Analysis
-
max time kernel
122s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 19:33
Static task
static1
Behavioral task
behavioral1
Sample
a7ef207dc09cfce71646b8ad0d7c6f25_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a7ef207dc09cfce71646b8ad0d7c6f25_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a7ef207dc09cfce71646b8ad0d7c6f25_JaffaCakes118.html
-
Size
25KB
-
MD5
a7ef207dc09cfce71646b8ad0d7c6f25
-
SHA1
75605a43b136a9f1f4bf2bcd25baf44cb4ead5e6
-
SHA256
465a2d807d3565de68251994728b3c352f77322c266ba80f7a0610461e1931d0
-
SHA512
d8cfd6957d02bdf27d8567f1dc78aa412c4884dd2011b6dde9ebd553f2890bc543738607501a310d792fc11d4ec4bc38a646321890e4477b5bdf68e7dc5d487a
-
SSDEEP
384:LMlIc6t54djkGTHdXZSpyxts91FTGXtZZd4Q3/gbJaguLZ:CXGsLvglaxLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430171464" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B744CBB1-5D98-11EF-90E9-F64010A3169C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd000000000200000000001066000000010000200000003061126d6a68515eb47f6aff25d3216b81b425b0da68a6c3ca032c3ee75f2e10000000000e80000000020000200000007fed6e97f3419c7a474b18c2b7aeb0f6d10bd10927d59ead878923b5f702ed802000000097f6305cb08e1ea655438ec14dc4f0dbb9fa474ee482c1e4a699ab4e7b102fed40000000f4302afaab097047746c7be26e408d69f83d29e126eba298916a20c5a7beb734de52f69b170ea4a0252dce9c7513b03b52b4962cbca7c49883a1e3bb72b75a85 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 508e95c2a5f1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2088 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2088 iexplore.exe 2088 iexplore.exe 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2500 2088 iexplore.exe 31 PID 2088 wrote to memory of 2500 2088 iexplore.exe 31 PID 2088 wrote to memory of 2500 2088 iexplore.exe 31 PID 2088 wrote to memory of 2500 2088 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a7ef207dc09cfce71646b8ad0d7c6f25_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525debe63fab907bd570acecc66b17ded
SHA1eac410a246539c58cc36a3e102f14d0ae4fd3f65
SHA256c9dd6e600149fa60b1ff07ab2daeddfb741959e1c1564305b9d90ca609fc1b17
SHA512faeeb1864c7314e1a1025f4c82af2dcb48ec5a06e7119f4a56d4dba0e8290a74bdd09923d5b940edec8337a465e2f59dffae9dabe91de8d0044b27ebd4057bad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4c28531de83c29e81d8baed05446a07
SHA178cb3808c93ded6be4382a0740ee425a4b297ace
SHA2563e90812977d976a79d2335e09efea675ba3a639792635efc3aaa55dfcbfc74bd
SHA512032ea17b2fa0199de2197cc220465504a22d98680670f8b67fe6895d5ce9818066028ff7c5b942242e94572815c50dfa77e8a6492505a41cd38beb0b4486eb1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5605fbe6a69aef2b9984b0364995e4252
SHA16940acdafd2693abee3b8687f695d3ae6172d810
SHA2562c0caa70de46c9a11f096544398f840f9542af9a5a23e2f7e26777df6a43a33f
SHA512c88097d7af15d2c303bda43ce2351db26b8c080d1f7d128ac5e0fcd1a5fe110b7c0632b92be0821bfe094addb7a64ab731931ec9d96e114a9ce8b45e12366289
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab7b58eeb6738c15c17b9960b702f5cd
SHA1a2900c655807e092214e2585f86146652ef5ef18
SHA256b101eb8543c6ac630850cd844d708c8a0d554bfaafb2856fb6c500799462927e
SHA512395d5a0ae93b4d4aa29f6c86fdfa4d3fd34dc9461edff87833d77830a3f9daf5462f8bd6a929facbad8e6536758cf7a26c924e2d8dcd7325bf49f17749366983
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca33e5e7d58ee2f716d6c251416a633b
SHA1281ebc8aae2cbf8b32f9113f03eb1113c4861db7
SHA2565e46c353ffac6c4614aa102def32e3309386ef89f9084d7c97bffe4e5ce599f7
SHA5128606dd00728680205e2a770e8486a39365c80148c492aacd33f225f780bd75eaa482919d9d8a7e86e5ddd59a462ee4cc4350ae3378146f09d66bca6c0c39f4f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505cb3a6ee586ee467c83830c800d618c
SHA1b416e73bc3dc854d9097938888ce032fb4030874
SHA256320994875f72da3899c59ebbe97159ee475f4ddb6168b997ed5b084c3f15c87b
SHA512d5861b7d43f6ca7907bf775193673a7f911b63bf5b20f673d19f2674575ad5f70139f9da0c7b953c43021f7bdf6912512340b93743a44b17d27bb78c359c1ab4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c35eaeb91541714f97e5bc808c3d26f6
SHA12072bb9956c2d88a62e926bccc16a79ced6c6895
SHA2562831ab2e24e7bcdb61c7f7d80a845ad6edc07011e6af5b8c332bd4c21705bdb0
SHA512d45b8e6fd9d436c80c37df7da807da123f7b5b049a9f3a3178515ff09c5135354ceedb093ed5a10566f42165ee622fdcdd06f2da666b454898a5dcbda5b66e7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a6f81999806fc01c49e31669c589ce2
SHA16e196c36efca37d312a505c84efb94e00922f401
SHA2566ee12942687c6c6b96aa948f76d0e8d6142cf365cbbe9a4fe698b08cbda3272b
SHA5122e7a20b8e6d33883447ab5f55a9a0ce119dfb434806bc29d1fcd369a1d8461f154ddb2123ff55621639ece0bfb4a58cb98ad79a21232d9fc35300a8e4dcffb2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5562fd99b59a6ca7d47407b707feeea43
SHA1fb267e5b66d22b6ead7499ada1fd7247d312b3f7
SHA256cbe5bc48b549a12863d7c3871735ed45f059fdd1b92ba39665f54424d20de3bf
SHA51233a1a2cd2c6fc3594b357860af65716cdb1695d3dd460c643ab025f7e37fc41a8008ab2183259c046078d8d9df6cdb16354b708f75dad9af26e267f8bf391ef8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513e990fced7e0f65cc034bd2a63390e4
SHA15e1d442471593dc8a2b5257576852949a47d4364
SHA2562427256bcd2f5c3e00578b6d6d5715ac0d1e8c76b1c3aa9dc7788b327aaca7da
SHA512a0df2a0f652b50e28b96ea1cb6ddd5689af02b648feb7b6706dcde0eba96d3c6a06d5c33a5bfeb2a4dfefaf676af8fd225181e45e1aaf8ec08bf2aa9774481a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5456b59c8b3df723aa43a7e8ccc77b1ce
SHA12911734cebf1a68f598146b525c5267ea1cd704b
SHA25605036d5e5ba15973491588b9fe4c1540d30e512f3a3b3e94d2b8b997fdebddcb
SHA512fd6b837e90969aa67e2c1da7e2e8e7d0b7ef17ec4cb5fc9b76a8a0502533b5e32ee5c5e5fa84dd7874fa00bcdbbfdcfbd2d7f0d56e4234361a144400376436ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5836e934d50f7f5dcf63b0af19c6c52d8
SHA1fae0239cdee278c36e436806e64138279f8b0acc
SHA256d3ea8a802964c530e1b97047309efc06320e56b0327f47f5a40874a165aecc01
SHA51261a6d4418fe29f159c820e62092c9ffc2eea442e442c48e4d6f3ec9f5d3e5979a35dc7725c05a7867f3402b8824be7929cf47578b25af25e16e17bd4ecaf1b40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565815b69ca7c4f86dc57bbedfc4e6ede
SHA1aed4a9aba5c67dd55eb832b1743e0f541884c88b
SHA25611417ab4936a1efc3f3943b8f37b2fccfe1a7b8ee14fd64fcea386d750682c5b
SHA512a634ea840da3c57331d51ee5697b1d4868525dc2043e18a5c6e503eac59e1adf8b55f5306c052609ce313c92b584e938362d928c21d8163e3d530101583bc987
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3f0f3ae687272697243353311e79e5e
SHA1d5c28cd64c4d217dc6cdf90656d1951076024a74
SHA256e69806df3c7ff5dfacb51fe16c7554b592db4fef60edb96d521194b591392fb6
SHA51257e9323385334cf5a7d16dfac0270e271932c3551a69d706ed7c52252ff9e0ca8f869359d2a3590c2adcddd93586f3128c631f33206e90c7e4b9cb2a08d8c1da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d186ffe26f754df26412de6f3424f4f
SHA195e643909579eb9d40f598bd3d2bd195419f2a62
SHA25653f2ca781dae7bfc588d72ea65519eb3da3500a82a4a032e9b9ae77d1afb9e26
SHA5129671409f70a29818f1d5c4391d56625610f94693a86aa014ad6ce09bd4dc859f7a0846f8f7529540bdc5f83afede7a4e46c5e4ef6208e6cb45320ecacbc94111
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b61a01631ba9f7b3f58ea21a9baf69df
SHA142c1967c29e2ae2b03351d24f6e90ef2da30d5c3
SHA256e639d86cd41b7616be07c40ce0a13f5a3bb717a35b3557fbc28f26218d9f7520
SHA5122c384c3eefb0a84ea392b2d278ecf03341f9e0950297de9daed23fd45b7745b5e199a788cffa4daaad8d6cdadf3886e20d59be38969c3a8b55c8de3323c058d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5581d219978364e18041ce029c87146bc
SHA1e29c57f4b7145c80d8fcc81e767af51b5e84452a
SHA25625fbbf7f082370af3703142649439fb97b46cc298032c187d856ede7b2beecf0
SHA5125b0fa47c563119794648e98ca07850e7923afcb2ed96366e0f505f4487285e1771cb8cc7f1e68850a52291fbd81b99b67dcb75e88f3cc4f6211fc4857c41e3ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af10a6654ab6fd292987f0f8edde646e
SHA1f8ba709bf3bd1509dffe99dcc51f6b39f48dcd19
SHA25628405a99d2f956158118cbbbae32db1dca9e62df231b6abe3679e4343aab00fc
SHA512bfd4c1bdb999fd896021d030604c3571048f14c1c2bc0ef83e28a76a4ac5a08f9f3083c994cd59c051e3008c4600d44ed826c05b4b3dd07ef436b28ee7638434
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b901848387b2f87dbf6447ad231d14ff
SHA197bb29341f9ac56d2a08b97694e265500e86ff07
SHA256c6e081ccfb207487342e6c3ea3ba8ac04971c8a9c5b601ae53bd3c7e9e5eaccf
SHA512c5b4eb804fdc3ce04dab01ce6cd7e14d6c0de1b6b5ea5510b1809dd0ea2689d8fcad1adcfebfefe136cd2e5737b238f271871d5aaa1459fa1a7e916ecd74416f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b