Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 08:28
Static task
static1
Behavioral task
behavioral1
Sample
2de8cdd5d0ab4baa17069d4a415eec77_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2de8cdd5d0ab4baa17069d4a415eec77_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2de8cdd5d0ab4baa17069d4a415eec77_JaffaCakes118.html
-
Size
6KB
-
MD5
2de8cdd5d0ab4baa17069d4a415eec77
-
SHA1
0607b40655275ab40ca73119e781a0b259b8b461
-
SHA256
63a18ad8fff8d17a1931d9a68ac16c959e69b894c6856fcffc4a169436ac5798
-
SHA512
1edfd300a5bb8a0f58a0f7b574854109d7cbeae33c9d01fbfcde2e6435456d391fbc808a1739ccada063e8862730e29e74f0a1d1871d5bd18f6be425f1882332
-
SSDEEP
96:uzVs+ux7bPLLY1k9o84d12ef7CSTUJZcEZ7ru7f:csz7bPAYS/Ib76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 704f0476881adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A10D75C1-867B-11EF-ADF1-527E38F5B48B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434666969" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000633ec370d1289e61d6086282efdc81c1ec876c2032e4dd999ecb4e17de1b22bc000000000e8000000002000020000000a76e8f32fb1029da3b46a8c83d56b5b1034a96b41438048240dbce9bf9fe616f2000000015bd6edd106696e4edffc0a0581177906c22fbaeb451e95754c5cb3109f736ec4000000062596ac6dc07d1386be7b0bdbced1ad1710add4d5ef961743d2a9aed014bd9395bee29bb67bdfe1ee02cb0a1b6dee3b37797c9c990acc521bbb29330ed728a49 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2664 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2664 iexplore.exe 2664 iexplore.exe 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2640 2664 iexplore.exe 31 PID 2664 wrote to memory of 2640 2664 iexplore.exe 31 PID 2664 wrote to memory of 2640 2664 iexplore.exe 31 PID 2664 wrote to memory of 2640 2664 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2de8cdd5d0ab4baa17069d4a415eec77_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2664 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d42e1cee35566c33398cfd4d6483d567
SHA1f33b368f259b99e648fc76bee8f3f4eb4d7f54ab
SHA2561d01aa768df4daf251111e7da43cb5fb9b3964c193f00cb7822b33733af1dd41
SHA5122ff9e92696e0d6720a563cdc20495af212f20915adab3a209519d2bd17e87fb068efbd4cdcd18850b1c3796d6df6ae770b3e050b6a1d70803b6b1d5f98cdd144
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f246c39ee8889ede093bc3d6c619c5b
SHA1dd22c1eef9f79145643070a53abd61358f6ac167
SHA256a059a67d4c733d45e35257a5487d2d5cfa3103293b3fd11c6c466a1c1f630457
SHA51265e5f7d9e1fe9004cd6830bdd8a02f7174953260dc26522f1df454a19d24c6e7e713d3f9925ec539c4261dcc4579d2414a2f289301a44ee0a4c0d664782838a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f722b794dc3e25a3c92e9085e5b88dd7
SHA1f9938ee03b73d7dcd6f885f09815adba72b48570
SHA2560022dc61b0830120331ae8461125b375b46fadcbc0bf2f49fe96aad6b10b5bda
SHA512c130bc84de941782a9b961e6401611b2c945ff577599a9ebdd47609e9233dc134c6ccdec364c51d9e95f109aca296133fcb6071302b3991126e0cbd1cfdad2fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55443ee22246aab6f943ae1d6a6e0e76f
SHA1942ca615f097f8332dabe8609fce91306892abf0
SHA2566af82a575b909c26f7a0ba71b5cf2fff09e1bd2344ad76a2c0f86833f12ad292
SHA5128417eccdbe1cfcd4a4224c46319a31aa2813c467637fbec9386e2cc7265d243e847155867ebc34783767985ad16ed2d6bf6c40c80afdbe5eb6cc9bc81f89e3f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534b098730a72092af2a9ca72d8e5d96c
SHA1be407ee61de158e02c037e356f93fe0c27016564
SHA256b21e5c70b70db8329a34721e38bad7484f2a2ae051b164963f5c0df6f1082945
SHA5124f0e0db635d671807971a1b53b1098f9e435cd7f6ce63eda60792b7a36cb1f1629d5b49dc07b92417eefcfe88b03dafe6378aac0348297275c37bdd605809df7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520420632d30c0482027f32e5cdba235d
SHA1b830888fa4590988d57dd73c6dcdf59348e8806f
SHA256caf87a17a944336bd7202aa467c87f31d4da4ab00b21ce242700f9b494bdb425
SHA512878d1d5babf575bd3c25575386cb576fe8c1ac13a6aaa2303bb939df5f8ea3586f81f4fbc4c30aab80c2535550a18fe36d91ab0987c5a25afd9a5123b788f75f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f3c129bb987a3eacdfdd9e76ce2f440
SHA189268a5963a1ebc4ea33a62fed0541c0824d529a
SHA256d9473c01acd0ddd9d056b8e85548c8bf199aa6e19f468aa555d900eae3734706
SHA512bced20a5915895eb284ef74bf16fb249e93bf52cde46174cdcd4ff242056e1101e785acabde53822d4ecf94fbeca706da9c1246d2e733d144a9a6e6d4fefc8af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cce32281ab6a29b3c33dde99dd61df5f
SHA161bbb793afa415e6876d43a3b84decc2c50ff9e6
SHA25639c84717ba1ea113d97d3d5e58638ca27f976d37bd71de3535d7d64679642b7f
SHA512baa313ee53d5a3b0407e1b8d106e7c8f0a996112edb700ede2b78705c7ab88a9fb9ff72bf151559ccd134dc80a9a6d8959860f79c37c5684ba60217ec6efa71d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57aca7658e6e7d05d148e124bc8dd05f3
SHA1a914523a4857e75f0e8410280a40fb71062194b6
SHA256484a63a9372aadbc9530fc1d6b997b6421a179041ef2e22047390fee7803d712
SHA512bc96255ffd021f88f8547bb23feee4703b47f0801d90f3f34d23a16dc35ef22916c2baafb1416771d2c9d19a5a51ee61c8f7cb59c1ce9baf5016ec788b1e03b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf096f5922b22571c2d2df658c026918
SHA1abb2093a09bb35096a20378f9cfca0e800c79db8
SHA256c39bccb5593869aea75fbb778be7a0dc02dc64eee2317c6969c0b13cae654e34
SHA5127961e4cf2f47eb441595090a10d2c5ba1362f1cb584d036ca7beaa3fe23f4bbcffafe1c3fa804b553a58bf127869bcfe50b7338d9302ae9834ac00338d9216dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52604552719548e477ef3f746dd3c199f
SHA10b1bcfad9158429be9df0db166775ebfa41ed332
SHA256988bbf742d7d430e5935ef804e2ff57a73db842b756725a2d3e0808b578c1c08
SHA5123f6457bcb75e881b310a40c29d393759aef85225822333cb3afdd375ff917f34de0ddad80d8e1e2f911c69561b43a51c55c2e333864561335873685d2d8a5349
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f9cb5e759ca228c0617fc50f8c6cba7
SHA115ef6d85344892b6907744a21b7888b67aa60f47
SHA256788121a74a494df6c15eae539183c132d8b6d946626561ab99b63bc282d5f834
SHA512daf4d95ddb98316e550c85ee1f024fb5ca05bb0e308a4fcebf79af0d074910efeab97c97aab031e58e931932b93f2827f3b227516113dbd752a437f9c88d3f17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5706aaaafbf156ce967703dfdd40edecf
SHA15b8a1cb4da98bf1399ae72f292ba337377d4a7e4
SHA2569c1f3323afba835c3018e99766a0bf167a8f840bd60d2e4e71ff33ef785dc40d
SHA512b43f2299a366d99df6568dd2fae20be9040c70279b2f29b609cb38557b2d7ca84f7b28b99fc7e3b8c081c728d355ceb519ed04f4ed65a66b57ee5dbdd74e6aae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505078ad1040ba13397a7a81701ca4ad2
SHA1435e58fa8c53ef615e8762b14b74c7a5d58339fd
SHA2565421073fdcfed3d78680db7c20410c4c2f23cae21cda20caf60af1dea10559fc
SHA512f52cb7538e93fb8ee375e3961cbdb62ba9614ce7a0bb0c948fb9d8fa8ee45b128666ae91cd94408df8df89e160ff862b0d3f704401e1a9de92202eb2259c78e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d1219e29696466185b0c905ce0d66ff
SHA14f5ed51df728f125591fc328510d4125478d3e71
SHA25698ff31b70c465f94ea2b4fec7600eb26c373adcb065b8446bf1edc8cf728bff9
SHA512d84dc4894ba188a746dc4cc9dfe861c2b2a64f5e126871803658e17dad2927b2fd8372cda03c923ab3a56a4cf3628f2612e679b18bb47249b7a391373fcc3f24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e8ed102f478bf532de84642395b5b5a
SHA1d9aab225e3415492e7435a74a5069abe0ec37245
SHA256fc696b097c6d24c0c0cce90782233f6af26a4f261aebe821773f5b5178593326
SHA51269674190e2236cb84387739c269b0a9a6ecd79f25928a753150c21358dbcac818adf9f30d0697c48d05356f2e66952c5f9183615fbeaecac8532bdeda843538e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586308a66b7ddbe143bcf5b3ca6be0c04
SHA1684abeb188cb00558a93166737cca27fe52b9c5b
SHA256a98bfddce7ca471394d4b4d59b1a5a6a542effcd5b92cfce9515233b6c09a54f
SHA512a9145ed34211943f0776d2e30413a3fab317f54b9081aaa9635f214c78bf738c92c531cf4edfffd0a7f914d422bac4dbf0c383a69dba53a6375e7e5ee157a585
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca108bf865209c8167ce90799489b0b9
SHA11ac81dee772c012f1031def599d54bbf896d0116
SHA2567d7866166f64b3e8e4343cd05bb7219b60c94f853cdc8df705471efb3fd388f7
SHA51262b4c7266d0a1029cb57606e734bed4cfe397eb96a22035d28c1777e2bb06417626ade08cbd37ffffc2101646e5205382d1f2671343cf7eaa44228c6f4b39967
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab458ae5f7aeefcf91469fd88c6f17c8
SHA1c59a2b85a7e330ec54d561b22b13487519d58399
SHA25663c77e8b92be11f18edf1b02b435664110ce9f63e2e8bbb499b79dd0aa3935d3
SHA512760228a7e6872eee4d9b3a1bed85416394f7bba3c770519a9b0ee3b318eef8c12e3a2d7bc71cbccf30719280b459ff63f0eb2e1013c9f4bace967520b8b408e6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b