Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17-10-2024 13:54
Static task
static1
Behavioral task
behavioral1
Sample
5248797bf1b0a6a889b139bc4f22fe5f_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5248797bf1b0a6a889b139bc4f22fe5f_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
5248797bf1b0a6a889b139bc4f22fe5f_JaffaCakes118.html
-
Size
6KB
-
MD5
5248797bf1b0a6a889b139bc4f22fe5f
-
SHA1
dcb323ff490ef18d5e3ecb59bb68d403b4ad264a
-
SHA256
7d6c947ec7d57b974fa35e131ce023d4affd5b1ebcbaaf6f83238a89b5482d10
-
SHA512
c19496f8f517b14b283984e50e23a070fdccb3e93ff9900a44eda55aa96a90194e42231564334118a981a3cfe179bdf1622975376162f8911e06ee1187d6dc7b
-
SSDEEP
96:uzVs+ux7DILLY1k9o84d12ef7CSTUiIcEZ7ru7f:csz7DIAYS/cb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50c35b1a9c20db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435335112" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{45548E21-8C8F-11EF-AAD0-E29800E22076} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000509cbba75fc0ab4ca36a8bc544b24e1300000000020000000000106600000001000020000000e2e48762fd7a7c11f343bbfc275ff092e71e86f2b9f1e56414f9289c2cad8712000000000e8000000002000020000000665591e56aa55f6a07d5bba0bc40e1efa657f8d034b80cc4d50053968f58b3d220000000029d5f860a7f8230a23e94d65a3f9581ebda166e39b81c98462f6d598a02b04c4000000039db1dfbaeff71ceb37d2c6f582ef1fa372e10cecc6403a7e710feab82fa281145c21f196cbc20485d4b714942953b42fb7ba12c392e488113f25c5d467482f7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2696 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2696 iexplore.exe 2696 iexplore.exe 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2672 2696 iexplore.exe 30 PID 2696 wrote to memory of 2672 2696 iexplore.exe 30 PID 2696 wrote to memory of 2672 2696 iexplore.exe 30 PID 2696 wrote to memory of 2672 2696 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5248797bf1b0a6a889b139bc4f22fe5f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2696 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aadff616f3f39242784e5f5b9a7e4d3d
SHA103ed51cc30f513fb239be4e58f87aa7cb949a0f1
SHA25655cf48a107b0eae2bd9d0eee24598ac1272f39b636a8c2240a6b42895b1789fb
SHA5121bc9736719bb0d54dc067cbe78061c5c29a1433f5959c1667b1f55c2423a374a5e397e448c9f48f3c5135106ea926544532b83e45e54a59ee7c45e5636661287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510b999cdfec432ab16137585eca6e0b1
SHA115660ab481ecac23226eb0a23d90ebc5e2de8aed
SHA25668d642d85bab4f83de738772b5a79a293d345280a85a0b1c9574fc155f3bbb39
SHA51233b4560b19a6628074a54e2aebf85a7b4760f7275178746ad35035e50ce89f7ac749f1c57126bf1abf5fbb566e2d9becc4035b9bd3a2c0b2cb55f24010533357
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d23c6ef06b4c646cc2a20b12ec1d9fb
SHA1cbf1252ab4ac4a21c8320cf3d427c2edbdeb3298
SHA2569a401c84a38286aac46e5202f6e6fb65c768f509fc2de31375e6651b8ee3e9e2
SHA5120ce6aeee1d5f25cbc3888c6ce53407483839b3f0df1ba8efda928f263d7090c2b332cfa6f2017bc49aabc31b635b7ef0026b04dd58e45503d34a742599f6f1ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d79296bceace8db0203591bf9770d2b
SHA1a3ddf5912f2923d3b996a937ed8f258d40a4d6ca
SHA2568fac97304759593dd01f839c21b9fa91b53afcc5bb4475fb31103f15c0a0b9e6
SHA512d147d80d4a073d24476ebc88754f9389b26124cf5cc7bffe7bedcfce785b3512eff5d1a065240d82fd4a85431e0473fe2332fb4a9067bb0fdbe4e5ad3901903c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d69f2567928f1a7ddbd7f9b17e48b283
SHA157286ce5771bb3194e47d1cd2efd9cf064570531
SHA25637c26fe1301a31cc4e9abb27ac79f3d98acf9090a129510e71eda2776dd0ebf2
SHA512bbf07a2ed5bd86dcfe5ee69a77d4fb619ea4ebe05a671eddd75b24d543a2e33532e01731663219d980c5f2a5d951c2680ad196be5561f2126b7355c208d65451
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1a3b406749045abede5ed824bd3fc96
SHA1a7d66f152d7dd67bc6aa81623a971be9d32fc5f6
SHA256b792a88a755372488fd274a522fe59ce8b0dce4fb44e3fdeb2cac4b5026fd7f4
SHA51272f8bb0c730407ac59853c8fb15810546c09a9ea9a4d31be311a5e4b0591da43a32dcd8e45d95683096ed4b675bac96427de3e3ff72f075a2e0ea7c871826254
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5331d89b659feb2c338fc428153710397
SHA1bd3d5f463dd454cfc59e2219396d161af5fafe48
SHA2565fac156cca8ab4423f158f47132e86904398d882dad503791edf228352a20010
SHA512c5b7c7fa65a3e371965b85b6e1483be448390a636d1ce55f1fc8b23edde42b3407c9a0f2f95d96862d43353c6d2e85a1dd4209ebb3b8a5886463fcc260c8a883
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cdbc9941a66fe6ab6d016aa2b552cb5
SHA1d583b5ad1a5943a5afb81fa06d0c539d1dc85753
SHA256c948164f3f88ddafe1b13ab07a4e80e4cf5b25c628a34bd8ddd68951729da432
SHA512c6348660cc849e6f6f29ebb1b13cded44ca5f9e70c2b2e367f2d3ebc90c49815648841ef584715207e4305a8daffa41748c0c6d36738f389abd8ccc968a00734
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e7a75ff8bacf5406da0fbebfea5aac6
SHA15f627f30ec3d6def4169cfab05fc6e09721e8f11
SHA2564922c88a7e4281faf91e515f5e44e3488dd26eb89724f1d5a766c6a2f6e9908c
SHA51298a0d7289ff98a06a1ddc7fe56a1a9dc465c79f27b1e53771ff08e8c37d83014f1035ae5be79dfff2b54f939d5769c7c9d2878c4fc80e3d764dbb1c796bdd6bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ef1b52b4b5d83bdfc44b2646e0ac815
SHA12fc2c22c9db4b1761e1d4a38407253e4fb7ff99e
SHA256ecdb5537965a8e1650da1a512ab940023f44872b6a200a1dbcfcc0fd39325f08
SHA51262fb45e5efd71f3711fdc2758159437b69b7dcff75853aaa8e116b9e096b07ffb055a9d04f712cb1998ef7ae7226b2345bd07cd4ef63909eb0740ee7e2006bcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555d416a1f539e3fbcb0cd3172699c84b
SHA1a034f2ca10e5a59e09ed89abe0963920d06cc0b8
SHA256a44344a6e3843867ef89bb402256c54807837beb42a1c6ebc377199ab4f698ab
SHA512184251a2a4fc5fd3ead5444e4ce257fe846dbdc001386a3174562e9f4860e914319c3c45f921d74015616d24ce7e98b1f17850758ad30f29abb479855ae88aac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56be715c780708e7ecdb817d0a42fba9b
SHA1eba78d71b3df53eea555367871985427c101522b
SHA256895326d268f1c97156d1ab3523204ec2cda3730d1efc776cce42ee45ab9f9456
SHA5124fb4a7f999590b509c68d05a9121bf048fd34aa8c3a018058298b82b55c2a84844cb1220eb70e70551b7d043bdb3a2d981dab19b636cc6b858f257e1f08e632f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d21e89d1a53b0678365f9b57bfb14af3
SHA13ce44a1d70067fb093727ee3e26e76bb74abd550
SHA2563f16f5e7b0969ab50ac4a7c085c8628efd657093bd01090dc743f472cab9a1cd
SHA512c55ebbb5e2298fdd714b9d14c51c06b021a81110450d35ea4d3fda97f69c95460381a949525f2173c7c926a9bd687266d09be5b935f57056058f561640b951d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5053514804a1dc180971f247d0db3fb7b
SHA1a71589ab50d416eb174db042699b662fec1fa007
SHA256e94c67237e83e24d509d73bc4757c09883ac7e9ee0db0abc0dc8832fef37f778
SHA5127bce343fd49f419091fbd21c57851fae76fe4eec5562ed158e13ce9f9f2f0e4e345a6f6a02ca229178b09408003b44869bab170cc3d456f2451c09814912544a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a44a4ac7d553740a8ffe862ead5a953
SHA14dfc451f9110438c01a45812a759391b333e2438
SHA25617010722e2397cba96dc272b0acd94023abf867c8f977558b067ef0e4ad2e8a9
SHA512805fe0ca303aae87fb30c7e650816218a394d2362cdc741c6ea2e452a579916b32ac2eb70a35d989bab9fb0476c95b6e316faff57a81718d3771c96553a57e18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad6e92bcc28f69f105c35c7992a68bfb
SHA17a657fad648e6dccde48a1f470f311ded957e153
SHA25632806829861e5dc48b27e21e6a11962aebb3aa46285b661c4a27a1019ff98265
SHA5122a8ea423f593992a2569902fa633c6f03d7a71496e20971fd6024491315d6345524693c57ff2478b7f78681cf7df49b5ea0bcbc9d0a6b2004a1ba27aeaefd6bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ca09d9a615a023cdb0e54685cd239ae
SHA1e3d4db80b477ac3a2572cc087784506a6d05403c
SHA256be6b8b58a868ad9756c706501c09b77d859df9aa768e544ccb29cdfc26e27dee
SHA512d271f1536710e7246cd83b1c1a24f1bc75f46ee05dbf71a3d806d7af6e6f3bc16f781f4d3d8c822eefe10f5e903695294259444e4ae5442782ef5b318563be27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e88fd9e42d24add30aa1d184b9fb3e7b
SHA16dc6f0d8bd6e7f9be72944d179f20d3c48ed8ee1
SHA256b1cf1fe5154d43d7e81ba6391e77941ed650bb50ce8e0d1aa7cea78b53f97077
SHA51203965c4ec5b542fef91dfc05c2b589ea5b78e27c8e2b23d22e87588aa0ed703a5114ede04062d04b85c554e326ced19b2a50031eb49bcd97a7de49ac4b4d018c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5240bd64224542dad8f3672a5eda82825
SHA1938ea2beaaed0211735bf67775a404e9d1d428ec
SHA256b8149115612821359691b28c87093672941fe37c71366017a06a5d18b7c95c98
SHA512ae16aeceaa9b503be41dbf272c253325fdb358ee6994643a241fddf4fb7c1064bc6cba41bbfb9a4cc4f1cf44dea4eef25c176f8525a90bc7151a7848025e3a68
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b