Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-10-2024 17:48
Static task
static1
Behavioral task
behavioral1
Sample
52ed651652f6450375574fde209aaa93_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
52ed651652f6450375574fde209aaa93_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
52ed651652f6450375574fde209aaa93_JaffaCakes118.html
-
Size
10KB
-
MD5
52ed651652f6450375574fde209aaa93
-
SHA1
74d829359a9cee13a61e0fdb8353810a2e73660f
-
SHA256
b09da92aa923955f5d705b7cc34b202adff8669e48227d3d85a921b43588ef98
-
SHA512
0f6c96e19d970c1bca162c8e402034845874760cba640a8b7ed285c293c3b3b7eae294c1750e1868b5629325454f972f90ff1d3af3357a4f81b57109de596223
-
SSDEEP
96:uzVs+ux7Oei0LLY1k9o84d12ef7CSTUjwGT/k5mpxo3aRxsPf7zruGv9f7zSKRvw:csz7Oei0AYS/qgu9wzrFdz9DzlPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F665C1A1-8CAF-11EF-A0C2-62CAC36041A9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 501d71cbbc20db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435349153" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000008f048719511620f4fd28dd4003d025339fffae049f6f6b77342cc3107b42da15000000000e8000000002000020000000a672c075a6be842e6e69f7ffd95ee927a16e90c6821d56361aa6277ad33fe5fa200000003bfe057b45f3b85a9e26ce8595d953189f19c07992e9b6397fd124345e3f3d2b400000006473ac77dcab524f9b030ec551affd0d2264a4030608a7909b90697da910f8f5a0f4588ab2c9c98ead8b2f2a9384f60a8add603204435db784cb561c63abe6f1 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2888 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2888 iexplore.exe 2888 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2704 2888 iexplore.exe 30 PID 2888 wrote to memory of 2704 2888 iexplore.exe 30 PID 2888 wrote to memory of 2704 2888 iexplore.exe 30 PID 2888 wrote to memory of 2704 2888 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\52ed651652f6450375574fde209aaa93_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2888 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cf71a74bba81bee6a52f40e473a2f15
SHA163ff42c3c1c1de4679fdd6301312eaedfa945440
SHA256964ae23a1506c3e699fc1fa76ffeb10eadcc13ee32e1081d6a5f9492002db123
SHA5124a7bf11181f08d519067719d255475a6e0c175cd43f2895ee0bad1284290dbc77ceac9b3ea9e562bedd73c4f17315bffb72b8a8f97b03c007f92c49ef643c801
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527d0d60037c39d463c0c78486ba5c63b
SHA127d3fa8a17427f902326692878299c81584c8876
SHA2560e6fc508140024506022801337cec3defaf9695a610c3de8937efba6cfdef8e7
SHA5121b676a56c9636a06d9217379ba57fa8ff470a73a4556e512d73f4c0b877b78ac493102803cfbfd4f2d48652cfd84c6b6039f5c13f7dec5cfc8d453eefea9f483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ceb3b9742ba44576534892891df28b5
SHA11967f121eeafedfad543f71e6871f069fed93093
SHA256481792003b694f48d1587cae9da34204e04be8bf8e14286d052a1347281ef487
SHA51290ccc4ccc2b9229a939fd27cdb7795abb5cbe529cb80ec1199d12e935d9b97b75ac01e87e11a2214b2679f10c4cfd1eb87c4dca108a3f5735fb02378dced2a1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53005a867d030a8ff1a402b1d1768ae9d
SHA158105886758bb32897000ad130797dc8e88126ee
SHA256a4e252d858a5790f9181fa1b3486962c63f3e187f64123ecf687ca95eb9f92b1
SHA512c886aee8d0f70ed621e28f07d4bbc3fb0fbd5ff469f3f361f05acef96a79fff09555270251af11bd6d29b64a9eae4009ef7ec43dfcddbf788d4632836ef037df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d446ebf10c0635dd820b52551dbd4323
SHA1b9fc47065185ff04c39f64295cef8a3275843c6b
SHA25675d030d9fc0e25b065d8a892b16dd3529e5813df864b0eb37fd519d41fc03b69
SHA51245692ff3892f94f6a857d6226b7c725367c9798b1235354157d5380df236c4c9f298727990849fffbae69d0d006934ac38fefe37b0445e7de445f252b5037dd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5796db392365f20e1d88d3c97ab468dc3
SHA1b42f2de5e545bd66ceecc8b70b8ab57af565d81a
SHA25629dcd378ed047bb01b6ed85141fa604773eb7c7753b1ddc1d7b54a4f41a044dd
SHA51265f4e699d6581393efc0e6fde4b2d723bd9270172ccc22b87e81e33b1797301adb5465143c733aeaabcf4eaa02134b49808f43a530d62dbad60658cd99a66f89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53eec7fbad26614cc374273c46462ce87
SHA15fe1eb65a90e7c83e9f8bd538d8eb513f3a1db6e
SHA2563a97fec909ae948ca3440103b08d7a731f592c21ab8b10113c4e8db686896648
SHA512b52fff1538cd6859fd210369c9b238aacbcb79ed651717d1d4e50c7549f9a0d53ae3f443f87b3250d06b43deb6b22f199cc198b59578152e04e1f26e36b83033
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd417a63425a56c6f14768f3dd436054
SHA1d8446a580506632681e4cb27df45bf566da76c08
SHA256ee8cc6cd6790a207eccc8d0e8dff4bb19dce9cdad1ade3e9bd476f8ab7f461e6
SHA5127998988b29a6d5168da307331480296dc38bf1c37e752fbc78320a5038a0f9d88c67b9dcef07e41404b4d2ab953af376a10b69647526fc2836e59dc835b2295e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c284cadeae6f4689a52effac247bf49
SHA1ff076c6768419148aa21bf032923d31049e4a418
SHA25666fe6c02668a59b520a36cc4e2c47d9f349ff09cc95a022f75748e6a42f04dba
SHA51252c8fd5a5d3aa8f063bf95ff65b6798ce63b0547698b3c8f7ba076e54056fde03786aa20562fe963d3edadf3da7e4a782553aeaca508a2ae1b5fef04b33c0d72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b6e118ba42f9f101813b97302b0a489
SHA1c10d992abbbcc63295c6e120b43152d1574324eb
SHA25683989f625d76fa081e3577bd77437ca729f832a355823b14ce4fb41a34bdd3be
SHA51271aaec7081ca52ce8d22dc5bbdb1266dddd1de0216bd8fc70a63a19c53f2b8a6998e5bed979c6da36be12139df77ac3c6ae78f0c41d08431a6e8de05352ed3be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5893d48cc1c450038a301c7d60aa9c2
SHA1ac8cd02e7de33c4482ad2aa35923d6327f01e2a8
SHA2562688fdd95acfddc388f76c5a9e61e0c883c721c5a82b5041afe374840ca1ccde
SHA5122d7796f4c5fe325e1f8565a059bba0173063b3d5c0448612604ca84d21cf47a835b3ead7cc01b41049226a47eb92f78fb88af0dc89a7998b0198b8a2e85c218d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6eb517b1f69b4d1ac51b56c9f549f28
SHA117612f0503b9cd62cc16a0a9d2c3dd36f0faeedb
SHA2566fc34db45885e794db97fdf6eed6a857932ac30a1343fa1129c42953fbbdca53
SHA512bf6321114f7a8bc2a674a066b546195b6a31166d3ade60cc26b2592ef0fab44a72b317ada799c05dde4b68c305b55bea1334ccac070dd34d145b08c7aa21ffce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5422d2ab24788a57a9208812ef13f0b
SHA132cf1318e5bca435b03b249d3672c3f3822eab85
SHA2567b63e66c72f744eda7eef7fbb293c4897e383ceb045ad7e0e91dd5fbffa83b8c
SHA5126cb2e2ceaf2efca5d919926d36d9308c44fee839183a1af2701f1d7b00eb431469c540a391425e74899cdbd6e7a7862691995c69daf8ab014bf4467d5193d9eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd946d8d4de819ce79e85fbca3a3006b
SHA172284bb520a262f0e440cd4de34786e4c3cd3bd0
SHA256172013b760e62fb7fb1dd8e719b495443c6b7dae26197adce50d654d2855deed
SHA5120fea2a05684647105d766653feb0d7d3ea692daefc4f332f877696343436abd1ef8b0961241563b4a3015680a401a4f620bc6079cdae1f2e61b25c9f7a3e40b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532e7da16ccc586b3eac5ecde69b18844
SHA135c33d30d3d7912aaa50f904d38f8453a277bba5
SHA256e84ffc81e365924a896946206bbfb7d514355ca5274701c2a3fc655653b968f9
SHA5127734f0434b830161e267417281ab9d41107c0aeaadcfecaa57365ccbe2db84fb20297d72ed4aaa5ceed5fae724d64bbc9a1cf7ad4297f9d6dd10defbc6f0d1ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ae280883818097f964ed5634f6f2b3f
SHA17c6a1d11e8b7697d54ca7ed24d0804c5320768f1
SHA25685134f4537815f55f7c049bfee5d75079a5ffb41f2034622193a2195a48cd9a9
SHA5127479d5bcb013308477aa3cce5f996243e5529be98574c7b0cbfdee0d1f49fb7c5e060696839ec96efc93ec747201df4979b5868f2642c3f18974cc1a416e1093
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56db7f9d9a0a7858a700c4c00ab70637a
SHA125b00f4ba763eff9c77d66472b2fa9fbb4355725
SHA2560f387bfb5d212e05dffdf2bb5cb6f44a213bdc72e0dabdc2e8878b725b9b3a92
SHA5125f37d0c97169506ff09322cf9de73a7062794a81dc543bf382eb989591b09a4d45bfb7e0446dffe6920cba8a7c3701e4c729d30e3b60d1d258106022d59e6f7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce28658a150f5fad201aa719e340f6f1
SHA1183706de6a99a0bb9e6ec003bc1357f74ebcef26
SHA256954b018e3e5f910b29d7c64ee1c1f9437e32d60cc202c008da257dd665611e86
SHA5127c9816e705ea81f8b09f5a3b26edea93d1ccc26c5cce0998823de6051e8074e4431bf040001d7be16b498c255d9ef24a79bc648ed7291e05c257af563266cd78
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b