Analysis
-
max time kernel
70s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 07:34
Static task
static1
Behavioral task
behavioral1
Sample
a5eabf24e6c2ca484164667b56b3ac4f_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a5eabf24e6c2ca484164667b56b3ac4f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a5eabf24e6c2ca484164667b56b3ac4f_JaffaCakes118.html
-
Size
69KB
-
MD5
a5eabf24e6c2ca484164667b56b3ac4f
-
SHA1
7f6b73cc979e487aa3e2ec655b353e4bc6ccf393
-
SHA256
1ced21ca776a9eb9a2f390ed2f1ed29394645f7210a0d2cf3013197b41340758
-
SHA512
d1aaf72a8d95294e42c72728dc3a3b3075ef6a393412f04c1e688a2f106de1d20fca0a780bd04aa804a4822a2a0f63d38bbe7a1196220cc295ecf48e4fc9f5a0
-
SSDEEP
768:Sqzl8VqiJJ+wpcSJbGoGftWyUhP/R/GTfudmU9g/frBeY/GjSDqQsmpzFKz0x00w:Fh8Vt2DqQsmpzWkVI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e05ae81841f1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430128322" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b700000000002000000000010660000000100002000000069535e59f7d62cd81437331804cfede3bab16787057dbb3728182f73c69ba999000000000e80000000020000200000007dfb280b4fc00967e9cdee4ba56edd0651f0d0c931e3aa03a0f6a9348c5b2a0020000000c82dee13536df881693fa2e8684e086e08abd411bc18bb8f23afde9ee638316040000000002e47e403a6b0f803fb9d6c3e0f158c4b6387058df158036d461828717c6b1545869ffcea80cbaa5a43f05c57950cb829e1d2090fd8d156096106d30d2873c4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{438C6E31-5D34-11EF-920C-D692ACB8436A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000a7fe291a22aaf599ca82847dd71c3fe92845f2cf6070df1a257ba2bf21c713be000000000e80000000020000200000006364029fd20f1e87be062ce60dc83f4b279340ed9021e99fabc1a21d562acfe2900000008ae7941670d363514a2d1b7608ae5895d415fe0013db120dc58c8811d2f826a7a3a1802487b64e56898d4aca0a937445a187675be9d4a65dbdd9932fd422236a762b6a69972094402d43dd778d0ab305bc1c5f25e88139f88600bc5b076c2900ecfcf27853a5bc4d03af8064a8c09807d1d46b9b421309a268ccf551a5ae32f1dd1cd26fc311ad4db6fd8f20faef0ba44000000054556c719a923513250635ce01c42dbe3395eba315bd5bae490394679a26cbfc673d8ac4c16922277ac22e25d0850f80472345e9530d09791df2e93a8cdc0a10 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2588 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2588 iexplore.exe 2588 iexplore.exe 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2588 wrote to memory of 2916 2588 iexplore.exe 29 PID 2588 wrote to memory of 2916 2588 iexplore.exe 29 PID 2588 wrote to memory of 2916 2588 iexplore.exe 29 PID 2588 wrote to memory of 2916 2588 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a5eabf24e6c2ca484164667b56b3ac4f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2588 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de331dabacf9dbede78ae31846ea17e6
SHA17b8c53b2f7ef9042b6da40db45dfd184fecd166b
SHA2569577580785e5c73c2f0b5753688e100b5b5b4125916100174a30fd1d042aeca9
SHA512c95560fcaa87b22cf57bcfe5f649857a5a08081474be90417d32de180ef55b77a319c341405b52fa5b9630a6e4d75aae522db1f9bc3fbe43465226ed329fc445
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e1adc6b261881a38f2faeafe277abaa
SHA16006da321f2557a8d594cb73112bc4c5e7f98cd8
SHA256ed645cf27743585325d42d6d23410283bc2b4c4c76a70ba3693876f03f05393a
SHA5126f9056f6b8c1f5d54dadf458553fb3fa271dc75985fa319cc80f6a2a5610f4e462978f32c545b8e3f4fb423c9b280002aeff3b0fd67e7ff85001798c530bac5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555876bd0654f228e54db7e7eb27ebf7e
SHA1edc417c7bb7a1491204e56caa70f93ee8521ac7c
SHA2565907156603d05482180a5deeade1d857ab60cd4d9c473019ee0c94b3b1b5632e
SHA51265580498b249a8538ba891b0002a45cbbd600991a12fa89344eb97e4c44c21cd55118397d46ee74a349c9499f8c66965db952247988b911ed28bc92e40caeaf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529cd1db758a391d34d71bc784091451a
SHA1ef3b3f95e33cc61231697babaad25428070983d7
SHA256954eca1903656116213623ae2cec01a90f34c14efefe259adf04f444f221f628
SHA512d36d12b19e5e853bd26aab4b365b7481c71d2efef13a12105e70876474b36a00c1b038e6100ac02cf44755b49eb647c611f0317854a8c7f78be1d81553ca6415
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2bd76e487674d22e26ea0a8ca450168
SHA16ebf18b24bd2b00439f51bcb7a01712cf24c5c0d
SHA2561ee6a84097f8de7757518d81d3b48932bf5b1d04aec8fc73f4d2d60dc2841516
SHA512bd61204bf33741dfb02800330bdc85d48189cfb3452d127e93c1e24f15d8b2178461331f6eb7cf7997c5113549db83697e13452da1b7b32f297c6c5513b9fbf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52663e988ae63e3da3c8b9092650e2f9d
SHA1650a538434915964225fa64acd8d49bfbc58a02c
SHA25668ffd0cb2b5f5e058c93b8c146822dc0005d3e0208bcc6a9e8445286a312ef46
SHA512e58c965ce72fea3ad87a17cf3914b906cc73853cef9ce285319b39e82e484d68c9df80337eb6ef7b6e56152c4e0d7a9f6446724baea85c138460be323348d86f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa528a31669ed7355c210ad07ce16bff
SHA12d15fa101d75572ca7ca036b37319e6a7e419b7f
SHA256038195a60f155ecbeea8cd9e6a619aa0c60cd734492906583cc0a2204240057c
SHA512a817ff1329aae376289934a7240617fe0cd8ec4cd1023a04b6800e97d023e89681cce2e15b9492e175751ebe1ab14590cf5bd21f7a75e323d2215d7348d26e8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec7de52cff8c635990f61e3d020cbc39
SHA111507c7c419d43f59b02a4b40af2523e573ebb90
SHA2568125c34cd8d4dd0c7bec44e6eede776356544c42ea422d2cb0f0053bf5703bd8
SHA512e612f6a2c3af071ec52ebc0fe64540a3104cffa52d63e31d08caedd82d3da9d40af1963fac48c4223aaa949cbba00c1f6e41362c11ae8fbd1434b7cea84d99cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50113b2c10d5f0b42f50784a48d6e14de
SHA126bd9f133c34d8a8106e3faf79e511dde0e0d14b
SHA25628b9ea733ac6f47b6cc80de1c59b488b493eea59beee78a60e712cfaf45db70c
SHA5120134fd78f884f96dfb7fc8bbc100833144eaabf8587da7072eb5d9509fef3494ac008d0b135d1833708dcc87288c66ce95f3bce346f761061254078d841ed893
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5297d7a2fc33ee6acdbdd2e29d7977ec1
SHA1aa67285572405e68852b93b10d6c08ee68955bfc
SHA2563deaadb15b1c803182d19fba9f4eb58246bba1c6495a62b6da3b84f58d88e4b4
SHA5122b3fb1391c778050ee814d402f3848376cea00b708fd2618806d737f9c027c1ebb7473ad287279bc404c89c2f8ede4f58de334b04a4efd98fed63751f4d78e68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53494ecb39b3a2d5a37836dec81e7c057
SHA15b3cffe275541dc9519534dee04262f3f8fe9c07
SHA2566c5c7c73b32e917e28b87bdf63f34df0897dc73792de10a852fb020984c249de
SHA512cee68381ee65926842de2871c5d94da1d82e1250b2eb014ee77d6c43509ec0502f4910c994ce1ddfd2ff1cce812b73c51b27fb6cc50e5dabd60f0a647c3ecf6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577593a7a2f357aecc379577e08fb0083
SHA117bf46951ca26585cd5bbbb39a7117e6fa6c8382
SHA2563c9bdd7a9903a3971f6337543cf7c6b1db976b7e7ae7e1a5d1e60b24c95c21f7
SHA5128bc45803c75b5774415895aad2f393f5b8f36b63254d0f1835fa2c5752297aaa52605e2050f5ceb1f9d50844d3fc5a09965c52669d15a9e30456e1f8b24c8cdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573ef31a65fee914479118b69611a7a8d
SHA13deb621ab6486d05648a146d25103d04a5ac30ca
SHA256402be1c88f91bdef2abf645bd76dd99ad1f8e0b91c3246bd1ac4e3dde121975b
SHA512a7d41fe77887ce4ac91bd4fd8294c6db3327a03261f1ed93e159610e26917d134a60b1c77e904fc2836ff22da4b2efbf4cc96c323d36ed091a9909d80c42c603
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5010a9933e440f9f70764119e64367a87
SHA1f83ffdd3e5aab6f36de98bc2cae46f916fef6e7b
SHA25651bdb6d42ea54d621cebbf43ed2cd6781d311244581aef7a9c225530146d1002
SHA512982279e20e152f3025a19c5dee8899c842c989b1fc39f974536c9209bed14adce08e730ecf75eb4c952711b3beeb998edc059592353175c7740eea1f70c55598
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dabaa5be80a906cd8e55763837aeab6e
SHA1dbf86d0edc885b2bce07667446d4faaf61ddf5e8
SHA256b39556011b52fd4570498508b1fb0eb471da47e6b2c3d198fa75f49975261fbf
SHA512af0cde66755d183dd25a54de318c4bd61d2b7a92e81fc914e64188c7e1c56fccc13a1ffbe7202854ab976c7b23c6adaafee38f91149734e95891106cc4f9cfb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4b2e45235afb8a6be204698fd953fe3
SHA1c53c5adec1e7f97997aeb47a3568e1ddc4093c09
SHA256f23fef8fe12f117010d67b07b39b0f7a939b5a7fa3a8d560fb167f4ec4bd7b8f
SHA51235af7481669f9567cde99381f4fdb2b3eb016b39a68c1a5c280bc315935e0ccb36d2d0476249d2ce6af67fa8e9705733c7790c6eca68513569be7ed87bc1919f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e727996697b904536e21452e479bc472
SHA10e80761be56f3757d8b174f1793c663045ec5e20
SHA2565393dce4c3209a1363de6c6bfdf2c9a1285d0844546bc3fb8695cc5e087a6f22
SHA512e405fc9b56128e132553f8b06e5a346a4da5d5c03d27290772c3962a46da8a86031fc075317adec34c220fbcdea0d1dfb69fc6053ebd6a354449f45a2b8dedf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f68729e9f12a892b2727c5e3e40753c
SHA15bc4a9ef4c5b4fd6a44902d679fa39fac462693b
SHA256f98837d2e3b2b7d496495f3adf923db2c3c5bf250c2fde9a24280c3a70fd706d
SHA512b712a3a8c14f5ca94200fe2a4d63c736db710b028d354e37c6b929505011e131f06bcebc62d0af4efed375237594d8be7727020d70664ef411326a35057edc56
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b