Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 17:52
Behavioral task
behavioral1
Sample
9648708635355a93e555ab597313767a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9648708635355a93e555ab597313767a_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
9648708635355a93e555ab597313767a_JaffaCakes118.html
-
Size
5KB
-
MD5
9648708635355a93e555ab597313767a
-
SHA1
9ad8cf9e44e28a525b825b7c0e05981ae1c66c51
-
SHA256
eedf4777657feccaaa0f41376507e29afae7eb2109161d13f35fc94bbacd6291
-
SHA512
b17a02b96ca24fd58b4a5b0e04591a6f613bfeb7368690ce5a79e50db2102668276d224bdf946cf5d982c3f7813fd34043ae6a497f3cb80109e2f953d69af9e8
-
SSDEEP
96:8y+cAl5azln+DtZogmemzuWp3Zh2wO/iKFe8LDmQIjk:8OAl0z8Dj2emYwO6KYQDmg
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E1458DF1-AA8C-11EF-BBA4-FA59FB4FA467} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000678b686221005ee8cadb0dfc5dc2adf3b7d01a04cc78e80299d8cd8d3f9a18a1000000000e8000000002000020000000cfd64b2ba18d47a6041cf58bba1de97ef10a08796325b0dc244f268b423f1da7200000009e4ae27c15daa427a2821f948fc8ba35fe28d0cd00d7a97303138e6a6732ea0940000000fa96311ddd9d7a13b7fe4b76ec3d515a8dc3537a2fdb7b61e066eb1376ce61e5b6917cdf8b4ca0c3ed99ae30d8e2df994ec409121bf5a99df1999c9121590e9e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "438632621" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9040bfb5993edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2244 iexplore.exe 2244 iexplore.exe 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2956 2244 iexplore.exe 30 PID 2244 wrote to memory of 2956 2244 iexplore.exe 30 PID 2244 wrote to memory of 2956 2244 iexplore.exe 30 PID 2244 wrote to memory of 2956 2244 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9648708635355a93e555ab597313767a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2244 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501c610173b4ae7f2e1a1fa9cae8bf034
SHA1cb14637bae9830f03708e80d9e876d1fe2b6cf55
SHA2560a2ffd12f12020954fe2edc65fddf0d9cfd2c93cfc618b0cf067ef02a6d81437
SHA512951fdaf4e5857081b4d776704dd4cbccd91b2c502a49b86a6f6d5598606107a1465afce7c0ed390db1fc9a61a9199927f629990c405c1435f886409c6f44dd43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568ff4d5f7329895bbf9251ead5c4328b
SHA1ba202aefacd7732a6892b4a2cc83798195d0985b
SHA2568e80edab278b084e41f22bc8e1df3c0c67dcac54d050d24785a6778a05bda2c7
SHA51210d23eb7699fc086d77fa5382fef405670c6cc2ff9b0af705b412b33176660cb58b5aa79a5a1d345f09a4d238dd59d0d83af52e710e5b70f5ddc616f52bd7a1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507c7e571de10a9c85b099e4e8a5496c8
SHA133d76b7f57cf7499415f0fcc4a340eb4c541922c
SHA256e16c01e183058092dc20544d1e944a7e0f1de83865a5e691a6b2e0f3311aa4ce
SHA5129b0fc75f03c94a8082a5ac8f3775aab4c9ee96187a4e514cd20f086fc71a9372b67280cf7bd515ae8a88c8d0110c145010da341a3b0015887203e3cd91c56c4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fc989e80688aa068a0e4df13a7636b3
SHA1bb2662ae3b9796a0ca5003b106e42f06efca5b07
SHA256a80dd3037b86c7291e34a2a78638c15f3cdcefc99ee0c81f025cb45a4ea5a14e
SHA512c9c5fb28d1740a72587e79d66073e0c267e03d260f871742dd48f7f0c45259bead2df051ce9fe8a5de0104a49d7cc99adde22958c1e29452780708a2faa7777b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5172eebc03fd67df547b7464b9edfac60
SHA148aa1085f4bb120a6eb2a9ebae14ad74bc5284f8
SHA256a0c7d51d3f22b8fb0679965d0743d8a8b4f3e649c8ad9f3e31f8e2b316e794e9
SHA51240a1975d39b8d6cfedbad51760ae7648de42b6962163237bcc6f90d1c690dab23f55a522508d5ba2d4b2ec45ae2a21e23a4aec67cf71e0862aa67ff94cdee25a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4f19f8b5c7629361c1fcae1b0ef8744
SHA1b4e66fd3eaadefaa91d92716ed9b5f899fd1d7da
SHA256cd72ab1560a28d9a1ab0fe6c5dde0bac868c55f6263a731edbb5805a49559eed
SHA5129b8a7917387ef80f4981ab1f09c3b091bff90d1f63ba40ce7de3eedbc6722000f3a5458d1c1ebc5e82ebf671e31eee806deeb379613d4285cddb110295552407
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538e27ca2c2a1ae92f1f0a02269ac58c6
SHA1ccb6fecfba4acdf8722f6181651e48e5dda70d97
SHA256d8d3e6ae6cea8ac95678a42cfd04477d87a8d25a860c91d77d558aabbee2dc7b
SHA51205b8c8b4b38baeab596c0113d8b65b2d599c5d3b68ac17cd1ca011f1e9f43b7957cba23debaad0b8e6c95366fcfe984e4b90f1c4e6685aa6ad1e78304f544b1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5519ec831377e49e4f6bd46b377251ad1
SHA1a319b59979ecf7e900b788fafb4d934fa7b8e8df
SHA256b9bec2c58c73545f6175ea7732a6d74649e4e997798c2d3465f0b0de62431230
SHA51299332d557123d2c66cf5e2975a1eb1c918ee486d2511b81aebc3442fc87375b3cd31de3055bf03188beaa9c0fb1706e1fc8b3f294fd38f2973850513a70e4ded
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5237f7260af66ddea9b4bd063c31c69c9
SHA17a49f0c8c868e1b29a976f59783a1dc088ab683c
SHA256cbe858407284aeb5758f62741217888d9343d00ad4f47299e6975770d0415975
SHA512cdfd7e38a5ba7d7d12561b35dac93eb64274caf5d1f5c60fabd4a859cf8823af7b3e272b43bb9406739099462ba6739ad911d3afa295be729ff4006001936aaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7c5ff18d94e0946e9492514f6194697
SHA17d75c5509fdef51cd81b0c06a17f2968d6b43b23
SHA2567d787a8b743a63a6a92a5f52ebf6e137d9a0130953748e50b71754dafc739627
SHA512a2861f61ac09da6065b21db056041a309f7e38f3fe8e636bd93dce592a6cb3eca6a4edb280a26b3720649a284bab7b8acc8fe4e0efb0b6192a8255cefe1608ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8c68fdbdf82013ba8a37b9439b48cb2
SHA16f40574c1976caef24b09d95e6f0a533b0825b03
SHA2565869272944aa0714fd8a9d377bfee3ac5383d66e5cd7acd29236c5e9bd4baca9
SHA512dd13bd9baf5d62f7768dd388da92558e0087717b671b7525fa033c8dd4571980b231b6932827edc02d204b3466f207b9c9ee733205081ffa818690e31c67d664
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510f063f8da36db7b16c17cbd096a5611
SHA194d681bccc136e907d13cbbbcbbde67213773188
SHA25640974476a5928b9fbd9d37c6992bbeca17c2556c530b15b3279a0dd8c4a93c4e
SHA512c8c9776f5021784be79c4a738f329064b42f685d52a5816d1b26ee46fbbc00d68bd723315c5786a669981051ab2b4ac061304d6fc0645855eb5c0cfcc1e705fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e114488d6480969d579c76820609213
SHA15148a83e9ddd4fa1c93a78b82a1b86c550fdc7b6
SHA2568c922b7468eccc17c14187e1a8817671e63afc47e63d9bb99e00790d4bc933a3
SHA5120c4edcb41f7b1379dbc8bc6aebbd48271e0b8c5de852a858ed8d78d11e5d1d677da1c27823e1aa264e88d3fda2a438a9c4e6d2e90ac3c9ab1afad34cd0f0a113
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e7fc97d3805b53ec5bdbfc43953a248
SHA1704dbd15292c4e3c12f455c84456e12635ca8d58
SHA256a63e9d3b83d542e8614fa7d5984b60bba578f928ab5d19c8704c6b74bddc53e1
SHA512a28d4d11fbf49e4a8177cf664d592a703929bbfff7025cdd40bf02ffa6ae8a9328d1a1e17a5df71c14069a623f83d4ba1f78f6b3fb45fe55cd42883847e8ec8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5914343805dbee1459260b5614f64550b
SHA15e931f64db1cf34818a837e834ed9cf0eb80db5c
SHA2569b236578f975bff4d2bb8ec8b3d4a7dfed482e8705e1aad69ff647c9949695e4
SHA5127191ab44b9644206e5e71a3806cf09c4ec06ef47c49f684bcdbbcbbdca98bef8b240b825d89c70608157f894b99051a993c14649ad1c6cb00cb9746d89f9b036
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589744e0335c160a960c34d4307b6cf8e
SHA1fbf2348208b3051e0803faaf34e07ca61baa2988
SHA256ce1b0a0cf702b25d4662ed3482050f70b5eeb589227fd3df22b0dea94f811dbc
SHA51253e2ff2a52be839485ea5ec0f2c457518b107194547e9d2934e955b0fe5e04377d90a2b9d8e654572e9b681dade4ea096c09031a1332d2f2991dc10b779470bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b383b35df75d287b978797999899a139
SHA165f89d6515c9e79dafeb327fe6bbe5d1cf581bcb
SHA25620db627a92d6d88d168706a13eca2932b7484bbc80b4629f3273ab97222df6ac
SHA512b1c31ac422786895693a035fa659ca67a0a9deb0275d82ebb97974d86b6699cbd464ef799d235d5c6b5f2251bcad10fa5845cecbf94c5d47583b0d1968840e60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5448fd22916de11938106abd2c940a491
SHA1e9622f8275033db8d3cf7e1fc3066d5f8789666a
SHA25698e62942660596eecc53be9adcc3ca5adecf5d521cda5790ff848415aceb6ff5
SHA51271eea2dcede8a2779d8177d91d84293bd81b75f76e2ad20d3c6774875c4db51318dd1b4ffc5251595474bf9e547e18969fd86a7f43695ee0d5f8ee342c21935e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a872b3f7b15c9ceaba40e636018078b
SHA15407f47b40d86eebb9ef72cd785408c41c27e966
SHA2562d0cb39e84ba0bda1aa931422054f31f97178dc9e9a4f9af70ce729025fdb924
SHA5125b8242f110b44e6d482a7e380bbf11417f8bf7ffc6d65842b73ee2eca140a2ab8830a063a8230c6c1585d350a76b402075e0bad0056381a05e93a39b14eacf7a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b