Analysis
-
max time kernel
140s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 05:07
Static task
static1
Behavioral task
behavioral1
Sample
2b63abc4a65c8b323332901103b5dc3b_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2b63abc4a65c8b323332901103b5dc3b_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2b63abc4a65c8b323332901103b5dc3b_JaffaCakes118.html
-
Size
108KB
-
MD5
2b63abc4a65c8b323332901103b5dc3b
-
SHA1
694d8c0a3e581adfed6f93c8936affd6bd7efe2e
-
SHA256
af59699e05c0f6abf5987af3f3b9b086946299e7b8fc2d4d1d7a190c5e96a6b7
-
SHA512
1b77a2252d7a804c4475bfe88a18e1f464f2af91ceb0a11cb72c911bf2e1677cd6b20f1fa0df1dd06d837bdbd89465b39ca14a3055fd428e0837777858a8f624
-
SSDEEP
1536:faOrV46BCF05qYlLPciaNhT+QJoxKfoXvL6lgx8GoyfoVkHXl34HDzP2EFea7VGE:wOquhqJEmsVIH2EFvJGojd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0bf90885d1adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000003ffffcb00b501875a77e3cf8951bb9bb8d5e57ddb9d8608ea89d69712e5f971e000000000e80000000020000200000000d7f6397b1dddf43f8b314c4299f6108dbe4bf154e061048406c050b0b79c19720000000331b2c0e81b4dfb782609c1a8086d317f7a66af7f7a8579102e8f0068569cfdd40000000aa4a9a12e4778a5e93eaa606df3282957a19ca9845a4f720c69b3ec2e736bfc122ac494781741f154ed8787d36ea459cd0df413c48c9290f102b33cc6c2bc4c4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B3BA6E61-8650-11EF-902B-EAA2AC88CDB5} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434648536" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2128 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2128 iexplore.exe 2128 iexplore.exe 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2148 2128 iexplore.exe 29 PID 2128 wrote to memory of 2148 2128 iexplore.exe 29 PID 2128 wrote to memory of 2148 2128 iexplore.exe 29 PID 2128 wrote to memory of 2148 2128 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2b63abc4a65c8b323332901103b5dc3b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2128 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5272b10d3aefae82a7eaee1efe7c5bdeb
SHA10a3124bbdf8495cda16ad9b2619962ede8f8bad8
SHA256c25756a985147b35593094968893b8ea7cbfc84a86666d5d63ebfd496b1c0dad
SHA51241dda0d67178f7010cdd92382c90505de9745f45dfd7dec18c78fff00d35cfa19fd040169cf12df34d740d6230e454bceda6b12fd331a087cd1832f4a822cc8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d10a907c8f9f3140aed05c961f6038a
SHA15683c692ab2d2ead406a111de3b8b3e7d5ec0cf9
SHA2563d004bf496ade82a4275654a38d6ee35a07ed01a8bb3a4faddf615094a3929fa
SHA512f48580aad403a2e47cdc260208ba751c775f9d3dbfb40d239acca0bad883e6495c91fd3622d6008ea28d807c85ea3da85fd4655532eca9d07ccf9b76b76aa3f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cf223bdd174f78d2084728ba5c09db5
SHA17a236a44d41887e7133aa4f8f3b606b141308b36
SHA2564cc17599cb0a7fd2e701bd0022d011d389556b6a8c17753223a9bd538a5d0c95
SHA512c403672bad2178f4db1702fdadce02fd7516577f0ba9a23d28b4b67c239b11324a9b625ef4ef2f970f1c632a7e8ceddf81015d0398cde8e28389b2ebbd33c434
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0b75ac674bfdbb2fa5482b3fbb9ab26
SHA1f6de02ac7539a0c95138d58ecec227d955647983
SHA256e17901c0208c8b08e6fbe0892a8c6662487c29d8bc20fecc2334728054179b82
SHA512da9b874ec955c22b81887ca8afe6b6da8940f41c6f3cd7d6f28137df30f340b72cbfb0c415807e178345e09d06355c014d2db766e3ade2fabfacd79367e38225
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7d872eca97175b783cf17e1c6c64c8c
SHA1a32e751ca78072123b248323125e3f8a569c4398
SHA256d8900922646f20281bd268e9020dccf18ae45fd9fdaf19ca8ae39e795b29bc20
SHA512fa4b8c3d6c4f4d0c08bb4f4ddcd6efb75de4937cec3f14bc4b82502d24ee118af9b6ddd3babe1a13fcb2649ad1d2b78eafe5b33e8b4b2b2925db952a0bd8cdce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531151aec64ac0e7873361c4292cc55ba
SHA136cc63c5bc9ad8b3dbee57db27de06974d661135
SHA256132984be466f336782336b897cbca6ca3b0b14670e718330dc3ec1271398095f
SHA512da437f98356b6c03c2fbd8f9e9be4afd552504d6e17b9825eb0b23c060ea2aa38c2a4df876db900c8fbeed06022979f295fae3997445336c710db059fccea59f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56da9d15b28379311d8c0a6e726fc5970
SHA1ae008b2681d98e90236dfdc9c135ebe561c32ce3
SHA256d26c02bfcf19996a8e21bcaed9c6e0f756bf6c09af50942b397e2bd93b430889
SHA51222990c580419a9a9f79da792555ee29807aeaf72b2a729c890f604a082d89c6db3a19cc8a4adbdd51c52bc76114046917fd8856c7b4d09713bb142719f157f3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f4eac73f8ecb4bc3e203f57e1c05ce9
SHA1c817ee5f0bf13d8ca774b09a38d056cd9c2b48d5
SHA256779f68607588fd720b87d462847264cbb9eefd4b208d7e7f0de83c95940c4c22
SHA512c7d5f64748a37f008549cbe16b5c96d6474700a91e32a48f5166fe22d9079ddeea02f1cfaf6d114a349c76c56a924b010376ae4b7155cfe677ccbf37f3286b9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a93b044a64c5a51338cdf4314d806304
SHA188476b8b8099540027d2f4fc174b95272654838c
SHA2566be0d2156cb3f91b315a403697ac7250f1e028aa92367e88a1fc8c963f7d0871
SHA512d17483737c3fb7b5d7c85a5c3a8561c20e20a1538c86ff8c2c617473623af0929acacc423ea168b8f35b7ce70c8e4e2de53568c273679c95f4d4a744eed1e283
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ab6e29ffd668b92f3462fbd8e0930c0
SHA18386691b2225bf2dc2ab6f01ed9931d1c15b3614
SHA2561e89ecc8149fa7372965dcb0c85c600142ce8bdcbadf88f8e9dfddf91e74a04b
SHA51285b5beee9fb287bff1356431837dbcc3ab3534e86f9fd0d26abcc3c8aebb0160c75e6d5d9b5b5e6a40c39f10dce29e10a68bb920fbaf3b46a9e7d839aabef0a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5342b7a58c59eac27f8e28ed619157e64
SHA1c9e5a8c11b826aabe20ffeb9ab2dd71575699b13
SHA2568e2af265c280a83c5242236b00c18d31c1a9b7f700d663426dd1d34f01b50323
SHA512ee44a0874806240467f0a74882a4f40a50e2db44c0821b056c3cdb187471dcdffd7f28d980179eb04eb0492779d10b33f6ef722f8817072f7443800afb54210f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568ae44a498b4570b9435549f481b4f71
SHA1f4258ce001fff63f169d8bd2103990a093a67182
SHA25689a295d043dff896c8405942183f2dac295191ec733006bfc64b413b71cf7c6c
SHA51223011b167d9bec4f3ffe7cdef55619cec8b5b87f603b4d982505e5c9af4a3a7f7c32734756b7277f5c7266ad27c16a9b844ba96fff11f3c8ecb9002c6d963b62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5301e25a8ad11b741c00671689a10beba
SHA165523997619f0eb316ea0f4dcbfb68484ccf2b58
SHA2566464450c2283741a5eea334de941bbc71879002f0c8e0ec1f669d8a7384efced
SHA5122c302a6c742dccb18397fccbc38a6bfa2dddfa65f55c85fc093abfba81fba91e1b3e80322b798f33666d430c102b3100802f04aab0665267c1341a88120b2cb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585b5377db9be9a180d54ba37a4e93cb5
SHA17caef7dc881a10e18649369ff9b40c1d2cdd116f
SHA256a6ac8d1539d63c1e2b74b3fe30e12f23dfa8fbef62fba317dccd1439ad6f4dc6
SHA5125e880e793a604f3e2db9eab5a360df30c3606a8365e53fa33661056307b2c5cfe7b741e0ff9db076ca48926d9944d55eeb14944bbdcbee69ae4e64396ac23e15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5460f18913760ea3cd8960a85fa0497fe
SHA1c7ed3e6ba82f313c60e8c38e199ef83f915b6816
SHA2565c6e1fcb54400d31da87eec2670d0c46bebb0112d74fd1e3d637cf22bd0b8f79
SHA5126108aedcf5ed0664316f544c416ff41106008d982062b82cae55b4e2219c9ec9257556b990173336ef5d0fa79c97e7ab517286d1353ed79426cb681b1475e54b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50009285946e41ac5ae4a2b1bf7e8643e
SHA10aca303a3ecdab7b911b193f5c5f9c9f548a7b6c
SHA25611dd50af4308af5acc822ab45eef9d2603d40611e56314f2bb3a85676a911573
SHA512d2ee7d42a6aaec622f4f4665aed773b3a62ce0b7b442b767c965236965c80c47d46bc4ae07d49e96a4ff0741ef750c18db4e4113cf25de0ab044b878a137aa7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ba8ef3fbe5e27f799f700dac6c90857
SHA193267e36d824e3b5f8dc8812ed3172f8df321164
SHA256985476a531859028a32ee32bb7e3b48b7de2e4d5e9d7a15227fd092bdf22694c
SHA512dce41d0c7748656e2faedd7df34fc3322ee13b400a398384aa454c9e677b10db39f02cf702cab320ddb281a1c5239d91623b7e3318357910ea237a2906be7d6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af742ca569ebc05891ffa6fcaf9acc7d
SHA1c6ec9dbae409f29bf18f84a14e08d6b12556f8b1
SHA256e3170a6ed5d33f20ca5be58234775dfd71f6c0651f5717e668f81806b1b4643e
SHA5128f6e887175c57850bfb68fd3c59dda145b7c97d19bd3014ceec1f57c5270897ea2e470cdc1f3cbe0f7313869bbf5e23a4cf200d62d637a6f23a0158b7fe5449e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b