Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 02:31
Static task
static1
Behavioral task
behavioral1
Sample
82b588492e56f4af2754e10d4091f380_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
82b588492e56f4af2754e10d4091f380_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
82b588492e56f4af2754e10d4091f380_JaffaCakes118.html
-
Size
171KB
-
MD5
82b588492e56f4af2754e10d4091f380
-
SHA1
992447596b9b80b25efb96e4d117d16c68ac7121
-
SHA256
02fc19b7fe863a41c62e3601e9c34bf6d506308ae08eb4a990baa1f82bdf58cc
-
SHA512
bab313b71c9805efa076078fbbe8f244c3c00abb2ff892801fff9aafc26219070d15e8be938845d0277d48869fae6ac1404c42afdb7a5b752cb1c5f935f24183
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fch9tHA3xGLYgeugcZDiKwep:sIesLC+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428727739" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50f02e3784e4da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4823C9D1-5077-11EF-8153-46FE39DD2993} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000001c7c0880163e1d9ce6e52b15a892211c175c2422bf2af24ba6995680b4659473000000000e8000000002000020000000f09e5a5444fed7f97c9dc9ec2d9025b7c7ec84c5f1db39a9517800b6b6dcc25f20000000367111d7d21a03bb5cb2c804070bcc6c06accfc70e6beb7024fe675afe69f8fc400000009f58fd565e811f779ae215b2c10fa823bd36ffff6f9d0b72f699ca7f8e6dffb0f47af6e47502493c59db0287b5a702ac846d2ba3a76955c83abf19d312fcb46c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2412 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2412 iexplore.exe 2412 iexplore.exe 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2388 2412 iexplore.exe 30 PID 2412 wrote to memory of 2388 2412 iexplore.exe 30 PID 2412 wrote to memory of 2388 2412 iexplore.exe 30 PID 2412 wrote to memory of 2388 2412 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\82b588492e56f4af2754e10d4091f380_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2412 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ca0adf1791a00a653db4e595876a01e
SHA1c487ea88218f5b447bec4a2f95c28086a8705334
SHA256170d2b9389f2ebff43bf0b5c4a0b509ed1ccb39af5b2442e58eeb4e5a6d48f97
SHA5122423a0ef49275371d8e4ed375065d9088ab24b113a6f3c444246eba15c52327bc69ef9818594b4626a6e555a2b0f5189c0cc775c087a3bbc4cb5315b66554358
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f53f23ecc7c5468053f55154ceb18230
SHA14b68912e51786097af0d68c7b93d72cd51413572
SHA256270e54f47a18c8daf0e75bdfe2106b8e2ea1e9051c87144a8cbc2fb3c97b35f7
SHA51278ec9624ad414a7919f32a346c8f750ed9e4de5cdbe6b8d52582a8629b3c26af83b883c5de42412ef975a753162db33003967e4aaec895b2703aa9bbd64422d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5787ccc59de0078f1468489788a43ae7a
SHA1a5a41db92143dd3167fbef13c115769be3b7a126
SHA256c627d6998d28e5bd0fd9955393539968e571d1cafaab86b62e3989f5f4d1599f
SHA512b2d8e542d3d8fa3b2547c6a1a0c6c4a64eab8f4c477b7a0c829934d8db1b4a542671ea9c25f632e6c5b977e3b7aac103a9075b4c6cff1b24d4a65a950e8a3140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5106118f7aba4ee354a6b87171d72a7cf
SHA1ec275020b6278e25f5bf3df59e62334ce8365d46
SHA256bf718466afb91c8bb5c2c748b45d22c044176e2274251db6ac743871e462c3d0
SHA512309a8449c902f0b61cb881ced1de3fb4cc7eb7454bfbacf83c7a88906800681d1d391290e5bf1a604458ea9594b44b17dc2905b117f84367e68d10fdd84c8d7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550c629df3442d7431d3fd1a867580b25
SHA1bb789be7ab2c2ec9ab0fdc0b342b4b24725ad7f0
SHA256f04b29a19c2ab79c01b0b317a34839f3d01085e4cf96a95753cb034235c64597
SHA512435c3f8da7183a9852f9ca8da550ad6333f298d6591423db3437166484c06001e080397ec021104ee23b6d542a872f9fd390a8b9e44b48741322fd74c8733c5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cedba9ff144057de16918fbb9498d52
SHA15aadfeead7a58248ec0dcf246347682ff082303d
SHA25602c2df3f865fc9fa71157bcdff4e19806598ae484de52501bc9769c49bd7f2c7
SHA5120231590e990dd8052de6b2788544f83baea0d5b540c7cbc33b2c1e123180811e05cb4e924213226f231695040b77ab1f81d1db204b4f114166dc1348e612207f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d468b0b3a2f7d7859a616a838d50aadb
SHA18f1a3ab74a672fafd8a27c63cd38d9aa3913c224
SHA2564463f3d684b1fa48fe9b771e2230017216bfe6ac33e6a3b33151119425297285
SHA512ae45b75cfbb4e418589b972e00547a9621617c82bf5ac7b6a274afb943422636c73d572f57f1bd9790476c0c232c364e17a4e660af373df14d7e49c87145e62c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59091c1f0fe55c380dde4ceb1a3768da1
SHA13ea1bec3c255864c129fe139f1280f83ba55b8d1
SHA256939f43a3ea0a8f533bd291d80c1f15321b24f6d87703677ba5de0bbc280b86e1
SHA512bfb4b59b3fe40897a55a3eba1b3307c754375f1603cbc110ca79ca21c71471f7254015a72353c6c36700ea709308ab0e399e0ef705b99a90df51fc57aa3d57bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56633a1c2fd60f6e34dd2d961ea3466c9
SHA10e06e9784d517963e38f9f3faca5c12cd46bcde0
SHA2561f34ddd977727c94b0bff7ac4f2cc98b51b09a33a9b91a63f058be98181a9c49
SHA5120d160c2e000705329505e31bf778bc37e1ed063cb83186a7ce49c77a12b9691f538c10c8793c9a7914efd81f769c165b1b7888bccba2c95ff9df69e09d0c0eb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5729a8c7678bd30d29ab453b4b0f90bec
SHA1a9d747947f4070c88d9c7984e306c9871a6a0410
SHA256370bb1b114e1306f97a7c78bb3ab094fbf95b52b58a97b6739ce58aa2628c662
SHA512b8031282235540c8f4be38c73beb693ff37fb613884584dc0c3d71621d6efa4e79f75f9a0d70f07de6579d74266d79c3de4d079368661af5f95f126efc3e32ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d3485eb09f851fe704d91395d47a034
SHA1224f70e7f913f92488c5f909443e37dcbd8b11aa
SHA256778e051583b9a03b0a202e4b1534e4948da6612f3a57fb5af02d48cede880ea9
SHA51296e22a19b5027030f21c5afa70674d43381c56553fd85d060f66572c591729fda3c69995e8f6a6a910d5eac33bb4bd899adee97ccb628ebbb08d2b88b6cc5be3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ff18878fd85bec31d9d8b592cd46744
SHA176f4478a7caad7afbd3aa3038705d200561856a2
SHA2563e09b1889d72ba4335c378d5b5db04a518b8be2a9f7b0d816fa7bb598c1dd2ee
SHA512f3e86450f901dd29c4b48cd4cefdc7a8ff08d8bfd728d857f7b651ca17285997457c8fc1e5a5dd8d7951f08afe0f660681c57f68b8cb9513058e5e3718e954aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567dcaec668863f5879f305a6d31c0ef1
SHA114842cbcf0478b9b757636adf82d18f29a907680
SHA25687cebc73e31219ecb44a2a5a2ada5be3a932ee9b81cae54cb6add79d897502b0
SHA512d278bb8cec3268b1e402881b70f402e4816bf68316134465b291923a86e3e1c7d23167ab058f684d24a14a338c2f6b26671592deab228a9de8a7463fa2731070
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5781706273a34631181987af0f6ceda3d
SHA1e1ad022ae15971a16457cf57a0005934fb155de2
SHA25614ad71df720eed4d34ec3948eac86c3ea3d63a1ebdb2c681aa0faed2322dcf09
SHA5120fef84d19d629cf90f0e269b4cf248b98aa73a515cec8fc623795dc337eb1225541ec517a64014f20b44886302df0f552a1a9e808b04dda8416d6cfc547850c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f43148f7a1260783d99219b3e057be53
SHA1c91e72f117c47e1da41cb25dfc0cc42f9736b258
SHA2568bfd7b4e8824b78dc408312dc95b9be09a18de5122764e10864124ad2bb50f0a
SHA51277c23d71abd182e5d5c121af098f67a44832a623812f6d21f090f910d2dc41b97ffdbbef5a565c1899e599843415d88afab104d159ad55f4cb6d1a82351f3e72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1289d08b2f4b46820123b557f1f5c60
SHA16b295c1be79dd2a1d60e6dee030b2882af748670
SHA256da8b679c07eb5d0ad400aa8288a9bdce990bc0afa79318a695049864565936c7
SHA512ba12aeb24a8cb20b0b0a2a4923e440cd557c7d5964c1c25dd16a6aebb814cf106f5f15230f1e58ec9cba39f2f479f8daa2bc10dd37fe50674ff72943cdf9c66a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d688783eafb6abd71f49b5cc3577c1fa
SHA1fee522aaada7ef5a66a17dd44d5a5b8d8ad74d90
SHA25629e49af978c59107d597c652edee1b6e2b69c4d8ad698db47168d36d874b9f3b
SHA512ad9240a637d9a977a6b045ee49b45fe8d06b12c54d46454d036945fd324f9daf3ed50c077bf988204a5dd6e265c3f8e1dc28313da8a550ae3c87ad969c18f983
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587f08f752b2917095147f16a7185a517
SHA1670c163751599c2741de524b0acb601b16e4b0a2
SHA25615c36ef7dfcd3e5fea4313f7ff288f7699b50d4c0b232edfd8ab316c3c7fa3f8
SHA512349903a15986ae3f3290093295dbddd4e2ec6e30a9059ca4f53840648f824ef0428fb6e4407d53273aa00e2731f3bcda0ea02f19d65a80bac2b97c25c3ff1ed0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b