Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 02:34
Static task
static1
Behavioral task
behavioral1
Sample
a0e367a80a2057328bd18067e6824d1b_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a0e367a80a2057328bd18067e6824d1b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a0e367a80a2057328bd18067e6824d1b_JaffaCakes118.html
-
Size
4KB
-
MD5
a0e367a80a2057328bd18067e6824d1b
-
SHA1
71c68178049ac08d5f1166e49c05a5c9f37fd382
-
SHA256
1409055134192af8102b2222f993873262853621294c5d2ee37fae78c32d22da
-
SHA512
709683acc91d50dc9446245f3d19f5aba7a5e308aa2abbe00ba232fc646a78ef2373ad1455aa45b4003f496d98581c5e2c694ea60ce42c4d8ef2d6e4932de2a9
-
SSDEEP
48:ImMqLRQlXrfLo934cN1ZeNeZFS/RNx/RNuR/RN/X/RN973bAWQAc93Si:S6QoycDMej0ZYr973EWQAc93Si
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3328A4D1-5C41-11EF-937B-6ED41388558A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430023925" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f0000000002000000000010660000000100002000000077f8fb1ce7bc57b710ffdfd33c5584c46bcd71c514394c6bbd1ce03c101c3ed7000000000e8000000002000020000000c26f36132e74b8149e4a005645d75454d52d9e395a6e49909f4539708503a97b20000000f143cc0131f9700084a5e2479316471bdbe1c445143217960f8bdf88dddff4674000000008d403da96219c8c04ef0469c0881abd11fce3339be89f27efd91c2149a05355bddcaa148c1fc52ceb18ed3062cc8ae1e6902386381e2d588c75a57411335462 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f055c5fc4df0da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2228 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2228 iexplore.exe 2228 iexplore.exe 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2772 2228 iexplore.exe 30 PID 2228 wrote to memory of 2772 2228 iexplore.exe 30 PID 2228 wrote to memory of 2772 2228 iexplore.exe 30 PID 2228 wrote to memory of 2772 2228 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a0e367a80a2057328bd18067e6824d1b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2228 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5908c82321c2f58984f3c5c9ec664709a
SHA1ee6ba7fde98f8bb51819ffceaf1bfebc37f5273d
SHA256c3d11fc16e5ddf0175bab650aaccf0d6d07f1da92351bc6643022d5d0497928f
SHA5127e27df5739bc4bd17e0ed581792230fde04905cbc932ca56d892bd6b2b8a78b8b66a0472ae789c0003bc27142564bbd3d4127a63c35d0fdbbdfdcaf3060c77a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581aa99c399c9bc44405726a211bae9cf
SHA18dde153a8633b336c55bfb2c93c3083c4e75f03a
SHA256dba0c8aebc173f5dfe17a1f46512021ffac614ec9baaa295496dca09a78cc391
SHA512d9e56c49130b16d76057e2410663606342da880f63a338ae08a4af61235a63edb52c9fe61ab4a7846b86c542f439a51d3141970e8a9f51d210f0c7b4876ca088
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e23cd7141903f892c99110238799cab3
SHA1b91838dc8d32d44fa8d6ea9cc65de3f90d6391b6
SHA25681b98846f9cb4efa56350b59f5117a16c19a9e02cc3f07b516c7a48757d9f108
SHA512be1193d352eb8f87c7f86147339de2220ee3d63844417bbb920c6846487ce67d7f224d6e380a2c545b280eb088462b161c90ec092c303bc12b86cb68b22f8681
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a658d583e63722b2a4631cff15f16bf3
SHA12c6cd7113beafc717179b4a6cc536a97ad207788
SHA256f2ae5d8954b7c7a59f8ff91db418000afc5d6a52a27f31eed30c062a1adad269
SHA5124dd37cd96ec148df73723d9a7ced86979926354e1be2b3b6d8ff64efa65e5e46ae7078fc581d769cc2cdfa003c859b3d8b4b6cde3f7e3e3272d85c6faf181462
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd4d3bb220cf808104dae84cc4cc3109
SHA13ffe980573b4b2ff1f8077c0d2a2a25ed4fc324d
SHA256561f2e34c7d0be78bdfe12494f4b3caceee19c8f239b0a9c2f2d0a89812b0e7d
SHA51224302af789790c2c58e86b626ff0f55262049e792e51cf7be0f44120c1c230ebf65b2c2e5850568c777ece0221726211eaf1464a533d52fc85f52e5f6b20b91e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ace7c3306c6db875ebadbace64947870
SHA1c7f793241d297878ac02192c0c73c007cb92ba08
SHA256455940d395df6c0fcb5b9438a63515bd2a50600f8a441b18073b62582e954dec
SHA51286d94157148786bfcdc0aed007a79e9bf04a4c8418e89e5a51656987336e4d6c82714ee032a178d6d601d608e2510e79a3169e4172caf5b8a571cf2eeeb5a044
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3ad44331120d48c924cd9811ace0a02
SHA120e033e47ab0a12f603e051cf34283ba61fecb10
SHA2567925538b54160c9b0ceee5db5437c26658bc3b35b8a6f40856d06d52c89fb624
SHA512d31c9fe6fd22bdc0c67d4da2c9564d8a180a8837a0524a0313c926f813504080dae1db0c9eae70c6593770797bc98e3f58f736241a6284d4df9c450784576152
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5955187fabdece661f4d2b43c4f052a1a
SHA1ad3fabf5709c7ea7ed972ba55f7069bb6b5c4983
SHA25691e428a90bd93ae497b7da24712e0da97cfd192a8c80d40a28946a9a941bdf9d
SHA5124d43c7d067d035247de06da64430bc24b42a0c5569b322ace07cbc1e5669303ffca443f4d87088b0206ab179c10240e3e96648fc364de74d8093faf50c7f695f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f92ec8c0dcb10bfad0164b85d315cfa
SHA17a1f54cce688ae368b590bf41d265900d5123633
SHA25639cc99634a1c9afc93b7056d00bf425a19c421f5c657d32a94aec3b64f9a6e26
SHA51293133b909b5592f7dafc6f1c7aec8e48210a00f1bd691d9f3cfda8831422951ddef10bb2ce48b70c1ee25570f1aad72f1f4305645748017e9fec77540fcedfa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506a577944ffe035ba36e6e4d1a7f0467
SHA1ebe834368e828fe30e21fbb984f523e26f22c552
SHA256e3f6284a95876a400c370edb7d750e17890c2fefbdfcef6a4cddad63db364fd5
SHA512251925dc0ed86c7b3aa00ee9040d451464acbe4109b61c8f9355c905330acfa531157be9633939ce787a634ed392c3f80507873481e9eba2ed5d01e0e83cd24c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a0145af163709963b01b34612347086
SHA103578d79234ac5c38af5e202d512c0d8c8ce1d11
SHA256656a72857e143d4f5a8f446719f289172ad8778a5edf32526bf2c16a987d538f
SHA512c885ce56a1b16a7c60859856ced420d021a2e5e12618f97a1aaa7c601393d5127b2fd9038f87be357b62342ac048216c9d41bd46a8c82eeece0be84ceeae1377
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56de93bb2e3ed59e9de5509f16cbafe2f
SHA14daa3b0ea8b9cca01e699d9f483ce8e29373ab4a
SHA25630883b0e49c3d64bdd48bb6963e4c746249c8d0563b29526435f2b7abafa3c47
SHA5120433f32bd863047a2298ff706415fedc66dc445dc9e8d1a8737f35c267a769d47acab6e5f498f7dc31dd5b3a3111d0471efb1e9cc3d67084f683d55130d3521d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1600c9c1046cf35ffce3c0db48c999a
SHA1dcf9d8320c89e809b44fde0819495f65a7fb9e6e
SHA2566b6e7c48e37103473adde0942998e854bc602b6a5cbb77cd2de5a9ad4b4dfdb8
SHA51281e316fdb23843c95543e52f62fc32279d7a757b770739163211a4b908744d9eaf71775db1698f955bf7b58b0065795d80153b9f3aa84ed5b1dae5f3d32c0104
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf4a7a6aa5e2c7f3194751721f1ee5bd
SHA1352788035d501e987f6e0866c3d88c3d921b4eac
SHA256978e4c04f8d6e7aff0bf8c4545a699f9495a851b48dc6bbf4bce9d749785bbbf
SHA512535069558d91b7f7d0892d41d600520d22e84f5ec0b7fda5c15b81f25303971e192341e8395a950e010bc134cbfec0bcc5f62428c65ca687ac42c6e97591684f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51925c0222d80507d6b37918e4e2711ef
SHA114e102a3e13238ed1cc5c014194cb1778e5333c4
SHA2566fb4d6e3a818d20cf51e994b54b9dba0012f0d2b447e6c7c953f712ac6b740c5
SHA5128beaca22d30b9c2d6004eccd8e9fbe621a124150ecdd59612bd15131a94b85e1b5e5be73ea6300c7edb0d5a1da9d21fa0ea37d786609996e69ac0578ce181c96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5912a981a3d15c8430f7e98f890f437b5
SHA1c078fb199e7a15a3689f9e496f9bc06bf2d37336
SHA256f4e6594d181f9758485489acf218500cc057f211037f9d00c89257b89e77ad35
SHA512625924f07a673fefa5a6be93ba33a0947717afdc2b81d63757f5b61322e3afb9444dc80b248eb072b04283522165fb8836d9890891b953e79f087281760e359b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e306ab01dd67c98806bb8f09c19f8c5e
SHA16605c99d748081b8d0468f019ca2f1c8c6e5100d
SHA256272e51040016de86d04114262c7994c0b07d1627e82ed824c389e62e562e7ac5
SHA5128d491b1b34fe23adbde419bd8bf948015c1e1302a21af8aaa20a594d6526830f823a8714f54c03052b4b6cb2f9f6080b9ca5441f6df4894caaf149d1daa92281
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560e1342d9566d445b8e70296d41d82f4
SHA18ca7d63aee9675b468c211606eb4fa51c61ea3ab
SHA2564ea49cf3c1b9cab70d25e59e03b6291ccc83db973cc988416ee736af0b20f92a
SHA5127487b537848e7c117d1ce86bc0432aa8c36f441c561cad42bb6c9949b96d3b763d6f7b810a09fec64c275b21261165fb68288b0a92d781eef1fe6383b002752c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b