Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 19:40
Static task
static1
Behavioral task
behavioral1
Sample
a3ded081deacfc81cc4171a5d5659e93_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a3ded081deacfc81cc4171a5d5659e93_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a3ded081deacfc81cc4171a5d5659e93_JaffaCakes118.html
-
Size
53KB
-
MD5
a3ded081deacfc81cc4171a5d5659e93
-
SHA1
c0d980e302779f75a5a99315005bb3fa73f4f5ea
-
SHA256
2e291b7d787a84743cd6ec55bcb72e83899fe12fdd794c98313f1726f54640da
-
SHA512
c88199b7d934d3033b8cf4d341c4374dfe3929623e568a719599ce4970511c20f27bb4af15344018d2827c010ab587c4921c85500d9b77a897a2347315e32cf5
-
SSDEEP
1536:CkgUiIakTqGivi+PyUyrunlYs63Nj+q5VyvR0w2AzTICbbOoJ/t9M/dNwIUTDmDu:CkgUiIakTqGivi+PyUyrunlYs63Nj+q4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000007c9f0ee29a761c60cb6e0e1da6f66dfe8f40ef45725d88ffa71b75f4814d3bd8000000000e80000000020000200000003319156f7a9c7278cc3926ce235832d168fb488cf94ee245e69f7fb8ef7b2a1820000000333abf0374a3cd4ca9b4f13ad6bad0373126eddc08f214400267707c6c29ff9340000000c862bb57ce80a92a5745f7d7440c42cf19cc228d8029e07cc34556e772e2d2c79e314a3bb950c12ca3014401ef75906bc25aab3aacf93f43549f08db38d82021 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{84308CF1-5CD0-11EF-8340-72D30ED4C808} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 800fd25cddf0da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430085479" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2308 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2308 iexplore.exe 2308 iexplore.exe 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2128 2308 iexplore.exe 31 PID 2308 wrote to memory of 2128 2308 iexplore.exe 31 PID 2308 wrote to memory of 2128 2308 iexplore.exe 31 PID 2308 wrote to memory of 2128 2308 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a3ded081deacfc81cc4171a5d5659e93_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2308 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b1d159ead2f7766e6afa2b7acf613aa
SHA18615e0d1813b5c82ea0fdc2962c46d18cc7e71da
SHA256bcb484e0f32bed985117e1c4f0f537adc0a2968409eb093c4ec89943278fe5d7
SHA512dbd3cd15102e04a8c9ea132b5e9a2784213b0b90743ea344d9618b711a6e1f40960406cfb76f8a4a5292949c1d554518a0ef684302cd58d98cac2c04ec1b5c38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522536e59f7a7302b8ba77a189fb7916f
SHA18c8bc1d873b2eb7c35ebb005a0b063c9d8b574d3
SHA256fd1f1701631eaac0430699e5260b0577cadb195e4140c20bb763062224bde852
SHA51223daa0aba1971dee1a914bbd93322022a00de6dce79e576974e7a541efb9a3e377c83b9cce48e54877762eb995b6102057098de92a2cc037dd0c71957f8e48ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528641c04780f3c3b2cdfc5179e18f883
SHA1e72296698879c43e64a83c09e42ff8846251a437
SHA25683bd6601e8eed97f7a21a80a5efeb6292aea7ba135ac343ae7c86e59cda9c011
SHA512546a4c62aea84b68cdbe603b6e4c3d2b5e17e2f6bd8dbb3db7a21e870916e1e129f1ee4a935fdc81c85d7529bcd332a4474a82a124096f9b1092b8b68b4cd39f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a5c01cfb9f2ffbcb243de270306e6cb
SHA19495821dfa4130846a5e7f6e006b467f407a156e
SHA25692ed94863675104be25d408b919410356ee09dcc28848fb3b33976aa6e148e45
SHA512d3211cdb2e4375c060916da0bc2752d2e873e962b3d362fe241aef9f03bdbf4d8d811be3f75b5575fa21395bd841d6b764141537288bdd5d99907670563c2ee7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54315ceb8aee4bf4a1fd3bd6c1d81ba1a
SHA1bacc31511c80845ba38f50b168ef06fa1262e8fb
SHA256f8164b53e6830770364377429a343f12b75039e11190cf4b77a783e85faacaff
SHA5127c33317a04469d4ce138b40f655c311b66df0a0aa621532d9d55512d7427d6a77fa870fd8693556d296b4b8fc351c99add0347a1bd4e19a09d29cc906e9a26c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5818a60132f5a305ece3815ecf6d2f6ee
SHA15bb7ff1d6489f59705dcf8e659500dbca18cfc99
SHA2560b90a6d14a4abcf2cf9473e4c0e94b2b8775fcbcadbced51dabda3dc93f3593d
SHA512d87d2f03a9a5cdb048c15b98115dba952a47dbda5842cb11a6259a8b7560b61c79ca0d11837311129536ab44c8f2d6094f2c015a2775ce62c3b25a418d13fcb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51aeb0c5e13a4abf8b955729ab9d874a3
SHA1ff7eaf99c86bf7ceff177537dcaa63857b155e3b
SHA256536421aba82c5568dcfbe741fa12832dcdde3a25232cfe91df1a93e16011ce9a
SHA5122a0130de0da7239251bd9b3c09d2139833cbae92442a0a3b86c6a47ad04dafdc057cd61cd81240f6e48e86c72e9100c18f99827a8f75d96669a97d4c339b99b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb8e94539b215002778198057678138d
SHA1f5818a64305485cb410f273da621b4607155b29b
SHA2564beb73f49e8d21b568709cca26c083282737fc28969a386f9e7e6a14ac7e1135
SHA51219343ae7f1568c621376b0a76bf87cffa21babb92d23978224ce52aa950ab8810f9f835f10f5c75b6fe53f63e3b1cd28ebccfd9e45043d2bc038ae7f2a353011
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afe5434ef877e5091af7d8d9eadbb704
SHA1d2717d48b6b0685ec2ac086b1573946e0918f708
SHA256e51a32757cf51972a33057fa9d6df81343e5b49cd6bc4a6d88420121c2875cd1
SHA512ef9ddd368aee5126775fc8a8c49133405cac35e3cc639041fd01ae9c0588801181895e9c0a837accf4ce3233b25f79fd452e890ba4f70c3a9f1cb136514698be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c7d051fa129a6d7a60ef15511c62fbf
SHA170520f763c8f3197c08251491ee633349e3675dd
SHA256ef053cfc3fd5476827bfb3839f258798647104fa70190b189be53745ceae8d5a
SHA51233a6a2f23d23127f549391c57a67f2962d38ad07ba044d520bd585fc5f0f3aa802eaa4da53e724fb0b0ff704cb58ed0be7dc68d4754f90ad59a97c8fa9c8f4d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2806989cdd90f125a884c06ee6f43e2
SHA1de4eeb5c3cac846bd9dd33b24a32b44cac92cfb2
SHA2568a648846242e053cc04c30ef7e3432932dea93f97fbc4fa17036a54a91075d8a
SHA51286fac52813ddc459504e37176e25d36319181233360a42bc4f70796a5f371ae503047a7c82a502e1116761aed82549df73936bd9fd781e808b044bbb6cadc89b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5991bb7881160a3c3412b6927d0a2f144
SHA100554f7db0693a51024ebf2ea885ed10b3045a6b
SHA256b3e459eae9a8e4060f1c75f4978a76a1e46a7e4748860fb83dd1cd075739ecce
SHA5121ad628f14309f54b0178d16d965f7323867c54dc277f09cd751b7e61c0b766aae477930576aabf5ab9f6dc4fc3aaa3ee963eb00b09e70abd94fbe31eed7853d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bf2ff37dc0854b29e466e6dd2ffc1f6
SHA1acb98b9eaea6d7e36ac5a0616aca0e4492bd7312
SHA2567075f2749787ed6250769698885c0f5ab36be549059b038a0ddefa3bf186d78b
SHA5121de02be92158cbf5bc6c39f6c907b1acd7664ba8dea8370dd3d3cad041502360e91c3ba039d2921d7ed958b7322ce05021684bd39e5bb8bf08adf876b61ebf69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5885007da8ea84870523d0775a2a36f94
SHA1a0dc9d4cc3490a5a0816fc4b70818867791a5d9d
SHA2568c969f95c707c2e288abb00ef0b87ea0ead6e59941992a31d9aba5244f953aa6
SHA512e88d8be78d5aaa00edf388a5ea40d6d1fdfe523f3efeb2e021ed8df27fcf0ffb6aed53e5b8ee236389c014423660bc5580c18f18438c2a402f7bd3d813fb784f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ec052373c3ca13651cf80c65ddeca03
SHA15e4a046f91981ea97a96977046136e0d9bd0171b
SHA256f08e32c35508e15b609dc4f947cf98ed150a174835cad0d5075e4b7e015d9997
SHA5126a21b6c20b3f8288cd4960eb94169c100686ef76424e55959fbe6f0e1bb3ea3780296004de52f0d406ca006499f979f6eae0dbb93f608b839d4fae7d96f0ccea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a56a81d1a9f952f722a27f66fa847711
SHA12bc1d392c82a3f4714ec9d40eea028986d19605f
SHA256fb79370d74be0aa7a63541b2a7931893f3cf60153185b59e24a1f34a748b1bbd
SHA512add37f87b62b3fb4141fc04c64b910be72d5b66502a5233ba8dcc7bcdbe2490325dc51d2fee7d28333a2b00dd7186f3e967eb4f3d8afc08a076db56bb60099f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef38f6643295b8c279906bdae276cb6c
SHA1ac779e40e031c8d87df20a835fbbf6894184abf3
SHA25607cc11e1ea759bdebf459ebd4a02020c8f8392a5faa73434fbb125c8dd685e9b
SHA512ef973b8f37642240b8a9323b3e169d0e288a8d89e4da635616f214108d93033ea07c3fe61dd06491c0242dbac0c1c4f7517e42797ad5f160fcebf58de15ca3d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f95ac695a062037001369affb2897134
SHA1c909932cac2b042baffbd18770f130f539fc6028
SHA25668bd46b0c89f83d5d1d379713f068604a86943427a49d89f94814bae7efec80e
SHA5121b5e7cf3c864efee2f4fb60ec4eee12410fff46b38249f7f5d895e36738f5dbcf7a26d6eb6412fda5685d8ed7de5c71508bb952128bc01b60a0004277eb76aed
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WNZH54VQ\filter[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b