Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 06:44
Static task
static1
Behavioral task
behavioral1
Sample
2ca66295737d4f3622edd63553823903_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2ca66295737d4f3622edd63553823903_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2ca66295737d4f3622edd63553823903_JaffaCakes118.html
-
Size
6KB
-
MD5
2ca66295737d4f3622edd63553823903
-
SHA1
88de191219dd43014c2dd3f5cfe8a9b31e1f9ba2
-
SHA256
aeb9287fa667231af362ffcd5d5b760c91a54b703e1cd246d7d487a64cc9a2ac
-
SHA512
d2ef8c3dad985391364cb8c629b45bc12e0518094cb0e998fe5b6494ecd4dfcb8af253116d41b1db522008bf32169262555db363f249160b94bba9ca05bf8568
-
SSDEEP
96:uzVs+ux739XLLY1k9o84d12ef7CSTUjwLcEZ7ru7f:csz73tAYS/qab76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434657642" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EA533051-8665-11EF-948A-7A9F8CACAEA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000001fb242c7bbb5b48e1603dd2d6e5dd75ab1ff0ee7522d27cf0d3c3bc439271553000000000e8000000002000020000000196846b07e9c5f6fc0bc17ce23ed785ec95540bb219092db1a8e38222a9c29f52000000083e6b6b5b5d0067c9a4154a3ee60a50ed44b2abb7bc7072d8555360eb938d0cc40000000d055cbc578a8da219f5479d6fcf930e3dcdc0cbde46a36803ca03567947e981ce4c31c425ddf39f95bdea8e3e5596188652bf2dabeccc79005187ef46dccac9d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 409ac3c0721adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1968 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1968 iexplore.exe 1968 iexplore.exe 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2056 1968 iexplore.exe 30 PID 1968 wrote to memory of 2056 1968 iexplore.exe 30 PID 1968 wrote to memory of 2056 1968 iexplore.exe 30 PID 1968 wrote to memory of 2056 1968 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2ca66295737d4f3622edd63553823903_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1968 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddb6ac1711f8ed32f9a2bc7da254c5e0
SHA1e7b7ca313b149ee479dd781fac3cb9189f281d41
SHA256080cb7d386e77ca37e15db80a0313e5a4f588dd95c59e2b7829b607af9023c76
SHA5128afeec7f0fcc80a59cd9c73c3d20d7855a8e3279b0688af8539afe73b29acc07889eda6735a2acd71838c82101686a7079773d776d3778db847be29034645706
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556bd262536e1da1a24414448eb71bf8b
SHA186fe49ea9bb862712b826e12a0e054e8cc55210b
SHA256ba2b0b97a56d6f88ee26e29a2d4df54f73eec48b70728a23cb8110f878d55d9c
SHA51251ee66982ca73fe4ce3791b3c3d3ee1e65341b2b4ffb9fa5a1d8b31a62c4394093134c74637eb10e10141fc8f341a074e91bdf22aff30d074c796fbe5e6a4a07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5593bf6d19cc157c8359f075311f2095c
SHA1a90bb49ffcb84342a6768cc92bb8c04531e858aa
SHA256f6fbe90d1c67bb56407eaf0e2a5cace777f5efa8c85c0bd44ca1858c0a6a0a1a
SHA512439b6b6df14dc1b3ea25b24a86f1e4ae648bcc404c92c0fc2e46d3252e7f71e8a1422ed23bcbae0cb7342a923f1d2dedccf25fc5c4c748b6092e7f67e7dece86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc34752b87faabb20fe3f7f59fe363c4
SHA15d1566d98f7d984f7256f99934d93d64a1b79a6c
SHA256bb98b192244d3dbab14c016f086c196f5bb2a5eededf21db75ec71ce7fa56ad6
SHA512897e5206a1a7452f8beba3a2ce672cf20c2606ca81a2a05a22bad2be6f45d9864db88cc2d84413c1d3b0458f7a086c475adf261a9d6ff1a256316eaede1b3cae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53009ab31f90fbc83da3fc463582bc0bc
SHA15ab03d79f4cca52bab933a099fc215b30954b242
SHA25602bd7afa2b5524a0655057a2e8c4fd589c0232a5ac3d24287c01a8cf0f503b13
SHA512ace6ec8bb6323d91af06e09ad70a126a8cc73459bfc4dbc6a196c3ec4fe22803f6e4e3388bb39c0845f524320a95b201f9274391c979ad2e1ef360eb3db7c68f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bb80252261324349447d515c18ff692
SHA1a3815fa6f91b92e06b9aa4ac4fd7b84a00e4a0c1
SHA25600253f34b5871ad1113735c439c325dbbf53cfd92d004584dd611a6148e48b37
SHA51275ceee3a423a682fade7854f1a37edcdb0edc88f48eddf5190c5526f9b588e791cc5975fb0b0d64565a30f3ebe0dde071c222b53e5e22809665f19594e73cb2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5114487d4a98bebce7f997006c817637c
SHA17c348135b1bb3d1df0a67f8478480cfbe28fb35a
SHA256c93aab9abcd2facc07fbedd51717c2bc0ec62802eab8b29c4f811a172b500180
SHA512a944c498e37086503d08427686a9c84970b4d68d17bc3cf15c47a5a3e69ed3e91f078759c4c68626ccd12536ff678412a91a61acae66f43fe0b5b1dafe40d4ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ef1db7e236867113b69b4343fd247cc
SHA1d94a0f147a204baffe82325da982fa57ac514676
SHA256957abdd972895135753c23405fb04b2a6369508b0d781f65e063f039144dc83c
SHA51286e2d15f313ea725f197990bf3430178b3759ebd7f07b4575f59699a79499ba7c03b2a800f1429b4bffde404e2d4cc361ab7da844190ddc69fe86f87a6fb04b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58954e25df763d7c78247f7e9789584a6
SHA11b1348d9edde3b6cb714dc35c96693fb75344d86
SHA256f70324736ac013079d0dbad62749c257a44a0caa97e091cd285be36270300fd9
SHA512fa94cbbe3580daa5a6dfabd585c1fed1cd2eaee45d1a542775234612b63d552eb2fed84123c25be53d4ff68e54f462cd862ec66737234d15c633acd3ab9169d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591c5aa0b0bde4bc99a2f7c6cd9cc55cd
SHA1bf6344388782eb06767e61e09d46bb4a568d7ed7
SHA256414a30770f5f44e55d7811876fdfad080c876a544ddcd6581f0385d5a2fc8145
SHA5125f10fb759f5123f49f04e8ec75b696d5fb8e29d9517d5cdfd92178223cc9e3293dd717b03e6bb8f403cd66031f0a09cadee7402c7c5d7dd2a3d0b64c45edad01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5157da0a0c1f4faafca26aa7ceb7a2784
SHA1486eae4b1c362bdba3444183868bcfb19db34ddd
SHA256f63a1c7377a87ed129b506a4edaafa5f14bedf13678e559b3ae404f72f7833cb
SHA5126032a5a0191edb1839379fd3995d38d5dc1d14e250435243edaf592c8c4ed45b801c64f070522cd6217b18d03960a1cc67a25a091c6e34092da559fed3b0527b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6c87a9e2cd83d5661b2542e9096698e
SHA1ffdf3aeb8ab5af5c719ea33293ec87f6038079ed
SHA256d49f04bd81af834eda8f76e7d23b6fdbbdf19accf1e06bb1eb23c4db7ebdcd46
SHA5122774ca646bbbfef973d539dbd1388effd8bba8c520b27ed87aa73cf197a3f7e8729c52b2f6d5c3e5796248b023c1bd3ab035be0165b0f4521493504391822c0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c388653c4dcf7e081117be9c72ac1a04
SHA101265823e00180ca9017c7c0e2deadcae0a10f62
SHA256c7b4ba59e83bd15819cdcd23d1592bcf7764262c8897e71bb4e0f30ae42d4447
SHA5122d4416680b55ca97c8d8fc1df6c97984a600dceb0e041bedac779ab1d0e3ae379dd0804e7a7161ad593e2d3ee161af252dbf089b81bcd9182ed0ea0a7182f6c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594796f4abb5f552669c130a8489bb4e0
SHA1e57efca2b9539fb90610f280c65a3d0b5798525d
SHA25606ef37f3893fae1fea523951ecea8cf928bde55d9913ced8863673e89d37f74f
SHA512a1cfe382a92ca5a15953a9b3bac4b98e09c590e3d687c21df3c3833b276abd391504f414d861f1d81545a430ff4ecd14241dbc9c360795d5c62b39ee71c636ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537f246935bd27cf5fe8cf22936b30e1c
SHA111570181376176f500a96693113f8f84d2f2b992
SHA2563eb655346dfbb28353d48057c6ee8db03819df928929066150b5f361e569ac67
SHA512b9e1637adf133b1270e726d3f9e6f5fbaf5d9485cf10c02f92dc40279bdda7eb2fde5637cd252ff335a3e09b724aaf81a9424b7d2161934dbcd675c0e90aaa74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c9d93ce6c2a1b15930776c895a60730
SHA112d8cd019b7826596ef8f9c7999c9de6210b15a8
SHA2563c286128eb8fef677d20e1aa2f654ef06ffe2b97fb47ff43a62511b0b22c143f
SHA512de8d2039822e1cd93bedb26bd6653a889a0fce23a4490b55313e3894b935fa366d9c555fea2102ce64890f40d5aa9816ef4f74549905feae94a288376567cb5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae70487447c1407528d55fd083b7e224
SHA1f2fc554c213ce413f17618a8d8485c9ab123a1d0
SHA256bdaf4591e1dccd706cc21e9ba0130221a1f56d50d49b4005cce060cbfab4c982
SHA5125bf266a53c7b5060dd6a7e9abd5fa497ed39f43e003dc10638f33521f0f8b878eb54ebc55a134970119f6a75aaac872b196fd1b3abda21d53e68e772ba134634
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599ec8454e5448a37f534b42790cd526c
SHA1ebaf2fbe70258e3df0e4e64dd3c8ec98ddb6c349
SHA25652c6196598925de678a23b309add4fe96bc55909ff574b38c8c06af76a1e7890
SHA5128c8188ec03f5798bc162a9837cbc4f93a3aa34e04d2ed1608802ca6faa8c3baedf371591983d3ba0aacee5211a3dead46d944b18f9d83164d51264f12f7fec65
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b