Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 06:53
Static task
static1
Behavioral task
behavioral1
Sample
a5cc3b8f0e70bdf0cd54067975afa894_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a5cc3b8f0e70bdf0cd54067975afa894_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a5cc3b8f0e70bdf0cd54067975afa894_JaffaCakes118.html
-
Size
53KB
-
MD5
a5cc3b8f0e70bdf0cd54067975afa894
-
SHA1
d7f5e2b9ab29d1a573225ca3371898e702b234e9
-
SHA256
1d995279bd59a92886a80d5c794c893a95bdd8a51b6d777372a687d8ecbb45af
-
SHA512
841bf61a785ac3f766bc277f96021c8abac78ff3960090ae63db30d265d23c33a27943828eee084d8b625fb6d0688118e465eddd74794318ef8de51c92672ac0
-
SSDEEP
1536:CkgUiIakTqGivi+PyU2runlYf63Nj+q5VyvR0w2AzTICbbOo4/t9M/dNwIUTDmDc:CkgUiIakTqGivi+PyU2runlYf63Nj+qx
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf71000000000200000000001066000000010000200000002df7b188adf431cb34a8345f711e7231d63db0c3ef5bda4e980b39c78c51523a000000000e8000000002000020000000bf7363e29cdbac66c823ce72d70acc07440e48cf28dc3d8f75e654818ad8fe3320000000a25caf129cd551d1e7e6d0992a76d03f576ce45821a7341719290f9965153ebc400000006cb7c00b724a962c1f04a77e7a379be014b7e40b68341cbd1082b5b24543c86454e06c1da71190d35e42621c5176caae0ae80d4c626946734ccf82d8c43f2352 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{84FEBAE1-5D2E-11EF-BDB6-FE3EAF6E2A14} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430125853" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 507a035b3bf1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2996 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2996 iexplore.exe 2996 iexplore.exe 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2996 wrote to memory of 3044 2996 iexplore.exe 30 PID 2996 wrote to memory of 3044 2996 iexplore.exe 30 PID 2996 wrote to memory of 3044 2996 iexplore.exe 30 PID 2996 wrote to memory of 3044 2996 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a5cc3b8f0e70bdf0cd54067975afa894_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2996 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f285eb7e0a227b0048d67a00813d811
SHA12ae0a216a65104653f2a2481303f811e1e5f6347
SHA256b9016d759fd2d0b8397f5d1126aa278aa3742896034ed7d6f8d34859a63d8816
SHA5122bdb1dc301795573ad39b2b653e1ebb6ad46e0622e21db58b343daf92ac07e93067d18346529d16d01094d2b0dc24aee5b985c936ebe7d915e2e89c00290037a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577560c8ad2e58b58a991747ae7ddded0
SHA1c6aff75c712afbf5331b68af152ab31ce981d1a3
SHA256f70dff34d911629b320e629890e2f7f9a1f5d05a0bbd669e8cdf84bd0487c599
SHA512a0752a92ccb65cab6e27400158421fad44224b74e989d495d82cdd57ec53792d1ebb91bb17a9b509af9b44367e0fdbac40e5f05838b23e56dc9090dc9474d352
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550a19eb5ca863a6aa9f8b2e332e4f0a2
SHA1d5ec678ca2c3def291a24a2d0a1a455b220ee00a
SHA256166c35a042e55dae9cf123d33bc877db484ccc100dd7f8a6a83e5c8de690706c
SHA51213f7e8b8d7c7ee8f4be8703649154f104ce621d62c10142415cac5e8f9342b47efe84fd63f5e68509c2f168b9e180e6db274a2d9d9e26b5a6afbf28b2a225173
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560d1dffe2fbb95c70ab82937b7bdcca3
SHA1599d869e4f45ad13dcb4539dd903578196d864c4
SHA256bc43d67cab2f9462174e04cc4b7e7a8c3fa4609b6c6eb94a1b219169bf5ca773
SHA5123a51f1babc5e9dda70aa002949b38bdcce2fb104c2d4bfa986afc122da0e9e9f8996308a077bbb80d490edeac7709ec0cc63b9c8848a6a61c480c62818e4f411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524988840622ec44f096c74ba0938b4a4
SHA17459f55ddacfdae442e1550adaaa13d7e1c5bd24
SHA256e4531452067bc587fcebaaec23d906a14d2b2bfd93cb17e16e51b4febd967107
SHA512d3e3a93ac192b3f15cad5b1c723c807b9add57559c7c4fac2f10413808f11ba7cfe26951bb9f6b4b949551859002044a9004bd787ab4919466c673426b08e46b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b1734e040bca3610f3d7909e439c82a
SHA1b066d9af4fe4a53775b8353fa32a5582679056c0
SHA2561a0178ec2700cd223e0c85f4a1b066cf44ec4cff0ad75723d65f0759f0cec362
SHA512c3019cf036354ce7bd5be87296f23c16ba2581bd1c5e30cdcb5d592cc23513b6995d2d6f6f39699072b8822f588afa44327ec44a4f690b1ae98a9216e9ddd043
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53629745af57725d5f5b0f893e0aeb3a6
SHA138bd58319ff66b2516d5b33d45e5c1fbd2135e3c
SHA256e9eed020f5e8703a123d5065c1e560e754526479cefaacbc04985aac3ee9e458
SHA512cd0eab76859c29df43062a21a680e48cc966d98c9a4cb985cc87c2283cf15f369a465662ad34355cb00713ae9385d11d1d8ff783b49a656eaae087e4037e443c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b4bc406c500139d4306267649dbe375
SHA1be8bef69b24c1f3d6e3ed3d2b53f79fa500475b8
SHA2564de2bff45f1d8ce19577f5a3f9547e39aa0a8775eee04437e63f0e805c2cf3c5
SHA512ac42c8d00117513ffca97e7aa3254d66105fde8d833e491278f38e3f714033a9c1fe6ff2a85234458fcf2cf3a5542d50a420e2be6aeb251c02553bbc07ab62cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e62cfba0afbb546811cb5ca549b6ff97
SHA18acc8f057ea85f84d3a9efb32e4de24e2562f3f2
SHA25698719ccbe859f6064a9c5eed21664546de1a0b123ec80746d53f0281d0bd3dcf
SHA512928990f1862c0660043ff788226a14f9bac11b9edfa8550c2dd918737d6f74db33bb0ed87865d73b38b6555fc67cc3e0a4c53b4a60ef6d34a2c3ee10fbbaabad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d3e9f14e2f07b3d8b6b43891e5a2828
SHA17bfd2713dd1f81643cc021e73bdf17df68222548
SHA256901dd993a899175f39b3341b382d150dc535095eebbf1d5b28a70653e5df1872
SHA512989baaac0975a1211301eaaf90bd373ebe23be206a26ac91b98a835024c3a85cb0d80aaea0880cd631088758f884c0ff5d4935ab97e30ec5f7c590d585fa7efe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519f74c8c0fdb7b4c78d663426ed0a93c
SHA18d6bd2a882fc22a4b306b5c2ea3a243cb3e636f6
SHA256ab16074d2f16c5fafb8791ab7450ecbbe2d02458eb893d4ed5cc1c1b4c2d645f
SHA5121a9f3d5dd8a36f0eff4bce8259fa9be0ce3145779895e83b7d963070ce5fffaff55f0362932c32926d3ac7cce23df7cc79519e2588ce1e9709f32e4b9010a583
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7452f84aa6c118f94a6a8e52934590c
SHA17e8b873ab80b4464ef316237232c444ae7d98655
SHA25614cf406734dab33d6e8c760593e94bbb94b8ef16481dbfbce1150586f2e4a6b0
SHA512ca1efd5cbe460d851d8d7c3525e17d22adbc37ea4aa15d6148013cbe0e9105da25878e982712e57d0fd45a04e6fcc34ab0c0fb5fa5dfe61bbb912837342aefa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f79d5358b6df6c36e48d79bccb46a6b3
SHA18792b9e20e679ee032fb4ef24021d5553b30bc71
SHA25682b2ced2f46c758cc2a6f4d799cf14df08a1ab6cab51f13ebdabd64d67f9d0b0
SHA512e2204183431acd27c9d311e37d00e78d10ba78c192e40cea250098d5e331a93b8530b6dd509109d43159faf9a9a029f2446c4b8434b0692eb5d1d05580031010
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c98db35d62e5e08979138aea86b9e3a0
SHA1f32020bb7463b56fac4e8e2e04710d96baa7d8f5
SHA2561b73b1b71928e731cafcddf4db62a17fa7d533d58ed9c69da65ca436d42a57d9
SHA51284bf0d77e95b538fb6a076b431075ea801bece3c4492d865f533e56ec73d8389650050b2d25c5a2cb6b2f5709a42615ab5e8f39fb9bd6d73ef3a2b38e0621bde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b7b7508a7c8ddc4862a743c9e3dd81e
SHA12391e184624c9477d27c68a31c5543daa4bbfe90
SHA25614c2d35db84cfb488d73fbd09ea4b18adada4923f2637f6b8d72b017a7996969
SHA512c468030fb9b49fb025ba6a71842fce4e7bc2a0767ad65293de79dd3a008e775ee2de546feb96a9f64da7edd4a76b96bb6808a4f3651c9798ab54676228cac24d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddefff0f8270a50b2aedf2cb874af4e6
SHA159ea66515cdfca963e66e6d253380cc3d42ef9db
SHA2566650885fde887af28501218f01dce610dd0b47e44eda49b7fd04404bad998902
SHA5120015c1d1b41bbb7d69c38af1504e087cd2a39c42cd044ff526990094183226a8fe8af9c390201ca6c0c7e01a3c34bab600e66b878092ca61242a6c41e0292436
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0892082c745203991888a0b8b94d6d8
SHA107e2d022ff7818470f096ea6d0f3d56f9adb7f2b
SHA2560f7cf21c7b3d4e147ce45841d93d4bb2f47de811b345ab95062f6bdfd988baec
SHA512e275b743eba127627fcbfa0f4621b34896832cd3c9609ff081f1386fbd868dd5169a572dfce8cde22ad3c72744da33975899cc6ade5de420eb73742e3eb83696
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5J67VDZD\glossar-js[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b