Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-10-2024 20:07
Static task
static1
Behavioral task
behavioral1
Sample
537d7ba3db00f350cd866180eecfb4c6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
537d7ba3db00f350cd866180eecfb4c6_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
537d7ba3db00f350cd866180eecfb4c6_JaffaCakes118.html
-
Size
33KB
-
MD5
537d7ba3db00f350cd866180eecfb4c6
-
SHA1
c74c1b861b5c578fe6b8a7e75c371d551012b9f9
-
SHA256
85f31550d69c101689a955fbade9760e8b78cf3dbfd9c6e7ccc9823d7e366e85
-
SHA512
890d39e0a2d14480db298ff406a323d842235e80c30353d128c473e8133af9d22ae3bfa9c06e79801be2a760ed9e168bde16d271e18e77115fb9c34e94cbd12a
-
SSDEEP
768:iqVkBQM5ZhgBkDBPEFhtxTFeFef1TFe8kBQM5ZhgBkDBPEFhtxTFefaNe3aEIe5q:iqmBF5ZOBUMrthue9ZeBBF5ZOBUMrth5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{68999E01-8CC3-11EF-9109-7694D31B45CA} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435357506" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d064af3ed020db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd30000000002000000000010660000000100002000000053ce8f36668615ea32cda2663fd20a972e74fa944b70f36b05236b8e0435e575000000000e80000000020000200000001849e9e8126a22fdb9561099874864747cce8e96ce09dfb5c1fe5652dad94dc120000000a40ddfdb3182b7dbf5f447f1c542e23d4e31c4b809f567bc346ab65c42cc34a2400000004cb6d11ace382fe5389e9a2dd539a61aa93c414ebc15277760ee029d8fbfbd8773629a136686f95f819ecc0afc7aed13e60c1914460eca8d1d5548ebbdde943f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2216 2420 iexplore.exe 30 PID 2420 wrote to memory of 2216 2420 iexplore.exe 30 PID 2420 wrote to memory of 2216 2420 iexplore.exe 30 PID 2420 wrote to memory of 2216 2420 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\537d7ba3db00f350cd866180eecfb4c6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590f77fd6b941856f57c241ad24ae8ddf
SHA17d255ef9caa932d673c05aa0c027d16ce26f10b2
SHA256aeff029f1bd739af40dcc3d67ecbe12a3577dae10e86f2c5be13e47745a2079c
SHA512c1a9cd57a0569272026b99007178d8e221e861025801ce4b65e671e57e5001e98d654a44e4d91585dcab802c3ed6f440027d3a5e7cdba2ceb56855357bc983c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a36e2d599c4b5ecc37ee33a64f7f88fb
SHA174d8526e5faf745d81093eb9e305a3b0b4e0361c
SHA256447e53c748dc8464cde54cd48a0679c21e44e002508e2e20d667e359f945554b
SHA512acdbec62ae6a6e0146c9f50caaf49f6cabb4cd4629beff2ff77351d272b68491c1a191c75991d0e488aae9067c28a9006ca82989dfdc2844e61c2ee1428ef70b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59eb5a8d7d30ad806a7607628d7301b15
SHA12914cea8b4154276c3b1a35f92d50509b2482c40
SHA25625944a93c56d23cee3b63b560af1abbd43ccd7fd915c22a53999db8ff09816e1
SHA512f2d92c4b0489e3734483737503857567be40e5ab81c2df75e09a62c74d069900091f66a053bad8197022588affd3a03733c2cedd3d7a4c2f6a98894abc3a35ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bab2cc049575a932701f7b5684fe559
SHA1dc2d1be0bb3db798eb4620b7f1854dc884138de1
SHA2564b0aa1300de17730c328da3c64e7b1e1c1167eb3517fac4ffeaaeb28c248d26c
SHA512b0c696ad5081c616d38a7e5c3beb1d68edfeacda3c4a8af19777fa6cbcad24f7d9362aaa92eb536077b359fbc99c033fcd3c9bbf6c1fe3637bb9a6cd86f352c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce67e7c47fbf65295578a52579631b48
SHA110631edf19693708ae837ed05344f25d938689f4
SHA256a019c5d52dcc1699c89e6d8de9af8f9443d00953f13b8b4c9fd3f805a3b6d958
SHA512d7243980149b46ff7fd2d4ec44b7132867d5b8e3b5b348c31a4aa399c27e7712d4e9679e4144de75d6b44a5a607af3dac5aafca4e645f1b091bcc4412e38b890
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515f0af40bb052ed3f194cf5a70353749
SHA1de7afdac0c8dcb50797fa8815674a8a898f95e79
SHA25677f1d041d4dfda83ecfffcf75ad87a6c11f2f303fb82f55779b802402f5063fd
SHA5124ea2892127b0767a8338996ee43749676a3b362329c72a0edf535a9c7c42ae188d8ae7e56e82d272e0e3e82d0d49638d8eb7cf02a5bbab8b69319c55b026b68b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573ea4bbee77e351bc223c191c10d510a
SHA155da144bb570337b086daafe47784cf7ad9ac3a8
SHA256665f3c37c936aa41a5940d875aab13efcd90f664c8eeff85ecab383c819cbc8e
SHA512de8c804a8b4e75b2a9a709466620ef0bf08d5d4009cae92404b13f706cfaadc445c9cd330de430e66800a25d94443fdf03d4c3adac76498a756073561962c522
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b7b586b3013036400fce1502ac05fa0
SHA101a852b1c108cce796be44ad455bbbaab195a8e5
SHA2564673390fad92ab7efb7d7dcd41a74492fe6afe3200d268179078458a0fece79a
SHA51263446b61adbe863b23880fcc6f1f9b73f4d4e32205c09f950a3366a728ad81e6cfc11b5cdb3eae8fd17e67e0a2f6d73ef349386674ccce9f63ffe67333379829
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518d5caf9846d46fd55c3798918adbc07
SHA1625c31d7ca1b53a479b64bc392bdb9fb50a29239
SHA256f0e7c1800631da09fe246d74187bf3346bd180b70d548aefe38db0fd9f0a5a10
SHA512e8e2c1e3836c47fe443ccb72cdc2af157bb1047035378a8b5c1bab661faa8695a9eb300204fc19164d491256e170e761f6cd8171b788cba36dfc2e85294fd16a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5715e7e039823c764da4569db124cc847
SHA1aa93c6a232466ca28fd32907b658f8737be047ef
SHA25688ba6f0f0339c55034f5bb87bb8ef435f79bc15fca5a0c98147dc6388b82d8c1
SHA512079f873af9fde6cb6e235c4fe8ed690f305a31cd4886575a1fe994b2c2ebebf225efa022d13a26a4c68db540c9901b355fec49958a6cec5180603f3c14abcdaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5004c8cbaee568f3e0964a08a7ff8b0
SHA135db9bcf45fd7c91ae7f86103ea41f233487eac3
SHA2564feadbf6151a75a020f4a94092ca925aeefb0dac2fde9437fc9e884279d9e2a1
SHA512ad69db038da1ce1ba7f06aa1b3ca63f12127b27deb6a13303daed1557e1dcab8bea9644afe794dde9427df3200a5284dfeb0ac68f40ad349949f8c2eca76a436
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5531842f8938d8b1fd10f69b794b353b7
SHA173fe80b03e857fea2329f984cb5a02661312d9c6
SHA256cb1c3d66e88492e9f5a3ead60c1e6d4d151e88b3102da91911ac28b4055b5d15
SHA51264f82da19cefe4c80236972c6800405f35891212b1cff7387c97c08f5a2f3151794ed9694a93d4a4538606e52c85488f928b47c37635e010b19e16ee0af19c9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8ca4c3356fa0e744119cd4d150f8280
SHA1aa42405232a74282dd96dd842a2269e12110b8a2
SHA2569874a9557b957051ff223c86ee2dcc657b252938ee6b7f76ecb03a223bd49b15
SHA512867cdbfe210d0468aead5e9b5d5b6760c5b1f089340ed6bb87e8e90a7d975d91d2cb841cd80c54990aa6ee6766418082e46434307b43f84ace8a514acd627485
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558e7b61f1ea27e83a5f0ad8554cfd988
SHA123dde985bcef46e2f6db0d02f5bbb1845fa8216f
SHA2564752ceaedaae5c5f5d58a565c9a09dd740dc403068f0e6abb5b66d941cbbb2d6
SHA512177d064e98dffc097b7e18e1fe1f57bb2028fb6f7e83fce9e64ca63d6e72a08fc2d994a0a280ba56227f5520e6578c3074870f685465a65a17e8150eb985a1e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d680b52a1fc8528a10cfc6d3b554b0e
SHA19272eca6e4912816ebc6bb84c716f4c6aaf1dd6d
SHA256e5cbca93fe5ea762b68c709806994bd402013b254abe287775bda0d1eb258993
SHA512070b064d0abdfc7f3378e3a177bab6f058ced8d18385cd68e6a537c88db1462261605ac6614613b42ec677fc424f0d2bd878525c5ee0ad6f6718cd40b725f654
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523418a0af968818278c382748009fa66
SHA15bb43c5a4c0abbb2f6a9537808c053897b1133bc
SHA256a28e2f80615599904e7735de86ae71c2378103df968e8d5994ae13da5e392ca1
SHA512cb46d162a02ca35a6352d73cda16f4eeb1df5073f597cd5929a9b3772793c38a29616456e395ff72bc6ab93fc889be460bd3e0dc57d886a5d2dea826dcd4d295
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8945473a11c14ba987a40ccf5a7484b
SHA14e7739a4c71e8bd3fd6ebb23c87c6ffc5b6b7621
SHA256ec9cc9cb1f55935149796ece1aecfabeafab682f013f0c092a4768c869386968
SHA512b52f3faa984f386ed69f0a7330558604c966a6d7e074caed32fc2ce06a50268ca2c43e53ba488aed22a2c22ccaff57f4b6f64c99decf9821d59114175ea370cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5def2f4a03e80bcbf33352328403de86b
SHA120c450fb51ffd821f3c80f8ca535b086e11a5d6e
SHA256fb2b1e1de8a0baf72e978f7c32bb6556cbb13d8d97ed7eb824bd4146632716ad
SHA512985b37797489601e182c35ab97dc6f7b86cbe228641332469ce6e67fb654227718e44232f5c8be50e0aca52ed9f13548dde2fe010426eb4b491a599e7caac0ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a46aa173557337ac5fee26a19e4bdd7a
SHA18ec1084f263aeb2dd684d14a4f67f8555b1c8a22
SHA25614bfcb5bc57da35fcd0761c0d22395570c63a130dbe32eb5f5b6b64e24544f30
SHA5126b2e80029bc7214b885c9c2a8731129c18013f0fa6e58406ab20e22e353684d4b7c8f2636f684eb90bfee7eb7691799a170683e16872245a012e27f4a4021dad
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b