Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 17:38
Static task
static1
Behavioral task
behavioral1
Sample
a37d5516521e78c69b754557bc6d8f30_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a37d5516521e78c69b754557bc6d8f30_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a37d5516521e78c69b754557bc6d8f30_JaffaCakes118.html
-
Size
6KB
-
MD5
a37d5516521e78c69b754557bc6d8f30
-
SHA1
2080197557dcac368b1b150fe8c3a8c1f6175552
-
SHA256
0e57115a98bba177875ec440f1c0f9060cab2dfbe329f4fbaadcc60e286e543a
-
SHA512
1ad4aacd1ed88e3f17d48dc9667f5cbebb69f878e7f1eeb38b13e83d3a0401f2d27953c90d75261f4677054ab62c6ea515d805c5daa2bf905653fb3c0bf51282
-
SSDEEP
96:uzVs+ux71lXLLY1k9o84d12ef7CSTUBZcEZ7ru7f:csz71FAYS/8b76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7D510791-5CBF-11EF-B6DB-72E825B5BD5B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00cce653ccf0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000f940e59c3559d82137748263c2ba35b9437f0f33deae2d7e46bfd769832b4a96000000000e8000000002000020000000bbabd19aab958b59133f8583f5e9087282d79d3771618e71e7b05e831ad465f420000000882291e3cc00e88d940c55ccea3aa9bafb7017bb74be224bfa3e4f47734c02bc40000000af4462b31f8b18dfd37720b5702daf7783da90c388700108f7f032f135e2f4def29ed1770ce2af65f6c3cebfaa69fb8d50e34bf49e35f3c9b90335a0ba6872fa iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430078166" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1056 iexplore.exe 1056 iexplore.exe 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1056 wrote to memory of 2864 1056 iexplore.exe 28 PID 1056 wrote to memory of 2864 1056 iexplore.exe 28 PID 1056 wrote to memory of 2864 1056 iexplore.exe 28 PID 1056 wrote to memory of 2864 1056 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a37d5516521e78c69b754557bc6d8f30_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1056 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5294c724139d1fbb1454bd666fa541ffd
SHA12436d5504fb72949d184430f40773b837aae7f58
SHA256a01c9cbfef062cb79418e03a56fd72a2348e374a9b32fdd5eb56ba5b253e8690
SHA5123874b8372ff36f4635bb2ba18632e177797cbd465d679ffc48f860b75357bf099e8939725641fa0ce0cd9e95bd2afbe5b71d7330d1431596bcd58dc8497bdf5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ba383e8261a320ce21b037c7c06f7bd
SHA174aeb89eb31fc082b2205d955d9ddd1749a2595d
SHA2567ddad2364beb0fe0b517664d8f1611a9e3c1c14acfea34b6741d4b6ac527ccc0
SHA5126c9beb79a496234b45ad93e2d8625e1ebe40d6a9b635f8f0046d111eb31ee596ad119a25370a2762385cb69ec52dcce91f70831fe50d2038d53b178681269752
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa5cd49eca33c6788e61d7bcdb818dfb
SHA1fdfd36202657789cf978ffd273240037a521e4bc
SHA25631d28a1204a68cb3521764edbaec7586839c0cd9ce02b251ba9fe4ee69ba5abd
SHA5121a3c97e8809d1051a88e63e12e010ae587013961c6c2616d9cc15478472b9c43f957230f4f58722ab88ee97d0f5a9d2fe4d1f0cb00c3def0171734ec84d0df14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5670bff5a64eddedb30fa347648d7fb39
SHA1db80168307aeb37702db721850750dee0738609e
SHA256d5d6fa91afa7a23d0ba5955052131162f5c8cd35f5cf01df8a254a5f3ab708d1
SHA512bb2b3b0bb8a0b2d2b8051dfcba90f52b608861800b40086fbb304aae6722f95f019ce3947bda82f49956cfe70af10c57d61feab8a002a38e278df5759291aba8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a4e9c8b28926b1c8770b460c426d342
SHA166c820a8dfc556e04d1d4d46dd4d613dd5fe27c8
SHA256cceb01ee2336df7b8dabec69fa4eec0f87906b11bcc1f017c5fe9bf13f1a4592
SHA512340313ef6792c352049a0329ba0f4efe1eac44806f4bbcf91d6f49196c346801287cb9c8ce3793ea46a554b94f6989596e4bcf8d1318b88f69e6d478222dfa9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5416aa3f39607ad8d8ca2e1c2d5a319f0
SHA1ed12fcb8c05c057f07ac2c707ad6428601db356e
SHA2562f188bab13a8f923f76789249615b86844b1c880cea07cab410735d4f89b9a6b
SHA5129398f8fb1f350e407b9cbce70bb37865c40e11709bafdbaaba27771dcd4b34e3b91dc7abfdefc52abfc61c7789a109dd132419fd975d312e30963b276b630645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f4d7d2fef52befe8514246615d6e7ab
SHA1d4e450de380903102ce96f11cad4cfa52a696370
SHA256e97efe761d28f4c1c3da8ed1e5b3c1b30bbfb127e41892e2e6a6edf2de559472
SHA512c5e22f1aa7d710223bc862515e4b9976890705e9877038f1554286e945d4b877c5d052d76a1fb3ab9c19ccd0fb419a08e4f5bae7c04b798af7d0e0e39f0791c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52502e6797d70b8f4420bb76e64b9c155
SHA1ce616b513ca3e1b79afb616c9b3bf9a9d92ffa89
SHA256730eb2d9b6abf503b208eed4a5ecc2b6d48f58585a5b2d760f1f6a038cf4b418
SHA51212deccc262ac606a461442a5d36ef51015372e58f058ce6b7ad302e1de320ee1b3df7ed3e112e6b2a738f66fa4dbbf6cb17e879991f83efbf4ce576e9cc53aaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571358bc91f5c52a01c940f1dfe28b02e
SHA1403e846d2e53807af69fcf2d3bd08c9ad03f20a9
SHA25647aece8a4e1a1edd4a4768462f05a4c0af0641cbe19f0f14abfe63bc771205cc
SHA5128aa3e9fd6697010154a85ba9ab1e939a4e8522c70f7e4b2bd1cb0f1e459e7b8bb2f891b88ceda2442f18451a40f92ced02bd3ff1cb1925fa42d0270584209084
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ddecdd9c38f212ccaa9c8f7bc0d6d51
SHA160a76f63bc00a1caa61b36043596948d495121a1
SHA256cdaac5f3b02ead64820e6489987982463cd79a5488d3e434fb09850c0d42235e
SHA51279582006306b4754a56cf9a3788aeb3acafe2c77b6e85805c2767f2f0f0d552f9d950d0948aede65ba90a65b0bb50002526cd4a8e5740c4124d448931bef3b09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8aac5d5cb073c1d2e115279ae07ed57
SHA1e25fd0889240c688de7de40d3915e6412a0d5b86
SHA256b28f7cb3521dae968abaa1a3824fbb3040e031cb123ec57ec413fcf835e63d3d
SHA512176a77a37af02c21e0d6a2b736717816944b7d39d2b493f1c815139e556f27658d54da4fdfd3edfafa625ec95e4a4a0029d040ecf9af4578f87d384c32031f6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c3895b4d13896f114fcf6a661fdb74a
SHA18cb1a898f45c8c9affd596584fba5cec67577a63
SHA2569639573478e9970fdd706cad9cf5867a23f82106c85292bcaf3bf2732698a4c1
SHA5121ba1566de69e3f080f64b0e7827003f046cc60c30e338b53f0cfdf11b6a50d8b78a571a0d71e034023dcd9edcc7b02e0586a452b8597ff14f302ce06b6c486e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569737d22ea388cd81e6d8036f414f2b7
SHA1a13933ac7b23cdde4d9ac39731b31fd24bc1c547
SHA2566b084c1febac25abce111aa181ee3934ac66d102b6a74e898ac0f3df0540c3ed
SHA512bc15603461bf91bb219876f34fb15c3cc44c71b7e39e32df9caf8c86eedcceb46815cf6dc4ca21de30281cf8c82abc5ce7b88a7af0ca15db5b9c17496055298c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9a167c90d03a7e9ea6c662f43997c17
SHA19b241284e6d8c9dc978eaedd1cec362b5b38ac00
SHA2561c8d0516c0fa2cfb38fe16502c384c4ea47a08dc8281e05d77a64c2ff7972abd
SHA5121df4b206365eea8d919aa2e83423284ae7ce6243f27571b8e9171206a18f43bb9e8098d68ae45af2e4426d1f911f1f44038484f7cefbf335a01b01d5c837f8b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d4376d98bbfec6d3f886a6ba537930f
SHA1beeb6e3306803b60db2c16e09949af7567a445fc
SHA256a16caf83e50e4d0099ea1126e744e4b9084149e23cdfb08951952b4b312fd94f
SHA512df0bdf403d73daf62cb10560c5d24655fda07c86c6ad5b9b2f163fd13e6d0b98ae4a881aa278785a97457ea1ca7eba0d84c743154a30b3b23703fc21106975fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5b71c15f986f105500dac43a3ea8f5c
SHA143f0dba0a0da7d197472af87e234e1545faf70f5
SHA25668371cc8e70d9843923465af45d4edc8c31d699cc2fa94a65cce769f8f5c6a74
SHA512ceedf95c737b57862903601e0d53b1578afefc3627482062d6b8e56ea692b0c6ee7f83e313a510d651923b649b99315c9c8f0ce2dbd2df3e0a7555e590b1c6e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad0123e233223f25a25caa9ab329ab6b
SHA113961afe6bacfccc5d698b86eb1e081b0aedbefb
SHA25624bebec7892afaec59e0c74f01c75a438b45dd90caf921ab1a8007a91e67e7b2
SHA5127b9603ed2b5596db4fb7bb6ad1d38fe42f2d9e5284b8d9d9901ef263d6676304d70fb82884ba60892c1e38dfcf4b609d889f50049c30a0d292d5120ed09afc03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5508013fc8a4f568cba8f482d8e348f10
SHA187fd2e56c63d73e7e0e85f35177fd90a51ea18c0
SHA256b06ff814e293b7525949440fdea6604fa269b417d44242bc8b79a6c6cbe2ec0e
SHA512d73af792eb68d7232b3a98537d0655b2c5ed1eec8fa1f899b87db872aff8cfde570c177c48b33a702629f6be30a77e75a0969e858b198f224bf5a336f9dc9bf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c72776794d9bb23385dd972836566ab
SHA1a8077ac199fb4389e19ac09fc28a2533ff909dda
SHA25665ba79d71002d97b800cb78ce65dd95374083ed93d46b1388abb53a7b7abdc8b
SHA51207161ffeee24c688a7a456ad252c83c1fdef65c5df001b0e61fc75371331b33c760342a69a293ef505bafeb59ed5eae812782c04f2a2243e732d9e466859380a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b