Analysis
-
max time kernel
66s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 08:48
Static task
static1
Behavioral task
behavioral1
Sample
2e2addfc6d4ceb1bd061b7a10c5eacc5_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2e2addfc6d4ceb1bd061b7a10c5eacc5_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2e2addfc6d4ceb1bd061b7a10c5eacc5_JaffaCakes118.html
-
Size
27KB
-
MD5
2e2addfc6d4ceb1bd061b7a10c5eacc5
-
SHA1
a11666653f1c7fb184c3dd9e9cf9a4e00303af71
-
SHA256
b94e3807aacbcfa6613f0a2348c458e8ca3b11f341dad266f66703f65f36936b
-
SHA512
7d34d845137c878b4aa571888934dcf534350422a8f21aeb9d4679954e4c659e57515695eecc6e69e97a06a73688c3b4c7e343ae45dce26622d91fa85f8b11ab
-
SSDEEP
384:6ALlIJbVrV9x1/LgcuqsFzVakFRW8zKhp06zIUxBsbTKW/2zh4g/748xv6eLe:6ALlIJbVrV9x1/Lgc77e
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434669791" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{33AFDAC1-8682-11EF-A429-7A64CBF9805C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000005df4029c9fc6d8bf478e3acf4f2e3befe4b42f70e7f34255c8dd38d1184e5df8000000000e80000000020000200000005ba32ac3b0825e1fa33ecdafc6dc25be3aacdadaad0d2a38293fd54137034136200000008c2ead2ce25d061cf607c4e1fb3293560be11a06dd3b1f8fe2f23c72b4bb0cd740000000a51ceaf174ff3c85d8814b3160f095d3d916b782597e302188067011077c6e82fe7e29ef36e48cb49a00d778c1490f2e2def0b7b5d5e58c0969b4e78f944a0bc iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50c52e088f1adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1520 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1520 iexplore.exe 1520 iexplore.exe 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1520 wrote to memory of 1964 1520 iexplore.exe 30 PID 1520 wrote to memory of 1964 1520 iexplore.exe 30 PID 1520 wrote to memory of 1964 1520 iexplore.exe 30 PID 1520 wrote to memory of 1964 1520 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2e2addfc6d4ceb1bd061b7a10c5eacc5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1520 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2104766a4c91eb03b89cd8a4e4e8fc4
SHA1d2bdb2f8aa7820ca924feb0598432919092367c8
SHA256fded560104b6f0460e3dcc43046acdf683fe3030235e98d55171f1f3ec6f281c
SHA512645a28de88d878cb74ec579051085725fddbc7e2fff4167d8b186e539f91de3470656542fa183414eb713567a65a087fe9d09b6acd69ecced7cdb6c513683210
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae2c4cf368bf03af3f7aaf71880d534e
SHA1f00668317d2a09aeb80f84b1842efa4697a5bc24
SHA256e590e36b36445700df5a057fb9aef5a44ec33718c52a18a0c542b9fe031f82ea
SHA512870a0ecdfee4a7f99202ff53a012ed2bd1e98ffcb785fd7608141e348b715af13977110afbcf34dc6a020310fa600dca66744033e86cfe24420c1123576f4e6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5575ef284a86833129103731539e74e7d
SHA1c77345def9ef3d38da37fb6571f14071985aa2aa
SHA2561aed24a3780c4f132430ac2b4776abe2aca5b726c5781a844290b16a931c5fe5
SHA5120b8f7a0e86fdf63d4ccfe7a7f572fea0d518c84945fa952691b10dfb42234351d50366692d3b94257d43a638a174ebcff77cd0f7c8ccb7c3f6a67bf6c4011ba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e6e6f38f838a423f6e7f0570cc08afe
SHA1f107a030a87c7d1a20f9cf8302dea917bc2515e1
SHA25650d51f07751484cb3dc207af837e3005e3914c077dba759670ee9f62f814d1c8
SHA512448da47a7b5d7f8554e40fcf68d9f91119d69cf3c774cb20d34b562c5b7803e51b02be9bf0ecfc22cbb2f532a5ac8f93f4c3ab842d0f909a893291cb6a8c35d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a9a26b5d2b2ae74fefd852035312ce7
SHA192703bf07d653336935afd53662487f43e6b776a
SHA256e1d598c8b74512274785683c0d7d3c76c7a98b063ef75bf34a700a188555cd44
SHA5122b4916b2b1131a46afe37afcb98e5b7d2fa5a713dfbf3e8100108c019141603505e19fed85aa05955a491c01ea548f1910dd2630cb14e7a35aac0a751f344753
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526de2a28ccf51c260e88a22476218494
SHA156add9b8f299177b7c90c94a1e1fd9640970b55c
SHA256932816e183cd889480b40e44c55d802af9b7f3841f6253dfbfc25913a074e420
SHA51217327b668061636a394ca8477dca2b449ecb9bea45017861a496f4f915d40fcc2f60013352b5bdccd790dfc757ea61519330cd6292677adb219667aa1d1928f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf08205f6de8abf1d1fe23d80627b95b
SHA10f3089c551175b5437ba2583ad50ac7ce9a4adc9
SHA2569a419f7ae900b6ca7a1b721f5a2ae0b5fac38eb7eeb69697643dadcb2f0d9508
SHA51202b371bd83e1ab665f4633c4aff9253f588bb34ed560604796672e0f477d8465488c575e5b58db94660877a256c48a6392fd1f8915aa049a47301d46e60ccb59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534bbd065bf3d3aed4414ecdba54ae07f
SHA14214ccc5dc1ac2d54082a7e7234927f17ad90303
SHA25600c89b240c803489b73c43fcf6a7c4ca601e5271e5be76ad2e2922ae61f53f26
SHA512b6701e346337f57cdeaa3b6f7b1f5aceb067a34e40d63a1928722849a7ab1fae77509457a4094947719b0e893a816c7e112916bdfde8fcf2ccf425bc52a2501d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b15dd271d147f1b5af275f13c5a64cf
SHA1844efa20d95a009ef39b267a3c200130e4459c73
SHA2566226f338be21d56e530671ca51e5dd6c9b15df9b944bcc0cbbffb7c410642002
SHA512cff71a96a9d05c78b8917ca98832d5722b2ad88fa58d2dca3fb06bfd96537534546e3a54ebc7e610cc69e7eafa8656df6efd33d1c5e2637a7c3283810c7f0887
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579478f5213600e368fec2b9198398803
SHA171e38ab14b57d752644c92cff4fc1c97ca64613c
SHA256e0d750a3cf767889fa5c30b9e597a85d328a1238c3b1598c3742a5fc64a721cd
SHA512bc50f336f853c0af8b0d3d949f05edd1bcdb2d1c50be4966d551d34e83ac9398db73fdadb50c67b3906cc336b1086fe3eded32653bb7b00281aca154b665022d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe6d912405a16f201cb328487a0a7308
SHA1cf2b87753c2bebfd956e6bbf1acefea6beea5ee9
SHA256ee7f02f2aa74ce56df7a14b9b6f14771bbfdb0cbfdbd688d7a8eea127eb663ff
SHA5125c7b8cbb3ec2fedd0010e6f30c1277262e2ee716d1982d8142a6ed0da2f8908ac340ae245b9c6a2c9d5369bbda8975431d405431f6561c74cfb45fa0c331b93d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548574c45ac31def9ff101c302193669c
SHA156cac9d9599c2e748bb38ee540a2facc2b6d81d1
SHA2564009a562cb2518fe1975994aa8c5ad593222681a409c5490993b0e990d4dc402
SHA512e6dda9f6059cbf21bad001c5510a30d0600986a98994cae2ea1e87c625af4968602d4f747b95d8be2404511ab3edb20d39fb5bfa63abea5f58a7edd4c72d9a92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd78fdd8ef1aea2944d9e1ae4b9abb89
SHA14580cdf332b1bfd85a30c900ef3ae1d7ddec9468
SHA256f61bd633955fc516f63e6179f5241aecc1f937831229fb6fdefdfed3e2c3d168
SHA5126a0997072204e7855888b2f2dc63531a9f823dbedba1db1e4b6cfed9a45ada91dea8c0b419020cc01eb40717a3852e41b47858d38b60999e35baeea2a5ad8b33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587f366f5316901ddd6768c6afc5bdfdc
SHA1cd7e470ee71738ef3d84065a48eabeb2c459bcfe
SHA2565d05493ceeb688c5bde9bce1a7b96a54420d84c2e7cea60439b7066ed67bd1b0
SHA51218f0f4b97eaeaad857b6c45be9520a58d26aeeb669ef662047d24777bfeb90244d979a28c7229d616054be89322b2e9ad3bb9e99f1bbfedaf88d99a3b72689b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fbafe84811da1393ba9ac4c781392cd
SHA1759c4f025368cb93b25cc2cab7ca3850be673d9d
SHA256f3daea75b96acf25913ef7e61ec73e9c69b6e466049d773b5e291a2f5f1efb71
SHA51206e716f85ac6bebd15cf8d589352e13144f848a6049cd24354f29513dddf801718d6a699ac0be84a3158850d0e3e1a9f5a4ace33181bd6bfddb9ad7cdf3645b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bc2661c5319e50fd2c449e85fd377ea
SHA16ba1f196d1ff6671235f917a378a238462e06aab
SHA256cec7ff3bbb419e9065bf608ec08d4b9e9aaafc3656454c16584788b62b90d40c
SHA51279324c47361c50f7adb646acd963cfb1985ab3b613b31f0aff052539951912c4f6fa24ab4da2dc1b15114307da9e8ea68dd4c214e2a1693cf3354b9623492e0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50719a6899b438d082bbbd0d3efce2cb8
SHA1fc4d84de0a0185e77c53a1cb36a69e45f7c7c7e9
SHA256e0d7e320d736eeb008df449d9789d91dd926e4f5515a28a10ad4c05e58c24d42
SHA5126e035b5ffa87824e894ea8047de893f1f6ae79dddfb47ec07ec0b1be1c023bcf16a4ab31e3d32721bc5636883e51faa338204fc84eb343d3b8c0816c1cda13a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c51e95dfc56acfd076707e706f9c1f5
SHA12a91bc3c8427d96819b32f33861fb7b771371b23
SHA25654fca3c15fd4a39660dfeaeaff76d520b55e01a4cf53a13dba425efd070aa491
SHA512a679902cd903fcd37ed274c8cff30fdd769b0310a6dd676f4d2e6627166912444e562dd8d5537c374efa1ae7d442611cd381d3be55ede1d5acd7f29c87476fb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51947b0f9d53ce086991414a53a752936
SHA1f3d1e09b6b88ad9ad565f9bb2b6eaf1239b24795
SHA256f9ee1d7787a1712199c44f75105267c7dd1a33d2afbad42c616a949fdb0b4f22
SHA512ef93a5952ed8593d627814565353f0cf967bc355a5d687e81246b72b580d1e2a62dfe4b87efd34b73a3a13c27e32ef99b8e1de1f194932862a1435dfd0003b89
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b