Analysis
-
max time kernel
68s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 10:19
Static task
static1
Behavioral task
behavioral1
Sample
2f5830c2dabc4cc239a95191afd597f2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2f5830c2dabc4cc239a95191afd597f2_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2f5830c2dabc4cc239a95191afd597f2_JaffaCakes118.html
-
Size
7KB
-
MD5
2f5830c2dabc4cc239a95191afd597f2
-
SHA1
f4061282a0ea3ccc256bae79140a2cb50bab8cf7
-
SHA256
332c1d137092cf2a9cb8316ee57a969bc4c53bee6144a2191392a433d5e2ed34
-
SHA512
2f29198eaca756164c615b599743612e2ec93045b740847d43187874854a7e1fa62ae9fabd6cbcd43767f82c0d91711a3eadabfeff70fadd745d3990ce4bff75
-
SSDEEP
96:QWuR08BcF6W5JxeXhMAfhhI8Afe0uegRqLC7ee1njKR4z62Q+ZuG8UR1N4VJSsWt:QWHtxeXNhaQOGPWIxdfbYgvVkUyirhL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000008f486108d27838fd81226bbf8d3725f3708ad31c6d2c8b28dccb68f924815862000000000e8000000002000020000000ce6cd5144ec6df781fcc0e579e213a51c7d0ebacaab78851cfa555fa32684f5620000000ed7c7049ddc3124ad2561bf7bc4bf9b0687d633c6120e7a4d7b3f9225f7fd63440000000422613bb602b1c32bb1a3dbd7795ba7165252d5347c27c2942c354afe586b16bc479341bf86789efd9a7a9402cc7847923f1a5e5bec43914b0f36e3830ac36b6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30e32d25a21adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434678001" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4FDDA6B1-8695-11EF-BD50-D686196AC2C0} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2000 iexplore.exe 2000 iexplore.exe 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2764 2000 iexplore.exe 30 PID 2000 wrote to memory of 2764 2000 iexplore.exe 30 PID 2000 wrote to memory of 2764 2000 iexplore.exe 30 PID 2000 wrote to memory of 2764 2000 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2f5830c2dabc4cc239a95191afd597f2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2000 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53044317bfbf0c36fca8b2c7041d2ac65
SHA1ff08d2cd04a2ca3a889926ea83a6edfe1f5be1fe
SHA256ca9c3a367f87b575b92a556c32fa15e56792464ad62c9588e2c917c4de85427a
SHA51200f9242fe4b7cba6d19ae29b54c4568a88a4d74237e4c2d24f6b7f5fa492ec3cc6c8366e351e6348cebead3d0e60e6134b72db637cb98263e26e6f9c299d7a76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e9b3f7713a30e70e5bfb21511a31edd
SHA195cc43c1d3ed4c4ed9283cafca8537fd139dd6cf
SHA2564f7a12439b7fb8980b21ed1962d9eb5627186f945f119838b5c83166b67721a8
SHA512e6779bb11ac5878f51254ed0997556efc4fe159b66e2af679004fb58306f6c75b0c8023a61b124270f760d829607ca361fd6ff18cd5a5fb2e61aba01615f6d0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576ba703920e4503a68af9dfd45e77eb5
SHA10bf227fdfea40bb9a29d18553376b6ac38d0691a
SHA256773c951590ff569b335d68794cb1e8bb77bfa0c74a5486184aecb9951dda9e7b
SHA5127a86013e74039b07831aa1943c4bbe0d14b4a5b2c25d99a24efa21a3b8e051413c6c2e7a5f27e1bfa4c50ecdcacb6b757c0c5b3631df782b621075d391a78e50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51724a63808897971c8eaf8860dc3f080
SHA1c04dae3fe94269f1553e65ee4ebfb517c35526a6
SHA256a29476fa1fb5482d67081e79134096fd58abf02dd417a4dd7ad585b18e54a822
SHA5121d8b2c6dcecee8ee027487ffaea8ef9a1f222218471fd9effc98782c90975852fed29d87afc0095abfed89c517c4d55d67f64d66cbfd18250791137c00e4ccb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dd4622cbe2b2d3f07f605236be5fa34
SHA1afaaf01246d5eac5628d23ecc15e68edacb10b13
SHA256c049484f6ed6085e475aa3dac97898d53fd8cb47ff4eb45f071ebffb9d4badff
SHA512c876ba7fc91681b3a7d5dba86a09d3840373076b3083e532583556b8b5a0952541d5c4a62d5edd4b00b886353946374b3f59016e214a4386878d9ded4e82c7f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8679d77b4424106eb1b5eab2bca0f4b
SHA16ffcb4009f3eb4f0bdd0b7ab22bc7ff804b722d3
SHA2563c1189a621f75ba760bc92f8c6fcc7f4f78ca73c6acef70bc8ad0ce4b4d2b61b
SHA51275eba2309e55b713821afb5b62cb7005defbb0722ec4a9ae1521c9dbeb487468da22b523dc3ae6d934e9bc9d65908d769aff8a3aad4af70ff7fe7db30597cdd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56687ca7bbf861c85bb67076ec940515d
SHA11a76045c4ab1869a9d416ba7d31c4f111c90f3f6
SHA256aa3d7eee34fb2d9397d1505e761e21591caab96f0d692956bf481a07e48636fe
SHA51205e898412e522c695b745d49887763002c169927d1f03c095f1e5a84ee5df081866b35ca597726ee0556ef8614964f9211212ce21d031372381338d24f88aa30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc20545290f7e9416eb1c8fbddf87c55
SHA1d8e2a7226bcc251dd6feb5ba972601a90c00f7a3
SHA25686525d2c349902fc23bd11cbd3b27214e338da596a4c7835176ac25471d64ec4
SHA5124da165da778a7536f23428fd9016f68fc11a548efd00f97a5072f56e19869ac58bade2b33fb369089cee33562a3569c5540bbf48519fb1103361ca19b6743ec5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528b49ac44995d065f1f3d139bc7631ce
SHA18a5be9c40b3957d1ff5d489b16b78bbb0a228ecb
SHA256c2778a665efab556649cb1d8eec0dab5c7cc43c822f696df92f26e8e1d21d8e9
SHA512763dcf590642cc18d9603b057bcbb8dc3dac952ed6e5137d3708049a6cd244b0e552b514853bd9b1963cad6011d48c2bdcc965bd5af978d036e97db3ed5cb3bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aeaa7bb5bdbaf474b3b993051ea2ab25
SHA11d622cc4648468bb04e5aa0e35ef44e8127de323
SHA2565f2ca06e205c16ce03382e57a8e7893bb0fb021d15a93ff7d269dc66137ba41e
SHA51249af0ae698c67e9846c31f5e578f0a87a99e9e94c2ae400b70585e71669d7ab4bdaabac05298cb3f1508db19975f2b85d381c0febf9d1e4f271585112c4553fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5052842ccbeee385ee440fb869b92e5d3
SHA10ddb17b60939adc144dafd07f20282795318adea
SHA256f8bc435cf16353c9b346f70792668e72b095561b50d28a1283370620aa04700f
SHA512293c8cce432f7e22f50cec65e050183331e9bccffee61c86204c045898408665d9298b59dbae71b9ad51063b921b70cc92ff8262eea04a195a7a71f81647a503
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584e566706ccc624393b624f711ef86ef
SHA16c7144e96c1e60a12ad24a8988a3b86a5d4e862d
SHA256776751745412dfa63d8977f1699acc29b3c395942272d052b2b67e62082656cc
SHA51235038372ac5a4ce400946a10e161f5316cb187bd7f8cea2dd3063a0942423f706b19ec240b9323169a3e4116d407d4f2646c7af78355ded91c9855e833c31ad8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f14948087fc6b453d9df91e8bd9f776
SHA149c6288f179858f0a480ad09ffced363b9682e28
SHA2569667ba2b00b4935d33bd2775aee753904fa7c86932b77f57a0c38f9f2b90504c
SHA512453d9ab691ff751c75d1e75929b3590c58723ecfe8fe341488f78664388afba71e6332288f8de38ea346763deb7babe4998a67de0eea4bfc6be3e27d7d1c9944
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59810fc36c375cfc86dab2759b93a0d35
SHA1a61bf2e15a6b7280e0162711157fd6fabf10d4d9
SHA256205095f20e2d3e6d14b1e618d542031dbaf69504f8309049a2f1f44f0d4a9e81
SHA512326ba58a863645b78312f4385acfb8b96103873798f19236db0304631d7580827ad2c6da1f0013464246ddf1ab32dd50864ae7a5ab0ce4ae3087fb2856f991e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5799325e4a8981b7eb166f427ac2d143c
SHA10bfe20f2112022376ce358092cc3cf9530900fe1
SHA256fc12cf2a03dbb0e562d3296290bfc3b962c6ab6a43fbef41da56d52169643a97
SHA512621b71b7463a0f70e61fe1975e3d7fe8a1b6fb272d79d8056a2c9e67851ea2c1669220c23570185ff79b75808b13fc87bc1862be80ad62ac75d0101b754be743
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8561a14f4cad537200165b6d16adfc7
SHA10978d5b4cce4ccd6384c482668cd53be654032ce
SHA2561bad3c29f027ece28d455cf63676daac1d8c22f89990c37232dc01839a38f641
SHA5125711375a5390cc4995e22a8b66824f76ffd66a06610dcdb6c61304363c2175f8c2d26b93c42d146cd9b21026c07858863007eb389bf6b814fe00ceafa1388d74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ad0121c00912cfea560f3401d0431ab
SHA17ec4a94f17a6e19e32a04ba955bbf57a2ec663aa
SHA25675c3442968d3a7b3a3b935d8dd6a1bfd8e4df2d866a94277f98b131c223beef4
SHA5124086475b4847236cfc7c3154874c9e6ee97c731008fc63e0f5682513a2c3bd9e91094d632773b5c6167bf8026f180d1d99702d93b0ee9a955d94d1a2c3de9aa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53229f77a9049af1aa115d06e1b834607
SHA1e4a2b0b87725c116e5b34e9bc92b1fd18ef6af31
SHA2567183c38595e4321670d75a13cd3dde3deda608d628f4f695788b29cf168a2cc4
SHA5121aa2d953158169d878731e3a82160c0becbe98b60e05c406900804cb71a2ff1225580d518fa84165414b060194ac4508202ac6aea6818b444fe949d6b483f110
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e92757c57bd2224947dd9cd3a2fe48c
SHA111ac5c0784259013c41dcbf38b96ff6c1565f9c5
SHA256d2dfb8edb31c0b685ac6a80a8c5cdb9819e9e7aa300d60a4481cf089f9c0d93a
SHA512e81cceb1b5a553515c629495d7bea5b0ab8017342e3705bb40ed760b4124076677bd23a9faf5114786213a5c6a9a72965f1ff27c9766d72e5e36f2ddb73d4aee
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b