Analysis
-
max time kernel
67s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 13:00
Static task
static1
Behavioral task
behavioral1
Sample
96323bd9c452d5c03d0b4c117ae49f1e_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
96323bd9c452d5c03d0b4c117ae49f1e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
96323bd9c452d5c03d0b4c117ae49f1e_JaffaCakes118.html
-
Size
8KB
-
MD5
96323bd9c452d5c03d0b4c117ae49f1e
-
SHA1
3df0ab3a26659bee8763a662a9ed3651d87d1874
-
SHA256
25ed22114162539e724a5941e117e509c3d8f41295f83198abe0c21d6c5c5ab5
-
SHA512
a1eb679724ad2234267096aaffee2e9a85e70947e6082b54f4aa651b48310c9422179075318cf65b395195ee840e0a97aed0e4a868f6bc2144e99d8739cccd13
-
SSDEEP
96:uzVs+ux7G0LLY1k9o84d12ef7CSTUOzf3DlSjoSiWUR0eJTnacEZ7ru7f:csz7G0AYS/lS8SZtb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429802278" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{234E1F51-5A3D-11EF-A839-E6BAD4272658} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000008f04b319d67656fd183a6e56577177fd434b7e478c8e9abc352ef276faf4d855000000000e8000000002000020000000350c1307ec2a959f5075c32c9d583a1aa0ab3fab3c8917306343c5bbbc77bc28200000000e8940c919d804db12dc4e42077083b80cbfa6ba7dc6f199f31b043c6bcb34934000000005163cffafd705e870ff654b30f3a67c5cdacd2c96c136d5601a44f8e3de4f5ad69022a2dae770a607a71102b58bbeeb341ab9abfe267815b6a79ecb2636faeb iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a00facf849eeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2560 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2560 iexplore.exe 2560 iexplore.exe 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2560 wrote to memory of 2440 2560 iexplore.exe 30 PID 2560 wrote to memory of 2440 2560 iexplore.exe 30 PID 2560 wrote to memory of 2440 2560 iexplore.exe 30 PID 2560 wrote to memory of 2440 2560 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\96323bd9c452d5c03d0b4c117ae49f1e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2560 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561532d1a9b54ce5d7a3173fbb3703398
SHA16325206e781d1e021e53f691d9c036cb00dfe0bf
SHA25615fc0ffa77f6777a30cc5aa262ab884b5e0595e1571fc8703585046670186b57
SHA512b2cea993197e3f184664db5f3dcb122f08c459ac48bb5b194329f43eb3f62d7c86d32af6deca10991ee3ef4d3dba155702a8389086faf8774590b8750665168c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500e208bf30f8a8461e59d82c450d41a2
SHA1ae8a53cc6b4d2e938c87943585158f47b0c2123f
SHA25608853ff73f1526340e8829716da884b6c8a7903eab42028292d5f04cc9d1fa92
SHA51240b82d4ccd492dde4572de2415877a1690f3f299ac3e335eaea213c693e9a60f9cda3c21dc22b1ad9ac1883190f554dc185ace94f10bf311e8fed41d4cbaf5cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5295a4ce44afb1177b83077abce94423e
SHA1c87fefcf8ef437d4a7e06f9ff60452ce56159394
SHA25600c458767728f3bff944472ab25cc9ec97751f283fc26958cdaa2f2d7995429d
SHA512691c6aac0508f2aa5c37db8ca4519ccb6f3c45b61ea982cb69aee5c35cb6be19d87629aae4551200901104b429003a536d6bdcf78849bbb031749bd5d1e5f2ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5b87710e95bb9d4bd5d1b1d7baa7327
SHA17aa6e4ca8b13e1e9aa3ed8904755a379f2b1e9bb
SHA256945d6f488d4778ca7a2d65071ce76f02ea66d9421f2051bd2b93faf6802affac
SHA512a9c4faa46d320388f003acf3adaae0f3416c157d955303d311728757703fd628c57cd79db8f87e9dfeb0e72ebb0e170639f50eb81f02f41f82dc5dda3417cb0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598f880cd314e32a88ca4d4d77af74de4
SHA10f241003fbd44dc5710d5ea63aeea894535defa3
SHA256e59da63de4b18c7f4beaea76c5d14aaacb3bcad57464c8b97601ac5b7f29f392
SHA5129ffb9329708edcbb4b546f4290d8b171dae2911cd02563fa101e808a7d7926df2f078b9ba9fe0c5611998bd1ce891504360b6995359a67bc03144b665c1cc829
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d88c66dc65eaac974365d49c826941a
SHA1a6faf283fa6d704cc2f8ccf9bae371aa2c88b106
SHA2569666bfe50a3cceb8a0c69c0cd815f596442514665ed7a0fdcc1c3bfd5b873d00
SHA5129e32c5b8e683532bfd4be356fff3e78d12ceb4b583f2e8dbe7f3ebd292d0032e900b112dbe03f29d9034a873ea38a5cf350ce686e5ef216369a8397f5d15b0cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d91687efa9778333e225809dbd230bd4
SHA1a01cc4a4712c06d9de979bc5f9a09d17042b4314
SHA256fffeb5e07087a410b6e2c6faf7d8bf46d71ae1b5d35b26c1ba33a4ab78f89f1f
SHA5128104d7eade9ab1ea4fe4cacb72dce59e19c3565425dda06942c9378242b31d6829fa1201b7144fd95c9f56608293cc24e3544f7aa412f560db16958d31c31491
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a41ada58c14f3c2b032e9671144d246
SHA14b04ad82ea6baf9e9180256a9187a1c3d557581b
SHA2560de41539d836172bcecec3f1d55da9c1dfffa04dc40d8d0385e164d3a71f6ad5
SHA51222f90eab14663f7c7c3fc7e0241cd332c3a93fe1d2e431091f76c6815b94d5baf2bc18bd50787ff681d41e5797e6d1dd4c9ef75b25ab7d93ea1dc2d9a11e4807
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b198f72eb7374f6d2d5a903b4e6e4cc
SHA149eed5e5c7a2c7a7e03e182b912810fb645112bd
SHA2564cfa760926c5612a531f831ef72ebdf02311ace1c06a639a669ede109654342f
SHA51254b2ef37e9a97ccd7d4bc2f17a8c54fd84908190a04b2856af2245bb1cb937ddb3284e26a82d264cdf852643ad7363ee5e8abb25ccb6a5fe187d7469a1faa196
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8787b5f5b5b745f6322bc78a381a35d
SHA19a993f5b785e2090ee63423755b427844a30af23
SHA25686810c74b5be3466886add51141f40df0def85dee1daa1aa89816b8e04b54ac6
SHA512feb371616b0d6efe9476f5666ce98cd39063a4e9455907e9a87da719e71f2c324bca21226b46f2a2223b2cbe1568b9bfe9652d315d6eb990bcc380201bbe408c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0fa87572dc0887ef439c9c4370fcc76
SHA1190b55e3f532454de06bf838f00b676e1c606e1f
SHA256234cec95585896e83e86d461f4c7b4a5b7f865935bd18a42385a41af0587ca06
SHA512254f086b0014e0fe091c243679b98738275f211ce6a803cc6de3e9d58e92ec933fd8f0337f8647fd972b3f4c7f28be1a2637908559fbe0dd48a5cce10de95871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55aaba4f33aeb7edc46b4a3ca62f27a22
SHA15c11958e2319a50414efee84423fd466da6ef121
SHA256f4cf11f1d93454daff251eb1db5edd2021161382dcb197230523bcae9f344783
SHA5129169262c1a7b7a51d5d7a11ac71b60fd2668a9386e05dd3fda3dc3996a38537bf831dae3e7bbe3495e181d210d3e07a0c50d7fc44b32af39a7529df2099681ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5106fd1f231f9ea13a4f5407ddf52fefd
SHA184f63fa098e755364b58329314d8b0a0b3ea09bb
SHA256003bab36d90a71e54a890dce74a7ef3f609f73b512374a22fd04203043da18aa
SHA5129fd42fe5802c6568584ec56be49dc45c92f84e61ba70cb6959ee899d6e858da6813d7a4a4922271cdc9a01298cc0846c534009e15933336ace5d5be4ab7c1c47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d001cc84ab8b0b948a6c01f8e623496f
SHA1fde346e2329fb053a5030e32e73d64c0b6607f80
SHA2565ff0b39c5c994449d8ef8c4cb9c5d8b0419cf349c4d6b4f2cde78a44674caf7f
SHA512dccaf3cd6343903c46fdbbbe597f325f574ee4ea68806389783f7b11a17f616358f0c3e6d881f993a5a7bff6f8ce43fea7f32e5090c9177ddd2e11f14b2b45a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53421e5db2c503ef7c870d04a5ff3c78a
SHA18d1760abbfbf4c9d956bca6a8012c052eea0db8f
SHA2562eb71f56734d11c2af6941fc070afede7874e426295356d9830ad46722d17fe7
SHA5126876981fd480736a313759f1d17e03af20c5ebdebf0721e239b7995f26df871f6932b945b6d85bffa51119de81b5e811d28678ad4b4355d697405111b5985d63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53281051cd1a38f80ec1478ea5127cccd
SHA1ef20f64cc01857ed49b4bd7d21a4455d22098763
SHA256b8c8be4c7c78c7dd74c7e21252d12c2bcdd7700915f06e3343826b88be28c5f4
SHA5126cf4bf706aac962c8d7455d7aa6651fb0a31b26a8c28b18f39a2bbc2aaa6177f2675ac0cda76e441f00ab6830ab7618bc185f33f0efb7fc01fb594e873ebc995
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad1dda76ecca52e82bb40497006ad140
SHA14883f0cb5365039c2f3bef5610596bad7dfeb344
SHA2563fbddd27d9467e36d76770ccbb9ad2480719053ac3c1c0ffc1c3b0aa0886c008
SHA5129e72810d708d68208dff38792b4b1757b1ed96805ebb2cf907028723d4ecc255439c0e16619e7af5124d2403fd3769ea5125845b05aa0164ceb07caab58b4b8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f70f8bc0d00658f39f456b9a96369575
SHA1e3da2af2ff520e32053e6aa1b1efe5f2a3f945ff
SHA256a9cc114cc03a1a3acc018826a18346d23a410d2770e9d34155cf2df1ec262f8d
SHA512563f5aa2ee023611a4d441c3cb9c6918eba5177648840caf80793681a55fae580fe2807138f4b3b584ec1060397fba6f623cbbc5db4f942b6928dd884d0a8eb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525590e2e39c465bc73366e690f905127
SHA1b0c4d6dfb39e29132e0eda4f8ec4cc3243233e8f
SHA25644b3dce51c352c1efa6307a708914e16a73a03674fbd37142bcb6b9d37ebdff7
SHA512a414159d342b4ff6f3f16a423d086ab246e7d08c166319c8415382bd8703d93eb4844cc430546ec45c5191f574a6d41aef99ea0117862969f2dac14db65a51bd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b