Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-10-2024 16:17
Static task
static1
Behavioral task
behavioral1
Sample
5295b81bc6270addc280d5e1d5dc1474_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5295b81bc6270addc280d5e1d5dc1474_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
5295b81bc6270addc280d5e1d5dc1474_JaffaCakes118.html
-
Size
45KB
-
MD5
5295b81bc6270addc280d5e1d5dc1474
-
SHA1
b57b33845a3eb54fa3f97b10ce6e2a4a4348fdc7
-
SHA256
c63350f5ef1e7ddb25bd465820a4a697d697a3eb2a9f836422404f28f6dbfe23
-
SHA512
1a980e90347eefbf82570a14eee4a5eb2c1b6e13afe85583b1c882ff95082ba0cd0c365e211d8bc8377659fefb42511d7e8ee3b6ccb9545f7745d101c24b4571
-
SSDEEP
192:haAMbw/8+6+x+m+Cvdlqsf+BXrPsU9TGJ3crt3LxGmQa1oTVN2ISdkWHC2j54xJ9:0DKF5vdDmTGKpb97h8t8+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{45FAF031-8CA3-11EF-B56E-465533733A50} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000afff52fbe0e0cec82066cebdeb3d2f078723126edfc4f0de27dc6c15e8738d2f000000000e800000000200002000000070ad3a3fc96ffe25383941cb28043b3baa64be3aa1d2e1a98d26cf6cb0b7d32c20000000f5c50a3ffd216e2c86d4e8218aa0dd6efc3255e0c49b3220f9e48f53aa6d6de84000000091d2089f494939fa3e8e482e34a088b86df321a6e814a8c57373b6ab831c707b3a212ab30eeff09d3777b548e251c48a654100d7cbd8eb3e32abd34c9b860ce7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50707d2db020db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435343702" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3056 iexplore.exe 3056 iexplore.exe 1736 IEXPLORE.EXE 1736 IEXPLORE.EXE 1736 IEXPLORE.EXE 1736 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3056 wrote to memory of 1736 3056 iexplore.exe 30 PID 3056 wrote to memory of 1736 3056 iexplore.exe 30 PID 3056 wrote to memory of 1736 3056 iexplore.exe 30 PID 3056 wrote to memory of 1736 3056 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5295b81bc6270addc280d5e1d5dc1474_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3056 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5545282a456fe6b0de283aa012e81110b
SHA1822f7ec96ecf5faf5f2a834304cd91cd0e30e5ee
SHA25616603e76080c3c4a28ef92f3de8021a0173ad6ea049546bf2f33749a64307bcc
SHA512d715845240b5bdb728afb18ff55cd7e9ba88eefa5293dbe1ab6e512635d98a92aa1fbaa19ddd00e1369be5763065249df2a6bb42db357e59c1368ffda6f82d34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b635e06e99f7edafc39125b718e38d4
SHA1532efe14109777c9dbba0d5e51aca88b2fa52101
SHA256e5650188bac0cc329a1e9c196b220eace783def385495f6f20617771111eaf94
SHA51260fbf9c0621ea318d0d939899801e6dcb0ce941163aabcdc485252ed3ab20c6553c8fecf45a8d0e438da584944569b6e9abe22bfdaa81e87122f8e537d6f6d03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca68787e1e24c4d7b65c9e88b68129b0
SHA133b7a64ed567929de9ccc344b2e0fbbf7b68f75c
SHA2567474a7df9d406326b95cca0c2ab6cf50c507b33343112556f47599960bd06c73
SHA5126fc74c49917e5ca7a2e948d77c0f8e12c28b898de01da9d8497ab53d292f1ef99cd047659ddb4fe9ff0630fb2f503c61fa96b5081b7ca182bb27c572affaaa42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578626bb20a5fc83ec6c48d62c8097e3b
SHA1294ffc3ba61b66e60db787136feec5198cd980f7
SHA256d32bfa2ea11c0ceb794d038e9f6fd00e12b4c25ccec8563ffe9e407f3c2954a3
SHA51270f295c0f53e816958bad13706ac5b28be1f64896e2822ba0a5e085bda2fe6ca63f333a3b2c4f11e255011cbf159daaf6544db8256351991b02ba24c69190238
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5223c7af2b9bfad4cdb00fbc8f2995e47
SHA1be4a4f35ef95d4e7fddb5ba922a986424e88d6a5
SHA256380f34c6a4b7e4622706e1255b79e2e00df28fc816c93cde0dd89520ad187b83
SHA512471b1d8d45a86ecb990341095606798e1b52501f343193d746a2bdae21538058945a737d5740ed2cdb7b746c5c9eedab6a79939f0901df6705756698ee26fa79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586ce8e7bb33056fbc10babc380e0afe6
SHA12f5ef352fccb058dc14671ef7f829f8ece55e50a
SHA256c394820e1355e56bc73c76b65cf73b9e4a5a9a70be5665852f6f9e16f1d4f649
SHA512bd8653f2c65ab434f4a3a8a8026d2f50491b8e46939e2631e4a7aa729e08b79fa61c8abc56ff6f93063b8d7889005d05c81ba3d87cd1fbc52072a0cd0b17b66b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0fd510de5512ff28d6b79417850d36e
SHA144f1d8c0925fd270c0a5082af033b375a9df7588
SHA256f7aa31bc0069bcfd78565ece0d8892cf484283252497094a54843e26378d7275
SHA51283e2f75d1b8a7df8324a637547148c98e66d83ce8f4969eaa4d417675ae0bf84eef034f6837eab7199991dbcb1ab173222323f3cf0ccbcefd45252abb59ee514
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5868694a643db68a9c56aef0df7fda299
SHA1de30c325c3857d2bf9992a36ed879bee83709ad8
SHA256e927bb94d7d3fbea6e13058709424f5d6e48e28f41c4a581a98e3a852191a189
SHA512a9958d41729dc97571208a84fc397e930e4b6b24f1b512e771e880c184df8c03fc1f488229da93d6d6b6fc98d9562fbfbdc59acb2bbaae51c20acd5035ea651f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f6831c1a5394ed71c85d96388674484
SHA1a11ccc61298fc3c2073e959f66f3f7a76d2dc5af
SHA256d134c93cd47ba11e4ebbd837315a5dadb21dad78696cb3472abfe936a11bb4dd
SHA5121cc846b4e6555b89ad956a50f4b8c103b3b41d20abe7d723b771d71168f86298dae5d163dd859927a706409747441d6bfe74c29f25c4d6380b2d3a6533174c45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cea236b39d134cb79db0106c5da48a0
SHA1e3a64c311efefc82377f111266dfdc54005a5ae5
SHA2568e532f662605b3b5cc295ade37945f7d24419186a6696f8ca2b08ecd82919d24
SHA512a89eabb4ccf2fbb058a6693c12f8fa0fc99662b70bdebb434714376b15f12b106fb32bae7a406cc9dcafa7c8dc7f5146fefb8537d31a65e747995ca055de459d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1f88a29a9e783670ffa81bb73b348ab
SHA1fc9b491e2df9c193ff80c1ffae62cf059776788e
SHA256502b9ae9bdbca6ac3214ed3980f0799500d83cdf1ed2766245b42f66689c2d8c
SHA512716c1aef2b7093b2d0f46b618ac25f134144a4546a0a4b85f83b4de958f78bb7230aa733a92699caa8671760df5dee90dc1e7e4caa46e816f253ba4614fd784a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574767483a528589939e5adbc723e54bc
SHA16485e6d894610143e064705d09252f9099bf5f51
SHA2568b5b322131baa473da426b2e7bb135b30a1a322b55f251474152141a9b532245
SHA512a36fd5fdb0f19bffe7684daeec171638f4f9bba062502af35499c04ca3c13ef16cc93047907c65b074ac81330f74640eaab2c2479d595cb81a51baeb524b32b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cdd15823c51e0935739c71d1e49dc6f
SHA13a9ed239ec6b832f8f053373b916330d6c7aeefd
SHA256358aa791e73167b84b4bd0641ba0f779b4c9935f235771e741f4cf0c338ac7da
SHA5126b108296c916d4069f6f0db353bb9296d8c469d2c916b458c6ece864f891a3c912e164dc7a210241cc1620816a731e27fa523acb98eb6c0fb94244bd6fe18c55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3ff6374b8d287ab3ecfd3a853d538dd
SHA17f2a59786c6fcb4f24689e9a7d0b2bc6edb0d27d
SHA2564ff37e33469ae5b4539202e558b7c671a0c4a2a4e783339c784eb261c367121b
SHA512968325cfe83a26559d018e49cb7be6259532c2df3f5a2731a7b75abb1825e2eff38f99e718c6748c7919543f4d4125c54050896633982923da3e6c0046edb2d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58660b651684553aa9d912a4efc4aea57
SHA128c1341e2df6b69feb47c0d1768a3a61fdecda83
SHA256439d008a51ba12693b24d90dace3ff820b193426f2e3f8523cbba0cb08eaa2d6
SHA5122a86e1ff7c490704ad8ef5ce764d51917b7e2be1310e48c5f332daa81b840909513844708be55e30d352e203efa4ad2e4729dda2f8bb63d72f01fc37e1118260
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555578912cfb916b4fcaa9bfe4bf5bd86
SHA100009f7df05513ba437e5cd0ba971359d039906b
SHA256fe631c7cf914e04b821293f4bf0eda235204730ddff2e76486cead149ec8724e
SHA512243d9bec26ab982064401c273f9f1b56179f19211dd8b655de721f8214551cde754961204f303893ab2b2e609b7adac2fba15ad7fb758da434609577e0a9db87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a16ea8b9d495b6cb969f0b29c1feb73
SHA1716ef62eaa0bda2e9763eaadc2ac209bd705f4bf
SHA2568cf9f413e3e0caa3f4e0d8412ed17e245ddcbaae79ac84e0d7d116e6cd995cf1
SHA512b900710615bd6c04cbd118741d8d0ac2e2a285031bf5b07be8c9fc5ba0296d744de491967b9cc9440b3adcbad5f76098779766d42f5b714c031945d4034e8601
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578a09d63b48332feab73acf5f8544a44
SHA1f5e92970b6c80a1ccfb5d794212c57e098cba47a
SHA25698efd088d710a5aa7eaea4ce72038b54fdc5a50c06fa943278a09a7c2066061f
SHA512003fc553f8497536b9023267931865c622f73c2da17a11fbb624a96744636604dd01f44436230aa90a3c18f2716a17d229f8b5efbf9da755f409592febc67764
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56327cda745c062264b772cd0a371617c
SHA1980aced604cd84bfc8e2f0ad46eec7b7bf737f0a
SHA256d1d93919edf2c7afac2ce906127e78128dbd924a72fc13a4050094e475c43bc4
SHA5120f2073e8aa844a55393708448f1eddf476ef61ba628087d5a2da8fe0ac52a86f17fcb51b73cf54f5a25cb03cafd14c9bd668d443206bf702afa2a3b6cece05d5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b