Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 05:10
Static task
static1
Behavioral task
behavioral1
Sample
a14ed22ce9b24524350ec145938d3b3a_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a14ed22ce9b24524350ec145938d3b3a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a14ed22ce9b24524350ec145938d3b3a_JaffaCakes118.html
-
Size
18KB
-
MD5
a14ed22ce9b24524350ec145938d3b3a
-
SHA1
9bb9fecceee4831f60d0b4af9ee1d086665960df
-
SHA256
f8fa5b3801d1fa3765b15701756fc33d946b9f360ad5d3b794838bdb6bb6fdf8
-
SHA512
a496181ecbdf00a5f02e456841f74db39dcde02882ceab6c9f036ac307191d5028234887427ba3a94350758631656b154304bbd9e82ac90469d78ad57a0cc296
-
SSDEEP
384:d+1ZCMMx0iFo/1yzBIN1/YwT7L6+95AuhQYB:opMhOdyBC1gwT7L6+k0RB
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430033291" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000a9aed802d35b8d52cfacf5cc0bd508cdc040a1f64b0abaa2c03a14b9478e5df6000000000e8000000002000020000000b0b51d3108e3eb766acf5a4340ae4af2d69570c4ab37a71cf3c4ccc22f36a81220000000f1d1ce51277c23612dd67049c7e3c04e807b8fd7eaf310a41df1bda69f3b7438400000004c9058ad9986abaa3aa9f26d52e2cbee81d0bab14f61278dcdf10ee73ef28dce0e9b108476926d72730f75806914778c72cadbdc47874f41f5a14602c463f68b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2099e6e363f0da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{01BF09F1-5C57-11EF-B233-C2666C5B6023} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2180 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2180 iexplore.exe 2180 iexplore.exe 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2528 2180 iexplore.exe 30 PID 2180 wrote to memory of 2528 2180 iexplore.exe 30 PID 2180 wrote to memory of 2528 2180 iexplore.exe 30 PID 2180 wrote to memory of 2528 2180 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a14ed22ce9b24524350ec145938d3b3a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e2e9f6c4b65f5b6049ce569b4ee9abf
SHA14159f07d3a02ff9d304d32a816f279edec9c8bc1
SHA2561ecf0a2026fe488dbabd8f147cd3dd492eb4144aa9ba10bec919b7d3cd5a6f8b
SHA512b22c81cb9396740ad82d5bb2192f69b4f2f6de7a53c39acfd9a6b1ce385eb96ebd323f48a371dd683852c8651c9eda681b4b10f0ea877b82767b90e80f546afe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50abab9600aa35889e42abd5870125fb7
SHA1ea97bcc79f83fc8f3473e59a385ee037dfd67b82
SHA256c6ad8d399f1f8b8420e879b8e0cd2659607bcd2f93d16549885ee204cec974d4
SHA5127b482d0647c0bd5696d3db2fd761013f04c3b5d6e3d4ad10e0d19b59f168b3c3d51ef0b43fd556545b53f0e6b0bfbb379f48611e562125c946b2e16c5de0dc6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c86d4897118ea436ba6595e2c75bf3f5
SHA116e19bb5cdb2982492dd8b27e009b82ed6019441
SHA25607e00c24d05788eabe2b63fd34c1489d6d789e8b8420a0555ef12136c6be52f1
SHA5128d74662f4571d0ad72188477509d95b5793d2346a4ba1d271cbcc31374c0f9fecd3d49eb1f51c7abb0551fadff937bd844c476c8fff5532be03c29336da6484c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6fc128682239caa9f7e91bc5a0a685a
SHA141abcfaf69a12c259a946413ce966141f194f6df
SHA2566b438ec66df89ce52d7a8a861b9f9c89a11bcfaf1b15228a8b7aaaafe417bcb3
SHA51263bcb38f2066d3d55ff2a0e5825093d434804f191440e1ffdbaa9e72664547c7b5bf6f8004e6424f80d981dece16f15ead04d20a32b5f2656dd4fef085029318
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5773c7c2a6e103d811f8312cbc8fca842
SHA1b6755d7a6245583b6a6f8fe9d40368f5ed1b651e
SHA2566c43e72ec521774872134c439d642b3a95197341d9d12e07c8c0d1643b073963
SHA512a22ae383da5d8451e66e703460c20083e20a0d9d2674a2cecf7a5dcc36ec9efc837a7dd9194a35cb3fc15efcc62b30fc3afafeac641855a472e1fba4ee3d3663
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e9c30794bcf8dac6380667443c83872
SHA10711bf6a5de1e64bd6ab624cc194cf7f8cbea566
SHA256e33d13c9ea970fea6a82627b3c2a5deb0a18ddcd211cda33d4ac2889059708c9
SHA512496af23f1ab76b51a50a1eb252bf509fb5d88f8f656851c04ea1984499d444f74ccd2e20b42311616799b5980a6797fed9403f88b8424f5de07ad67335b7ed8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2ff4d9430c20ed795f550a39c76b770
SHA1702e11cb25398b32c2f1a032fa9a4b3d6dd9a697
SHA256624f4e934fefd68137c20991c0121f1a5a7accf32fdf214f95c1f7eaf8e3a48a
SHA512c04c55a183314bb1164fceb6ee8c3f3e88f4a2530994255e6e2ef233dcab4f438b8705c19d28181a93c6e455a4bf3113416373f02a51fcb51902c6bee4357cc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5488c04b6490c8059f52a130af3a561e3
SHA17a385536d950fdcd628002580b992a7c982b67f6
SHA256051c99cba2f9e88ee548b77e3203eb6592e8c3a54949fb6236bd99f423d5fd15
SHA5125ecc0fc44e05166a0baea3c8486866278f09307c96ce98a06344c76c97346002861561aa5a0000e248d247f2557e9427b30e0737ca7c99ab466ea2536aa346e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541b79555819e170167e516ea994887bf
SHA13a30ed2a1e18d6ca8e06a794d010fc963a479caa
SHA256620e447a9dde7c02bebf787d293c461b0fdfc7cefe66fadc54ceb3a1d760f006
SHA512b2a0360cf9cb381db2ab6d92166caf99aff91434cec22ff6ba10e2ffe1ee36550aa12ac6bfd3f06276dc93794c9e0577ed4fcd238f5a3f675d7c8a944b6d1810
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8712e96c09c2b6e725a84756ae894ec
SHA10e6e2eb730a26ae8682bfefd09ec62702b634a19
SHA256c1b4e0360afcf50a6f729dd7c67a0d1c98b26dc10f0e52cac3605430a56c619d
SHA5120295fb981e57d820212c92e0943ee80de1600e77fa9ae465664540ce2cb7abcda79ec99d067b400f9a7d1818e85aaf4dde8a699e5367da337403b4e2f5aacf36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5224f729bd4d7a4683592ff34b4f38156
SHA1d836a5e73f1a8ba73a7bec0bea7b999797f97708
SHA256b3c4749a83aa73208d2992a2d2278cfaaa2f7842c18ae57539a9da2099646330
SHA5121cca4baf3f7dc618f40c044252398ddd99630e9cfb42865fb260dd038ed5fd6617ae012c4f185238bca74e7166aefd3e9f8b8b3809f3ec21f3305c4023fa0a2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3c2d188e98dc08af073c5de7899bb9b
SHA134aba7dffeeb9de06c9f213bc82dda0b91de4629
SHA256790d5f79f83b94983e584f22742800f2f16f38acf0703325b09fae7461e08991
SHA512f3413400e1cb84e8ca413ea70430768e9b3be016b6f9e6c765685e6ee3833e5f07d61a1d500d0f143f635ca2e083d4ed5712d2b45ce3ea5f0cfdc4706ff9f099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571b91978844ea166080977fe1876547d
SHA1b52b570c137d7180805c5b3411863ef763ea35ca
SHA2566b056f1c8b7547a725fe8b5e40f78d449d66ff08d764a6ed91dca67a8f8c78a9
SHA5127e07f85a10f81ee76720b09105247dab1805401f22a25e72cd47ef594bf426ac446adee1673fa1ff11fd626b3231a7696cc59035d492681a16b9fab30ce7e1c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da80440825527cc4109b6e790c0b5c27
SHA161685845fe0ae695a37d85066f3abb1241a1cbba
SHA2562fe2b9e22073ee145e2140f1da18f23ad03e982f3e07b0ab919564eb9c374f54
SHA512f8c6735ab40f60dc1e718d10e9a3f2f30ac9277a93472a62d92fd28251cc533d72ce36374f53458de3d6f448a90f0d8aacbf2d28e1f8eaa3939c5eda00a1c0e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57156dea0211c931bdfa12df4644e286b
SHA146636858c0ad4cd4e8b5564a311f8cb583023845
SHA2562ed4482358028dedaa358635f21fab84236038fef4a66eb2b24f80c8bf568200
SHA512b78366b983900544aa0569d2756555d4fc4f6e55a6256244fd5b09e18a66d7223ed4ba2cfcf44878b172f51b0765d37c1839cdb2cc511ca4c1b038ff3f5bcc73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560e23c0fe2812d8cbc14ca36172cbe41
SHA11c63c35394d30ece60cdd20e6a2574fa65bdf784
SHA25658999e0db0671ce4be6172c5a188b8e635b6cd4509ad9a13f9d81b13a2a71fc0
SHA512fe30cc93e465fe100273a979db328a985e474c3209371ba48f8650f53774535d2bb1c1777ed63363fdcc580fe4afb7a33a227edb0a13a30294cf4b85ac0dfae6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54eb3e5e45c668867d4e3f4243cd27fd9
SHA18cdce47c39ed9b95fbab2423cfe5819cbac09aef
SHA256ff3f1fb304f04d06f8a7d5740f3e5c10ed3f9abd5964dab0f56b7809e79d82f5
SHA5123ef521f884a83b678831fb85b6203d4bb4b57b8f44e0c8a6c5412d135ea72dd6dc11498648f168b6ee67431289380e9d553f48ec199d1fd727bb15a912c46269
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5590218f728239819e54a25bb6af47b29
SHA10cc93f7c724dbfe8cb996e3aac189e43eafa0f61
SHA2569998930fe33b83fd7dbf554bb17057466612b8349b39c9e1cb8ec466475df090
SHA512c6aa232683f0419f258e80cb6e5241009bdae79c2ee6ae8a52539e2ac9a38aa2cf321f03523677da73ba9c2cf1576a689edcdb9dae511642bb90fdce3b9857d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580874943a5744c0b272a8bbeacf81aaa
SHA136e3539403c62c1b9c9d2dc5edef2b13a0acdb4a
SHA2565d91fdc6e52a1a40b0d232854b35076aa08f7d407e5aa7a28e5f6dfef072b4a5
SHA51202676c753efd215740b990f11a6533e6b7cbaca0d8c9a7b315d208122ca600b4101a6d5864ee45363b1549043a7c66fa48e1ad152eec57863e8f330b9c34c1ae
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b