Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-10-2024 18:38
Static task
static1
Behavioral task
behavioral1
Sample
531e8db93b8355b7d216d2012657779a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
531e8db93b8355b7d216d2012657779a_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
531e8db93b8355b7d216d2012657779a_JaffaCakes118.html
-
Size
9KB
-
MD5
531e8db93b8355b7d216d2012657779a
-
SHA1
56fecceaa259d5dd4793f032f10130b884974751
-
SHA256
a920534c47f8cae176ac79e8d2b4c0876efd1a4cebc239f12c589388525ba35a
-
SHA512
1032e33ed9cfe9b04d8240b7bfebf8cfadf01147cc3b6af0d8f1ec5002efce13b5306cd651e9bb1fc93887cbab615a41a552af4bc2ca135c9386cfab8715925b
-
SSDEEP
96:uzVs+ux7e9LLY1k9o84d12ef7CSTUnGT/kzipFHlVHcEZ7ru7f:csz7e9AYS/60dPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435352168" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FB81B931-8CB6-11EF-949F-EAF933E40231} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000001fc39c92f5e8abed0d1427b35a411435be8e54bb60a802faa7e188ed6ee7de14000000000e800000000200002000000038c548aff2ecb62c4d9ebe1cbfd04b800d37c8398105385e6b33e6360dd6fdde20000000a13aec2c3066e1c997fe2b647d050964f7a7d7b5774690a8938a52918a12335c40000000b2257007cf4f9473ba15f45e0510a3eda2a9b6317c20092d62b6a761475fc8bddd30e86b42ba02ab8c36fe9c64b743e28fa5f5eab1f86217641dd3a47a719019 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 403b84d0c320db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1916 iexplore.exe 1916 iexplore.exe 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2264 1916 iexplore.exe 31 PID 1916 wrote to memory of 2264 1916 iexplore.exe 31 PID 1916 wrote to memory of 2264 1916 iexplore.exe 31 PID 1916 wrote to memory of 2264 1916 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\531e8db93b8355b7d216d2012657779a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1916 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54603c45c51b10c7c2fd2f3a837c51e51
SHA18ebd82d21f24711bf259be48773c520b9f9cbc2d
SHA256b7b20b981fe8f7bcf4db3c70c9d61925a1254e9faf2570b914fcf8bed4d16d25
SHA512e162f057cab474b57565bc00afedd51b8958295fdc1c303f05911d8a2d0de1c5fbddfacdda222d2f1b5fa25d53f0f2e9bc35bdcf6ff8bac5458a4d92c18bd462
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfc153b3d11f00853358847cd02e1faf
SHA169249d5ddd3ab9ce8460474e437264b2580ede71
SHA256416d5d245c13cd1ecb992440f99b880328e46d991cb90afdd83d11a7099a2264
SHA512f664500caf20d79458fe1bf478520f06be2d3c9caf13eaf62a7157264cb903327cc6fc89c3b82cb2238540e0d55aa6e133f0fc3362567b4543fd56689c56b0eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d403ade037182f2193928e0eefbfe528
SHA118008591d5e09c7b8449827b2da592bfbc7c489e
SHA256c25eaa8ffb852a52d0eee8dab5cd220aa3f10f0db97324a8ede855d1410057ec
SHA512553775a4f96037694b46af96898d2feb4e275343fb73a47cf62a2f181481ee8f5c5d815bf8acc94219021ae94cce81cd9d3502a86dd559c18a7c4f4035152a58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9a0a889c3e74f41cfc17f35a086bb36
SHA1b068c149d0c974151bbdf2878854a4312dd1c7c0
SHA256c3cbf8564f037e2f0aca41612c56acc30e6a325d0076a23db34c1822a9c06d9c
SHA5125c33081de72ced0ee563e9dfe7f85faa509c9a5768f6ee4cde200e897fc1cbe21f010746e86db84ae0f071f604b28ad2e0e7f9d6df4bae0115a5a1c16f211c6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d6a748b025bdff58d28214191c84c48
SHA134de97b86cb85cd70c89f09ca5fce4c56c3e4dd1
SHA256f134de50ec389f04f722182f53bc9308854fe0c29f7ee7003e69254996c7f62e
SHA512106f7f6df7b470006d01da5d6c04c5e07de162730bd7a1d257f8053c3b7eae382179138dbc171da32e6ecd1683b1682d1c3229151965e8de36c01b54d663479a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7b063c42a3efc5393c643492ba4ab69
SHA1199a6628d26cd80cc638e930acc2f586abbe1efa
SHA25619b442d5ae577252584256ad2e1cf8e1b57b589104d027d83d369a8fa963c8a7
SHA512fb77b5678c91be155909a861be74cbe36a8b757ceede554a480a2500fb18215d8f074a3aeb9c7ec6ef688bb9b0756d328cafe59d484a364df42f62c92e0bc7c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5980b66d16fb96c1282b620d9e92748f0
SHA16f1c0ef8660f4e8d6c3856f9b5fb51d2b06cecef
SHA256d1fbb2973bb21400a7dd5cd60f3741b24ab60beee20dcc4948c38d685601fc90
SHA512b352fe0f438db9e27ee19eaed71278672bfb861705a45183b87e7eba827859409a10e5619042c14b089b2e632c20a9a86224c40f769a4a76035a32d141ca9379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afaaf19e32f85dcda10548f0d0538989
SHA1340dabe0d8741203a39aa132d249ed5b09eaf182
SHA25646ee9d2c80599a376cadb24572e8f0eb343dd0bce99a215960e271775834c558
SHA512120b3ed06eab78b6cbc17588ee5d920a520e9d8de5492baa5c85d469d3016ba218a0f02b36c97b337db6c8c6ec6109d56b2ad7e6ccb61a49261605f3f2bca411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c817879219dc3a31daf13d4f23f3c50b
SHA1ac5aa0cdc9ac149da438d474ebc9ed12ad5443c3
SHA256a1b854f3d786f68972545d0af6a1d5afcaf28ef08dda646a21463dc9cbadb2a9
SHA51272d8968caa80a2a0c1ea59ff115a9eefc7c70ae5782606e52a3bf511cc266787d2a4c8eaf621bb6dc7af4a8cf6fa04aa406cffda88960527ea0d56668e77cb6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0cfbebc55d7988577b6cc882a118061
SHA1977747a1ad55db5cf306834d95913c156c6e7311
SHA2563762812dbc8545af6c80e08e831a5ef6b37ebf7ec09069dbb9246b5fc248cad1
SHA5126badbaa701d73e878b80d0fc19a78e6999d011bd1673f8671e5267decbe9f126ef3f54ed717e27195d04000ea41a9681e159eb9d9428373ccd70fd8e438054c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3049dc2376575ac8fe63174d760aacd
SHA13e116fee806bd5288b71a5d83346a51a2d3a86ad
SHA256c1fe372a36987f69d895935b37df6d0e4e98aa400630073f1bf78bb402636136
SHA512b32e19d060c4efdce8a1999586fdf718d727f3fd4f47f04f73eef7d54da6660b8cb8a7ca1930ef7006ad5362c821ca098afa98e52c475ae690ccdaa970405565
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e66c43a5b0eed97a52b94a210e249533
SHA19fa127e1f4d4ecf110d5c4fe89815f67a0fee642
SHA256d3e11f35e63ecec89a9e8314914a8aa950aed54e775a1f471b86b9a426ae792c
SHA5123d91f7493172704c637424e6b0b641bd2f74d19136de1ff6a260e664f568bceb72c4c4d6044cd34a4f47f01a0e743499625b39ba10408edbfcd667228d32fa5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbe8949194eb7f017bf5c8efe9efc657
SHA1d23aa8d249f4a85aeb017c035f20bc1570bf34a5
SHA256d3365c01f357b008643b5c934842290b6f544d3f01ebbca5d9c43e8a755d7e8c
SHA512c40c732892e3a068234b1ae05add26ba410a5f5a2576a699179d848b598490c87d511c4ce044d47ae89d3aa29abb4da5de9f3ab25db4fd1ccc30c93b7a463ac6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd9ae636cca06c12f60efada2d6d274b
SHA176118ef7910d17f2ab4c9a5cf6377aafddb9d236
SHA256b61c54c5a6023d4376a236f1dfdc8555cf7a6e98dc923384bc9457d2ef4901fe
SHA5127847e89ce752e764c2c9f7f6543273dbfe0632876b2c65e2340b8fdeeb6b2e1b5c2eca66dac7e363050ecc4d95b0ddcf7f2c0f18f67060a0d8ba785a84e12f3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b2759a74b45c12518b3db456dadff1f
SHA1bd7c7c10b9ea24b10994c01bc7770e12fb2d95c4
SHA25604560fb0335956453a857d99ab5443e0010029871fa1323f12cbddd036795f15
SHA51283d6207ebafbe4d0077780edc72fac3f705427d4b0ec29fb7181409431b7f81226fd44831eb6cb203b77781a3e709681ee57b857da6a170c01d595e5ef96fee4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595f5ec84890d19985f9973ec0fff7a63
SHA1b77f09aea865dc730e33007b182688f5639656f0
SHA256b4c796578a5beef7466160b53839e96a5241872d14cb782d643c0bff8f596851
SHA512adf2c9e847a0ec7a68675eb323e39a75a09557be743a47e0240e08afa5d143486eb91625f0f5ee9b751cc22da11d3e4923591be32c6a8bd11e2e85080c3a12e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bc7047b4140221f5a7e62d42cd2162b
SHA1eb7a7c0b8c40e2ac0f57ea882ba1ff76ecc8d787
SHA2563364294cf39d538f3cac35dc15341d8354fa94c5cbb53550e26365a011bca8d8
SHA5128a76374dd95a6f8dc8960cd21682022281bffda51524b5266ba812af8dd777e94458e58749da03ad3a2edc10164821e992be036520ffa76d82dc2fb78815b9fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ab08d2fbaa633aeab3e036d98bf7bf1
SHA137e337a5189cc87ab98bd41c1c16feb21c4c49c1
SHA256135d0fcde350c732dd202b6aa5e6941445759f3c0ca968fdf0a0f035c6c46493
SHA512eff50c2d21bd88cdc951bf1c3f6b5e98a457a866ed42c3db986b189b6065097c84530054f0e9cc43a3aec1dad6df41a906d35dd180ec8fff07f06ba38557e901
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58800225379373a0c117efd74aacd1f2f
SHA1a0cf19e4b4d96865f57638d297d7400d8b41db47
SHA256a7518cc98e6e9d6d5033bb34176eee7e653af49a5456a2be68bd4b0235d62d12
SHA512e06094b83428f7a356dd1aee2d4bbe3af36f64e2f8429705e19d3dd762dc065d4063eb8f2a963f3f4cd91429736fbc907e4c324716804fb9a1acdec85532b27e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b