Analysis
-
max time kernel
134s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 13:09
Static task
static1
Behavioral task
behavioral1
Sample
522d1f0ed7c46410dc6caf7727d12b7a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
522d1f0ed7c46410dc6caf7727d12b7a_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
522d1f0ed7c46410dc6caf7727d12b7a_JaffaCakes118.html
-
Size
24KB
-
MD5
522d1f0ed7c46410dc6caf7727d12b7a
-
SHA1
660be73ba5c75edfcbc1f759d33cb66b8b4bcbdb
-
SHA256
83f45fc4ac40d8a1495844df489269c08d017e574d5c2b7bd7b865aaabdd4456
-
SHA512
e0eaafd9fffd4e437dce13535214a11d412742c2362c13384166df1a8af6f1f4f482429d7610c56b12cf3e6c5a51d3eba3e4e8a91f15a9ee8cf47e8923857b8d
-
SSDEEP
192:7U/iEilYgqdZwpBiMdPwB0aiqg/M5P0V8jFabL0DCn68cY+lGlQEVVBbw26KnWZM:iVbUgZ5Gvz1WZJGktqByW5P4WyaKAf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435332446" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1044E731-8C89-11EF-BF50-D686196AC2C0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000b40e0d54c3011f6580ed439865eeae04dbf92099b64fa9aae7982c9bd55c8141000000000e800000000200002000000005dc851b1aec7add8af941e5ed279ab3e3de60ffbfcb87bacc62378aaedb152b20000000a7669ce11be6509c1d7c3e02a46b41caf1d8b27ff19b09a0050e42628641583c400000002f775634554265830d7995d125791dbe45e026f02c0653bbbdcdf7d91413f54a9345c1c505ca65531896fb40f05b78d08bf60bac43aa83538976b460a77ab52e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90cf29f79520db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2380 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2380 iexplore.exe 2380 iexplore.exe 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2240 2380 iexplore.exe 30 PID 2380 wrote to memory of 2240 2380 iexplore.exe 30 PID 2380 wrote to memory of 2240 2380 iexplore.exe 30 PID 2380 wrote to memory of 2240 2380 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\522d1f0ed7c46410dc6caf7727d12b7a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2380 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2240
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebfa056e14be4892e84d0c8316cae40f
SHA16031c7d837095743009a6165c33df62c3b097ba7
SHA2564eae0f415c9cde33c27ae347030a025714f85b13428af1f9184a6af15deae501
SHA51279e9cfbc6e5833e9307c334dbc21869a99c42f28b876dd5d6c1a42538cb041bb56b37f9e401f62c9ca577ecff704ba8894948ca896a13c9b7b992fa575786a46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e1b7cfecc64feb1e8570b4d6a09bcd9
SHA106483a45e0df1f9937371f4d4b317e9193524706
SHA2568af0860772eddde3af5bf038d5e02908ea9b3384238cbf6d3f0b6a0a28a1edfa
SHA5120f9148dc60dcaf035aa36c4ffa904f580e763ece5027ca12faff8991c8d28a71c339754635bcfe6504511927af2ecdd100d3c0ce42bffdb4c31b1e30d7c53c6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da746e4dc8f8f531f57c931f6c99788d
SHA1ef4aff7cc85a14a99edbb19ec0cbee8931896042
SHA2561a6f89f7d0396fa0d49f74a87224c53c421b6efdcbb8a5363623ae97b6742105
SHA512d0cdeafcc4410d8198f3439d0f52ad25aebbb73a0b26a5bb2fa64cfbd581a8ca21a51f29db5106e2557db09a13ce1bdcd559753168807b82f1712513f09b9909
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef5ada062a0fb4ed9651d297e8b725d6
SHA119b19a3c8e47495cceb9ec0f4ca8fa524fd96e2a
SHA256dd924d02aac31d6c7f2543a5b8dcaac9fdc65220992781bd4903ee28713ba7ed
SHA51243e2e94a36a7f66763bf2523ffac3c392dbc82fbf554a6b6ac32f5f06f07494721232a1d40b4308af0a05de7683f150be495a1850d7f78885b0826fc233e5978
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562ee45465a516f6c7735993df28c680a
SHA15f6f47315ff6d6f5010dca60825b65d1116be49e
SHA256b75374aea3b454fc54078fd7cca1533bb5fb6ce1b55547727049083d9b0299ed
SHA512c7b4b068b060b266127897cff6b6f87b9a23f96917c31f77a1153a100ad63db9a8d0840cab51cb0e1d431ae13958a2b82c6c7eec05b44220fce98ba4f6334d7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cbd75096369905de876c76f8c278c82
SHA10da44d3c93a86644865b7629187ee728867a3e82
SHA25666663968ced5a4d69c64fd80a918fc491b5788df83c48b1a8c0ad539f9d97cd6
SHA512e315d5f43753f1f46a31f76f4b2a36aa4a7a3a944512f323dd7d6074e84652b60bd596456865d02245ef6f3733684077455ba36301272508a6c47901d3856f94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e418098d57430b88286a84e4e90a9ca
SHA1b399d2de1e712614191f1099b42340798d82ad26
SHA256f6a575164339ffff260af59c9cf5e92af3b87d64305146cd83cb35e76ccf82af
SHA5125151d53766f4198ba1180d23757dbd0baae37f0e40abc52d167e8b30c76a10863cf0da7742c2c3c0278debd807b6ee827e2191c9717dd2eb276e810635c5d4cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf16ff96cf92f81b7f70d50abfc7cee1
SHA1c668ed01773c15a5ae74bd1c0549700e8fc13463
SHA2561a7d3964dad239fe5672579523ff41f484bce14aba739554556ede5ee7fa3d47
SHA512d2ea9c34340291a56224adcdf130b864e7e02dea0fbd8f676b21bc6ae4f21d16c62a8e43df33d02e48dbeadefd8ba94cd7f47b17c1fb39f850a6c3ba489e4bcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533472e22ec07e5aeef114709927f1da2
SHA174d1c1eb7b6d26e49bd582cacee1e2c24b6f0936
SHA256934d43479f6ea756667caa83145c525094b0e9b0caf7a3707d497a6bdbd179ed
SHA5121d395fab7a8f1f3638153a49cfcdd7281af5545bda53d217c9c362840af8ed2e9a37a2b67918f33f14494c6b3a1e3e39bbe6c7ce44706dab5de855a72bc4952b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eeaf9f391bd26bc356510c2dd6b534cc
SHA1da9e7c173db03d0b5647c9218d90b581ae02a41d
SHA25604d692c2d3e911c3d34f49ba5c4d26185588a8151f06c786a1ec2d735b38758e
SHA512c33a6d10a61f37708c252807c6b64a62534ae57a1331fba42e94d5f2ec8d7716855c6411f29d798788364399447243c4e26b2e7381a957e41f34620623b0a306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5d47318bb5b24ec9002a42b09dc71ba
SHA17c643c4054ca03c926557cb990887bb1150b2d36
SHA256c496e618b5a8e98ecdbcb306bceff8a0e2ad93b74e01b0af1d5f424a9b2f2b76
SHA512b3cbf3b73ed7f446c0e9bb459523acd45706512d9e37aa6f42be7065f4f79180511988bfc7cf186588726be6add957a49106aefef7310d003ca0270cbcb18656
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548e2cda947f2942c2af0130d55fe32ae
SHA1b0d6becede1699768524ca0722e3f9b049856327
SHA256009da9fbd6bce23d22e50e8083bdff9eb7c3024212500bcd63aef4650eace051
SHA512d74fe1b16d32f66c5b72c4b06e2433625e09327bcc91506cb96ef5b83bb8d9439d2a40d6a08d46c205ff299be0d832eba2df46b4fb4b4ce0846066fa61b85271
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598af358662dc9e0f5bf3111433ed7367
SHA1e19a83f546b0253a657530fa847247f4650791d3
SHA256c7759f200645fda973ba2da0c5b2ad7262d437b7f0678ba94ac54cd232fcd3a0
SHA512fe9d33ce5fb984e6092d515bf17171285dc432603201ba3793466750563c81ac36eba0df7e7cbac9094e18fbd64d0afaf22dde6766de9a4e9d00609b3cd9483a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d67e719ddf9adf333fea57316469e2ce
SHA137d1c37c86b2f304ad946ee1670dc1eff76493dc
SHA256a12bcddba1e821e925ccc7ac9f5cddd306d0ef5ac6d8e25092ceb27b7a86e562
SHA5123d0d31c2baa9b08b968402a5bd6aa36cb016f8fb2d0291cf347443a500b2961741a8d93bec1d4f6c392b61e6e1b53f78f1ee427f786ea5a25258bd4a20025a66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5333bd0eb392292497a063a027b3b2165
SHA18e63c23330253946011d1ee13e744e8230b8d66b
SHA256419a2a069d3d550fb7fe9c3f3365b29ea205077bea5b9d864a90b94238eed592
SHA51200ba55021e078b35a1bf8dfe49233d751bc4f604837f6d885d97226d1631086a53753d681727e910fd4c0038368c7932f388ba124ef554652a58414b4e990338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad97bf0ff74e7534de49fb04a55c31b5
SHA15cf352df9ab7d0188f212b7de4cfce75d41c03fd
SHA256706454e091270f4c8cc303d3c9f795b606618fa8bbd69aeb4049bcb1c39f5f57
SHA5122e434a71fb4a10fc883b473671e59882937c56ecf5301ac4a95a40752bea9b738cd0baa83dba249ebf21680816e6a47143d8701ce0d7791ff0b9f25a47a92b36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537924a7282415e8a2a482d730e84ab57
SHA1ceb608c774fc11a3918aeff5ec357fba8f92d4c8
SHA256dc3f0746dd3401955812fbc299ab9c3ae423cd3497545ba2241ad093b7027701
SHA51288a7ecc24a2698f445b2cf7e9baf79d887f1eeba1cf0dde2a13d77108406eeb412c55bb0c0766dc75b164845147d7470670d0151d94221e01fce07ede8d70e82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bf2630223f44d06e1bb52105c90c398
SHA1d938d3cbcce5e56599431f1ccba95bcad15564ac
SHA25606ea57a6c0fa8a5b16d848db4fef29fd849dd75c0161a73b8e5b497cd41c7bce
SHA512d370eb68ad926ca676f4bb43d91352054ffa363f36727f09d2761ee0c88a791b2f4c3d2aa3bea0eb0dc492a317873a2dbc2e027199147d93301ffaaa2c37eba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574770296b4aed4ca60f2cff3e0087dbb
SHA12e050f42e9e8a9e69c26fc2ac0f6fe5ce0bc741b
SHA2568cc8d756aa2f6f7862df867dd8b3c1bb98fc0d5ce5e080cd2faf019a01f160a2
SHA5122100f230496408503376098dc2f84491af8f5d5708072188ebd43ad9142777445152113db5fb02ba3ea1442ca902bcd0149c526d4055a7941f527106d562128f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MPUI9R2R\sale_form[1].js
Filesize761B
MD564f809e06446647e192fce8d1ec34e09
SHA15b7ced07da42e205067afa88615317a277a4a82c
SHA256f52cbd664986ad7ed6e71c448e2d31d1a16463e4d9b7bca0c6be278649ccc4f3
SHA5125f61bbe241f6b8636a487e6601f08a48bffd62549291db83c1f05f90d26751841db43357d7fe500ffba1bc19a8ab63c6d4767ba901c7eded5d65a1b443b1dd78
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b