Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 19:21
Static task
static1
Behavioral task
behavioral1
Sample
534b720e5340e35ba4df8b10301f5963_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
534b720e5340e35ba4df8b10301f5963_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
534b720e5340e35ba4df8b10301f5963_JaffaCakes118.html
-
Size
15KB
-
MD5
534b720e5340e35ba4df8b10301f5963
-
SHA1
cc694616b942cdce652285754a1c6383ba97ba5a
-
SHA256
8128f253bafda8132ebc3ba1e8d7a6bca6ae3f190da4bc979ecb8243ac2ee2fb
-
SHA512
b9274b171340008e9c445ac76903dd3b3c7266378726d18ca5b27279980c80838ebc2d49368f04fbbdb60b1d764c823049358992846dfeb0256089ca9f714d7b
-
SSDEEP
384:DDvH91eRQAqXiwI/xjlPnAUS3mEm0FV80Cwq+o9kk8Gvu:DDvWQAqiwqxjFnlrGVSkk8GG
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b44f0a4d5ec3584f93db1ec99f656bc30000000002000000000010660000000100002000000087c29f001e18fd8ddd2a62d87602b7cbcc3445fcba1a4f9e5897ac54b82d6377000000000e800000000200002000000055e70e277cd18205becced84e89072c34b0c08e93dff3ec33076f0f7fd2180b420000000c1fc1f24a69b939d67cd88e09796560fca475388698008fe395870ba8426134140000000d0d1e0d63c1229fca0fab4ff8757e1efeb2d1ebdf24bfdc611f33936277a74a9c3063109cbab411ddad67cda6925e3f33849b697dac830d3752f1f78d5f7d59b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435354756" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0b351d8c920db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{020A9411-8CBD-11EF-B8BF-428107983482} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2980 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2980 iexplore.exe 2980 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2560 2980 iexplore.exe 30 PID 2980 wrote to memory of 2560 2980 iexplore.exe 30 PID 2980 wrote to memory of 2560 2980 iexplore.exe 30 PID 2980 wrote to memory of 2560 2980 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\534b720e5340e35ba4df8b10301f5963_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537aced2287dff849ad354225ddd4411e
SHA193f620dfcf30680c7369686e68a619affb42bab0
SHA25643aec0a8be7b7c609f15f914d4fb083a8bf0d2396583905c8ca6483d54b699f5
SHA5129742205252fa40ca5c2cb7962acef3605a0732a16b9b220b5ad5e81debe47a294ea0fb796023b24e44435514ea893dc09420c01d4cdea9c645e9d3d4e1a43594
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5777c49146857e4ccc99f41386f37ab6a
SHA12c14044b0924abcb43d9fdbb2228cf7ac7ccf61a
SHA256eb1c4bec7a1a023308eae499cef7ebc5b95cec7a973b53fe85b6634a28b3c26f
SHA512c0d9308b894f8dc49df402dd1e7643e498be041a45caa89fc6f2cd7c0182790df594a28625624b96ec26c206bfb5d348332b431bbee00e7e060df211c59ecc77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ad73b451ccefb6d0d58e56c38d8dd0f
SHA105e4acd4a657fbe0e13e97e06ab694cf69109629
SHA256ea5e696a77bf95cca6f86e9c598b430d3293704aa24c7dcbcef3b48e8f859458
SHA512225e2cb0c32824115f51a01ee6a61d277f3c4f7aaa11a2e70954ef47bbb6f44aa28d200e9e439bf210b272c19c6e605048b8c7870a7b6896953a54fc1d3ed325
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51454d0c77a9dc355c572ea1618f119e2
SHA1b565c7ac12d0d383d925d44032dd657546bb0c22
SHA256bbb0f0870c389f230722c5247c7df5dec6a98ccf2727c2792b3db2162361942f
SHA51236b6b3be944456bc05227b613a4722ff482d38c38b8b0624c99b5b005a9e86759e8afe2e4cf95fc793f625749131b7941eb0f7ab50737c6b01aad1b534cd1eaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa97a9f337d1d65e5b5fd8a45e1d8e0f
SHA1efcbead5839a4fe34e69647bff82e8160473b598
SHA256f4e4c1f9ec02cc10992cef2c850701645708c5fcea34c36331cd44ed1e996768
SHA51202bade61fb20dba61778ecd970dd1316ec9926c36b3d5d4e03bbf91a968d2ded200eaa93bcacd3e378b28d85a200205a2fa24b1eb9051334ee63a596bc6ae9c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fac83a8a033fc35ebadfe376ee1be147
SHA1d06372932e0358d73b0eeaade60ab05c7d30a23b
SHA256fe13d83d6b50848fd49dbdf7e4b0c15b932005e42a8b6fc5bb0d02c193e243b5
SHA512c2b7ee7148ee63af5b8a77cd5dada3b0cad2af33f098bc7ad8feff847a3fc2a9f580f9e1c9a60fd7efb6aa264839cba8fc5b71b0cb358db706fff9cda6a2a133
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599a2fb0fff4d1460c8a5aa8685c46907
SHA1fd38171c7ee348b93422824d91e3f19be5febdd7
SHA256a78a1bf96e255472306568286d302167b83e2a870fefc987aae7efb9a02c6e44
SHA512d069e1a979a9b38d60f3f854361762c4dce10a3d187cb1a97169ab891bb3ea2ddb81aaff7c316b5b17d6f54755b62052494b4637cdfa3f943388e8e9792dd3e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573b86aebee8cfaad6c51131fc4b5739d
SHA19924bfdffdbedbd5d75740502751dd08c933cdf9
SHA2566f7ee1c81da072df709be90f10823e98d9f6fa0c74cadc882e97745b5cf1e4b7
SHA512f410b75f90ad1b9b25ad94db9288f5e75ad9685d8f2e3d0551820eee3a7722f1dd61b34a95592813a4508ea8c31627f28a10704e541acad5d149ccba1e69e1f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e46800057eb5292a6c18482024ff697
SHA17ce323ec7c10b6186f05bfdb148c0a34f85843a8
SHA256cd015c33c4d6b7c5870675139c265731f566f181612ea03ed7fa62525bdf2ff9
SHA512c372cebf6a26e9b99261795bd3982a96e47f11547760cc5115395fd606418d4d44e9b23d31a6438d12f9b5c3f2cd5c72c9845192ef8d9096de2224840bed9f5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56063e97fb67018e75417932007758754
SHA12d7d25d6a322adbc22d015fb49ec08b717204993
SHA25659eccc063dbb4c969bcfbeaaef5624f0e192a2466767e1ef89dd0649de976eba
SHA51276d6a090954049c32dfab674fd23266edace7e3a3b6700c1d2a08a7453ac970b27790209adae255670dd6af448f4eab54fddccc4830eb5967210915a51760f8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5853ea851b4cb098b6dd8f5119709f67d
SHA14d83cfb830863de2eb6c9943bba55c8d1eb126d6
SHA25665263cf878824dfdee88b66ef01eaa843b6728b742abffe6a068162356b04df4
SHA512792df01c79c612d52915864c8e7d4d5e4421bf95e6e6b7c1323c5debd8c8b191678f2708e8a6a9bdf79fc8f0b3110ff778ea6a2efcfc2afd3e863b76f52c9ccb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1262502aa52af8655e8b68cf51198fc
SHA1591f301fa141cf9d54ed72fc01d944cfdadf62de
SHA2560edf2ad369daa0239db0f989809a49927aa278ab39b6d1348b395a6e8b3a9fc5
SHA512191eed76f04b4650d1b7bd4a2d97467c20229f97d312e85931a88e8a3fe8cb577577a1d89279c92b345614270ad38ff7a2a8bcf5ee56cfe4f1be51edbd2fed64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6ebf668989f8f79781949e5e6dad55c
SHA17bcdbcfe1db342ed359a993338dc603490dd965b
SHA256897b2977622125e96399916d26fcfdc409bc488c8176141f4b6f0e9b79976d8d
SHA512b1619211975ba912477e5de4f5c4dc3bf16cc0492b712d60057e983766eda536d5db941ca5abef5aab162f27de2c8f7f60e3949244443316aa3b17bd6af3b763
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ea8a0a553d24ecef688d071ee1f0a5d
SHA106d5a450570714ad442cf9f875e40868a1254694
SHA2567a1ec3c391a777fd96f29d28f9e87df01cdd78fcc6fdad40e51de823be40c51c
SHA51206a787725acdcf8a2e9d1a391f848494ad2b50bd4e28d033b0d2b03eb9c43ffcfa77f89b072c1dd9d89a52e3f7606e94200fc3ba59e70147f76c008ea06917c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffabe8614f54fa3380f69859f1050a4b
SHA10f1b4e72d543cf7a8acd7239840e7953a29ac5cf
SHA2567939e782424284cc81c7e5936c4bcb09a4b35067cc307a0d9acee633ab162b59
SHA5124c24ff81474509d04bb659284e4d97a0536bef09d1641c4fd28ee2a6db7e806567e6543ff86237a088a08c84beb37882b6e5427ec1b2f82f3eca1d44dee74e83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54907f6ffe937c725cbe3cca582afd74f
SHA15883a5e7988d208193a68115cbd3af5313b2fa8b
SHA256f1d7d5c584a94b26e8331cb0dbb7201f425ea0787f9962e69e1f3a07db60381f
SHA5122eaa4057fd946613630da1616bf2326bcfb3cfd5b138d41581c6ed77488f4ab0099215cb1b0bcb57ae1b7f3cea4f1a5b5f750c28d3e714772a36bad9833a6491
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5420564f44f58ea068c249fd80fc71f3e
SHA1f9a2ae6404048053a93979a889e2248475136575
SHA256fc58e4694b058aa4c363a0c961f99bef3f9668c10a44703686edc9d567e46109
SHA51236fb85eaf883e1c5ad25c66dc054883c4b92c0cff783ff35df0f1787af530db0f3cefd21c0883933852fb1c4cc8922354f197d6130d1819db3a2a6ba26da8cae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d1e49242a33d8e539b64182850419e1
SHA1c92cc3c8aef9d7bd2f3ef6e60d8e85697a6f842d
SHA25694598da62693c45a2d92e864ab9df3cd497c005300f2d32fb331153ccc742916
SHA512133c326072b2a04239ce6cf223367de5560d2765cdc0bbde46f66853fe3cbdccc046d55685e83e5fa77c0b54a646142cc10f936eec97fc2c81b792b169d2f76a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5530ed28c93ac2425d867803cbddf04d6
SHA132ac859d051c0e88e539679a813258eb8403213a
SHA2563fb2fb4e8734b2371427f1258469fe83abc53856264b13361090f2c37f5ca8d3
SHA51203a038369703ef6ec897e10f9c2284b300a5408baaf62ba67ff38f509e43a6ffe589526ebb1158c366b0cc121594f6b1670942fa5f43273040bb19b46355e0df
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b