Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 15:08
Static task
static1
Behavioral task
behavioral1
Sample
7019e448e1a7da22d2d982f89fcfda9a_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7019e448e1a7da22d2d982f89fcfda9a_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
7019e448e1a7da22d2d982f89fcfda9a_JaffaCakes118.html
-
Size
10KB
-
MD5
7019e448e1a7da22d2d982f89fcfda9a
-
SHA1
f9c9d30711410693ad36c10829cf8c89fbbe5e6b
-
SHA256
58d6ed54c25c4dc24293cff5a74f221c19e8d4f1b2be8b21b0fa878c06afde02
-
SHA512
f3e71905da6ee04b328000c358cd396f7f41e4cc209c9391cb9eef23445596713dc9e13f197ac071e7808ba6e4a859f1a49f680dbcfcb60c3cef06c1bd481058
-
SSDEEP
192:2VtlIsr03FrFY8k/w1wvqVkZF+BFWFtnF7FuFSKFnFw013auBuLbdU8d:stlIcupi/gYIBEvn9IMKVC03aguLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{825147C1-4A98-11EF-A7E7-6EB28AAB65BF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd0000000002000000000010660000000100002000000069f31f79ce205ebb45f31597c0c671dba5c941fc708adb06fe83c1861983b7e9000000000e80000000020000200000008f08907a5c9611dbf4d3cced2fc3c8eccb1f162ab433ff95ed8fa1155b033e0d20000000984752fccab46f21aacc3e09dac93375cb73e988622352c3cc82aa173c2546ff40000000c31d5e4903769a141287cea6f19ae8b8b1cbdc0c6fefdc790bf372cb048ddf81ed4a01e22ca131ad89eeb9072742926e3f7ed03e7683799c86e706bd2ebf7f60 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428082303" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0c22869a5deda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2640 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2640 iexplore.exe 2640 iexplore.exe 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2640 wrote to memory of 2964 2640 iexplore.exe 30 PID 2640 wrote to memory of 2964 2640 iexplore.exe 30 PID 2640 wrote to memory of 2964 2640 iexplore.exe 30 PID 2640 wrote to memory of 2964 2640 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7019e448e1a7da22d2d982f89fcfda9a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2640 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55824349fa4fa8c2c0d1c388049b6565c
SHA1dd2d87d140107f6f6c01b6716fe8acd959ca28c4
SHA2562d4bd407c698d9bd46dbeefba094812d8b8face5c6c8f62cbc723c6da7d51b9c
SHA512fe1e5b26f20652eb3c1de6aca5e961c4b227099aa5f5b78a9d7942ecfef85a3023dd9ef446406280edb2e37e75a6fcf387013954ff1fa73793f1c87c62cd8a09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fec3a483b037c3f270079d3156fd59e7
SHA163c76cbdd0d6451659954360a8b4a8a420a7fbc3
SHA2567c30473169a92dd8c0f091188f107734c5f8a29eb68fcc99eaceeda39339c2d2
SHA512ac29ff32b556c1bc11dd1890c5daaa013c68655185f023eb2cc3d55570bad75cd3f50b949f7d0927a294528a15ff4d4ff10c32a3ea7d984d83c58c1434e9f8cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d3ebccbfb6429d90bc110173f896666
SHA18335ae2bc2ede385753ec80736c77bb79a503683
SHA256b31702dd66271e0a319a97c58649926588edcc3ab2a192a827f3d4b7e2ba89a4
SHA5125fd88def8f5e5e237b7b4e146ae4e383f971349fa15b9e2f9c61a6eba41e045b4bd5eb45944b2ce011f379e6aed28c0d98094fb078fdf5dbfc0fecc071cf1613
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50035362df335482abdded59b086153e5
SHA1e8a2c4ba852792efbc4a32282e0489f1da477bbe
SHA2566702d05f28787da7e51474bcfabef5a1567bc5fa3220cf56aa366f0f0e71d5cb
SHA5124868f93b6f5050d0c5c1ba99b9a2b15dc1d538cb04b5a87ecac1e2a1a379b2d3c509d5b10f25a3f06d47a49f36304a90f2a63a23c765bb154a4068b8c24539ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5980e90a7aab36beb15705154240be198
SHA13391f680958055a5befd2ebdc96caeaae8dba6f5
SHA2561817589f0f2995b9d42c3b9dc749171b1fc91f79bdb66c8607e18ea37d559c2b
SHA5126cb4fe3ed32f6e2c46d4c498ad1a988e6637cb7898a23ba62d59867b4a2be48b5904721c311d74e60777cc49a823b8fc4b6329b65001233bae61895301133b28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52da865013b0ba316e333de5c4bf99524
SHA144ff9f9768f7f0023fa87f37de673dfda2d8c6a3
SHA256b64c129b829d41be704f4924e7001bc69b98f84cf11619ff80e44dbb5dfe5011
SHA51295227eaf0b847af29b16582081fc7feef1f3cfbf5fa1f329c33dca27e00f08bd698528adf8f1fcd538b936f0fbe1b2c743947ed3f80653dc853840396e083a6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c9d767330cecb597e1c4f93d1302c16
SHA1fe31611be2d2f9385d76ba754a464c5fb1c820bc
SHA2560a8107b3825c132a2534611ee1d4de58e9dd34e61c983e2ae1a90da9e46e899f
SHA512e54f203a88f6f18cd708123904be66baee6d75edbecd3e6611924dc51facce69b1a58297a36a18584984d2586b5e264aa8755265fac18d8f603b49c198b01403
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cac6cf8fc9e162aa8a417169d0eba22e
SHA19f00217a5834972484e0cdcc2e288dadacd4402d
SHA256b168a8b3da60d93f9f09d527742564b32c6b8828c435263a20945c6035884ccb
SHA512ebb97082b027e79639d3d75b56deed5da85acf650acd8ef555ae0a8aee8442e512326109ff6e0ab722f109d3ffcd452349b43b676622aecb32c9421ee1a4f93a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d5ee12fa1ed7a385134fb93227ffe02
SHA1d307afd04041fc41f04c0318050b6cbd2f528e87
SHA25690f9084b03e8d0760c2b6d20fc8d03723dba30e982924e266b8fb05b95e8c08d
SHA512c6a5e308b9eaad492475d9102a9e326cb571772b0dfe51297bfc9dfc5a88a7f307a4b7886d0448a77d5f570a4da3fe785df369c8d513b9d4ee89af08beab5f88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2e425ab52a27ff75e8de648f1d0a524
SHA1f985338a821dfab8bd192c22d5206ed7278130dd
SHA256235ce9e76d88e5cffc0f422bb17e042767feeda3761c8402f48d5827e72dfbb3
SHA512e6dd02ccfb5568aa50974610b5a0ff825418a8668a9a5d7821e1dc6599782b9e64313f9cf02650e7cd08344079c73908a69f83186499c16360f05a86828d5ecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f39a5afa114f2f8dc57bd518b4c0122
SHA119dd83fd165f9b1ea612e35ebefe3059ab8f1f4e
SHA2565136fb69e81950854a98e21e6ef24ffaa44c79a52f8151826b3a2fd2cbcd4599
SHA51254150fd08fa4c22d65b5103d144ac38aca83d6cd32c12ae46df11d57882ea5c1e0b5148c728cad16aa30e10720e38b9e7fbdabcda9f0acfb566ede59b3620a88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d128c3daf3fa07fe9bd4f86f03900a7
SHA18aa2769f6cc2702c00347e104632073e7648995e
SHA256950da2bb5a85ea1bf2b5ac00bac57e202dae64f9d8fc69c1eda6fa9ff798aea9
SHA5125ba99a8ffa81128c85fa57a07ade9ae4a6b905b4069dcf5dc6434730b7104e4a9070f119a507f4fd48e648fdbea7195641ba73b7cf20421e8535fbeaa1f620a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540f26dbdaab879153dd6caa8bc664cbd
SHA16aebb55a362c66fea88c3d656a645880b4f01948
SHA2562b4209844c89390ce91df47f129070709a522405a270ee5d68036c6107cf8ac1
SHA512875e76c490efa68d7214c32b4f9326d3a7e29d41735bcad09befd92b4fbca0d7669ca50f34f2ab89c483da9b8cad3e92aa6c3cd2f8508fc686cbe9a330106f2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567479176cc16b47a67cb8e3fc2a54314
SHA1d05b213c4649474e22ef41d52cbbea0c8c37ec82
SHA25699ab1afbb62ce2192fadd013d8fd2c6749aadfbd2f8c757f24de936e46d8c117
SHA512fa3224d557169091e7931c0ee3d106082138c135ab1cdef92cbdfd46d69a092cc47d1e4fd1a1606fb753a23bb3f971ba83523da64a15bc019587d720dcb88024
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3da8f9e53bce06828e69f0c6643852d
SHA177cd36bc5cb8a4035b2a4f67c828f3ebb1d4c00f
SHA256abdc5fc127a751caa6f8315cfb8768b3b6f4993cf00e1f6d440d824ac061a814
SHA512b6b5e60abd3f25c4a5794f0d153c4f224070c11c0d0b22ff504e670f5a760e2aaadc44986b9b795238a1f77a04782cf722fd37611d4b52173397c2f69b46a78e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502662b53a4c474b6ca1ab962717f6dd2
SHA10870e6366cd85229236d6f611b2c4813b001747a
SHA256ec4cca41a62c79d814ca99ed6a93fcf77d14c0f329e7cbead41d0fc96d1900a5
SHA5126a51ffe62c801dd8eeb345d418ddbe22b3c78cf7fb3cf04ff63d74d393c5b4ef2f3a2570fc2af8637c614c966619b54457404bfff9e95a95caab1f8b8e508cc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af05e3ad69111d85058f1b83dd12de34
SHA1ce2b3b326b4cf4ceff49bff79c31144393f53dd7
SHA256b38cfdfc5948abe89c736b3f39e7a175695266e88b225f342a1b52fb1c1f53b5
SHA512ee56a7881ccd4befa367fa000e4f9a05ed8549c24ff65129439acf052281c61f4aba6eda2f95a1eaf79706cf6bcc7c51be514070ba7425492f9ded6ed6fc6b42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb0fe1a9af28e861ca0de17b070d64a1
SHA115e2a4a27d0c69c99bfce908a5c62f80ae53afa5
SHA256c9352e0f0a38234af2bb957682b8be8ecc274677de68a03334b09aa4a479e17e
SHA5125502cfd9d9fa3f83e653b1f5aeb5f0b852102078f862de508216e33ed3b1e3f183929ae28d02f6c96a97e98e6718f87f62f974fca63f34a4480d49f936532bef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5664b71b230081949e9731bad71de5cb3
SHA196f3d9df5000e1da530d63286fe18f260e9bb827
SHA256265d34a27ebfb9194156247d611d85cbbe715a3be01b9b1baea815cd53d03201
SHA512ed177ddf284c45999269aa48e555d3d394092ec07d21526c31b6f1a3280a66e8bf112848866b91700f1c48aff64212afa3d3002cc6a00207da8641895c347457
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b