Analysis
-
max time kernel
140s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
16-08-2024 23:19
Static task
static1
Behavioral task
behavioral1
Sample
a05738c5442ca74404bd07c907a62ca1_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a05738c5442ca74404bd07c907a62ca1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a05738c5442ca74404bd07c907a62ca1_JaffaCakes118.html
-
Size
26KB
-
MD5
a05738c5442ca74404bd07c907a62ca1
-
SHA1
9f20b4fd596d7568c7bd497d8ac2c14bcd2687c9
-
SHA256
27cfc26978fd139f97991238bde9b61599f02f30cbddc1792149bda61b1c4543
-
SHA512
65cc6c182efd365e792d1d5b55976db4ee5c42f6985d2b3ee10aaaaa57a80d87ad889c8ee83c1cbad06a48daa5a5d2f6196fe75584397bef9288216ca6d92def
-
SSDEEP
384:SEbSjxuIbVoHTYJp0j2uJ6R08utik+vQRb2MnZf8VoE:SEmjxhbiHkz0j2Av8Wikhq68iE
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0CA7C181-5C26-11EF-AE10-CEBD2182E735} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000dc2ebb2daee756d2a5164719c23ede7d4aef4737d209cac4e5d82583dd42cd0a000000000e800000000200002000000070a31d905c1888bea07a5550b22962612a578709c8bf924886b56d488148f63c2000000016709de4502364b60dd3397af3d97dc30b816e19a4477666ddf570eab06278e5400000001a3c2393e012c62b89b8bff4d29c419679db2b4275c713b01bfa03bf0a817836d9a186e04d7f222a591d0785bc9604c4c37dedb078cf918252d41a1b764a1326 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430012265" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0ad3ce932f0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3068 iexplore.exe 3068 iexplore.exe 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2600 3068 iexplore.exe 28 PID 3068 wrote to memory of 2600 3068 iexplore.exe 28 PID 3068 wrote to memory of 2600 3068 iexplore.exe 28 PID 3068 wrote to memory of 2600 3068 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a05738c5442ca74404bd07c907a62ca1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3068 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5684a54d1d949cbb8ccb2e7135c791ae3
SHA1296c06d74d46f6d562fa923e1fc0a35efeed19d4
SHA2563a9576aa4b82cb74ea3590f3fde58170fae8d9f442d3f217dff4ac0dac04af12
SHA5121a9f4bdf5710678cc048ac169701fcd43930f4e9082aa028e4cef2ac45efeaba5ffbc4c5314099b29b002023e6c5016f0d0737915613d59ae4b1f0caaebaecb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5656f8182de7c7f03e4ac1f267548f9ee
SHA184226052362207eeeeecd36f7c62b34ba9fa0692
SHA2566fd2a70586cef3b1d8b3654f7c529a2df1ac8329987f2548d76eb4ebb685742d
SHA51276a00c79ec559ae9b34b617d8c585e2247132615c6b76d144722b12afcd7a1e5d37f8fd86ce1bbb33c9e10f5d750ab7d24c429a33f44d9fee9afee92f28eb8df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518f48786cccf4abe6bdf45aefd64ad37
SHA1cfbfc8550a19b6d36d27d6d8a675666f9827637b
SHA2560b0acae855e04c0488213208be282e21ab7bdc9fc556704d9aacc92a41f72567
SHA512f87ca6a167feeeed98997ad1dceddda1403383aa347a360bd3e272046ab7ab4954341aa7472649a51edada8bdee727a2d9acf41ca10e4aedc065a915462e4758
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523988a080f2fa837efb06bf9d0d9bdc8
SHA1b995adb0f322a0445f0dbbf673bdf09d73bff989
SHA25643a459347c6592c96530077e98b2a031e08808bf5a29f72f6405dcb384542c84
SHA51295c65c967a9fda3c9708eddb5908e8b1669e2f35f191d1a3df06592054ad2b5c8c1278297cedc412a59e9621dc16746ce22e9db0c3340168cc0909b5b7096d09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd9b053f274ed0dab36b93d0d5cbebb9
SHA198442e6ef2d0921452bfea11f104c6251635bab2
SHA256c5c70cf9a57a224fb513541aa9393120b9a85c2303280c88497ff5e65f130b7f
SHA512a5831c16b75003454c6c20e4d08825208195d6973908c932014894f370134ab94c0fe097ae2299a958679e27dd1fa9ece6ad916e05d5ceb499451c353a1d5d2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc443317657f948055b24f14b14767ef
SHA10b963f07ce33be8f41e8ef0ab080a3b8b1443640
SHA256b0b83bba2a63c1144d3c5f76486f1b70df8a2e77c75dab3d7607661e2f9d3864
SHA51254c3067d25d651fbff36ad67942f7001a04cfd8a9e089d9abf56240e1ea152f4f291e127dd72ddb5c4483484238128431a2eda07e06c5e35bd7977c15a6382c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a459a22497ae84dcfd86cf002a81990
SHA1a0200afb8522e2a97673d42d6356cb81a616dab3
SHA2566684bb8410f604f0e1dcee9da6fb091a94ffc34236b33c6914d3bc300329bd5a
SHA512f100ac81e63bc0a17ef67d0f5444c21a9d9d6fedafc8146626db810ce8daf4b487ef068b4d78e87977f3aa1130c94363bc671a692ff8d465c712d8f1cad9d298
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5334abf3eaedc75ac9c087651c8dd6b19
SHA1b559592235a05df12c47c45bac339567b415e753
SHA25600e312fa61832efebc0b77eca7f873cabaf5132b45924c7f64afbafb58af5249
SHA512b6079df9062e00b8b5e68eac6ea1a188fc90f530d958a6cc1aef68e9d8a277a73eb11555812d1a50f3aacf444fbf54a0ac57d008df7da253574fe70955795e70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ed94684f0a18b23501686a46897a680
SHA17b7fa129ebda51f4061d1213d096eb18d6fa5506
SHA2562a5243dec7e00f998e98a188ad5e3de69b2a9b3d0eb4c42dc32637ce69a875f7
SHA512513ba3c23c2323c64703b59077e876a54fd067d24e683f687dada27cff7f27cb4af50f7d805155652035f62ad05a47864e0d8c3ff2991ba9dbe53c18498785b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58115cb69ffb86b287304c3704a5a816a
SHA1c844871b600a827c2e4a8d05f83a9ff9c4475a55
SHA25683d8506d7857a303933f812fe551f86d348a3cc35d4dca4166be1c22055504e4
SHA51276c9de597b1ee393801737ed9dd355e4478cb4c0396f33a20b473c94693829a30f2d21da14e1bef78be884f3419b35218b41e5efdda554242b156af47de5a43d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdafc3d3308c54add32a9930ce9bc388
SHA18538b976c73fbd122f8ade9ac129235318288156
SHA256b14fc301b2b988c9c07557cf3777f7362d58d5b990edec4009d6394510ee8666
SHA5124b65e4dc71797f996e7312b1db8419abe6010b41c9dd4350f081904457a1e020a9e432c45803ee31bf6beb048a3b40b11186e92921273dbcd318b66b658e3ff9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e0c6f7a52daf6e16009b295dad5e4ff
SHA1470148bf3126f3607903c5a8bde4d8463077d142
SHA25606bab82066ec4a17240ad2c70811a71de27b668d0d20f44b1945c6632974fcbe
SHA5123e3b3d64ec7a3d1f35fa057d57dad4e65aba6521f9a2aee8cf00aa1dfdf9d799b92bca9b459e1b8f6e5951796384d0810e25d49e2ff83b042cff3d2fa67610ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eee7cc18ae1fb786f46991b9a641a8d0
SHA1afdf569d6af4d8282dbb31d170320f0c4f6dadb4
SHA25638baefa854b9c424d7eccdcfaa741a2880229156aff6c201665d2f517efde806
SHA51225bac85960199765b8f2a4258748621daa32cf32d7df5a2a38ad37a55068e532c98b6ba1f079317d58cfebf957d90a7aad2a3753dff0ab3b73e484a2a18da312
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52df1b433b60ebf1abf80330739cfe005
SHA16964696b30c64c3091ebf819be3802e13230f479
SHA2564f6ce21b1f7e89280f4d0319b6c402e8620b94008afca4c2364a7da915972222
SHA51226fb2f462dc5f0d4ba922c5debf7ac4a26b601ae4c49ad836e69c2829e2e48776559ebefe69d15f699cfa9eca02f0224c8817dcce3d7ad5c47dae8f874b0679a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5603962edf415cd55aaeaede3b3c0ee0d
SHA173b553e007cc34124fc98c53280c367e6b011270
SHA2565ca6e89ff253b0af656cff942ba6891532a91a58c6174e2871de5b6a320f2e7e
SHA5122e0a182860bee6925ecf35bd9eb8804b1462f3501495d7e9eedf3bc9483c112c48e17939425d0531e9c64ecca68a5a00f49ca7d25b13a816225b128233937977
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5f62dda8657e6576086c26c8e1ba622d4
SHA19ada14e421541cfc52e303a2c34bb92d0f68b484
SHA256a7ee8a6d566448c1ed4f2e3505c9d61e6c9176cc148492e0876982916a1dc163
SHA5126644af2b67a842a91e8b503b3eb61db6445f0f7196fd22d4bb9efdbd6f9158da19e0e4330c7138b5e355f82e956782cc38ea44cab196e8f09a5438bdfbcb8f74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5641370ec75d3f22fa1d122c9e4e114c1
SHA1aa1c3ab7257956520b1a82e3dfa6f8a32d973c0a
SHA256140f87fc968e280db8970ebe69811378bdf6ce5ca9d7dbea325b0f5977ff8171
SHA51207f16c95560887ece61d8de41a67a2556bceecda179710a37d88c7d23d055d0764854d337cd8f036abab7cad6bbb4ecfb652b2cc5601324dc94b75f86b884b4d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b