Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 10:47
Static task
static1
Behavioral task
behavioral1
Sample
570293708db9bb99ab2b030192e7bf57_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
570293708db9bb99ab2b030192e7bf57_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
570293708db9bb99ab2b030192e7bf57_JaffaCakes118.html
-
Size
37KB
-
MD5
570293708db9bb99ab2b030192e7bf57
-
SHA1
f43e60993381235ffade6763d5295801238b1e51
-
SHA256
a869504d82333c301a00518f5b800f558957cadd83fe7ce3804f62f8e2b8ce1a
-
SHA512
cac7bb211a55f9481274b21bf0769a9de4b14cb8f8bc3d301e49fc0fbb32b3c809358e3b8142956914eb28ed0db758eadf36458796ad5c64d1ea2e27cea3cb40
-
SSDEEP
384:SIAJ8vlmsCyp45df+rTTip2yeHip2SXr9+isU8c:SC0srT96Ngc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6026a82d4b21db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435410305" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5868F141-8D3E-11EF-A528-527E38F5B48B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000009f29c584fa4ae45a3b0544804a770b64f9d5cc623b21c28ba7f92abfa853647f000000000e8000000002000020000000535c31b8a2f9a116d6027c1d1aeaf4a1ab636f3e66a27da4218dcb145258f2ea20000000e5d15c9f8933f7aaf473d76191fc36beefb78456d677c0437cca469a971d539440000000245d09c1402561269a2ce334b28594fb0f576451b2ea5cb504dba9ba0ebf2dfffc75e1423c89c3ed4c6bf3725e459940887153f42f01c2dafcba34deccbf36ef iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2132 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2132 iexplore.exe 2132 iexplore.exe 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2820 2132 iexplore.exe 31 PID 2132 wrote to memory of 2820 2132 iexplore.exe 31 PID 2132 wrote to memory of 2820 2132 iexplore.exe 31 PID 2132 wrote to memory of 2820 2132 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\570293708db9bb99ab2b030192e7bf57_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2132 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf3d338add6e0a9ef404085bb3c9c13b
SHA1192d079035a873eae671093bff0ec460a7abeca5
SHA256bac7df0cecb7fbf4c7d477c42731d9865562607ba2dec2e0df3768e5c8e82ee4
SHA51256b3086dbc46a8e1713ffb2b049b539871f04fcb96a2f0cfddbd7f70ed5e417fe0ec81f620f33eebe08a1029350dc2e8686ca07c62ccdddd976a8a8ff9f1727b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503173ab7f30a6adf905d0c02ef8ca719
SHA193e29e4a21b4e3d602b7f52c903ebbe0815bfa55
SHA256752a99ad72aac29c3c257e3fa66d603d8d67747109f3c58136a189c32eada9f0
SHA51298dd7e964d37be473b90a5f37e4478a341bfd028ec815c89a4dcde0f2c0d1e6fb56b9e5130f7ee92c47e8d885ad88b4a7cfa1732ca8b90f3f1d87c6f6f4d9595
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c29e363688cc2d8ec0fd2eec83c42d3
SHA17717e2a8ebde41fcb93af18203678bf2027cea4a
SHA2564e7e41bb6e561a8177941a74212a5c60071f878bf762b227727ffd324494fbbb
SHA5125ae75e97f461d1e5e8aba3e745db53d3ad5c8626589c10cdde1d426df45ba981d2b9c0ecbec8e7195f558f6cb13a777c5220efad18aa3b575886ca6e41b48d8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509d042cb298e4efc4b6f5b7b1e137d21
SHA1f42832efc312f0704229f236eef748a1a66460f9
SHA2562cf560aaf8dd748161ca71694495c4ea8ee00f778091f3fa6f594c4999bc19b8
SHA5129d297f6e7d68c65c7108d789c39bab200bb39a02d854edbc15f7dd6051cced9c473e01f25626754704d619b533f1dbcd0dba1f042428d4747daf002f6ca76f9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576bc032196d6d7fab1d2051b88b1b582
SHA1a248e38c1eabc021627ae28e5ed7dd405cdfc230
SHA256c3fc47e19f323453df14db75ba4740ceb82eb93650aa6067a1bbb043e1ae30ba
SHA512dad5f665a24ac0c11a419981d621de06ed223af644e844e3a4bd4325b86343dd1617cf00cb937ad577262d9f6dd1ea1f295d5b496a987d34585e25a5e163b1b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e48fc82aec87bf7b831f037c86b482e0
SHA132986437e111f79f1e703febfea03166b4ba222f
SHA256925293a05c20e9932551a1bbb26214d1b0e5afab2e49d6aa2ccb128f44c63148
SHA512f9e6ab439b617e2a0ed9b8b837f6e57d6645d4483cce9d28f5d5b167d915d0f00c2e2cd3d492d69dda15629168e22e20d051e4a21a045a9c59af753146d33187
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567733a52f1e4a50c646765aab635caa6
SHA1211f23f9ba31ed92ecf9d5b2bd7904ac713395a8
SHA25673c45dc42aae27a8d3a38734ada229b1600cd6aae79292d084ad9ca68c546dca
SHA5122b4da545a20a6bc88a33d033b4b6b6c3510d2a21e830e6cfd6c22f7822336c795e35998bdd2227302f5ca97456d4d1302f4694ef8b93dd53501e6cfe3d0419a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506d44d88e26ea33f7f3b5511b5cc0929
SHA1b501f94d4778ce32e194cc096494f4f8d2a5ea9a
SHA256196770262287a68242251ac9b4e49ac69046cb53cb51cdf2d59e636d405df6e8
SHA512e8b9f3057f66ce8514425ed2c334582c75b6b9f6a868aafeca8938eeb43c3854f1ea7c3345d4be452985f1925103a8006713483195395bf6d5cc88806d121430
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ca477b20453500d3bac0e3f2b5c2917
SHA1d92a2f3bbc39fc0af20a99daa45f660f271ac1c6
SHA2563f73933fc781d06892f8aade9e269a3c7c84375529c30864fff7bca9eeee46cb
SHA5127d42a56b2f10851fc078db468cb48f6b32e348a614d9b2879be7b551d622aac2ca23e7aa449c37fff081b2b11b26e2b6e798ad577d41cfa3861996d5dbae9aa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3f5738f129fad43637dbd376e27fb06
SHA108bfac07ecb398025c926c37d2b2e1c5b0ccaa05
SHA25646cee440ec2eedea1cfb3a91607b9ada60021bdcb540d9397002ff7ad03d0cb2
SHA51211f4730b5a9576c836778a897978800a240c9874be2892c353d52560fb39b755a97a36253654e75d3a7666030534878eaaf779dd1e756b0f33fca41820708878
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbea62aa9249c2105e2906a09833fb9f
SHA1c47759a2ee41ecbd4ea925d89903cc9353508991
SHA256903fbe37d0a821c2faccb01c38601f34af017f11ac7667bf002e6682d4004387
SHA5124aed9c2d093f0fb76d7ea812d90afca1b0d32b2735fa8b590c5f73c0645694582282b8562c7d1bdc0377f6e7a5d3bf234f2c6e7360a21395cd45c5fd2aaae6e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5033a1ff1b9600756bf4e34fbeb8db57d
SHA1b39e6da12207eb6fb720657ce244383cc9033130
SHA25623c01a92a07f658e25e1c54cf1d21d3c4a936264b4328eb43358794021242532
SHA5125e336839b8bcbcd1148b1c8ea1b814ee301d781cfbed5c0321b7373de8d8ee99a3a02dedc7b27daaa7a0a14bdc592fa7eae1e75ee57511ac49e98fa33ca7b3af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc5193b342f6fba76bb3f80a6f24232f
SHA12def3764c7ae45f35e1d75050402127096546763
SHA2564477778344d54127743613da5e07c3260088561673917f681f711cbc0fd2bb37
SHA5128f51b839dec9690c2530b5bfe45837d2e1b4ed46de95a9a9b4c7dfa2013bcf557c259df329d86803291eeb93c0ef77df514ff0e8e8b782a4bd62a7309883cad7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1b1af8c876186e755077c9c76a0f023
SHA15a2e9d1010185cac28cb05ebe2f9df6d094d9ec4
SHA2560d927f0300c716daaf9188a981fd80382faffc35407f6cd6b9664fa04d50d050
SHA512090c317bb1067480a276f59045f9a23c4d3020f52ad2babeee836e3400681a2909935a36e27b73245a625cfc1de615b950063e5893362755b3f81bca0534ace1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551b8e71df1e85a0a32521b836e3fa081
SHA1e3a539aa42194ab3cbca9f5a01fba5b3df081d1d
SHA2560773d7300a9d57c2e71d21350452e65ed4694106694aada03f2b083d92895fff
SHA5122b975ec7c1cfe2b776239d696db2e661a9efdc89cd0b96f9ae930a4d94d223bff57c5c790ca9a0f802a14ed9532b6004c00565f37c60f92ed3ad4d260c4fc549
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541c3b89c3a65f2b17e18397def7ac9a5
SHA1549c41c553fe379d229143eb8c51864c91c28117
SHA256c690be9c2b3cdfeb3a226fcfe45625915df123f967e87fe7335a59e1d9076d81
SHA51272cea687897a8e3c9d91b4ef92f93dd1cc0adc286c431ab4c0ecec4bcd780ec707cbe9bedd6e121db1c60046f428046c181b7ab1c20a3c83e135d52d00a6d47d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7705f2997a48dfc41c86619088dcded
SHA10c87aa10fcbea5ea2691e05b5582765d1a00153a
SHA25698f8b385e89413e92719dbb06dd56e533119b89090f917233ed97043bbedac50
SHA5123c86aac152f0f7759f96428c755d8c3ffc89d14c8a77bc07474e251413dc95c1e7230d74ba7021115b8f7eadb4a223c7fd64ee0e20ece15b9312bab3ff083ac4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbc43890332a8f9c2cb1a4aa2af848e0
SHA1dbffdcaca19cefe338bfa0323dce39b3d6f5cb07
SHA256718b45f4e37c891ba6e0677bb3cff5003e2fee71412d7c2cea8db640d8353f60
SHA512e4f8dd3d3d1876d1e25bfa2560484841e03d97a2bbb6a32aff542f6765f3a2ccd915f675918521f76b78c872a9a4d1e1c30216a4293adb689d443ad6457b318a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553988f2aed3c236f1998e37518bfad95
SHA1ca0b0eb9d9bef0d1c2499b337eb9c33acb56d30d
SHA256121366b017eeb5ded38b3888dd255560d7b809e0043bc93ea76354cf65377f90
SHA512d24efc2dac4870d60f4b2a1f227a52550f1c53fb812b39d765ef3f325848b13b5c383fa0625460754b7089dd80b51ee9effe4a5167ba0b61350f853c475ea435
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b