Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/08/2024, 22:31
Static task
static1
Behavioral task
behavioral1
Sample
94ffd1f0a167799dec9acb9f408aace2_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
94ffd1f0a167799dec9acb9f408aace2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
94ffd1f0a167799dec9acb9f408aace2_JaffaCakes118.html
-
Size
78KB
-
MD5
94ffd1f0a167799dec9acb9f408aace2
-
SHA1
6213bd347fb133266ab45c4045fee69c6593b131
-
SHA256
ee6275af33a731b31b9257ba27ade8a393db9fd48206ca80b37227e65dabf89e
-
SHA512
c47176cd1be2d8540d139cc6f0cf4eb1865ee4272558a2e1314001df2783a2ebb45e8a3371f316eedc7573ec3a691b5793efe040ba8b412571636d8a45624abb
-
SSDEEP
1536:qySYjo39kSbMMo4rYxpQavHrb9kaaqLcbcBwJKo41Esd47B:LgeDx2ab9kaaqLVajsd47B
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429750131" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B93CEFC1-59C3-11EF-B161-F296DB73ED53} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000f4f0babcc39c6c98a9734e9ad15b486c415c64ca2e53d5816b65377442d486ae000000000e800000000200002000000039efcf050d2bcd5fc8a0eea9af1765ab4bc54ab4a976507368e649f936dc39f4200000005b0a0452582ef66674a50c581d74298df383a7fc3ed3fa2dd31c9654a4ab4f0b40000000005b0c0c9267972f9c8445d8f77637372dee64a73a0bf4c81c01df551c604f5c5adc8b0153e65700420db7f8504956b518df087ad1badf1811f9fbd8f1fd4c34 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a036598fd0edda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3056 iexplore.exe 3056 iexplore.exe 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2852 3056 iexplore.exe 30 PID 3056 wrote to memory of 2852 3056 iexplore.exe 30 PID 3056 wrote to memory of 2852 3056 iexplore.exe 30 PID 3056 wrote to memory of 2852 3056 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\94ffd1f0a167799dec9acb9f408aace2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3056 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
854B
MD5e935bc5762068caf3e24a2683b1b8a88
SHA182b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5203eebcd8b36613f0b6ac93d0d39352a
SHA18ff94309fc8f76f7fcd29a51b6b835e63fd7d8df
SHA25656dee0c1fb3cd8e0ab40d11d3b8d43998d7cae7b37da9bf1d93d134b2eaeaf58
SHA51234b99646afa0fbe8e21ed3e758ec68fdee8967b596dfcb87cc6d0ee9de607cd86fb6aab15e34d41ca71cc49372c454f570edcbda7f12f7adf87bfae3b8596e3a
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5d44c4896ba0dc36400d0e99e64b4c321
SHA1d88a0e4a5d0e5ccbe1f928459c5baf0a30ef4b83
SHA256528297dbcc118c6f451120460d6a216f12245f1a7c6c185dc9337b564c0effc6
SHA512e7aea34a4bd44a0209ca8dd6a490d336a3f9057c499497d4f3b6a3a95b19a3de2e6c27b7499efba4eb35d6be7e9c9af797fdc766f62e05edd465cf0f44887362
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD55bd003f30b680c2dc1aab1e87891049d
SHA1d5d66e2840ebdd7200e6d6fb30f4617953adf0f9
SHA25655a26c2d722de048db71ed04f6644fb13121fbfac7e7474674bc223759d386dc
SHA51277676e34033ab4ddaff24c07c8f3dba38ab793984481af8eebff9fd4c688aa3ac43df4710ac9332db683a65c713d9b0ed94d09189d4dee2bb410c03bbf22b66f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5ed425e3a6c0099e5887fb05ab591a901
SHA1f9409f078565a1bb754fcc9314ce0e5e246234f8
SHA256424b31f8f5b587768fb94c79b70439ba0108a9c28aa0cc437a6f7a6635a4ee7a
SHA512f5759bf71c3284f046d7d16b6e8f1f06a37337ec8d67d9b2acf24f62ffcb53ab4ef6b538ff2498d19cc6be1b93ea89a8de66af60495e37168c7c4194f5291012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD559d5a204cece2ff373abb0021f687a7f
SHA13cc58320af53cca9de09e3180d644404705ef16c
SHA25699010a3933e1598c935e07e47fd9c7fdca5ced4aa960641513c1c83aeb650a73
SHA5124e76a0b0192711fb8d8b7b26b51a341f526133b6edac5010dc9aadbecd6814ec91d3067a461631d9d0fd27f284a3bf56e7dcec9fa5ec84a281ba91e4464a357c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50e101fcaef5c1d3d0f914b69d379ab98
SHA1448c3f57cec3db4d959af50600255fb326b06e12
SHA25662ea53fe679b64a22df6ce261f6b788a0ef0989f82adf3259e075c324565adb5
SHA5123cb9fdcc46f480248c81e1ca198cd58949deb3ceca2efe45b6f1388af97a02a8cd2d1566e7c67b5f7373530a3543a96e2e973fad4e945dae65ef727d11d86671
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c03aece7814f344ff258f4ce421042dc
SHA16fab49425d8a83ad4bcedc7489e1b6a7a2239c43
SHA25603ccd891e73d1d9407b640e7944de1a45c1c810de5cc628b06444600096e18c4
SHA512eca9db148dae0ac32a5356200893d331481286b1747a97dff6f3f53a2fe6526054b34c7086b70dbb8ac0fd36f954bd69ca5c0883d7ccd0e025fe02088af47142
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD566244ee456a5f41c17c819ebfaf06195
SHA1f0c40beaa3d9213ed1feff7f04d8bf8eab66c817
SHA256b8576922dcc7d8d44226533a0c76a390563d00a65d1ceb15ade0d16844f6e355
SHA51220a1cbfba6dddaee44cf247e48b6f3d3dce8e2cb2e4c8c4fed8b9b661419a6bee37fdd8d5fb1d16c9604614f2ad877b0c82f959b6ba3f41023ffe4fa15775636
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f7111aad7c7be2bbdaec13f57bcc172c
SHA1c963396091e375ba9889d341ba63cfef71dba29d
SHA256b7b8b0dc87dbc3c3400d89a7d8fa1c8a5e3ada37c7427bcbfa6927e3be9c5f05
SHA51218f4ea7dd1ebc66d9f924e5514289261e0b827ceef6def38c14a256158b0e5739bffc0340d2b95cf84c30fc90d121b3b0acebd86ca165d515733d275068a3196
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD589354f7d970cf770aa2568c48c7d2f1e
SHA18e7e3353215f50c34200b1589f7bbfab10456b30
SHA25677ce157dd45c4a1f1e6cfd37718d91fc2002e7f130a79debb1800240b41856df
SHA512bbda0f1d03554d60e50544f7ba437635fb0dfbe95519f2155fa70f30b96b7f5046180c06de0f5ff090d19e3360e8f06902ec1215a652dc88e12574e54f02b2f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f35be8aba6ed68e1ab9700dab3f1b450
SHA12fa1abaeef372bd964f73d7d872732b7f8b8dc50
SHA25625d02a88a8a5e83cae0607aab7e5c7476de3029eeb72065b979a8d862fd8b6fb
SHA512f79044cf2d3ac7c868380c6b28e569d39981290294e0a4e64217e63077d019b52c132cbfb26b791c274c9280e143c0318ec0169c6a48714a98524d1c600dfb54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c60228c3521319abec8f260f90cc1089
SHA17d48c983ffbdc495eac03d680dfd097cf3581ace
SHA256d1a6ff98816d49127c2a279f4980f6cb005209c3d5c116728cfcab869441117c
SHA512e3437b924bc5b593fddea0d7ba5da016cdc9fa29cac7a911b1db68a1f29fb6ad225864f14d57ebc75bfa96ab2f30a6f76cdb14095c655e0763cca5e8b3102989
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55d86e10056e4dcbb6dd82f7334bb738c
SHA1ae97069982c78dffebc0b7829ea7a361e17977a7
SHA2564f7549d0ea91fc9fd15e1d5343d9d5e3ec073ad14b4c333aa6be9d4e3daca85f
SHA5125a175844e1dab17a22044db073d62427e0dde478ecb64bd397e51c78fe5f1def39cf2ad03330120b1cfdff912c804c6ab3aab6bbcd8a1ad669f002b1a94e163d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD569fb198637d81d23970ff29dbe4b98aa
SHA103c0986ef59b9910364677bd3797efc94938b345
SHA256b121f2a73f81e9608910b9dd150c7a56d15274bbc947576285be5a524adb17ae
SHA5125a2db7a987889e432f6ac8b62f664bf5bb6947f5623816cfd80858f389912584aeab4f1ef07017567e052d099a1f3c583e439175a8495b43a9d7e8561e136fae
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4UQ4J2DQ\cb=gapi[1].js
Filesize135KB
MD5cb98a2420cd89f7b7b25807f75543061
SHA1b9bc2a7430debbe52bce03aa3c7916bedfd12e44
SHA256bea369fc5bdd5b9b473441583c46b9939232bf1f98c1cedf6bc2241c4f5068d4
SHA51249ccede4596d1e5640a9c8e8be333f9c18812d58f02b2b15adb54172df1387439e9dc5afc4ccd9d8f0f75f092318bed68d3cd577338e88ef4f9373de8a07c44e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\69P6875H\platform_gapi.iframes.style.common[1].js
Filesize55KB
MD5aada98a5b22ec7188655c2c17a083c57
SHA17c3c2fb8744e7412d8097e28f588788d91b9cd9b
SHA256f2f09baa213dd3dd95edb5a30c7764e4a44d9a79c0831f90b1ad8ebedec9dab8
SHA512a780aa3b9e36f61be8240487e75c19a96fe26d54abf9006680a00af9d1d394e81e517f0bbbc13edff3a7190679260ecd56fd5cdd7c2d2f416ab8982c3277b953
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b