Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 20:45
Static task
static1
Behavioral task
behavioral1
Sample
75a7510d85e41a4dafd1f9c6e463d4f5_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
75a7510d85e41a4dafd1f9c6e463d4f5_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
75a7510d85e41a4dafd1f9c6e463d4f5_JaffaCakes118.html
-
Size
44KB
-
MD5
75a7510d85e41a4dafd1f9c6e463d4f5
-
SHA1
115d3547f29e258e69691d2ee619bc91dae8204d
-
SHA256
4e49280b0389f4f96d55c6b05784333b0c6aaa45ca1a0bbd5b44f2a5d729b13e
-
SHA512
9e44302a7ad96d62bb1fc45578292aa5b06087907f8c74fa397de22d2127c30cb7b0d4abb4d06a73c7a9f05c7684a056818ffc064db35fd79b3df8fcc2d4cfa2
-
SSDEEP
768:cfzxjBYUa4ghTWDblS6NHEkouStLewWTZnJe4BebuNd+c0AA/8KesO7pBAgerhW9:cr0xcoHuW3mVeuNd/K8KeslDpw3So
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428232054" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd0000000002000000000010660000000100002000000079378e1fbd9f47f58a2e9e0ebe6830b25c62e40c73110b8aaf1ccff43c1b244b000000000e8000000002000020000000933624abfcb89211222e765297e4871a86737a73d5b42ce87a863e99229a6427200000007a1380aa3c30f57f13068e156c0952946a51aedd38756fb6cc0845455a512989400000008fa0dd1e3fd7b4f92e857bae77393ab00efefc509dbe06d7f9017b451383f4ab7b9f78743d7252b102f7da5243f3ebff4b860e89a16ea144ad8a59cb5a0c707a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2CCF5A41-4BF5-11EF-A19A-DA9ECB958399} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000409de121bc41f6f419d009513e72c20fe28ec698db34d9d2b285143a3a67d133000000000e8000000002000020000000d96891f1cb0ea95e02a4f00a3baa76059b5b76c774c4758ac5e28bf593bf3cab900000002f6cebd37c22ffc34a40915ed75070a7fe32beda23e5661a63e55088652321d8575400d271167634ece0066a00a6adf5a5c0314b6cf250ae7322a800c448f29aed10ff3937018ee5dd291aad5da586066467b25d8e5358fb56844bd015e4304f77f342264230bb0025bb0a67b07a61ca993afcf4960816b83fa34e9a3d367ad3f1758cdd48eb79997d4c6383afc51c8340000000fec059ff95ad0aaa76f5751c89eeb4cde42dd81e73f341f4221df54372c7be0b8c4a11490de8bbb5b9dbc9a7339f081c1ce84958135ddc168e11bdc74a1bb504 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0c48c0102e0da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1528 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1528 iexplore.exe 1528 iexplore.exe 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1528 wrote to memory of 2116 1528 iexplore.exe 30 PID 1528 wrote to memory of 2116 1528 iexplore.exe 30 PID 1528 wrote to memory of 2116 1528 iexplore.exe 30 PID 1528 wrote to memory of 2116 1528 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\75a7510d85e41a4dafd1f9c6e463d4f5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1528 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5556eb78238990b2bcf7e9d44a9ec3c20
SHA17cce785b8fca43b6f7a68e2419faf7602b1ba324
SHA256d457f5378e5c7e5b8d6111f47bb450969ce94d6a94c93876d7d9499db15af020
SHA51207a762727b2c31e177a83306310f67d7c6d07a0b460d329560a6e4146ece82d10739f3bb987cde38049ec4b46c3d691a15c6d96732345ac7c8a0f5c7674c5487
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544432b8580286fff58772cf84dd2cb12
SHA19a48929f4883d452f3bdfcd4b1e80e105c907687
SHA25600ec8c4eb2566d56be668757a3bf7cf61b67329cd88f522e5b369380173334d0
SHA512fc64d0f5e84ed2fc08bb0fc4ac00973d992970a68bce34ba1330fbae346c552a54f6ce29f03048acbf76b0d910a475f781eafd7045f9c868304fc05a4c84b138
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5277b8e8a8576066db7069de6c55c69c0
SHA19dbc3ae0e5a62df954ae610aa7c6484b04d8acb3
SHA256fc63a003958fcd58ebccdf8064b046e5df6ccad12694bc9b488623853dfb890b
SHA5127704854e9b375db7617e5768043f82a7463cef23d3a2d3e815d98a88910f0d303b69a2d100f0ec765f2ef1643e6597cb00cd580f3efa4297b285ae9bcd163f55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597b3adf7eb5f6b69fe15b6b3f87bca9f
SHA19fb71c330b092834204e432691513f249a3ba65f
SHA256f60a138097ff360c327912d254dd6961057f302defc2278441131e4e7a773ce2
SHA5129eb0b0299c046038b7146e64bdb3d1df77e18ceb5b785277c34d3b3afe1d408b7f120d445ac3dfb9a8e6424fabefa267f9d755e7708f50125f25d76a82729c26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528dcec0d8c54f0587718fcad7435f771
SHA108fe039feedbff5b0c045d84e21584e958178f84
SHA256ed9ae954195fb85563e9e0eb28f18b932d0ddc422f69fd52d0ee9934674daf55
SHA5127b7a6afd4047d23dce0d92ceb09d2ae53c06fb04ad9130c140484bc3f3119d79cad461a26ee95e80f638e9bce8e04c77bf91005661e011f0ae43759853f1965b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509c035850fc0f05e7edad229ebb0c688
SHA1a5a2793014113ebccb37e4b9a2cb022bad0c5852
SHA256396c2f2ec91a94cd1978220813aca97b9e75f10a705faa3539188e84171a237a
SHA512bc8d0437a83364bfe22243df0e2940e763acfe49b351c715fb05e526e8790ff1700584d6320a83f9d9f20cbfb34fd816b33d8b893f221f413020fc10aaf1843b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5acb65640cf1af6e101d1eab9981207
SHA10807f5f44a9e21c45853c4f38609b8f54c0e2048
SHA256d0dd3174db72facdf7ac62e48401d1226a04af0ce2e9c27a4ef03fc18494096b
SHA51228a90d24bcb88ca3a14bf839c43e42d44159266c25761d3a87f51777cd94d3787ff85352c938389d2d4da4dfa0747a614fb6325b885400d6a77864888df81a4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5000d6c682029c55c30e4c4181b926ab6
SHA15711bc7908153a81b2ff6911fefbdf8145975123
SHA256be9c68464d42d0493250abe91a2140e3a0375c922c0a66af2843d25400a84861
SHA512e4427a87724b05cb93bcfd388b5d30644242acb1add6af6fb1a77a0057c18c9fe10369c5aa39661d672754da5276a1dcc8bc00e6d31656dee5993c1b74ddc3b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6a8da64291e052543f0c06377f1c9ff
SHA1888bcbe24245f88969c4195b601bc5e18c65a73d
SHA256f2a371f1ddfd61158d824b82e3941430ee5dc37c569636a27767d91ee019d643
SHA512a6d85800ddf1f6f0ac1c545f74f019acb6e462155b1a092d5d3592341cbc825ea68d6928db7ed695d5aa9f658a1aa2ef6739346bbf230cf3bd3ed1970e9d1579
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f70e0b52e5c074f724653903313ea1f1
SHA16fcdd210983b06ededfc7d602742e66c9dbdbb9c
SHA256ed3920c0e2d911ce96aacf46bb251b46746b3ba174f91a2d649d9913874623c0
SHA5127d08a28bb6ac2fcc1aeb47bf9536191d5ff81b9fb9d70ebd2b8c2384ad82a93c7bbcfc60ff26281d293c365a15030d81bcbc6dd6126be45c991e9ed679907cc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab03e3d0526de55144e2a0c93adcb540
SHA1a25fb3d51ba87a3568ff987977626d9cdf3d8b8d
SHA2569d14958d264c16f2735dc01e804efbdfa4361ee04b5b6458315ff896b8744bf1
SHA512b5fdfc108f169457bf48289d565d07600944bc5e94e0cad03350c2e47bdca4b480ef55e446fce76c0a04b8c6c1802981f672f75361e1f38cce975c5e400b823c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0f773e0adeca89466d7b93e70df3abd
SHA13f924a3c77c7cc413aea7eacd63458b78cab27e2
SHA2560df39558435b172caf7dca444cab1ef9e5799d084cfec371b4a9a787f2484e64
SHA512d8bdede0f16bc75c8cdd90804be199d0586aa9c8e9d658dfd9a24389ba3139f0b2e464cd7dcc3900cbfa3c6d5acd3ad7f338525cfa7d8fb5d0b39fc4f4b4ff9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb6f569645889c6fa21c4a6737aa6aed
SHA1af2c5d843dd2c5780a19d8db5ba9673453aa36d4
SHA2566560736bfba28f4bf3cdbd41fe52f0a1e27e4fb21edec4d36ac6944fe10d5d81
SHA512d24b2967c70498ce7168bef178eb9c516230d5fe5d3945b3a1f1b2c62d1740206d51a0486105775e4f8fe61f7c9a5fa866dd25af5e60f8978812e5f389211391
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5202838159b101e6fe96339c4b1a9a545
SHA10684a21e76fdaf2f8f8c1fe7b8dd04de1ca65aa3
SHA256e917acf1c07f04fa00560fd9c56ec4cd39bf9cbd5a0ca447d908e56d1dd89f67
SHA51209a797f5bd96d6bbf24357f88ac62001b68cbac0df7f485eafccc577d72a340e7e3be6a0e8a9fee5fb67aa16f59060ecbbe29282f3f3c93dacdf82c3ce1c1ba4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7ce4451f07faae31a0aef1e88375c01
SHA1cbf84854a18eaba47f663caf964f779d4c66a365
SHA256990920f9b5b7f928594fcf094833d33c9155ddbd8b2c4f054a474627d070b5f8
SHA5121932ce77e99015128fc7095f4dddb132dc771addf28f9f960fd94ba731d01a8ea8ed11914a22437da89a4376aedb627e96e2156ab305d7a126a0db944c7dde87
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b