Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 15:26
Static task
static1
Behavioral task
behavioral1
Sample
409eba6e68b0f0411f57428b409a60a6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
409eba6e68b0f0411f57428b409a60a6_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
409eba6e68b0f0411f57428b409a60a6_JaffaCakes118.html
-
Size
15KB
-
MD5
409eba6e68b0f0411f57428b409a60a6
-
SHA1
390e04afc4dc3652416973594298a6d1e32edc46
-
SHA256
d554eb8a453ed88a4e9682de43550ff2faa6b61bef82fa0d9d127ea04e98cd2f
-
SHA512
abb7177bc23eeb7b4109006a2e280454977a59eadac3d68f1f098636fabf9d06e07c88ed30588e4fe2319547bd689fbe9a29aee4ddde2e2ff60e136e95d9bbd8
-
SSDEEP
384:cpSFFG566G1sjE6exuizHpEQcVP1JL9JWiqNXFPY4lfGrgXNI2r+Ip/8wMHZsn8H:cpSFFW66G1shexuizHpEQcVP1F9siUXm
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8B4C0F91-8977-11EF-9B14-7ED3796B1EC0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0436261841ddb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434995068" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000001c698e18e54ca56719d54b48b05440504b70bad91de23aa19e74b168de7049c8000000000e8000000002000020000000156e1c6408a98aed9b226f45c07b3322a0a1fe5f3fbb6777e82d5148b9762661200000009cf32858949fe76f0cd0cf86b4130e04b6fbc4583e4135c35750956fbf15af6e400000003f45afb6678ff0d312117cfe08ae107e3378dc631eab9d1fde2c72760f9af2b84bfa1f36dcd39b8c6847ee606c0e551c79a711c26ee1f9ff55cd3cf7291b6375 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2888 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2888 iexplore.exe 2888 iexplore.exe 1228 IEXPLORE.EXE 1228 IEXPLORE.EXE 1228 IEXPLORE.EXE 1228 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2888 wrote to memory of 1228 2888 iexplore.exe 31 PID 2888 wrote to memory of 1228 2888 iexplore.exe 31 PID 2888 wrote to memory of 1228 2888 iexplore.exe 31 PID 2888 wrote to memory of 1228 2888 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\409eba6e68b0f0411f57428b409a60a6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2888 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c8038cec26dbff055942db8ec3b5565
SHA1a39038612c28969c70ec686e4fb38c1f7e287947
SHA25684f98278864c0f8e912db2f13e4892a820ee6d260c0ca0975de9605978be1f91
SHA512cd02ea63e67d45e1dd1bac5474da2f44d4d823c42eb08db374c122ab7c718266f4b8f6c282627d101ce074461f335337837237a9be9919b60822fc0d685bacfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9bea61a54e1deca455f8c70419c3bff
SHA18432030c6eb7cdf4011dec75ee8851a3b06258a3
SHA256ce87d859f3c4c6fb91f657cfca291d53edb72b4128a1a5baafd214f5cd81b1c9
SHA512dab039ecc95f27ad1535a0813dea226471f19f41c3217118ca7f9dc947711c1ee58b7da0bace938b63649beb7b0063ab7523ba475d524ea33ebf3d1c10dc6297
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571b999f593cb97ce3ae647824e8c0cff
SHA176b5bf37c53b1f0ffe170cb13c6ef61b4d89dc91
SHA256817150f6f3fd8c76ccae7266401582f86c375a6028c0ca117eb480a64eb0a067
SHA512b5852a11311a052e3b7e188024bc2e938ff9f8caae840fcb48d687db81df686ee05148ec6a0e3d58b13135d4ebcb1a1c20405e9e73ee853f09671b560afd11be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ac68ea198bb95ed0f7ed4cf27254dde
SHA189ac1d18207d7f53a93957e81182aaf9c73340d6
SHA256063e1c593ec7ca9a83d2ad8f9a616385e41046bbc0ce93bda9384e0bf30f8c9a
SHA512764da686b2bd88bf09629e03225966f38dbaefa2b95e2a0a2dfd38a20a6467613c580c49ddb2f294dcb5659bfd9f7f307aedc2b1d6e2ee752c61862d5618dde6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd4842912c9c188d114b947b5be963bc
SHA111180d8dda08932edb3e688826bd6f12cf8e7314
SHA256e3c81ded35a51cf943613c6c689a9f5b3b708d2a0cacee79b1dca50d8e135085
SHA512d3cf3e1df487b94ef18a34d569c98c51bc470f218a035bcdf0a1e9fa536f8fa0f8cf80f9bb21719c36c81ab67ec2e4af83fe7c60c846c4940472f8a617434355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3250aa81003bf88af65d7339718468c
SHA148b3944bcb147efed466c7eef3d4435c16bc54fd
SHA2566f55b295b1e7887a8c742c271db94fbcf5412d464227b6038a6a41e526876bec
SHA512da8144d4d97ce45d8149f8e01712bc29bbda0bb6dbe1b3ca7cfb6fa6c617646343835e7113fa12a0a273b86c5017c75f398dd8ea6fe28bb06d52e1b12f999946
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539bcb5c8f597bade42732b032a2d5849
SHA1e0b755fc4f9e0cd19fed4ad0a64b4c58c2529765
SHA256aa6fa33fb5fd73a076915792540b589d4a676011be1c92dca642a9e7c1936949
SHA51202b17e28cd92d3d483dfd469f4497265a67f6a5b01cdebdb88950695462475e12b123b053f24859c12695b98138cd00a9f1129514acdd241aeb9827107462573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ba74cb302e10acb4978c3f9c6189c1c
SHA1c47c4e14728632292542f29a6045a93e1ee8aad0
SHA2566ed1afb19fbedeecdcd58ca3bc2f47b1e2118a15da45a58c39605f65a86e68a6
SHA51254704688823cd4964dd46b2ececc02b5f87bc355d63a68944e9b21686edbaa165564a1efd31b5cced156e199ec20a1201880333421f6427d58a0ac5c05d1020d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbaadbf358a61e1afa7d0a6dbd126475
SHA10bb4b6df858c511446f591d2a87e953c2ee670fb
SHA256f93e4b41779c24f74fda49c100f4cde16070559809338c145b92b03fe900ced4
SHA512c1c1394c07fddc7fdb45bb23692867d9adcae4db278741751c4cdf924df23cffb5affa63c4c5e328bcf9fa780da02dfad8986fd7ce581a18f14b62458ca72647
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504ad215e3eb38c73894a7cbc46375ef0
SHA14098bea20a3840981ab34f8b20a64ec5987bae5e
SHA2565658f09ffd26a7e01dab6a9c28191590f7885881347552582c80963154f3e358
SHA5126891964e3b4be1712384058c6dcb66887a00c5f7b2ce0c1f72ec53a73b2db6fdd97e2126fe0ee4dd12f90b3dbc444be523c83f86bce579b6e0490ddf4e9db4d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50eaed70501c7ecc58dc20f2ce7c4fbfa
SHA1a374d607feb97f03e6a8ca1bf258878d054c2750
SHA2566d930b13cd15d58543fbb1b2e7d67602159b0d9236814237a129b42a8eaa1313
SHA51237fcf2e3dbfb7afefe5eff12354118eed2aff584b9b52435ea6be200f428a7a5721fc84215a9749c1d030b62fd9e0afd9394756889e4854772625cdb2895ce10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5ebf0bc2460322be552386f5fcffd5d
SHA1f451ab6c8c405f07cf1cf90a8fbe3e45c07eec4e
SHA2561a9a712842ba52fc9fd28abd6b93857f544cfc936e9bf6b8ac987881a4dd45ae
SHA512d45fec489e9920e8cdcb070a16fd79a6ca8237aecbb0280200429656008b344eebd57f80448354ef233c958e6d3ec71bf9e33e8bc262f97617be959da7cb14ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581e269298ed727115699671b37e90550
SHA1931ce066c88118b676e0269e1e8be7d489ecc053
SHA256ce470a852747513b953837432882dd78f04859f2efbc9672c905358c7a42fdc0
SHA512cb1722848a1e7d4cda38d8d0d726034c0c147ce859a59343de4e21378a5d0a4fba281f39621c14cff84f95fbe8733e80eb0384303b194357356a0ed85506f90a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515c7bec61ffdfdd4485208da9b160085
SHA1d39fc335c48d637b17ef958e11fa0cf8a36d471c
SHA256e0fd45fba05da51a85dad6b80baeb0cbd65107ed1e673738d01e235d8d69cc80
SHA512fa6f8078970f742da7a5f4db1ebcc9928a1c6186d98378c5bb017c00db037c71e269e00b3ecbc0039fc3d0ed0a6988474d17bbe0cecd134617badfcef3b30157
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5928c8dea008e48c07c25954ec9156910
SHA115b0a5e4baa7e7f78d758a08cfb6a4993d11cd91
SHA256ca55372f24b81619c8218ad11542fdeb44eaa56595c06a0402333e5eebe2ee65
SHA512a84b0c8e28554ec72bf7968f98d039448da0b7b54071ed4f893d6fdc593f6356bc6468563f2c5bdf7ef7f5cfc30e764ac8931bfd985aecca1fc69ee1709bf388
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5548aa3bee1fff23936bb6956f92879b6
SHA1e6994d64c73a9bef2bbce6cba155329044e3e180
SHA256600af5e6ff11b55a44cf7b6795c2b26f84558e6df0312af2656b27a0f751b120
SHA512bd3c1782abc507f2d5be34e114c8c0d744eff98a8884109a5fbaab4bb9f30974fded91de060a6bb953acd8b1eb746a6fa37433e84383b0ab232ace00cfb4d6a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54abaacade1e612311922c89f6be01601
SHA1566330d49897c024f39be4482e6c9b35740d32e9
SHA256f97b4bb645d4b804d538f1f0218d0c25089c571167dcf867cc055c29790e037c
SHA5127dba59e5f170f9023c1f037dd33e08b2634d726edc894a47cf464e00968b56c33887d110d7f0afe28b9cdae9ee1962f07e09445b717bad33ac9d475af8f7169b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52486926566fc292fde48845e0705d8f0
SHA193015fc4752a6755ab0ebe84f1abfcb0f1975006
SHA256f5380de7aacdae1b3c8845866be4e11465813a1c2f1adc53149cb7a4c6132caa
SHA5127d5c27dbc78754ecb659d8e3c6b4874a7b2fff9f0e59afe8ae6917a8057eb8f9c9c9245f6ba5b65029e7c8b01af636cae360cb918ac5807f7de7e63586a444d4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b