Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 23:25
Static task
static1
Behavioral task
behavioral1
Sample
82256a2ac6f0985b29d40807ccd68d26_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
82256a2ac6f0985b29d40807ccd68d26_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
82256a2ac6f0985b29d40807ccd68d26_JaffaCakes118.html
-
Size
9KB
-
MD5
82256a2ac6f0985b29d40807ccd68d26
-
SHA1
e3c12463aaac30e6f9d269895fa786bbe8d4d219
-
SHA256
a0648e62e4ccca8565f26d85f2abf3d7ac9dac456d97464ac2ff3740d869bc81
-
SHA512
d377b54a130afece0c64049c01e9d4903eb7aff8526da5ad62c0e78bd0ff57bba2032107b7e3389c8722f1d6f5929b596031e99420d891027f831e0976c67763
-
SSDEEP
96:uzVs+ux7WHQLLY1k9o84d12ef7CSTUBGT/kPs2pUlVHcEZ7ru7f:csz7UQAYS/IRUPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000c6e5909b658f8bc8f4af01771ac8583771cee03805d9cce5200e200804ea73d6000000000e8000000002000020000000c527a5d8484fc734a64e66d350428a8126d2e0aab15e0ddc421693543c5b474c2000000032e1b065a00f68e4e2aa1fc4282ed47b77d2f30fa14473fb1f1f721e008f69bc40000000be757b23774e7de4c95dc37801c62eef369621a00e076bea9cadca5addb67acb3dbd6d2b481774b65222e3677806016b890d4addf0b390602368faa1bfdcad17 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 309e60326ae4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5BB87AA1-505D-11EF-81CE-7667FF076EE4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428716605" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2456 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2456 iexplore.exe 2456 iexplore.exe 2236 IEXPLORE.EXE 2236 IEXPLORE.EXE 2236 IEXPLORE.EXE 2236 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2456 wrote to memory of 2236 2456 iexplore.exe 30 PID 2456 wrote to memory of 2236 2456 iexplore.exe 30 PID 2456 wrote to memory of 2236 2456 iexplore.exe 30 PID 2456 wrote to memory of 2236 2456 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\82256a2ac6f0985b29d40807ccd68d26_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2456 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb451d2f0b227615af17b6391040847f
SHA1a9c207d5c6cefe0855e5190f4dc149a32e941a13
SHA256432658791ccd981f1d868fbb06074026b95f5bdb01c60ec39154e0a797095410
SHA5123a50d6ad833467955dc0bb40c6fbf72139d2ad15c77d40cfb7bdb87a67b6f411ff47a6051a83bab032147240d5b2ba5e8032a96a4f62e52af60d24d1ec1035a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b31003c506cc3805b2cc658e98745d85
SHA108e6402b759c5b2d2fb06688ad2f3ebd14e49abd
SHA25639ef1908cdc9d76679b03a19c7aeaf4e4a597505759b8d601eba1ff530b5c3fd
SHA512af9666a82d449d6e09c7a9b51a6bc6915c61597ee9a7eb7747aab58ccdae214598d4c059081a625b1424dbd16e8c83cf1b43f83fc570f44b4f5e1529a970d0f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce0f43bb0fc8ec118e2a368c37422966
SHA1ab511ccfab1d7ded8da2aa45374b01cbdcb416ec
SHA25644a8bdb9378ab41eb8de9968cecb9afe935007fce95c9c1286d50580bd1ac23f
SHA5125cd80d81986789830de87637cfb8cfc641cedced2e631eb8454ebc92dadbca3f38d9bfe5cbe8e6991d33ad355689a5881f23b1058fe078e097308d82378b73a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57700ca9a2c2800e23ef7131189aee81b
SHA1b54a7f8e302b466728104fdde9d45b11cf627642
SHA256d68c2bbdcbd542ea6046d14633b21e9f54d12fef444c106ab678dd0af8b91eeb
SHA512133978d1b92b0468bd4d0a88bb10c4e688e581ec1ca19100d2461971353d059543ffabec26366e05cdf172f1ac8069caf23e97e82655d87bf30b497ddc99f232
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f79e0b2d8f01ad14e91309b1101599c7
SHA1abc8d4c04aaf020714900d377648b44829e2a18f
SHA25616076a3dbf4fb8444a8890729d088beab34346a6001cd865b0ae48b6aa38ee04
SHA512aabc3cc47ff8a945bc1c764fa405e13f4b803b11b3475b1084c9511b2b1fafd46145ee4bb84e499dfac7ea618d4a53ad643e713ff4b0a3297507889515eb6407
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551ab738d42cff60b3d433e26c51aa5b4
SHA111b9fff993878beb11c618912812f0a97ddf3792
SHA2565e8d8f3dc76b450116d3606bc48acdd4e8175b7e73a5f2be8c81e805e24878a3
SHA512a8a77c9ac2154fca473aa0ce90bc640d3a081e0b90112a40c74931705aa163d388cfeb262be80deaf017e0021ab392c9b5119ec04c255cd734cbfee082ce8ce1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c5ce883058cd6e465523d368ba8dee1
SHA13829768656434fd009afce06f5c0b64d15ea9744
SHA2566a10ba218574daa2a980685669c1d52a40777355ff8c3f88438ac93588fba1ba
SHA5122f2892439c27f8991cf25111b5efe2e5c3a855f87a590f97724e74f0e85a539c8ec050fce7643e78b79094be6f077ba0e0ff9324ab4f29d81958ad7ec39e1d3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5754b7ff34a1ae6fb6665f735800275
SHA19b451386edb60a4d95b3cdcc22167c24c5a09e43
SHA256ab222df9318db608ceebe7fbd3db42b9a9c2088a16a3d23b9f6384a5adb46d10
SHA5126b7a07cf36e4d5dafe96e20743370799855c5ee22bbf51f812776c7c4b229397382ec08366e847b68bb434338c02fbed22c67e9ad74dfd6a3bdcdee54824a66b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558b88ca36d02e81afbf941e70533eb52
SHA12816b3b09d50bac74815848141799a93dcb0851d
SHA256cf2b5a28b54c0114ce0815fb7e1b7556b1f4e8a1ee2c9ca9482989ab7cad19c7
SHA512ddf0ebc37025db1882b38633ee933b0e3ebdaa6b5d4feccae494861863d5a2f86e782b74dd26f924416b38cf4c2ab1aa777d3f322053625982872444ac38a8da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e5a483ad7fe64854f4d57ddff1816fa
SHA108f00223f929fd05603515a3e784c41c50b0a031
SHA2565f4967810a6a9b30abe04c5f50c2d364c47e736989bbbd388ac999dac891210a
SHA512d4b60db2ed14c15aa8b8d658de364a42a6e4127fb96cdfcf43e1264ce9bb2b5d60f234dbbc67638d30d12d952f5a834e4166f9949472b64b09db6d20780cdca2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59518ccd711bdbf41680927e6d3d063cc
SHA184a809e6a2e0766466db92693a2445168727ebf9
SHA256e55e5e38be8d129a86cd1acc13dceccdb625007a81102ed2e94e86922bbcf2ef
SHA512db488f9e7bc69fd19dc6dab00352f419a3e01935383f447468d20e6e8ecb718213e85db0f9cf3e3c31b3ea8631ef3ee13b9e89c43989d084290cba7750f0c493
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51528451822e8893684224740ba75b3d7
SHA1176af302935b28017d8662ef3144ff2d082609a4
SHA256ba5cd19cdd14d9f24193b91f36fd41a41890ead44ec72c0d97b778fa8e5edd2c
SHA51235901aaeaa0281d992584bd52a6fcfe27a7c466e44f54cbf00e57880fd7a4b6e26e31bb5cf6d3f447a899a063f909b8273fcec3bad041de92cc99647453715aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf5d15d9e8b45cc3ba6d934dc7bb9db2
SHA1a694ea66338960d6c469be72189801ab60d9c4e0
SHA2569be8a34424170bb5df0c6672fe5c6e263e63d2a1ebb13d19a104388c7b62aa43
SHA512459db6bcd316fe3d7332c4fccf4a55bf86f0ec0c27a1495e127ce75715105266e1e0efeb70ddb42815b14181a01c7e7afaa16334a8db42a05a4fbc31586151b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a2996b484aa732296d8415aadff93b9
SHA190ad71aadc7e555ee4d800deb5c5dcd34b8cca80
SHA2562166d20082c030c147f91aad2c4a44dd2b7a8906b02ab6a90e5995dfdca4c569
SHA51234f6fc295b02bdfa6d00d93fda4892f76a84ddf4ac6dc6030353b43703674e5f486ea68bfc83589f5e545e107de09c1b8f1e436583b86e516df8bb51142479de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec1e3a19dfc6c468b4e78490b6c864c8
SHA1c0db76f0c68e631d093d137f3c07ff97577414ff
SHA256a4ee3000d622be3681fa4e92ffedbd48ce4311ca51633ca8bfe2380ce15b57d5
SHA5122fa5bc2bc688934b7954a5fdeed526d44bc6990e163430f1ed6bd1cb66ef57aef03a442cd98acf22d8e6b700498bf673aa878cd94da9da363342a5aa2da3da45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f56e8e835191c4401878d678030d6517
SHA1359fe30c117edc2c8146ae8cdecaca9468526b48
SHA2564ac5e76b75819379ee229afbffb1514b3efb0867af5e086b57561f4538b074d6
SHA5123c5a449a6a11e82cc27f38d2f756fb98cca97edfad5952eb560551791917580faccc12c001b0e67fea56c1847a76801ab5ae1d693d888df91f86d06efe7518f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d32f79f214303235880bb459d81c5d78
SHA1a06e78028400ac370a3dc7fa2eed1fca7f3787c9
SHA2561145e93f9cc35e9b3159615c123ea980ac255a761c54370aa4fdb9b768f8a893
SHA512720d2cd95a0288f8852d0086a0a5ec2a44e6102e2c4b32e0b9d603d3c949f067d9fcfc2b5cd6812b8e768f6798b072743b8ab5eafafd253d4918a9c009321793
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50050f47165088f2077c09d48b869a607
SHA14b13bb7cfd5b166c5d247d3cb62b90448720bb3f
SHA25666177d01e9bb4a0f1ebe2836e0289a0eb10991132c456688c546d79bd1895d95
SHA51233c6c163432ed0bacb7ae0f4322635a56dadbd8acd29abc28fb80609824525631213829bf604319988279c6f615c6fb9c4e8de9d870364c66c87631c71a9d06a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520e005ed457d6500fe30188b58e1ab82
SHA1cb045f2f30ee4ef408dd1f0ae6e58a17c16179f3
SHA256525c1d770b22b09fdbdfb5c931779af59f5572c81a609923f7f1429c036c1d93
SHA512c0ddad1784181d4a97e8d4cee671c9c1137141bbfff97d4523335a8b42f8f0f1fa4b3c80608fabac405104a5a62eafea93b78202f4f6cd1fa90969eb2eb69880
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b