Analysis
-
max time kernel
69s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 09:15
Static task
static1
Behavioral task
behavioral1
Sample
9578d107e78c8f240b6a14658e09730d_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9578d107e78c8f240b6a14658e09730d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
9578d107e78c8f240b6a14658e09730d_JaffaCakes118.html
-
Size
14KB
-
MD5
9578d107e78c8f240b6a14658e09730d
-
SHA1
58dd0f1aa9f8222ba61f14ddd795e2fb0d6f6a56
-
SHA256
9024a45ccb7e2d66a68eb1a4ed00aa51bd7c7ffe47b0482fd975e59f365667d0
-
SHA512
86a6091e5d1ddc45ec6b946b844f6f492be8a34cb6a007c6c7a413d8ff461adc133700291e308857392ca18167a32732848d1990c3df9d5b0bb15d613bd948c3
-
SSDEEP
384:q4hcZdzQsie36QZYOAHahaXlyryI8YueHR:RcZdMs1KQZYOraXEuI8YuU
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7030ffa62aeeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000e982e39c433f48bf4d483436a32dd9a017e91ce9951d422bdada4f19a76e9aa7000000000e80000000020000200000007bc48670794547e651ce06e331690b4b7669021e5af2b7fe27d4ff41eb212f2e20000000812351a11f48eacf0810f1868ff9737fe3a9614de66cd5a0153a86bc765372684000000088f11d152a2773795e2eb0fe56d0d8f2c0f87bdb24561a7d77fb59b5c96770935eb17d09f285612df7f2c06e5cfe3c675222e9458a4508eeca82f61adee33026 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D23031E1-5A1D-11EF-BAC8-7A3ECDA2562B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429788829" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2056 iexplore.exe 2056 iexplore.exe 840 IEXPLORE.EXE 840 IEXPLORE.EXE 840 IEXPLORE.EXE 840 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2056 wrote to memory of 840 2056 iexplore.exe 29 PID 2056 wrote to memory of 840 2056 iexplore.exe 29 PID 2056 wrote to memory of 840 2056 iexplore.exe 29 PID 2056 wrote to memory of 840 2056 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9578d107e78c8f240b6a14658e09730d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2056 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5504622e27bcd6bc2a4d74ac4c2a75f66
SHA1f9a713b03d55b227ae0f3134af8392f20492bd1a
SHA256f9730c38d458a3589e26a19463f70487f9aa737c5e3e65fd0a7a9cd09ef004dc
SHA5124c38192fed194bb8f1eb219092bc6340bd5c4982ccaffb5dc220489b11b5d27f0f270cbfad2c6125dcd54adeace1a202452516c1c5b28c93d5ac268826086862
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e1f96415c8c87e767be8a80b4713f97
SHA17835086424cdfa2943903622fcae95f5350649a5
SHA2567ada53438260817a89862780984b3be1d839b13651f9308b3bdfdfbce34caa69
SHA512364c408a6cc7b53b3dac04324a6eb69f02d321683e03e93be4a89931daab20620ceee9073f5bd0cc35631dc95a6655f000f2cafc5da5b6b4cd608f277d0358c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57020132a9f3c75b54a41d7f668a857c0
SHA1b8e4b67fc4b90734996dc500b2abcb5c1b21a4b6
SHA256440f09c400e221d81dd1f9872b816a0046a55b1cfba9ae7b8d52736a1a5cb4c3
SHA5129b6ea80d620846a6013b315c9780cee848595c259271764e545aa25b6480e2887dee63741077bccc3bd914735d2bdc6fbb3c6415f403746b42cfca9016dfac76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54733ccd5c43017384001a9192eeaae9c
SHA12789524c9af0d66c74fe68ed5a0496fe609ff095
SHA25694f4413b5b1adc8fb39386b39ebefdfe6d1d7a34f94fae9ec1373a64071e742e
SHA512a6ad49942fe53a22bf0130ba0e7819bb5d506912c4471ac62c76ddde6673fbdd82da2af5a71e0f4738ea18c3c6ab6c34d3e91d932a303f61fb552c8860cc684c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5962a529b1641fb637b300db50399ba17
SHA18a784f2ad69d3a72e020aafa6a10e45cb077aee3
SHA256d6324210f43917b05e64e6229d9b5f37372940506cdeb9d9e962c28f0f7137a5
SHA5123c27f8855407a83fc769de87e9c11f3f1e6d9ca79aba05f17a8ffe3ca622b67e600c16f83c43b67e0938f5c8c4cbb7f89ee4aa4253064e8b7d4e45dbd0b456d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd6073b2b591e1456baec8bb928f9c03
SHA1b4751343c6f4a45dccfbaf6ffaa00b7e9af88f92
SHA256befb68fe87cb5a83d52aec6cf55b687855444c426af6108a9ac63c53eacaae41
SHA512b2703b428e62a71457a7f49afdcd9a820b10623208914ce826b1cf4ca877334f097d6f0177fe83d2410a696353bbab73bf87a1b6e9cd057231ee08929c507d09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9771939f40b37ccfa9c004b43f2c4c4
SHA1d33ee7d6db77b9e1e1e3d8da133c6e6940d15604
SHA256f640a47dc94499af058d4ba077f709b5022253c107ed870c9b200bbd3675bf9a
SHA5127345e18191b778d3d48a4c3ab9fab5f429635debf27097ca307cdb93b5f0ac14f26188d758385a05f6dd1516a29aae15efa89cefd243c1a52d07de13a62b7342
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af98a96e513365db393b0f21ba732a33
SHA1dbf73824dfbaba6857e8dedeeac2b02f7895aeae
SHA2564b8d4a7d298f226c0f1a6f32c33b0e0c0dc5a34e74309d98bfa33561e8a08506
SHA512f1ddee3d994a426369182e92910fff55ba92cc38884de766b122e6e4d2b6e892a1b672f937408a0a43c941cb3172649f5cc412f3d9361e92023c949d84fbb389
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5017403218f31fd016b53d6a8ca1269
SHA19eccc0c9ffc4d9b17522184812b205c87d831e7e
SHA256fa83645e7886a7267b25c0b8dff939073794bb3ab023e87539cbc9315f3873a4
SHA5127120ad8fd07b2c4a3314c478aed696c2c527ba2eef48ca45b2facf9b1d7ad93add4469cdb59481a293a9b31d09efe840741e26aa1ec253604caf5c3d43b46e4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4e56e9e0a797c90bfbc3b193371ada1
SHA186bcf5a168fc4e68989c4f9b9db54dca60121913
SHA256f157a260baf25767c588797073256fe4d8416be6e88e30815b8bbe2361a7b532
SHA51259cb078b2746224577ce08db382a00ed12f238a884aa4eaba1afbc2494b2f969d9fd4b589da26d808d1bde0f7565e1c9948f4565bcb655d3cfba918810274163
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5645fdbed7b0ca3229e81e34d3f0ef61d
SHA1d97e68a76624ecc410e55bd751b7da84762436d7
SHA2561d89c950c82848b2e80ceaffac8ad3787c5c54e898aa7aae7ec8c43a31fea4cd
SHA51266b40aec4e293e82bb6b521555778c5154e6f190c6db69a757d55ec0fd0b3ba0b1b3b71a0917766210886e8f98bb3b002fc5878b517702a4677f79fafd5b3711
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5959c42737a0f568e39f94859f1c902a6
SHA13f4cdc2b751d784d4c109daefaa8b68fa3baa295
SHA256a2daf536ca86209d75c18c82dd344cdd9ad50376544cf505b0715ed1bfedb83d
SHA512d75913d9ce43401e7b59a04c3e7547b17805fbee1c293e8ab59f434de10b0373bc788e8de885a4dd460989c2413adf68518aa800a9c1bd4d43213ed781a325e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4e7278118c2f566fab9278e2bd7bc22
SHA102bcc660edf5e6b18753fb10b9a067bb9b4ac1a5
SHA25641fb09f3a392f83938bb35414c5044bbfbeb96e478dcc0651777e98498b737ec
SHA512f367a32153fad3126cace132b771493617a0a774bf129569436da37ccf0731b20d04a9ba4c45fc6956520a513230d5851eda4bac0f672bc47968ec0f0c0935d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533ccaccb4bf80f70c2b0abaa08d998ca
SHA170f071b6c77e0b84525e197680008c1f001d1338
SHA256801221468b53f151dcd9a02d8f6c0040920093a446bd96d225512d784dfe6d86
SHA512a88a3c02d7f3010e9238a0bf6499950271b0c94f74b3821028fc4131b1e64a5b8fd27c75d348f326dfc1f63896ca48d3c60b2e465e28c7d7498ca828e4504e7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee1e70d7667c7b9416d6845fbafb1048
SHA16172ca67a8901c9233d17435fee6e06e782642c7
SHA2562f8d2b1d98cfa6c7c676bb3d1268f684e97d4909988d24873791d71781597b29
SHA512992b62b355e3c5611940f98d3b5469ad8566eee98a2f946a05cad4a6cc235d9eaed0659d9b7e5f977cbfbf652a13e98eb093b27bf8fb149e24b5a3ac33bf4dbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de5ad71b074a7762732e8d8e92412e3a
SHA10388a51ec9179bcb3715cffef35e0bc717112114
SHA2569979dfc538d615796313ec50bc524075afea79f6980dbea801745f0f969a597e
SHA512d31cbbe2d0c9df2ba4761bfd9cb4cd688f00ca9a07872da27606f39250031202a5443c3a4feedb4d6b27fc8208ea93257b55ab55ca564ccc4c54ef14dfef91a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a01fd23e93c7fcb2392b6ab29377bc5
SHA19e800e950e696beb141a1f6adb7f749544256635
SHA2568916efff2dddb599696d9d84c525a486ef6bf21318300195847ab470a0e2d99b
SHA512347d3f321853b52bfbf65db79ffe8675b285323509516179a7132c28cf47ffd7aaf2e2f6d92d7ee09b823632ca5910f3520416df88d25a6d79d05626a718747b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea8fbd0df533e8859478ed1c8476a335
SHA141bddf525d32144dc72190f7b2eb266796e69cd6
SHA25654dfea950a010cabc30af46bf647e1f77e1d9ebb6611b22e43bc2c5d30116b28
SHA512285481ee60b3288868e6138beb2e7526622585bd8173e75718ba643ae876651d91e651dc91d70b3353f6e4beb52ba859c2f089d603ae90c6b64598d420ea56c0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b