Analysis
-
max time kernel
143s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 14:16
Static task
static1
Behavioral task
behavioral1
Sample
404f8750a2e2d0d46293ffac82ecf15e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
404f8750a2e2d0d46293ffac82ecf15e_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
404f8750a2e2d0d46293ffac82ecf15e_JaffaCakes118.html
-
Size
70KB
-
MD5
404f8750a2e2d0d46293ffac82ecf15e
-
SHA1
ca738c7aefa0c638527d6d00abe76fbdef8013c1
-
SHA256
36971fd86c47e8c91a1ac0e5f9e3b9f5072bd2e407704a8c76f5508bc44b07e6
-
SHA512
cb82186f535581294c9ec8b029c3597a9e799bb6a65b68facb444af5beb8fde3def748f0902eb27be4c4d465848635281990a25280ad8f1dbc5356b98780afe6
-
SSDEEP
1536:a0IxCzJ0vPPoPSPuPPPBPoPWPHP5P/P40PmPer699h8G:a0IxAJ0jO699v
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BF22C431-896D-11EF-9303-EAF933E40231} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0dce3977a1ddb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434990864" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000bed6c5241206f70112ef6e9218ba610b78eaaac39993b2973dfd246bc5901c22000000000e8000000002000020000000884cb49bdf1e1644223caefd6dd0847cabdb812e2bfa399df3f219cae21df00a200000000483eafd412c67c853e383f780eb6b3e0612931c25e8beda0d03329d81e7bf2040000000590e3aad36be3fb0a5e3494b047807c4d7df583060eaddde69a7a60936d8882472139c8aa39ae5ee0bc65ba80c0ec41ce11125872dc73d6eaecb64bb6854f80c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1620 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1620 iexplore.exe 1620 iexplore.exe 1216 IEXPLORE.EXE 1216 IEXPLORE.EXE 1216 IEXPLORE.EXE 1216 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1620 wrote to memory of 1216 1620 iexplore.exe 30 PID 1620 wrote to memory of 1216 1620 iexplore.exe 30 PID 1620 wrote to memory of 1216 1620 iexplore.exe 30 PID 1620 wrote to memory of 1216 1620 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\404f8750a2e2d0d46293ffac82ecf15e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1620 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD59f85bbee1f6832465db0ac4096230780
SHA1c3f13ebdc0777fe56c9c9ae2346de15b0362ee19
SHA2562fc48f2ba7304b59334f31a97e4d9fff67e6ac228f5c800f397bb28674c608d0
SHA51286e128d89671d5a3b99440a5b8165c896efe772b7ad7647ec2d3e09fcb845402b66fbcb761ef57832682623962fc61264e66d5af665be67995be0e9ed4004bfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8e437f934d21f2c1cdd7b9a0ca9ee7b
SHA1b92ed9cf405a0d110f42c96e4c2cbbdf43dcd624
SHA256bff7125a4dfaa25c11ff91f836a72eee19b9b5b838a5dd61001ac130f389e526
SHA512b2c91d12f6a1068186e5813bfebfa25eb4d608f2766ce28f8564ccfc50d16a6c574b1e84dba1178c9c1132ab37833b428ee8f8a67c7c542fd61f95aca4548444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d48676c2ec20765cf92846f5dd4defa1
SHA1f54f9690d6257abafa5e72146f94c924d90b37ef
SHA256dc071d9a32f80cc8907f99354a2a5ddd44a420f1007cc40732b74b370a8e20c2
SHA5123316356372ef8e5bd9426304c086017abc622395bb3d91c5f1fbca4cbb2f5589874a99fb44651f5e155f5cd19ccb0c28e5b6436b35e3e731c4f49ebbd3100a8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e58b95dde4f9476e36a0bfcb34fe2376
SHA1a3c4ef4b246ea6e6c7cfa5c41adc536af82ae2e0
SHA256bea8ab608dbf2f5eff5e2a4a1ffc1673fd2ed246712bceff9b1863458143c874
SHA5129534a8941d4a85fbfec4732f342c2ebd14c9b81df698cea318d7e601dc5220aaac4dfedbf8d5bb134969f8ef8f6c29ecf8141093a5747420d5d5649c664f31ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d16d918104fbcd1db6736b5bc4898bd3
SHA148c093ec93e5cf822775a7499dba0b41b892353a
SHA256c31adb566840ecf98d3184af7a6d9df7cf9c4661fd226ce6ce9c6a728771ce4e
SHA512e72cd47e0f43a271ca5a5a2130c80972df9381048fa5fb6fa8849c4808a35e8ef55d9558b530adfd9ca58b6470e7a649e439cc767e86080b15c90a6d394e5f14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bf83a8bcdce79bc7af036686ef386f4
SHA176252855885b525da11aa69edc6cb632567dca1c
SHA256b5ba45e1a88184add475cdcb238e11d83ce4a6c7b734d29e2454816dea00b01f
SHA5121d36cebb618c0c70519497f947bf6fe462b4404c0dd13bb590f46bad29a5a36759e9beb5c78acb367403de85de6151eb52adb96ab2f070f0b0717edf6e0d02c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5912d1d9dc6cf797d3ffda030aa2814ae
SHA1a9f23232f88198151d843343759120f3f979bd9c
SHA256712359fb0f9ec4c01f0c66db5373e1918e7e355ca456886450ad6d5e4aa23f3e
SHA51264819806525e4798830819b0a5a7d42ca86a51bd17949830c8061505002968ca059b9f5f8d03d3361907e494e23286ebf4f2bbd64401252923ab65416bc6bae5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a6c061b0dd0530f39f30bc95d5fdcc4
SHA138eec2a084887bf12f32cecb8c559947377a8b82
SHA256d117cbe9ca5cc2e09b014d479c6ef5c3213a0fc23936ae131b3cfd8c9b2bd50c
SHA5121941668aa75ff54e062b8f1a340f5ebd3850e297bcce5306040b6a4fd4b625e27c05d5911c1baf5cf2bacb4a57fc6a7fd30d905252d0cdbeab99f50c8c8c0050
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531bbd3506e30759709e30f66027f5be2
SHA11ec670342ae51a9adc4d22b506a6771f4d082fd3
SHA25669b7a317596fd0dbf8d95f3f142946209e5436f331ba5a9742ad7224def8bdd8
SHA512194610e82d0c665f0cd3715e5c4e21baabd7596de6332e978cce89ce921b71e6b47dda6b2351fe2e1e508d4f185febc23abcf55741c7873533e7915e56f0dbfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c13a48bad585c7fd258d76866d3228d
SHA1164a08ff43386792843c60af856491315337c1ef
SHA25672475fa68bd64f19b21cc7f4f200b962b9293d2ffd4b22ee388f2dda5717556c
SHA51204a52eb6cf2dc1784e08857526b4c52ab2291ddb33db66f7bef6091a4f4f8b496b631e1d4713fcc9e26d3a54e20a656c8461e938fd0b377980cc7c81049d2253
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9549fa40dc80a3d3d8156a14c10757a
SHA16ab6708b2b9ffdcb99427baadd473a56f48f07c3
SHA256ad9897199f9972886439064bcc04ac837c64c18ccd215b61c5d69ef66266351c
SHA512381557273acf016a803cb07ccf6eef5edadad9e89758851f97f4cc7fa6b4089dff31e3047a1a0ad6656574cdbf17a6be3a66982b1c03283cfac6cc1d93087ad6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57376cb284b5851fa1a0b562d70493825
SHA1576eed11ce0c5805d1fd5ac01440521134e0f1b1
SHA256dadc059531dbe430a727d021f2b637168f4773e3118e61044e2d584744463e49
SHA51241de07a7aef5c74eb8befeaa253d3991999f03fed3b5a331ce4e4485a63d76f2308d1d72a7e740b6770822230586440f6a45bfd0e32c53e5fc52def2592de236
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d608548d857edfb51a331c2552ae6eef
SHA164718aec81af79d929a0eae12f5be27ac26642cd
SHA256b172578663384ac30957cc3578867a1d847f98906558ce2b9e52895d66f4e919
SHA5125b8b75ce93eea75d223acc9705a905e9e511113c5c5358f3ace8eea376c9aaba895be858c3d5a9a5f131309ca41b3c79f64cf1836653051d7e4f428642bb572d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c15b47cbb640dc219be6311f2f3dfb7
SHA1d09c5d8ffa367b22e11f843a8476fc9ff107a793
SHA2569860c999fe0fe7c5708aabcffa96e1bebe089514ef63c704ce0b5d1c7549f3d9
SHA5128eb238e6701c1dc1cafa85b580a87444966de43c941a3f55fc1a4697c5f5861e41414f2c70cb3f9f08095ae1b3f115df5dc216020ae57a4ee50375e29e477c61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD55a7179f3bad687dd2073e4eddb3afc8e
SHA1507109ec3082d7609581722818907e006dc33b1f
SHA256baba7eb027e5f6d84d3eb6cd550fc3d82438cfc12937d1d9db50020ba84a628e
SHA512795f79f9bda57cd3617e975c5dafe896e662b64971aab01e25e6d6c3d4a62f0b18cbbc7ae1e227a789083e9e84b549d5b7d00f06530fa75b530111709c921013
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD50b92786bdf8352eb10cbc00cfe4068e2
SHA1e66bc3af361d0647ac6e61f7c0b8b0afef3b1d07
SHA2560e2fb5384a655bb477bc2d7d77fd84050469f4c8461d0165d3b97c595ecef495
SHA512de558bfbc9bd4c6d7c28c5313b61d56781a25a039a1374b9a72a710a11ead7abbf73524ac1176da732d82e692ee1fd982a50f96ff52ced46d80cbbbd55750d60
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b