Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 20:52
Static task
static1
Behavioral task
behavioral1
Sample
53ae22392bcbc996dc09a135cb99f22e_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
53ae22392bcbc996dc09a135cb99f22e_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
53ae22392bcbc996dc09a135cb99f22e_JaffaCakes118.html
-
Size
130KB
-
MD5
53ae22392bcbc996dc09a135cb99f22e
-
SHA1
0ddec5b9352eb147a2ded332f6329bbb019e1dcb
-
SHA256
636ffe441bb943c5fa08dcd80d9cc46dc3b01a1c77216e3d78b1260620a78931
-
SHA512
87791f39bc4a05523c446ff26b5db49069697dee8a6d621fee677337e41485381273941e4fa40d7816d76accc54139ef637b7351d7dedd65a26f6ebc2f50bf74
-
SSDEEP
1536:noyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCsQy:noyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C4630EA1-8CC9-11EF-838C-C20DC8CB8E9E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435360236" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fe17f20721d41847a520aa8c2a3f64320000000002000000000010660000000100002000000028d775b66c83b634af6fd09fbf1841ee009d9a6b086ad613dd70cce1c2131d6c000000000e8000000002000020000000298cb2faca59f085f71d91433d407d5786254753159893c85667ec0cdab9f93d20000000714ff890693bb4d08239b1e196e7d3e61b764ee2cb3574a595e7b45a7de33bd8400000006a38a1e82d022bf7633a1d58200119fbadf2e83cf6af587d6488d2cd65d7167fee328495d25373fae1e41a6ca41de3f5ff932b59aaccc0b4ba9a62c539be4a88 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 303aec98d620db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1652 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1652 iexplore.exe 1652 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1652 wrote to memory of 2560 1652 iexplore.exe 30 PID 1652 wrote to memory of 2560 1652 iexplore.exe 30 PID 1652 wrote to memory of 2560 1652 iexplore.exe 30 PID 1652 wrote to memory of 2560 1652 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\53ae22392bcbc996dc09a135cb99f22e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1652 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c5961bdc44a4f9d4a55945a9c4a8385
SHA14e231b6d6772e3ad3c0d1dd87870a4554767abdf
SHA25672abe97d5cc624b5ab8012015f170b24a5344c3f78771ac3abf7e4312a1c10f8
SHA512884c6b65fe7f1e13dbdb4148a7c440e3c3622742612ad573442a9cd883c9e21dd4e12e9150cf69c6ed0e2e98bb54fe39f9ae35c4bf2ef775269f19f2bc7474dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504eafd4d195590e6be13035fa82a6fb4
SHA16bb8be503b659e5c34aa972f3d1ce51831d21634
SHA2564c08d8519c97526fa5d4425745c7815a3be43013abcbba54fe820907a931a1c9
SHA512a439831572fc6cb1f54fb61b671ed7be8b359fb89e25c04ac9758a92bf2c6e6a5559eeeea0a2e6b0f28c849587d868a327fff2543f25bc9ecfa519549d8c1f6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50edff33a175f94d58866916e9732c595
SHA1dec0e295b4a93a1957c53434070ec4ab102cf98b
SHA256b7e17d236f51310b4f3ee2c708b14cbc3c17c5e894faf82f684ba07f5967130d
SHA51233d198c2c06b3ebe770e55f920002a117e77a2960babaab35193db5b29419da3e2f70d9922e369946845c33bbd9ab5fad7b23b265b2b46a9e21508b1d3aa8c6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52eb5e9415f57b46e814e53011aee33d1
SHA13ac2919bdce5a074c4f15d433105c7f182ceb7ad
SHA2561f1cf2522ec0a86b1c71cfc8e55744ab954d63a982039af46ba0abb605df1ef9
SHA512eefc6b8df9bab6965c0f6fc565f75ab045174d60ca349417f58da0d0f966328dd5b0712730ac4ed8056ce9a077bb51fabcd40081d333694bf933454bd4cd1d66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59103770f21408cd4479b1da0a1ca0714
SHA14c4e0d143446aa78b30b1d6fc86bf6c2831e8858
SHA2568e2cf605a1884d7353fae25a1a3b390b9e2912814d22a0c38d29548fa2433e96
SHA512112937eead225560ea58cbee8ebd0886702d1e9c729c5f2079c007743ba4fd5a2dc2fe14416f7df44f65e7184319876abec054a769354a20fe0e528732aceb6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4046caa96ca74923a974d6b91222dc6
SHA131a33db009efb43ea9ba240e2ba46eb92ce49d2b
SHA256903e09c6706c1fcb2849deff48437a124acc9ece42aa3702f08166b90e06dd1c
SHA512b59be54fc4cba2cf4f1d05a38670e5040462290fd49ca0ad051ca4f34879cfa7a8ffa8757bef84427b78c48aeafe6f4068346509763c6ba6b8e14cc4f1081108
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fcbbe5a0ebbb675153e2343350f1155
SHA1a2b61d1177bb9c897f9e49b857d84b0f5a368d9b
SHA2562a1800867b8f3d2ea78748f84c003796b4b0fe2f5fe3a8d21a398275a0d9c494
SHA5128bf3035c252c52d3234cc7407c966d802cdbba2f9baac4c1a7ffd19d11982405fb921b8e4ab46348d2045be3887917cc610e1444fe70fc8130f1b2846444f244
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dd5f743faee5056b80e911d4042419a
SHA114b307601729d8b5a2176b8aca95e809278799b8
SHA2564b1b6c64b4d0eaca87a673f201765e318d81a71a7dbfbe07c5468da43d792835
SHA512989d037306dad1b27262a8ac083f43da772cbad2c66f13de0be8d37b539d3e5a4a3e4d1e8b1bf1878c98e5471a225a263138b409e5e3e238672a69945c450f07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e89444bf82f364dc95d6a4242f02077b
SHA192edb21b90a54e25d78c489cd81d5749915713ae
SHA256c90ea2bb0a9cdfe0541e16cb0d010c12fe49352b34a89eec3fa6d9e5a2c8e2d4
SHA512f73bd5c40818514466e8e146f86c12ed5e7e9ff3e364e5f044cac94fd79f6beeafa19e3c977b4a65f97acc51ccf2c8a6a06447fb73c2499df482d7dd7c08589d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a71e40fbd67662bdcdc50ddb43b6d116
SHA1b10d498cbf535ad415b25d0cd544ccd253fb73a0
SHA25667cb9b7e9d47eb89e3c63bffbb86e17cca716e8d9d63f037f743a78bd76415b8
SHA512d043cf2b4236502b13d7685554352f99f1343255c198adcaf5ad0aaa467dbcde6e58c090672a552a6daf16b275de1e44b4368ab9ebd27015bbe9b286966ad438
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bfcb0d65fd01706a9ab0c950f48e8d2
SHA17ba949fa5e2cbd88130e5a261c1703fc84a1d2e0
SHA256e24ef67555edcb3346e1c74b0ea14fbeccfd27b67b59f7e1fc0bb79de893458b
SHA512c44f7b0aecfcb23954755a854a6148cc10276037684b10babbb96c5086b24d3073c73b85ef6215df09d7d25acd29e5b3444976439cd2d838e76780da562d890a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51003fbafc491fd99109d73e30b8cb823
SHA1d91c6c21fb33caa162f7cbb960ede955c0248d22
SHA256c3cabb61afc8dc7f85ba2f8199aca1d94e5476ee5008f027534ccb4f4353c3c4
SHA512a23f76225d3878d8d70239498c5d332eb6be5ccce7c8dcd457e87b18dda047d4235d324836f933d3c841465500dbdb990227300404509b2cabdba3e1b3d9ea75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5252c0f7b76412b58ce6932d9948f6aee
SHA1f309f7eec0799ee01c3f05e13746090fc2fb4010
SHA256481a9edea513e84609bdf89736d0f63483ea74bc555da83e128f1c0e1f6fdbec
SHA512c913a30bd4f4ebc0add90b9adc0bb20d90d415a4bafeb515bdc01e1ddaf707a06ed612df8a67c312b59c16849c0cd5630843c4892f6dddc27921022570f94b32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc37cef123eca921d1d247af0801aaba
SHA1a4dbdbecd6b316c0a4fc00c9c1a47d0411e5d688
SHA2561d29855c75fea96b6d06a001280add4d4ecb9905dd0e893b8f9305bb83a07e55
SHA5122af5074f3a10e61fa7f408a5eb79a6121fea4df40d5cf0b3b9aea493cd0777fb54809fd4e8f720e3ac467ebde0c5ff762379732ece5f2561aedbee99e9b14f66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5795f3a7d9bb60ee6d814ca70e341357b
SHA10367221c514a0e95ded94762b28a77c87a491a92
SHA256bc981f279e0f1c99c66e69299e5d449450d2084e19faa6c4f4190931f5dbfece
SHA5123de3c1ce32e52e354a045df1cc24c24d6872095e84ab4c9a29c7cc2d50e782a0756fe974864ca7874ce45f39f049d6cb041b690fcdc589b2eb21d0a9a43426c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb1ff67a68e06a99aafb315e1c938643
SHA17bcc074e519fe2629ccdf3a7e9aa335644eeed56
SHA2564f48405d73df876afb7aa793a46c25a59587279c2e5e8843f99078794b47b3a1
SHA512c98480c50271701ab76f0270cc20d9dbfab91885faf39243a082270f2b334f9ad03c49292ee52736ffab28ad07e2b9bfff4e6e2bad848a8261792443993ff795
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b