Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
16/08/2024, 23:10
Static task
static1
Behavioral task
behavioral1
Sample
a04fa37602dcf3b77d7eb5a2c5e9ba80_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a04fa37602dcf3b77d7eb5a2c5e9ba80_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a04fa37602dcf3b77d7eb5a2c5e9ba80_JaffaCakes118.html
-
Size
29KB
-
MD5
a04fa37602dcf3b77d7eb5a2c5e9ba80
-
SHA1
be4bf81fa9ce9b43a6d9642cbcf04bcdad8233d7
-
SHA256
1c96bdc346728ef3565bfe8bcc24e1b03850a099837d12cc6314a9f97e479d86
-
SHA512
21c2c1f6b1394a10d6e00d72e511b831981a871d232b18be3294bd08807de0d722f8f3cd3cc068f53ef6b76ea0bda096b6e5bc161e95c7e76b2b8a01f958faab
-
SSDEEP
768:Zcd9QZBC7mOdM0JpC5I9nC45m5Mjz6QPd:gQZBCCOdZ0IxCkm59QPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000aefdc07d98fdc891421fcf06af62120c7d7a0808079f7421a2c1e68173ec5e32000000000e800000000200002000000019c839e67b822f57c81a3f91edf8c44e563fa322274b6a93c9307aff726f53cf20000000064b96dc18660b3f729bff6f3eeea3c627d3b09514ef6e1513342da4ded9b6ba40000000ade77888b4960a59336969ca54df9c9bb163fef33473aeb78beb35b1c3731d11b4d7512256f842384608cdccce09197c00a4ebf8c218228246ce819c113ab50d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430011707" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 204dcf9731f0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C0AAA691-5C24-11EF-8EE0-F67F0CB12BFA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2716 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2716 iexplore.exe 2716 iexplore.exe 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2716 wrote to memory of 1612 2716 iexplore.exe 30 PID 2716 wrote to memory of 1612 2716 iexplore.exe 30 PID 2716 wrote to memory of 1612 2716 iexplore.exe 30 PID 2716 wrote to memory of 1612 2716 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a04fa37602dcf3b77d7eb5a2c5e9ba80_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2716 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4aa6959cc779014e1d99bea7f4e2cbe
SHA1a625762663205112eea6355e62c905761f67d092
SHA25667ce99810a3e3de452ebd20f30f1d7ddb26696e208688356ad7c358aaf0c1261
SHA51236d89b8587afff50c211a69c43f3c182450226fc6a2c669e1178d15b3a5d39c0d3419a98a873ad12d427cbaa94f1b84807dc536bfebd1b6ab4ce9bf3d02fe7b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7db18340d414c340d941876cbca0a97
SHA10df367a5dde2cd76919ab1ac98f193139973f7db
SHA25643775315f9f304038fde82595acd5555e892c80196c37f92a8ab80f767c9c3cd
SHA51218fb833424edc29b8f116e1999e146bed1f13e4bd505eee6acdce624d6e5a65ef99ca5a21971b5ee9d7a32ae39e3ace9590f8ea90f66702505bf062ef659d9ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b59de63b0c94538dac8650a8e80038e
SHA1ead041b242bd703efcdc08269c273e68424d8ea6
SHA256c9459823937dc82d973edd361ac289923eedbd4ae705fe3a32221e64bbc51fc6
SHA51214d64b43f04cd0916c69f6a50b38783b72c91529217979758010af830da84b651fbe35f33393f60a30d37cfca7e1b7ac3041f0012bc48731da1dd2bf4b507309
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54abdd627a6843d70cb5b6194b0154206
SHA102f800268202462f5a4ce62c99773090a241d683
SHA256449d4e6b538a3cd6640314207225a57182cf8141baf10798bb016305a18a376c
SHA5129897c961ed38b511cac383b9c65bca71ad55aadc50323a4dc0dcedd95ee03b5c82e1a057820e370125c484a6f6025fa44bc758e6ee5213ea43170516bd7640ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8457a2142bd034cf73421a846c66f15
SHA1635715c71cbb5fdb233e3847240c487b667c4270
SHA256d46e1beda6d9268b19378de815e66aebd313a4c468066841fee9f62f254bb6be
SHA5126adf5b5c682b11f3c69885b918f92685002026e15e9d880e5d2665f21237e50ea909fa36819b2c6a2687fc256c0ef66207bc0f0659a10fd2514ab4ddfffdc223
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c352b00f9385e1143b73bbab22aee73
SHA1e22dd204e8f51736e7872eb0ee1e471fdd7911fd
SHA2561d9314e8c7f3ea57e6b05ec7061de87ee279f4cbd9adf557481095b64ab25795
SHA512e968156093991e2729fc14d01fa54cb7e816778b7b4f43f8a9a22c9a9860ffbcdd85eb366673362ef2c76f134f3f48d7642ec77b8e2e1d5502d1705b4d580ce9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59142f79181a66d6afb010e2631af69b7
SHA1e5a7664f96cd81036b0abf95ec1a093e1c8a4ebb
SHA2560bda61e42d9ed3927ba2fcea48eb65dedf115e4a33ced3326f67c340235f9b9f
SHA512a46391b996bd322c92a8f556376ed3f3894c1232adddefaab028abc1be7f2ba72bb059d4457ef526a3345e9887b63c52641249cb21e8b03a61bdf19b8dfb3a4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5669024d475106262ebf64d66f3949e9b
SHA1c30ef24c28d57ad8084d1c6e8da2ba85e9333eac
SHA256fa44c656f3652ceead4e3afcad6480e357c4c71cdc72f6cb7d09c89cc3721209
SHA51279bf6397aa5cc96e7b9253d1f7cfe17dfd13b7f61afa8161ce5f2073f3023002acb2bab670f5400c2a9b4957c759e3f65eae4acb8db2c7db15999ae9efe53b7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574540c468b5c715b06c4bcb8dc132f54
SHA1ec5319089cef1234ab8aada63796803d1d102e1e
SHA2561aa76019612b97fe3d2fb12b865bb6d9913af37762cbb96d0165f6940317ede2
SHA512afe8f4617808ed7e68cfd9d09db490642b2c6abafc33d371c6541b6680ceb07b538f898fd04d1c68b4bb82698ae38fef85455b1c43d9c4711c02717e7b30e79b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5def57c808b274c0e99cdf44d331dcea4
SHA17176e3ecb3d6936131bf983a069a848f2952d915
SHA256a60104044f02eda53c7ae0a00171ab258e69f860baecb5cf2fc42e42c098c272
SHA51226c3f30d64e46d87e5d624bf1bcc4adadd3b410b59da31343a065b0801f14b770a0241426612bb78194e17115e3dc08b09e821a11a1de3904f813e3630da6d71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505c1b81927493e1af87c11bc8d110489
SHA15dca491915d6a538c5b18adb188a4c3ab5340d43
SHA2561968fd79ae7bccb2d6f42043fcd0ea28f33a58ee54a24bf76e3c7787a3e7b051
SHA512bee2f1343db0e892738b984a1ebba4606a274c6eccacb0cf95ab1b527c8a1e229068c4438c1fd86edaffe4e5fdd412a9fc9fee9045169927ea84f4775d27c543
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cfee5a3f52e0ecbf5f966a151d7b4fa
SHA126c91ff3c82b522ec2441b85fe7d4902f85bcaf5
SHA2568c0bb3b73887c9725f302fce5ac87a129d8b1b14c8bbcb800957153b0d474acf
SHA5123f9f4e4541d9126d71961df9a55384dc2ab5369859f5343616c69d651ac768285074165fe5355c663bac93f1efdb0788fd8dd67e0c3b63f8553ecbe3a387fb72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556a1934473398d2966c00579eae2a078
SHA1dc96e430025e509979f638bfa68d14fc0ac1b51d
SHA2567cd71f66e7492cd6a501924e3e22e362b645e38cafe69f2615e017f5a1a300c7
SHA5125083a560ca5acaf57e2565cbb35b176d8cd8a2c5d9bfc8b19ae0910097f96288bd52f77b5c862600afac88e415002af6ceabd5f30fbc49797dfca8001c4f730e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dc690175a0bef759dd77850d99dfbae
SHA112a463b81ab447d5160ffb51f06bc526649ce999
SHA2563d464ad50bf3569df0dd70b429852fafee7850f37f59b1ad23f60875071181ef
SHA512967af937a25c3b3ffc631607ae0b0f929800868c758d807103278a4b66ec3bc5a06dcb1813ca885c19b45b66b912cf7d8e8b748c0a69421982632f6d8952adfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ad11599df336a526568d6302e0f32dd
SHA13e582a4e7ea64f0d30d24903844f59b9886c3086
SHA256fb9fd86cbbafe7ed3d05b411d83dfbc12527cdd6d50c7dac7952de666b26ef1b
SHA512c8d0be09a19d435baab97d8e4050e0dbc877627ab3fe9edbe3e0d52a11a0aed9388febfc338efcc6d0b6bb7095fbe7221ff29d98d6b801d5254e262c35842760
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c52d9867d489c4e8593042267a7df90
SHA1ff1a1ad56d4b983ba20b5abc77aa13dfa0ea126c
SHA2561049a094bacd3bb27cf3ac322693f381c07414b4a694bf07b64926ba82073dbf
SHA512d0be5051a61527c210156a62c7f102140d67048d6a426cfff65ca9e4ca56da1931c7b4cdcc698027093909f3cea4fa8c8acf24cb12bcdf4ff0e83d2a9070b670
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536c5470deacf4fe29d4b594db2df8513
SHA1400b65d781e7cde8830013da1b82070bf50924e4
SHA256857659e1aba764f6eb07804158c833284a28cae206fc980645a0d4b99050f5f8
SHA512cac386e465c379410557a4510d8be0b3f931b68c9776c430ea59f22ad9a226193d074b3236633c84b500a61e8263eec0fef7585000748cab9ca7912ee2d78795
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561f42ab02ed8053c17676fd00e1610cc
SHA1773f3d343e890b4f215457b3b285d3c748e2a06a
SHA256d0c5257641485548ac80e6985bd9763bc81a5503c5c49be67db4ba236215af09
SHA512b76f675a2441a9e9c71024f84c9232a903cec2f3758dbec7d27cb46ace94c0195c1c36948c8ef0fbe25bc30aacdabac559295ce0ede1ad7c236306b454dd7b9c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b