Analysis
-
max time kernel
119s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
16/08/2024, 22:44
Static task
static1
Behavioral task
behavioral1
Sample
a03ac8c983da22f9cc169705ba346703_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a03ac8c983da22f9cc169705ba346703_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a03ac8c983da22f9cc169705ba346703_JaffaCakes118.html
-
Size
9KB
-
MD5
a03ac8c983da22f9cc169705ba346703
-
SHA1
6ca56573d34943ed57a0f644914ad7f0bf746a93
-
SHA256
2f2e4d669c1ff037197025a8ecce84d52eabae2da40a02371049d5abaef3a55d
-
SHA512
803bf4f2f909346eb3a311680337bb4702c4457da1a31a3da4d4146941633487df5d2ee04d473d040d19ba5e28fcf495465aec4142430cc7af4ae9a5aa4ae163
-
SSDEEP
96:uzVs+ux7+LLLY1k9o84d12ef7CSTUfzf7TDBEMFTQEM85T7+TKIT6+TEjhTCoqTe:csz7+LAYS/jMHMDJhb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1417B971-5C21-11EF-8EE0-F67F0CB12BFA} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000007bb961ba998246e5269c7476fb3d3a393dd9715b07190b55a4c39d14bd57ea0b000000000e8000000002000020000000f06be3d9012491b7796edd4f617745697faf9327d4efbc86581913571fa5663020000000674e8cdf3cb1e8bce0a126589dad549ee519a71d802e4273b92fda50af0dc48e40000000f5bfc571ec7f2104280205cb883a045cb7529405695ca74032b7456018b2fa5798e7ed0b176fc0ba9f910d7b82d4ac3ad27d95d408c59e0b97ac63c4bfcff6e0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430010134" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60ec75f22df0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1720 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1720 iexplore.exe 1720 iexplore.exe 996 IEXPLORE.EXE 996 IEXPLORE.EXE 996 IEXPLORE.EXE 996 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1720 wrote to memory of 996 1720 iexplore.exe 30 PID 1720 wrote to memory of 996 1720 iexplore.exe 30 PID 1720 wrote to memory of 996 1720 iexplore.exe 30 PID 1720 wrote to memory of 996 1720 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a03ac8c983da22f9cc169705ba346703_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1720 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cf51e63f9773c6bd4ade966e3c91fc0
SHA1c989a59f188f74345f27538c3776b89e097134e1
SHA256f81373af09528aba13aa806a8fd0fd74bc6b2ea2bf48bc0cb8a7b6028eb6d12b
SHA512640370fc7377a8be29c1af293d6a56e7f2199226ce9dd0a336ba3d4fad3fc481f52877fc36cd88d7d61685835a1e3aab73a226f7ce002251566824a900b3834d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f641260490daad20b7e32e01b66b8890
SHA16b6d4128aa7485caa691857f2bc2c82098eedb9d
SHA256987eb922d04129566938df911d1fd08ebc4c5afe3f2c509795f6b4d975aa7c63
SHA5123680196ccb80036b1d3553182da3c0f37082e187bdc325ee196be1b2e3f7339147401cffadb4b24a8481266532558d2d656a0c9c2e9dadd0bc69b57f313a7fe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520fa923b577eede69fc393e7588222fb
SHA150a13f46d4137edc7e6756e71484336cc21fcd93
SHA25670158e171fee348eaa53e429b0dc8627ee431241ff8e25659555fcd36dd7f00c
SHA51200f4f4d94b5177aa859716ff7f7cf002c76cbd29304dc6fc0eaf8cb4e103a3b529ba5fc3ad9cc6a3dfae63e3bd890c1a5172e7efc1869a1dfc5c2f923e5b69e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5233e1eaa658fffdca4562feab2f912bc
SHA1d19dd1e34aadb66dea6ad492de59e0136fe98a11
SHA2561e24ba06e4bed6377af72ff019b1713447175ee5ac7f58bf6efb133edc12df87
SHA5123a5176786571b0e0c70b9e036bb346768389c953867f363b48849dc763e8dd3478355db0465668182bf7babf2f3e780f4ec959881474384fd027e961b75228df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517db5ebcdd90194a560edf49db2cf4cf
SHA1cd3be8fc6a2fff8ae33c8ecb97bf898bce476f6c
SHA256ad6345f2b2cb3c1f8b31448cb45b26075c3efe2be770dc5f837e92329a0e468e
SHA5126563c557121adfdb774f2b2123b97b95ae5927585d1e3973fe39749834508207701160a61f4dd04ad149533a87ad87e5412bbbd4ef4c9499ac4f66b3cb37fe42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f24f321c17c668692865e3f91e39ded5
SHA14e4e10026e582e6e826984d1ab7eda13b0b484ae
SHA256cc6a0fed94084924719de2d68a094d50e604cbb6b0332406f1642e0832101fc4
SHA512d768be688e3c632f9de8093e6bca0a6c32d50206199106e3da8f31f705cf6b9fc821011942bc3b7365aa8a8dff25b999e6af372053e253e4f00969d350006e78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562ff994a02b5f2575fc37fd10aae3d9a
SHA1c57f66bb8bf37532f0d16013d7ed901f4cac5c7b
SHA2565421acf81447f946817ce80898e5b632ddf997e7db6f0dcf106c693f8bcc7d27
SHA512642f3cc0d4ca2a66019d7cc2dd203b986414402f8a6c2f5daa4a3848fe63ae2b1b586522ef9298b8e1cc3b06d0e88b91005ec51e390bcdf0f03f89a879f27b26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f619e32ba7ff5020f53447684e202bd6
SHA1f41292e926e5098a26417924612efbc27e0e8994
SHA256dcad1b6da5a6a1ded6e1e123b90bd8332761ad7509c68ecb0152c52caf917a31
SHA51283c3740d1b7fe5c0dc69ae9e05151ffb7a8ede94b11f3f3c37e7da9d8bb282a76b1a83f9e24672f064041a3f2fcea0000420b8a2ba157d9694f067c0447ce63e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5428d014d77c42354a88d73b0186cd5f7
SHA1e0aec1bea10377321e824a8566996b5e5a8b0d63
SHA256f978a663dfaae6faf07b1d5e6a619ceb568745433ca8a1d49151ec2258f30c0e
SHA512df36eb9e35a7a578c998e3406904a2f7b997265037d3b754e4abaee8f07d6aac7f4111c217cb544d690035ef3153820c09b95d8b1278c64ebd5b7f5ebd47c45e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da3c806f0a54782c966b95f1e8cd11c3
SHA1885c9ab31e230db24c872f01fc492ee5642f4d94
SHA2562ef990f17756e5caa18b049aa575257f0bf638f3da8ec1b36e71ce26aaa3f821
SHA5129685d8163dc98c5813567c7b79cd948057fa8d65319b7009711bb1bb3ab4575d22571e8814a18550eec49020d9adc29d2cb0a574793d69af115b703d7c693cc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0c2d99f152a853b31755ec602ee5254
SHA152c2ac31fb5287289774df84a7230258b5736486
SHA2565d2e7bf25643dbc81e4c59f6e1530652f2303ef1954c0baa7e910931e4c970fc
SHA512cc91135533e97c4b5c6a4bbc5960e6301e6dc255aaf2e63f2af0f6d49c2dbfe79abc0871a205ed866b19d721177575f2fcf858f85c9bd84a5f0e636afe8be5e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529c2990ad429df98a22719d54bfc6c4a
SHA18c731b320a98faa016a158c4e8680417defa6218
SHA256364d80b0e49f801ea7b928181d375f0132c5433202d47f0a88bc061841999a08
SHA512a0320b73d175e75d22d77252a08f378ab3fb9286adbbaf76e9dd757d99f11bb12e935c16bd0b5e7a4cd5e8d7891c661c9f26ec6f9c6e34f6d3667f11ab9969a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530e71853a4a8efe6d5796006fe0499c6
SHA13e8af31d470ca8981de5387055504ff29b775f85
SHA256c46bb0c2f5856e562750974066e3d82788842fc298848f8069d38f04fd3a15aa
SHA5128f09c76e291f3c5404065b87c8d2b396a637f895d5f52256f6b700f6154c1768a3a7bb193a9a82d8925de34959448652cadebbcdb50e01bb6341df8f97bccd7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599e0f57569b5b1795745a12c1863afaa
SHA15fe2b474bc7c4361e4596dff26099f8cb5265ac8
SHA2561f564138b9cbd4c8f0ab15c5bf92f2ce624911ade7d419326cb8719cfc4bf091
SHA512348367eed0d1850aca1a2f24ebf92188a1a0194563780045239bcadb06d980165913269f4e57e2fd6844705a874c88b24fc8664ff51f4dde09ca6ab49079959c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b