Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 23:36
Static task
static1
Behavioral task
behavioral1
Sample
5441364caacddc6331b39afb29866649_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5441364caacddc6331b39afb29866649_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
5441364caacddc6331b39afb29866649_JaffaCakes118.html
-
Size
1KB
-
MD5
5441364caacddc6331b39afb29866649
-
SHA1
6cef19f8d33018658d10604b247a8711ac4bf886
-
SHA256
bd63ae2f7e9994e360ecb0029bc9b913abf846d4c90431f077156f82114788ec
-
SHA512
97ddbf1d350c90136f5f3b6fbbdbc8413c821a71ffb525f27a5ac9caea6af952a2a4390d00face4b29907f64fdd7d68ba2fb995a4c1b959d97cf1e46b4f6cfc1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{95063671-8CE0-11EF-9CB9-62CAC36041A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000e67916e78b9db0501170801bd9b7f8f7f3cd81d3714c987a4c60f91ce51c7c40000000000e8000000002000020000000e2a35d23db2a3badcbb00daf333f88f6bce388bea6d63133c08c9c46530de47c20000000cd3dde9da15a5019e53f8f782108ba5d8497385df8e5303d188e7d0a164b3e8640000000d361bc06b47c7fe0a4575bf910de12501d6ead4f2be6501cacd82fecf4e4f163c608350a428872f0e6f38940a98f86897d7a28e4f3f2119cd08c5b0e754cdec5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435370035" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c06f2484ed20db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2336 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2336 iexplore.exe 2336 iexplore.exe 1856 IEXPLORE.EXE 1856 IEXPLORE.EXE 1856 IEXPLORE.EXE 1856 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 1856 2336 iexplore.exe 30 PID 2336 wrote to memory of 1856 2336 iexplore.exe 30 PID 2336 wrote to memory of 1856 2336 iexplore.exe 30 PID 2336 wrote to memory of 1856 2336 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5441364caacddc6331b39afb29866649_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5899293989180603cdddbaa10873db6ca
SHA1d9134094285c9fdb0120ce22119ed7fbd3af81cf
SHA2560cd92a733059dcc5f77d9d54e4f36af682e66a583185ff67faa145dbfc0258e0
SHA512031c2c4d4138ae231d33837a49d4bbc03fe3c8e653d4452aa2ddd5692c573e0384e8900e524dcc0e02fb7d5c858ac3395a83acf22da72cd7ac3c7c8b8c29faa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5751086ae4fa367ebbeb7c5b0467d86fa
SHA18898de5f677c843ff2def2ec387615a3f5324d2c
SHA256016f11611bd7d54d6badcb4ee4f88a09eccb98c736468e8216a21c578007f49b
SHA5129e4b4ea9e1252f1ba0a1c9c6fba25d23d775e279c1d8da7bb4b09e1100ca54d17b071e10ab2ce1fb097a75f23064928137a3b1e008179c4f0688cbab613760e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c01b3a0859f22b7da93f379f81591c3a
SHA1caadcab88b6f1d9a1bd34839145ef60f3bfa6f3d
SHA25675391fd42831b773b979c4ed0533e18c3a900a901c0640b81fc1dfc9f1fd98e2
SHA512ce06c2a61e2fa1d3c536250a12e765b5a23c38249377fdfe0fc4f39c72b31646f7f27a1fe0b841fbfe1fc505a35ec81b68f2d9796e46a7b408f9ef9808fac951
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6a23128054d57c523d6405db99a09fd
SHA1bca8aa92fdaf49e74a24a22353521ea6bed68fd7
SHA256f2aa082a355efe6b36601f68253c8953fe2542a78045f071b3458fda360c8730
SHA5126bf28e8ef44ac43c71c3f39873b904d29045930da519e603f007c53c4c42a493220e2c00116019d44e1006d4d819f5cd1c1d8aaa4bba9dc989fdc81fa92a0f32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb3d862e93586f30744ffca7ce424d86
SHA110b653c72598bc0b598b2278f91429b435e3fa65
SHA2568aaf039ae7cca4fb07e6e0657bbf588294ca35d6ab434848fe30e12779eca75b
SHA5122b56b01cba0db69815c7f3f2ede0ae360f35f3c46d4b58faa5bc4a551821c0a295354c4392ccda2820a1289a8dd813a0feba95b1eea75b1bfafed7d6cbc93592
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edc40acbf51489c385f8c0b57ff2a349
SHA1fb21870134a9cba71ad0735ab508aaabea1b9c0e
SHA2564dcd2aefdfd9a0a41fbaf72ef5a57bb2132260c481e765d9a1f91694d5e0ee1b
SHA512c92dc2ff8e0a73963894ad0bfff277f558e02dd3b19747c17df3d7a4759bed38a0a26adb1a042f6d9c4a1d1da8ffc64a46309076a25fcc9e3743cd8507ac46b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a8826a49a1d6bcea6f9fd42a043f306
SHA184ffa7011af6970585e41f9b281847172b246c24
SHA25600fc9205884a5f45051aca7a31a049beb69d23a7b9bfed4501286f0e4d78bb02
SHA5122d9426cae03747a5d52ce2d4ca8037255a0c696758a07e879162ba9cb9be9bb2f4aca8d80965c464f3cc32686c76f458cf7f6461a5e4bd79c7a594a40dd3ada7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a01589dbdea765c7be0bc44699b3982
SHA12ea94e5d4c60728f977d3d1fea3094ed36bb4be9
SHA25609d9a7b16c45a07a5b23d9ab6f2f1c774f02599f87dc9439b3dc9478506870f7
SHA512b9eee3b485b1731bf89a6c66cc3de00b8b6516c0a40ed766828c211af85b028ddb98c4975f4ef1e533e79bb8f0ed050598b70a35ec806eba06a4fc722932d213
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b101e9add961645d8bfdb901f3f8d8df
SHA13c51208b5c3c69830f539dd77fa8035816cfeaba
SHA256c7c77cb672763f00ad10e5b5fc85698b6ece1ade2fbcc4e23301d085c8d3c646
SHA51236ee99cdd92e0d9ba661d09e9a424d4a9839cfed82c0de61171a897283aeb0376bfc1e70320bf2d48dc1d18ff6bf7db99dd7a1e26ccfa19ab76f3f1905a80699
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2d9d5b7fa874bef501d9fa7eecc0137
SHA156a5d3eb8ec185aacba62164d7ca841ee2cf1bec
SHA25631b11f7cb4ee24e101dc40a7499714b2a3f441dfbf30f0b4faf3803be9fcd0a7
SHA51297537499cdef1e60b1d43f9397ed4eeb796d9d8f3946bbdf713e0ab0d78f90f2b053ea249bffa6d6aa541b6b16eb7a4c3e8b05199c14483263a7a1699c77c611
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581c27f8da9a7dbe2c91cc5a8a9a864f7
SHA1e5ac3ab3b25ad72097413accf84b5c8f48a38adf
SHA2560798f20229f5551aa624f197802c0f190b03c39f640400ad556a0b741a1f37e0
SHA51241359a3aa1b0ac0c2e144052436629922afdcde96acaf731ca7ec5490518c156b8a16d0344dd3542d139bb98306512d9b45dad3d6386f7d9bca8f4658923eb14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cce49749e75de7ddb132c76150839fa6
SHA18e8a2ffc62620a0bccc28c30335d069af137341b
SHA256066bbc1b905ddf20735a6ee7b720b54cc8c02d8293ae4b421cead6db1e3a11eb
SHA512c651bc592bd42f2abd446306478d4a74c7560ecd447a7d269fadbef8767e210b7a46fc3fd29ef854e4676b6271bb9a8ec116c5d7c36595c583773014b2f94dd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a37fe588f706ef48da786a76f6c35982
SHA196e684109093e3017950b294b9e4c58de6935001
SHA25610c928dde2c4dc54ef289104c373df5692828519d2b93cee7d864e593f74755a
SHA5123134e28a331a8b174ff5412e7636b901dc62d21ba04da5f011f019e362d4022edf0156b172b71455addea92d56427ef43be1e4b49645bbf3cbcc96b3a885da04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f27400ecdb7f67e0c0d1a588b8b36f7
SHA192e105f2dea22ce39c64a38876c2202421cec905
SHA25612ed304eb5c883ec9bcbd4d6109713cfa1421b3b0b85caaf5f904287a0c720f5
SHA51257dbffed6d64bc4566e4848c2a906ee97e6331816b1cff7701f815c0ce9e9a1b370e689348d1fed1dbe8e01a32989652ec314cc6dc04aa6d0c55680ca859accd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557fbecf2caffd941d55b6ce84ed4f3ea
SHA1e470618c5d0732161d73f62a7ecec2e3fa83f2b8
SHA2562b13bb970a911e0f768b03e27b763135e771f2b8824aada0edf2bca5a514ccde
SHA512b19471442866b0127ecc0aa7dad3a37396729d2d731ef1ff9b716b7ebe769a9cf94ef9821589bed23d853e2a7f7ed4aedf5a35c0898cece3181e91d2431330ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596e5ae8a99ec231639cb0d6bca7b89d0
SHA1f26c4bdb302526b7b499c31e9bded2872753f3a6
SHA256874894078d54da9c0d2e39f2052bcdf6dbdc9706276e1fc3db83249e22bff8bc
SHA512794028758a7a2329fa8dae8f98fcf3f633596f4f5033a44ea2b0efe18146de9d5a38c00336dab0558b4d1a08ef1eeb70fc11a60b62ab55effdd62944339a88f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc490ec8798b73e5401994e99be6e943
SHA1991ca02db80de8efff68b0c7756c160d400c62bb
SHA25663d130d7016c4f2e21f182b01626a1a6eeb40c6595fc25a355a22b0f1c3279f7
SHA51221997a667ec34e51adc16b1b3884710681a7c8407a83826ac4da66a577f0d57afd6a1245748f8bb203942122313dad7caea9da755b1d2cdc21191df6ba78e791
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e193c94ff968c03259f681ab794f16e
SHA14355ffc2f645c5d846f2cbabfb51b9c84d994693
SHA256d7689b68c77fc5ca2fb3e57cc1d9b38b773e85bc2c7b6f2213fb136bb711d4cd
SHA5126d1d1dc346e116fade0d87b17b29adb1fa6f1302b64376d69816b0d96245fdbeacaaf35f97df35e24320f9bf599dddf8fdf24c67d1eb4863a9137fcfbe622024
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b