Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 01:04
Static task
static1
Behavioral task
behavioral1
Sample
a0a28c99fa7a115cebad8d97a13d6d33_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a0a28c99fa7a115cebad8d97a13d6d33_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a0a28c99fa7a115cebad8d97a13d6d33_JaffaCakes118.html
-
Size
44KB
-
MD5
a0a28c99fa7a115cebad8d97a13d6d33
-
SHA1
cd4d68c01b853fcde3a4bd1434289c5cbf717647
-
SHA256
d0087cf21eb354d74391974c4c1917b1b1836c13fb79073a1b927a986b954d92
-
SHA512
88fe196196588eee7c5a2c7bd41a7cb8fc524e7cd80ac7bb6686d0cae067e317d5f7b85d32fb9226ecc553a76c55ac2aa4d399f1c2decd89805b4346dfec1ed1
-
SSDEEP
768:Zcd9QZBC7mOdMAupC5I9nC4okpxq8z7Ff3g2hEEHY1Lr3avswuwDwfypxK1Pd:gQZBCCOda0IxCAq07Ff3gjwuwDwgK1Pd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AC6E4001-5C34-11EF-A4C8-72E661693B4A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20e52f8541f0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000fa153382b7ac27663e149f1f9b66cba3db05e605a8ebfe18f35db7f26ffae77f000000000e800000000200002000000020e2157131898f14d4649bcf858890d7585a30544944d66531294083cde53343200000003efb3350a150fabb2952e54986f24ca7c97cf6a41dddedc1db80c91da6fa825540000000d8fb1a97c371ce74e1e02e64fb5837252d72e45ef2ac49d3c43bdf938eae59a35b74f399f5c30ea18ea761adb72cb42d6209f1c4cd8cb082808c91f75ecaad5a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430018544" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2584 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2584 iexplore.exe 2584 iexplore.exe 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2584 wrote to memory of 2392 2584 iexplore.exe 30 PID 2584 wrote to memory of 2392 2584 iexplore.exe 30 PID 2584 wrote to memory of 2392 2584 iexplore.exe 30 PID 2584 wrote to memory of 2392 2584 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a0a28c99fa7a115cebad8d97a13d6d33_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2584 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3895bb23f3a7eb9ffa29912fdc7cb6a
SHA1574c7bdfb76f5746eeb64fbb9f2f69dad8bb88cb
SHA256613816e6f068b6c46a9e86d45b1c274a6e5526a7c39f6fc0693807bf942d65f3
SHA5125b22c91729917ed69389834c1bc833d9b718242487a5a6825aecf0205e4a12cf69801305a3fd93e4c36bed34a6c70adba1a3340dca8f096d5be7d284b5316831
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5236d11e65348bf73d46cff7794bfe4ea
SHA19356f5c0986b8bf00c3e576a62fdd4c6c30e0037
SHA256b2c033e0ed708ea443ba2c599fa2d5004852b8930d727508adfebc793cb28f4a
SHA5124e7552726321aaf0945acc767ddeb6f8a9f329f1ba13f369c4cdec58ed48735fa8df3dc15fddae1e674cb269407480fe34019066ce2f93d22a49e25cd67f5811
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5caca5643152af2c63a78da46851078
SHA191a992ad9dd6d2fa33df36ab1810a22774395a1a
SHA256a3604770c9ff2a9ea2b9c1f5a6e504879f424fb9c8e626e45541c0e923baa545
SHA512fa36f3d01c0de00bf97a8c3703b7de1ebf5bb397484e1ecdc5bcc14aab7438d30b8f706c3856b24ed99179318dffa96409c3ff3a7efc86caf498d054f4da798f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583c2921bfc3c98f383aac97236ae3e6c
SHA17bf95a1a3779b9c10bbe64819f6d504a690ddaa2
SHA2561ce68db369fb360faa574e416e81f47dee8bbe05599c9dc95881edcc7f7eb7ff
SHA512dd06c87071e1936eb684527c44a4f84c9dbd44b0b5bc96526690c1c0aee36548ddf4872aeeb12ffab996c9d844791a5d531deef8e03445982f1123c9cb7badea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd0fc1ea6052cc50f5038f7c52b44620
SHA18fd50e88bd949f49cdb9a24165815f8fe44aea7a
SHA2563620d11d36bbfb554bd9b393e9d93bd6bf8a7daf2ed83b5bf295f7a17fcf9abd
SHA512ca06a30d9a137ab527da6f946197467944bfd8c769cf0f30c210eb09241e840a5764c112a9e241d3a34815875bbec3614bbbc3f4b511b5c032aa047180653007
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c590077b41b51c6e722efe5301a5a9db
SHA1009ea6e4cc9ac0e65ebd44dd89e7ba607d412f11
SHA2565a7ab8225819f80dd27154199a351803d4ac24ba77c7d5f1d139c699077a6051
SHA5129ecde845f9353f2cdc0d94f0576511a7ab4f2b308a244565ce0074bf02e9f67ca459b6f978c04c6c72bc25b79915e281bdb514e854a75464c2341211a6d18803
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e5906b337ab61d0368f16ad3c49ead0
SHA19de7950ea488e6f556e46a94cef6ec1967de32ec
SHA256172dd95274241f044dc10cb83811c726e864da5ef925094d884d2520e266da6f
SHA5120aae05589196de581014ebf38a11ee9996756735cca56145c18cbd9495cf55e9ff505d9e43c1f0ccd80e0c42b60118886a58bcad45b20e1ae023f7d8728a135b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585a8186b962c59f4d323bd1ec0fd6c58
SHA1d8735b7f7865960ebbba4fea5b8b28d48729997a
SHA256262cc35d5b09ae473045326536355802abd216ce47a792b310aab8b7c3dc111a
SHA512ab8914eef402c0e58d54ffa8c8196d05fa8e605e49a66aabd02b3e27fae0ddf717b7c93f3d8c0e756ae6be9d10f867f76f2ffef2e1c42902e97ed41a5d821a29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edd4010af937d89c5c9db051ab8655d5
SHA18dea0cdbdf43e31914160c6dd6208b14e52286b1
SHA256b19fc96813a03210e6ebc180c8fb00e929597f47ea6969e5bd7466105a3f7004
SHA51205d425a81720b73d41cc782c07d95c94181501937d373954bdd3d1abe287fad1f7b83d071c871809fd8dbdb96d66d6218d6052a38fdfc2b50a4e9aebd101e1df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6fc00a5cec8827e9be2992224de236f
SHA154525279fdcb61dfbe15e730e1d6bf4f0db6bc37
SHA256425e8e621721124988994ad8f08982808e314d9c74238244516cba67b62e4939
SHA512b9e08bc11c42ca5a080b55ff807f5d5c9bcae6341d9ff7c57874ba3098b3c045fa971b5d55ef4c27432b4550c1622e3f0462f4f70cc13e06361d0387d31b14ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b79c44dad86dea84fc919e15fed5371
SHA1eee390efa45a5c20fcba190856bd02b5f3188d2a
SHA256eeaaa116d807d35c37a7498a79a21aa8ebc0f0cb2458627b9a836b4492aa430b
SHA51210f4130f1c1c7ba1eaa21e1009383b54878a970ca5de37cd1bd24c494c9f13a47278d661f57d7a3d896ca55d00978e35d2ad68a921401c3cf8097011a4a84620
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d772e0b82c285e77cbc19f11f17d39b0
SHA134740b5bd1f32c4006153969ca3f6c8fb9c9ffce
SHA256f0e9f814a86f51e3ad6edf4d7f6d7c4b1139534a0e4fd2695d958d501f5c7239
SHA512fc70d4a998821b4a5fe8bfdf7fba38284673f13a488702ed74d1c5b6911650bb585c39d32153d9587efe4e40a265299e6ff6178efda4d1b514db393b148d7852
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d20a0692f57c3a4699a4a29cbebb2bb8
SHA163ca0764468331a31d1919eb5c0b48b4b1faa5fe
SHA25621a9ad14c3a87595b73de77a69873f94da3558e4e9a957cc616dd608358f5b0a
SHA512464bb2160820045ccad6fb263a115b59029195902fe004e2cb7a8d7fb136b68988c9905e7003ecf1a2891b4505358fd8e1a047a326b23f284d302e64860e148d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3b3486ea0560f1cd90f8f0df4aa76ff
SHA12d974d42b9b73c6c30b635f546d5775753c51537
SHA25670204634d7d30456c751ed997783a0a6e9ac3c0bd6d8da03bf299adbc6ea1d88
SHA512653b2e494f9b34da07d8c91977d195753e7cff64a49f66e6460f2b575065b595bb2a3e8c7e96617c3fa38b9da2dbc1aef063afde0d19292093656f5c42ef56e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a08cf80c44669c6cbc1c01ca7bcef45
SHA14e9501696d9070e7f30d9c40b0ad24df5fcd2644
SHA256764a10135a161c53eba6282a98c0c18ac9b77160adadc985d87be95287248160
SHA512e793affa4428ef190dfff88fd76c9281cbf5d3d52b4c550ad3fc4d6bec72f69df6a8d57a1d3a3a9f55b0ffb710006db957bfa92feb4408d3c48790de9c6a0c8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ba0c801db128fde4dcae3bb5c02322f
SHA176e6829e15cbbe26d1488701a32ed094eab596e1
SHA2562b667d86a0255002b89b3c7528fc4df76f316879f8db3cfcd6e80bbc60af1641
SHA512595302dd8332ee54051407cacff28e996c11bc1e8c5e12780173b01b62b1b5b8604225a62eba67b8f83d8bedd0c45ece485c5dc94017151c7ab8defc6d39c61b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6d42ffa497f8c875fe3e4ae7024d44d
SHA1ec50379eb5fc4b1e74b53c02066db0b766059fef
SHA256f18ef3a1d2bbedb22aa0e467de7212bdbf1044a870cf11d3ef3f61018dad6442
SHA5127b94026a5f25e55217abe9dc67af412612f308cd95d4dd8fcac029e68063712c953c269dd306ba5f02c44455f625e3474c45fd2b50fa49676bc37cafe96bb2f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5155733d233cf2cd5abef6d3342682ece
SHA12b076f5b703bb936111c7c3a219847cae43cdec9
SHA2564740cd6a9a7549146b4d55a28aa701345a1debcb38424b2654fdcb16d3bc6535
SHA512232da3e813af6786f7583810b7700c053b5046997c3d88cf6af3f92cafd5ea487b9a85a4c338b851ef93a3a53565702a0c476c1f57af52ec0600e6b47deda0fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538f422dbca985191f841d91ad13b6002
SHA1f759fe5229421e66b9a2c428e36df2aeaa90695c
SHA256391d8140dedff1a4994c9123bd72b486a1adc69af496d9293334e23cdf2cceb7
SHA51235cac8a4d2505e49aa785797b366f80bfbc9b47719a682fb6614cfed9156b342c2ee51febeb8682700b17d7bbde3740b2c30919746145ce12129d52b7f0f712c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b