Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 19:22
Static task
static1
Behavioral task
behavioral1
Sample
a3cf6f32e55198ba341b4faf0a7c4204_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a3cf6f32e55198ba341b4faf0a7c4204_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a3cf6f32e55198ba341b4faf0a7c4204_JaffaCakes118.html
-
Size
5KB
-
MD5
a3cf6f32e55198ba341b4faf0a7c4204
-
SHA1
0ba5de0114a7dffc994794f702374e42f45b460f
-
SHA256
e45dae982b32992459c62312adc8eb11db363dbb9f03945d5b05ee04049b6fab
-
SHA512
e7cf4f973b236a8c794528ece62515f9954b25a79f4c9e527e0f2c650a4da5a0cb71341699479bbbe10cd79fd056e4c11b42f2933f6c0ed51f0963d93ca4c8f9
-
SSDEEP
96:uinS3uxs1cOnx8DSSW0nqjDUF1OEWhsIbsT6c3jGGgFGdIk6GI2T4ZG4J3mXFl:ln8uqnGDSSW0nqjDUF1OEWh5SJzGGgFO
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430084397" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd000000000200000000001066000000010000200000003a50556b711d62e6edb621881ea45ac501882373c2c45f08418d9675c4e40226000000000e800000000200002000000056ab619d18fc5d5fb8a59669c81dea399fcb8608d305ecc64c9fa0620e53627920000000441cbba44bfa782a0e9025b5b457094743b358f033071dfd11b34fc641ea2e8f40000000dbd215d2b13deacf52b8a6b5b8971051df33215602eeabdbdc4747ccc3a7700229dbbdc6cdc1d2afb04cbddcef08bdbe5de64184794ec7a0dc3642c5bf3e6e28 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FFE8C271-5CCD-11EF-90E9-F64010A3169C} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50f342efdaf0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2632 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2632 iexplore.exe 2632 iexplore.exe 2464 IEXPLORE.EXE 2464 IEXPLORE.EXE 2464 IEXPLORE.EXE 2464 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2632 wrote to memory of 2464 2632 iexplore.exe 31 PID 2632 wrote to memory of 2464 2632 iexplore.exe 31 PID 2632 wrote to memory of 2464 2632 iexplore.exe 31 PID 2632 wrote to memory of 2464 2632 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a3cf6f32e55198ba341b4faf0a7c4204_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2632 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c6ba09e887160b46bddb6d1a7acaa83
SHA15130377776ab20e9727276411840c98b28e12e00
SHA256d26e5bf1245a6fb8f87641d884e0247510b045ba8b667e5b13bdf0651f4de7cc
SHA5120d6add8b20f81f2c0c5b9889f3dd411b0baa8c889b6eb4477c64a845a4ba02509a3a76a0d15717db2d302190de71382f03f27b6d8db318c9bd576625e9896e11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f87372cc3beedb2985ebeedcec5e3091
SHA19cda2c5559fed3ede873b468433ec9d01bd34f02
SHA2564dcf04aa1615abe3c53d343ed1f942d8cb3f7e311ffbfbf84b16426639edb6da
SHA512ec7cff58ae16adb3ac8d08cdb5b7ef2517c5fb284aaf6f71af679582f7fde0d5cf90350ab2e9ae0cd69f173005955c0a3f5f1e1cf53cb022f0226c861a93c734
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5272e778f87380c1c4442766c1df2003a
SHA14ec182415d86eb2b1896f8380b1e266c42312e9a
SHA256c0570aabff4254596115c5d7c5b4c36f4604e2198fdf69e8a1d6eb0dc2cde65c
SHA51230093e3ee7e051ad207e42e9e0e355affe5d6e2fa07c605cd801a0169283c5b7da98c962b447a902b7cd73148105877cd73c8d22deddd4be36d499bca3ae6a7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5060523e5a9df0a9d9ee58b9b41da3136
SHA1266c603c97dfe6886727ade75b6914206fdd7f9e
SHA256befed5bee368af713baa6a5d3a6758d06ccf075b78d3f781291e3e6281ddefd1
SHA5121e42bcba8a64b46538447226aab14b6594316713fd8bc5648eb28ce2e278486881be7f84b596a1b7f0e3d7be5fba8e3375fd111f3130a44a584362df8692a2e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f31b04a784a4bc3ddea125c55b64aae2
SHA116597ddae9316c33f9c8e70cbaacdd6a05e159ba
SHA2567c750d8f8b6ffac381b6e910783d8645a4d777609a6d5ab4103be20095e19ae2
SHA512dd76cd7b9508e0aaf6dc689d6aac96217031edee83a653bbbb76d930b319c4a33bc18a0a4582dd9a6bbfc506a977653e134540cbddc5d0c67255389ceaf9cd2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba48fd8a64fc22d989eb213b69ea937a
SHA174c473720d1f3fd13740df25345673eb035a6a2a
SHA25685d9b5ec674ef813b0f3c4dac91c3d8713af3dd2f4ca3b9cf25ec3a56e0978c3
SHA512d0b6432a55dba8078c13b9e24de89b83664d7bdffaf307d8f0ca5091917ebb54008ca52cacb003c1997f67f95544b94b077bca185a07f6391364488e9af005f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd6b011bdc5a48a8203cccfc844355be
SHA14ef84cc4e3e5ad9ccf4b1523168d4c8928e15f8a
SHA256d90f775a1555f1baa501dcc46dec81ee05eb4e418d9c2b4316579c5fce56ae22
SHA512ca36080cfbf35529bf7c1b3ccea19ef3069f3828fb1bd95357e12e87e88e797eb0c59b16beccfe703b8502a84754bf287a0df087a5f2d9a2ace9214746756b3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fb860437f1247b4b9cfb1d101dc0868
SHA15d0989ffd3d717d73ee35c948fd747f1266a6d8c
SHA256baa5d8a15db1642809e967cad65153990e6ff845611de777bc201b51ed307bd0
SHA51283b96ab6578318c54f2ddb390f885765cf1dc7f0270117c332bdd0b460cdeac335b341bb014a0dff8e61f693d32fb947f00d4aecd46fb912ef5aecbfd27bbf39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5372c371a4cecd9d1f424a0d282f3e176
SHA1aecfbba67a4263e5dc6be72b4183caa5595ccc7e
SHA2568ef6e19493a8823bc6885f6b9b1871bad9ce989d3bc880f689f6086b7a0fabc9
SHA512cf2877b1337e724eb9759f793b535b8c3db025750d10f0eb2a90257efc60c9b371845bbb8f7672115926aba4904b574e297c81880ac684e29f4422b9e311b62d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545d24c386330d8a198ffb217ae40a74e
SHA1eb8b4febe83e22e98513abca6de409f335641942
SHA2565942e406a23508c8ac1a7a0ac1bdbfa359e0c5fb611db3e189a150ab036c700c
SHA512ede95ed7d6840e4f9f1b6127cc875767ec5b7189cc0b9c13ec5bfbe98cd893af270bc1360bbab4ff200577ba50d7220e8d142821b19984dd5347176a31a7286c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57871ec9cc641a4f9b757983b50c39781
SHA180bd57f328e5773a310a2fbf166ca838cd56a247
SHA2562ece51873a0043d8aae55d5b7f8600eb3f2ccf31fdf6cff2b64a935076f1cb84
SHA512c5a08efd402b9944c00ecc99527a5d6d24ce2cc505a3aa209d6add459a1a2b61f927e022148f7d68723c0ad55957b8440091890b25c1a235f2cf2af292acbbc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5095b9655e5c84ef53743edc2be0e77f6
SHA1e266a07ddefd71b50d8044159bcc48aebafdd611
SHA256deb19a3bab89bdb710b2de082b34c4268d05578126be95c9d7d69d7e5e970028
SHA51246375857aac47d4ab5be58871d1e7d61820c422da6a4e31771c85c56950556833cddcb888d8823ef3053b23003c9dc82ab55b0d4863f9ad93888216c7bf04ac9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0db984f0b3dbb0b5a3f53bb730d9a64
SHA14803805dd9380c636d9b9611dfec032a16b69f05
SHA2566e0372dff4462cfbf250190c73838b9e8d2484c22c601fe4bfea7c0d30f9096c
SHA5129be9e8a6efc4aa34479f1fc09d26223ef079195f7118273196427e72d1e92c10d82ab94d316c834c009e24638d7ec8220e16b92af9cb839864e46cbf8b9f762f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e3a5b97f5b11d63dab52d5c52184469
SHA190c5c4b011cc48c88c93cc769fb5133eb0d5e00e
SHA25608333e1ba8f9286be628d5e5aa2b2e8f0dc7dc0c8a109c47af097d9e3e39f153
SHA51205bbfae653b24c97edb59f716f9dbe302ed89c570414c392358835bf6ca24fb46f037e7071e0231525a8040ca5352d47135dd3f451ea97d96eded08b159a0cbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f358ad4e96c1d6a45404151451a4de3
SHA15ed29440f6af79c76e4d043d1e7858b50db7a4eb
SHA256397a3c58babf893a1c44978859991eae8d071f4147d87d5cba2ff9a658231326
SHA5122b33acd78df91dde961f0f4f32fa47c75e5d1f119dfd1f0e96894c05a667295d48dbe53a31c4a77f31cedeccf9ce18fb124a0dc8562da34c4ea280f4a1325344
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500b4d5beb1a86036aa14b95b73bae34b
SHA142785416b3d7eabf87d2e3e784b29d1ec357f6b5
SHA2564c2f6ce0a64702cc920c2d335645254e2369238f5650ed13606718c1476e8f4b
SHA51240787428b2a3538b5ad6683969e47c794e47f3b8bca25967b535bc09a454af60cebdb41773ac1ff033f1fbeeece6a9b71126b01b652581616e3191d87f106e09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a56ac3e81f791b331ce406cac5c25d93
SHA19dbca834358ca523a439e2f77fc5bf3d72a8ffa8
SHA256b9a3aa2f8b05021c87ed07bcba2c5c950178caac8b26b6968b0d870af519a88b
SHA5120f177c4a769a06dea66cb89d61d59fd86d7db2ab885aebf69b9e0057da9056021025a85baa4441147f6264bd7786543ad1085956735ca0486419c898dd44de20
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b