Analysis
-
max time kernel
135s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 23:07
Static task
static1
Behavioral task
behavioral1
Sample
a4818a953dd48b1889be0794e738f023_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a4818a953dd48b1889be0794e738f023_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a4818a953dd48b1889be0794e738f023_JaffaCakes118.html
-
Size
95KB
-
MD5
a4818a953dd48b1889be0794e738f023
-
SHA1
5cdd5f9197cfafda69c6c46e8b13ea9085d80ab4
-
SHA256
62b87b4fea4909350a308065733b676d28c16b5f637e290f0ecb214c99a0d1f4
-
SHA512
21349eab4fb374d72cb5dd1ddbd5961d072e6af7a0d69b654832f0020bf1d022db3851c73e6262b43db4582e174de25cbf64622ab8358ade349b405e49254eda
-
SSDEEP
1536:Fwgr8VSeO3aCyYqKTeY9Q8aS6cgRrasfPm:deO3aCVTJQNcsfPm
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 505ec244faf0da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430097891" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{69C05681-5CED-11EF-8B64-E6B33176B75A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000833c0db744648e809580d0cff2a853f7defd62768a688d4ebe1d8c813a05df59000000000e8000000002000020000000534039268a92af255f0862f432dedb4e8d82397d98bd71cfa4a198a8c7da9b9120000000baad83fed7e71d1a63ec60ccb85b2263487f3a2c10a60a563af5b2c0ae45f1a140000000e4a8a15f4e77036d5b37b53e5e9fc18cfd9b9fa65b31bf3f20c0b8d452617b93d85c03949189c75fc87eb8b3104c9788449d7506821f2680e9008ad89fb74a4e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2464 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2464 iexplore.exe 2464 iexplore.exe 1780 IEXPLORE.EXE 1780 IEXPLORE.EXE 1780 IEXPLORE.EXE 1780 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2464 wrote to memory of 1780 2464 iexplore.exe 30 PID 2464 wrote to memory of 1780 2464 iexplore.exe 30 PID 2464 wrote to memory of 1780 2464 iexplore.exe 30 PID 2464 wrote to memory of 1780 2464 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a4818a953dd48b1889be0794e738f023_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2464 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549f5dfe2c1a7c5214ce13619fe37b670
SHA1236b72dcd50819b8afe0fc56b1ba7cc5f9ecbd67
SHA256cbf6600bf438155b8721e5a68e78e9d8fa87cf3e2a1169934ac2c0d744ca811f
SHA512b624fba0661d02357cf70fb953c7a00575390902ceb5f558d4c4c105b83e795c5d6bb54dc53c53d51cbe684d48bbb27881990a730e94a2b576eb9c2ae2c49db4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53be5edf23966a55919558437c13d895b
SHA15f00f7e04d734d7471dad2567c262ca53d39166f
SHA256f616cba9e5daaac5489c3cab50321382d35ebb606f780d10dd0574d46ba71261
SHA51218f4e4919f5cb1e53adb058c6f74dc44d7beeb5bec0aa6c55a263190a8b5271261d57dc4d59c5a3ffa1c28840700efbd98f9d4ab80ba9f44407c79c4b39e368b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bf4bc16279bc4a4fbcce72c6324112b
SHA1fe1555f5f90b528bd2ea10d535afca7e285af8d3
SHA2569779cb137ba8963b3c2ff10bd461d126e039ff99ba6af715658c71f8407574e9
SHA512ba81ebef651232b63907fb6f491fc28ff0a4e572293d5622d1acb5679ea2f930aabcec994266b016478eb02ecf0f289beed25c25020489a0ab8540c51c197052
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527fc96df79a82a36ee5cbfb0d65b6e41
SHA19752a16a5ad0b885299fee1181e1e82b5102feb0
SHA256e7c1956757a619ded063198806c5567ff0ed19ae59a42fa1cce6df7626d37563
SHA51269e1c735e26892312145994c22e50b5aa3024e71a28e29b93245316fa86c30179a2dcf8920f8adbd3fcaa17ff596f8ec9b8c850203616d9f93e8dc8b85f6bb76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3fa061346d3228c6f3b6c474ac7b9d3
SHA1151e7e839aa2fa5b0d3af2d608e01f3910c67698
SHA2564fdded989252345bd77e2992ecf2c295bd727f82415d3145aeedc14aa8050634
SHA512b213509331c11b4757eafca4883b86759b0155f057406bdb4800660ab0c5f73f324ac77c0b6cdeac7a060b79dcad79414dd6af25301e1e2b30ef4ea8626f4572
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f69b2008ac24ef694f180432115a2bae
SHA11df24b439d7a2c8f7eac05f2f09d92eaa634d8e2
SHA2566658ebae3392b5d53a7c84891f70b0ac04f91f1a3521648a2157a52c8df78c3e
SHA512896fb7098fc371e23b6402a72e19b83032fe1cf0f8141d7215fa2295fe41881e4f9897af53251c3c173bcfc646fa0ca91b68383342765978db841f272e453f5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5034b38c91f976ab076bb1fecefabf5ed
SHA1f0234d3ece20b56beb5ce29c89af526af64c51e2
SHA256c34ecb7e84e75cb8a8eafd47d2fdb84b52d699fead8fd63faae584d36a03584c
SHA51265c58e13988e8e707ef1dd5bb3277de715b661cfd6c28f20a3557ca088a9a02d2666906b0f0a0e234049a1a78ad30a3888b1876019d4f87ff33aa08cbfb1d72d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\40WV1DY9\cb=gapi[1].js
Filesize135KB
MD5cb98a2420cd89f7b7b25807f75543061
SHA1b9bc2a7430debbe52bce03aa3c7916bedfd12e44
SHA256bea369fc5bdd5b9b473441583c46b9939232bf1f98c1cedf6bc2241c4f5068d4
SHA51249ccede4596d1e5640a9c8e8be333f9c18812d58f02b2b15adb54172df1387439e9dc5afc4ccd9d8f0f75f092318bed68d3cd577338e88ef4f9373de8a07c44e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\40WV1DY9\jquery-2.1.1[1].js
Filesize241KB
MD57403060950f4a13be3b3dfde0490ee05
SHA18d55aabf2b76486cc311fdc553a3613cad46aa3f
SHA256140ff438eaaede046f1ceba27579d16dc980595709391873fa9bf74d7dbe53ac
SHA512ee8d83b5a07a12e0308ceca7f3abf84041d014d0572748ec967e64af79af6f123b6c2335cf5a68b5551cc28042b7828d010870ed54a69c80e9e843a1c4d233cf
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8B420DKQ\followers[1].htm
Filesize539B
MD5b313434b4d14b661a731ea9bd8a56e71
SHA1d920e518e6fe285b81c38e312f6b81e8eb360335
SHA256e877e7e548432cc321461921e714ab03f380f90f2370fb722c1fdf638612b3b2
SHA512bf7f0f37f63ff3ea05c7fa04e8793fc09e0487cf198e5f139d091650b891cbc5cf47e66ebc2f56fadae114a7bb81a41c52f7c1a4193d2d4c4747b315ac453af4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8B420DKQ\followers[2].htm
Filesize4KB
MD5b21e2abbc1c08e1b8d7a5cb052ed34dd
SHA130c4a3fcde5f2362a8fd1b05843f6a60fa458e97
SHA2565b948eec8d39277ff9f28d0080cceb6301c0646444a7e1fc660b8a286053097d
SHA5126365a4d06ba79a015e8683ba840aec9da6398c043a8d7693239d552c34226b8c16ef2f954d181a7d7b47344cb3e031f78d084851141641b570551fc108b43402
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8B420DKQ\jquery-ui.min[1].js
Filesize232KB
MD5e436a692a06f26c45eca6061e44095ea
SHA1f9a30c981cb03c5bfa2ecad82bd2e450e8b9491b
SHA2567846b5904b602bd64bea1eb4557c03b09dabc580b07f18b8d1567d1345f0a040
SHA5121b09a98336cbc0c8ff0f535a457a3db3cd3902e4a724bb2e56563648ed1a36201dd84e63f45dcea80bb6edfe80a17db388379417386dec76341fb9eadbafa88c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8B420DKQ\platform_gapi.iframes.style.common[1].js
Filesize55KB
MD5aada98a5b22ec7188655c2c17a083c57
SHA17c3c2fb8744e7412d8097e28f588788d91b9cd9b
SHA256f2f09baa213dd3dd95edb5a30c7764e4a44d9a79c0831f90b1ad8ebedec9dab8
SHA512a780aa3b9e36f61be8240487e75c19a96fe26d54abf9006680a00af9d1d394e81e517f0bbbc13edff3a7190679260ecd56fd5cdd7c2d2f416ab8982c3277b953
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BDDDRHWK\2549344219-widget_css_bundle[1].css
Filesize30KB
MD51262fb3b6c8a66bb33af5bb8de15a59a
SHA17ce924780c5287c5dd8dbeae4e712775ea1f83f9
SHA256d539a910089008f073b426d44a496f1952ba01b9ff018425c18d21bea42aa128
SHA51259e35343fe3288bec0d002d1a321bff62d70ebfda1f06c73771bffeb8d1c60824fdce39ad3437db9de5df4f08e7f4322611efbbdfecd3292706d244909c61386
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LW44N8OS\cb=gapi[1].js
Filesize45KB
MD597ab56ded8cd826b58c124058030da4d
SHA104f994cd4b40c490b9c74d63448f9d2c32c7a2ef
SHA25618fce43e4d8544e00831bc6823175c15aba51a48d28e3b6e309ef9e5145c9b94
SHA512b924c3196bf485995f5546af3fa0958ed28c2d8d474acba3f20cbdb65bce7742439e21a426a88f10ec9359b2adb48c0ac3bebee1014a143fda130ff20fe4f108
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b