Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
10/10/2024, 16:06
Static task
static1
Behavioral task
behavioral1
Sample
30bea9b976e30a79365d248217f69f56_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
30bea9b976e30a79365d248217f69f56_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
30bea9b976e30a79365d248217f69f56_JaffaCakes118.html
-
Size
87KB
-
MD5
30bea9b976e30a79365d248217f69f56
-
SHA1
b9cfea3ce4fce847fe4892a28f0b64e3c8709604
-
SHA256
d7e98a68c75b086599b3c64addae019c3f0027158440d6cac9c8db0b859f7732
-
SHA512
0e7de17b8a5cc2a0149d16baa33e8bd176ea6cc56b9dfae174f0ad792af8df19ee286807a6dd0210cb65db411fc407bde99712d8042ead9aa2f4ec808c299194
-
SSDEEP
1536:SCl+mNMvMyMpiq91wmWA/vh21gp1a/mVual0eIBJ2M:SCltNMvMytxgps2M
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a07777a42e1bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434738283" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AB80ACB1-8721-11EF-AB24-56CF32F83AF3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b9600000000020000000000106600000001000020000000c5b41fd1144fd7a41851b51da4f0c374a081dbde922f34ec54bfcb985079846a000000000e80000000020000200000009be0912f61b6c387e9d7d3c9416b3bb84593731275dbecaf0625d15bba7fe0fc200000003c2da73e027d57692e8d61a35d5f79e6da28a2a40568d90f82c4e0d918281293400000002587babab7e4aae4680240dc3894f054a313b413113db6043e71a0b15d2c3ac71dbfa6e6e74a94c5b1a438f8e8fd95adcc71ab43c310e8de9f58fa921678692e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2068 iexplore.exe 2068 iexplore.exe 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2376 2068 iexplore.exe 31 PID 2068 wrote to memory of 2376 2068 iexplore.exe 31 PID 2068 wrote to memory of 2376 2068 iexplore.exe 31 PID 2068 wrote to memory of 2376 2068 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\30bea9b976e30a79365d248217f69f56_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6d109797f729f469d56edb44b1d537d
SHA11a3935a16b0ca82d6c1363031311cb11a8f6427f
SHA256ef4d77e896e0530e79355672274bb3b80c8677174edc16a184e8e1cb1c89535b
SHA512b6eead1e36d0f58df530e6631bc49adcb70c1398f116222ac9d120f51b58882ccd5cad7e7c92d0dff96098810941adf0617d9b250ee8967ecdf07b516199a5e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f816516e31f2d71dcb0c72a62a5c828
SHA1fa3b4ed561a14e6618d14569a0a6d1cc775a86ac
SHA256f7e8d5296574bb551e06b79f3e91f449264667328b34c3f25ef2c0418b7ee5ce
SHA5125210f5c7a7bc85fea7e350b7282077c985440e8bccb015f47700f39e045eeb7c666dfc9e2aff70440db0d38505682dc6c5713bd6e6d94c4783f508ac61cbeda5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539dc1ac5a41017ada3caab147f81b524
SHA1f248a7dc47e523e6d4027b1d2b2dba5512549b3f
SHA256918451da70633cf4743f2d2e254d632d9f029f47d7a3bb6ff4b60a3fb19a3bf8
SHA512c073ce77e27d83962c51d8f4ce7265ea23d4ec1983e5061e47c04fa12e3e4da3d2e0b59abc0050d3077f0b488f75aa9c8ff027b895051992e701f4d9f3db8491
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d15f10a860b1273ddc3445e88461bbc0
SHA1d5628ef0780d3d2c5929cacc3a66b6d4fcba314b
SHA256c665700923170efc539381a4863fd2b12abcd44d7b9b4b781d40709310508544
SHA512f57c2cc3c831f541e7b10cb3383c8c7504d58cb88d8025b173c1124a93fbe5f920f80f48a67b74b38795ccef8632bfb93c1b5a350eaac230bda1b1ad73b524a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bca2382421ff9e94e7a4a1177823825
SHA196b5b0b297ea8411526bb9dcb37741eda9e420f4
SHA25692e25e1f42737ee172b49cab2d37f1b52a0e3d7323cda1a8e6ef8056209a6286
SHA5128bb8a703669ca870adac6d6e09aa0414ac3685d25ae5ca21d5d0a022ba5630ea8c349fa9d552f48dd271f18c045bbb4dc095036007ed899c369aa08d9a12ff8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568f1f28f9922ca5b72a2aeb6ea76454f
SHA1ac9e6de35d117a2635ba128bb62616e1ba4ad6c0
SHA25616e0c46cc152abd5c596c3499a35394563e7a18986ed931fe352a3cceda8ed78
SHA512f3fafe5fee620cc6b658dd924bebb327ae4872c16ea300161b73f9e07cce567a7d1b0ff5065ad0a464fc062e0dd251df5d00280f03f42c38ade19b140a595e77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa2c589a8060e5c9dcabba10fb4be2d4
SHA1867d4c47781903ac012975fe23afcb5701e8b02b
SHA25686890d9b8bd48acbd6cd9872f33824c997c5028a10cc6a630d24539d63910b19
SHA512004994328fd420a6e4885503584f4bc9fe10831209efe0c15dc39ca9d3e4a048ac95f0f263fb21ae7a997dcc681735ccae465ca17b0b085a0ab8aa3505737cc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1cff3877fb434e723d6c817a8e74804
SHA1bb64b380252c1eb210ec495abb47e52a6e1a2318
SHA2568583b55cdab507eb975507230ec0d475f30ae4ba07d6f1307ed606cc95019d72
SHA5122b14dab471bb1dc95d514a2b8e773e89a09362b7a9816a3a04b1737a0db7d13e0cd6c31501d5dac2bca3ddd774bdbe83e88606ad8f31ef1b2bd192a3b0a55957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0c91d996311e2a77fe83cf815cb4c50
SHA1440dc25532634ed4346b79c05167db896f614191
SHA2569a40291b06d4c1fd879826cb8349738de32434fb8981b58f58f6a456e68ce4b4
SHA5125b8c9f25bc075b545b1a2eecef1394ed50ab33dc4799232cbd9de8e56188d0858242feb05f898758dcd90a2bbee0237d2d10c1b3b378f25b5064ae825ca7f8c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e8e92339425414a07242b39dcfab6bd
SHA18e1397a3edb1781a6f2f213c2869220f8d30666c
SHA25696d50bd4c6edd041a6c7117b92198e20c7607d5ea582bb7de2af1b4dd891a830
SHA512459c1d0e382e7d48c5290f579508586848031eb6771ce80b20ba78d3d618910592ebee850fe2ed2794237cf798a5137cafd741c93ad9150fb913b56aa3e3637c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbcc45aea5c79d2f053f41d2f1071fa1
SHA178541f26fec1c3cd0988ccc074e52e48c6860353
SHA256de03e1c56513115e98763eb381490a93cb22e3385d26fda41047f9a8debe59d6
SHA5129b3ad9387de1700f976f2e369f5238068d1cab4deaaa2ee6da1f37d8a08551ed932a46c43b9e1a9dfeaf649269fd720788ad5264a84065e68ba43c23ed093ba7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ae5c84f0c30496c4c0e43d8e4f01277
SHA158fc04762309779ccc80f0c8a46471105f4f25b2
SHA256f9ace39baa03d75c35f997fe7f23422137be9a74deefb4a050ef20762a76fe65
SHA512bee42d145a9f47c56985748c23b78a14b40267aa325c495c0545170efc4ec855167000fa5da56eb59ea52a40298245f5a555350f3d8246a22570c412e2172bb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502c8ce792a22e412791d3af88617f9e8
SHA14e2fb0874346917cdf2a1c79d6f8d4c81577ea56
SHA256c4cc9a76054bee8968a02600d6856430e22ce7d0d27ed059b26bd6e6589527f3
SHA51268572fb86f391927ccc3c0adecbf4f5998b5c7ab32e2b290af45d11c252aace01f83e17d9621acbf5db5262a6ca7f03b2ea361b60eeb4aafcc4b2d351fefae18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51953e2f2e3e726c908bd58bcbfe6df75
SHA1f4a1f59e91558b02c61a6d6ab37c061b89d1a368
SHA256cc05521e6c577fd8bb2396fb25f6a79510160da9dab3dee05ca6e1bbb67315c7
SHA5129961feecac9070a57e20f1eb7760af779b057486e08cafd712e013889ac7238dd88a406a63aa8e6cff494e9d18dcb24dcc17a84811e2617d5845e62177605a2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501429a6fbe370452210a2306c9d7c605
SHA181881c20d2fbcee30cc9be9b2dbba274210e7510
SHA256809b8d7caecbd3124988ceda3e5abec3e4e613591fe8d06c86984a954e789150
SHA5121b778a1396870ba367e139271a3d88f15efc3581a56b9e10fc88dce4ef992e25fc235af1f31a9fbafffd9b83ebf8d908b94de9d5ea870699257e0504e8921150
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbc9822c6fe73fc76736af670b041393
SHA11880087a01b4f7ee08ba98326699aff5be271dcb
SHA25632d2c3c1c9d259dd134396932d85a82ba69f3db49bbb09453de927bea7d8cb17
SHA51292c683bab604b22ef54404ee106f9bc1714e7aeca91016d6e69f803c8a390ad21ee80883f7e63d3bffd641b4baaebdf23e8660b650d36216f8bfde7eb809a111
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550df9e2bd383d8e824a8f093d4135a03
SHA1a82161d516febd1466fdf2ca7ae320f1ee684d31
SHA2569b7fa59ca1a9649fd9c3cbb13fb7f47513b7a309d6372a3af7e6aa2e7142a9df
SHA512b005a0e2b3be3ba10684e15cd16addfccc38e10b27d06089a7dd9d79d31db98b2ab44bc99cd9f066a895ae6bcb2043d5b17d03db314689ca8cdffdbfed77a458
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5c12621dfb7808821bdb8e4a81e487d
SHA1f87d620c216d8f88d199b8d7478f3282f5095ba6
SHA25613c8d271de37973fabc2151ec31b25131be6d472f205bbae4a15c5bc55d05521
SHA512d2f78e8e1a1f351f79ef361907ccc1f32852b4b413336f1f30f78aa714cfa5d8633974052faf4e5ae503c6e848616568f1473a9e6d38f22eba791b8dc832201a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c4f2cad0c43840bc1fcda976e5f6e79
SHA1c151a0574ea40760a64acfde8cc2dd1997f0d91a
SHA2565496d48e33ad462b6990372cd7e17c72eae19c5c9eb74ef8e88e2d755c6e9325
SHA5121dc649d4b511ea4bac0239a6da07569825c3eae9310fb9098f5ffaccaac01fe82739e9f61ff73095830ab2b037a5638d9ad6140f72c7dde6fbb1a874da2fa190
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b