Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17-10-2024 16:51
Static task
static1
Behavioral task
behavioral1
Sample
52b5042e8ef96633fc51fcbbf8256c9f_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
52b5042e8ef96633fc51fcbbf8256c9f_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
52b5042e8ef96633fc51fcbbf8256c9f_JaffaCakes118.html
-
Size
139KB
-
MD5
52b5042e8ef96633fc51fcbbf8256c9f
-
SHA1
5322c33235d3f929b1d2472ef6c24c047560b070
-
SHA256
6dca353c094a2584bd31d519dbca6b32851a42213cf60ddf23786f6a805d2eb5
-
SHA512
72adb16a4922a26d3102b2da3d90f756cb09f42bead7b22f1977942b089cdf37b9efe0f424602f7f643aac3ec1e7c70fb001c3edc149ed453f7b7bfb5f0a45db
-
SSDEEP
1536:SvXKG1PArbnyGzoNJl91GcyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09M:SvTbHGcyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1DB75051-8CA8-11EF-AB0A-FE373C151053} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435345783" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b9600000000020000000000106600000001000020000000ab7fe4259d6f2a0b87b0ff74582e37628af75f162e2cdbc99e8925a0fdbbd8c4000000000e80000000020000200000002696575222d27193b3dbffc6923426d208e137312b18b7acd3f82a1427d8af6620000000f351f5b708916eac181165ece4fbd04dc579a25271731a02184b55eb7e261d3a4000000025b49979fd8dfe61d828a39aa3fd885239ec07ba4f3339dd0c78473e0b50150c38a3fd4b6000ebc107c038df892f7466d5cb69e736a828d0b999a39187e4dc33 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0ab0934b520db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2932 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2932 iexplore.exe 2932 iexplore.exe 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2836 2932 iexplore.exe 30 PID 2932 wrote to memory of 2836 2932 iexplore.exe 30 PID 2932 wrote to memory of 2836 2932 iexplore.exe 30 PID 2932 wrote to memory of 2836 2932 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\52b5042e8ef96633fc51fcbbf8256c9f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2932 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1a2b5dab71937c0d7c95992008f3d8f
SHA1f00f1bc595bb7ca3718f0492d36fdaf46d430c06
SHA256ee8b06c0153d1a7e15a1a2433b5b9a9358b59f185ff893d65a20d1aa74f02a8c
SHA512685e20e0175a2ac5b3551f0125523864213f0649ca036d078599d937049c45f3c07be78f800d70d9e096a4fc67aa635080030b0766ceea04f3b760099ef9f860
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5088002fe8e9b9e2639839291c52552af
SHA1851f248133cf6bd650d431e55517c3c75beba250
SHA2567af1c8e91c999567e6f93dd6f52cf7f4719e2a99fb5894fb0786f2a6953a686c
SHA512445bd8b1e8c0f34dfb0d68c52e97f1bc76c3f466a31eb67cdc21169ea779df1df171bac774bf1b84c6fcc0c7bd99a64b814d2a7610ac42c71e6d548add1ff334
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae9c24f968fd882d892b14944d9f3bb3
SHA18b4a12b83393489a1b9a9437574ba5308399d45d
SHA256fbf99ccc40dd57606c188a7dc0d9d63f62a2bf905daeb2a131e0bfee1f39dbfa
SHA512837af96ca45894c20e0b50a3d0f4fd5e44c5fd038eee8b137d1d8394303e8422a026b90b28440719c6d45d91170491176e3a764cd03face05b162d22d3236887
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510d38bcf9d73b8dd8ccf4173446d6041
SHA18ca30d25422df3168d3d00568af46290bfb56529
SHA256e7fbf7469f62423f3318594189b97219eaf5c32cd9980da8d2cda29bd75bc6e3
SHA5123e1f5d61ba97dc82db292443b871abf0127dd7d8888c4b12d0cb15d03ee646f4d6d84ce6f3d08232c0641b2b259fa02f27feb8d4374bf577089c78645c23d684
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cf35f2d0f488712338328b760ac246a
SHA13705195bcbbdcc8a838d1a5a7b34ca3c898d0ba3
SHA2561edd95fadf3f7392da7f528ab2fee6437f34a64497b38a3969c16f34bdc39695
SHA5124f85534ed36944c89476cd774b0207b1ea436807e96d7d9189c7277a2a1a9a8665cb7cfe5cd9cb669617a9c7a38dd41fba73f3d21704babff906e3c3e658d29a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522f94ede0bcade149ff0c59cd771c906
SHA1fcbbe790625e3c9be2bab48c80243d65f8f3994e
SHA256a3ed6bc9c5fc4c9d419ca51595d36c330d633dc7502f30f7fce703bbad5ec0b5
SHA51247738275fa61ccf8c4ca5febd4a3383685f6d284f1ac7f3d42229538b1f361638c4894c63829fe02a6738fc548874c4d9be82d49d3299752006fd5acca0f0609
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff225fc44a770ff05e224a5c520600f9
SHA1e1561a29a78117d4f2c6c72e1c85f44e687754d0
SHA2565fdb9937f293b9225f1b99c62f7a89e075cd02afdff8dbe2ea48808aba14d00a
SHA512169c86fdd2c9e907fd38efee6fbc89a4625e9fc38ff464830821a605110b9e90d7f4170afa902569ff4b9bb1cf7a92ff5a4b1590b14319c91010667fe711fe6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505df2f399bdde18a2b76709935b2ae9c
SHA14ffd4756d7a19ed0fe043b8e2e2476c1483a18d6
SHA25638ecf1b7cc5473a0f7b843302f9b81e4d1a4aa2a659a01c912bbe537711880e2
SHA51203cb6c77ada5498086ff73a5cd104b2bfd262b0a14aad22722e93dc150bc22f5e04ec1adcea6b7366d9ee01a14d150a9fb7aee961acff135d7beb57745e5e895
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551ec69484bd8dcb25db6b9e1f861a5f0
SHA1ccb6a03558a1c094d59f7fd34d44265ce6fe4808
SHA25673be55de9956e0e37e61ee0289f8e7f9c4eb0da37f817f574cf48ce54d03e833
SHA512d58bd0e9119f803148e56eec2c40bb3cb7ac35acdb1791154b06dd12f09271a3e2c86d68452620569cca1730953354c0259ea6de670a7830025f19db43dda6d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb71861f1dde985283d709e9a0b3f9f4
SHA13ecc2319a8fdae4bb5a50a1f62e375bd5d7172d3
SHA25674da5017e65bf534138fa823abb55abfbfad1b89ad5b28b9ce3f056f05aa8fdc
SHA512c69391468ded0d4fc5d11b42ffb20e181ec560fc230af8af8a5644bf5158ccc16379b8f38662b330ff740ad2df76ab3d30169c406c5b560cecd4d63c1b9a7f38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b2d9ea57771152940d01717c62b6c6b
SHA1cda6056f3af671fd17df244c74a1782f32bb1ab1
SHA256a1179133af1b74c6dd4f52c933c3b6535caccc7696dcfd9e6edb38e626b66bf2
SHA51207d0669b8c983ba1d36b13be611dae77fce6ba2e714c5be6c3ac8e45b7025f915b8e8d4bb21777a02b113bba21aceeda167bf3769f500bb6ad8f9b2e450c113c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c66a5e572ad3b1e2021b1fb0130abfd
SHA120aafe56bf3bfbfdac1384fb3b9aeee60ac65e2c
SHA256290500fe7299f5f5f2f98e93da7713bc4256da77077bd88ada7b11b8c838e5dd
SHA512dd7b5fbf287df6a061f18ba0409a8066ed64d6076044455845c5a9c1b854d25c19b76bd9783d05e2871e46ce15de93e0f7297d2672979fd6e64b9ce28dc2943e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdc41eeb6e7311c43a41bec13978bb14
SHA17ddd99cfb1c0e8d4655e6de5c18746b520f1d72f
SHA2569df51a448befbf90387f514e35c3562b6faf3335809773047e0b1cb030324cfb
SHA5123ee04ac9f79241d17e87da8a3fc1d679e0b2f208e40e10ecbf0467240764cd1cca7079043e3efe7f8ae84a62bc03622a4927a8847e3c7712919be32a05da3673
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586c22962ee4996c11e44fab08a1ed015
SHA1755434c4e13e2e38c1c400fcb0bb0bbbcfe4ce80
SHA25699e31301e071295b50d4717ada46c9ceb7842e9783befc628b622c736c84015e
SHA512223814e9c2e989ca65f733da484845a917cb7a6d7ca5d13e38971b3a7e57ef74963e09f25677dadaf7a0227093808ebce1a98324a407bee0a41c02897ae4679e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5319b31f6a0484dd7604716ba404c3750
SHA16233aae5c641460519c071039a972dde213325e6
SHA256654cc1240ac2ee94fe97df60c8365ae40c59bf738309345d94fda2aad301ccdd
SHA51247fc9a1665ac3bd9afc2685afdd15418792df213dd1e176a91a14f2bfd869125759f8c9a01a9c611e9e648324c0174eebf2d87c276b1206fdcbd7943467ff3c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c515d3392ba89e619e0b75cf5a3011f3
SHA1a9a2197536a53f8701006a7df31d4de52a7faeea
SHA2564c9c49559d1d387a1d8569428e7086c87b9966ccb2256a686d3f2ecc3f594829
SHA51207dcff4d603413692beccc4c96f114c2be065d432bc741335fbc66493340e7fed3645ba44ce7f3db562ae1349f13fc165751a828af27c05d9a80e7a8d8ec221a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550132f94ea0fe167544a6b78d50417d8
SHA18171852af3d7e049c8633906bcd15c7fbf7d6475
SHA256102dac5a72269d834bbd55f1ee7ee60d39c052622a919bec7c91b6b318c95980
SHA51200d253f3d0c3ba6764e1486aab7bda359e5cf909952ca842f3ad5a6b19fe82f41e4f35bd552125fe17ad332d30efbb7e17a7e0c19729197e00d1d089b4b0c0ad
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b