Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-10-2024 16:22
Static task
static1
Behavioral task
behavioral1
Sample
30d0edd90f24e6bf657aeee245704be8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
30d0edd90f24e6bf657aeee245704be8_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
30d0edd90f24e6bf657aeee245704be8_JaffaCakes118.html
-
Size
24KB
-
MD5
30d0edd90f24e6bf657aeee245704be8
-
SHA1
61b4215fa859b9f7a377ffc50d9e426e54d56faa
-
SHA256
b0ba042a00609f57178818c206db0aaf6df953400919c3ff0434e8ba802a82e0
-
SHA512
ef5d5ff6c784563b9601f1a89bcc97b69f86eec5a4b45bbf2c31cdce21202357a7e40405d466552c736174283995a258037a2f918975193291008580af1beba7
-
SSDEEP
384:N/WUK2AQrg5cD9JoMUIrQBPyLb8uwel2P6z7xjHyC8I:NE2pD8MuPyLbKI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40cbf9b8301bdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E1C657A1-8723-11EF-925C-5EE01BAFE073} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000084961d360865356fe53e5187a94eaae4d85329fb7f2e5214552b343eaff9d26d000000000e80000000020000200000007be2602cbc29afcfcb0be2994a92566fbe4213d089f52d02eb5a1d396e133c67200000001a4f76db1e8d714db55d63064069d30191c012bf97167c224eccafcc53fe0db240000000e8d50998e43fe1a5c9bc95bf88aec87e73cfec590287e22b14ca16c7b4e9b6ab6e7ab8461a67511cd4bc6408b003f766f96d6544841453ec158e3e57e4d2aa9f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434739233" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2736 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2736 iexplore.exe 2736 iexplore.exe 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2736 wrote to memory of 2568 2736 iexplore.exe 28 PID 2736 wrote to memory of 2568 2736 iexplore.exe 28 PID 2736 wrote to memory of 2568 2736 iexplore.exe 28 PID 2736 wrote to memory of 2568 2736 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\30d0edd90f24e6bf657aeee245704be8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2736 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD567e486b2f148a3fca863728242b6273e
SHA1452a84c183d7ea5b7c015b597e94af8eef66d44a
SHA256facaf1c3a4bf232abce19a2d534e495b0d3adc7dbe3797d336249aa6f70adcfb
SHA512d3a37da3bb10a9736dc03e8b2b49baceef5d73c026e2077b8ebc1b786f2c9b2f807e0aa13a5866cf3b3cafd2bc506242ef139c423eaffb050bbb87773e53881e
-
Filesize
436B
MD5971c514f84bba0785f80aa1c23edfd79
SHA1732acea710a87530c6b08ecdf32a110d254a54c8
SHA256f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895
SHA51243dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD572d47e9d6a2bd8ff4b2b5441d0ec7af2
SHA1ac0e66b28d5d1c85a25291315d5c6871becbb369
SHA256f017112e27922880c65b792c88312e9f41ade1b9c2918a37430e2ba88d0a4ad2
SHA512de0b94b03088b5fa67f8e73bf9363dcfb65dc85407b95cc0577fe0152f7017f13d4a31f84b45a54ab885c23d4992ef7663aa3fc848f1dfbdb2388f03ea1c5303
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD51c23309f977c398cf0f568cb6333c533
SHA17e4c2d9d04adf0eefc8f84e37de2a741d9f626a0
SHA2563efb4046e957fe2e2fd1d4eedc45e636e0fa77844944bb66a787dc3914a5347c
SHA512e4903d982d059c7fec3ce0ab229129a28f7080d137b40b91a7936af05bc70ee46fac40b68973b2c33d399de108e90831503fe4e9e129294b88634da720bf654c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56170082ac82527be07658cbb9107e977
SHA1cdb5ed1796b044ef5d2d7e8da3059e5b7c246abc
SHA25603650007dec1730a2d7e6081bf8c55189c51867778ff91f877b33c6196c3f52e
SHA512da392d306a5bc2581dec63883be38886ee27de91f10c4053ffde573b993176ca861fcb1c40da90922a0f8de83d9fdd274f1b2920b0cac0be909103a78dc7b9db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a45a758fac15e4a9a68e9f7bc3b1ccd8
SHA1697b239f4fdb9d4cab4881a1910052800de904d6
SHA2563b7f07e560a5ae8ed235e25c4fa9bdd581571cefee7169eab9b0c3c39562e847
SHA5123bd982813d5e09c66d51ac07a36861bd5cc7dc89660c128bf5389c1cee137834e3730897a6116b2d80251f6b8afa2e241e1eb5e697241063e42aaf3bd778217a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2686777d17995c75cb781b99132657b
SHA1bcedf74b394f76ae79083799a421357e09e0279d
SHA2565445b87175e12e4e189d4c09f367ad43563b4e4767f11e59c72fd6cb7484d897
SHA5123713604c9acd3cc15117ffa7bd6d36446fee9050e5f207699876aeab5f3ed3052624c52567af89ce68649f0c670b6de77ad7076e2c3f75c93873369471ce0217
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5463a7ac07ecd94493d6b954ebcc1613b
SHA14a433632b01a624a6c214157c7f77a856713747c
SHA25672c3a4455b1d06830540c711b7daf4610361103bb37dda99b0effb1615f52056
SHA512cfdfceba7453aea5c5c54d762c9a7714e5d3ad78be9a092e04c37fb2afddb3a80cd4738d9c8cdfb395b4294fdfb50c7b93982d99936c3b561c23024c1c83ce32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e1d708148c79a370a63387c31bb7a11
SHA12b29b64b33526800fa857337a7ba0701ec240f3d
SHA256ad9594182cc0d4caebab59b69231ea0d309e05d5626209c9e0c9001112937d54
SHA512eadc2e4ccbc078497ff6f577fb1cf5172c7facc47db6d543f3832a4046ba2e927d60cd77904c3936c781458106b330e84b6ff4bed5ebb4206efa434353c573bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f44385835d95646b598c9d9e5c283d6
SHA1d47fd11e4f728c84006a3ba513f48979b1f077e1
SHA25677ff7ec0d815558f7dd74f2357811597a0b651fd7a5d7d9ed3e44621f5cd3cb3
SHA51221ec1532e83ae5cf951f4409cbff99d00f9d249de0ecf221e802e03908237886512be40da7c7df6237492d22db59e40b2f8097352f995199d034c43bfa48543e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53136b76efcbb6473122028c18eb88a92
SHA15952a9011d0018dbda538b7e882d853ed4923a79
SHA256313d36007675c08833e66e07aa0d4302eac71b9cc42a39d5d4bb17a8d0eb1e5c
SHA512c8e6a54fe4b761a55919d95a74bd68b002ff9b6786ac3b108f1e82ba2c92d847174bb131029793b1d1a785b8b190c88d9ac431e687d5a4652b4ce0c9467b0468
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c630535681aa7b794121401b2c813630
SHA1da676e9598ed477ac9a38589a9ad9fb61abdf827
SHA2567542f586fdc63c9f50660a43a544f29f5002d01bee691ab4201b1370ac9e3885
SHA51212e49e205370a7f92f3e303c10ced9239a68bd7f585d634aa68b54b0f5dbcae86eca5824bc4b4178271cd4e707dbaa01384b33fb8ddf5478b061a9471dc798ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5579ef6636964d111265c3a8b2c9f86bf
SHA11a6329c85853000d0f24542bcaa0ceb1634dc305
SHA2565d47b9b6dc59cbfd532deb931d9c6ea6340ba5f810aaf8722360391347dd9c2d
SHA512d19fcd34bf69dec09f70eee31f90de095f1e0802f0ef614dfd230c489a2da408e78846acd7fac337e3d38868b6d66402ca2f2fcca4f46362b264b432e8f5b980
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5718dcd531dffe042dab3580831ddb7bf
SHA10f8b185562598edea96608f62f5b81249b99162b
SHA256e0c0c8064fe0fba1bec11217aea1e4e25b91f00caac861e95c81ae951c876ba1
SHA512c2d0ef80fe7526a5545e81aec127fb4f87a32008ebf3441608275de435ebb3a378b1621a7c07fb4fc1233dadc0459170493e2f1d3abc5a4b52cbec58b07bf714
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD5b1449845f49c677b3f9e00d303a1a0fe
SHA173c997871c5374ab56325bfebb4b88bad26f3390
SHA256e173b9caf83b1e6a33a73201d109a592c4ed9dc08ffbe7def28f3648124d3ba8
SHA5126a02d034d00ec19f42cee92aa04695ed34749020c99d350bb6918dc3b6493c3bf85724afa1a5d369d46a94526f197ac4adb0f330c011864c76c046150655b13d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD53cbfd271935a4257977967289447ecc3
SHA12c7fa44c272d2d717b7830d61d2acc651d29eb8b
SHA25653c47ebe4936da613312d06f29757857574f8a460ac5dc427da566802a226db5
SHA512e6e15bb910554c6e4186193e78eff5b72689897403112c02be1e68da31edbefea8fad5356bf117bdbc83759ada9a44a887adb235bfa4650f832774b7fb5df5c3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b