Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 05:46
Static task
static1
Behavioral task
behavioral1
Sample
55c7a23f415ce402e21b387070e3125e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
55c7a23f415ce402e21b387070e3125e_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
55c7a23f415ce402e21b387070e3125e_JaffaCakes118.html
-
Size
89KB
-
MD5
55c7a23f415ce402e21b387070e3125e
-
SHA1
fe47543d85c04dbd3551f1bcfb74cda8e5bdcc81
-
SHA256
797eaff87303b82c99aa3665bc671e332f8c41052cb15ed015bd05556ab7d9f2
-
SHA512
e78e31f497f80c61465795c9d29f7f782c0f4c7379bb24afac58249e4b4ec96e2d86acb43663246228b86ecffc54c45ce016af612fa6617d25bd57fda4cdcabb
-
SSDEEP
1536:SQSwCzqF1mqXmiCWzZ2wQzRXkFZWJRigGEFhH2csw:SQSY2iC5TzROIigGQH2cF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{63B0FAE1-8D14-11EF-A641-FE6EB537C9A6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f090e4522121db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000002fec88642a11e9a2de1b7c8fb937f06d86147d90edcd9ddbd956b4536c94897b000000000e8000000002000020000000419595cc7f625cb0aba6ff76ce58aaf71836563444b474b3f325582a96933baf20000000d6752ffd81b59d4d9c7303ebb734f670b14cd9ae71b00d62a04d742aaa985407400000000eca74de2b1105f3f16bf7a9b8929c78487a891c2e12c0fbaa2c6b3e7b089311018b2244b9ec80f993d95abf44b9e8d6d9618264c94115d6d45fb02ebf82ba56 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435392286" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2384 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2384 iexplore.exe 2384 iexplore.exe 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2416 2384 iexplore.exe 30 PID 2384 wrote to memory of 2416 2384 iexplore.exe 30 PID 2384 wrote to memory of 2416 2384 iexplore.exe 30 PID 2384 wrote to memory of 2416 2384 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\55c7a23f415ce402e21b387070e3125e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2384 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577a0675ec079a1cef17aca20fc923e07
SHA1a25b2c5ab33066cef1b4d77128c2bba6ba2655a2
SHA25647852df2beadf399be6e5851c5bda8d15362e753a67edf3c07f5e14ed2e0abeb
SHA512c8d6a7426ff9a790fd929b5d8ee31f05a4756c41da1940f098cfd3fec3964b950367b1fc004048be3c87864cbd3ff1029b9e69328b7cbe42e58cdb3bd1dba158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aacc791c83635d33593d07e550b1a96a
SHA13d3bf67a5b3fc424ca67e2348d4e4fbb197b9820
SHA256cb23b015e75690c5c50f9410548a8c4a40bffdc394564ba3d6acf308f8cd47d7
SHA512d8db8eb8221b7027389000df207338b7b27dbe4f07d7137f4f5549fc804d0ee48844d2d025e209da0f3f19dcf4d6abed58ffffc06f2fbda2878e32122af60ef3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f06c7c4de9cf5c13aa08cf1302e3eaa7
SHA10cd5474deacbb75a9af597e28a51b642392e4e34
SHA256abb75aab68adc815ca59b1ff34b579d47e5c2236a89e8df907886ac8d13eebe9
SHA51207de130b9bf00377a75292828a5a2ff3b6e3f705dafd333cee7ece01078479aae83546e69705fbf0de893ea4333ac0ba6e4ee83d8741842ac0af05a6dd651fbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6b280435ab67b3b816ffe3d76ca285e
SHA1f3b9449b27b45b9af5743780e194faac6a521a21
SHA256b2d62da9e522139e89699417d2b27cdf0672e639796ba4ae846a6f42e4b33e81
SHA51293254c83de8dd909bfff057743921759f1244fa3a25f5cf1af9534939af409f8eac80b266396999511bcc824a0a4fe6c682bdc6e37b38b97ac4af2888e63e61d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc7d84d2390cdc3b0e5d9ad95b996992
SHA1ae8d38aa821d810f26735eb17821a862ed9c2b90
SHA25651cedd7d6d6c9053119bddf6ab3ea096b6ec3a35b4a67b3093894da877d2e820
SHA512a01bb965db5f417a79dc498ded74939ce0949c2cae25b9f04ac47d7c42535fa51f4354bec5e69386467010995d0b85076295eb0fce67ab11bac886c05ea669b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59558847a3d30adc665e0774ddf7b0501
SHA14c92fcfea402e2c080bb21ac709533a27bd9f74d
SHA256951f1d50d1f810fa39e7a981a20df64a40a988ef83e452934b1bf988a94a03eb
SHA5123f35e051966de2136098055d90c3181711ade5860b03907fe613812f8b12798c9c67ff3d3c3b9f35312c0d9d363a340795ade1e10a87e2c578ce09210d01594c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af006f024a232a8d640ce1ff10321037
SHA1de8973281a2ef7dcdae4f2849a826a9647c546d5
SHA256b55d5f42fc762c53379339a766ae45e53988b1f7270331bf44e6f6ec2a2c5e97
SHA512bee223c62a806f25a6b04c31597d3a66beb0e5aebd599d762a32da724492f4ed7c77bc0e7353fc758db5882f495e80000d2ffb1b831d0f6283a091f5b2427728
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd6976695aa7a3ddc36fc17ae31fbfe7
SHA1c5073ba66209f906e8490acd478d43649e2373af
SHA256bddf7f4c09c0c5940f7067b39bd685190b39018ecdd2060294b164fc6358763d
SHA512b2c58556bff347a4775c40ed2ec7b8f65a083b0bede8d1a0f266d548ca0ea085bd05a8b42f3f4ed8d92898772c38d70353982144c7063bbc56a573f199e474b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5231c0358d6d73cbe5c17d1067d84f805
SHA1de3be42e16289a5fd5d716ea99fa4571537993d9
SHA2568d72fb5f8efa89d4048655229720bd86dc4325ddebfe86a6909cd046713e7c8b
SHA51241d95d58966ff447f912f2151615fef7463321a377a72676dbccb47405b71f49b63964991f3fa2dc4d729e5c4bbe8ec566616a6e694684d4df84d523c9f9abb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e48680545f18a2303f159b1f009d076e
SHA1b34a68df3ed22a46d1bb7e9fb38930882777710a
SHA2561c1d4425c58a901d1227624280da5e087ceb6ee5ee53aec5e8e3fe06524f60e5
SHA512c7e2197f80bd79d4c10ad16589d1bd53f6af5e1340efdc8cbcf83eebaee5e2a76db0bd7ef6aa3fbee63ec5d78401d352e3174ea8d386c55017685da0f78de87c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd80181c6d15e313011e3f4f4465cd28
SHA133db9b495835e29d7b508c6410ebab4e234844f5
SHA256b51ee5aac0d8cd13337f6611b441d862afb8a1dec37cde4b09a7edc540dde4e8
SHA5128ed315f19a3da2e6515221e624717261d6f0234ece8916b436f88953f997b15557c2877bd4ae9afb90228fbcd6091239a151416263d5e9734c052b08b16d9f81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5629fee75ccb603a4ddb64154016ae4ed
SHA1d3381928383c9c16c6762b77bf4376ad06e454ef
SHA256e946f4f866d6c63f0319cdac73002f4802b6acf2c1a4285799ad3407c4e25da9
SHA512b2476d4f96d3214644089b9bc69405992058287ca00a767cad6e737aebed7a472cb18cdbd1a1347a177f53e2cd7e8357bc15c635713eecf965fae735709490ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5ece6dff739ada51e336d9c880c2afa
SHA1e8dd1b87bd0251eb85c4919a30f86512480e9c8e
SHA256719f09d17ec5e068be0cba9f0efd2133dd9a0a0df0bab3c1dbaddb98d66db332
SHA5124d8325acbc208365227d29821a0d73a5534ad32aaa89412a58884583822a7be174cd3f050856eb232676362fbc91f66466e4e2e1a58c05cf123931475d8d5967
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5211ecb6c1846994af373c3c9e7f7f8a7
SHA17abc180d2fd6a40afde3ef4022239485ac0d3208
SHA25666c3b33187fc4ed7ce16d601cf93f6bf4511d4a171d34150c9a4b3387f8522e9
SHA5126aca2f92bef9613eb00145189d52597200226e5829142d217d3fdbf32b0e5aac96da067bf24a0d4a4583e8a70a7ab166028524a8730eeec4925b5076ca35d45d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7fd9ad70a06b1545682ca30a8bfdd13
SHA12df883141c44a3e94559f14d2a952bd111397635
SHA256f86ec3686f0dff9a4d0754f7799afcc9a6f07407e64b7e7d3cf99824a105c2b9
SHA5123807910c3a698f700560f6e22e5e71d094884c059a3d151955758801b019147d6ebddb9c933f93c68b808a6ad527b1b8aea9f4d44cbd85e5766d8966df8e800c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55edf13971676f2c68d7ff0ec373216cf
SHA19508db056be15b89a545b5d14f2aa2ec2f798f9c
SHA2568d17b4107c951982a4d6d1f29e922fb0afe7f2c30041bb8b19dcf87b4e300578
SHA512dc2463c7d76e35c0f056d6da7951aed109fbd2dfc86210810f0d6b1b9966ab012fc5fdf22452a62621be48f2650e4b797a181bdca1f0d82e181ebb077f5cf7c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50991d089d430b910c8113a1ee93b2f13
SHA15c9990d37dc44c08bc7d71a6149e1d8167bb3e7b
SHA256ade99d97e171939559c73485ca6059d9df66fb93533e6b32e1580b48dad57b57
SHA5120830350e358627527a09c37d72eb32e9b447fedd76d642af1047383cdc9a581909aeb0cf818d3126c8f185bc68b20747c06c6ebdfa286997709dba16badb4aa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab369ed43c67c2f65517566c3db3fe9a
SHA150653dc1e050712f9a2e40017a5e7b0725f8f868
SHA256fcf4f2ce37998cf9b6624589f24090844e5336ad94f1037d44fb3e5ae04d3620
SHA512365bb332114b5a1dffb48bbc4a30ba3f568d3dc4a701ac11caee186b8972f88fa4178cafd349c89984abf6fc059e8a37c0a9dfe0a33eeae873913e640c27c3d8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b