Analysis
-
max time kernel
138s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-10-2024 01:24
Static task
static1
Behavioral task
behavioral1
Sample
54b59f97acd0bc57e070641d84b36969_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
54b59f97acd0bc57e070641d84b36969_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
54b59f97acd0bc57e070641d84b36969_JaffaCakes118.html
-
Size
214KB
-
MD5
54b59f97acd0bc57e070641d84b36969
-
SHA1
ccd22dd17b3604d136de3ff6d43dc20e195f17a1
-
SHA256
4677f49c99a4870d9efd9446a1661ed83f90e5c8eeb018aa4c3b02c053a2cbca
-
SHA512
589e8fd1274cd514138c2e40993250d833ba562e660832633077c2621d853926b16d7693017cce4d3caa806dcd6b2121cce465fe591aa73155a464573bb3ac75
-
SSDEEP
3072:WrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJK:Oz9VxLY7iAVLTBQJlK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435376535" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B759D1A1-8CEF-11EF-B12A-E61828AB23DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f5420000000002000000000010660000000100002000000011b8e8b66ce1d7a8fb10dbc49d5ea8ba4f8036fb2fa1d8e5ba181c785c2d3e95000000000e8000000002000020000000530327aca40d2525cb66fadf2903043b8a3993e03e9c7c79f1690054c465de8c20000000240094bff7582325293f745af0a64bd51efdb2fd05a1fbfc06ddd3dbfb92241540000000851e49ea89f931b8db8f4f7b2d82ddb028a1241e05ea40a145385c03f3f950d793c217b87b053d124e778a452619871c3b8b52fe194098a80ba93f505d370c3d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60742dccfc20db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2692 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2692 iexplore.exe 2692 iexplore.exe 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2144 2692 iexplore.exe 30 PID 2692 wrote to memory of 2144 2692 iexplore.exe 30 PID 2692 wrote to memory of 2144 2692 iexplore.exe 30 PID 2692 wrote to memory of 2144 2692 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\54b59f97acd0bc57e070641d84b36969_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2692 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5111f10ad89ddefb3735e1363914875fb
SHA12afccea21cd9ed7bd897e239b30cfbf372e1c90f
SHA256ba67bbba46989a0d2032c0187a098f43c4709b950dc74205f2e94cdbf66bd1b4
SHA51269525a31c9e15345abbe79ddff682b98a36f9c2fbe303a1026ae839e72eb48d9d9f5ccfba94dba4b7b47b9ebd74b2a8e7aaad622b94b1291f5b231674d0fe64f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5b479b508722ae3ef12421ca7200898
SHA130274d2eaa40e8b85edef41d9009d526a513cc14
SHA2562268fb6da234d9e5e0efe97430ab97136f8a1e96ea144c6704dd3287ff1ca0a3
SHA5120006c9b41f2a1ee5e733ce3266d79f46bca2e77f0c0a0896b6954dca32ce2ee6a49808a99dee980d2521a45b0b7b71dd1c3fa94c66b6eaa6efdd00b3df62173f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dad272f4bbf9ab6f80970957267e7d4f
SHA1d4f57a51a876d64d4a1a7f8ae9761cba52cc11ac
SHA256d77ab9e9f5c39e97391861a3209739e9a3e5dc749dc510b3c883eb5d635be15a
SHA512c48d40bdef5e923b93b4aad8b4d1d61b526b426be0d37ff1c57a5f1f703ce26c9109f66548224a463331d9385fd4b5d8402546599f9f902178312aca123ee330
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9c2065e06738ac9d445033143736954
SHA15f506342941991384eefdcbf7a97390d6dbc8884
SHA256ae54c20fcd89a6835bbefb6e37257efa0ba78e0ac6b98dc588c8ecb2a285f953
SHA512eab0fcee7d176ca3bb50b909a3d2ba3c4ac0914358e37fbead830f8977d29c7ffaec881649396a62f95a8946681003e4b6665c4ab0205b18fdc3c3a908659043
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5651d9f70c8890c7002f2a54d3e1f610d
SHA10abfa6406ad326326024f2ffe89a56e08a3b70a9
SHA256f52887947097ecc1e0d52d36f0091882799d997c3c5fefaa18c39ec0aa9ca961
SHA5129542d1b4161a50236f170e55fc96e4cfc21e3c363d5799123d84097d8633bbf71ad002825853931577201054042ba97dbe12bdbf113313a21036a17a646e7f26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3943035f9a73ca6cc7ef561d551e16a
SHA1bfaa232ec8a630dcca427df1af67fd5a3abf5689
SHA2567048cebe0d1840b6975d014f171a4f51495c878ac857fe9ecb035ef8857a03b4
SHA512ecef4845c3544a31fb9bf24b4a2256ec16c8cae5b82f63d217b44352bfbcabd6684f703017f7b7846391fcd90982558c574c8823b236f81f1bfc6d197c243823
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5999a6f74d0edd495dd50def3a4ea0595
SHA1a9db9680f8340b256872f470836d9c0300113299
SHA25635d7d22c13ba290b3ca7ffe341264c7a1bdbe96252af2957c0acfa3ca204b685
SHA51234d037a5bc0be1ca030fb1375ef08e85514b53f205ac47bc121809ff79fae3f6f26597759c315d76f0c0f6c7853fff3aa74db75bba5cd9d104a8b37e6a2cd483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1b7a3f1a5c1a25f599523a76aac382a
SHA15f70d55b8e877073e1b5afee7bee425f1fa8a59f
SHA25621b29bb74e90f200f6be08858b159b69553b8356539565f20a688c119f307c73
SHA512497be0356cb8c2daf9ebeb5af19dead67cd36aae1f6d863201525d2758b9218791042bcb976210b0af4139ecfded79bd97fa133ebc1b196b1e78a9ac65ee2559
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549025012dfebcb04647c4d5a03655eff
SHA110ff4e7ba9e98332bd15895bc3910db51a1bd71f
SHA256860bdefa8ae55970475bfcce8eff145da0895be64d8addc47b09c6cd79eb8d6e
SHA5129d8bb9d7729cfe48ee9bdcbcb0d037801b269b33d83bf5cd982f5cbb69b4b68128e5ba51582a9d93ba500a3db9378feb0fd3eba957551591fa453b4c1b96e8a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f48089bb23a973c0d25d551eed81754a
SHA177033fc5c82fc12fcc017669975f876000f46cb2
SHA256b557b597d4d387f0e3193872412c45e9b5b64c76e33c0192db3b9d4c1d0632ef
SHA51235ffaaf25dd45d4e0bfa56f1121680e6289e271bff2ebcfefe4f3344ed67f2e0e208d1adf28a928bbfca90b7972aaa3ee4abf43b73134a21c2a9838c598c7f45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0ddae8cb12485dab3cae7a214b3840b
SHA18679cc74e09d639212c656e99c7ce824b570d131
SHA25621bd90b37ebbc7c1cfab19c6d16460127c23c18cc1396b44299ca70ff8130878
SHA512789bc0f7e24ef1603a89347d1dce3e3bcb5bb79e6be5ad853c0509995c381a434fb577d13ae609f5417a5453eba24f5268c46bbbd43d0b6fa683d732fc00573d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5736c28e291cd2a82f24b2c1dcec23076
SHA1f8d0aac0e31db747e8f1fbb66f03b1641eaaac3c
SHA256c7d967c6ebe5b0e90b84888cee19e52a6aef6ae8fd6dc0665e8f37e2432a93bf
SHA5127058adec72ba8aa70878f5479bede8ba79e3e4e5eb97a8cbc2940fdbe2d54092c71d43b27854dafc021e9401745561801e67503d6125954c63ebe4abe4ac2754
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c29b06b83636bf707f2ba1803161b64
SHA1a2c6d77b422924edc129b37becd16f9b5010d7d5
SHA256053b7b4fe35965467f9a0c1c3c842f689476aa0c2f54c1364e3dd946d2fa6d17
SHA5126916b290cef4eec247aa2fc2e1bf84e3e42275a2d5f4266c06bc4454a2a710f568e4c5820b25cc1215b073aae0e9b7bac03b21bc56e37e12825bf577011f8905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5745339f5fa8f1557c17b0f48d0cb98bd
SHA1a235c6e33c7c1953df6d3bc5db558e1db79587bd
SHA256041bfbcd995e438a4300c95cec828cb1dee9f0acaa8c037c61c43ccfc6d3c2cf
SHA512ec2c82d07cd82e0658b4dcf4114cc5292d21bf2af166c36a77b449b335cad2324429780b524e2cf076fe2a8b28e38bcd8bda8f645df173919766ba94eb02840e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565d3196e72991a6a52a0f497d805acbe
SHA18345d421f02d8669788ade6b3efa5ccb8e19d1b1
SHA2562430818f3aa4ef0566ea9fdbc636f76418e409d8adfbc4ea74e78d20b8ebca4e
SHA5126931ff5bab8c73901740379eecabd50df698976a50414bd69aaec71dd5d12f98d680f00f9b520a04776eac0a8b5a334c8531ce9819c1921d2c52fc470bda293f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536dbc89a1a3af50acfe6d960c77c99c3
SHA19de21b7a7d2b582f6ca12cc803f993476a67235c
SHA256f8cc7cbaf507b895113926e89c771da9938fc948ba4f48411f3d5c7765d0ff7d
SHA512e330882ace8afbe6ae0fa2c83ab7ea38eb096c83d0502ab07928dd431d187060ed94f7fd484d876855f0e2e65fa5c5686c9ec6326c58c90e7bb45f07a98086b1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b