Analysis
-
max time kernel
136s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 14:59
Static task
static1
Behavioral task
behavioral1
Sample
680ad9c2bb4ba001d3aefb11eb18604a_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
680ad9c2bb4ba001d3aefb11eb18604a_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
680ad9c2bb4ba001d3aefb11eb18604a_JaffaCakes118.html
-
Size
27KB
-
MD5
680ad9c2bb4ba001d3aefb11eb18604a
-
SHA1
163e3de7ce107645d8384600dcfdc7ebe9e30102
-
SHA256
8d2fef8ea78a431f430b7c2b81ac1d798e0d117970fe90a28f23d4a2704475e2
-
SHA512
154dfb45a5ddf8164b7cebdbc2067ea6c023533a250717f9d1ae6931cef5ef7cd96a6274f11b5f5ba827a27c4563a9c8040c1175aaed7cf13410b499f7b9cd06
-
SSDEEP
384:x53H8mf53H8mf53H8mKZfQj7jpPt9wkwxwfTZ:x538W538W538l07jpPLwkwxwf9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{32268201-4904-11EF-AB71-E6140BA5C80C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b700000000002000000000010660000000100002000000084466a02183218599b9d3f69c10744e60a13ead88f916dce6a77bd757d0a21dc000000000e8000000002000020000000210a920d58e5f86469ed567d3418cd0d84e03961b5360453e1d6ff289ecefee3200000007064c90c086f8d70ac1f54f0d896000d897dca857a8a7d0fe017977dc400e8aa400000007bbf1559dbd7666b93ba50a868c7aa89a621fcd7c1bbd84f4ef39205d6fa61ad3316181b2808ad0453b399576ed99701bdf85ba4cfbdae7bb1df8ac8072d293d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30a5950b11ddda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427908653" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1412 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1412 iexplore.exe 1412 iexplore.exe 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1412 wrote to memory of 3052 1412 iexplore.exe 31 PID 1412 wrote to memory of 3052 1412 iexplore.exe 31 PID 1412 wrote to memory of 3052 1412 iexplore.exe 31 PID 1412 wrote to memory of 3052 1412 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\680ad9c2bb4ba001d3aefb11eb18604a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1412 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5d0b28a326bb565cc713a8259d1df60
SHA1ae1e06a0e989086e27a92654f8e9afd2744a9fe5
SHA2567f4ee7791a68d2960f089e272b5e441fb699479caed93821f4a1b92a82fbac79
SHA512650454a4187ff4f7082e65fbbe858e09ffa38673153e865c4235e97987990902b41c238a486dc59b6f3609f8df2e97125d7fd63750423d41108e12352d68fadf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581619fc8fe92a0bc987d3c0a57bd2ed9
SHA10530c644f7039f225f86f3590355c09a734bd65d
SHA2561fe0b75e39547118544394157f9e60635062fa26c975a77a23b63bb7765a97b8
SHA512a3b0512880811782a4277bd9c7bfeb28008cfaf88502169acdbcd13fa5935af409dc155fc3ec370ff7058aed3efe96daac640c9c27b17832c09906205b56e1ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b21a9f50572ad99fd70dd876f882bc4
SHA13bdf79d07b8dc4a3c2fab0dc06b53e64b226e128
SHA2565ffedf0265784fbe184ec29262d08a05f76f643e6a53df49504c39fbcd4b59d4
SHA512072560e627cc5e72b614632c1c0db6b96e8d68acec894cac26e89e4fc254e282e6e875ae8a8548a0466a869b8538f880366e7938e9dacf111d422b883f43cd65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b974473acfc8bffd8100948baa46c27
SHA1992df596b5d2551bc1bceebad328425afd99e738
SHA25633cba19d1778b8209a68d4af4d567076bbb152524bdd8de8a3cfa4b4932814c8
SHA512e40dede7b5773e1db52c3519146763393bd6ef986d976b4fccd94a6e440d79d237a6dfc0481f7e7332435e43aac9bbe2dabc617d1a875ee7ccdf8cada184823f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558f059833a8f7c8057acbcf429bac1bf
SHA148a657735d04fc5d0e714ea1b059b7af5e5d1860
SHA256e721da5785dd22ffac1e6d2f9cbd95ee696ab6d164e8e8b2c55e6692b68c49f5
SHA512023f5b11187d3d4635fd07d22be4fa2428737957005c4c0e41052edc675c97803654cdedd22c1fbde6dc33ae3dceaf85a78e52c0fbafe6cdd29d34a132d2697b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbc447eee1326229e50538d9f69a74fc
SHA1547f1870e6ad558cb7c4e39be4a8f1b2554b921e
SHA2562a0424f6d2bb70e5313e364b82886c67d416f0c7b856b3d1f2e89f975d4e47f0
SHA512f849547ae49f544f69e42df0e823f3706f629bcd41195c9e1e998980e07704cad397b2d7e7e23a42d2464dea5f74e913588476d2576e42f67f3f8826dfbfcb26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db45337658747d10733ce2c3ba74538d
SHA156c9bc67f1f09efbd637f3b15dc3a9544f397bfc
SHA256743ecd78e878c28cbb57c72b0a1fe6d59544a5d6b997bec9784c735894e9b392
SHA512ba00d5c0e579cdb7564ac73299549a9212de42a1bb5b56f4cc90bcf4156ecdb2ba20637280dd0c5e97165405dc7fb6fdf66d1092c7b29b011f84eeeeb4bb68cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56db6d1342568da616b396790d774ffad
SHA13feb8886b33fc021b31064bf0b80ff29b139a318
SHA25632c524f1e47afb18ac719f8dde46d90a02c3609fb02ee87094c1aebb9c56c86b
SHA512127c157a3e79f798157d56802c81da7415cdfe1bf571dd1ff0b5e391c4bd04e40f12cfa8ae0b58727d02ff40562aec636ffcaebb9d96c2051f3e7df1ae7b798e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525898c8dd9ad79b345cd7bb1dc8f71dd
SHA1c45ee23aa3f5dbc2d8e0ebd6186b61a124158bbb
SHA2560ae9d7e2cbfaa552196f1b83a3a67ae06364d9b1bcb9863380f2a54bd24c44f3
SHA512c0f557d714fa3c671c0424d9b3bae1cb77345ee80919230b80dafeb157b61fdb14dcf975ecb3493d7b93547d2e46d9cb53fdc6bd9094584c0791ff0ac8563be5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a5edb0427b2f4e89012fcfacdf68cc9
SHA1f4c31f0dcab30cb52998177a336eebfdde31350d
SHA2569f36466b96b9b6682ec1d1784b6dff3afdfd9d27d0f38165ceb10db450129772
SHA512ac20f6874c84f60ed2c6e567d0b0c2b43b893710b8cc639b63fd5ec5d95c7b6932634268fe2209c14745f5f84c71fef86e7f92c59bae023acf697c5659237f9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fd9e81096d992d9e341000a8adbd3a5
SHA18e088d9747fcff9f764e5cdabb98d5274c49e435
SHA256eb8f72a34db2d0d78f734f7e656b50229d95fb061bc659fbd0ca295efe56efee
SHA512147c5beaf3fd8b2f432956dfeb43261eb7dca6ffd57e40aea3de49fb88e2ba67e784270cfca1a2c9a996bd7429565368eee2312a696cb5572ffddf91ac6c7c3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f30c31e06dd2ab291a30efc390cf26ae
SHA14b7079987a87bc615b5f43f18be5384dc28ceeeb
SHA25689320e3e34ca545895327475ecb64a0f49745ddb3792597746bbfd6838407fc9
SHA5121920f2929533807217e893d6d3255c006dd29b6329605afd5088a55704c2da924de12634105c65e46b49f1993549cf9b176af80751127ccf42afeb4376d5a392
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5589cf6449d82b3c2275e161718440812
SHA12118d4f6f2b99ce5fc23895bfd5a8b0d45abd987
SHA256842ca82ec908d805f79fca9183ebf5345726c171ae41974370b33ac6b9541bfd
SHA512b4c3c285fb1f9e68c4510d248c48c0e4d68f4d6eceb259310af7339a69701d6faa2326e02a090fde8b8f48f782107dc44d0aa08b922c8cec34b0f7d94b5dbcfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb9330c9e245e36ad9557ff6ae20504e
SHA1b0499cd5a583f5eddc9d39d75333f2413fff1639
SHA2569451016500c032620023e04a861e719a829604ce8a753f136263c2d478ead345
SHA512604b6c3f1aebad8d643d509317534c0fcfcf28eeed2402fd3e5b0c06cde0a616ec7280cd892851e919d00cbfa959bb8d28990c0fcda0834769de41a21eef725c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a847b5f9924f3660a62f141b910528f2
SHA1b8baa07cbfd94fa07541b889551340b1af5e9c28
SHA2564b56db5ec65d005ef95cf88f369ee7d00a3d4b40b007577e5507608fa95d1ab1
SHA512d55cb003d2a4679299c5cf50583a2ba5c9e1e44f5931e9cccf3d79affb696dc107a1ab65d07092182fadba3d23889ccf05140fbd0716378a8dccae5200a1a54d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5542dbbda8a70155d03e416cd73923a21
SHA12e514ad01b4e0dee06d451fb8b1fd438040cdb77
SHA256b9c52f77aadc58cb3a154af91f57c6f5a822abb9ab4a089dbf821a776206c40f
SHA51242ec7cf02552b849a6f258a7c0993910c398807e97f98df624af797d36709076aa39340b84fa1aaaaa8bdb851dde639f90f1b80bf6da952df1c5d9022571f378
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5550db699e42cc491232ef7c7e39b40a4
SHA12261208f5e37f69193223ba6b1baf3a3011ee052
SHA256bff5ad09e9c8e36acce9949a2334a71146426f465096db9e84abf0b00f1dec8b
SHA5129cb614d9983418478c7a1727316bb9814620051eb57045c26c85038b3d955038bf6941f50999cafbdb2c88fa7e076f72553d3b595102a05275ffd0ac13591fa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e524a7d7b77ac75c3ac6847141fa8b75
SHA12fdb4d632ccf2b25939231b6346fb974c177f359
SHA256a4c65d9547fb5f2084c5b7bcbaa4b510ca7a5e4d4756cfde9054620f1ffdedff
SHA51257987142adeed00f2a743f1bc3efe2e7bf5a98131da6ada7fbc3749c40c3d3c017cecb733e8ca8d6317dd9400589ab3519adb8bd4257b8152efec300ac9d8a8c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b