Analysis
-
max time kernel
138s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 04:31
Static task
static1
Behavioral task
behavioral1
Sample
830b9619f60fbc8962ef67957e66e6a7_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
830b9619f60fbc8962ef67957e66e6a7_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
830b9619f60fbc8962ef67957e66e6a7_JaffaCakes118.html
-
Size
5KB
-
MD5
830b9619f60fbc8962ef67957e66e6a7
-
SHA1
5dfa6133bf309f43a644da46fbcd0c4c6b26a276
-
SHA256
2b549b5d53a5bb5e2c2cc9c2a321d65c427f72dea7229e3f4155b5be7d416b2d
-
SHA512
7023ff283cbd33fdfc669b9c9b033d818ecb19cee4ee7e2ade4ef00124e4fa15a34cf9d35d909086146bc14c7df849c11851279d2b104705e7167d88cc1c0675
-
SSDEEP
96:1CcVt6rkDsjrHT7L47DaxsZyDWyHl1Mh5n/xsBBf83r+9DyY2ofqc9qP:rrrQPD3XS5pyREY2ofqc6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1F2F5A11-5088-11EF-B062-D6EBA8958965} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40c442f494e4da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b700000000002000000000010660000000100002000000046789fbebdffde0c6a6b11101527d5f44643f9031af8160502b0e9476158cb96000000000e80000000020000200000009bad56126d59059b1b7eb9702db7670bb20bd11a1eb27edcfd0f5914973db18320000000f46eb7a35c5d85b68efa76cd586be8dc1c1258adc80dd8b533aa4277fbe440df40000000da0aab046850ab89e82ec72f6d22009999aeab9039aabfda08cc20ddea8f548fcbc4831359a87690c8df4e5d3e702597484fec9dbb71b3a34b6eeb85055b195a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428734973" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2960 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2960 iexplore.exe 2960 iexplore.exe 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2168 2960 iexplore.exe 30 PID 2960 wrote to memory of 2168 2960 iexplore.exe 30 PID 2960 wrote to memory of 2168 2960 iexplore.exe 30 PID 2960 wrote to memory of 2168 2960 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\830b9619f60fbc8962ef67957e66e6a7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2960 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55950ac790d0fd4fd2c5be827b504a49a
SHA145dd4dc50988a633e3b8dc453f78a738601d5422
SHA256ab9d4f4bc62658d0e65f987a65d72693d1509391ebc1447d829490046f7a22b1
SHA512ea2b1bb1e16bf43964374d8b472d06e5d6bdb08c3a141c13332b4149f1f33f916fa39bbaca7b11f741ceb102da00f0089e9f96c535f6869aeddd1ad0c124536e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a487769ec3b4221cf8bb06e4b4ec3d2
SHA1c69795fc2666f9ce9c6b1a0261aacaa45d56fb3b
SHA256314326b0846e94c53328724deebd309ad1024883fd4df694918d530aa1b2012a
SHA512828c12f5fd80e810138a6fd61bf92f54ee76a40c2d70416843fbdaf74bdd2ec66c555bb4fb5decaed0b06d15ebf95bf17b5ba939bc9f4ce547c710dde1cd7309
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561510e2b84cc8af1db02a6e3697c0ef8
SHA1c108e2ea198413cae55837d3bb3953680505d5ce
SHA2561811cfe4301a469d3fd3afa4d4cee1c80ab97b896d570953472eee8f5045d83e
SHA5124a1021c2327fd333ecae48161c375a7174f2aa2b31474003fe599605a0252e63b15f575dc6a14da5ee229ed4f2eb2666c735a49537e82a7f8e4f8908f783911d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559efc2776970248efb92818aa2809501
SHA1d6528f3c1c31b42491faeca10da2b677bd602f1a
SHA256bf9aef27497a5c885cc6340ac567859cf406b33f683a4fba34afd8d7dbd3efd5
SHA512115357b45b8a3cb2b47933f1f433a92d4156712da3f40429fb4913012b7107c50955645a118ad8ada567a7751826a8aeeaa8d46b507fd928b642dd43e673f793
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a246d3957eb80f91dc12a133e6be102f
SHA16598c326bb503394f1492541c5b8832bda9c5a43
SHA256c354f61caa92a996a19c0aa934cbf97ca770427910c1c328ce4b1ccb20776c55
SHA5125c72a797b95fa2aa596624a07bb6e45e56ab75aacfd613378937a1d0ad1f51dc300e3fe3652cc47781bbb585281361b9b808d5b2d7a7b8a218cc35d1a24aaf24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5096cab6d65b118ff6d13421a02531eef
SHA1df7141651a325198b2f4efac3caa712a9a3068f4
SHA2564c1e3fc553e5a0f1834ff475998108df200b5183ee28a890397e2845d34babcf
SHA512065d5c9095490c70f59c84b70581ec64b1197fe24fd4992491a07490ac6bc249179cd72902af4bfe59213956e059d84be30cd8262a33482e8855257b7a85f477
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed7bfcadf3bd2ffdaaa5c199ab367e02
SHA123849262950d25d1ad2da1ecb42bb8149f8ffc44
SHA2566330f8adebca117500e93c6d650e89f0bef9a94f38dbf5a597975729975d88ea
SHA512f505e9ce20ffcbb8f3ca9aa687493405feda2fec7cec92727dec2160d68bd567dfe7bbbcf49781b355b3f0108130ce74b69911caff181132785c68bb3d8fd238
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5018bf0697f1c3a5c37ac0c09a3982f47
SHA17a0e031255129a27f9c0b1c579cd3016580635a8
SHA256a44bd2e1738a258cb4f1886a01142701a6bce8e0079e29f55c598a0663f15033
SHA512096761c3ffaae82e23f15593a91b84280de044eb4d459202db01086ec2014fe7ebeadbe0822d374bbc8fe3a2b0369f1e1d0e575ae5f5d493488fcfce8706d93d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc04c8f59aa96429c8dc8aee7007d96b
SHA1427b16bd53f67df8c01cd657c061ee6e9cbfc3c8
SHA256b25ad50b328b9b49172b220260364e88ff7ced0af3b78c87b74a36733fd51ee2
SHA512e90a8969e8e0fd08b1c98ab36400bde8290c93ff8e867481d4e875ffd3f9857d18e3f248fae1f36ba16f65f431ab1efda7032f391edaf5b45480e997e886f75f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9b711073c777de203d29aa76f743669
SHA1ab1872ab308bfe5fbbf1cebaeed759c8d04d9508
SHA256c07479f62314a4c06fac94da8ae2dacfe96fae4ec00a19ec4670d8ace2a5d151
SHA512017b1418eb0edcacc20b521b7b3a7e5f51c58f29d26c740942e2a22f03fb2917592f64ba7bec7420c700f3f539a7c6e039bf28bbe119396227cc468713c2c2ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ad3a4a10b8364d8f817036ce4b33546
SHA1c4f30b169adc66c369d8a943e027ecf45fc8840d
SHA256ad5a8ba706264e4c8beb10c1910c2ab99499f31a9348e7f7d10cc0fdde78484f
SHA5123f785458694684d8a822300079c85b5aab225a918129883561a6996f077ad1ad1d09bddf7f7207d3c3af9d7f0884d8641b6ee550e368b530f1ae19d975d8d08e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb4f799f0eb01857c12a0feaf436a646
SHA14af01a66baa6527bb28e0c4006f35df3fb0573c1
SHA25645d45e8fbf5aeb0a58924b90c4ff2b344d4c6b9764c5551bac4f608b4daf3649
SHA5120320270feb4f52e81b61306f3d6edf919cd2f3a06dd6303242254552859d17d0a7ecc2f560da9f7b714338caffa9fcc57272578dc2de62d42096e781115d8d32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3a47828b3bb623ef5756c37ec06959f
SHA1ba7419e8d584ef7cb8830330f035250a88e13f05
SHA2562487fc9201d576f3b487c70e3eedc572792a5be29586b0acff503404f0de56d4
SHA5123ab55ccb5339c1d25d6e26126c40dd82071ea852cbe33e9731277de342b78e7b932bef62008facc17c0e47c2ca683e79e7494c8d9c640efb95016293a8c7d421
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bd411d894e15f3600784893d6bef3dd
SHA1159e4962f6eef1bebe9725e0e42785e0c60429e6
SHA256e584178f6cdd36c69d22be5a81535cac851954e8a758288fa995a85e2580be38
SHA5126ba0d5f7ed0d857fd1344c6ed64086c27a9f68e4715855adb69758ac8225e2854e197298bef548584c6a044ec1b8148cfb35e3c3d7a965dc8353bd02900b1091
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cab7cca8f049b67b767134f26d0bdfad
SHA169d23c1739c9e17c569ebc7bc1e723b9ebb7b583
SHA25616e24cbaaf35e351822c0d5df203a456dbf0b52a533e0778c923108deac26e9b
SHA5128e5b1cda198ef63f90a77c4239d84dd87e53ddea693d33eb53b1b1675d0b9c9a0f0b5cf8e8cb82c41c4452d574bc5dc1e0f30c9fcd6e11de7eda7c199147164e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57809a5e3c8c88e853da3c2cde539aeb0
SHA1c2dcf3ecf01d853599a1de334d71fd150799ca09
SHA256acb5b0f5207372128532045b1b78d116a6ef5a432604afde9f2a3820dafec453
SHA512fbe9dc07a677ce8f91fcc40567dae8afd67ff37ebc007218572fb16b0ca87083eb8e5afa70903747a0989ba62bdf98de654fd62d1348e756858fcd90f5d7bf22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55439a4d35b6406d1f7afd42624c65c55
SHA12ec5f75f883189622b5180dcfc4ca147655a318c
SHA25653cd9cdfdfbdc780fc6a8064aa06671dee8e649c40caba02e1c3e63dc3be215c
SHA512818c32d5b8a289efafa28cf64d785907b500fca9203f3542e6d9417a72262e8160a645202d341eaf63dcc2c044583634286ba54e0a4c227608adf6f93b1f232e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b1719cba73e58c7d4ac801507693c74
SHA1a487d017a64283d6af01a2afb8c7a8eb9951bfe7
SHA256c33f9284c7cec4d27498af281464a7ce207cb16030b12c0e3b9799f0b508a76a
SHA5127509cc8728ef8c954680a0ca6a1589f3fd40296798cec9300e522e902b53d9063705643529b107c00f3d05160e4c415811d08b1bfcc339122d646cbbd8170c47
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b