Analysis
-
max time kernel
69s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 19:46
Static task
static1
Behavioral task
behavioral1
Sample
976d34f176f8b3d3c3c2cbfcc5b13a2c_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
976d34f176f8b3d3c3c2cbfcc5b13a2c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
976d34f176f8b3d3c3c2cbfcc5b13a2c_JaffaCakes118.html
-
Size
12KB
-
MD5
976d34f176f8b3d3c3c2cbfcc5b13a2c
-
SHA1
f1bb6e2fb8b74279db6aaeb9ccb25cbffc3ec13b
-
SHA256
8b640a901afd0c2416f5fa5ce2c56ad9f17f18c4f83f95da92ee535a61bab0d6
-
SHA512
2bc54160dcea464a828bb95e29105c87c2cc11d6a9cc14bac1fda5517733291d495f6b2ecdb3970c3c55094bcc6ef2f391c62fc2a14d73d4c9bbee72982d2c16
-
SSDEEP
384:FCIUKm065tJOdCfLDQaXAgkb7v5zlA/40SA+BzM+o8y:MKY/wgUsSAUz2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000007861f6fb44085ce2351cf36075f5e745083b7e66bd1b9cfd0ace5a17868ae0ed000000000e8000000002000020000000e92708b3aa6f0030e91ca5d355f9530245ac0ba826036ffd5d23459445fe778620000000b9b34eba3dae5bd94cee7494a9d70a8cdaf838831a616c99bb33b352d017007540000000276aa829c949d39109433f5cc759d70b02ed0b748bb21ec66ab526ca9b70c7f85ec82e83dd8c1b20327c4cd70b7611a464f13ed2087409ffe342678c13a8c956 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429826648" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0e268b582eeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DFB4BC21-5A75-11EF-960D-6A8D92A4B8D0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2740 2240 iexplore.exe 29 PID 2240 wrote to memory of 2740 2240 iexplore.exe 29 PID 2240 wrote to memory of 2740 2240 iexplore.exe 29 PID 2240 wrote to memory of 2740 2240 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\976d34f176f8b3d3c3c2cbfcc5b13a2c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e40a3ea12f923228113439653242cfc5
SHA1f6f9b03fab947bef2c5f0312e20600e4f11a815d
SHA256d7ed17066e744bcac726d80468acd8c422961703919c4c346a56f5375b55e9fe
SHA5126a086d04a48f11efb86d1a66c91bfc25fc2785c6f63aa95fdb52523c193ff77ba2bc9caddfcecafb36f9f5706c3a5a2804467853f853c80a97fe50366fafc480
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae0d4e5fad9f43674c0c34452bcb9db7
SHA107118863776b23f59b9aecf69dcdf070883510b1
SHA2565ba7d15b089b3c33552ac3089a9712a0ce22fcbc3da9d06e0d8bf4e1a1d30297
SHA51263f169244cc98f5af8e35fcaa05364ad1b898851bb92513d43a0e879a73a7bfc03c0da5b16cc8053df9b5b5e1e9395fc3e911973c8a1f0bc8df7f2a65bff84cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588a5c3a6e52d36cfcbc3499abfacb875
SHA15471b18b9a826d91ecdf0c28e9fe764d20ba426e
SHA256bddd000b032d2faf5ab37f255287914d589dcb5c24b6d022ec2130ca073fe350
SHA5128102e6d7bf7101c591cae26cfa8bff57574061e9469bc7e4978464ed163f38347bb48169bb62efd9bca4613a40e81f184dba2110ee08cc289d4902a3fdc5d14a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55617209f01675a754d7ff6b4396ce171
SHA14202e7033c46ff5e7a2e219cc5cf6ad8420a2ac7
SHA256b7dbc72483480dfda77479f4a1ff86437311686121ed1819d33c0a7204a6b762
SHA5126bf16b0a9b8b877c04e3c6c03aa479162c92e34b2e70641c6aec24011b40aca256a9e6cc8cdf3a60f9472a610899608dc3fd1a5c6a28211fe78cf240e04ceab1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5071ba8aa48dc7eb9fedee833d0582877
SHA12654597140a45ab4f56b1d6afc590215fcdab813
SHA2560654ff48517b906bc54e76dd6a73d491ba5f1142c3f5b8a74bcd70c8bf9a2783
SHA5129aa0f6ef259c981b26ea1a7048f9543b64249d6b47ab98d809a1d087fd014b68408a6f9646ab8097ce18677c06db9f4774bfa12d0ef587cdb9bbde1773696c5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbcecd67dcd4d0c636461b6ecb63eb22
SHA1f59ea0697eeee182216dcd83f4885397995cce7c
SHA256c0001f1a67b40af1160fd57503008d6412988ae60efc54a56c19797a631b7474
SHA512fae7ff34cfef9a440b2dc71308b9d0dd9158c849fa34a723949f2f8a0954fd9e98259086faffe045e641806773fa56963eed048b81bbd7c39f9d1a3496386ee6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e453afa1454337a976c1508e2f2bda4b
SHA1c60a1662dfcb249b588072254c6e54dfd1b04a5a
SHA256bec96a8143aa803a636a626dc11037a970c57f15446a004bd4a3002eafcf62ff
SHA512e6c9a00af83437b9272e967a9ac7a1f8f8449764ff10e8cb68e93fe1abc69c750a7a86cc55ba3a75102f5f5e20fc7ce70719685b155fe329d1c5d68b7ac585ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fa1a9a17ecd13a2facaf4de167d4e7f
SHA1e0cbe8bc50d7d6f6c77f2e07ae8f5273185e2bf1
SHA25606b564ff2638b3df85e40f6c0fe1ad881c7e9e2110e5b5df11e55302a544d5d3
SHA512494b4df5473965e17707eaa5398cba98dbecb1a7bb28550cc96e10d31ce454ace4ea3441adecc79ecfe29be8b32801375e10f5609027429a64f3f1ff25aa8602
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5871249a8a6cd56c996ac635fea509b73
SHA1e8703b11f389153b0393d2856ce1090eafaa5755
SHA256614f32866b9fa73a397768f9ac51fdd015d8b637ba55b763f9ffe22407692911
SHA512727ec30e671eac79ec558e9f0b5dee21789116550adde8c107ddec2609f814a0f2d32098b6ec66b47be1b369630f8224ecea50207992f63e3411b013db36f657
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c40b57eda4db2058248ee0299602e8db
SHA1a8322f08f02b7dd53a34f7e0e6da3de0118e6a3b
SHA256d25c024ae435e2d123e17590cf976024d1dc0304248501480409f48dd3067f2f
SHA51292b71aa2c6880c0001968aac10d74621bfff022d5e00c95d401993ed5d09e342856eb5a4bbd649291d85c3f842fa701bfc6c4e6f4f5fb67fa73e237b84adb758
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a128ddc37c2577c052cc3049afb5aa35
SHA1b53b419e1f8e80260555b8dd8715059bb0bf123d
SHA256f7fb7882a1d436c8585087c88b4613040ad4ec35bd0457981380396929f1143d
SHA5122cdcfe8dcc3e89461093faf2d694ccaf22e4953d9b608d60d4b5e66f55a08f4153bd98b31d3976e03dfaf9f40c9cdede912c088999c1e1a591ad481f1ecffb5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e45b6ac0f9dd68b9bd09b6031aa33fb3
SHA1972f2772e67d860ae0ae3d1081f461d876e9dadc
SHA256aeac57f2d52b3697489471fef90a5395cf27f17c94c9e058df21d5585cdae07f
SHA512cf61cdba570c93cbecdc995438d13867ea10f499ab501acbc6f22b824bac33aa4d3c45315f71b51c9a05a39fe6bc8ae6be5a977e9e5878cf901509024be1f294
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5525b489356f4f02cb78de41dde2c2bad
SHA11dfeb8acae79594bdab8c3aba478d21ccc687c4d
SHA2564c85c96eaadc925908562e8849ac7e9131a170834f9fc5e2a350df32c4af8c4e
SHA5127e02a70a9a0317b9bab14f477d9fe6f339f251c5d0b74dde4b29b3d77c733fc2ec6b5d60d51d175ef72ed498a9112e448e2accc5bf5b928c85c40ddfea3313ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0685c941d2619fd395fcfec49b05fcc
SHA1d13f251d2ebb923d8786e0d3b790a9b79cb65f3a
SHA256118eb4923a8b1d19bbf0c67b3727be52fe27e618687edd5241d61e61378f9a10
SHA5122b9e9ad8a9f6a29ed3147fc2dc06faaf313d3bb29738428dfa6231a10f217eebb51df70fb8e0957bd1e26de598f659ce99997bfc29067b49c8d89ebcc2b355b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bbfb8763635928554182a650681fd50
SHA1a9b14ee9d9c37add5b29687f227268de13df1d97
SHA25634d93bf9bf03f2a9341438edbe0eeff492b49ee8b45409af63afb9e988dc8cc5
SHA5125def7fd1cabb00912a1853c815bfb099de473784da6da264aa4a216327799f103b0c154decdca54e2ecacbfe0a089b8c346109649a762b71645d487c399a56da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e1ba1844d1b518aee65311b5dcee595
SHA1409b25bfea74d8c9920d05111b36103019246bb5
SHA2560a89ffb1778dce9e355a1a2107d8e9691ce4273df55a20d7edcc02bb590ae49f
SHA512602699e4e647c296a5d88c07ae3def0c96ae96c64379e9c63fc4981233e119d9d4eba8220f689627bb173e859b8b8a925a30067ca91c59bb778cfca8674b24ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510c0f2f288b2b6a50ef1b394914cf618
SHA1c827e7f9a24f6c8933d7552bc1adc6b427daa983
SHA256a6e6a4a70a1d5d410a1f252835884624b9e20163f9894c3e090a7467d3d5209a
SHA51287f70cd959c629a6a864a0fb9553f5a99690cc41589959fe3e688af98612045538210f8e73689edf86c75b5ab256569c61bd0c3745879cd680bb8e4e100de3bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b80c0a1ea7d95429ae83a5fe28284e03
SHA19434b957408b2c5c44ca8b219ffc87aea233be30
SHA256abef2d5e8f4f46c429ef96849cc519ff18b8a47f501d60b1e7e5360a71439528
SHA51287d2510b34323dee1aecf3d7a9feaccbc881f9b652cf650a91f83cd149940a62483b80f9d3684c3deb33942c616d3b3f15aabe8193f8e3e82578b9107e149462
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b