Analysis
-
max time kernel
139s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 07:57
Static task
static1
Behavioral task
behavioral1
Sample
7331f441ed559b4b68de8463faef583a_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7331f441ed559b4b68de8463faef583a_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
7331f441ed559b4b68de8463faef583a_JaffaCakes118.html
-
Size
57KB
-
MD5
7331f441ed559b4b68de8463faef583a
-
SHA1
fdbc555b968303276e2e1200bb6fa96ebfffc1d8
-
SHA256
1624c1b2a77b107f2c5699373b527429b8e24cb29a56725e4ed5cf80703f9ac0
-
SHA512
2c125bc2de0632403751ada59bb731d26a1118146c3135334002783d6d39b3a605fab6e9d0cb05752c36cf5926061b59a68012d211dd4c038e93df22b29296fb
-
SSDEEP
1536:ijEQvK8OPHdsA1o2vgyHJv0owbd6zKD6CDK2RVroVuwpDK2RVy:ijnOPHdsR2vgyHJutDK2RVroVuwpDK2m
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000003c00211387d8af041410ad2672d217a3febb3b3c20e9509598ef90af284b8057000000000e8000000002000020000000d03f1d66cacd7cd75bf34511bfc426ab0a8d381b4de381be6ce0eb19b067945a20000000cca6a8ec9377b8fa7fbd3a5bdc4efc08aa9820fd7bf910760696f86a24029fe1400000007e26f44b1b984c35cc4bf1d18ff606eb0d6b0ce4083cf94fb406d598bc992a43a0c0b06addfd6a5cd6e498e4cc225dbd60dc16550d503f9e42f47e5320b2948b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AB19C791-4B24-11EF-B9AB-7EBFE1D0DDB4} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428142506" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0c4be8331dfda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2680 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2680 iexplore.exe 2680 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2680 wrote to memory of 2080 2680 iexplore.exe 30 PID 2680 wrote to memory of 2080 2680 iexplore.exe 30 PID 2680 wrote to memory of 2080 2680 iexplore.exe 30 PID 2680 wrote to memory of 2080 2680 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7331f441ed559b4b68de8463faef583a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2680 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD50af5929bee43a91fd3ff273f7947df5f
SHA146786e3a6e4f9077c7c3ce0e24eb94b399591b30
SHA256d8023036439a53e9377f54434bb08979f3c7113871d0445002d5b6880a476dc3
SHA512ac1bd345b8cdd60ba7ea60fb98b9eb5b91d36674e16cc02403bf525668e3189fc4dd908512c299d75426e1f673ce744071cb2e3cf2f99cd6e4152ae4885e52c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5568e3c15ab1bc58d50ac491b585b8e1a
SHA1043fd66986fbb4a043cc47c00487e14af14e0f0f
SHA2565c050d5bea1004b4207e25cc97477f96978bffb7efbb5b5abfd3819a6d7c6ecd
SHA5123965879994241d6b1a457021c54fac69806eae0fdf848af30974f54d0821ed09ce37dfdc4cc5645ff1fc721285d184afcdd4a49acc3768a92485efcbb9ef4689
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d9a899558bbf31beec6094e466b5387
SHA14fb93136f50fc82d814520a7612e9cacc15b4f78
SHA256e988f680aa5bb0715dac18a068b7d129764bf3d8224aabd0135468f080ff130f
SHA512a43b305a510c4ea6ac9202ea1ec38648711117d9817e9b945e57ef699da2b11729e3a683c886b9e453bc29ec035f9fa63a7e2c440ee0c3f9868194d35a8fdefb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5850aa01cb0a39432d17bdb128ecb9cbc
SHA1d054f977958deafe43e9848ff582acd4c831b0c9
SHA2563aeafa2921f9b9eb1dc7debed80e72ee786cad60c23150ed1136cbce5629eba7
SHA512f79854bb2f0c6f6f7c6cfbef587a20f1b459ea4bd507a6feb2b2f835ab7f4b027a3a6b3c1dec3f2d32a4174a50d2e3024d7dc5e58566c4e789a20e801474b24c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5719dcf2826e27ece768f43dbc61e120e
SHA1aebf18186e9117323dd22d678f5ecdbd6cd43452
SHA256cf790ed33f1c55575bf568c7490387df2dc4e9d1e3b1b1d0cc74bb9389433a07
SHA51268cd6a5bf6c991cca0a0e3d5b0d0c3a1aca00bb116093e2ac5bda668d770b918f779c3324c09c53c41ae59498103411a548780198fb71c946fc8bd326bcb32ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53912f6395923c62b26ac92a8693b5f0c
SHA102f5f7c6c099fb0a4cf9210be2f0eaa45fb305f0
SHA2563d96c0158b3b35bba0aeac3aa62ba20800322dd5efa235f8abfa5ddc16ff35f5
SHA512ed10ca4f780edf51eaa760b34a02b263cce174528ccf66e2673dd777a12696b9ac0707ce9e1a0caedfc9cf532641a4a453172accf10506ba9f09ace151528da4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a7042d63306a181d5c463d76cf54cfd
SHA17a790ece0e3fbc457447856f52f465a78cbcba53
SHA2567cce16556142a2000e2889d8c4afa9e68a30424e1fcc052f7c863d5ddca6d424
SHA512ec6e7d01cbec12310a4d27bc60836d612d9c6ae2419bda9e38ee9d3fd38478c65eb7245c3c4f1e26e4e28950e85317deb649c9c2923a822fc8a3f8a9dbe6b566
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b162e08fcf790990b07bdb983ea11c5c
SHA136488ce56c74695b6b48f28627aa15348472130a
SHA256e8b7c77a0f6828bccfede96b7247f58eaa7c38bd429167cff5c1025dc7f98c3d
SHA5121b5ff79dd0775982b43e28dfc1149a72631dde578ab217a979fbbb24b201198df70ab3d516c812fdda127bf432c9ed47f8e981345931c1c3049f8c1746be0c69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58466fe9d80f9352292dbf2ddbc1dba78
SHA1d3bad7e4fec339e7ba130f212414058437f26fdd
SHA256d0a5ea362fe066e4e84aadb4a6912c7b964d21620d4bbbb8250248acb8b356bc
SHA5123e2356dc69f41e7eddec8337050c80f98a194100e7571bcde5ccaa8728cc1db7498a98690f8787247cf056992a48157db875af8a7511e5ff4f627b7f40403f0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589e022867bc6073dc356a80321a8a0a4
SHA1fe706507a2d71429a7cdcd51cee8699f2caedff7
SHA256e234821f4039f47b7bd3996eb9e95940df1a1bbd0ff523f76d95bf4987bc3edd
SHA512126ea4a6a364fe474b2e616ed580f5d03180668bbced2a28f415a08515cf93e5a29164606e214fab32252d8743eefc93ec870f09839130960f9952defec91859
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501717c411983e47536f87777ac2a37bb
SHA1b9447d43d059ce2fb4da46f53e25057fbb92b645
SHA2560cef019c810a9b7c5fad1c3d3184c61d5c1e21a0400f4b35903a88808e9dba8d
SHA51216f118c911e1c3aa3de419de98f5b5649951a1e57783c4d3d9c27d893f7900e02ec50124d99e4e79230e0d81df820483019aa85a4cafe8b60d77a1d352be1f11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6439759eda191d1d4997f956184571d
SHA12e137b94d99935fabb9fa69dc032bcc7c4ea1b35
SHA2563b111c0ae47763bcedccac4a039c4c93046b01d20ea3fb749634d13e5204abee
SHA512132e0607122f9948f9ef71d4b2976dee5b410174bcdb0df45426e1c279efce2b10978943e02bb123cac583e0bebc6e38ca6b567458bfdb99ef0b64a221ed0922
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cdd8d1f2c706975ea04f800f3f3f767
SHA18d029aa9d12c8d3f7efd55d4843e6fcdf0f9bddd
SHA256f9936c8556d644a9835776c67198dc34f9ae8f8a765ef6bf107e35a2dd39ed77
SHA51250836fa09341877be307cddcdcfd37d75d7408afd08bf0d1e3c31905d3065a4a4d88fd9275c8399586fe5d139e927d7d398264b9f4551d41534b025ad741687c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f9912a4eddfea65b8e2d6243400e6df
SHA1bc6343523ca2fcd26ae181a1aaccb5cdf9952aa5
SHA256ef7aeae7c26bd8c167b163074040f9092282ac51f167955aedea98e3726c436f
SHA512b5f8345740acf161e29b927213acc2db5ae4be4a723e5b100ae203279bc580c20f6eb8ca94f4f96f83a7749e380443719d3666c73f6a5f5c4ce4e1217acd9602
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5653e9d7cd80153dcf3aad2768eba5104
SHA125e6eb1ba594d879c8d656ab93774f8fba713554
SHA2569949bc2076e9cf4d4b37a7205b66b20a5225844cff3db415a79a32ba02566eae
SHA512f2bc35f0f972844eec86b5fcdc4a72ddda41d3efb6129800009f8ea2316ea50b99504550735b719e63833d553064e66cccbbd1e8307beeaadf294d5b2b4d4e79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6614564332a85e29466a650ef7d73f6
SHA146cef27417f6a8e7590748ca74e51a196cc22487
SHA256f40aa2bde121f0adef4b66c4036c8d3c3952b13ebe1b809168f033f6aa7b0553
SHA512285ee1d73e1006a5518a45f659ab071578bfd06995fd32386524a6740ef42d8c1712e2146d5dac2af5da9220092a18d1c3b683b956a7ac8484a1e4ffcd5eb01d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\X761FPIN\f[1].txt
Filesize38KB
MD5ee65a4293f1def376086d176203a5934
SHA1307e1a42bd63402ad1e30c7e923953cd0d096d78
SHA256823ccfbb9b21b58f3ca5bf35f17e545432cdc248b4e40d5743d0cbb540ef3e3e
SHA5129fb14ada29303696e298104b41e4c6f81a2145878d792c13e1eb5671cbb03dbc1e90edc5c9a888b1abd752b48bb17fe0cab1c2fa60103cccca26eb60081fe617
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b