbdd8ede1b9ed6222d7a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
28fb4171f354cbdd8ede1b9ed6222d7a_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
28fb4171f354cbdd8ede1b9ed6222d7a_JaffaCakes118.html
-
Size
33KB
-
MD5
28fb4171f354cbdd8ede1b9ed6222d7a
-
SHA1
1a7a4f2745bdbf9f8fb19c4be43328a57dd589f0
-
SHA256
f1d5f47ae8e2e4acbba267d5830e803b584fbeba361645a476457cd24b1f089b
-
SHA512
6931bb559347514b9f4b5669f714d0b06fdfa5b10cae5acc64f216e514a94d191c2bdf3a79a0367114be6242e15b330feb09966ed6dd368271d14a7af59a6bec
-
SSDEEP
768:wG+q8LD7I+xAl6UhRpluWMPd/XHc5vF0f9m+02NhcuJCMGrmjdlkTWKV6TpryYwi:Xm7DlUhRpluWMPd/XHc5vF0f9m+0duJf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434629307" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000118be29b7218aaae139fa9a7cb25dd20af81ba1533d60516bb8b5b04ec1d2706000000000e80000000020000200000003da141ae35067b58e097be236d166d4d3e107991b0d20f573dd3b280a33a2f222000000059009ea92b4fe0b3b4982af900bad82e3843682a364c7174eb91358e196d549340000000c8c42a821f5d43d97ea743eee7e929b8e6c1f059740762d6f63be2d0c457d1f3aaba6b8a2ba102227ed09151509514e2f1aa944cf94b2a28864fe7fdb6208472 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 003074c5301adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F0C2AC51-8623-11EF-B267-4A174794FC88} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1548 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1548 iexplore.exe 1548 iexplore.exe 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1548 wrote to memory of 3036 1548 iexplore.exe 28 PID 1548 wrote to memory of 3036 1548 iexplore.exe 28 PID 1548 wrote to memory of 3036 1548 iexplore.exe 28 PID 1548 wrote to memory of 3036 1548 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\28fb4171f354cbdd8ede1b9ed6222d7a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1548 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54490e4c98c40bebbc0aa4a0f1208ad1f
SHA185f384db02a52063b46b089ddd348d8332b33c5c
SHA256738b2deaecd2eaa601b688fd0116ec4b8cde0f4f3810f056623590aa1a874812
SHA512972ad66fc93622b15a38ff78f26c6b34849e5682e0163d52161238674cf0740984244f6a5d0508fb7327b253919fb512e9bbf784eb9598a283826d905e31d1c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e1b6366d5c531905ef5900c72b83385
SHA1944c9694d3a7272263f670e876d44d02605ccaf0
SHA2561e8bb8e31db5c80ab5d0bcd22a89b76ad234a8c8fb90027b8144fef8fed7012f
SHA512ecb8e9e1110c2e46475f27ade89a41711e28fd4fc81755cc875f6443d69e88388b43b650da2e24af49814acac754fad02d7a9e8baa78d3182b06f671276a984c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55766143ba69db832f4b93d36c2d3506d
SHA16e1c8e0a1b8e0f897b6e6611cfa9c19406a118d0
SHA256a5bebfe0f585cbb84ac08bb771463fee9032792405462f2201693d813bfb2bc8
SHA512bd272d833a7371f692f9ec25be720e8b778e0a5a5e8319531f299b4b047df4dbf2b46187fbe3dcf5ff406ab7174fbd6b552e335c0077a7cd20090e0db6e3451d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5f6ad0c941349d6b681a0fbf2641d54
SHA1e28de138e73d160aae69f24a250ad6b967ff5300
SHA2561c33d7acf49a46a93df755ca03ddf000ef45771844d3951a277f1e4b2e2f305d
SHA512ec01b99283e77600be5f332355d848afba536748fef80f951a9cbe223993e28d0e8997b4da5569f056e8bf6cf680b189280d73e67f4cedec5bae01ee7ab09c5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57096f46728a9d1e517d9e71ac3e8f6cb
SHA10068e8322ecc02a1dcc3aca49865397936990e39
SHA256f2562fae0342069783fd3adc8aea52ef8032f48b555645e5c37385daa71c3611
SHA5129070b1d38e6c2b89c67855ed675cfc1c7437ff8ff704800ddd253b3c57a4a5daf59e85d09175ede5f68b72689f067c5c6b4c684d26f3b1dcd1139e2819edded3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e1a67c4dbfd32e404e32ca03bf89b21
SHA1abd128b846c83b4babd0472ded6af51b4892d1ae
SHA256272ce0b9e308c5cd63eb8f3da2e4a1027a741044aa60b9cd2279e0a6aa8860b5
SHA5124336b9517e537367bff337434e8549bdae04482f00890335174f8d4c5333ec1d24126df0954acd324571e928201cb96fa313f822657090ba0cad07eb8122eda0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e7e3dd110821c5db724a510f675e07f
SHA1adcbb895a67548f607725b11f44152ef099724f8
SHA2561aec935ca31cfb72226768b161ac9b8e013e9c49678fbdb31412586d66589ec3
SHA512d14ee08cfcfa92bc0eea2c3a48163c5f0fe0544ae32674b9dc2171703e0ebc1359fdade7ae21115c5876b083f18958f8f6ee062441d77513737085ceb3b04b6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5849de0b48830946dfe19f0f476583116
SHA10aea0e65fd6bcf7236a34beb06edc855eb2d2892
SHA256e7b9712a1ce76d152ac6f33257badc2cff0d84ebfc5077f059a6b62490940d13
SHA5122f44aa4c9fdae4a9278364abf7f890b7b821dca1888b11b161ba6193727b23cfad2f6d73eb0d80ed495a23573b09fa2dc80711525d8c995486458d7835eabaa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507fd536b4a50e4cdf2e7c7baaab3fbb6
SHA15b7aba7637d4d0f89d6e339255e35d6049ab2739
SHA256a1788073c11374209e76c6bdb459b429e08554b550a53918a593db230770dbdc
SHA512a6c97152769239ba55e8714f32fcba75836c39e3c62164f27600867f621d7d76eec19a2ebae5085ead3eba8a7fd8fdf535aa75185782623eb62a82d20264d53c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f584896b35d365a6ce33ba871f58906f
SHA185fb0e8c97e8a9dc4598fab09c807565088ca77f
SHA25645713378ad372326dfd27ba9d1c45a3775a17591705cc9a22faf2c255a7353aa
SHA5125eee2503df73d3a766faf8d0d7f0869502cb3d9d1ae7d447b2bf213fe7f5e8b3bf81f3a4028677d661f4961e0010d38092a53685a0ca18f4b9cd719a77cf81ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512ef00eeafe57b9fc695cfcc391198e2
SHA15b25bf028159723378eee92e3004133cb2ee700f
SHA2564bb1b66188ecf1fc9caf473edd3615fa6a1a83a305e06618deda12e62bf22321
SHA51247c9b41148703fc7442e73148ca6fba1fa25e38540cefe2797d93cf33bd52504cb43485657682cd984d46bd5fc334f6cd2a36c0480ad09e24d12f6bfa8374f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50df84b9b6dc0d233842ccb988809e1c2
SHA114b5c4cc309bc8516d5ffa589030e87b3cfb8014
SHA25610255efb9c46921cada36bb00ff14eaefe85ecd01cdba61934bf5b8a83bfc467
SHA512b54c45d8aff3e259424918ec574c0db2a487ea249ee18330569d6fd695d52df65589835964433936f71d7f7b8a5fab1fd381f826b23f4b2b08cc91b251a0f800
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f5a0f9cd49b32a4bcc159fcdf47a0a5
SHA1aed475ead4948636c82edd37c2308b0fbf46bb06
SHA2568df4df22371f676769cb835ecfcd45dc0d82ac8d88a2e3569fe739797573353e
SHA512b6d0bb43c06d0276664e501b9c3f28a59cdd91321de0c96b356c9ceb475b454d67c8864346500462e4e865e589e2b43eda60367d92028a6de7776e9698efdd7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570ddb363da17aded59401371d9a964e6
SHA1776a8f3c8a419858edf50e2cafaee2adcebcd97a
SHA2563537519a859528aab0cc1297f569a6047eb1759ea03aa4a8f1e1c9d43eb88d7d
SHA512e4b74082aa3a793d3913e3bad6d9e2b92b6c54c581f4ff32536f5f3058e1d6599fcbb30213315e7560de876d85c2f5d993e0b3c7363bc3d93629c709158f132c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5526da08852f4ff3444a1cdd1b279d876
SHA12de011c3bf052e34f15d399e2dde513398f0e371
SHA256050294b83b1a57487d687b3f67b58386e53efa0d9c83f176c1a21fd6f1c79817
SHA51274050227179553b9c3f9438e536e8890338e0813f69d3da8f8600d2702e784713aa38105e6e2fb6f3366602180deb033742532eb4e3d10c5067b6cc2bd204370
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537a782c27ab65c0b631956588df76a8a
SHA15676aae5cd10aaefc2f7dff7f5b5e1ef6bdbb859
SHA2569f07db77bd5940eb10a6638e0926dd8d309f958ef3d4ec3d877984357ab0ce7f
SHA512b51ccdafeaccf3ddecd07d5b0960d54aad5cb06126651f16eeaf4c94ca09aeb84fc9aded2310c54e0e7cb5f4e03cb129ac8a92bd44a23d02c3d62ede6491e423
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549ed10813785966aef387abd54f91d98
SHA1fde0430c5b3131294ac1aac87a8330dfcd527ab1
SHA256b9cad6cd2f7419c04ba62c5562b1ad5880898d81a23e8dcc55a52123448ff484
SHA512ce59e719340260bf9a9e5a7c8e602b793d9c2fe65c542aab533eb7984cce9ebcc836cd77b3cdfcf23ad760e02a8731a52d4e81ee5c53ce68d511706b9e0a9499
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7a8adeb4d7a584d9311a44b992e7f18
SHA1eec7b2813abf63be5659d46a7242f3c29e4850d0
SHA256f22add668ab2d131e83acaff5969585c2cf60fc315182b3587c4df788900a76e
SHA512ed5a3c07ca6d2328bf9a1e9ec4e08f4b67ed7f6161d3e4b5eb47a0c20ea3fce0cd20df1f2f77797681fa4dc8f5ac3ad27ba7ef81e40a86803a43529113036ac5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce6168d8c73bd6ac0f17020c35d2ab95
SHA160accb40c9634c4b0d36d0044b06cb4b51ccbf7d
SHA256ffce5a22d3f03d5d59eb5ffcdd55f59835b3d56627fc617048da9413ebfb1e38
SHA51239cc21037b08d6cbadcdc3835ed2af9e2181e9df50550343320ff7d44cd1e070ae516a1ddc899764bf4aa19a5938082d8c86892d2739b952530a10041c943633
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b