Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 05:14
Static task
static1
Behavioral task
behavioral1
Sample
388f92a5821ccf91fd55a6c5ccb00dd3_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
388f92a5821ccf91fd55a6c5ccb00dd3_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
388f92a5821ccf91fd55a6c5ccb00dd3_JaffaCakes118.html
-
Size
26KB
-
MD5
388f92a5821ccf91fd55a6c5ccb00dd3
-
SHA1
80835ef3cf3e7bcb70ea4440473a985a04cb389a
-
SHA256
4b620fb64b2a1f32bf0354dda014dd610c9d71f01b72528f524f37051c547c1b
-
SHA512
86a9cb842b52fc468f605fb291c40040a09c396d9dc49e571dc34f05673ea09adb9f4433fb4057bd7b4362e5233639b5e5c9a2b07516c7c6500862a113fc47c9
-
SSDEEP
768:pXGUCWC5GBSGv3ypkWtX3CiwtMVPAJ1UIUEf0nr4EwIxo32:pXGUCWCkBz7W9otWx7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E51588A1-8858-11EF-8659-F6D98E36DBEF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b9600000000020000000000106600000001000020000000466bd5a0f1dbb3eff3c3c713e7a129100914ca4b942f2749557609fc031c6166000000000e80000000020000200000008de420b2e6462a77a453b1daffd7d163c0410e784a29f6bd14326aa62dee3a6a200000004bcc5edd855c8247dde0f6742e67343b7c9f4c13e665e3044c7c6eb0208444da40000000cf52d747333e0903f11a8ed41fd1cf3511353b65ce3bc05f694ba99a9261d75eddcf67ddc4164060580f203aa0a64ab6d8c9b7f88a27ee50c48d05cdc11a2d0c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e032f2be651cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434871953" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1668 iexplore.exe 1668 iexplore.exe 1824 IEXPLORE.EXE 1824 IEXPLORE.EXE 1824 IEXPLORE.EXE 1824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1668 wrote to memory of 1824 1668 iexplore.exe 31 PID 1668 wrote to memory of 1824 1668 iexplore.exe 31 PID 1668 wrote to memory of 1824 1668 iexplore.exe 31 PID 1668 wrote to memory of 1824 1668 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\388f92a5821ccf91fd55a6c5ccb00dd3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1668 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525946d2bab47148b3dca735f5ced4728
SHA18ab91d0ca345f6dca496d14ab705f39407bc6792
SHA256096b39495e00776731adbaf993d0f2dc74f95d91031c2d2019463542f473e3dd
SHA512148f3ecdc61964c5cf773fd926316f5bdb2fd47ac663104986cf06802915314351175ace21cd873b7fe2655ec098b10a11fc52ce5c010582cf39d5ebc9b7d8b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e51e25c76eeb44f27f0377ad88c5f6c
SHA10bd5988cc43a141ce3ccf260b54c7a92f5d765c7
SHA2561321caa11e1313f2264286885116f91a356d3b686f44198bbbb4af149e61923a
SHA512d9d9473bb3a1b924828f7420a09ffd3a4f07d27ee0044164d0f20523a736b52be5b53d9bffa3e2a257b1457db37785eabf099efb50ca4626baefc36daa04354b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a46976881f9fa64c92192d9f3de5566
SHA1c1b68f8f5fb8b716dac2c2ee05393861577d1fcc
SHA256cc1707e2bd593c0f6576697024d44fc05bea98bd1ce484abe40deed8672ac133
SHA512a58e9beb2962e9d81c2c4b82eb8706962c4a04e35fb5411f29b6656d103d56d21c0cd6c1d8bb91ab61ff2316bf4ed0605c67c34a502ccba263e9442fe397f46d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bf8bc80c5e730ae9030e490fcfac50b
SHA1648b631331ab74f6c4cddc15f32387563e873f40
SHA2568fa054c4ee0e12874c8f3df26be10714fad3450746a83ebd0751811ef7ba037d
SHA5121d643077839d19ea3397ccd9e8075da7acc59126f483446ef4603e3c387620ebaee69cce4461725d1e9daececa867cdf159662da679a39ecadf05b1a5b05b927
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532727ed1031e608a5fb00b9b7b925ca8
SHA15fbd23302ddd3e836bf1ae0cde9af6b7f2a147a6
SHA256acebca1f3e2258e435a1090d20c19e4fdccd5735c974da70dd6d01c41118b4db
SHA5123769e0d7bbceb394254e75c97ab5c60324afc03e547774b53b81d84d468af45861b6ffc105d940b39715377bd23a4c2ad762ceeb7cd2379d14360f5e7d4388a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfb9a8838df6ae247b0365bba4407f04
SHA1c2b6be340014e2556ea18e81bcd95c52ce77be9a
SHA2569fa5fa23e29316cdd86242a80e25e59049413f180a6e09b9de9e15b8072d0188
SHA5125dcb5dc1faa9e5972d3d25dacdd73d75df4a98daa7ff6ceb7e5e37e9274a9c852261f3fad228a5427efc36f08c3ca92b7d55ec928c763624e5378956ac528621
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55940faac3c2da06aab049229e6e7cf2b
SHA1dab1676ec4f2738566f32cbefb8e01faa7495240
SHA256cdf5299b4edf310b85c4e3df6497fa153f2a61e6aef8d8b6986604d312c3ef67
SHA51263755ab70748d251e9aaa4b4bf569474ee07c21c7fc09b60c0414a47a177d21fa97c0e0641696c5e0f1b8804ea0e491f86bae97d419e19db78405f0eb9c0d2ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aec67836f616bf9a57eb238cd03d6423
SHA1ed93c30ac133a9864b5804f79f31f288e8c0b7c9
SHA25680ac97775b36014f96f46cb0781b5e870f9de6c54c623d15ce1d782fd7d7a6d5
SHA5120ae7a07099302693f2b82bf433533c698226f88a9b64a0f91d39cfe218977d94f9d12b7f4514235d26db5a0012b3c3ace0ebe7f67550f485669ae337781ea8e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df59c585f12a8fb0600385e6ca94008f
SHA14b772e25fcef3ff34705a4b76091364a6ddf14a2
SHA256ebdac1a0e20f45ad699b567dd9f16020b17912898a77d25ec4b15607abecd10c
SHA51282db3385b840611e949bb921a4c68ac464da5ffa3dac600917d70c2c7a898c3548f5730ef3c4b25188d7ea608ff725275e5e3d8cbc544d38e175da31fa2b0f4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d20d9bc01b49cbcac1f3206ca15ac4a
SHA1180f35b448590425ece77c6913d02f06abb11b62
SHA256cf97f7361ed84758e06bd8aa714d258b20dc3d4522ca78222659684bfbf2f97a
SHA51262645ccf667bd9855f04e2bd336f9fd3d8bf7a454259bc8a7e52eae981d218685e622dc1f55ccd48b089f419eea4d9ae19690a9d63efc155dbf74132d4816525
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf4fb9366359dfac299cea74ba266818
SHA183c368a214d7dfda580b254eee9024e39bdaea31
SHA25637b05d51c3e16a949a4af4a0713b37b7ea99a515e5cdf8393d9de72e4d8ece38
SHA5123ad4cd04478ba8eed5a457df31ac21e59540ff8a3234d54e78ed6a587bb296058e2a8798bc2868062a9dadb28f68deb9d2994149a23c1430cc1faa04cc320899
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b873782d279ea2abe2c5f3a6ba2ec170
SHA160f825e0ec8133da956edc7cf215b65f54225383
SHA256528ce62822014902b2093bcb5e0f4ac8649efd9a02bcabe3967e27a79159d477
SHA5124ddeba3a320e55681e7450bed005eb0a14970a5aef0536a1dfbdb2b567696190bcaeded0c3eb72a1b19b7217ff217771d3becab20d0508b22d55620007215489
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec17ae202bfdef3648f2807763fcc922
SHA1f33be5725de304dd6d7a93427c83546fb4bd9524
SHA256ab995aef2dd97d732be50473d12defe20e161ae58006e8ef46887116612188a1
SHA512f93a9d843e6c7c53aadabc6335ef89e74e60122d6453d3205a904df3a7920798130e26cf663b5ecbd5cab1057bd12800f99609d02aded03e8db84da22dba9199
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c070d4cf06c672ce58e221312eb0b70
SHA10ab56d71f3d7c323633b730e4c945ebc9e33c9a1
SHA2568d0e50c123d1163f7c1887ae0df6b5b0f7f9262f1bb73067ac68539a33147ca5
SHA512bcacace4db700c723de2806636d5c4869703cd2cc9aa3783cc7a9a12cf0645c5dc270bd651b7e612ea022650549e3e663c79238b4e875886de84c1d8ebe79741
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8745ae89ff04b192862ff31bc764f4c
SHA13665c0a964d4c981046fd2fe83727f84a3b44062
SHA2565ae080406a161db573141fa328410c34ebf4d9a5f34fecc4ddbff6d979ac5198
SHA5127e1c9a53d721d6b7f440931ea452bcfbfe5836012af8a9d4a7dacb027cbec79d3f4a1cb9825d5fe6fb4caf4fbf433c3d3113e4931b20c76b1b9e846b5f0d5b95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592efd4ad5d6671bbd7cf757f801624ec
SHA1a4e8842f80e83b6f59114be9081de804cf5b0485
SHA2562efceb4a7bda5f9a2f16d40b151a1ce48da14acc10c5fef6b483d8a03f61afd8
SHA51257d1eef40ad5d0e70bf665632524a3fb76ece34aaa5ff1b7b0b3d8f0c730e558e9782314baf8c1bb6ba1173b0e5c9bf737576969593a447afed674ab5faa9dbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54921b68589407a9e8a33c6c6eef21c24
SHA11408d574ba41a6087d23743398401bdfbc25f611
SHA256ef8788ca6842cfdb32550623baf398885e4c1b3bdee7ee2c190385eadc6ba73f
SHA512d5941ace30328dd7730c5dbf8afc565e2fc59a5b91c385705186e0c49f4108d643a62e42b5ed0afeff93dc0da57bd8f5f2a045c53b56408200f8ffe64a16807a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d890ca3b76d7f114440325bad71179ee
SHA153617b2438e26f06250745edc3fe4f9cd3bc030a
SHA256dfb1a5d7618a9a049e7f9be368c31af351c9db0fee864e15c0d31c97d403739e
SHA51258e1275dab8bd1189882d0d4a276bd84114134b3b7d6f2376bdb4e7bc10c19f705863b980116024bb5631b6a5ad332782415f4bfd15c8da11d47fdb7ac870a25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531b5cc1f45ce31480f26aa743d5c39fe
SHA14cc11a293d6d05b0828e8b8cbf1c6ffa081caf69
SHA2568f4d6be4528b5edaa576da33ed871c750a033491f43f0200a95ca49bf01b8f3d
SHA5124e3c88833a8b272b407602f0501f8b1d9284727c6ecc6b52a1603cc04193194563039cffd726239b3d705a3c040c3b68224392dd5c2c049ff89b77f9f020d965
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b