Analysis
-
max time kernel
142s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 05:43
Static task
static1
Behavioral task
behavioral1
Sample
2be4f3dde70062b4516a38acf94f0a10_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2be4f3dde70062b4516a38acf94f0a10_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2be4f3dde70062b4516a38acf94f0a10_JaffaCakes118.html
-
Size
18KB
-
MD5
2be4f3dde70062b4516a38acf94f0a10
-
SHA1
57f44f2283b3ca197e2fea20500a2a1d9d6ccd49
-
SHA256
a1bb793c1ef2b02e06a1fc747c66b2ddfaa6665b074f833212d12ecdeb0ec93c
-
SHA512
d7c0afc5b781353a0082c541aac6dad6710df99a7b0287a0f2abf37ae47cb7a13c7b0d7a4600f2f890b8632bae1ef7b4dc358676be3ccedc90dc86a90af5ea2b
-
SSDEEP
192:nhkVcsZd77uE5VJGxFCiJFvH0H4XBL7zv0NvtrWjoZGHcdZMJUW1iwRsC5+132EY:hkVcsZdnubCupRL0rWjoZGHcdZZ5mL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a000a247651adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{662670B1-8658-11EF-AD26-C60424AAF5E1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000097cc4c291aa36a93cfd6a02806ddcb490fa8bba5f34b990f89914627506e2195000000000e8000000002000020000000fa16df2392c0986b1f914c8507fa356722775e9449c9473d1624ef549d50cf0790000000d5317dd61b9665cc8f587cd23ca5d481fb01d1cf1c2fa2f683bdb07d93acbc14de717e3aa385e678db2d65be1733e886d68c891aeecbcbb2385173d7ed3704c32e013495a19b04f3477e0cc10fa52ca0be2bda42c6eb157132d766665eb6d41689119a8331dd9adcc433a919f98575cc329aef0c8ed4c3d8fe1fe9b35fe01eec15a491883d76aff99811b9c5a10b159540000000e6fc8192c3de4e5380e2d46facf512267e4197f13cc6ad8a7d41dd90704a879b76f475b72a74d2ba8d80dd95195ae81492bedb02a3fe695ca5d42b72a70aaea5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000458f03c5a4a7c448dfa5e0cae1490d27df981e4e45f6401c2c614d5ccc389817000000000e8000000002000020000000dd30e064b0d2bd34441266c1a23ed692eacd9aaf31b24064a808526d61bebe9e200000006842bedb43968c56227d6deb32b04f6002cb475d5ac5a0b2f549ad0b78365f9540000000d0a7400a53eb08878c7a6dfa0f78e0294b94843c4d190723870b64a0a359817cc41310351a6a97760f667df9615745a44f21d3884f57d8c292f7e69242b4d3bf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434651840" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 2280 IEXPLORE.EXE 2280 IEXPLORE.EXE 2280 IEXPLORE.EXE 2280 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2280 2240 iexplore.exe 29 PID 2240 wrote to memory of 2280 2240 iexplore.exe 29 PID 2240 wrote to memory of 2280 2240 iexplore.exe 29 PID 2240 wrote to memory of 2280 2240 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2be4f3dde70062b4516a38acf94f0a10_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a0bebf269909d24b999eede7b870fe1
SHA1210ca98d93c38f8c7df815307d01c379bd6413f1
SHA2565c13233a3c62ab747cc7d4370fd78057d7f6a8b79f0ca85ddb597cf4b40bdde3
SHA5123af05ca12fbe983b34c82fd99b9a7172f44d26bbad97b438f873a39637db9a7d072c6a867a0e8606d289f999de6e0a3bb946335e39efbac5316675494f9a3109
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55313d8fd38c132e4ae4e669e53786a81
SHA182da212761806500abad448936cad4f83872d68a
SHA256afd8dba48133a6d7d5ef24061d282b178c73c4d833a15675e7c2bb79788f911b
SHA512bb4f0107bf19c6d27bfe01a932018bf21dd2a5a3e960eab0e383a76defdb1912e2282bf9bf5caba82bca4c7b96c42f9940bdc4f44028bb635fb6ec887ea942aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e53f700b55d7b8c16e4cde6e6726b0e
SHA163e8bdbbe0acdf0f162aae67df5df0f3ff43cef4
SHA256c2f7770643a4568db2734815573b1eb52ad2a2522fa64f0f6972eeed76463c74
SHA5123b444b435fbd781d92cd59f3a2f4dcceb04aea7ba08a4407b2deb5c24506c89dbef911777ce69405115ebdf3feae8200f6d99ad937d56cbd24ba2795760a5905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dadbdb2bbf7282cae41bf0f1100e2327
SHA14faa0383e7b098b4d06ffffb2e8dcf9cb91fcf57
SHA2568799ded9d82b2609f18d93959a2a6e17825b9b418c2a49b1efba4f14402f145e
SHA512f76cdb2a430635cfaa291c7f81b2001e72d4c0b3b6036242b910ad2443b5ea9ee5af4ce58b0f8cf22e6ad8e6f130bb42b02406f3e06b8abbb62a52d9437f61bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e8633b02c863d004c9514c6afc67413
SHA1691de3a58a794bc68b520bdacc92939e75bf72dc
SHA256066b599cead8a268e183125be2201830e00b54cc4c487204a8d34f43e517cff5
SHA5125a2ac04f296eaa96bd543b16cf14c1508a33947af360c27887690821d5bd8b80ae3442e6182a5d2a9af35d7f89e4dc978011ec142b55b2e958c76fe3ec4941f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5588f5fc3a22e6bd1d69e1c8bacb8c12b
SHA1ccce9ecfe8d21a4a4d761731b8a8e6d821b48fef
SHA256082fa85972cc217db5e95ebdebf3298b1ba965265b878f43d8487e765c2b02e8
SHA51270a316d7bd98253893a68e5f5db7ffe943c489c0f2b529167285099a8fb4cef84398c13cd0f0a0305f06ec7c44fbb18d0361beae3bbb56ebcc8720260224b196
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556de7a1903fb989bff9eb7ad4fea0c8b
SHA152beaf0fdfeedb2d138165393b75b0a67f189f8e
SHA2560076fabd1282b0132481d807e377c94c36117f7311d77a399ce183b641f356fd
SHA512f5536bbe9345383616784483ac247ecaeb27892a9c71e9b48d099d8cffb4a86842b541b17141bc838d22085c126c2c24353a3e3c9a280ab922a221a6f30c50d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571afbd154a41d6802fce707ab24e02b0
SHA11ec1cd63f48b617070aac7abab33cd81c9e9cd2e
SHA25683fa4b64e1f4b87e3e859493ff989d94eea9a34ae7ba5a3c8b1530afc53d6ef3
SHA51295669aef4fc299946e4fbdc92cfdc757973f007042749c5fb8ddd06411ef0f64c9b33c98d80adbe50d75f92beade961841e71df0e26a5f555580f17638d108bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e7e7cfb77c91e9b61e31129fc434ccf
SHA1d03eb86af233d73c79359adc96904258038e3e25
SHA2562ef2e3d6b343142a7f3072ab5f3368368fb670f5e6612b1886c26e6d4a714c53
SHA5120b3d94724b9e3415c0d9c97baa5e52459d192f2bbc8983cf3ae4414303421f2620284f1f36d7608e62781aad536b6f92deb33a400a9dbda1acfcb3d3f4cd1d07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54059e1a4880e5c800a684ee45da6d28f
SHA1410023d71e00d35bde45f9b7e7659632e016767e
SHA256c246a31271335414f7f3cc808a61f1757b09f4fce6f1c7259c3a667cf8a5a760
SHA51234358dd84fd0b31bbe62a075618c3066bbe5df1140851a0e7e78ce43ed94d320399367a5e9ee24ac544423e3cf7e9fa4d817cf8ffbcaec8d2c4650180acb7b86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f9e333adc5f0eb73f2d74db0f8d85e3
SHA1476c722b7132b88dd734d3f65290e9fee7df31db
SHA256614be432fe6e29d11d77239926d4da1f1d60062894023f56f02b31cadc6a97a2
SHA512d1dab5661fedf38ae218575bcb80de2a7d0eb19dcc0741b7751efeacae80af22244449461d571b28104beb06d8125d365e22d4f240fe0a8fb08d7b9ce90b603c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a1ba01c5e20dc325ba6b6903a723161
SHA1964318986a61160528d970154dd8ad0282fcd012
SHA256920eb8a7f8bb0c6009e837e0c02351773d56c3519762a9229f96edf2d8a9243d
SHA512d9c730edccef81e2e53aad6db21fc0c1582b58a948fe4313a0ca5da2957a2a7c760abd039a8c4beb889e5fea1d942cbc4934705dc83b67668b6595acfa6ef802
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e61d1de8fb343a4ae5ae82d0a1cffbe4
SHA1fd754253c84835baf420d79d3cfeca5e5a166244
SHA256669fd2001f967d8eb367c28ea1c880e0369373ea0d79d9e6b9f7f306646134b5
SHA5128e36671e4193fb0414eef18cbd8747ff95caca735a34bc4077e5cf3d421cf6617c37fe57532796b62b2020693ab495f49b5d8f863fe4d4966a388ae9cad09842
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a70429dc1980d4b153d49112cb6c502d
SHA1ec45e227c843c8bc982fb401054d47d23eaee38c
SHA2565a7621b34d5a2f12a92854f8a1c91c30bdf3a61adc17f7b3bbfc23e6e4cab243
SHA5122e3945175def3b0352f862969b9f317446c9420ef0d1678d212de2e52c5f79266fc15c17d3a27e0081d3c13aa073d87b8275efe05fa500bfa1c93ea933dab606
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccb681b4d29ff0517b9a14e0737ad456
SHA1f2d0aa1666efc16b92b55ed3efac4cf570c29b1f
SHA25626066e369016854b72a972f1f89f3e17d2320d6262765a676d1fd611b97de0ac
SHA512c210776d39374d1ca3f8fe192815d6412eea71eeb17b3ff967d40dd603c445239893954d147b824fcf54505d7a09bfbe76bdf0200fbfed5147a6bf0fdbd8d60d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599209ab75767523ad6d4e16218ede123
SHA11cd2a450c10643ce5c7f7a85c3b96f7df99ce1c6
SHA25665a157d42404051fe87b005cc921f5608ad5a1304082ca91b103df419d7ed734
SHA512e7415df669c7346088e877a19b10b9906ae616b24fdab19b058abfefa0881e749058c0907e8d88c6c64777b7161af5f14506cc7f81da2276e4908f92500bda9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4e76fe8d6cad8ed261fe251ecc1c965
SHA1631bce51ca0394614e99ad8bcd4d19d5c0fde765
SHA2564a0780a96743e9340ca3a755e60d3c9d4e052f1312ac15041efc440a6b9d1c16
SHA512a370bb42a25a5e32ec8edf1d4aeb315c2970c19e92a3b739a32cf8be7e6746d1a7358f6647a3b4c515ebf73cc65053bd0c18be07af2d18ab2101887f91949e73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eecdc4709d5ff289e11bb75c76ded5ba
SHA1d151b02e9dddcaec68250397b5611577bcf5afcd
SHA25614100d678d34b367cb8b1247a332fc023695b9044cf5591c86004667056f3c72
SHA5124258a1977b09d6015156bce7d0e145cd1b5e86c3e7d5c08069fce06a76746f0d87135fdd8e22b95bdf880600c19c3c3097c41d13b492acce4be686f0d67ec000
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b