Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 04:26
Static task
static1
Behavioral task
behavioral1
Sample
2acb20600a670cca6f5b55734083e578_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2acb20600a670cca6f5b55734083e578_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2acb20600a670cca6f5b55734083e578_JaffaCakes118.html
-
Size
12KB
-
MD5
2acb20600a670cca6f5b55734083e578
-
SHA1
3eb378fa73209aeba5dc737f7668a4260efd5216
-
SHA256
a429094750448610ecc3924294830f473f267ea43acd6365ceb0016a310422ba
-
SHA512
ab036437725ba4f05edca88e252fd92ff6341f32f3d9a9fdb279ed1560c71f894ed5cbc872678dbd46534849cb9e96d9793f63b816a34777b50ceb302872df5f
-
SSDEEP
192:SIM53kOb66D4Fw7lKAkcRgWPoa52A2cXrtLHrRc6RtNyaW:SIJOb6XFgKAxRgWPoZXcBL9DRXy
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60c692a3511adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CD724961-8644-11EF-91A4-527E38F5B48B} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000e0e848f61e11391588792b1911524a130577775d8538b7da66799a78a6c0cb93000000000e80000000020000200000006efd7da82b1db153b107e8709699d081b81a7e423850f01982596052074aec3190000000f61c25f986c87b621444a482021b9a19ad22ba675d76bb6d40267d4186a8312bbf687a15ec4e018eda3d8aa3ef35f80fc058ebea9f588a4d823f167d78ecc70ab00f029cb2fbaf78a43002f1caf4d4673884bd01ee15fe5a22496a05347dba3a92714259b8676dac748483125bd1c6481c9a0a0ca55f27777c7cefa3944c9457bf2d7be2d32926f20a3addd74ba3c5e04000000097ebba0aded7b394e7f4a9b1836499ea558f9d398d835fdb46fbbc5cb5f526e1723b68b12d056ea3d0aacc6ca67544d6e5ce433bec1123bc7b5346dfd957b669 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000000c6a6116c0216f895c5df610ecca23a69404b52419495a51699bf6cd96b18a000000000e80000000020000200000007ace3a85b9d7152a80f05898e685998f2bd16af98274c85597bf6a766f7737dc20000000df53c86b5f1aa8c3a419cf15db9e1bda920e66516d1d39f97af8ff87bd3e104f40000000a6fa6de2d5ea5d24d3aabf622bbd7b724ca620fc295b5f12c3c6d095e9032fddd8a327c4918c53130e57b52912a83c9f954e4e591486401ff5ce0feb21d53410 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434643422" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2784 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2784 iexplore.exe 2784 iexplore.exe 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2860 2784 iexplore.exe 30 PID 2784 wrote to memory of 2860 2784 iexplore.exe 30 PID 2784 wrote to memory of 2860 2784 iexplore.exe 30 PID 2784 wrote to memory of 2860 2784 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2acb20600a670cca6f5b55734083e578_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5291e963719951417fc443ce0c50093ea
SHA1d60675faff89804629b99b4aedb366f8d5efb215
SHA256efa52c01c445d2f7c5465bbc6ae953537aa0dbd024bb05c7276f3cc48b41b9e5
SHA512823e56f51e2936a611567495fe9a02875a1741ee68daf5bf47deb1d64798224c2091438df59a90ceb3719a7a558fc32b12f1eb0956124c9533c243a278d91772
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab79082bbf43067c3810df85b7971f5b
SHA13af2f264126d8f0fec91fdfa6277de84cf097200
SHA256abc2cf90a25419a1021ec4ad428806d3e48cdc2a8a2df3d03a88e004c144bf4c
SHA512bd45f8cda9cef0754c3ff4cfa6075b30de5eea2b4225f6aa03696de07a44df4dea0eade67283d0107070adf243cd47c08e02b22666f4d202528db179637159b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ffd55b2012d706bdbeafd7913fcf21a
SHA1cca4c7afd9e592903e857b7044120eabb90efe62
SHA25646a55dc3ad29f08de777fbab3ed2473f2a4e6a695948c72d14e26a7f050aee0a
SHA5123b2108a75c3003deac538f4dea9bf87265f9492d7f9659f404d06123a2b39d6f8e1191f03f990448831bc3cd2334d5693b16a858dc1a68fa7ebb4119e5d97f1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d75f11017b5d067e4623372c397572a7
SHA1ad604ae5fb9c1175564404ee3674ca27e23b170c
SHA256ed92df09c7e413a3d3b67bef52ff17e2bef279324ff767ac6c796e73359e4446
SHA51212546dd02f9ce3174f1f06515debedf125303f33c908f60337bd02f875bdbcd56253246c2b757998c5fee34f6d8565ad52dafac84e21716962957549df3643db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581ead4b162dbeea5cea064c5173492b4
SHA1b2862aa88af7a4fa36bc0d29a2e99637c0ac0caf
SHA2566f68ca64f24e501201170a4fcf0ea789441dd1f407637db8d6225bf7fa5a8a91
SHA512e9fd141a1abbc7290934f38fc1473db5c510c91e3495db5fb14e382ba3aeb4d9c26664cbcfd194c797cf98ccb88b68c057f0f9b489a8cd35f95a844058d15dc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c36c2a8d99e42a36129c930761b0541b
SHA145d277604909320152e22b8fd792dbdfeed231c3
SHA25654724102eb38a8151b943039794403e2ac821194321fb1ec1419b97725d64269
SHA5129b55792af2a85d41d88f79019487b7c04981e15003343c8ba153677c5f209e04403315e2d546f380e8a422e991e6097181166350a32f2b5bffcc0bbe7b083fe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e5414f24aae02fd275719ae6bf6c3e7
SHA1f1b9e453d01d5fa5d31a27f7c82c396aca8e390d
SHA25628088f7baf923bf1198a633895847381a9f67d172d6e566ddf2be4f0e3854d2d
SHA5125a41af0e58745ead28f49a8e97cbeebd45335e673b1a772e005ec3b4597b2985fbfd5bb3cb404e8a80b9eab5b253b47ad9a218ba272e727eada14a0fcd99a394
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53922cd82cf51cc3b4a7a6e98c6640ff9
SHA14abeb7700504fb598812248857c2b5f99ccec292
SHA2569fc6147e50757f8eb505498346cd63e599b534de51354ed2b4e954a354027366
SHA512bd9466b4eb3ee5d1783a27ca562bda9222a7c7ebaede42425234dab51061236ca952153eb822403c163164bd75291932a455d387e93f188fb7cad4efab1270fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d430cf190aae77d80a467727c6fbee85
SHA1d9cdf2178d670b51007f27cce9a2f3731c365a09
SHA256917188a62d3ec4e228cfb45ac69b58e7851b2c8ad7804caacaa01578843f7fb7
SHA512b2ca975df7d5c20baee20a121091f70155709c656f46640ecc92745bf075aa03d3249dfd3384c457939a9ee1e455dafa0c76e17f2c4ccf34fbe74a2d1d4eef12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c1376c050023c5aafcf9022ce6c2fc4
SHA175fc6cb21aa04d020855854205e4ec5c2f878303
SHA256d66ec5d62d88fef5072b426c4346b8325d93447f9f6e1f0c2740c15ae8ca39c1
SHA5129b27ec003598090fc7ba4e0383f2d16a966311954660b4bd112dbb38d49e2f636b0d2f9d858fcbac05c7cdc241e5e440a79be5e4b59164dbf7f1689e3135fe1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f54e9f79a90bf2dee8ef0e64eb4ca53e
SHA1b84edec67ddb70a3a0585504477b96de39dddf0b
SHA256c8ef76f5624201a7d2164132236824a56e0e4cd542df8c94090440d3b655898b
SHA5128dff69c6f49cae1c96ef18f762d11aac95c67c98a9cf4a853c9e4c4d59c92801e5a1868b853d558fc337633f2ca64380cc3e87de8ea40190448a6c11b8defffe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa3ed8df6c79082a36034712f736e6ac
SHA10bf04b1eedae45421c5c29e413ec29b1041550a3
SHA256ebd9b9904356151e863e90afed2252ddff8e58416b691dffe6e0ea2eef5a30e0
SHA51234c565803253e6811bb7849523709516c6a487e653872afd52b760533f8d98a14e759f9d4e64df84c22be831156f06b86c3eb3736fe520fbe7cbe0914ccc01ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ca019675aac86b47e881473c6582fcf
SHA103d4b8a72bc3a45387b2e294b9778f11094d898f
SHA256d13bb103ae90c76733f70755ff87b00a766b9f335c63a3ce083b61348feab468
SHA512c935b8e033440b3a33da395f957711f8993848b5cf6ba7ef294ab45d183f7293ce06d53fa1d975c96d2d2a433578331f5204e1f20b87b9cc4d67a5060bd73308
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523ec719dc32a8e244c6ae238f900a4d5
SHA1ad3ef28ebeb404b6b2595df0565a3fb23fd8aa2b
SHA256ce54f541415e653b802461f15818bf38e7730768fcabacae950b46f1b8eda8ae
SHA5125397d871ea54280f8ecfb06bdf8df093bbe5744e8c5ceb447dc0a1fb6f449bf0e410b57183e20b5e53cf8b3d5971913c14c4b318df18961cea9ee72e2b1ed11b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e588be0a3b250a0ba7a1200759779c3
SHA1a927ad7becef7c1ed0450f51977100e8ed2466b9
SHA256dfbda93acfecbb29f9087885a7bcdba7bf33f25c18fce41ca6301f17969a2719
SHA51224fb2c8fb7df85ff8d56594199c46cf173e18e49ebd3da104d20e109e695a55d1800641bf36b88af4830448f198670907310436d2c9a759472d28dd20411e6ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500ad4a83827a53003d0a7a959a678572
SHA180d2964de0c3def5c2f477a7abb431cca252236a
SHA256b9c7f821f7098d1131c97d965f3d60eaee665ca8851191d718dabe6971dfa869
SHA5122c4287faf5716e44cc60af440acca01ac08f0be9749a9efef5c0f68d8d687623b83ea30aed7aff4a40170c960add6aa311a007925f3b0e3d0b7cc254cd0ac932
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca247d969984112b5add1de2c806acc1
SHA13026d7ff453dc77a73470ea0b18e7d5b404aad6e
SHA2563f8929b0f49e509bc1c816db126c4ad440c5768b02f657e4cb0c3882ea71511c
SHA512b3dd4f3e5430b7b6dfd0320ea221085bb9ea5fc9275374446e7eea3f0a8b4d05adc196808320260321f0eec18471817c055bf790513be9c3c0f8e20a591a9235
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6b0c1259b16e8e83b8a5d7f4a57c40d
SHA123abaac27d38e78323b71df2a4fcba6bde274c3c
SHA2564ca744b075b19837a6d79c3aae019fba5dbccbb5cb2872d8ebb11b2bbcd7032e
SHA512d737b87e7615f7fd8dd027e17c12aa3a9bcd4a66d6118ad75e87a868558a2a22fc09d7da02dea3b03e9925ca322bf4d65c19186ff9b1e7fe02bfcd0b11bca50b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b