Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 22:46
Static task
static1
Behavioral task
behavioral1
Sample
a4720c4cec73abfccac9b728e50132db_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a4720c4cec73abfccac9b728e50132db_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a4720c4cec73abfccac9b728e50132db_JaffaCakes118.html
-
Size
23KB
-
MD5
a4720c4cec73abfccac9b728e50132db
-
SHA1
52ace368e0555b5257ea248add1673932ae562a9
-
SHA256
a55dfb568ce0ca0bc281697c9b72e6ec0ec5cda51ee9773931a507342ca530a2
-
SHA512
476430a3cb7f7aa3567ca27b168091e81c87c48ec5c2b7d85173d0e47f872e14b77d8ad75af2655c2f308998440ebb87f40a1e886951cbb0273f486e6d5ae4ac
-
SSDEEP
192:yPoZP97qM6oTXX0tlGQiCQ67Q1oUaiq3W53BHvW5e3ATWe3BYPnWT3NOvgi0UFdS:2oZPhFWQ3l+e3Ab3SPi3gvz0tT3KShXf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8015AEB1-5CEA-11EF-90D6-5AE8573B0ABD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430096639" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50e4ff56f7f0da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c0000000002000000000010660000000100002000000021a7dd6f4a299169f0ecb075400a73fd701463be11cff774538785f7bb69b746000000000e8000000002000020000000a614474704f1fd27b8378bcdd3caaccc56c2f58292c39949fedf8605aeba3ea9200000006abc2ce605afb5c16c2226dd469563eb036c9090cefcaf2110e8280baed5d22e400000000df19ecae7760a15a327e60290cc65914e5acca0887e0051c5b295132562cde2cad5ddd6a20597abe8542e9a800b3ff051a6ff604c29d8fcb95557c7b040b634 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2316 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2316 iexplore.exe 2316 iexplore.exe 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2292 2316 iexplore.exe 31 PID 2316 wrote to memory of 2292 2316 iexplore.exe 31 PID 2316 wrote to memory of 2292 2316 iexplore.exe 31 PID 2316 wrote to memory of 2292 2316 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a4720c4cec73abfccac9b728e50132db_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2316 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b24a9078117f1cbd5b2d20a259128ba3
SHA19452ef1a6369605b9095c0f0e5d189b40af990ff
SHA256d726a700a107bd91a54b5d16b0b7b6fdd3d1153243cccfa164752f92d9ebf268
SHA512075345a7a236caa227c977d163cac30c5b4fe802b94bdc3c118f7578cd0386b24af9aff73b2bb482292d5cc79624ff8249e6f7ed979bcc918e320ec003cb417a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cb4a0be11498b1b0fc19857fa993f907
SHA12c7dcc0ed2d1d41db047ad63f4cb4ffdb90d34a6
SHA2562a5eaff02e6f020265a06bf1854b33f21e3544af978107332714727c4d9dfe82
SHA512f13a3cbf247b19837c2bb2fc5cfba5775f971eb5bf035d8c057ac458d45b74a92b8f62b69e7a2e98eddc0cab6ee1b54138cb19a64bb355f7be119819a81a075b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56e051fe0fa2ef25d92a8ecf363d4a255
SHA19909ee3bc1630b13737fd4133f89d9e6040403b2
SHA25682c0b6015dc321e734948dad26acbdaff6b2522b4db3027906203f88a4cc07b6
SHA512ba25b23fb893e7d7163764fb0bed6cdb8c35dbee8172d292dab2656f663c7b3b162dbea7523b38f4372893e86582a7feed0b473f27e9d942b18457cd32e01621
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e9b73021b93ad0bad3bf3262d57d4fe9
SHA11e549e40eefdf2aa379218b3f80dc23fd79877cc
SHA256c14de57e9f95f345275b7e64f1aafdbe62db33c5d184f4fbaeaa6242469eb807
SHA512965180e148ef070ccfa7f6301b23016f98c2f53aaba971f91fb481de19ba46cf0170e339b14db4405f9ddf41abcdc28cd81c758d6462711ae9a8bef34c0668a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD535b391bbb9e8aad3f908fe7f8fccdfb7
SHA18974f5c3b37c79d4a31dc64529e632154e828f56
SHA256024b4336b2ac783a7a38ba57b1cd0040ff94a214f96b195213ad18270f703bfb
SHA512b5f10c0eb639933ceb8e75c3c4448af4ff335177748f2a201761e7ee13e397af28d6d64cfb3d53c7ab2ba5ac22df9b60a8e0d847060dd4a33ce92820f3cb75dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59ff0a0fef23fdc6777764d597ec1cfd2
SHA1404612a65e53729bc0ee919036faad15267e3e41
SHA25694e348c800eda01b8e466522349a3d05f49db272628bff58ac9488155623d49f
SHA512b5b6b8480ed39d0a9d41d45924f422b05e5c86e41dc08d0eb211bc5199b476b82c16a283d0cfb82a31085ec2201bcbf4de101b08b3956102f0978b39f0ed2c34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD545b55aeab54da4741defed4e970e48b3
SHA1bd35cc21637cbf8b5a062669c1a263729d33652d
SHA256cd3125969133f00dcfd4b26ee005cb325833535ce54c833ee9e5b2351b9e83dd
SHA512bd192ddcfceea73614f26802797ddb4eb6ca4ae88d36f82d2e45d089f8493de7e0a560b011f6943c8579bc3f50e17cea3ea6fa94df2ee845768964de3e93baff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD557a5c5a1723103e379af9628a98e7610
SHA1893a02891dc9f5cea1af2621e8e1ef56fa0ec1fc
SHA2563a4831fa47996a6f4f8147df47e0967b1acb2b5cd899321c00986a7e45c283ea
SHA512343babbac16dd3cea877ff0392ddd44f8b439e45c6ba870e1aceda3793a9a292e61c3596b0b98784ad2646f1f40c4c03941d788288129ddb61456b58d3be3c08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5db8d9460faba9af4c5ff8124ef23d89c
SHA1e4f5715488aad871679619ad306f131d5b3e4335
SHA25626a5f9c632db5ccaf0837126470554a8e3391e4e47f24893ea74071ccfb47b41
SHA512402759b872e7121bbba3c699713adf71ddb85d02e6982e21e9f84346c4719cda1ab58de55d205f1cb44b1824b093b48c75ca3baf1fc669e414566ef19b06a1e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56947e0943a0ce3e59a54b755511f481d
SHA1d8214a1eafa088aedcd1ea072a36888440e55e66
SHA2568f62c26154d9583ee9c1f305a56465192598251861923ea886418848c8d370be
SHA5120c9cbde0f04c775b46cbc518beeb8bbb0bc8ce824e6e3187da0f2e2f8df8ecec4168ca586f252726e4e9eab9083fc62ef0c64c129b72b3c002cfa6d09f6141b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD509e48d5b62c0b22e28e5021a36d94e06
SHA10ec7a290ba18e51ac3e0c5c900acf2f24063cd9b
SHA2567ad326f8b2ee861c4ce77644fbc79d6dfda3b9524286a92fdd7c8e5cda893358
SHA512a2baa2cb3554681c742ee29dc92d357d0185a24bf209cd15bce055fbb369cb74c039dbe26b3f7e603ae0189bd39c5277ee067d813d19dd5b4b6ef098aee71bb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51eb58df8fae8bcde6c4f58db91218db1
SHA1f2822f29d51b6c7e9a0ee5fae35b51f119892a3f
SHA256e1dca08a60a072ed92a78f30df0121af2180fdb4d7ecae70130a5f9fdfa27fc3
SHA51264a90455b751cb9ced3cc93f8cfb47e6970c386e6c2144701c2f54a135174c56750dbffc269a8f3e5606f460aff71a1ee2b38f16d40b6f0d788fa7441d178da1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dc5873be9b2964f50c61ecddef06d5d0
SHA1039c62e5e8c0ca773e93ae4e9cb837357ac9bc42
SHA2568e3c4bff7ef427321b234cd7cd597c7bc63b7da19209c69d9dd8144fafd00635
SHA5123352576148a3b179b0ab0d4dbde5f6b86be27a046d7aaa368547028282242e9881c9a1e3b6d7b232b9e6fb076fb70a66b0ef198f53e6b0b6fb982b43b39651d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51f47337d453c2699f16cf18346de98e5
SHA17882b2b8e91fe3ddf5613457770040aec2546993
SHA2562520073b11608677e3d8d0fefb9f4ce9a6df78bb0038059b4d89ba7a89561118
SHA512225a64882b48c3baf879e3ab3228e2123bff828a40fb1ea7c898d935e494656098c968b7fb2268ec4ee91c0f223a0133e6cf68a876edfb0528d92e0c6ea3922a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD578dee7dac47c3b54aefdd9a4a601e930
SHA1b53dca4250f00274e90dfa012770968dd865eeac
SHA256d17f9bb6d8b8e2bd9957db8e405d1db6a42d9cf4ecc1e1092aecc35943290534
SHA512db95e7fdc8d0304dc55d1aed22937ca90189f2677dc3600cace4a84154ac9b12ed1db631b55697c7a8328ebc3198322f8cd6cd05e2e57bf1e06d1a3c857eb886
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5196eeeb1609d2e4815ca206bbbb256dc
SHA167a035ffd41651c4e41339323a462b37a66a4d79
SHA256ca67ec6a5a61c741c543a7f2652622db6fe4ce919189262a83a1b8a9782d25a9
SHA512745d73fe2e740569e82312780780a11e66e195a9b9733ff3afa251ff8969202c1a7f3e42d9bab964b85d92091a4980362c805e11e2e0bd63a8df29cbf723e390
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56d55d8418233b6c7cd25ceee64cbd26b
SHA1909cf92a6f3ddea34024ff5aa662b273642087bd
SHA2565ffdc59df5d1912ae0f6f2dab5a3ee52936149927083fd8fbd98265fa4597746
SHA512c3ce9f8cab1eee76784ac87b773776e4a35874da3bd7011fe52b2255b9434d894719d9b47973ed042a77787ba4ac14fee5ce92f8320b5e006bbc58de259b7634
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dbff33db6247139e5803d2fef804b4b5
SHA11dc2bfd3f26966c02820c945e13c98ff24e9d9d2
SHA256ac7d21d5a1a093ea7b80bac5f973267be7d793f3031ca55a59a5ff3ae02c8a7b
SHA512e7ba0f42caba17aa6841b26f5c421770a473f41ba3fd89e12c125f7a3fc89681134fde7d812d23e7ccec777e8bc26099057ef52db6c6a62cef01b95a80debf00
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4UQ4J2DQ\z1[1].htm
Filesize781B
MD5b5330bf18d5f50bfebbbcaaaa0c0901c
SHA16b5876365b6ccb8a4dd03667f5ddfcca38be4186
SHA2562b32aafe38b88d72f635371df07f778e238f0294ffcfdc14bffc1e10a42fe886
SHA5128e870e37efbbc3fc656fb28099bf8193ae9f2d8409bd5e2c811ec5ea19b4341fac540084826b5c271775a6afa0a9109fd42af1169feb3397a08aa12a6e5ac1ab
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b