Analysis
-
max time kernel
69s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-10-2024 04:52
Static task
static1
Behavioral task
behavioral1
Sample
5591628e60ed0d6f78f2dd14b8a7cba8_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
5591628e60ed0d6f78f2dd14b8a7cba8_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
5591628e60ed0d6f78f2dd14b8a7cba8_JaffaCakes118.html
-
Size
9KB
-
MD5
5591628e60ed0d6f78f2dd14b8a7cba8
-
SHA1
d4f8fcb22eaec46c6835f9f70a761b2f5905dba6
-
SHA256
15d0a0d68214f95b1a89e19e810c285a1f85eb8d96c709c996fbe5afa45a0b63
-
SHA512
059706133a2b03e8cda2278b39722d466802091470743f1bca3070fdbe104177cd9919ad478c930ca80c502fc4cb2dd3fd154ffa7b32fb2509b5fe4b61770b41
-
SSDEEP
192:ln8uqnGDSSW0nqM7PTX62gL6hmpsNEiAVEMyh3qx6ru1QdTQzPVkLO1bUDvG2Q8I:ln8uqnGDnW0qM7PTX62gL6hmpsyzVEMN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C8D8A561-8D0C-11EF-AA78-72B5DC1A84E6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b131900000000020000000000106600000001000020000000a3ca0d5df1d742d58765d23ba202d6d6faf8f8f15c1a97091444a98e49219919000000000e8000000002000020000000d30b8f73972a0a88a8c171acff99a92c957698d1469fede2a3cf6fbb09915a0020000000bc25ea83a32ca4c23f9f03b09e4b45552f602177777c6e40da689fe6820fd71840000000c9a9be2eebecff918c39ab9472e2c3fae63fdab9e6bbb947843d7ef5327ebb18d099e0c8dd972932291fa54138ee413b1664d6500e6ae64190358b4370fc76f5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435389022" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8050289f1921db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1344 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1344 iexplore.exe 1344 iexplore.exe 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1344 wrote to memory of 2592 1344 iexplore.exe 29 PID 1344 wrote to memory of 2592 1344 iexplore.exe 29 PID 1344 wrote to memory of 2592 1344 iexplore.exe 29 PID 1344 wrote to memory of 2592 1344 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5591628e60ed0d6f78f2dd14b8a7cba8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1344 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5beae91fec7d13a8d855b346c6e2cf4a9
SHA1ac65bdd95f23b269b153b37742a5afe03374801e
SHA25618c38d64843e9d21f4d27f4013943b4057bb6ffbb0c68b056d278cd138e446f3
SHA5123cf03824f1007955c48d03085373a0d6b6ec1b1eabe1843242adbed66d3d97694d683f32461f34c3c7a612f85a1d76d44f2fdc5d5e6c9876b28d0ed2f70d321c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53baf02c67f757d7233a1c82d8ac228a9
SHA1c457bb71b5f74a19cb0d062c76676991401562a3
SHA256f89e6dcebdd06fbe6a79927522d448b6d32165f1810fe125c6cd0092f0153298
SHA5122466154f6196aa9a88c07e8654b3d6b7ec948ee9b4f7ba9a616bc8a8a4ed3ea29128022df85af8a95846d7965a701e6a988b36184d20b7f8819bad4573c4e798
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573ba72a1de96a3e7d12a064bd5c73c3f
SHA149ffe116c9cda915d8a285866c813126168ed313
SHA25662e3e6df24691afc8f8a37f55a6d324bc1a4f407d5e30e24c7a779aca9d61e1c
SHA51247d911112c04f0f3186a44c9cd9b32c2428c65575c8648ee7c89897ad782828af098c8cb8f8adbc5f0fe90f266aa77137805cb6b36a36ec48218170b7c0f9e52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500139449a80a0d964b7850145e4306b5
SHA1abd406ebfeb12541197ba7d63b7e1b1e1f1bde5b
SHA2561b25a406305eb74f8cbb5eb596a8dbfa5bcb7720526c8180afa31e976a40f197
SHA512c5d9597afcb48ef8af3b49bc9829902b290e5a963adfbb21b026a0a07a2912a2eb7fa3fac0e7a3d4a82d543396bf73ddfb4dbe860cf603b535920d9b51936246
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb7eee5b69d15859b6d7121028d5f8d0
SHA13355e554c9f537fc5849d852925025adeb17ea32
SHA256678bd78dc841b0c346881e2a8a8468da50a0e8ba55fc555469abc76fc379fb07
SHA512ab5fb14131c179478fe7752b9ac1cdbddbf7d8fc2b4af81fb51ace9846b8c09ce8b8bc31b10cc4c94725d8faab3c104cafa35fba3571d25508d3aad9690a8aa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543f72dabad35c0141e3f96afbdc53616
SHA1727ab7082b1ebdbf294d26b92616f62f7a5cc07f
SHA256779fcd9caaa821a1239a2a5bc4076b0408ef122798e39d004d9c5378a628789a
SHA5121b6133807a072c78a13ba7844a28edb3df40a1622d84e83f4ec62c7e821e9d5c05ec9d2766b590e1ce401cc5bd8fece6ced6bb2f998a025244297c7866805604
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5635d15ae6dd910b9d8dde895bc44dfa4
SHA1073842d58fae440ed052f32c0ad0815746b29c35
SHA25602c1459343035fb451ca46b51e0e664411ca5b3305b74e2b1e625518cbe69f3e
SHA5122248f7558cc0585bead49e2557de27c79bc0b617d0bcaff9f161b44285e2111c455220c14d11a228ebe52bc690bb15105ec8217cd827bfdbbb9363b759e47c0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cd84e1c4df814c1eced15a5dd9ea43c
SHA1a2406bf1250dd03883d3b9e29c338ce15ebc6ebb
SHA256741a70e12b9ffea126b45e72987558daaa2e980d182ecc97e0e17982c79f27fa
SHA512629098a0620184e326e315cc4aec1d7ecc3c122e4a83e92741f4f2b351ed7af357cb30569b6b3614193d764e859bd3a78eaa281cd11577eddab7d586a6933af3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57617947005fb8d1bedb074e799589f7d
SHA15faa60381330e2cb4b29f86b746d2f4f40962972
SHA256c60598c7abea435a88b909a6b6d8900871496a2303826390aa2815befa56d944
SHA512b4e569b6a2c6ec36808120b5360896db1e785eeb09ab711f9e312b639549db75edcc64afb6adce783cb3ec9e2d7993ed4797318643ca110d185f1b79ed2c2529
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4087c20635c0805ccc84bc5044ddf21
SHA178ac2c77040a508f15d5b48cffed939a15289ddf
SHA256c3c16e24bb4cf974d450712696b15dfebdb286394cb8a4ce0132e767a82374e7
SHA512878eb136d1cd2e4ee0d28e45b5fa607bbbc14cb680ac3ad480905360d67ed49c2f790e5f045b8af5e76ac6785eed5fb53a08157cb9591faf30d83c915212f0ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5499c2efc2c7456e76267787a1b18b656
SHA1d1e2e756818f76e36ca4fb24ccc7bce674746105
SHA25653f391f4f5f7e6ae59eb29fccb462187aceff4a663f608329bf7c6ae0f490dce
SHA5126d98eb31edce2fa97ce235e01310b437dd6dedca7d0c6aff54b3a755b76bf3c5415e0ba2b0d411be96abfbdc0b7ac532541e7ad462c7a9852d39979e5059815e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5776811ae9512ba0564f9b675c13f6fe3
SHA10542788436c6eb662c46ee4653f508e6a91dbbf5
SHA256cf87859a4a62a6d13089d693ef76413fd2495c30b10fa324e7b1c1f145f67b15
SHA512f0f2d698584c1884d164a7d239aa08b2b3c0716db81ad788a80bdeaa93e7059582f1d5c9df7505319b10239463a57fa94a478c487fd873815a2e97181b23ceb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5290b437a1de0caacae618b3983d355ba
SHA1bc7b339db89c937dfbf7e5b74c2c4d45b2b0f2bb
SHA2561346dd98d0d3230ce90c78575f2d46dc58f2978ffea593d2a8e5c91f92e6f00f
SHA51289df7c71baf2d7ec86b9f016afa2485cdbbf590bc180c0f28a0260cc4b2ed20999a68b287e9ccf1c78da90d1c8c90c205c6ad51a7918bce417cd7663831cc84e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fdd5acb638ecc158b3552f7d5e468e1
SHA16db789649fb129aec8f0ff10b41c269f2a46d96b
SHA2564b5f6fd022388f40317f40ba1a01b9414e1768630a6241aa3aca91d53eda9a0f
SHA5123a53e637ce66c31a7134a80ee3e36fbca2f39e39e2c595787dea75471e4001bbabc639ae6776062a0ac8e1677bd4ac32def10c69bcca5e7cc8b26001ce961e13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51916a4bfa30d3d2143276e368171f32d
SHA197121d47af929f20ce64812dca7f4f310fc991fc
SHA256d9068ed3371ba6003e72b5fa48dfb8548af6a218352ffdce2459228af7e3a8d2
SHA512469553b9c87072114694e5431f405d8fd84ab11e03ed1d6fabfcc25b34beda722e80c664aa33c55399380cd0bd43c1cbbe0940c063a9b46dd3d54e55980625b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500ea9497da25e1ab543fd4fa61452e70
SHA19f85ee7a2c9233521e77278477a15693f4d0b3a1
SHA256e7424ed57c9c0993363dd8631837e67bda2a01d04a1ef2b2b8f5edcb792ea997
SHA5124269fd2c3952237d0cb8b002b327cd2585c08ee4118e42bd35e4602d305298c2eb60c2737d82385f12d66d7840109973b8d6e625db5b5f54bfe0fef87fad479a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556b0d286fd1f6e32d5e138d538db95cd
SHA1783b32ebb693f96398d689a3ec6e24bc4f88d2eb
SHA25641c0367455f66df37dd461bb484316611f42d27d686f771fed7bfd0c48b00621
SHA5120e17f8b642eab6cf31528c3f4622efbf34bf23275ac421da5914e6a1142a720b651436059fcc48d03f40a47c0a630bb8246f3c4133168ba630be522c1b415cc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d303eec3650dce224264ffdaa28c7af9
SHA1ae2795a44db2db5fa2e3ed55e1583dca4afd5e73
SHA256e56fd30d25bb2d172d552b3fdc42a32fac5431b021ce2667fa5c091e941a1aeb
SHA5122b9493fcb85b6785bff965e78d801e8efb775bcb208e2e9d064d2f927ce74177803840d940e55f6f921da01aebf1477bf0e0b3ef496662a47c8a393069382b99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f36915e1eb4a810caf8e5baf688394a9
SHA11b992812c596bd981f42ba607c829af05f8c430c
SHA25665c548bcdf7c3454d8db22cfe97949b3fbdd56ea84bf01a89f0a1adf018b8d7a
SHA512a9dabd9eb99ee3218b089a930784428d012d0845d6d456e20cd3e4f05003acb964f8fc634afecf9b79fde4028a77f30a140f26cfc733c30248d464c1d804c97e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b