Analysis
-
max time kernel
70s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 00:42
Static task
static1
Behavioral task
behavioral1
Sample
88544b9c0d09c0546aeb9b836e695186_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
88544b9c0d09c0546aeb9b836e695186_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
88544b9c0d09c0546aeb9b836e695186_JaffaCakes118.html
-
Size
46KB
-
MD5
88544b9c0d09c0546aeb9b836e695186
-
SHA1
8cc6aafc503cc8f94cb764d6f56539383be22c42
-
SHA256
01e9b0f1f0fe72c9438a610b46304c7aca59b7a60ca8d2e0844d716183b7d3f3
-
SHA512
2659734628d911bdf2fd4e80fdee4db84970ecd140fb966352f16157064f011f4a7b8b6d00120aac7cfba86e8061f5e2670446c6a294bf2e15ced561a5d0a2f6
-
SSDEEP
768:DsCFgEKAiPDWPP0PEPQUQGvXregCIGUkb/T0biKYuJVfWBLc1ScxT5j:+LW30ML9Pm/T0rJVfkCpT5j
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b700000000002000000000010660000000100002000000006c068c6392845da77676518745757e4141bdb6ebe274dab7bd99b6e6fb9e36c000000000e8000000002000020000000531e9e16e90d820ee83d5690b386245ad80f82757eff320e62f5cd17fd83a40520000000aebfd7ac51396d59627b996a8d5036315679771922ba56b127561fc6ff66c8d0400000005b1738b30471fb334d23af41022e3bc34bf91451c3c40b55f9c474f5a04e0b7a9541aad63fe4cb90bc3001ef8fc925e8549aa5e0f647b9aea448947116311ae1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429498826" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9A054531-577A-11EF-BEE2-725FF0DF1EEB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0f7147287ebda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1360 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1360 iexplore.exe 1360 iexplore.exe 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1360 wrote to memory of 2804 1360 iexplore.exe 29 PID 1360 wrote to memory of 2804 1360 iexplore.exe 29 PID 1360 wrote to memory of 2804 1360 iexplore.exe 29 PID 1360 wrote to memory of 2804 1360 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\88544b9c0d09c0546aeb9b836e695186_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1360 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
436B
MD5971c514f84bba0785f80aa1c23edfd79
SHA1732acea710a87530c6b08ecdf32a110d254a54c8
SHA256f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895
SHA51243dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5aabab7a0d97dd107af498133053229ab
SHA1a133b7f81c49532c1539b19d9b515886b438df92
SHA256d6c59a7cedd2a9b688cdcc5a0c713441844c956588c22c12eea37f0d951a9940
SHA5122ba10924c853387bf671d677fe1e5b1349447741e6c35bd8518ec26d63362cdec4bcc9253e10eb4ae123f6cdbd53821acc0adabb895900a63407df9e89f39892
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD523db39e77c56bf7bbf688b75bfa257d2
SHA1655d1ee9fcbd27cba9996067d9eaa226e3b6a4b8
SHA256a0f68284a2433191fd8b10fea1ddd5a4f3fe83d118f7e865ecaffca95a42a4cc
SHA5121e4d66ba8e52354cf52c51b7109773c9da126af159ef55692b5455667bf3ee95015f89f0d4bc2577ec4f9dbae24346a16f15b08fcf59d89ca58970ef882e4585
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54337d844be9bbbb1709ed6639666dcf7
SHA114a104d8b16ad9c9d0810312e5e9f125d4c825ab
SHA2569fef1c79a26939c66a0e02fcf519e202e437db0c5066c2b0bd7aff65065b9ed5
SHA5121d9c7f359b59af9a1f998ed33b2f271ef8e8aab36b2d6243744cb93bddbf607d4e29e3514d2599d7e10d0ffa4eacb22c1920c9d30a0e34f33d14ca941bcc6a20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffba1205b41c4cf53ac02da6ad8bc2f4
SHA16fc88ab7979f82268f65530802a60eb12f58b1bf
SHA256abccccd0409a99dbd1bd3607dc2f1bc4da4150e4fa7114506c338431d1dbdb01
SHA512cb48252aab8e02ce794c5bc12fd568605daa9fb428d052a9bf88460200a4794a217ed45fb45ceb50d74be19a4dd620a663666d791a0a0240784c11f51f50d872
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5461e41b742003afdbcce4baef61026a8
SHA1d44ee4d0e1c0e771d9b8a83faa716b97ad61c2b5
SHA256ae9587511d1fb4f0e2a1d16db66b8a2b9f003069b4aa313afb4f45355073a56d
SHA5127f04d82ad62cf4848c644cebb9d1a84319526a8a4b10e19c906f226c8b982d7b0a2b7b35e53d5d417bb60650b074fe34ee92d320b9f2727dda50b529d987bbda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c16c9231db6e6684d91d95abb8684ff
SHA13ef8a0bf27b027a35a141ce338a0967d9a77d726
SHA2563b47389eb5ccc99b4b4153d67304c7f34ad9567338934f6ce93496671060d2a4
SHA512bf6e9975769be459026b68f687c7334eaacd54f336a55fc02f171b9ceb743bfb0dc98f89cadb646193af02b71f3b2a484428ee2e76873f2a37958f21a7214363
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e271e23d8d09c1b96c154b54a74153f
SHA14f97ae560a03e31a5771bbee480d0a5b7301a3e8
SHA25600eba8536b9e73fa5a162b35e3b3ed23898a950e4c2e0e36de95a7d978aaef58
SHA5124b22749b36f60576c3a95bbeedfa0fe6de109080f2a5eaee48b3f9eb0e55764eee8cee3b970da18bfc1a9365ce589a18322684e6dd8eb65db2e3bc0ccb1cd15a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c748739af0d18af0f2566e3e1a2032c
SHA1d0c4f22e461efc6053cd06305c4bbea885ba9eac
SHA256d90c2a8b1c0bb031ede62cfa682dfe51822a7c6ffd5babf5b475cff0b2a0319d
SHA51270d82ce5c46a87c75dd0bf28649314139ce3867f35d26bcbc4c4e703e21af91483c98b9f8dfff27aaab232a6d2f2a2f905e17e0d7ea3f5e5b3afc85526184816
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506bdc3e183a1d176dd1502c2fb298cdf
SHA1a18c10de0b632243a09bed5df1c463f736abb539
SHA256a5f5a9bb97633acfa5bd10160dded89dcd50b2760208fc88238b9fea988765cf
SHA51299476ff0888747484e5936bbffd32d30d2846951f8a11ed8fbf9420a63649903c749873af6f3710944eaddd4e7909cf851f8d6088699f14ff85f4780016dcdd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6f575fad5bd6d6d6e55fd5f1bdf5ea6
SHA121c2d7b336ebdee33474bec512049f5b0f63819d
SHA25604492a22cd5c98288905cbdc16117e629f906818fd1c339736b28088a8658a30
SHA512045390a00d5146ce6a88e683afda6fab2b038a2a3a74b8207793e1bce41dba32d7c84b5440beadb7f88bdf89a23e33a949a8a1536e93f496c22bc2556edcfe81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4f805dbfd43eddedd782091c4cc6849
SHA10cdd4e2d5db78164ab2dc7538f8c7c7091a62afd
SHA256fc3d6a5a61601ab274311eaca5fec8c0173d554da0b97d91986df638bff16609
SHA51234d61cbe51436ee3964571985b476ede242dbf85f6397dbb7116845b3f1f453dec02abb8a7f7b8c2b2f95768eafba2590dc10b63740f6493fc41214cb73a793a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5867d92006d2a7f3e74524dcbcb75b8d2
SHA1c3dcc7cf808dacc7de5bf7abe3ca229aba342236
SHA25627c136013a915dac233cb1a0d5ca0685db3bf4b25fb4a637a74198c7b5daa915
SHA512e3fa303f0cd13f38f57ce90f973e3142965627931f58e7e0ea9cb9099c814395591f17feaf07db8020ef6fca21706cb3632824616dfc75484015fe6e5697513c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f33be0c14268112d600da3d4f1c6a51
SHA1450dfd983be2f8bf8421baad2bc8a6bcaa07cb5e
SHA256e87a9ccd7ab8e75cdafa5e6d84d31677bd08909ba78daa8d2bf770547feee601
SHA512967467d627a97b613dbc6015a2c5bcdf2f380f3abbcef7138eb4d6d7c91bf3b25314a72b5842b0c041c9966a3e2c7b2d4944f71516138261c7f429c0ecbf96de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5217c683049a376692f68cf879e2a66a5
SHA19f9fd0b771a906b4054dd5aef5cd0fd606c79f74
SHA256d54a07eece56912961bc698fbc11ccdc702d7cd019e3346fb32c77717ebc1d37
SHA51233a1e3c05f7157049776bc057505f6ab0772539c0836d05bdf44576ab797e237f31cb1e234e071d019dee8f5ce7d508baf9a6ae1394f1e035ac6926fe6a3f3b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5f1660c01894a8ec3733dd953c974122a
SHA180d5a75e1cd88d1d84c964e0261c0765289b99f2
SHA256eddb4a9f567d5d622e5172f7837e116696872027e1d66e6f441c97ea96be3b43
SHA512322155bf28e849013fb948eea2fb84408ae569170c89ade878176cf581fb30204bd0b8922927725ecc5b9c7636240e7927b9d24a09fd47ae2d4d0ea50f88d25a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b