Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 08:55
Static task
static1
Behavioral task
behavioral1
Sample
2e4480270bf822d82b8447fc6fe5a498_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2e4480270bf822d82b8447fc6fe5a498_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2e4480270bf822d82b8447fc6fe5a498_JaffaCakes118.html
-
Size
23KB
-
MD5
2e4480270bf822d82b8447fc6fe5a498
-
SHA1
c7013d8ff47b96ac9c09a8017a7326a88ef15090
-
SHA256
3b44c7e210cc59a575fe2af791ba28a59df26431245e969910e29e1e88681456
-
SHA512
983fb700cf72d57ba570243e3e8811c7471d37b6af8f250b12d44cc114a8a4c9912f6eb1df6f77f4389eee3ef398a81772d37293ec7a75d3a58e68dc42bfe1c4
-
SSDEEP
384:4nA4ywgp6pQpESztvukeKXXTuQwEyqav1KL24UTpNyOcn8tvG5nTDuU5esT8a:Q1up7tWkekHnBEKc7wV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F0F0E121-8681-11EF-BDF4-FEF21B3B37D6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80e396c58e1adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434669679" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005c381af5682e61468652a03f405ab4480000000002000000000010660000000100002000000062292d600df0e036c284c3a9bcadbd8822327d52c774972486dd7972a542ed0e000000000e80000000020000200000002bc6e939da536a2aab79cc65711b707a607254933c90afcbfa32f41087222518200000007f89a71ac6949128a376895d2cb75a44588505e29020ffcb49247ba0f781c9e340000000d4e1959e5aeec7ed0743392eef587f332e5ac7900b37f226faab4656aa9441d1c8d14852e69ec42596aec0df3197b8053a61a7cdf6de5f7c60bd2b5252bfc128 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3032 iexplore.exe 3032 iexplore.exe 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2904 3032 iexplore.exe 30 PID 3032 wrote to memory of 2904 3032 iexplore.exe 30 PID 3032 wrote to memory of 2904 3032 iexplore.exe 30 PID 3032 wrote to memory of 2904 3032 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2e4480270bf822d82b8447fc6fe5a498_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0eeb06ca487a07aaf67202bdc0f08e4
SHA1bcadadf93bc453e7d1d86f8b2f25e4a7daaa1773
SHA256e61679e8c9815076a98f35e6aad338ed3fc9828a3d7020e2ae5aa12fbf7c1dab
SHA512866a0a0744bbfaac8e235f5cfe520b62064fafa875ee1b9764a54bec8e8749db0a3b7c922838c4621004b7924ad784032bb962f6952f6a144b2a364061087c5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521be6be1c59467d27e5ec9a1b7d58a37
SHA162fa172068d61f33d1858387a0f508f5980f0548
SHA256602f7624ccd423d2dd4673a198c52fe515d0f39f15dd78180e243644b301be6f
SHA5125395a64cd0b541817cdbaaa7805537a9f9b8cfeaba713b4363f5f2243c7a88fa1faa8f6e6c3ee641dbd8c00cd0857a815f844f844eb4e007554129f11d4c27a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ef2dc5f965381609c7d0ea30fa3e068
SHA1ead86f01a9a2e8ab3ed39791dbf5e2f394601faa
SHA256e46fcf8d38a2b05fcdd9542284fdb658a76e478a73bee927b4e27cc64dff0859
SHA512c12bf5d0d1229b8ddc81a0bb2f6b0dbb36c1acd2e5655faf25bec0d8994374df0ab8a487241a3d6d27d4ddbafe2f56ab0ad844888dbc7a9e803dcc0d7f3f3452
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562b324163a07763aefa5e4c9107e652c
SHA144e2a970364f9cf0358a604bf5080b08c066e866
SHA256d55d717ee21c55aae7a9b951530bdf67fcc5c2e5140ae71cf5b0c4cf3ecbb92f
SHA512bb9ed127265d5077714dabb210a6a34c735fdbff92a6a709ba196e8a63c0504cecd54542596d41a5cef2351f71e37206a288273ec0cfad25eaaaf2fd82c97af2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bd5d85dbb3e44f3c16f5998b92d8c71
SHA198c9cf4daad0d0dc3b27003c7c8f2efbac1ac446
SHA256fb2e390c1e58f47069ec0b504ab12cff35353a4f442bcb8c401c15c53482c05d
SHA512a1790e61b817fa3d10a3d197d79ddd463234838d4e5d52c51cb65e98ecef7e9fefa319879dc742f4846c9fdec611334ee853161834ca2c48a69fdaf32392f5c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6ec7500b73dc29fc851ecf888f94b6a
SHA1f979d52e9d0ce63fb699208d53fe63329524609c
SHA25625e7db5287f70951032bafce787244f50cb15d5fec537a7351828ed04e0652b8
SHA5128c4662de15d49dea04dd4eb0a4eaf73d67e69b836eb696c18c21882ac7848ae58ed84b2b9429f70c89958c3c0c18558d810bba46e6ec8043d56236c7706a0b64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d549aeade8504ef74edee6f14b36677
SHA11cbc8af4c90bc1bbcb95cce972db1540c2314ae8
SHA256c835ad713f458caaa1fc9fc713f37f1891556a19db16906cb17f86b674d45342
SHA512a345dcb88c8b11126135677d53b1a86de16e4b641171039d29d9f3a0353021f0c556e042712ea59c2fd4982cdd7979d5c700c9abebb717b44b59281b3c15c42d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5817547b21712a17b7c675a3d306d63e5
SHA1936d73910a8c004132ddb6148a033172447e415c
SHA256f73bc4bde1ba1dca60b59a0d443f4dc2f9244e9e1ed5d71115b8d09d4d150a92
SHA5125ef64f555e185fdf5d6842b5582ef25d59b8376e00db00e1896b551ad3494d937dce602e375b22c5202f74b3d0de29545834a3ded7a7e0c86fd72985e823d466
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce50dc6fd8f599a2a0b35f2fb350ba57
SHA19f50b5bf097a62d820dc9fd3d66e54ec5a343d2c
SHA2563af01700800efc885ae8f7dafed0542cc830e127fe7c3a3fd80deafbbac50400
SHA5122f7cfc0af49413b60a349654cd527baf2970d1f7e85ca11d0bf050b58c896398bc0968ac262dabd310ab83e2ae0e225e78a97d955d68e6babf96d074de4cace0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3f730f1af483051b2dde0ab89325f52
SHA1066281c7f28efa3df84db4238dda8ad015f477d6
SHA25694dd1762f98f4c4226823e9e53198cbf5922acdb7784d5a49e33400ada8fd387
SHA512b4b78666bdc882f56fecebb5ff1fda157356b88a9247076c7bb438270b4065eb1dc7e6e4e89ffbaccedadcd723d90c82dbb28af5ba87c77cec6effc90444c96b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0d3c21c8d83b0cbb937e44dbbe35b0a
SHA1958db0a7b7949e24f8610fffc7b29d7238b27822
SHA256270746117b9fabedcc5ae16492b0812dbbbbc847bcd0266059e9d2256139e02f
SHA5122fc46d2db2a8f338e2ef155901605229565ff83c0b11458680a6721d39a6794e7297abbe32c98f582dad24fe22968d477874da6d40d0a86888474e6c5417eea6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bff0f354aa88dff8dc3ae0bdc48ca45
SHA14d66bbda03730c43885a2cb69cd85acbe278bfaa
SHA256bfe06ff79c649a664e1e563a17ee5969b1305cafb571633d839170c29f8a85cd
SHA5127ae6db6d0f8e21b275970ee93b12f377f3a094d10c2d3cc0c77848efe1d1d57308b74ed29d8a0816df29e3dbefc0ee83f1467013e553f4258858fc4ef5f24691
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53708c5e0e97fb5bf91587ca448a6ad66
SHA196e866b1880112dca85f523754e0d39bd1c37991
SHA256f422bf4d9ee6a122906e1d1e2ed451eb467bb353a5b8816d380af3d3be0bc4bd
SHA512cdc8066a64d9eaefc390e77143f124b0967c0542fec6edb528e22d0cea9c1b70f2cfc77885620d83bbfd52815cbb1a308aced8d950b90fe3ad723454f8a00536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5626b583e776c7cb29f5bf2a54e07b876
SHA1097012c41a726a9cecbe7154e80f3a6d04de45e6
SHA2561505804b806222b05a25b105de68ff43445f7b29030cb259ee9567fdf32bdb9c
SHA512d8cdf96b1501d950908cbb2bcd8a9d299344b28d69224d13e54a822f752fab5ba23d019d9ca937178d679ca630c6cc45d824f9df2722f09f272ea31e23f0eafa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588d6d1353ce7c6f95c22a34d8abf1df1
SHA1f363332d9bf1ca20a6f63782cefeabe526545836
SHA256eb9943860f8f3d3080c5440b149055d9b5e4ecd7b2f71ed48b759ceb480d6c3e
SHA5129397b3f2266181f03b7a1baf5071a25d76f67b3c25f4e0de94b8e9fa12a822819cfb6e532c0bbab6a3c3fc3fb5ed24ff0a5dd0ce5d00f047f766e98fff4c85ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8843842d41c346f9673c82ae424a96f
SHA1c6ce743c5f2a549d091d82c7782b6cec685d520b
SHA256ba76fdcc0c6123ed44a31843c494c9246a8176bdce73670fe1d82f72b42ba553
SHA5122ec5ede205539309b546f4ce46d16934916fb4d74723bca21932c5521539b7a9b5aa38ebded257cdd61b96427faeca95f7db0a1cf8a8de91328910de0509b96b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a883400d29953859f84cc584bf99b7cb
SHA1c17bb56ab37a7308a2dc84c99f55d371932000cc
SHA256f554c06cee2b102f2937011371f19f32de0b74ff352a8fae67c26a0e752b4396
SHA512009c79db488f52aa2bfbfd14bfe1034f4db8107c59d42895d66c3dd9931e1ece00b3e337429682993fca022c85b2ca705848efce895c43ed430e4ab32e8fff50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f851ad98015d3aeb53a67d82c5c47667
SHA16b4e5116edb1c914f3cc5068a23021439b258f3d
SHA2566999026ec41c26509a385ff2a0ef98675fbe02fb09774aee016e689797411c7a
SHA512c2df7da56e98244c01ae69c3043bc4f2bd75db9b51122ab975171cd98cdf3c41d2453b4d07d496290c99d38c633b3af4009576fdbaf01d6e93093406fb9d4a71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3c338b512308ee5547c941583e9eddd
SHA16ee9f6f203cf4edda1a5d8133f9390412bcc4593
SHA2560feac650d63e514635453fb007e12f79cc9fa55e5a7b35585d1b3c78b0d65666
SHA512884d1509e3850a33bb5a3f97b170f59a516a9ec57390d34c08fa59b8cc4294c15d0be367f36c5ab8056910e79a3b9b95d6bbefbef8ca661a950ab4289f3412b9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b