Analysis
-
max time kernel
119s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 16:03
Static task
static1
Behavioral task
behavioral1
Sample
a333bc388dfc1d324aa1fed2bf32f0de_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a333bc388dfc1d324aa1fed2bf32f0de_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a333bc388dfc1d324aa1fed2bf32f0de_JaffaCakes118.html
-
Size
57KB
-
MD5
a333bc388dfc1d324aa1fed2bf32f0de
-
SHA1
754d4818f45f88d623d6200bc54fc91243b84fd1
-
SHA256
02a8df5e5d2110ab3b4d4b3d6843fe86a89820603aba52567cf1f015791234df
-
SHA512
1d9788923a075980d9dfdde1aaa7734fec29c9fcd51b4e7962917bfda3c6809a40ae3f5e810bb238068b11ccdc090b7ade35e42e3ce3eae2cdd7289d55c06d4d
-
SSDEEP
768:wLTUpHvvCIootudwMcu6oeaP2SgARtKvHJqo/wchp8gVWJ:wHcHv7oaudou6oeaP2SgAHKvpwchYJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60075a2fbff0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4294D941-5CB2-11EF-B170-4E66A3E0FBF8} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd0000000002000000000010660000000100002000000037916d64e8aaca2357951ca9db9af651717e1b16086f51549f50bd8f35532e85000000000e8000000002000020000000bc8afdd8516e37cc68d35f6a2bfb1ea54325e5945ed516b328ad1817a595f37b200000004f413b22d633abb5c0c3cffe7351261abbc82d524b69ecdb4c0b2dfce6e24125400000005d476e49840bee7b7ac4c84fc11d84ab73ab03ce8c0703cff170b5ba15c64009ec39342a09a8f5673bed6b5b919cc95fda5ed8efb3b2d919f962fed87152f3bc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430072500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2604 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2604 iexplore.exe 2604 iexplore.exe 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2796 2604 iexplore.exe 30 PID 2604 wrote to memory of 2796 2604 iexplore.exe 30 PID 2604 wrote to memory of 2796 2604 iexplore.exe 30 PID 2604 wrote to memory of 2796 2604 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a333bc388dfc1d324aa1fed2bf32f0de_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2604 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD50437c898bf12593caff41d481c4a8635
SHA1f87d4130a09071a941f27625887a52e8fa76fcf2
SHA256971c16bdf0d06217f052b0b98452bbdf53e438ef0c5afa69ac58b681e60b2857
SHA512c6e7f6d7d6371455f6800959b43f35c8b94b5648745d1f2505d417d1839d5b220b319eda59a144e06a3aeb1d571069af2689a5421fae5568135871cd66a2c711
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f130c39536d9724b572e17558243bc6a
SHA191597c2d669b18aff3f572d8fce09ed529191b67
SHA256ef538119f1a4a0de5e8f16397917952ef9e0ba4c213b06c5bc4c14a3de5328b2
SHA512ea66cbd0c7d6195cb5f4c571c5d4d2b50dfe049a8c97b60e5241c2d12881fd7db19f8aed59189e11c11d39f39d5bf5a9a9b4eabb56b2d1997c35809b74d6b803
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b86ba4402f8e08132096f7f2dbabf4d4
SHA12da0b1c1b6f2db8fb769df91ecd185f66d159580
SHA256b5c4269992d5ab3d04539c5355e61e8fc5f5b92c4d8bbaf6b1904cb584a67785
SHA51276915e976d45f9eb0a26eebcacc3694c4a298b829f41d582e97cf3b1b1426b6938bb001257c7476ce7dc2b23c1c9414eb83f2d8f1612d45660b91da0c5845a97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52507d7dfa05763a76fdb81f4f12b6f40
SHA17bbb01c51e67ca371c275e0732fa142499d07f65
SHA2562442a2d4e9156cc876167aeb41dcf2018b712f4f389926dc1cbfed3ba482ef07
SHA512b9152b0770de2c7c61bc28c751e9ad19db151c06a2ead173037fbab4ae283e46697372780444b3878ddfdec1f600139b5a5465f55776236af183d256e3b4bf4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56464b7613da52c653c218bc9ffd30005
SHA1313cd4042caf12e478124474b93cd69a3bc469b9
SHA25622b8cfbadbbf8a19c2b6ed5169b11ac68ca19618b40de87b6232afd17ec8290c
SHA5121c482b6557d2457564eb0b06c23c82cdc752d62d586100235130bfe422ffec19a052e2d95217463069f98d2c3da09f49470c1365f1c2e023f9e4f5940c5acbae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2f30766b9d9b064173ff2753d4b1e52
SHA146b996f295aed415e0f501980041a91ca59f5e77
SHA256deb46954982e31e04705e31643df274b667b2b3ebb28b87d2078ebd6fc15bc17
SHA512a51f01d0c94bdf916e2a59d67cd939257be7c95f66fb2f75a4a17bc60cbd6575d6959c8e2b0411202e676c22993ee186e9aba5b27ddfd8b9b33c7c8680934218
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebfb267b267a1631824257795e0e5783
SHA1f80e73705483ef6fba336f8669b82f03d1c00682
SHA2568861e8b6b80965f711e5d1fa9c5ed3e3a3bbaf39afaf15353e115ebdcabb1fb3
SHA512ee3161d8f1a72869e5e0a343eb3b97952137dd197fb9700228c497406038955b091c9f5b48a731fd44e93041b480bd6715b75a0d67372ec46d6f1c7a1885e721
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3aae732dc84299b1bdc38a6ec45b339
SHA19fdacf958b293cf7ed6de7f77694033e38444b8c
SHA2562b188fd7d6098b1db4ad345e65810b7437f2e277613a3db6e54cb14ed8c8f69b
SHA5123bde92fd40da389ddbd728a5970b48ae5469253b3d00a3f9b2340057acecb72534ba9b787e118330d4f11808538e2b657c15e448935f6266ceabb529346ca056
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eababdc525e8cc18a398bb61c5934ce9
SHA19ce766b3fca4e74e42811009555c4e1f98ed2cf4
SHA256e88df268467ffc506b2d9285f36267f7fffbbe973ea272173ae16442055e57f5
SHA5129e1eb5ce10e60dc5d7b1506393741713ecbb6cfeef9e54ef1ffae6213cb9f36a47e31ee3c8515b7e0abf537de0b626ab48f9ee8f75d717f095c53e9912f591e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bfbbf12f24c6da9bc5f98a294659be9
SHA1816b0503351f40a485c96b37264ba0d0b7e4cf0f
SHA2563e282c7987dc00be191a0298bf382e5a6db36435ad9561cb6dc931d449d5f36f
SHA512eafdcfba14f2dfc3351d48f30a83063d55c7406438610e994669155d0c24188f6d7b1228b1b9addfb70496379cf7e62841d956efe7d4d575c678e3fb8c4e3872
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ebb62f2236e502ef66613523bbaedcb
SHA1354b33930b0da9834c06a24983e344b76a28e9eb
SHA2566b2230828d06006284187dc16a419bffd110ead78af14a885d2b417004f47d2d
SHA512fd65770ad49a4541c2a7a5d81e29618f6baaa5671b5d1b36ca30cb1ad20d4e88ae5b24355ba59894d4b768101c364ee9d91cb376c3a256e444d246f9cee8aacc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561fc2b6f1f455cb8e26612d969c6e5c4
SHA1f0a71369e1be225b5b108c170ce905516601ee5e
SHA25666135a25e65dac15d55e7bfd5376f1d2ace6c25b61aa4566575a06c23ab5d650
SHA512910919205d9cba094610f78d2ae2f56f84ca52aa8d7800d45f68314895922ac934db7056493e16d2a81001b181ad337160d4976bb823ab807586231983e42431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD53965bd1c4f577b9f311b430b7ff1db4d
SHA1d0781ef218e0f38cd4e4ea07fb22695dad14c21a
SHA256cabd6bef3c439245dc225010b49e87ea11f37665fc48d7185a1039e4cd4102ae
SHA5125d04fc0f2f4b8bd2d22ecd2cac2e695e10cd8155f7f1818466e045098d94b0500e148a771d09fc62a2e61290cb0245e1cd69e76ba9e10cfd3ad80780cd011052
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CWSOWPAF\cb=gapi[1].js
Filesize135KB
MD5cb98a2420cd89f7b7b25807f75543061
SHA1b9bc2a7430debbe52bce03aa3c7916bedfd12e44
SHA256bea369fc5bdd5b9b473441583c46b9939232bf1f98c1cedf6bc2241c4f5068d4
SHA51249ccede4596d1e5640a9c8e8be333f9c18812d58f02b2b15adb54172df1387439e9dc5afc4ccd9d8f0f75f092318bed68d3cd577338e88ef4f9373de8a07c44e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YUF3ZB4A\platform_gapi.iframes.style.common[1].js
Filesize55KB
MD5aada98a5b22ec7188655c2c17a083c57
SHA17c3c2fb8744e7412d8097e28f588788d91b9cd9b
SHA256f2f09baa213dd3dd95edb5a30c7764e4a44d9a79c0831f90b1ad8ebedec9dab8
SHA512a780aa3b9e36f61be8240487e75c19a96fe26d54abf9006680a00af9d1d394e81e517f0bbbc13edff3a7190679260ecd56fd5cdd7c2d2f416ab8982c3277b953
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b