Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-10-2024 08:11
Static task
static1
Behavioral task
behavioral1
Sample
826b80460b31857e6cc8facc2911ce4a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
826b80460b31857e6cc8facc2911ce4a_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
826b80460b31857e6cc8facc2911ce4a_JaffaCakes118.html
-
Size
138KB
-
MD5
826b80460b31857e6cc8facc2911ce4a
-
SHA1
70c198863234205463825f68695f5536e9d5aeda
-
SHA256
629bf586cafb08a8f9e3457fed4c3d9938242580544c36878ef3b99f40f81606
-
SHA512
2b63879fe05cc634631694a34aa13f8ea9b587ea094ff7e013c67da2f4e2029deceb6b01bfe2d2d3678194f6f85e744530d23fc9bdf5b68997c70f3f231deb03
-
SSDEEP
1536:SmF7izm0W7IRifLdHJm35ylNNyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1Ul:SmUdkNyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "436524850" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{58761411-9761-11EF-A6F8-EAF933E40231} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 405906716e2bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f5420000000002000000000010660000000100002000000004fdfd83f14103a7514f9283b33766590cd49f65bf11c1f42e336b7cd01aa5ca000000000e800000000200002000000045c57fb6df51ded7a96d19a0f1fe668bf7562a7bf2437e0d326614bd5672ddf820000000dcb60db1bbf87ee19a454e51acd6aa6add6d07dc601523a2e8ae94959a713fe74000000070523c519f6d0a95d4c59c06d0971bc081fa6ca07a9b8e5b19f2bc64a41a4dc225860c1fede68bd3cc5bedf1f46fb149bfdb1a8b5a7b36fba618c3dfe982f552 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 584 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 584 iexplore.exe 584 iexplore.exe 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 584 wrote to memory of 2628 584 iexplore.exe 31 PID 584 wrote to memory of 2628 584 iexplore.exe 31 PID 584 wrote to memory of 2628 584 iexplore.exe 31 PID 584 wrote to memory of 2628 584 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\826b80460b31857e6cc8facc2911ce4a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:584 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592d181cfc9f1ea5f3aa16e4a0b1d6522
SHA1a4bfa495a4f8427d8c7c2b0addac3929f0f947a8
SHA25685709f15347ef9718dc8f3c95d13143229504162a2801e888a2eba570dedd70a
SHA5128ea6e9132dfb07918fb6125a86b1ab30e2e1ebe893a85ddbdc5b17dadc5e9bceb438340e8bdf9a5e62b6df726dca7e75f41681282254705824a37c8a4233ec21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d504be2e52d44548bb97d834f97fb359
SHA17f49a57c4ed1c44fe79995154e61fbac8f232a80
SHA25630b520bffe24c444cba92e03491cd8cdb71262b4f8173bcf9ec2ff75e7c08aa7
SHA5123a89dda44fb9b12a2040b69c5b344ff08d5a375f6c308e2ef259ce86f97830087d57e7e53f5014c9090eb518bb0391e8f8f67bc56d24c466d6f7b88feec6caf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511dab46ea04ddfe399b0a1e84a4ac5b0
SHA1537d015034e113001da3155fb844ab66ee9cb2d9
SHA2564a9fb6bf06f0fb7966d39dabb26e9b65248eb04f23f88a6f8a6f0bade70674cb
SHA512e6a53dc7464bd9eca1446d300ad53605bd7d4ee94f399f8a1ae9acc536117cb31fc640f12efe3963d4ea45ae2e4a2d65f466c64a2b7718d7478d67455ec84a2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d2519a5a0032acf204f441291a93fd1
SHA172fc3300b9189750b79039444a90512d55b75ff4
SHA256c723a72fe6180fa467ef0e52985abe538b31ec2414fc3feeaf724ccf2b897c25
SHA512e72c1cc2a334ed2de1e3b459b1062d686a720e33f42eab9d77cd8da09a01498343f79d68da15b57520402f31ceefa9c7c19a3f697356092b231478533ac939e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5697b1c93f4ab9adb3bd19920c5a7cd46
SHA12809b7e430f32b57a035573571ba8e788175fee7
SHA256c6f73dc11492d0a89c0a8cb216c3a7568a807575ae51b0a693d4b3e0c6b1038f
SHA512e8339947b69515eb4203d660f4596d88a17ba1662322dd156ad74d328b8f3af2e24d0050b577c8a3c9d805e820cef902f6b3e2996d89140fb4833be1d71768c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528549b89fd4ebbf68a6c92ee4984caf6
SHA1e5bada6d85ca3b3684af07bbe5bbcaf9e94960b8
SHA25653410cf0dc41390a452cb62169628818610d5d2f035234fb24339051e85fd679
SHA5123f3b4200ab489de14aae6c80d5fb181e953efe92cec58a3380bc5b439c7c3bcde0bece48e42a57567ca3feefd61915e26701c30135b6d1e227a6b1e1d5d1562a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4c38cd7f2d1276f4159619783e40aa7
SHA1b18ae040da9260c220c0231824d22614fa5bdeaf
SHA256569f07e4786ba6e7d22a1ffa0b72769cd18ebb7cc07c93db9dd6deb447a0fd31
SHA512cdf42638dd167559bb6527bfbe6391036ce52fab500dddbe6df55661228d0116f674e0c3319eeee1c42f64ae2ccaddb1816360fef30044b15062aa35b728bdfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5595039b933d9896f48119e9c85953fb9
SHA1a5cd3b22c7cf1f565159d5639a283ee813c28a73
SHA2566450b7cb5bf042e8dd4cacdaaca00c32bc72352fce703795d373bdd38a1a12dd
SHA51258df6cdb150cd42f8deb623fc747c38642aa3fb4eec4325608a2765ece6a4638d755b670aa1d2abb62d5d65d58ddcdd36ebc73209fd064137d285c492eeec779
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fcac369b11db38882c90a92ca1e6fe8
SHA12e941b033b8edbeba6f41b631d245cc448d488f2
SHA256d3412c367508db1a26bf8eb901ca4e2b44e25ff24f26d16b56708b2b6aba64de
SHA5125a71a00634ec63f398529e75eaaedf7f1fbf89e4f7c03682842f99f9a4d5f4051fc01eea0a8a23d2bcef5263bb583997ac7fe4dc10c948d798307f1d70e8fb76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560e2405264b353f367ffcd090f6eb1c6
SHA147a6af38c63006a13e6c859f433373170024a5dc
SHA25604afd6a5ef6b60043ba6fd1d6318df3630a51c5f3de5bf6ce71155c100f261c6
SHA5124b359716e67b9be935de54cea79b6f52943a9b9ae5673af36b5ff8fdbcac58f1bc9c0bc8299a14560471769c59159c50ec20669ef471206b8914400fc7f45500
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571218faafa9a1e583896236767b8d9f8
SHA199fc2f7db0a22ac5999ad12a928f92cf872f7166
SHA256cb2f332898c2f2f95d5bff75a47c968d90f7c1489b8399e07bb6a5a28bb6b2d8
SHA5128d0e52048e4bfc4a63cbccf54d2c1567e6afe42cf79b8771fa5d60c4dbc8fea18ec15dfdf52b627a8a3fb7cc46dfe8a6bac01124e021fcb442f8acea867758a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b94edfd9209d1003293023cea992df1
SHA1a32f3a49162280b52d508329696c3e164ed734e2
SHA256be4192d5f81f41fbf749f02b87b4533da62912d60d3edf8aecd2b56d996c1b86
SHA512acbeb9a313bfaa6be4aaebe281db9cae1b1e0d59b9efeab7c00de85adfdde750aaa0957e0e5715617c9681d325caff00fe4a428befdf82354f90e07b80eadd07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dc6f2825958d11eedaa24bcc8ea8557
SHA178b25d259f4150b4e26200600507ed9b47a71ad7
SHA2560ab8df52bff896878f189a9964a99ee51de14c256070f77075e9b58ee42fe8bf
SHA512b8dcea628b2a1c36ece1a547d8330709f9aef2ec5700a2774f9c96de2e52911a45447880018585347639503802f2d2e77625fad3dc918e4be05c00b6f116bbb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c031949f94845f69084cbdb09a16aa0
SHA13f07e5bfb62ce748bd580c0f995886b02b30d005
SHA2565b5761cb7402bdd9a612e62a4c29bf17568cb5daf8c5f02fedc129e9538113cf
SHA5125a834d44b0d8b7bd59fa5518676f9ade878d08ff54ff8f478181690a84c4692cfc1b3c35e14882777a11e24f8eed22f94feeb7d77c71ea062a7839430a4ff37e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfec12f2ee70d431e0c5ed761601b091
SHA19d0658f25b3178581e3f608e99c88f703a8bccda
SHA256c16397d4c76b16f54f56683172db542079b0d057f91d1d656bcdda620381cfeb
SHA5129c5fee1c16385b15fc59d887e449df0646a199137ad83bce78883325ee1620a82fbba80487b99b1a05ffd7c918449d7ce06b487759e69aa55861237db1e83c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508a54c100fb9e5c6e98e25f5b2558999
SHA129b40916b61d58324b4925eff9f3f546fc37e30f
SHA25631e3981544ccbad21f520e178b273ba5a1b1cc8f639ae45df114777ccae0cd3e
SHA5125c4ae08f7dbd90c8919682866ffb0f294691e205c303ceb12d20d67a626a2c75ba7d4966c4379d30a8220519315592aeedbf1cd9ea67ce5cd59282a154665f25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ee07dc6e2d8f606ac50f0c905fa0272
SHA1bdb17826cb348cefa68b48b6f6b3c86f4d5ac088
SHA2567d2bfddebe81ee5bd8c11c6ff6ee0dbb98c03798a288470d8c30d2bf68abaebc
SHA512eeb90b585b1d6f3ccb8753fd2f408e41c6e188553ec8b3a49431118c9a351eefde477ae3959efa5dc967e202faa9e3bbbf7e738496aa9722646885deadc402fe
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b