Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 06:20
Static task
static1
Behavioral task
behavioral1
Sample
a5b52240606d4b358fd54dcb51210984_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a5b52240606d4b358fd54dcb51210984_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a5b52240606d4b358fd54dcb51210984_JaffaCakes118.html
-
Size
6KB
-
MD5
a5b52240606d4b358fd54dcb51210984
-
SHA1
79ec8f0ae855beacc9c84e830067acc5b750588e
-
SHA256
15c0f1e5c7ed23e1599414c460b191e7db18d3d02d70b8771adb8c46798de9db
-
SHA512
7ba5b0f39c3f3160e4017d4209441d281e25fd781b57925b6b9f8e9c49e272db4e4a4c8d1890d23ee0ddd46f98fdb58dd8f3641596e839091cc7eba5646a703c
-
SSDEEP
96:XAZAUrjbaQVw3QEH6tP/K23ivPwBAGrDUu7Gj+Rlhk7roInPTL5fwnYrF:X8JPbaQO3haB/K2qWfl//kxPvpwnYB
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000005b830dc810fa119652e61770942d955b216c86dc7a56324295e412d530cb1dd7000000000e800000000200002000000049f635dff5836e9840e2edc391fcf978e4fa8865b6e97501dfdc709c22a9b55d20000000ed8a4eaba15a78ee0102d46e81a636b1f9102c24361c7849bd0f59577b7f319340000000359073c836784ccba629617cafb9679a6cac6d384b69319c3c46170b932527446f02c56915faa2fb6959ca5cef803009cfbe8d6ad9d8f55af6114fc7a02bec0c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430123895" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7070d8ce36f1da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F5EB9CA1-5D29-11EF-A7C8-6EB28AAB65BF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1952 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1952 iexplore.exe 1952 iexplore.exe 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2104 1952 iexplore.exe 30 PID 1952 wrote to memory of 2104 1952 iexplore.exe 30 PID 1952 wrote to memory of 2104 1952 iexplore.exe 30 PID 1952 wrote to memory of 2104 1952 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a5b52240606d4b358fd54dcb51210984_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52982fdec89616f4d8b572a6e92351113
SHA19e7dc68a2604db5f1a0b340b02db19ba8c5cd915
SHA256ae6e537f9a6a0f7fdcb1e9dc6878495dd0cdd0a9ca8a64d542cf13cfdd275293
SHA51299bb9eddeb1328ceb6bb278a0aed7b4b84d567a126c4b699e69e85ae470e4214edbbaaf03168f6af0c8d72742f9ca10a846e4d67bf973c696ca13321f96ffdeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5080fe814ad66642ca9c57d280d50c22b
SHA1ebb8decc69e178d1c24963ac74c8ffbab9bd7ec7
SHA25650643662ae00e613fe9e8913e580c8705f863b5d4a44c7ac9b000e18ce97ff18
SHA512808feb51fe61e172ab7231389ba98582027512420a49ef65f14ca1fa864fe354a6627f4518f32599de3a86d999163316eaa12027ab5a6e2aab8d5c1e8aedfa38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dbb8ecf09311fba558a6b3c93f3c476
SHA1eec0ce2847b991b8160690a4d52e0209a5be4506
SHA256519b8c35507fb69b4d78fa85ada9ff147ad3bae79a0ff9fab06aa31c2e7588c3
SHA5121aaa5bd1cf4d552318f34ef723f7c518ac6bd179198396894c0393b59fd562e5b05dd69ab74280efe0cac41f29a674123bf9c31e8128bdb20fa04aa81db72431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e2f8a506fb64d34e341a56281cf4515
SHA1059129b7b7abefb6d5052245b3b906cee8eae36d
SHA2567163515f9799ab3b092839cb91471ff0ed5cbc0b24fd744ee7dba84861cbb185
SHA5127840438bf6f9c25c8a7fb665d137357001fe71b3d0def60291d9b8bfbe671ab5f1571afb12772e3e4db574c4a9e6391a0d4a712da14c676ec17be96b6ceaa82c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5887bb218f6fcc59546d7457384af8bf3
SHA1efbe41523ff9298754c9cfe9719ad860b76067cc
SHA25651ad0856b9921d6daae762fd918f2f8d775453cd62b23e3f02914261238e2e57
SHA51276dbf084c9625a15d33ecd236e2e471ca92f342336de6f3e4ae402a05773518473b0119b0ef7791f7fd554fff4bd910dfc3fc20534d38d6eeb35414a675cd07c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c41638677d9295a3f76f82cba6a963e
SHA1f235797ce7f10b22368ec35bb93bdc3b99f8408a
SHA25635ed49710981d3b557304461b522edea5c09791db1ac2dc96199ce49f455e505
SHA51202608311f29e1d6c2eaaa3b4480f9c9900b5d2613e620e958b91cdca88ece27a6b4157b051c8c38b27b8fddbb32f170c8cc017eed37f4bebef1f5d51a488ab7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f02157bb33ba15f6bb558dbd48c0fb8c
SHA1b95e5feb1049d030200f52ecb4f63a0539522376
SHA25662f1777f0a8275b0e54ec76b71652c819569f266ff75ccad97bac5a1a4d85da6
SHA5126eec7df30ca455c1848c9df888df7e2a99a2d4e86b441ba84ecc62507d6e4ccb131f57a3931a20eb6613d733df6c3b1a6fb92fc9b624fbc57dce17f9872b7ce9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef550da94124105cef66bf1e212dd824
SHA17c80cd5b790a6212a10c67ce8b215fe70d1f6986
SHA256bc222ac55e0f49697f6fba0ed6befb55fb39407cebfef4384ebd508ec7f23ba1
SHA5129f68675dc1e48cb9e6d11f86f2c9cea0efec4e60d985dc949d1643fd1a8aa40b2ff7543cd084e9a36b2605a3b44b963b50517659b172531920b4412487420afb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e85894f54b20669f88a4008bfb51fa55
SHA15580c3c776d95b7e7889dc90cfca11dbfe1551bd
SHA256e35a40fb27b834b337975691933a1ae3bfd735a9e30905e4a07f739dc19e4e8b
SHA51291d7db620f6f09441494e24def510ca08eb021801a68ff9c1e9b31fa5d102e73d8b61a0e333ba3b7304e53ccdec3673075e16cb0ec9a44e5073102d39e6514ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bb71967bcba9e87c46e895cbb460ca0
SHA1fa7bf520d142ef6da7906d453441e28bd1368b75
SHA256d95268b4ab600f071359054c2d6d857dc72e1dd22459d2c76c704328bcfc60f0
SHA5129d85de5e885a6743c660c3af1ef0b8d67f4f6825374279adf871a77894df787f4f20acccd79fbc599f04db395d01ee7d815426800d7a21e76e15c25b454a7cf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dd3ce6a4ab24ba4a5a8518f5335d859
SHA14c6788e5af27334389808f358ef37bdc583f0363
SHA2560a77fbc268b6e63998cd4cde0a181c86f30915beb766664b152686dd1ad01a62
SHA51224f7413c30f56be1fe5b72c69e06acc05cb1e001e1084c1cdd7493d9321c79a7ad631e22431af4ed123f395595d53f08ed4c64ea0a8c2f57d1890f261964e113
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50647b90dbf154101240cbfd7004b4b89
SHA1c192bde0be80429f0296998aac28d17047daa3cc
SHA256a3bec53a73bc87d0a93a1f6e68c6e34b5cf53536fa4f66eec6960a2074658f12
SHA512cbf46d4f256878601810a98ad25177a67e79ee3ecd4d366d604aa1110dde18568fe8b09db6679d65827fb034da1bdf6eb76321b6622731410dcd02c131fb45cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a86175a49cd0d5f0bec5099511226588
SHA19fd53cf7abdd1a247ce570d8bb3c11f958bbfdbf
SHA256b2accc754e7539e8c2592c3f93df75f52f1b7dadce92bb69e9878c37c3c59342
SHA51291ab9ddd156aaa3221a89b8d6f8aad7fb525cbac03ed05ebb605474d396bf2ba78bb80943f62ebbd81d7f5412c3689cd79109817bf1d7eedb0fc023833b41dbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59483d6b377e1554271f8b04f9bd15b2d
SHA1b22b572ca6f22e762938feda7da5346e705a7ee9
SHA256bb2b7ac5783513052c77ce0b02dbed642f3fa89ebd9687cd25f87292a5b1d6cc
SHA512f7e9985f2494c5461f8881e10135b9a90129bf659fd4a4a7f0d23392c74175e9a5c37d81589f703129bea4506a61315896e8da0caf38f0982184e5714ffd39af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a65893b32a3f5bd38ddf1bdb3aaf12a
SHA10066fbdc970ebee81b71e9de12e1bf365149f0c6
SHA256ae1afe27cbdabbd68654fcf58fd63a6db30094887f48bea6ad3c8e8e32f1f59d
SHA512bd2044e0475a2ea69c7499fb0c1d651b4273770474155d2511ddc83758b5ac6767f3444188821e484a83c48b0e50a0460ab270ac670f1b3d828e5f7fc005bdff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5835a56df36f3f523c684fb1425ceac31
SHA188fc8897c8f2e633b3c35cb67f455c261fa2c79d
SHA2567cca89f9bf46139b6cadf9372e4319ed1e59a0a898931bb9c42ae4bb5ba6bd5f
SHA512539f653a0005639f767fb71a3929dbf79a07393f406643d3c7aa05bdb030e828f24f5674de0a9b37d4263d44faffe8f5f0bb362e92e3ddb201bffdb54e82d2f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca8c4d72ab8ee107caa5e445d2538c33
SHA126f66cbe9030fefbb063bf0d7ab2fae9d7231efe
SHA256d302cb8383ff7522c54c908e56a7db236a4043ab9edc48a2fc8db2a18a67bb7b
SHA512a54f283f8046c5d50454bc1db0ec9f57c453acd70a2b43d391cb2d35bf7d08728647ed8bf6fd9c843d2d68f58d94a16ac3e17c860059b8a9f092e910750a894f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f0a896bbac3ace6e20c800c05283f20
SHA130e4710506171f3b8ecbaaa02a02c27d2753a404
SHA256e9c275a1ae5799a58e403facb3954dd466eb0b30a502cf06502053eee7e50c11
SHA512f448067f399d7a4e4c41a9ee20d728be2b2b0a31c1de0526c9bbb6466bcd15182d115c34916f133af5a631cb9fec1263ebbe1780452f3a5135135d45f5d8bffe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb1696cb3cbb6a415b1d7f55e7558171
SHA19e29478b63212f24b02d88e9b46393df25f7b95d
SHA25692e7eab040ca0a8eb5cdb5e8cd14a0630210549880d2bc21b2164488c20e52c1
SHA512c9f357f0709329a3cb9c0fe028cc92ef9144ae6f72290b561c0f51f2a01c040953f2e56397e886d43da860049a29eccd514afed050ef7370d75c2867b1b54f14
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b