Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 10:57
Static task
static1
Behavioral task
behavioral1
Sample
a24386d277efeb57fe2ed6a3710722bd_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a24386d277efeb57fe2ed6a3710722bd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a24386d277efeb57fe2ed6a3710722bd_JaffaCakes118.html
-
Size
7KB
-
MD5
a24386d277efeb57fe2ed6a3710722bd
-
SHA1
f0ac038ae87118b2962d828c687a7c82b377eaa6
-
SHA256
95e255e40a7564d907a153e8a2fd0c4b9d27e1f69fc8ef20e8da24b3a728bd09
-
SHA512
13beaa5775ff29c6b05b34235b13ffd3c09a1b627ff179ee7b48e423d34de19f18ff8e8650d3d8de8f64f27859b039173f5e890c8b43001484b31358036395da
-
SSDEEP
96:uzVs+ux7Z6LLY1k9o84d12ef7CSTUzzMcEZ7ru7f:csz7Z6AYS/hb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000003cf9ad293884b665e99b9e19cfd2ec0b6465d4733572f252aa2558430c6c5c4f000000000e80000000020000200000004c58db232d3b94cd827f16751f524962720eef8223724dd5172436205f1707cf2000000006d44729c4e4d6b98af07edc9068c7add75879e88c583ac3dd2ab4ed57e539b540000000d96ca49ae8be1a0c23c2190ac48ba0afcac2d98318f52439bb0d9c96ce492d2ec33a628933268fb27868f4465d681a3c71866e6e606c0c1f47f7e66e07fead41 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8626F881-5C87-11EF-A7C8-6EB28AAB65BF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f02dbf5c94f0da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430054129" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1452 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1452 iexplore.exe 1452 iexplore.exe 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1452 wrote to memory of 2376 1452 iexplore.exe 30 PID 1452 wrote to memory of 2376 1452 iexplore.exe 30 PID 1452 wrote to memory of 2376 1452 iexplore.exe 30 PID 1452 wrote to memory of 2376 1452 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a24386d277efeb57fe2ed6a3710722bd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1452 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bad0f1a9494a55043989dc3e4ccb3adf
SHA14ac21c3df178a94871bc7cbecfc27b699ed81b63
SHA2562ea9b9526605d9b0ed59e3efb4f64dbbe617fb719ceaea74f60b14f8fc452104
SHA512132b0ecb0fb30674afecf2e322a71e5bf0c49518dbf6003d21836c0b700b95205d330f034f32a4768ce4c12b79937ce6a5938800a28b8f4ecdf561125b12a3bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553fd2358ba763e6246b2c617506bc132
SHA188753b640d9b87e4f6335fff3ffe896d610b8f4b
SHA25622fe1ecb59343b28ff7ca561f80de6daf08a672b78f9e6fdafb7fe47b7f79e8a
SHA512dccd2eec1e8ae61da179ea7d953b7d7864dc273b6ddab657e1aa731b2dbe98496ee0c3aa08ae775f09efe3133e58d8538306daa33354c44289f409a1fee568a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5138006e23e7a0b17f186f6c09e828834
SHA1d45b4847be18f349a8242da237bafb2f13b23f68
SHA256fb4b4aca520f4d6fd3391e82e98d3b47e4a107f5a4bfe0f6a01ba0490758e4d6
SHA51250a40941d3ca4d7beb2be317849126a7ed5dbc66eb73c802a7334c3e24e6f9ead2cf3268c34935afecdc1aea7315a7fbf89d3e89aa39e8becb3d9d48680d2078
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5449fafc967c53f57232d1fd10969414d
SHA17860767f364325e16c6f3ff932f2faa47fca9011
SHA2561e7defc2b9da142fb7563a5022c742344a94197f6b42b77290567334cbd163cb
SHA51202e44ccbc0fb2ac29e37751c9d8c5c5e1f3cbc3079a1a051b7a2c72bb4ef4c42d9a7bf160535431312c984d020130932c52af9219807869073dbfccfd29de05c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad3c64ef517c7d8c2d5b94ed3d210645
SHA14f253c62f5ca6d66ea76cd7dbc917dd90a46db4d
SHA2560a9dd0a90e2c815da01d493ddfdddfabf8c2c37c1172337be06708546e47434c
SHA512a0761fe44db4d5185d633ee048d407347bde5fb9fc84f9a6211464fc0f34ca51180a45a3f485cdeb60cb435dbad88c096aac19a28987d4550cd1a806f2719876
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5728d0784ba8707243a5df7eb5e9011ab
SHA1b158bfa62ac27ed99edef627ce79d8864d6b75ce
SHA256f241a37b4d83d3eb82d919d57bf2fb85c842ff7ecdbdd2b82a93ff856d52d586
SHA512a7ec2b7d3d33bb32d52f158299ad353990f2c1ec88512d77cc243bfa8480ff8cb2f3e64240b1862bef5df4f4df720ca10c50aee9f25a7206966a0272183770e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536362fd3770e10f8e96d45a690a523a4
SHA146d4e1b402ac1904e5bdd2bf0e9e3a717a5856bb
SHA2567811bf3d56ad8f2e8c84a87daf2cefb55429cc3693d2624368b2ed13713a32ca
SHA512b7491e35c998102bcf13046ba88917b24060e89b06862a13132ba8f23c716f87a391fc261e1be9752c869a6e0a6bf7664896655c2b256827540250faa0ae0870
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50699bf2097fdf9270ae89c86b4003f78
SHA15bd6b0957792e5e5fe863d2fba53c85f8e8c5ae7
SHA2568ac74755de7d3ab7d395afb0ab2a0ec4c4fe0e814a2b84ea7f2bbca1543539aa
SHA5126a6751cc3d5860bb51566cf94c34bc60f2e17ef3f9edfc12d6c9720faee073afe7f6865598333d3a8ef8275f5f7e9631d2dbcf8438ff1deab3da72267bb0392d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e0a8c24c3081833d9675ace20a6aef7
SHA10b5eb511cc0561173bdfd88a4a2633c47f14abbd
SHA256a62294b58ed46cf1f275bea5f4ba109078969052f6ef18040b8d1cdbfd424b13
SHA5125fd928017ab9626f777e870b01498f2b662282a9aba1b1f36a2509440e550b69abe574d780cfbb2c26a6f09ce2f688307364ed266a4e15ae2e84078e581e981e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571fac1f9a69932210dea71a416880530
SHA15b5f6fd8d01b5380144f8802d4615cf57808bfe8
SHA2561c21d93a1576cdc218198323cfd94b4db4e3c9f2d4c779af838a11940ea71b08
SHA512c0c9fec4ab984178e05b9c97982a869737f3bc7d4a0068d0cea6f366e4275df3be473b646cf79c784982d843e1ce6e1041977c478770c9abd8e0a29fa219e84b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a73e5a6fb3f0b9baec1837a97c87068
SHA143def28218248a77cd9548ddc4d51963a060f9be
SHA256ab5f1961fba5b7923392257e2831c4829eff5348fde8384b2cbe4154bf2690a7
SHA5120f8d2c17a3f81a9ed0ae16910a9a11aa0ee7360ec4b17f5ca6777bb6bb6b4433fc71cb1665285006cd6c35a3b91ee890002a40dfc881a811be715872f81beef5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f2175ce1d46054efcf31b1bef629213
SHA11f6b5103a1e3918d6226e01f2084fde36386a924
SHA2560428cca8769180b0dc0891db62b06a8fd06648af002edd985168537174f59040
SHA512b306708b90534833b0b105eae4a7c3b7957ad20b089c1e680b8cc6e33fe3f07983ca0d185f582637f8b6934beb6478792261c10f0a6d1f8e5f9e5b62e6ff5add
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597eb3b191aa3a0eeea8cca7e23a1c4be
SHA16444019e0db594ea3ad5940f1ae56c8175745581
SHA2563e80f11f4244fc354a914d49c0b05e894ce4d32b29df74b62011288a0af00912
SHA512b6ba646b3fd402de18ceffbbe181a942f7ff125a89a28e79bfcaeb2fc8ced8a56c57fceb592236347c788ec53c1d7c47f1609ae394c94a15a23a33001d2c488b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b26fdc7ef6c70b533cd2812d3cced61c
SHA1452ee95b29808affd8c0a80561fe277f4fb55c38
SHA256b8f361105377e049b59a8a7abe2f5f5f17d4e324b6ed172fd817bc11f277260a
SHA512346d553faf89364f33be30ba39632d732be958c34c65bfccd5135e2cca7bec1560d4a2f2bc954d50fb268597b1486d9c522741c7332ff3a7a9df32f81d7823a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5789cc9c6e68792dd1ec6bbf89ef5e165
SHA14e2e05a225fd29010e362373206a009db4940195
SHA256bddec4a8e2619432c53df4e45f9b1f85a7d8871bf572e5c5e733fee612bc930a
SHA51272354700d5d9c679870c4503f9a7829df539fc81171b3942219973c9b397c44b672c0ee02e50164c889bf2fb2e090cf9f83d5d8daf76d340d22323091131cc13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa07545b9ea0c2c315ac01f4e0f69be9
SHA1cbb11cfcb946a1a82a4f7dc9ae29be61755eee70
SHA25625f2125d0908f16c78a80207b031e575354542a4403e29ebc7a2e83656f55dca
SHA5120c6f29374ac9e8c31d4dbb5c59585e384c30c80305cb1e4a06800ca051480d0ae6ed728e7941aa944e485868eced50bb49cf305b0930f46c5e910fa9478a0695
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff63772a6ad8e7c6a57fe5cd9f70191a
SHA14b18583a3c8e903448026e0294e84d5f7f0a565a
SHA256653b89de5537f5043ae0d61e25d373d17ff4a351022b18dd867c406684f5ef12
SHA51243a9f8571d0a8f05a6779cca8be023e3ef1047c1b839680ff0016dc7cd788d3c711a72e2dfc076ac39a494811e4cea13c8ee0073249ac46d74327eed4c888765
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5660e6d1c75773141f5958bbb40d5b2c2
SHA129f4461eb105cf541928d474ef8bb7d14f579a3b
SHA2562a537b1f8454eeacb2531c1bd7be4f952370dd22348a40c385f329f36c12d503
SHA5127714eee583e7ac7be3baf16f6820b1be256b4e69cbdb535aa504f6b7e0a9096420db5ad0add76d29fb5b53b74f7591c078bda3e285755e4788f91973e6779a9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5555f12dc9a26e11ce658dff78628aaf4
SHA1d94ab84856d2f1323b23995a514d16dafa72155a
SHA256483f534ebe64d0f37b15a3a66a8a971a9a5563a299061142c4b632d3dc725faa
SHA512f442b243763e3e7cdbd9bbbaf13da93fbb1e8ebcea3a059c407b8ef1bdbf39dad50dfa0c30d7a238fe9865da725445ea8ebeaac3f0f66c8dbb75eec77ec59bc7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b