Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 03:49
Static task
static1
Behavioral task
behavioral1
Sample
a117e2d05c7666f481b9f122b9c53b0b_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a117e2d05c7666f481b9f122b9c53b0b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a117e2d05c7666f481b9f122b9c53b0b_JaffaCakes118.html
-
Size
12KB
-
MD5
a117e2d05c7666f481b9f122b9c53b0b
-
SHA1
d328b56c03ab6ee38959c7aaf567093e5e0713e6
-
SHA256
4e557819adde7934ab5924012c4453f5e7aeec12e17f022284ca787a467dff61
-
SHA512
8f2cf3206156e1ee09b23d5ba0ac8fe4586ffc96b88ba7774a5b21c352751f614972a53f30aab7ac866c68fa02207c2da2a2f407c2c58b0b6db6628db045cf02
-
SSDEEP
192:SpB6m5OVZ/deM95KUs0SKstM8DBIugJXKBmu3WjFly9AA8S3G2+5QQJCajYU:5RJnXsInDjfs8uG2+9JCO
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430028422" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AC3FAEE1-5C4B-11EF-98E6-E649859EC46C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c001548358f0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000c99f8d45d0c4b1fb96eef61d1c7350288fae6fa25898ffd2cffc8a7dfb8fefae000000000e80000000020000200000004cc8cf952bef130b4718ab4a9cd32bcc67c5f0b756a92c19bea8ed5ab570b01a200000008d48bf660a150fc5b90a8b079877e4def58e5a146600da6da70b7e3047870b6c4000000088632bee7107186b7fe3c142e1dff29903446961285e7015e213682437d1fdc0f0380c15fe48d4aa9166396c351b8b2965457c97b5db5acbdc8162d31e9211dd iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1748 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1748 iexplore.exe 1748 iexplore.exe 2364 IEXPLORE.EXE 2364 IEXPLORE.EXE 2364 IEXPLORE.EXE 2364 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1748 wrote to memory of 2364 1748 iexplore.exe 30 PID 1748 wrote to memory of 2364 1748 iexplore.exe 30 PID 1748 wrote to memory of 2364 1748 iexplore.exe 30 PID 1748 wrote to memory of 2364 1748 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a117e2d05c7666f481b9f122b9c53b0b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1748 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5534d5c3ac24fdb70fb1740b45f204959
SHA1b68659dfdb369ed3319d1980710e291ea92bc812
SHA25654bbf41be831b5f25f96656cf576d9b586bfec5d9044e613f92ff8c4bb2c444c
SHA51208ea4c64d5b3f6c5d69b39efd5d441f06e77cb5ce80948061cb7a88dc374a9afb2ed9e7f9d8ce1ccdf67133e9aecbb985d858eb39ba26e03010850fc3f094121
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efbf584c46b33695514e55508d163e8d
SHA119f01a4f0f91fcd0482d25cb9cdfcea7e8d6b199
SHA2569cf0c717ebeccb61c701fe03aacc77d00da3cbbbbfdd8ca963986238c825c536
SHA512a90d0a3cb6ceb63c5e6453a1883702504c237b497eae007de3e564e8a111a4a5861ada8fead0d27265656a34a92c67d06c41a150c89be84b94eba698b0abc227
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4b470cd0385dfac9f0a42855e5a9e8a
SHA192c8f9a6add90dc0450833b7ef3304b74ed9d2e7
SHA2567cb2590f797b06ae3ca0213a74009b5bb7eb0e30b7b642d97b247f60da753d18
SHA512d8b0d2f9a690724c7f582d4e15dec2257c04edecaeab3752c1e7455dff2f7bce4beafcdac08f06f5d8459b1efa817a06122b1bbd8a1637351ab3ca0c931208de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5285fe034284afb882bca7cb6e279dc1a
SHA12f0636bbff4cc385e75650f3b117405e4b1d0c76
SHA256e4c1baccf9934b964623e3f8927d15643e49e023ef33032f5510630433732d39
SHA512f07af72f9a19eaf4c1464a342472d85511836f1db53e8b33b67f431db103544fd9f8514cfceb6bd20a73fcbefc4d4b3f06c2acdca71bfb1c4c567c684b3d4399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5039cf3e55ae5d4ac269c57f5739c54c6
SHA129bad3c5ee17f2180f0311c3049c015ab24c51b0
SHA2564bf0a3624292bef5e968f924c2cc76326e6a14ff2496174fa9119dd4e7c8d90e
SHA512195448812948f5c540bf36294011c6af760f1d9b5949b193ebd2b45e31b7194201dd3fb3570e91e2666477fc812222ebb81c120c3cd1fb326460163e011bb064
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5142e4819929918c9d946604ae8405176
SHA1d08486d17881efa8f02b56e1f47853ba9e0c7c27
SHA2567a3260be5714daf01396498eb795a975a7488e537dd2f730322c3268fda6fc18
SHA512c86f90ee34afb6350cd3e092e1855de9512b4c55e475f25d0c1807ed094fa12a6471cba28c00e8cb67e7621229f27688cf026d5706df0ddb4f1de6d0ba55a163
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57276ea2b1db42c62570cecd00917e811
SHA11ca0a37099c3c9b4548b4289caa1e549975cc619
SHA256bb4e3ef5af4384483783affa8c7beba7c0d199e8e2b6d3358ad7b3e9ad250d09
SHA512bd1b6a0716a12aa644479858b3eefff24f29da3a0ed61f599495c7979c2b64adde84c94ebef7e2ab186b8bf06eeee2f87b51bbffc02a1d1dcd87ce07620c5e0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f0092a99e053cf7fb3a11caa79443d7
SHA11efa339bf22c03197d5921ff94e0e686e5f3c483
SHA256f561745a0fe25ad72d926d47968151217b799deedb69c528824d8ae1606832d7
SHA512eae8a97eaa444bc376cbc572b9e5881aa4f50fb3ce1e5262e98f99b0b16dbca26fa819f08d59ce045f7b687524b8b2f3916e178ccb9d8acd7f07bad3b657f6d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562d1946f94b9748baa9099cd9d8c3747
SHA118d170fba5ba1d4e2201ada15c287a1c920c3ef3
SHA25628772076a0f6898f5752376a80585dcac2d11ffe28c3d11f81fb2a3c3518e8a2
SHA512b9d77c010692fae3abcd332fda74730bb4320af8b238983b6281defd08b1f12886c35975f9328c436f111f28a2fe3147f99e3ec48c181b60b942d60e0744256b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56413868f5af3883244f36412356cdd95
SHA18838a636c307266a9f49a6c992007b4fab30f990
SHA256c5446bfbbc85205af86241758f595b9586869f441b20102f8bc54fb3f12f68ae
SHA512041a321cf5f9b49a8eb82c5294188eb3e63f6c9227248ff2a97e6a6baadad52b1c90a9fe9562132091732ee35ac1254a4ed12bb05db3c5c334a923b6c6c15698
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b0ea1c48e3acbc6ea378d8765b2d21e
SHA1f56f3a4a83ad7e50880365e5137318d2b1403eec
SHA25653ac679f035365af413f94f71bf6fc844816d6fe03279b0d1784a7362dc1fb0d
SHA512a8005e1e1c23d32e58de39d6f1ffbdf9420c6bec7ddcf71a4e7a0f9a8ec7e538e52d99d3c8d1ca670716f8484a3aba7b6e62b9534f54baffeb7dfc41464d3224
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58338a99e5f6e830802299b59f8c72230
SHA11229a8494bd2c2cf8f05412d219c044e45a658e1
SHA2563b58ea6e1c6dcb2f4d4d1eca7bcf0e678be6c3a841b313677d3ee7ef044dab0d
SHA5122c9e9ace3b55917cef7a15c315eda47a9a842cf6b1776b71d5b0a526c0628faeca8f5f19b8139c07f124e67cc8367b780a1d3a58903deca35e8da02e3ceb386d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1ac25dc7b2042255254e0823acc17ed
SHA1f9a9f2835b4c8b6018e7ece3848e292c614b1e0d
SHA256147cac5121d8ffb563ac584aabdaaf5d579325813119b921b2111630f24993c2
SHA5122ed585220982621a75187f6df6b7d575f02a84a75714694563ba0a5db0de6e95b8c240aaf0f8c7870020a0b5785586e2bd9b180aee894e5452ac258c89b08ca5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f578b691e88cd41f71ced32972fc5bf5
SHA1275f819b3951cf535884ce3f3600d8aefeee7c45
SHA256bb4d8701d5cc1fa237d1e980347b1107bada55ce5089a7150cd3a996f44202bc
SHA51264fa3a00f91b574981856890fad358be1cacf7b22b5cb1fcc2e696dcde7fcea21b4a5c72fcc61975eb02ba1041aebfe1c86750e1bbbf7d0b4724a643950bf2f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d36f6e3769ab47fc7e572a44340e285
SHA16608b4a300882dd7640cdd720afaf07dac3d2d1f
SHA256ede70509f0bbf25be5dd2a74afe26cb25ab3f0f5dc26529c604aec264e6c6b8c
SHA5121dcf5d1153d9bbd8b57347c0466a1fad895c68c5709518377d2fd4696e6c508c3fac2800dc196379d35f476bc6363e4a5b0d157a5f1154f9b45751a4e8ba360b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af601443998f84ab2084a848396108bd
SHA12556989ee5ea372f7c87d4aa0366e48e50404766
SHA256840d8cd9f7884065d71fe778f36fd39b3ac3b5555af3bc2de4fff5e251b97625
SHA51274579dcdbfc35a10accf21ff54d2a384548eab71136678957cf2064d150f2a117af00c18959f3924181dd9eec24ccc76905596c2352cdd07aa4a8603be84d7e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a90c5460f0b3de587e0602dcaf47ef8b
SHA17d8a5b6d2bac0e6512b8b2cba43be606c1dfc9b7
SHA2562997676df88149ca274a4ea132e0794354a42d53ca2d66aad831860d4a92c0ae
SHA51295bbff7710069c667ab933957f84aabe5c4f565f131ec7d6ef0204a8285ab0534476c6272770d0556690655737101db2a649b6ebdf047ac1423b2df35629d95a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e713874be1dab45dc5726dd4f8f440e
SHA1c88558277117667f0cc4a0ee525914e33044a704
SHA2566954cce15654775fb5229d6da8b7c4d37d557d46f58353afb6dd63c8a42fc1f1
SHA5123249fe4ce3bd52a3f89b8a37712e5f6abf1da4389f6adfb78f71093a80f46f3ec59624fbd5f42b866cc5de23e24caaa3c76414ec8ce665ad74d36a1156c15b3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e3a35c3f3d106def7f21871f83e1964
SHA113df4a3deb9c5370cd9a2c2252fc082821333bb0
SHA256804c4b264c81c395841deb4ed3753710d27a9aa6e084433abf8d117f7866249b
SHA5124d5fc3f920dc2b115fcecbd767e5dcc62d9c725e90e7074f9cdfdb0e8d59eaf0c89a393d96ac38709caaaf2b1d92ba79958292df7c1eb9318d61e18afc4570e0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b