Analysis
-
max time kernel
121s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 10:19
Static task
static1
Behavioral task
behavioral1
Sample
2f591581f62dc7e592b65f884aabc98b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2f591581f62dc7e592b65f884aabc98b_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2f591581f62dc7e592b65f884aabc98b_JaffaCakes118.html
-
Size
11KB
-
MD5
2f591581f62dc7e592b65f884aabc98b
-
SHA1
bd90e081605db84a5962fa1569b26c85053f4bd7
-
SHA256
6dfa1a19fb2e03ad5ebad26c14d61697f30738f3d4380e0a0b292388dd5424b7
-
SHA512
29733c569a89b6043feb7ae8af700a2657744d51e6fcd0e6e34a0dd9e87ce69fa1a50b86bad718dd4b8e4d054dd9c76e6637258549410c87ed5d1198c3c03585
-
SSDEEP
192:2VGlIsr03q/8k/w1wvqyPBJQnsbCHUP018LOXuBuLbdU8d:sGlIcuqZ/gcPBJQnsbCHUP08LOXguLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1262B011-8694-11EF-889C-C6DA928D33CD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434677466" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0a6c30ba11adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000004f8274bae21ffbf0b0f8c60618c72e6f1eb145dd687dfabb41bebbf7460ed090000000000e80000000020000200000002cecb94153568ad28f765c9e7b4e3c05a28328610f87f12d2972c5efef0b20f6200000000b1f2170c02253c3ed12e89bc273e72e1f121a2dcbedd34532e19fcf49a397b340000000505ec6125ccdab405737cf1379b1c4e9fe74f99997bffa427597d1ca605ad09ec468793a85c59364f86898713e6cbd25f43636f8b6f62b86e68e961d5af6f580 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2084 iexplore.exe 2084 iexplore.exe 1224 IEXPLORE.EXE 1224 IEXPLORE.EXE 1224 IEXPLORE.EXE 1224 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 1224 2084 iexplore.exe 31 PID 2084 wrote to memory of 1224 2084 iexplore.exe 31 PID 2084 wrote to memory of 1224 2084 iexplore.exe 31 PID 2084 wrote to memory of 1224 2084 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2f591581f62dc7e592b65f884aabc98b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f61b37645b5c97c358a53ceddc1104a6
SHA12fa919aa31e93b8b1de16c45cb0513e483cb298e
SHA2567f7c2996cbd96ef3a0c68676f940c75e1773c0f122afd27154099680f6129bc0
SHA5122f9b421a4b92b5730361b660b35c53bcd985a249da75a4c474403c6f492f9178c2469e3273b074b62c45f001f5d31abd08eae0d78880b56343a5b5a0403c1266
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b1b787c7506c983cf93ac9f2a9168b3
SHA1c10678535233a75ec62e0ec6ffbc5895fa413798
SHA2565e230f97bb1192b80859482e2e7893f3ecd24993572822a060ea6fad20a9e00d
SHA5127f44ed02c612b803d7e5de901b9a52596042d24c81dcbfbb89d6dab5ae6da932ea3074d985e549e5a1e44432825cbf4be964fc53f2c14af59b9ef3d8394d6109
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55da25cd3fd3ba90e165eb8b6fe687c4e
SHA1aae9d3b86b768675780e5b1f9dacf00f200c894a
SHA2569fc2854893c5ee5a7900fbc8a8b5afe56711b5172b105440abb9785cdba8b49a
SHA512e370d3be804d142597478a6ab33d0d9713d5cd71582d76f9269fbea6908332de03c52a351558e0b1dc74f4e2d79a55fd6ba0669787980991e5b88ba25df868bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508e79555586d14a231a240a7056e9c42
SHA138cf28db79c06a6255375574f663393593a7f05e
SHA256afb29983a0a50c1dc5f13132632fa6136fecbe60f8b96a801b6794ec085f0895
SHA512a4bffa6aad98b0e5784e537fcbceef375b36de95e1105506125a3c2b0213ab304a478876067b748a511fe28373821033a3192b827607e849c73cd04cfb5c5070
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efe82fc1e0f82d2d27f2e68f9727fc41
SHA127e7d9da1a8624ce8ee04a053958bc8ba2b0aff7
SHA25628af66ffdfbf1db46cdd542064648ce5065e969afbb1979e45106545995e958f
SHA51243385c7c1f29519f7fd02f264fc8658e9e8ce032876dc3ff0b978c7156dfe170a717827408f8f1493689269b960d7ccd3f600beabcec28d6442addfec1d89276
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534952107e5185cbd4d97c91b952a4995
SHA1f4bf33731724ae5e0b3768499fb613650891c83d
SHA25630474adf892dec11281c7957ffcaf5a4c8a72b19da3e792c4aafb376d159d5c7
SHA512eee881eb4722d9492309f24275c3489c048ca454f3472803f850c4aa48829a4174d333e4e6d0fae80140c01b1aba2f3d6cb4fea7fb536c22ffc43a451da1b7d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536082805df9edb874b4b78453a2bed75
SHA184bfab9054ec25667dff4d89112413860489e222
SHA256b1e19b4e9b66f93326bdd2754ee4429ef70abe6466cfde3a3b6474cd06dc0528
SHA51283742e828e583e7693e1933cdd7a52bca3495d15d99fd1951c9af12f9788fb050820d5ed4aef4d594c0637e9a163f2fe59749935c337ff6b6d8cca5f5ae344e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d90ad4315d76dd63e8b7154a037f95a7
SHA18bec72d447b4ab4fd5920c2098d506ff72d19d81
SHA25620c7c6dd3eddfa532f9cabe28cd1217fe853bf4536bfddd784298cbdd8c9a28b
SHA512757b8f5405fa65ea01949b2ab8cd7bc12de0e6ff3f351ab40e146a8fc7d699876e5c580b00c0f50b692f39ca79c98e01c756938076384596c1cd8b2f2385d2a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f074b916f5fdde0438b78ebf75485b3
SHA18c23a1b519f901c2d7fedd0375a167507ba686cd
SHA25661166fe8272f3ca520ca70a035d3577a4490b4b01eab1d135d93c6fa63238380
SHA5121ded7bc3becb441f3845b6f0b3bae599890954710aafbe25e87f0a5a3bd9cf9fc3ec6d2d82242b74d0561572105d9e13f36075ebef668c5785f60daf9f09ce5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e25022c053f3a185a3c7eb047fc6310a
SHA17037f53dd8773360c6f9705bc8d0411639c06760
SHA256e134f2ebe79e70a6ddd99844e92a4abc354f8a8e6a3c1df45bf58e32e4d509ca
SHA512c227d97ab9e0aa55036bf72f17ec2c03ff8ae8d943aeebc38fb1450632b201d1dbe63377e1cb7b4e7c7f3c4ff16e581ff16ed2162184d539224df51a3d506143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d82ca41c1892f469ec23ec3a32aeebcb
SHA14c3d1302d40a08cd21e40c7c2a483a06997681af
SHA256b06eb17333b0a7803eb796761df2c03610b6f482c457e11ea18b7fa56cc0c701
SHA51298ba4ea6eeb2e0c86a23f2a9ce3597a21d7beb9010eebc9f365118d550fca4fd3284896bec5bd9da9627b2a66a8ed88c9a72c50f79a41cbcbe4212b8cc24cd59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d755cd71634ac9598aaa92762ab4c08
SHA1ad97f78e2cbff893c555a10264e5a32bc94b0ed7
SHA256f0eeb741cc1b79c3483fefe0838809b3cb6d6d0200b0ad55046d71cad51bd1ae
SHA512ef56b52d01fde1f349b61d846d4ccf4c4aab3d22a91f1ea1ce667e090038951cf66d22f0921d2801a7e023b02207ad07318c34e048ba625cbcbc1d2af46f942c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed2574923c198bb6a416b0d856b3ffe3
SHA1c5262db7d573d0f54cc12209083462e6fd2d0b7c
SHA2563ab57444e1b5b8bd61732df129110c32cb5df00db4fed5f044139c951dd25c91
SHA5128b6c33eb9cb96d89c78a1125166dccd53f62d5f5b5de45f0d6e0ba3b6a2f1e40ea55f1b63d50ae8d13855f04331195123c88d8d11266e7771ca2c4e7160032a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f59e7ad7d27b9ec420ef6ee8ceedf8e2
SHA115137232825a7a9b9e4d96e8550350b890d27be2
SHA2567d531fdade0a9c6d0fe7db5f8777211fd0b2dcd5e9002715489fb4f44e894ff8
SHA512765f5d97a2e890b90247d750e3eac149d862e2f74435fdf3ab8c9ba1112fa3f3a72d1b42bb9ef6b8ff1ec7c7c21cf8d4757da2054c262b465d7f3e24224cac3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f30664fb55d16ea2af8f9b2d701ba2fd
SHA180642f3307b5aa19c0e871cd19d5fdf12a99dbae
SHA2562df1937474e26a22e47337ec074b2f47916411b69e4bacf0ca84258571d30a7a
SHA5123cb52737e71df5d74920b945ef97ac790490b0b9b81a8fb367124148f8ad055e1f2159c19328bcac990b0b2ff84600fc081dddc6b5c77ce50f98c16c25b2466e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551648a76cad847fe4dae000ab6fe0191
SHA1ea4f18483ebe245daae41f23c6e4905f1429bd9c
SHA256c0e285b2d9eeda7bb3d3da70671d0e91c6dd1b8b6b3a4d5f9c3d3f0eab542e88
SHA5125a80213f7425d5cb782c7d3771e092787c8d7042e830ad23fea9602877e0201e059547bbac825347cb8cbb9836a7efc806353a32803fcaf85d8128b2bdaac57a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5066908889089101d1027b97fc462acea
SHA102e6f5afb4d4da5669948b288ad261ea96d0f897
SHA256b7490d89c1e1cfc07fee1a203ab53899aae18974eccc7159300e7abd0e715724
SHA5120dc6c770063fe2be6b2cabd0aafecc624e5fabc3750538274b81b92bcd24b62ea72281b640bf55b4b5f841d41c650aa9405e17fcbfd1dc00f1ad16a69707cb52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5034464184277e4269541c167b876f531
SHA114791264195a508d992c9ecd1b79f8c19be7dc5d
SHA2560b0e32b63c00cbe8a534edbd0117d4ac658b4ad61f7699d124c9bca074fc5eb8
SHA5129d7cd924b79b938a5fda19df63f9c74d1736f7cfcabca6f269a719bb2ad1ab6c385429d7c275c5316013f0d968e4ab84185d15c76d8423e699454742e4effe5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589d5055ab51c9c797251b77f8a105baa
SHA186c4dd7f27657852c9cc229f18fd125bc10377fc
SHA2563887a7743aafcfe4f5a9914e0ad8e4136052d3a1ed6bfd26159914955fb3e1a2
SHA512ecedec0e25b489c750b06433586f6bf8b1b9d2bf38ab5e02c78960252131569d9077f40bda75d9b648e9735d5dcff14fa5fc9ac1c25e61fd9a9f9e54846fe1f3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b