Analysis
-
max time kernel
133s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 03:08
Static task
static1
Behavioral task
behavioral1
Sample
382938e471979e79b7514594756a8797_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
382938e471979e79b7514594756a8797_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
382938e471979e79b7514594756a8797_JaffaCakes118.html
-
Size
46KB
-
MD5
382938e471979e79b7514594756a8797
-
SHA1
9946d1038ef4a8c075f835c278bc440c8eface2d
-
SHA256
ce0c76359d999d66cedb19361a7e12797a559bb84f139c609a26b9cf7254b064
-
SHA512
aa84e1a0011667ac0ffe8963ec4fff90166a81b6e3df02cd24077663a10a070d570b301c7aef1ce01c0525ed9dcd7eee1e7ebb644a3b871cbb1906ff563533e4
-
SSDEEP
384:SjswtBh7gV651J+j7ESucgWNzZQFqtXZbC1dbDa7xfFAIE:SjswtBhsYzJURQFq1ZbC1dO7xyX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 208b3414541cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434864373" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000008a813769b7eeee165c3a80aa7ec35314e8c16cb33f772eaa35b78140d984bde3000000000e800000000200002000000037be0aca795f3f8a90e36228a1bbb8addc0ec9d26d3af03721c3ba4891245ac720000000c3c249f1204081910c5d60393b9e718559dfdc66754aa7ce5475575804314d634000000084ed621613fb8d4ca7ecb9339142234d2c409d40383309815018380bfa886d24f2f15df199813608c7bf4b07ba304cc0a0057860f47fe57b5a4d010433976440 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3FAB30B1-8847-11EF-AC25-4298DBAE743E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2604 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2604 iexplore.exe 2604 iexplore.exe 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2224 2604 iexplore.exe 29 PID 2604 wrote to memory of 2224 2604 iexplore.exe 29 PID 2604 wrote to memory of 2224 2604 iexplore.exe 29 PID 2604 wrote to memory of 2224 2604 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\382938e471979e79b7514594756a8797_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2604 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8ae8cc4a36aa74eae2d26a06083ea5a
SHA14b74c5438aa8609209f5b2f76c21f1f246722fc0
SHA256384d3039214d9d6fb8b2324fe70001e7203871eb636139d89085f431f9748cb9
SHA512d81e7b04d8dddda47d5e28b083e7715f85807bee91627b9cb3b56c70b54f8fc06319365b297204a85ba2ad8141ea7a57921d5436a1894a45928cbfe15088521a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4ca0951d98fb26fc69d3b45638a315c
SHA104f065117cd8dda545b7d5f1abad14791691386e
SHA256a039e1470eff9e43840ee1308c09b4fc88e3a4badf1166247565a9c35f6b5e75
SHA512e816c5b9e67a104d26e7e3401f8885dfe87ddb47b4f7268167d374ef3275c2537893b50f45696d2712253c63a649d365b1c8b9711b3772ee2b7717323a7ab12b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7016a05c14040586b8678d77d4f6930
SHA1cc04d3812ffdb436dee2ca43161cd0e58fb0de89
SHA256823061f80ceaeb66a87b43dbf3bf501f73c450ffff6db740467e61f5f8fa5f0f
SHA51245707e746b3f547e293bf4ca5ba457a1944f5c4c107b2cf0662b3e9b8824987648cb2126939c9317991bbeeac149bb37a95c8eaf2a0709fbcb5414bb135979bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd158fc8b26bf53b03731c11198e53dd
SHA10955c88aff825b0325df76afd7c3c3644b0103b2
SHA2562bc21bf96fd57ed912e94333fc9501f7e08005d47c6343e028df06a36eb9c7a5
SHA51235bdf13a102de77a1d51e696971ff3f2785bf4afdb7fa797456ad90f89386b66c25db2f37565cad8aafe0b00330003cd63744008043fb8d4dde0cb8ac225236a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d3cfba82d296aad89acd9cb281e473f
SHA17768814920a5453b0e3cd5fb4e259ff013f5762b
SHA25696090dca0c620dcbf20bb03c3964a45c4c38e96fb2a4e5c17c48ed4bed43861f
SHA5126bcf6a48261c6becb39abda0733447e1992be5c890576e34ad3340b861a8e0434812d04cc104eac372d156287a6e32c9c6701133cdf3c666a6cf98c3dc80d700
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505b77c803a1a5632fb99191daac8f8d7
SHA198ae7868174ffe58e45ec861515b4c4fd7e6c937
SHA25649f56d242d01371c9f6ea3ca17ee111466547f27fdb039fd600c79b7d5c0275f
SHA5120048dfa142bd2d24408b264f65a93aefad8ca93474cfa4eccbec133a02a3a9f3ecb12527fa6c1bd07b088fe73bf0947841f243541838ffc1af43c890bb67fb97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526659f1e169019338f24f5739ba84f4a
SHA1855da0e56b2311124c19ffd6798cc96384653f89
SHA2562f65087efa68997e6d02170089a3307dfe9bc070baec94cc52e9173b26260705
SHA512dcccae90ad4db4b457034eafef67fc9d723abb2d51c35d74e479c9cf952b5266d4b6d2800cafff77bc20895e3fcfec5c80e597e00c2f9b1713e92dc1b71e7125
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b61525bf9fd82f413d5458b4043aeb0
SHA13451dcee35e6ef662567883bca84aa92fee79d5f
SHA25656da51d5e2b492d317ad893a636608426c02aa7d9c7e97c386e0709fb3c7c542
SHA512b01023218318fbe51e67539b4ca4f25fc27fc37526593042d9c48551150fb3704d7ec9a2d203e2501007764c4d8afc6c74ca21d4c936c08e099df560d26d86a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca95fe7d5c928fe97d92b9363385eff8
SHA137f55257199257084cc7d231e061305a1f50ca9d
SHA2565ca1155805352ec9ec0909362120c214e7e7ad005172586b3f25b7f7e32f5c95
SHA512a8dfe31a143e9a3f9b4eee161c9116caf90677f488a6a2116dab6089b780a54867e75da12746d6d5c58f54b8a7905be5159e43bdde1171e50b0e4d7694242e7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9f502c400d1c9d1d3ee448458bd5bba
SHA1990eb51b0f25c8bf250f7d0e0c5bc6ea4cb1e2ce
SHA25613fd5b0d76f5ef287493595184b7ba553f9648060d167b0dca338a13c07166c1
SHA5121148b49b554667e8d999e470b8e33f6a232a14a4aaacda9fd760385399a458f6ab738a08833dfd9501b17ef274dc7d4cd406a2cbc13a1c92e25086d9aa9d1722
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b34e67bc31544ab1ae077312047c39ff
SHA1882371efed0e2d5d93b845c1a2cad0032cc9bcb4
SHA256a1ef9df41cf34d0412239b9eb8e7d4120b9b04e2bfef729a164a43b1960513be
SHA512f9420fcb16a71cb1acfa6f1114985f70ddaee7b3533135cff3412acc8bac1da27198982238d8d07d3eafae37a3c7844fc537d6f624f3cc568412f31fc041c61f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b