Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-10-2024 16:08
Static task
static1
Behavioral task
behavioral1
Sample
528ddca15bf1ab928f60da5cab1a60f8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
528ddca15bf1ab928f60da5cab1a60f8_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
528ddca15bf1ab928f60da5cab1a60f8_JaffaCakes118.html
-
Size
9KB
-
MD5
528ddca15bf1ab928f60da5cab1a60f8
-
SHA1
ff7f3ed6367706371c586602b2e5431af05b24b8
-
SHA256
739c70deb6b91e673d578c1d96ffd6e2b0f5ef0d1c573c61207242daec008f6c
-
SHA512
a855c8322cf3c20ede40c42a1031cc3819911a7843127873febd1d1337027cd69870ba81ecca53dcde977539a1e44bcc20be948317158fc18198c9435097c6c6
-
SSDEEP
96:uzVs+ux7xTLLY1k9o84d12ef7CSTUSGT/kNSOQpNPSg/tJTlVHcEZ7ru7f:csz7xTAYS/v2NP7PHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FE1CBBF1-8CA1-11EF-B8EC-E699F793024F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f01d09d3ae20db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435343152" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000a2b48777b7714779d22aa1a3d8c559c6900b17b0043f097c434ebce5dc4cbe67000000000e80000000020000200000005564cfe4ad80a422afc917c8e46dd0bc1c960414429f6590e951774e565a793720000000b07c73df80b6532be9b7e12f0d9339013fef048c166fec996f763b527c9a369240000000e20dc0202905c6c15111c993976a58c3086a2bb98f6c9a8efb8c7079fafb69dd313233aa53c2d1125464ef8e2a9d1428168b03a7415b7a63331b3d7d223e0173 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3044 iexplore.exe 3044 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2700 3044 iexplore.exe 30 PID 3044 wrote to memory of 2700 3044 iexplore.exe 30 PID 3044 wrote to memory of 2700 3044 iexplore.exe 30 PID 3044 wrote to memory of 2700 3044 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\528ddca15bf1ab928f60da5cab1a60f8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3044 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5090fa5d668772b3e3094fbc61a822b33
SHA19dfe148fa805c2119c4282e70e05ae52354c438c
SHA2560080411147589e6deeeca17bae334656e92c727cbce39861a6e1312c032f5030
SHA512624cb592f0626a6bb07e1df3e8134edf419931a39b916cc6b8edb6c94982290a6eb18ffea3d8b0d531ce5b56c9bbb3374109a8a66b0e155b6aea80b52711e879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a23345972876b5c0fc9f0ec814885bcc
SHA1dea5b4b17ddc13648ba31707174cce7dc7b7207e
SHA25626807f1c6e87a14873782dd3bae79a6e2a1d987e91b3ffaa47e3214d8f9ed599
SHA5125e5186af7b5c3b82069d9d5482e93b6b9a109dc7e02a0b9f7a7e054a6fe0284944ec27a41cbdc1551a5ec9b31dbdbe79d76c855a866c523f598e57ec6be7bf1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8a24f2774c96f6a10e96c28b633a0e4
SHA1562a130fbc11c9c66c007b572801df5b768c66b2
SHA256ba52403e239eca483c493d5b54f8b354bcd90487fc592943f6c77996d939892d
SHA512f0de9dd2174cc96f09749e732ae5edb5bec780357d3c09e897b9f1a89e72cce5a7ebbb78878f3faec9ed20ac9a57283118a743e91e2021050543ac5271f40508
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59db9260969e23966461460602fcd6a61
SHA10952cbd108ed7446b928547e98f2f5183d3b83db
SHA256f33f142131984dcef2c3fb985034097418654d0e4613c2ba57596efed6cfeb81
SHA5123a07e896a8798342ff2eb791723707a10f7aa30f74ce2ad33e211cbf57364f527dbfe6f967fe6b6396d3b7db34f7a7979fb129b4461e99e20c7d1f1f37f5a20b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51938ed74a38524c77e932d0d32fa31e2
SHA1701e6ae7e9532d5f3e58f6bdc90b3eadd8d1d194
SHA2561c3cd41f039eed3895342b7a0f6f438f40606e943f8d521d4d63a8b878208453
SHA5123515c74f5093a2b1b7bb274ac252f21b865b746dee42d6591a7de01a847a11579319a806704dde0245874d006c306e81498d0e6b91336a868da08ebf82587b87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a8da50b8672b1e242ce98479dc18244
SHA19362d68654aba7cbdea5827082a08cd98d7b12ba
SHA25672cda00c27dfbaa858fd0c90bad0b4fd411c1dbcf8fde14acd9d306d424073fb
SHA512e49e2f156d547c35cb0096d84cd01920c12cf95da1e1b511e7521143c7f3f258a431d53c4e5c0e3118fe5a23cf4d5593beaba44ac6dcf468ae45eb88c29b6ed5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545beb6849708cff5c98c9e09d011bfe8
SHA19a2ffe89d9aace501f09a7c25624aabab0228f2c
SHA2569626262212ff682d77df5d34dee60f5ec04d77e32eb9233725831088713c7beb
SHA5126b5cf4f8df6833a102779cad4d517b9d5329fe06143dd8482e3adc5c3780e6d76b1fd29246a66e71507e9c8ec92e2024a88f7749f0a02bade8d0031713cccdcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51052d9d6a65b2405b8ea1e0f608edcdf
SHA1621059ef0e658014fdd3fe31b087e58854c7a94b
SHA256c3fb94358e785baca657cfd0cfe0b1817a022fd93d7ea3edb13e522acba03b57
SHA512226b4de2f9515b0bfc57c4c1b4ba6237abd786673a7de410fe2e0ab40eb40efe3c2f2ad991e7441c3ead007d92875ea99b33b4e2294642ee7485d99c84988b7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cff9bdbea897995ed693807d9ec1e0b
SHA16f0caee6df51067bee6f95c8cff7cdfb50034485
SHA25673a64b50a4e93f221932a343d7ca4540e57ad6256aebf196701601d1ce382c6e
SHA51285ce09f02f70b04103425eb98f708e8990f071c54fcc2fae571d74370a8b8a3a21ca72163ab60704a8f5c934b185d0195dd70e56702d70c1f36dde79478d1dec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c2a963bc5de7e160ed1a8ec62b6025a
SHA1844cf2755fab8342c98e6fba8a9dbd3caf6f63d6
SHA25650ebb0e4f7aa86fdae8318fd407d7884a7623c9dd2d5741a1b4bb117bbd1f5c4
SHA512fc4c36993204ae4055b2975bc0a5b6ce9a6ecba9d04f78edbf6def738f2e8ce87dd891d78118911c431a8583a5fd34ffc32e5e0d6d57bb211bc02049fe874966
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535c3818aae8377de18b01a6b44061aac
SHA19b5811927127a2beceef7ea748f9e1464f57e120
SHA2561b38820cf8d98579919220107861f0e86f7d3b17eb729f433aabc81d46748829
SHA5127fec3ed5aa5b77b544c90c6ee65e89995bfb4931ded8ecb9b421e98020b302fe6527cb9c88f8ba949985c874023fb01243c76f2d9a989e1a3e4951a7928bbe0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5054ba7e4e7e7aa431bcb6ad8c72985f4
SHA14b441d68c1ecf618d44d75ce65514fed292de166
SHA256f4f95ceb594a316174eaf965505d202acc46dd5f43c7f8dfd431d6039aa0a596
SHA512413c8c3e22a631df5c0ad1dae4c1c2f2bd924bed0494cc7839a4919a92d6619591d31aec3b1f1198063722097fc4cb16062ed25d93edd2b25ac944de93a552db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0e50d8f0d1714429380ec4c1d8a3520
SHA1c738f162c2ea31d41eac93a789082ad049d64ea5
SHA2569c689e6e78a557d9028f59de895358f14bc26f4afe0bf68957ae659f3b7a7258
SHA5128163936c73c57a599eb47e3a8fd5cff21b8412c66b7ba66c07e561bf30b086751384110f4f0d20a732a7475a2ab2f6b16b5959a52dc1c70ea694a769fd3af8c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a10011502db743b3ab964bef66542533
SHA16e5350bd15c8f6ac1219d15e987eed7606d5f1f4
SHA25602068a770144ea5bd0c0dd96126df70d3543e079a21fdcadbac1e5778fa225d6
SHA5127145013705ae06898ad541ba792b0c8ec3c6af6314bccb6c808b7e917eca03b94571d4e03d20db755766c9e70a26d6b50086cb7d737f5aceb670af0278dd325a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f9091885196428b027a27891df3bd08
SHA13f03f3c5b609ea619f684f616711ec0e359e277b
SHA25606ec4472df9b60c366aa7c830673d193921265a79c989b075a725addc5f7c3f6
SHA5123570b1c67d6a12c3ef5e62d740323b5834b88f31aecb0216d13f37d97a946451ae6c50004c3b3ed8199079538c2c7df7b1b93dd057a76460f5b053cce16c7a78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aede9fe7f6ec208f66a9f85dafed0a75
SHA174383daa20e4b648d9f9fafb997c9d122a3abfbf
SHA2566302c73497263785d7bf234b242552b1d03994e486be60054258a7fc7af8d4a6
SHA512fd4d0fa2c2428d2c5c0db1177cc091f302c8dd8c940d4f66e5664b9c6b401992b79b1c4dc4339d9f7b9b1579b769d4575f059fa7b6191485baeff6f210c136de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570a1b373d1e4b9521cf35a5d7978794b
SHA161515a9a66233a96fad1951162300befe2e93195
SHA256467be6f5a1d946c9989289f75b4939ddbbbf57361135eaef1348ec952f6c6717
SHA512b2a2f55d1c5c8d6b3f1c17fb8b584c664e6a19e5d265e5badc618eafd88bc9ff52d79bb78175f6ee944e86116472a4ed6603f83a622a2abc33c43ea020f87e7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5452ba81cd5234e6bd29efd0fcb1fc3f7
SHA16e7942db654fae861cfe0eea5b48fb0512750919
SHA2566d784d344c16f0b173e58facc7280dad42ac2711d8c36aa211f72d4e24fc2ac6
SHA5128a3f4a45ba33f1eb77f29f42cee0bb5b065d8b6ac826edaf59db1c06156aae942d3b5d66adbde76a6fcae8b308d3c2970b8680f5d73085c1f0fd476ea5f184d7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b