Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 03:30
Static task
static1
Behavioral task
behavioral1
Sample
a537537d5c024f86c46e568c0fc9fb09_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a537537d5c024f86c46e568c0fc9fb09_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a537537d5c024f86c46e568c0fc9fb09_JaffaCakes118.html
-
Size
90KB
-
MD5
a537537d5c024f86c46e568c0fc9fb09
-
SHA1
2633eb39aa2551706f960717a0b91bb11a721c1c
-
SHA256
929d82f49aace9ef9c39ca2ff1648f41e0bce68ac701fa083f00c0bfc7aae904
-
SHA512
a9935928398fdc1cf33602a2f45da613132ebea972be5c251dfa71be61648983d30c58af65ad9e4f788ecc81383daf85133571ad517ba2e8fe61e31cf2a70302
-
SSDEEP
1536:gQZBCCOd80IxCMr92DJMYNoQ1JG2N+jTBmjvZ5IZ9m3gMM6N6e9JdztN3QR6rOtk:gk2m0Ix0Pd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430113690" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20d7570a1ff1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000053d8aaf19e6a88a47767237df1afea547ff9cd90f5864a496a523c478562159000000000e8000000002000020000000205d5d6c228df27065e0d0585b6e71808c8b3878d417c4f4fc9348cd9078a2b02000000058f049f708e8699923975409c5dca67c1b6b4a2b774ad847b78023e16abffe71400000005add9b440045ca4854426101a8fddea475e9e1db6939ec0d4eebe73d8f5d1ff3e2ff76d10212496028bf8b37479169ad129f3e0d0433e69ab62395d36f49a089 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{334AC7A1-5D12-11EF-9988-DE81EF03C4D2} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2536 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2536 iexplore.exe 2536 iexplore.exe 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2536 wrote to memory of 3056 2536 iexplore.exe 30 PID 2536 wrote to memory of 3056 2536 iexplore.exe 30 PID 2536 wrote to memory of 3056 2536 iexplore.exe 30 PID 2536 wrote to memory of 3056 2536 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a537537d5c024f86c46e568c0fc9fb09_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2536 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cf44131732fd3ef8336623c909c19c6
SHA198483b232fb8776797878036b2b0a6a43491ca58
SHA2561708f2d29ed40bbf65cf10d5210f5636df5bea691dc0f38161aaa8aca4b90ea3
SHA512d63e454c7a2b2ff81e82a1270d34d00ff0d292b5689b3b730dc2d5888ce9e73414d85ec3dce81f085607af516a31f2392eb0927d6d8443afd1c20f5b18ccad11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eabc8665e48381a17654f2068f215a16
SHA14b47ec23ba00079502fb207e3a29b2211233663e
SHA256ccbbe478ecd708cc53a642bf79dc25f7450b29cf500b5232e92e49dda35b069d
SHA51274e1b0974767fbff88ef24d7a482e84173295e747f0ed06ea1c5792d1dcab9fb7499288c5e1da9ebdd45e3ff448a513eade61f6fcff412e253adbc4bf4ac3721
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581491d2bf539b3d610db92c5e915dc61
SHA15ab504f07d4595015714cde73e2c34ba9f2c06e2
SHA256bcf6517c39796074745c7dab9f000c3b1c551439e2d2de15c5aa9daf72051a00
SHA5124a73547626b521696df2981e1fe60c0319fd6c901a9bc56cf0697f96b4b9e034d2e529eec2aa43b968e5c244d0d6ba0258209f3654259f074ef1adb0a839ed2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db28b9835a2d55a3d77b973230085c35
SHA1e937498371ac0aed553ad18d54194db51ec14654
SHA256fe78c799d552b4c371ab9eaab784b9b8538aea7d7952a9075b920f41138a493c
SHA5127acc4079a607068a98fac7913f3bfc59ef837713f6fc920ce044fe2f5f8943beb20b8306e6553a07f81f48ac801bae1b82fd5bbdca3b0a7b9a5c2a838a175b17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7c6d16935763475755782d7d91c926e
SHA1385405ff41b7e0bbaff61f354025303e8c27ddc0
SHA25678c23114cfc13fcd9e62a0177c63593aa724824adca6897a57616aef343806f8
SHA512fa2b6e693bf6cff57ea372fe2a1198ed8299cc225c439432982f95e7a92f432e95d4c38f1958bf9bdca4d5833aab9d5e1dfdb3a90c6b5f30b5528262a5502b3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bb4fcd432dac1533d2c0153342e154e
SHA14a5c3af2ef96ebd88f0829e2f7135c0e9c7a736e
SHA25602c69009f12af6bb6f46a803ff8639eebea442bb336780a9cfa6746afa8d1105
SHA5128ae60764160756bf73e53ec787286128c43a69322bf07997f0c536bab72de6a2413979b597f764a5c4d2d05d717ed111234ea995dc2255cc9c4886e573c19d94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5304598dcc90c87313cd8831d8de9f8ef
SHA17e756eef4f28bbe3457a6f30692a6e519e28f82a
SHA256364abf3d2ab197ed5f4a5a02a72064b83e0a0dca619bde70fb71da36535614cd
SHA5123321952d887e0c8536c942c95182a01231f5fc86bc123d55efbf2b42bc92ac73a8e0267dc4cc76224bbfd45556ec020aaed6218c8be6164181c91f911eb498f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fb8d1421582567b4a67805b21d3fe57
SHA167f55c4f9e848e33e842131b437a716587fccaa7
SHA256c7ec67953aca5341bdb4c364fc5c13dcf51199e81fc02370a8139eb1c82d3ea4
SHA512a01e3fcb4204eea1d51f1a7ab95b6a3cefc25199abdc5838df8aba3b02d3a3e6b57cd0b5c54bf05f6f6f23e7e96c5ea064341c16e6af3bb4c532afa899d3bf1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5345b49f624433fa8c402368e7a25610b
SHA1bebd3dc7a2c02ee75710500cc82bbd84529882c0
SHA2567e4cbef4d1a9b137d76329d94397e69143f7d72aca63eb44c7d1066b39d8a571
SHA512ff0fd54555cea5a83d8aeacc56401cdd05b2333189284099a475fd4218e9d07614773b84037fb7fefa980f178562c30ab8fcf97b89a083a4199292e4929e968f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567d3370174feccc16bf33b343dc28c39
SHA10f5318f446152eada48876805fe980c133b3a56c
SHA2569b9329ebd13a1a4c15a1640e95c7b235614090533641863b1f646c9ce685cf15
SHA5128bf41cd135eca85242e94255d35e2601129484c368468328feac47ce7243baab316604f430efbba89a1a651d5ba13aa24e7390b9cb8ac5ac52f790b7c88dd1e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513895cbe43c2eccd28fa5ba3754d6985
SHA13a34f9584c6f1db1d254cf8f4569b4af0055ba36
SHA256c7fb95a583b1fca3cfe307ccef05e3fcbff9f1f1ba2ede183918615e93746bbb
SHA512ab594cae704a43096d537fcbc9b4aa3cee76cc22d001903c1ffa5bd8414d59a75f3beb955d54e1946c494e79fef35d28f5ec0ffdaf797a5371ebeff7391835c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abea96532a98fb6e68c9fccc7a154b6f
SHA1a51bd2940e5534a1ee33b6c7bbdf0100491b7c40
SHA2562eb67c19a4cd2157743642d5d98a97b06553c566225825dc10d0f7f28a94d671
SHA512670b20f0f376a15c5668671c1c5fe619ce396604ce82576d2fec9673163b836e871435445ae32a07d104c0dfe319add08f85a7e09cd6ab7e9afd03ab57b92662
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a03b47718ccf681bcd5f594981317732
SHA1ccc1040817bba5c9703ab4ada60c66c3a22023ec
SHA2563c62f603fdd50cbe915870cd1a170257c3117823342a859c86641cadb96561bc
SHA512ac638100f46a0bd2d1c4a04ea203b4e08352c63f838bd0a15dcceeb9b2141af6ee2c983f9365d8eb87760fdc7f7e0ac1894f58c27207026d589e6206216a1907
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cabbeb50e90230ea735d7370dc35103e
SHA183235b66bb71606177db2c5a497569083cddd1e9
SHA256ed837645f1518266ad61ae264c5b80f607692f660a3b775ac6532b877c9a6707
SHA512153bcbc5bc98294517d0708fedcd88d8d7d7f3c130783077e64ac0b9d749079fd999f1b1a16940bf828af80d6f83716db02871ea1b724e68920ea79615fee441
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f39f96f0aacf1b3e47e058897dcf1a9
SHA1bd709ae16cd6678750b4fd4ac7ace4747fdf4abd
SHA256f5fe4140a0cef1a45220eda260edd709a7efd1278b162ea865c2e3096225c68a
SHA5129f24f5931df3396dcb2b9d895b9412a08892e620dd313e4aa0707c348f4250fbb4f7807f5f87be57b3a034f0776dba44c98105d4ee2e084e8f1ce827de5641b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fb60fb98d6352950d017ef8882478a7
SHA13b61f865e49ae1c6cd8e2f0ed7056c0725b91f39
SHA256bec1b6a73cb0552e1815d014ebf84dc093e28f6e59974eff605eff879cda5c26
SHA512334378dbcd7fdabff45713dbe6b06ed5015342e35257d1b073be182bbc6e30e7bd315189daa1ab94045be0697f2382949ea54cf9ed4c9eb46e37e46f29d8470d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5835c8bad9e491093e825a0fa7ff5efa4
SHA1c86b88d1089aa0512d112adf365ed9c0b4925c39
SHA2566824f3382d27dc9b693d493cafec364dc6337a4b62e991af21a11bda96e830c0
SHA512938fd553666a3ae7b401d20e51a82ae151eb2fdc0b8115ba9f6c7c644867f91014c47823620ff37d33f5e9e03ad10bcfa57db76b033df75d289f1e181732757c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f88580ca2a1e27d73fe5ced4b64190d2
SHA1c54f291009e6061320d2db445171e567c41c39ed
SHA2565f96d5162e9cff1a1109744005145f07c50daeb404d9f6e42ba1087ce6f09297
SHA512123054944a862a21586585a19ff2c0c27b24807e44310622078b9130224e64ed16b18ec30891f74caabfdab6471a9692d0f0560c9322c3c4f4b348ce78db3a1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bd21b4734b405eb1037ed8c64dc6ab5
SHA1265ea3c7d312024fb189c2699dcec601a44062c6
SHA256a8f77b5e2adea782060b6ed10c134c8d56b385daa7f62043987d81b9c6ef22ff
SHA5125e22e9695000a013c87447ee39aac527169f4e670a341b2db5d775c7c3c922e67475f6192e72f953d25dd95ca093a4571f00a014565ee72ba1f237d4dec170c1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b