Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 06:10
Static task
static1
Behavioral task
behavioral1
Sample
894a9d6babd613a5c4939a5ebda89f03_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
894a9d6babd613a5c4939a5ebda89f03_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
894a9d6babd613a5c4939a5ebda89f03_JaffaCakes118.html
-
Size
44KB
-
MD5
894a9d6babd613a5c4939a5ebda89f03
-
SHA1
9360aa2bccdc335bfe79bf73cb6cc4c540bb2e97
-
SHA256
d4d2459bd73c4ce054b5cb032f5114b5a8433dca0f184a757195661276122b30
-
SHA512
f576fc0f7617d9e08356291b1dd5487a36ae1ebcbf5978d52ea668d6a52bb2e4e29ba9fca81e99a9f7ac99d43c134dbdf745cdf1b07c6ed916da96c99b105b76
-
SSDEEP
768:Zcd9QZBC7mOdMQBpC5I9nC4j8L6jh6QPd:gQZBCCOd10IxCw8LRQPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b080bf32b5ebda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429518475" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5B8277F1-57A8-11EF-81CE-7667FF076EE4} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000001e47a9572fe5efa4f3c9c8e1276a0f48629a2d96d93a50ed8a44492fd0159dd7000000000e8000000002000020000000c64ea5f85f76fc118830d17e45a3147a03e44196cde84b1549bb2f8f74e0d12120000000b66762ed545f55632cf8c26d7277ed5a45bfd3d203e1413bf227c4818c6df23a400000007b392c7aab9bf7a15f702c918ab535d316f278ffdf66769c15deefc81a6edfd3680e137886155afd6bed1ff480f273d543de423de75779c9c66dfb12b2823ed6 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2456 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2456 iexplore.exe 2456 iexplore.exe 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2456 wrote to memory of 2088 2456 iexplore.exe 30 PID 2456 wrote to memory of 2088 2456 iexplore.exe 30 PID 2456 wrote to memory of 2088 2456 iexplore.exe 30 PID 2456 wrote to memory of 2088 2456 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\894a9d6babd613a5c4939a5ebda89f03_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2456 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54417ab4d0bb450722261542fed509eb8
SHA136e37c1b6351ea6ed1da58a6566f81c5ce2c7cbf
SHA2569baeb75e30a719e5ac85a673fdcf4bf948a7ad98d83ef5470f601e75b05ad1d0
SHA51249d145996b6b694246843989a92762604da1fa899eaf9ee1ed235f98e2cb6b28bca59bcf0aa947cca440cfeb3fe147b79dfc141f4da7fe3ff5e19f6916556ee0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57df1fdd1292be34f721e5e2e8e833570
SHA1a47e02629511d5b056914538126794a6e6d31249
SHA25604db650a628e7df4c90773d2d01cbeca28ffa4755dabbe3864e4ba1146c4c5e3
SHA5126afa8c663000c6a18b36d7354a9901249b554c939dfd0bb900895db9bc841cc9166c213ce0bc51897d86361930c1c8bde7ebbdbb9a95e8838d51faa1bfb8e9ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c84c3ae0ce7f74e85db1162ba16921f
SHA139a8d9d7cf0e5fdd34407768304924578395c9cf
SHA256be362db7a26469ca95bd6326b52ee8644925d30b5871ff5530bb8fc9076a7907
SHA512f57f2561d47f87f7738a7a964f1be1eafd888607249079e805d70254254b27206fa9cffa6895933171c3e68f8c2af00ff7d23be63080ec11c051b3b19d9304e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5652499788516316b1b4d4e37cf8d83c9
SHA1da1a5b98c3cf496960460ce19a88113fa713719c
SHA256577af256ad646378e075d0394b029ac5335f9d46a2d38f562852eb4d1db3c3eb
SHA5124b5413a709961c8c8212e1a0a3e6c5674f5231ce4528aa956a84f5fd5258923656f17f7f25ed7393214f4c81bc7a945b2780a43164e0fe1d815030c93eea1a3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531ce57faf579998ca17390f85f6c9c10
SHA123e92471ab0f2d47e7d4274826bd28fda6f478b9
SHA256edbd5d5a1065b01b49e19117a7ab7415e8ed624b16af69c6a56e83e05a644695
SHA512cba6a2ed31aae4dc3d097bb2b1d48a29a5dcd58d53c35a424d24f518d6b0d1c7d3cc9cf22db76a6e9ee1c810d531f9b224707d667512bc5cda1a4e0a02f138e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac96422365d8524d50fd1318b6d171c1
SHA184d5578480a6019224a937f1ab3ccfc1b34aeed4
SHA25600a094bc92c757ab0833662a2569fe06cf10832fcfc592a37c4433ad67eddab7
SHA512210abb5747e7a0f9c0216fa48de4252de03139dce7faecb060d6166fb71276858e0aed0c18a6b71641d32c748db091a167450d0fb82fcb2b18bfaa39a3241398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d67f80f7acf3a8752b53874122aef948
SHA1245a2cf6e44032c7a8c9e7ce942a6eb2ddebc23b
SHA2564c4390eaf0072ec5abdb121c3af255e0e47f3c8a5c29fc20dac9cf820bb65b4e
SHA5129b205fa2d35deabb24cc3d24d4fe285de84b12e965bc316681ae0c3bed7726623441df38867fa214952052212524c996c7932e3dd21d8ac8288aaadb8d00ffbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5286c4bca755f1e6424b239ab352235b1
SHA1707cdd54a12032859c16991ceed97af1d73ce3a4
SHA256ec4734dc1703d6b6114848b3da4b3d3225c8f09287ee1f72727e9892133d730a
SHA5129df2e9adf787376275203aa62dbde58efbfcebaeaf37799ed2bd14e4dc584b9dc2ca1e109c1111721997aac1c9e45de3dd528ff00d4bdc22760d7103f78a37d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd4a6ebf4c7548778d0088f864a7e7f6
SHA169ea4b2c832d514e228dc95f377cabbc749bfb59
SHA25688c9cbb4684c3907f7d5e2220c306fda9d10af4e839536af57ab542c544abe7f
SHA512411b1089a9dd2cbd78528ad7f6d8d5720404327fc99f5894aef77942b5d9db4c4ba038f2fe0388f11febdb9672fdcc79c2254599596a12c63f473d18c817ca18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8c0340da2a6b5c7baa6b42d572c9ad5
SHA14b2a07693990a9bf959db1e35c8d0bfad56eaa8d
SHA2568bd774e97748d27b36321ac0f2cf6b87347136cb9d955ffcfabec00ea5456002
SHA512acbf6742022e8006744d4217859080ef4f4a7a8f0ebd054e74c9f9cd422c8918f8ee3e1a04b148536857ffa8cb6a73776b9744a872fd2682246bb54ae11ba353
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5547ac79731884ea14b40e857905d8030
SHA19f53d375c80a79febd7708ad8873f8219675721d
SHA256a459a8daff2af252a199b9943a0fd879e518eee39aed0bcf0d41df6d3af64737
SHA51239b1098bbec7ba8eba4d59e21b18747adf4ea92c23e91ceee982902aa5cc47679292698ae3c465592bf3d7cc655baa087232da7707023d01a3639a0884e5bc75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5019bca28f5e3913b4d315ac846dc19cd
SHA11fdeaa7ad1bff9984f6d3abae16e01705a6f22b5
SHA256ef05b2eb3ec31551038b92ce6d3484a33a07e6db62902c027435aa51654daaa7
SHA51293235c209502dc02e113cfcc1cdfa07f666e87615bbacf69a6bcc08f433ef6471d82d7aeeb938d608d84f1dc03e6df29e7b707a0f73e23294b29f7e2d552cd1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587c4e0a5bb6897d4ea115d75f72b8f29
SHA19e8339a26e51493b12108b074bb5f66b28c2cc07
SHA2567a428ce425919351637b4ca5c0e6fd2e385ab1d260f2be0e93238e653dfaff9d
SHA512db1f2379ed24f11b1bc2b03c9fa35575af20153d2a81b8c6d36375f60d8a69565b3d1dcb6b7e3605c664df9e4cc3192ad0771bc96ebe0fb45c730a0b35203412
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c86a0f97635f7dfa3d9c9e818d13b02
SHA1aa527ba429c6d196f7c00d361c5694edbdacef50
SHA256311edccde723ba1d048efe12dcaf8f5a909780fdb3e0bed551c30ac5178c93b7
SHA5125bf07457410b50bdd69d213334448a60940cff48833d8c1739f283660fac0016b85397c603ed3c7842cb3bfa4eb0ac101ec530401df56bb88e14804903810cd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d96a4e4b5f87c5e6d06d54deba64e4f
SHA1ab351f6175ee86bcc117707c5bff2b1ebad29ef1
SHA2564efd112854a63a8f84eae89b2a372820b2a088c0f4b7d02fffb2ec6c9bb81c5e
SHA5123ffc16ec6325c072fadb8ee0b5af8c0b757564d964b428b0f35598261d73094a16b731ddcdff7ef5ed9023ee81832ac41da4c58f38f0e60c5b8ec6c481485e68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce11df7898a4085582d6481d91995eae
SHA135750596059130f185e3376d7d20ed0d99083b19
SHA256fd5b203e738b722c1876599de8fa4a753ed675b5e66567601d200c2793b7660c
SHA512f3a38f14a3cf7d228019feea6962a0993d6c1ad932c72fc7c8cabc1dcea2436b087e89662ba131ddb94556a1c082ad032dbf20b859ce90b3fc4feb2bd7851f47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb5004eca41caa7abe344b49a662e1b8
SHA10cf060a725e00e5490573abf42d9e2e06711a955
SHA256d414aade4f3ea73c3deb2a27bad25764a97ae808b18412e7162ef034f719b04b
SHA512af7545843c0dd165c5b0b841fe24856909bb650779528e849c365912097f941bfe502f44ffb913006f6854b5334bbac71bdcd7e6656053a6272f6d9a16ee161d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5681d7e39fae9a6285e7816c5641e033c
SHA17cf38957684e8777a2590e8df0b258d069ae3328
SHA256051f2d00c0a82be97820827be38856db5e76b4882d09a688fe959829c13052da
SHA512bd3a9af6553b13d3bf6de0a1e31aac28812d580f689dcc98ca6f3e354e6ab1bbbd435363096ad8ac7a2c86475b39179bd670194037cbfae44c7d676a647bc995
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b