Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-10-2024 00:27
Static task
static1
Behavioral task
behavioral1
Sample
54765c0e1731d8e9d7b32db1a998fd01_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
54765c0e1731d8e9d7b32db1a998fd01_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
54765c0e1731d8e9d7b32db1a998fd01_JaffaCakes118.html
-
Size
6KB
-
MD5
54765c0e1731d8e9d7b32db1a998fd01
-
SHA1
690046d244b77ab2611f318513c3b5b3f8c4b585
-
SHA256
a172b6bd8b80a2421e8c8cea2096268d1f5a661aefb68546e41b333200ec337a
-
SHA512
dc2005c59bbdfc37cdac69a91f9f500f24612da99afa3aa30945e699a6f075cad579327447bddd0cf7a594f592c01c1a1f33b89a16f801d1bca1995599a25351
-
SSDEEP
96:uzVs+ux73FLLY1k9o84d12ef7CSTUYZcEZ7ru7f:csz73FAYS/Xb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C0DCC2D1-8CE7-11EF-B1BD-EAF82BEC9AF0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435373115" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0886697f420db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000404a94ec0bd3cddf0acf8b6ff2ac073186078eaba6eeb6d4ceaa00aad07a14b7000000000e80000000020000200000003bfdd6852db3292d2ba935cfcb8f3674c9c510c666245b7506b3b56f071f083220000000d2f2096b613710d4b9505018e992bf6edaae48795ee7960a18840679bc4f6c5540000000280c96610381becca4bea84ae087e6a1f3860764168d6233fa4b1e498d5ead71fbdee169af6e27c5dda6078bed8367cb08f408bf7c916155a74c0ba75abf69a0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2060 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2060 iexplore.exe 2060 iexplore.exe 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2500 2060 iexplore.exe 30 PID 2060 wrote to memory of 2500 2060 iexplore.exe 30 PID 2060 wrote to memory of 2500 2060 iexplore.exe 30 PID 2060 wrote to memory of 2500 2060 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\54765c0e1731d8e9d7b32db1a998fd01_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2060 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b42c6338269965af3004c796e364328
SHA1dffe6bb8cbe12b3cc6f6a1b1eca33137173f0276
SHA25602e2da8d45bd6f7c100e26b95f08b5bbb18972f159cc3596e67129d4cb561df1
SHA512ec48d6b9bdf5c2b9930bd1f8b2b4272f1311b467d99c19000e3595d349debe8c891b085fc48fa805230c19f137d44b896495f000b98d7a2e4566f03ed54569fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3a8e79df1a33ef7ebcc77a3b46b9e01
SHA1d03bd51583a38913678cbbd1030ee9a29ac15793
SHA256677b61038758430fdcf08052539614a5b4f137f127616147fee9c5c3441fce87
SHA512a16cdacb64d7da01e78cc463a08e55ef051db8270a6d1b161fb8872a1d528dc5b6f0604ef9cf2d4080cdc13ba74a2db638efb5da5f50e820b78a4d4ca88d0d47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ae971d3e372fd8d8c1f618ea2c89cca
SHA16428fd4484c2773ce3c55a56502b5ee76caa1212
SHA2569d4db93b2a057c0997d01a5365581bfb3876dfa34cf327ce25ceec8ba316f6de
SHA51267ea9ef71df4923a21d4b39244c24a09c9628d8302180e400a574e1396658a10d3f02eb80d4326a0fda7eaa3dba5420d1e51803a66b54c91658181ee6f8b29b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5e52e1305dcf1188293c10f8dc0c3c7
SHA18fae14994f6a9f0b2451346ed59af178b906a67e
SHA25640391b85943042a04154cb008c187d44be7b64a72825954409f05cf943e4824c
SHA512097888ae7424aaeea712cd470a7a076373d1dc36b137ad4eb62287eac66f88c00e871d0f875f6594b42c4c1ad321f950245e4832c7c87f21a2f351c587540d9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5489f93969aeee1b4814182a05d0162ad
SHA1a4c92985bf18c3f0099c3822b56e8f0739641d42
SHA25699ae699ec6a02f43049d645fafc48a27a40c2b8034bf4defb86cf2a915487608
SHA512c68ed37a7f5400aafc6e20b044af9971ad0739fa409964d64ac3139797be585c08341ea2c1de13aacb24b95e3cc85275d8740e94701a60382214e8d89ec54e7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ab62fe6683e44874696c6d8d51bc4cd
SHA1f3015818214d6774686c060ccfce28113c2e51f4
SHA25665e9a2077bf606eff107f3f3236e54040eeabdcce087239f07b780c8a969dd20
SHA512c409eae10c2ae2131f46af0fa7f78e1d9e2bb08caa16482dd75eb7e373e8a16802d005ffd0cfa05edc5d14a341ab4faf0fb166627c1ae64d25a0646c569c2478
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b77af978a696296f1bc977783ac916f
SHA1d54865fb4b073dae143577a50427a1a0fe0f2479
SHA25649550ef2fb20753248c8f65ff326d4b1a74e599e2ab6de4519fb68fe044089ae
SHA51254537a347eec29e780d38963b4957aea010c151d83babb3785622e515ebfc690b0ded10dfa53fc502351adb314a5bc7ad1b00e0c98cb46e9c1c85425e560096c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efa9cfd36e5634f35a482f9d15e7531e
SHA1e9e06a4c10ff6a0ff46ee37ee0fe1c712c8392b3
SHA256495241e20f5c757eac53b2dba8c8f767081a1b6e1d650563bf55b968ee969c20
SHA5125fb01bac83c734635544458dca0e6fe2f14ec7b0234667edb64f17b200a852d5b0c74e6b8b5f0ff6707de25161471d419656df9d53db5f486d65ce752de16758
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541646b97a3aec5d66200c43ca1869421
SHA16a5a9c609a5f3cdc0946bdafa25feada1801e801
SHA256c2591d5e468454e66946a9b6127e4eeda732eb89b9b1b58639a4c2e3f99b2771
SHA512f3bfa592fb0a0b6e29ce387b170a7fdc705365bf6254addbb93f151ef6a1782d785ae418e6db699f8759b49beef085f6bf62a1aeaa6b0b3beb19e8bf88767e92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a955489940bf62e065098b030eab57c8
SHA179f3bfcf7eb426f4347eafa52c7af8731fdec725
SHA256ee40ffbec2b8ce1966e79641102b8bf41d88a5434c62029351c933b9f6fb200a
SHA512b27eabd8557bcef5d17eb04ff54d0fc059e1bbf2850e4cb643187f2952bef349660f3ff8c452354a4c44ad0f8601688990463259bf388f065934825c6ab3d6e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568abcb04b9c2aa9ba61060231ed890b2
SHA1d9424ab10e12bbf1431daad3cc41d2860965fb60
SHA25690be98b5ba6cc3384763e35019e7c3ec20a1b7b1866cbac8f8365ceb08d47a16
SHA5125c3671b3415a4b0b1a5a57d82a2e9fba40ce5459fde56f58047b5bffa332309a89fc3038519d0f0ee6af48049ac026b6c3ed1f904d95d8a922cc5ac50cf9a62c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575d7eb21ca41bf7f1e8d515d2a0943f3
SHA1bc4eea850ac6a54bb5498fe100bf1f83e2b08150
SHA25601d4ad0f89d77bf33eb0d75b98dfa4f616749429cbbb11eb01b4d9c156a0e27a
SHA51297d9db1e72e842953cf4745ae330eccb53be766ada5a56d5e50cd5fa15cb5a620b8eecdb6b4c9b1ef1dbb9fd77545e4637c28416eec556f2bb037d655015725e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ce382654362b5428ccbcac99629bbb0
SHA1624bdb843c6f24ba53e96f66ae60245405338499
SHA256397b37b3f3021b49b2604db6646f408da9e1450640a4ba3b73a55d22514d1122
SHA5121cc016f10cb083b607bf7e877fe4195e9e9de14675bde47619608f5a89260796ddfb0f654cfed86c8515922343d52d123669e86535649ab9c31e85d3893dd8d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515bd5608a582993fa5a5fab1708fd73b
SHA1c27149b87da3285e6a04eb51879dbe6e69342a2c
SHA256ca0d73fc1cd71e092cb6b0b5306b86a15f991bcfc3c1f355bb0cb5cead934e63
SHA512c2e11bfcebf35dc8da6455564f9ad5893d1f2841d500a24503b24f0849f7d27f4c0a824ec044f329981b94de48575c1b00680b865c67c3d26c837d3a5ed79405
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577f2d869c27547a757c3bb9dbca99982
SHA1d3e6a0e88c3b12bbf094210ad3184913715c1ee0
SHA25673fa96ccf8bcf827863fd5b79df7ee8f452c4a08fa6ac66aa0748cd2464a34ae
SHA5128ad8af19da70de29e237f05fdf74614254a37374d3dd146b27e98d68b45785f64dad0f86bd5051771655bc099241cb3672e97f96ff1ce7394d4155d9b6c37b7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5882d75a981290649da321fc9bcdfd8cf
SHA1bd20d8e5a2196219403acc608ae86917b0efa5c2
SHA2566d9ffda218d6f184e68457c494c6ab48bd62e1f377285beb647753111dfdcb9c
SHA5123f1ec4a78891d6493f925cf2b02d22064e7ddc321464494878fedb7ff4e10e370ed0868dde715e5546e65196e18cbaf8c658b9b458449d988da5bb30e87ba206
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54732017acf79f32bc779fe26c6aeeb08
SHA12eb9331596631ef40b1f73b8d11b8db16f0afb01
SHA256d1fddf48c8a74f867d1c838ddb5fd12708999e176bc4c033f6ba0c884efc85eb
SHA512517163d049ef3e366da553a5081a7b2bd70dd60a2dc404925a64ae75cd9528fcf6f2b9166e07e7fa75b4283a46c9498e8de5a2e61ac38f99ed939c7c3a26f6a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8a3c3e820dfac82095a3cd14a4b937f
SHA159057e486146cd2a9a3d81d9ab1bbf65f4e21842
SHA25663c13c11de3b7502f4f1ad6ab97a479b80163a60c922d45c47424c2cdb47bd44
SHA51295d50f3f35d4225d61e7c790b962dbd91836b7dbe843a1e22db0c2aad5bbdc40f3446050ea1d13c8d13112a75bd367a5f00ef45c003ae94cde3916d24a49c7e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5851f5ebc3161213be1a0a6d031e6a707
SHA1aa0982207ffe038794125e5ec41584bf38eddb39
SHA2564d9819d4a82b922618af5048f3db32c6f4f0e73dfcb285fb332b61ea2dbc50db
SHA51231a4ccc1ef0df0d8ddf24bee3a868600e57d429f985b1e2ba0e02ed6d92ca2a1fd65e4ea4fdaddb8da264bfb4c1db41b5c64b9f141f31e9457864e0f828f6cc0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b