Analysis
-
max time kernel
120s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10-08-2024 23:02
Static task
static1
Behavioral task
behavioral1
Sample
88062c3f56c4e7a3f41e37f27bb937a4_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
88062c3f56c4e7a3f41e37f27bb937a4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
88062c3f56c4e7a3f41e37f27bb937a4_JaffaCakes118.html
-
Size
39KB
-
MD5
88062c3f56c4e7a3f41e37f27bb937a4
-
SHA1
4d4556fb3a77f94ee4bd7a3de9430b8089ebb23b
-
SHA256
20167c7d81a81532b3b2d7353aa28e710320741aca611fb02ba8e2c648f65285
-
SHA512
f41901eeaf526ea6a86ec4a59fc6e0d81fe2bded3b58f0bd95528114bbc7b1cac9e589b6af56228e03dd761e2afc2387f0d0658bdfc52256fb1c6cf9e11baf84
-
SSDEEP
768:Cyi4/E9hnEZsZKFdcqIR3JR38R3PR3fR3vR3NR3FR30R3RR3SK3a1yGPw:CyfKfKFCqoD0JZp/nc7hEPw
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c70000000002000000000010660000000100002000000041dd80be59467e8ef66c6d29dcd4d7ebc1775f2d65e1025c1ca74880fe921bed000000000e8000000002000020000000e2d95d31c2bec0f11527f40b9c67909b5a8c68ef072dece9e3bd9693c6500c3f20000000c6b55faa6f78d0439f3f1c0c66f43f1f59d2616615d59658a50cfc1b6e27905440000000d0e445f137471d36d54246679948d8d67392f305a03aa86c9632af18cbf55d829ddae99eae677a23be60b62b19a25265b2e43a87b058ea5205fbfdaa06db615d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429492801" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9533E791-576C-11EF-A6B8-D6EBA8958965} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b01b826b79ebda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2420 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2116 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2116 iexplore.exe 2116 iexplore.exe 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2420 2116 iexplore.exe 30 PID 2116 wrote to memory of 2420 2116 iexplore.exe 30 PID 2116 wrote to memory of 2420 2116 iexplore.exe 30 PID 2116 wrote to memory of 2420 2116 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\88062c3f56c4e7a3f41e37f27bb937a4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2116 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2420
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544f9a4b91f76cc2ca118c715850869eb
SHA1eec1450d0f74e8a9764d84267f5af0ef765c9d26
SHA25671d7ad18f64a6406b8d6d64ff2335dfb8a5495b3a97fc14998b56e99526fce9b
SHA5125e2872df110b712f6ac905e851ab01959e60dfee6b8b5932f3c5046185efec285d123baf3594bdf0c674028f7657a0102509e8081558aeda249766c064aa701f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae8219de5c8d525cdbeee76d4ed7a077
SHA133709ef332d5a18d03813212d48f82fed99ff93f
SHA256506de58f494fbb70d2d29b11457dcf49ab4162b4cd7ca91d188ae8fdc4b04345
SHA5126e02c6170da0e02a190ffb35e0faaabb9307b84307180b0890d77400da74893b78abd8ce4264f75347a371cd7e1d4cb677ed64eb19aeb0a0f310dc8772a65f98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5920e38313d926d21d6f8fb35387e389f
SHA104904009970aecf1903e38779444a8c97e2b81d9
SHA2567f06cba0621a266567aa0f62faa42c6e99b08b52f093a86491a378a95b3f1b7c
SHA512f99513594a3e2b7127aa86acf870ddba6e0ec4242e0b69a0b12ed9167920f0a872807d4dbc3ea0a35f4c08a9c230de08014057ca49022a4197ecc0fa8e53f066
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4cdaefa65d7998b474783c2b67eaaa2
SHA16f2548efcb7cc343dfe3c4618acc490a894340c4
SHA2560177de2e85da67d76ff4130d23c839d4fdf16d9c75a13d7b414bb7fc7d4c9ea2
SHA512916080b2080ac84d673ff802545cf095d3a2cba1e5678a0b7e1c4cedd6a7e2b11f79146407e75a09c07dfb33a0e1541cc15ac6eaca5a232cfa56f84a63fa83c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5525820f8b58033a5213f37dacb496008
SHA19c560f55301cd38fe768cdba7d0e4428b70100c5
SHA25691c54e0ed426e4a6c457b8e2c1e360d23caf4867e691a9c4522b51a1ace70d5a
SHA512fb923e1f53ba4b471c1f6b32547d387346f13e4b9732fb1b99fb753f8c9903c49a7c59c1b5be1d55c2348059f9288a31222ee482471f2d990b5c7867a782e603
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca33dd9e468e61912a9f8df4e21a2098
SHA1dfd21f52b38c608c78627f418815bb11e9476453
SHA2560cfe818f10211006f2152726f5878007d779bbbd9d06831bb639ad0cc27a34c1
SHA512dc2e8ccd316172136aa18df9d8f44783aa00db908095e0ecc5ce379de5905f52b03beabbccded14fa535c7e1243d8e558663a7a63efb0efd3032bb85ade36783
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c490ca3dfdb4465ec492d68bea039f8b
SHA11215c0d82bae2c89418963a1af8dee479eb415e0
SHA256ee56a232b592777ea263eee40d3b17ac70da8052b45af4e2a3b0c5687d6bcd8c
SHA51280b9058c3339d0dda2a7ca567d0586a7948f907ebe4558c7b6537b44e85ce720c0a456cd443bb4678b66a1b4c3b046748e0b7106fb8e33da6a2548c842c1515f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531b34c48593e67aa7b559154ec8127d3
SHA1fe7a7ae3d85a3c95d242fe91f710d4bb5fba7f4d
SHA256d1dda6b43c13fffc44f24ecd6ea0040d247ee39b3aa78df125891a7350c00b1b
SHA5121621471c1c53a8a98838c4847a414580666963051ff38134637aa1429de65da40fb9d413364d2e29dff6c5574c3fb0e15ab21f98a2cae0a15438dd06a79db576
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d5fce5094c54d24996015768ae02894
SHA1bf17820484c450c4cebbe576f359fedd8b411538
SHA25645c006173de1ad1fc0ed8eddd1002a2fcb2208f08f2dfd0b6f48dc7661658014
SHA5123424318cdecd7eca9d0ec0f6e2899837b0eb9093be822c505ab19285436b073434ebb31d9cd11a9baab0741f09e753c3eefd741009ebbe659ccc2cc7a85bc414
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bc8ec691563e9dc24c5a1b40aade959
SHA1941b1365308b96daef9263b2c5133b4a7d15a369
SHA25612797a1a53b3f1771035583f92e3e1e4ec765a2e4162fc0269a4293666a7e149
SHA5122549f9d052d4ec4f84349df8236073ad2c4768315082bdad580c825d1ab39086bf217f41a12abc70ddde7278815db6bdd54950992e3cb6e6d841ea899223888c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad4775b4ee6bfe1cac7cfed7ef26eff8
SHA156cf9952a0219a73eb69f71f4fe6ba828116808e
SHA256bb9f51ba951e0d18773041ecf24d41926501b764fc3b9688c14d13d6aade0d73
SHA5120a8690bc1e1fee0d8492d44d8d52062d1eb9d8b760bb2736b2a45cc67306adf46973ac0768ec0f7f52980fa862ebe13eea2795c757609bd8d15bc18fec8f9ee6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53787cc87323bfc794aa72cd941f3cb97
SHA1379b9302a5e4689f6aa9a716ab27ad2e57b8771b
SHA2562d35ca06627fcff6ad9eb486675cc1d3db464274c395a8b3681777c02f67d9b0
SHA51294415da136d5836d9f44cd806c43048161f113e957abb6e912f10a6b9f2474c648ecd8d0195371064a8c903acc6bed5375b0a867c4bbee40b868b699c6dd4dbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b80db441b4e16c20bb930513d3193f1
SHA153483542bf1ca4834de3fd75c2d0b0de94015155
SHA25697b25b98f9c77164d98b4c9d2d033b667b3e5885215a3c3fda8011f955b78fdc
SHA5122143810dc0d43f378c54a3a8e2b0569973999ae4cacecb96ecf3a0da7f38d739cda6eb4b7df01b55ef41f404040c7ff50e301c625f88b094c4f0d24b56963cc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e1c701d10bc8cc1aff583ea7a418d83
SHA189ac154b3e01e6eef86d0296a235566b3efb81b5
SHA256320e70eb000f2404b4566851102a11186f4e378e96f3e70000a747e81e9db5e9
SHA512734f915ccbad9374f898032f1dafd245d6d933739e4fe501c784fe636f81db79073880ff9a3417a5c3b56f9c5e37ffb57b20e1f7af9beaddc3ff1e6f0e476df1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab1e00d714d32e8476fd22e63fc83d50
SHA142cfe5305c312c24986f02f56f6c888a3d8bb783
SHA256fdc165ba034615011d94ffbe66dd0b73be559d099fef0730900ff480901702ec
SHA512665ba640aaadd88a696f93e8a65af97243a12449dcfafbb6a4198b99534b83df39e18f48c74ab9a9091e69685273ecdfd8bcfec356be7944405b2d004671d29c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578c0ab134984a109d17516e0df7a8010
SHA11332e0b7a22d8c27db650e251a67f7288d6c1804
SHA2568918d2e281c5ba04ed517375a755ca5a20e223067da797e37633eb986dc584e2
SHA5120bdabd286f37acaa255297daee68b194944fd4214c7129d45fcfa497466e62e707e37fa805025db6d4a2a7ab49129d8559b85e6c82f9ac6f5b5a39ff8639390e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bee46ce9ac2af2ec7c35a3e2e8326363
SHA1a62991b4ca02d89d29e5ca9bede550e0e0d7a7ca
SHA2564d72609c9bfccd7ff5e77b11585dbac270872476f061bcd07bfb2dd5ef3d085e
SHA5122517dbb06bfa53a32f13baf714969cb75ebccefbe698d0072d46728fb8ad5372392d7c277ca6211c8e23419f682ef7c77835016fc275b7cadc94d633ea4b6a86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d25f7162c123ec068f158bd11fe747a
SHA1f42f4a4b9a7f55da07ad0d5c896bc2ad78700e41
SHA2565884798b38fbfd65f0b0d57788834d009d8cc0ca04e2fb2f8ae7bb2749923c94
SHA51293d0f39a5667adb10c594e663ef5069b606272a93c2a9554530c2915169eb73beffa2f9af9cfd223135f4447059ca6bb1ad18cb9631b09baf5d14b5163036ebd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b