Analysis
-
max time kernel
122s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 04:06
Static task
static1
Behavioral task
behavioral1
Sample
a124824944f2828c037eb6313c4911d3_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a124824944f2828c037eb6313c4911d3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a124824944f2828c037eb6313c4911d3_JaffaCakes118.html
-
Size
32KB
-
MD5
a124824944f2828c037eb6313c4911d3
-
SHA1
ce4f3651cb4061ad8263d92de7d290f9b0dadedb
-
SHA256
d429320eece4b36cdd0228b364e931e4872c0ab4657b1f3d00e0819a4d1cec01
-
SHA512
6ead70c1a39d07628463edb5fc322d9ab7bcc1ee7e8cbe86aeb980b54f46f0c8dec55d3cf3a0c11129fa566d54e44558c53a9177bb8055d827d37f46f8f48302
-
SSDEEP
384:SI4MtRH44eWXbRmwNbvuFJ+LOr9KspocC8oUjKmmdE6sgcFszX0iOQsDr:Se1mwNbvuXWmsnxXrOQs3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b073e90b5bf0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430029440" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c0000000002000000000010660000000100002000000052a01ac5125f6ac4fdc69b9df671940e8129b224e03a07243aed953420ca46a7000000000e80000000020000200000004acacc691cf8790763cc9c9dea030157724a34178daf5356a503f71e8ba561a120000000230b10a1e009f057f56147afb982111c9ebee5c7e5a354366f3ec83e7006e3474000000094615bac9997f3ba2f43ad70776f9a60b60ea1b6b238a790f873883dbf76ed24a9d7de3bb67858138fd8ba9bc3c5faf2c18f63c90abcd4cff278ede7b884cae6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0A56F451-5C4E-11EF-8FFE-7A3ECDA2562B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2120 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2120 iexplore.exe 2120 iexplore.exe 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2948 2120 iexplore.exe 31 PID 2120 wrote to memory of 2948 2120 iexplore.exe 31 PID 2120 wrote to memory of 2948 2120 iexplore.exe 31 PID 2120 wrote to memory of 2948 2120 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a124824944f2828c037eb6313c4911d3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2120 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5903054dc9c91b6a77f732d7bd4e40094
SHA1cad7c015bc65e2b25b6f36ff3a42569cfb9b8428
SHA25610f550461fb34b2ef1f1b143518c3a19d9cd056d63565e082ffe280be3a13983
SHA51247042bee2e9bd69b7d265179f33e436f5582872f89376e25dbdd4b513d3122a33dc1becddbe4a2b94fa81a9b68b4de5e751092ebe3f68c8a2ba50f2918156de6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55dba92c8b5df4367d973ad1bd6ebc046
SHA1f9d6d15ba686f749feca14afc4c87fddb17d1f87
SHA2560930282c94573ff42d2df90f96ecf44567aae0784d0e62d0e0fcd61d36807058
SHA512b96acb8591de27f70be4b5a11678c17145e73b8802528f2bcf6cd8631db40084b16487a5a2e5da8ffb2a161da62315f054af33d6dd495717cdef878a04e6f168
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5314810f76a8885e2976f1a60e1edb77e
SHA1f6c1828fc889779318fea9983ffe58f31a8dcd82
SHA2565a9fd9423ce62b98fb221929de0cf5048785bc6f86790758662e7ebba60baf5e
SHA512f9d32fb283b4deeaf75468f044e2aa7cc9b62e6ef1e24a08c8282752b36fb0c15520eaa66ba171e60e7363efc50c96dfad388074b19a45b377ea5aaa7aff3818
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5351320ad970fc0127e868dea2fe9574f
SHA193e703c9dc339347db18b5a5a44f4ae4be2c68e6
SHA256413a49fdf9b77a73a5caec43f0b0f5e334a7ed52ab327dea7497f450b3131e31
SHA5129686a0ac5fa8b0c47126a84590f40e46d67c54e1f4d0477a5bcb053b748c158776f5c25ec5850ce4f62d9a9feeca59f352786dae9831d2a0de2d00e56880c693
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e3ba7b185499f309cfb61e553e8eaec8
SHA17e87f0078a58a589ed39540191db5289b6fd89db
SHA25613154ea7a27b10e6a0879797e46666ca417083ddf5e93bceae260d35b4c3648c
SHA512a631610547354c9559111f2591f4d493023e0957d4a184ff6ac76425371349e728d1f0464dd9f41f7ad28db021129a81857fd950a68ad5539bb6fd42addb3748
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d06519b10f794b2a6aa368af3fb2bd7f
SHA1bc24ada7702fb6e8ec707be826b962304366f89d
SHA256e98ee5e7838f466ca5644b89fd84880fd475b67550186094c96b904e90c06b01
SHA51289c294a25faf8cdfbccfe1c665a8b5f7a6255b7902c7736e9e20608e733699a9d940140d0c942e05cb099da872387028e58e61895f93e385123fad76aa3be9b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54f523df2be1e1ec16c97b216c8d6b66c
SHA1955be136cf612622299a8076141f66692b2dca95
SHA2561852e78cb7785da89076157245764abc935fddd015e08f0e04d269c04282f745
SHA5123172b2e8a913c92cf689f6cbcd7573cf7986bfb456ac135f961b2fc0cead9f3beb14527702e372a91aab0b536242f30c16e16286fac99c47764e76962027227f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5adec87ba408ab997d9e946d78eec4708
SHA16445f390ff4cf25452810f57bc97183767934540
SHA256f0485ab4d2f96ced3d6160579e9591b84545edd14cfb50bad8412bc97a1fb899
SHA512256600cea6339fd4b217d13d2fc7cb29c7a2264197abac0dd42a9ab4979fc51a061f78db1689f6e95f564fd4f9ac71757eaf5478610487101232830154e405ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD554e54bdb9618c4437b7ec28d62acbb62
SHA104fddc06ec3c13e30eca752cb8cde9248dd4da75
SHA256920fd8d6d55c88ca83ce8af1d75a90f641a2375adee0338ee83d949b00156655
SHA5129718e6ebd1a7dba0838ce24b3e4842d729a35514148208d65962c2f0835f41aab7b38544b2f0dcc35be8e84831d835d1bb5731ef97208807a12729f2b58e5990
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c14c165dc5b04127bd5271de09469b81
SHA1a31cde0610dcc8623fae9e008d479e127ede83f5
SHA256bd863bce25a0e87f9bdd0a90ba1fd8e18b731c7362eda86409a21290f669f203
SHA5122b4ef802fc0a096f0df0b8fb7b37dd1be5f8357a4508b8186d0ba09c08131fb40bedd9418510587f356a13ae28b5d6c29ed4333895796d6dc155df5b00a48974
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD536b1f11dd4190ceb21fe7c504d990f69
SHA19b42ef3f43dcc413b518c69c824ba6bd7fedf441
SHA2563bb7899f5f3034f353a1a605e55db8714ed6dfa0aac8c342b744fe9f8f51d4b7
SHA512723d0de9293c35e91ffaa4f229edb32c86dfd94f652deeb3f08c239c3445cf517db57e5b04eb92c478992f77e90145827929d16ad6be8135369fcd89dc6a8bf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58dcb8eb04c3c002702588f3e15d9476d
SHA1bbef468e23314d69d1540690efe3c4aab0ac0564
SHA2560e59212902ccd4cf0885d596c4b820c4184a1b23a278f58db0ecf6326bb9434e
SHA51257966b61f1438f703ff59b53b3c6139b590b66e6c2d7a429ac9c75f7d369bbc8183980dda23d89423c9c338398a8e0bf01c75aa4b6413b75ee8f7bddd17fc71d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD542ccf36ba21f84ba0fed1fa508729836
SHA1a5110c1b814cdddcbdd6def3e07d302fddf9f371
SHA25636f35f37d44affb8251ca81913e9f8510b940960f8e7d90d42f5c67d9dff37df
SHA512eb856510696af53b38f0be9cc777be28a142576ae403e083b0fa313b1a1d6cdbad0d46559cd66feccf8ab33f4902ec9fbed23ae6de8d0b96cc28174c156fd167
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e387e4c3cfe9952e7be3d84413fc6014
SHA1f3339db9ac0f0c07aa617db7a6fb76cc9d427e7e
SHA256a7c7d384dddd4e6b15f1418a3a94ea0ee20cf6749d97779603f84f35fabf0fee
SHA5120fe880bfba34ebb5f290ec450f697f41541d6469d583297b9351e49b399b9e123b2340e4661f350f8e9072547a6a1cfab91d6d8ceeee7a6f21843e7d8f71d94c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f382d111b1302437d0d70500094277c8
SHA1de3e43cf17f00c85502e6443fd8824c6d41a858e
SHA256be9a8427f4d23e5fb053d1d34b38c6dff460be04db4d8f61c6aca8a714545213
SHA512858273cd1b74648606bc653cb8443d43ed53aad69ecc263d6de152c77f1b9017dbd5cfe4b10b29162fc1345be7096136bcef4f7359c247b5d896ab74565785e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fc6f7e0d4f90a53aed21ddd2410f4ecc
SHA19bde72e048271b6567b16efbb3278fade37a9577
SHA256951ab3d706cf94ad6125701458dd0d90c539d6f9c437f54022b7645dddf62031
SHA512bd462f4f8926ceb5af025de2aa5e7306219072925816c62fdf22255f6c912d183d4d3d9991168777ac4d60576f218c4ba3f627ab30bed2fe626771a0050718ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ce7fdd490ad574329f49b3ccc4c20d7f
SHA1b0bb2a58488924b5378ef0ac474dd1b5c093e2b5
SHA2569c43c70ec784570e7c79f15ffcf15c590f546edb12000b66bf341498d037302d
SHA5129db07086ad4d8c0b8b8e572a9f2b5e78ec9862ae3c7b819a2557c08202c7959dad9ccce843b03c599ce228efcb3dd84a313c8807bf7cbf3e1caf6e5a710745b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52175d68b69dc5333a536db16663173f5
SHA11b0c4b1678d8c2fc49186e6c9a5d9451f85760fe
SHA25630520a9ee6494cfe62c50487265aa7efeead45620c0a0777146dabb9dde89af9
SHA512d7f7fdcfd21a568405f4e1604d186d79afad203bc22512d5ba15d1e3ac7883f5cb531ce1d22aee2fc9cc11e7a9b83f30ef2e6530f60e6d477b8534f11ffc7838
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b