Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 19:29
Static task
static1
Behavioral task
behavioral1
Sample
a7ec82db6062a5ef55d2dd0cc5928c71_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a7ec82db6062a5ef55d2dd0cc5928c71_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a7ec82db6062a5ef55d2dd0cc5928c71_JaffaCakes118.html
-
Size
23KB
-
MD5
a7ec82db6062a5ef55d2dd0cc5928c71
-
SHA1
a89bda61e5dc7902ff39e54f4006cc6b433ecfb3
-
SHA256
4471759e63c21c6f453020878b41ebfc528d39cd3386236c97ad3979f6ab81d1
-
SHA512
97095bbe6a76fcaa081e54bce78b83d64041583aaaae769d4d2ea517478b142f15fd6bde27d3343bb974e2331574092b8ed77e9784f84e64fb1915c4581a0130
-
SSDEEP
192:csz7eFAYS/BRKtHu80AGXoT1HeXXdSUi1HPUHb76f:cdFAY8BRQHcAGXoT1I0lHP6S
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{28388E71-5D98-11EF-A17A-428A07572FD0} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c9200000000020000000000106600000001000020000000536fb98d2e793a5e81127bd38887d8aa310f2a4807330b6dcf9eaf173094d36a000000000e8000000002000020000000f6ed1883c02044375604a8552e593295b65ebdae4f5f064a2759f6ab30034bb220000000f5d388673f8e147a50e1f62a2fa2c0cb9aa5f8a58b7f2bf3b2f30e8650489f0c40000000eb978e2f2dadd68a043e90293490c258569ce36bf387393ccb0d8595e16a60b14094338c857e9f9a44df9ea3925a45bbe4ed6e4737301df415f5043511747a25 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 209a6effa4f1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430171223" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2916 iexplore.exe 2916 iexplore.exe 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2680 2916 iexplore.exe 30 PID 2916 wrote to memory of 2680 2916 iexplore.exe 30 PID 2916 wrote to memory of 2680 2916 iexplore.exe 30 PID 2916 wrote to memory of 2680 2916 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a7ec82db6062a5ef55d2dd0cc5928c71_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2916 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d170da63dab80ff2bb9167d6861aa48a
SHA1ac942c360642bc4ec6f346abf45631d364957553
SHA25656a2966be7a88cd5f00a27213e021c1f783536d35d3db626f875ec5df15dd513
SHA512bf981b433148b235919221d42a721f2f7b4ecc13b04383cd78249e59c483d486075edb2a2c89a68dcdcf68e0bb0d79d209cbf49bfb8e7131097c039a272455a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53311bcbc794e366b94e167e3741d1be2
SHA19dc7a753105c1764ad5c47e2497a24d7b42452cc
SHA25674a205ad07bd42787f9df92dbdc87dbfe161bd3c5cd7bed74be6d08f0f7178bb
SHA512beda47adc360feb8908eb3038d17b7b006204a207edc8826676ddc1e97b7e95227c8ab9946c8ac9f2227053184e68b7dabb7427e0abd43b89a357be7f38a3c69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552700aba0ee3bcb776302f44f5dec8f0
SHA1259ee8b0a3fad047794c2dd124bfeba848589b2b
SHA2563464b87605c1a29cfd9f273bcba8c28e9d172cab341643de661ef3adf66cbd5b
SHA51203762e9affc33e8cc8401b27ee8b8510a6d1ecabdc884ca5228143a3574bc18d80d4d7ac21721fc8a61784a19c960196e2ffba453d461e6b1b4e96642e028598
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51584f2028036f24270cc5ca512c1b1ef
SHA10167631be53962e1124b22e323393ac257fc4b83
SHA25628c472afcf0a6469d4cc7d1a62fb5c62b8a151de9c15d3d32a4d25b93dbbce7b
SHA5123b1f44f34071509dd57a90bfe79b5174e36acf03d1fb85a1b032f7124d384f25f6129fecdbfabbff4244b7148857aa152b9c493facb79ebd6d008c4ea7b1b2b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c689d15dd4bccdac9e582f6924543ea
SHA148bc0d3376ca12cdde8ac50f2ace0e54fd318183
SHA2561a4801a02e3bf3cda6d581d4d7ec53af80612f122261440ded1e9ca788114acf
SHA5126ab87c04fed9b7eb0642003dd1c919689ba52b8f937916943cca894a27a480cc3cbddb65948444679ce4f5f9ed188aae1033e05ebad4cb643f5a8535225f4704
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abbdfcbba1f1c9404ae35bb3f5f6d4f0
SHA14b2d5ed6922b6b583ba9061337932737274d7a01
SHA256c2da40020ca28ded896e7a7b1b91759863d7f0777d3ed5ce79ab2d0f32bcd19b
SHA51272d2c7785547ce481de79588810b7773946acb67611a11aa1352b62d9798a6c72e7753cd131d4353e80896e21cf21ddd8a956577e0095829575488d847c23482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c95293cf78e7cac4b9548637893b5c8
SHA1e5a7f17481819e474ea155c4b0575b6e38dd625a
SHA25603c28523874b5a5a9ecfc9dd96488c564560e90e0565bf0f707e167ce59fac6c
SHA512bd48c07364131997282ca9a1f51f0c87bc957fdef1a687955cfdbf674391c9f73f60bf3310e318a83cc771db2104ae019323c3b5d723172a76c95ab8776fe099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594131cf766e4cec291a1cf97068726fe
SHA1a1671845d4a04a91f9f2fa60cf804d5cc6e4ca68
SHA2569fa697d586b52c842b43b2984ee04f2449da35326aa0d2a28e0becd58665fa08
SHA51268e0ffeae0ef21cb9f64f283c5769d601907375e9f4e1e7c11da44deff747675cd55635161e75477844ff2979caa8f3ad5250724978e4b615f29867016340a86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53095e8daebfc56183645bcde3c6b1a1c
SHA17c824fbf610d89e1ceda2e47309ae59948bdcfad
SHA2562a1cfbf870ae9441740b216c3f44b619b61e836d30498d00f2265b35667c0195
SHA512e24ecade2ad77cd763ebd4d4e3150cde71643d2b8c64c9282fb28cba365216e72803d221ce2e542f629767b701ae4ad50c2b382f9090f8ba7b41d2b3b6a61583
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5819866bdab063111f6fcdd096e765fc2
SHA1213d5ad42a7ed2a2f01d899581ee205a54303d71
SHA2567ea97dc9192430eccdf986fcc0ab2605e2f0bda19ee9a6d2c6ab9cfe365265e5
SHA512e92d4c26a74f01b5b026083f3f6f64c84bfda31c544c4e9f30c4d28a3e925827c16673be737e64c205e2094b8268235bd04cf3b21edec543b65cf00cdbd3e182
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5656c0150aa912e13f4bf20ca7ac8c1e4
SHA1e449dc6686b854929ef7725629f3cecd48430b52
SHA256cc5eb9e19a7a2acb3c62a9665e7908bf7c6eaa218e6b6ef1d8edc3ebad63af2e
SHA512e2ad9e672c90ddd0a02c10cfbdba7ac6f59d4107124db05b92473b8d1af50d0fb47c3395d0136e342836c37245bc3e6f8cb419eda52f85acd98659d84b080854
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c72f143d07f7b7ea8cdc95e7c7deaae9
SHA12127e61b69f7a65b5062d76a9e5eff6d9e39203a
SHA2563a7bce8fada96b8871c428cf9f294ffebd435574c1a4555ac46fb7a55a75ebbe
SHA512fa9fc4b9eba2ca334f4d8f5507b616a54e78bd937d212d8cdba8de9b11b087a4c92c3fa8f4aa31fa1fd793e51688fcb93dc535982ae6b22bde9a7584542cdde6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc1dc63dd221b5c3574177f5f9f96d0c
SHA1681c5d00102e7a421b5d8a1beb6af5a204db4cad
SHA256c037e095cafc09fac974e6f95b95264713bad7abcb1b767f276a3876ae9a17b4
SHA512b1195524cd2b4368602c1c4d16061adeb3ddcaf0862c6e1edac91e91c85ce31924ffd60da67b930317b5fca3ff756a1c61d8fd3b8c0601513e26b2f049a1e646
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2ba364b996981d2236675707df59b4f
SHA17f1412c481eb60ed991806a9580e528896045c87
SHA256cb6e0d6fd61c0f168d99da48acb09ded0401c9e6c927915c6cafe7d97e2a42ac
SHA51290051c58dd9fca44f366f06188ad185117e58b1b58f1deda5789a7fa59310d9dd542126717467166109cc04d1faf6fcb5fae7d16897b6d584625e0b2d6148136
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595db0ac804bcdb52601e30473a4d9eee
SHA10e7c725f9e625ca8f186ce67a64e78cc6436bc9d
SHA256e336965aa71f8453bb42c4b68b47ac0a8b9f8d9e1ccf579e84e16079e65049ff
SHA512e5f3dd63321b058bcfbc1b2a496beb0704b1e542c37ebc388ebed65e91deaa903102bb19482f387a0a774b70104ab245e896d214f0c958f30dd17aad8ef5b15f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523e6d20b45ecbf0eb2f38941a50daf59
SHA1873d4071357f4d53b8c841b4ac4420a8fc78f39e
SHA256549a2046ed703498544d51523a54825bc5a5e8c6651d8ac6c476894d57d3473d
SHA512696425461490fef4d0851091d1582486f250f1104fa2b410750b74060c414bea50e444a44c26c249e94b30fecb91d589ec46db3fa7024b75e701e0db4b0553b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588d65adc568dbb9f71158fbeb28e4638
SHA141b9b4615d46f87fac96c616ef8036075b4fd542
SHA256542cd6fd5ced1d9244ecad6e3eb393f58b82c4565a03cbbade469b92fcbd5a64
SHA512f7ec57cbf12ed4501fbda65ee6d05b3fba0089bae7ae10231ee8d3947c247bbf7d6b86ef0cb68478769e7070830c4a22e14a389b7b777bd050c76fba7c48f192
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518ae018cb01b14c876af622214058f58
SHA12b0edb2699d35acc0083337a80823600153e4846
SHA256261817c98fc82006c49abd835868da31e1e031fac91319bea972a1afb144c541
SHA5128c5d3cab97ae6b4053a18bf5566c2e2a0474b00c5ac6c5005361359aff4a0e4c7b2c8050d337bc3495fc8284efeb3040c35f177f4f51b48a818206f2bdd6d587
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b