Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 04:21
Static task
static1
Behavioral task
behavioral1
Sample
a12ebf899317e5dd3f8e87defca44bfa_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a12ebf899317e5dd3f8e87defca44bfa_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a12ebf899317e5dd3f8e87defca44bfa_JaffaCakes118.html
-
Size
67KB
-
MD5
a12ebf899317e5dd3f8e87defca44bfa
-
SHA1
c7818eb84e8c80f74265a993e11e68347772a3a5
-
SHA256
45c505f98e21e12be9b70b2b7b8be0085f95bcca4839818083383d9c8eb81c9e
-
SHA512
3b1cf78037ddbd4a11c0a009916d8e136386954f80d7452526b9f57090d670016e5df7ecfa356c012abcca1edc2bbc17b834e939d901cb464d0a0b54e3f67123
-
SSDEEP
1536:vNGRFEFh5w9wK646Akvd2o/RIRJLKKNuMjjlgvaLe:QyDFKB6ToEI+Mjj2aLe
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c92000000000200000000001066000000010000200000000526436f973a144248919d927a59e3ef9f970953d7344dc9b85571600dcd354f000000000e8000000002000020000000b4150dea7624a4e5f341e399355b417817aa30f8bd8151baf2ae401b680bb391200000007c69a7964a66cc92117719a9dafdc82551f1cf4025811d1791f5012c918f36b4400000006ef728864f73e20f9cea4faf211ad51d0d568633e3dc291abfcf98fa6ddae27991dd83476034532a22a8b4730d3f4d80cf913299d8101909a482c8a7a37943d1 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430030347" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{279B8F61-5C50-11EF-9EB7-4E219E925542} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0c023fc5cf0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1632 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1632 iexplore.exe 1632 iexplore.exe 1784 IEXPLORE.EXE 1784 IEXPLORE.EXE 1784 IEXPLORE.EXE 1784 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1632 wrote to memory of 1784 1632 iexplore.exe 30 PID 1632 wrote to memory of 1784 1632 iexplore.exe 30 PID 1632 wrote to memory of 1784 1632 iexplore.exe 30 PID 1632 wrote to memory of 1784 1632 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a12ebf899317e5dd3f8e87defca44bfa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1632 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5407859ba92876778680a0e454871f9c2
SHA11429f4236c6fe4bd6744b2ba1e52d3377b704b0d
SHA256102c243a12967482fd4134f7923379d24ba007ed83f9b9b21809e3cc809afe3c
SHA512ace3db00c27aded12aa1372ad761c069881e09083c836da43db051837df65e57ccb649e5cd4ffbaea700fccf853776ea571795c1230e87ed088b1fcdaa185061
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50741fe30c62d9573256df62e7334b75f
SHA178c2784a496142e3d74e1e9c6379dfa9b7b8d6ca
SHA256ce3c0eb05d748320a0592c9c55b3be64f46f128a90494710daa8f649d2b5838e
SHA512ee93815f8b022100f6511539d7da3525cfcd31f343ead5c94d0e14f8e8b9c42ae2bd75464549051835d13b2ec9f6301cc52f657c5dbc1387a01e4d08af5e8485
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5163447fdebf3a44e3e3a4791193d2d4a
SHA1dcff6ea905ca714faefe05ed6ba2b3c4ab748420
SHA256f9b53ccf110b5d0d7a316ed1c1dd5dbf919a5ae63bcad34a9668375ffbf99de6
SHA512e878735c116223095b53afe78ccf01a48df4b0b2e2f9c62ca744a61b09565e557230edae42acea5bfdc92ba492a57b1b172dd88e063edab753a0d4e3f9dd337d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50be167707744c09becf1a6080a61bc48
SHA179c201fc5bf1af106bbc04956d40f0737d5bf3f7
SHA256ea1e9e56bf452717a6799cfa731de26280c9c0cf842a2364a5a7d129f2176787
SHA512e8eb743a17a791bfc671f3edfc14383582019d6416a831c982f4141f8dca8796eb21d922e36749523a1f1d2ee3a3620cf7635ca322731bbebcd64c43dbaea29f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5589793f3b79325833221e158ee302f88
SHA15d674fade8b514c79000a6bbe24903e7584fc718
SHA256f0b386348625786bab1f2ce8963dcff5e1d0fa856329c846090a13e380e563bd
SHA512d8213fcaf86b28bb6f24833f65d6e698b74e4af4f772130fa377c0ebaec1e3c874801f0239e1b18bce31b07434cb4b826321e61625aa5cded197927fb41d9486
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531d295d2932738af0672e869cb54d996
SHA141885893654061a106f5e20e93d65859e1d90547
SHA25675772ebf7a767a370043f4ed0d790168346e1a6e270082096be0e2e3a97c074f
SHA51290fbc3a2b81c8929eb64a699f43de55b10ddd6d7b78db68374b29d5596c85de5a44647fbee2641bba583ffefe2db693585bb50ba3ebc31f742d0d2ad6b3a8032
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1c910f4f3f8d2c2757d0b5b89c573d9
SHA15483f2ad756a68af07f09829a3498513c008be4b
SHA256543f5d6ae20f3e5b9577319eda59ad926d63306fc93816a4c47698a589bfbdf8
SHA5121da1d8d421cdd6a8e62d18f43c3f6eac5dd39b77bc4a343bf273bce91e5a66b11b0aaa8437ccfe12587ba2cfa0293d9b6899aa09c31d76af39723c14510bfb20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5051123f6b62ea8b504261d93f6f404af
SHA1164acb39793f7d7e812e38ba9cfc1b9cfb4866a4
SHA256ee949b444cf0cf95a5632980622e60fcc96e039873868a50e31a39b658a5e2ba
SHA512f71a4c2f3e5fcd74519b6db2b212bc5f54d1e65bafb3d71b531c93194fc1e9efc9cebaca07f64103ed0a3a76dada4491c72fbcfaf2b84f95d83942f957480b46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5269d7f7e407b8a0a22ee43a52a7b4d8f
SHA174ce2d9f5ea388a46faa2c68e6bdb3b2e9acbc17
SHA2563aebcf7f90a25034eb305448b5b9f3bcd57356fa126676fb51283da19753d910
SHA512c31bbb96426ff18d673ab88109ee5854c6dc653609da57866af1a81fee82baa1cfb8e7c4d1bbe1ce45b409f289131bfc8ddc47b7c12b0dc626bb03804fdd6969
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59214eae9ede905a9fc4f03c0bb9ac603
SHA14e865686180868f2767030a37ffc6d3a63adcd16
SHA25679f3d05f12c2e3fb83a9e249481a4ae3ae0d2a4b38c989f24c356187e0f61ee3
SHA5127663d625c01c4f12bbd58f6ca528b2a1be7dfb3c15ab7cb9d45801270cb574dc214a16629b01727b8f1b598dde0db0905e756419f382436f128d14555bf60fb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7f465b7b441091f301a553d244cb8e5
SHA15efd2704880bd9fab8b97cb93eb45e57ad0d3b55
SHA25654b3342bf51f3cd96104067818b1c032d59c76e91d2f2063e0ba19c76f13031a
SHA512937cbcf0a023d289635c2984a646536eee9fda0c1557e053bcda969b06cf559d35a2db0d81a7de32b90087e4c35ee7da05fa6471f235bcb83e1ef9e180dd80f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0a8debb8528b6bcab543ddc1bd525aa
SHA15f6218516fc08394d45c4bb0ce8acbc1744f5cf7
SHA256961590c236453d075ca2405df42512d4310730b3f0316307ce286daf1d7850fa
SHA512e526d38a34bc005079fa04e3eb2a44a7e3672dfcc7bfac091ddb057d501a5b715b437e1afeb7ba72c9c68c22adc4fe8681314f26c2beef2668491fa4a1615cc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9d8b39f7d8e6c5d9320c823d923651d
SHA14547aaf671df61fe5b5e692c682516dce3cb13d8
SHA2561ca92b586829f0f4e284a6619a5259c1c8fa98afae2609431f179fbbad1f5aaf
SHA5124ddf9d080a519067b18ef7f2c7a5cb280f2d8a4ff43d7a2abf8f99aabd29eae469025bf218ee8370ea0d248aa936749243370ecd14bb61f5c5197695dc059ed0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5c2ee9f3c91eaefb68744c2bdeda6f7
SHA13b6ea1229f271efd9002f583a3845e559c1b6191
SHA2560b7a2eed5c255d7bfbae54314f7b41191bfdf219c3628890caca749e4d7fce76
SHA51286eb2c96cefa0e66d7d93fd635b5eaa4d84fe1f8ea1a5fa3af56f7f5de51fc95a0e3efeb5f7d79b738d3399ea6e286ccfd0c29959af523eed152fb6d448df4e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c7b2645416f398a84b1e8437847cff8
SHA1ae8de4c9b295379168a06a806a300f9bab030bab
SHA256a046c5b46781cdaed7dbd46dea4e72ad2ed72d86547e29e92fd75e0cb5a65459
SHA512a6dc6b52e252daa214a984db7c160e9900528d9a1671f2a1c912e8904b91435af197c7d664c186c30152975aac32764300c1ea34309045476bf17458debafac9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e567cc3ba9896c32ac6ddfe2300dcfa2
SHA1706a53af75962065640416a19f3f849182bf4f2b
SHA2569ec2d06918454feeb1f1eb382f5a079d213173f60b785ca956851c477da4cfa1
SHA512ccc73262300270fe11f5225cd8374cc11c5744566c8b7f9f63720c59a4a02516a228e870c306ab1b57c902670ad286d744ebbabd7f4819a67f489659e6b937d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4330fcddcfa6e98c29d75253857c2ac
SHA1f10bea1ad0c0d37967b5da29b0143cd647227843
SHA2563d2ac1a8c9d473d67aac22743eed70e36f1594691be0cf80d97c40e1b03ef979
SHA51238617e1b1015d5b7eea82768bc26308091aebc423bc53898eeddaa38b11e9031be0b205add515ab83d009321264d5be609585d2187f33ad573d53a2034ed5599
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbf8c00bb803bc30bc8d1d2962a782f0
SHA12b4523c1296e36e93478eaf665290a86a9a426e6
SHA256c9d2c20b140845c9f7b0a5a1a3dab04ac241c3732b2bb0a7e886fbdc4332cc8e
SHA51243b20893455377d6b945e947a381a3015d01e7c4d6df9b785959820ea7e3047cbda59f0ef830173d7762dad2c0747f1e78e3082463ae2f6a1b3378a6fc0cbee1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aaecf4d1a42ec81e3e0669da6623675
SHA161dacf7389d739ede363286a6b97f29f116cae6d
SHA25682a0c4de3b0699f191a3b498c78df25f1fc2de11e47d3241fa3065e2cea5a824
SHA512774c11f4df5941066b6ff9de997d88b10285d807bd9677640f0b97d8ee7acea325e675eb367e8a5773da727a8602e42a4298ea24c42d090c9ce0d4c70c7840f2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b