Analysis
-
max time kernel
138s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 11:09
Static task
static1
Behavioral task
behavioral1
Sample
a24c6f2804de1763c93b378bc3f23e7b_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a24c6f2804de1763c93b378bc3f23e7b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a24c6f2804de1763c93b378bc3f23e7b_JaffaCakes118.html
-
Size
19KB
-
MD5
a24c6f2804de1763c93b378bc3f23e7b
-
SHA1
6e327d2723f8694e5290b52dd26d73d67a20e559
-
SHA256
49a66a114d5888b21e52bbff650839677d07a221eeae96a2926009bde17d1884
-
SHA512
9fae90fa31c6d4e1bcd5e1604632c0a66a25d1cb961d2744b826c8b2d4d17be32c4287ee73825b3ff9937ba7ad9748b1e89afeb2bf349aea1e792b66e336d105
-
SSDEEP
384:4+QfPFd9QZBC7mOdMgmtKfpC5IgSnbmFe7AccV6jsLDPd:Zcd9QZBC7mOdMgDpC5I9nC4MPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000009609c760546bf01c2a14e53ff8d204ac8208efbbee9372ed62b407aab635d62c000000000e8000000002000020000000a13e584f15d95fdc57b96a85119cc9a103cec4e2e4af105ab236cfb506f82ab12000000065150e293fbbe4b918e33ad23457af299a2de1e6374c460b197b245032279835400000009caac70eddc7c65e13ae147a1d10c10b2b02d21f7f33d835ddadad318e0f5b85039187c87adbc4078250178e5dd6ee790f1641d359ce0954455018214b185c6c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430054858" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5084bd0f96f0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{38A97F91-5C89-11EF-B507-C2007F0630F3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2120 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2120 iexplore.exe 2120 iexplore.exe 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2340 2120 iexplore.exe 30 PID 2120 wrote to memory of 2340 2120 iexplore.exe 30 PID 2120 wrote to memory of 2340 2120 iexplore.exe 30 PID 2120 wrote to memory of 2340 2120 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a24c6f2804de1763c93b378bc3f23e7b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2120 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c44c8b1f8fa5aa76a2339ef00ba7c60d
SHA1aa131815d06426803142ac69d7e24386384ae069
SHA256848456d8ad6d3f58ce570a805440448b85bd29c593a35cd660ed3a7130acf3dc
SHA51243d8317a83c2ec8fafad91d52609db3c4b5af44b266ba07d06f89d66e72a91e4371b6ab61b5444b9063e3eaacaae63dddf46ed3ec80614d77c836f0f332930e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51656d982216d861631aa67f0eb59b7d3
SHA1e71f2d6385326191eeae9533230e5c904757db51
SHA256c9b6e5d85a82b9964ba8af9e90403e5fb20d4be1bc4cc6647494d26535d2620b
SHA5129132f541f1be397ea14d0ecea88643d1dc1bf50f3e9f0598b4b3d230e6c2259e32696dc9b6bed2d61b97045010da60c7e572ac404ebf3911f1b9f727587645b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d810ece399b08963f2316ecd52993d46
SHA18c08f083e4d15b11f6093f59cbc4b5c285a95a6e
SHA25610f5b7190bfe459393ce032d26fbaea54ed933fd2f9e9b766b15726e73fb23cc
SHA512387e8704b5dec379b6f3b56c76df2db466480b9a22f7abae9017b9064d3eb4327566c270f3d42eb94a8fe066e988898a8dd9b57d83392a3ea4cfed4fc00e2266
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdf588517a2dbe3d7e83a14c05ffd738
SHA1451f058c695d086ed2ca22387177410cfe79dfc4
SHA25628030bc95b7c7a73c89542b20cfd97b8fed044e309263f12a7843f64a45fe3e4
SHA5126af890182581445b5f1b62e62c80a77014d7f10822dd3ce88c0972e3f779ef23b3816983061f2b6924c65b1ab6826afb71459c51f8209a0595b8578ebc686409
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e814abf979f11afb44d5033eae2de68e
SHA1f993efca6d69d5c5b5d59d556423627f4d49324a
SHA256cb42bcacb088cd00236fd76786b0bd16b6209d9d334cfdfd726c8bc66e42e204
SHA512267b56d9729d2baeb7fc0810b607668d62e62a783c126818fdca498dca6bdb121112e969f4c982c1173f5bb1ea355e783b95b4d072bf9e1045ed38bcd6474bdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f40370ed67651c2e4383739c5797af07
SHA1990eac0f625b2e07b1e2e18b0b76705c5ec2b915
SHA256ecbda42d43313658720decbc5c17810c59ecdd1ed8ac65ee6fb3e2ec5b602327
SHA512724b7d33a6628f8dc7b101737ea51ab73e17d45136fc8391a9f4303d0fb8707db67fa154033b723b6198a611e79d3ecb2d3a7f9eb2aef49cde77ea9f1df2ba73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6f1a64b8781e01f3e6f01c64725c95b
SHA12e15f221d52b889e20985b9e1e44d325fc12e4b3
SHA256f0b9f927deda1ab45d3fecdc512dc5e7577a2d684dc4a50818f8d04c93556992
SHA5123f5b45f78f851f7bdfec3dd9e23543c6096c8264ddb7066062eee32013bbf60a8cab39b12281d5132d6a9d816970875273bdb26da6ed729bf5c96eb66e92ecb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b2bd345f99d56a964097aac20b43c80
SHA14b8cfb94cfedc41dbbd3f206a0aef7cae4432c3f
SHA256508f86179915b47493eeae10de655b58040cb2f6cf9c819a80295e48a701f446
SHA5127a69217c1920d860bb30e3379029818b521a65301494d3da570004d79bf2cdf35fe3868f34b5568cdafd54f4da37cd9b7c1410835ce0abdd7494e8239ccc9b7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5775564064bf0cd2280ebe2ed987b9dd6
SHA15095a6bcfe47e2548c459c6c337e8d00fe2742df
SHA256b0d3338bd4982f6700ac2acb50b8d747476a402ecc86a3ec49ca47823c7edb7f
SHA512c6cc0ecca7e62b9429abaffeca1ff1f8844839a5f772bc2b6123eb5f9e75834c3b3e4a0e814caead4460925c00d15596de7a623078706fd993e2bb9a4fb86306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c26f55fc4c401124a25493868d51b2e
SHA161698fc021177c002b9cb2eb0299796b84692799
SHA256937d4f0fb92370717e140b8bd4714e098e5e940aedcd639a39df4b0c36e514d7
SHA512e72c901519d4fffa3842a5901e510daa3925a8652d8afd31883d9f26e989274d6db81fc75f99fe346ff2f1931c4264c0e1af54d6f58511d0ac076ef85c86238e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ced852ffd308fcd323e7cc3d00c8386
SHA1609db6f12543be5a27592038b30ba4b88d050ec0
SHA2567160520320aa1e33d3443f50599fd9126913cb3b2271007a6016376b642f0308
SHA512887e257a2c2325ef03bd4eff6df1401fdf12086fe429e0f54bfcf4917fdb2b78d502c277808b1147c47294dd27f582a1e995c86d56a3f31821957feec31884f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd0b7801829e19826cd120fcb68d262f
SHA19731180ae3cb4541977591221c76d9e4b22e1564
SHA256d352b3d99ecd2eebaa5c2b7fc74c33d1a2cbc676c6eea24d874ae76637e205e1
SHA512ea3e1491278d3d1e2fa930b9abb615aaf0d806f96fe3730e0884ee719308de2fdace5a800afb2ca773e3a5363c4b7a4f46c58bd83afbca6953f2e6d7846da161
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a061cb51044fca501e77adf69245811
SHA14d1a455ad9574d07596d0fc72704d9ebc7657878
SHA2569b4879fca98e2f6ccde53a946d3e63dfe9c2874487a59b685abf628ffbbf9586
SHA5129d61c1343e485e01b71e6a6ab10135b65325195f1efddc8679e05640e48d9d642dbe831eee3a8027f616bd5133cfb6b40c2152cba5ae1099f1519337e1c79e05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580fe121c803f1b1f2c20c1fc4aa034f5
SHA1cee306f1207f44aa919d047635722d25fc660b20
SHA256da27f6f0575ad9f087334814db8c7397c5236c8b89f98492e3c7c6ce54950c07
SHA5124c86aeb0b372d76333349c56c1e4b17bd2532baa80aef13361e523837ff3e184af6ef7e03c9234350b9be5d34ff806f9afe3487c07d3cff6e3a261794d8054f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6c7c2be44db9763e60a17caa936e059
SHA17d9ba51837b1493a5ed2b24e194271efc5e89b87
SHA256a62ad6b2c8d5f8947ccf8b198d2658867d346d57df357fa7613ab05aab654ee0
SHA512d52af722a29134e460ff7cb99e4bcc01198dc25bc484a06068e6d4a8c64a053952a4a24c129e4a51f669ff0e83e9c1c2a85ed9443c46192d312c5a2aa5d5abf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf43b9acb48641e203fea2dfaf4dc2f0
SHA16e9b422d9785e20b80e14283d83d5dba7a503c8e
SHA256842afd6196872f9e703b3547e971af35897728730077a3bc76d165bc46a5f3f8
SHA512c80b4d99389c1c88b8b167f6871d0ba6959d35ce0c304a345a9f4ac60a9b0890e37f4926e9c9bdd09da8faf38f2a952a16799ce394df29e443ba3723c329b465
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589e5539e0e511d82a5c066bf47659d02
SHA1c333240f8e96ec7f10db9e2d2af0f43c9e30cc4a
SHA256a94c5412aa517818934e66410dbc1bd4f63b33c2215646d02554296b4c07a50c
SHA51260fcd80059da9b43ac15a77608f921ca3ae0db834df21668896d3e74a6a4b74ea19561e72331ecfc20a51fad903cdf8bc7207ad39e35cfbf612bf727d0e2fbf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50be23872c1f2c312d05563fdf5b6a03a
SHA1333101ad30a073b89c2670e3621a489d5f955b64
SHA2569777df744422c6f6baa92c55ecba61cb691b8ca3fac4337b9629bf57ce0d0825
SHA5125f61781a07837cad9c10b54fcffd57c1d54f209de6453200b3c629014c8ac65fa5f75853f38183f54a822ef1e9b0372fd6684e956c2f5fbb86e09d98fad8352a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cff2ff30c967e711761c79577dd2323a
SHA14ecebd2965f981a79ad3d537cb27ca0bbaec6bb2
SHA25661ba11633287f3762a30d9bc167156890b21620eecdc74145266182fbd94136b
SHA512f5f9b0665025a5654df0ab3c6b37ad7e87ae4960891f520120defe9ed516642089cee9a216aec371ca2205967cceb9ef6378bf8e36dbf6e1805fc143ba660a68
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b