Analysis
-
max time kernel
134s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 18:44
Static task
static1
Behavioral task
behavioral1
Sample
a7ca97ce4d9b08106e37e5b2bf6996ba_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a7ca97ce4d9b08106e37e5b2bf6996ba_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a7ca97ce4d9b08106e37e5b2bf6996ba_JaffaCakes118.html
-
Size
14KB
-
MD5
a7ca97ce4d9b08106e37e5b2bf6996ba
-
SHA1
22e29309d961f504646642630f899328bf870637
-
SHA256
5ac84511ef3f56f89f8c085b98b3ecf8488903d10961945244fda666aefdcfb7
-
SHA512
75838bd517aceeb669ddd3f2d9b88eb64706e1e78b8e08e75bf2ca61cd4e7cef912f5b6e55ce67d5c5b4cde6140faa8364af64b5dd7b1db9173817db1bfe7014
-
SSDEEP
192:SEOex4XPGWE/mUN2Vemue6Ekd/eMkrZRRDOYCE5cMRO4mAiQ3XLK/mmUK0/qZaKF:SuxYGcC4jqYCKc4mC72CMVwT+v
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000157672036a33d37c9146216dafaf8a84d437e5174fafdb89ddf04293567d24b9000000000e8000000002000020000000b3c6bc77f2a3aa6741c5954a4868f4f3cbc987ca29fde38af1a5edea90eba77320000000d637e20bad9c28d3b62854b1a63a29a9438cc522c1c2275396b9888095586adc40000000fb3709d6f6ea4251b6694c6e5c0142d79ccec9a5d7270da09fd395d658f8b64593938c484a8531c42d91756560de870dd2e18c7bf4cbadb3a6c3e4578671265b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DDB01401-5D91-11EF-9AE5-CA26F3F7E98A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10ca56b29ef1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430168522" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 808 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 808 iexplore.exe 808 iexplore.exe 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 808 wrote to memory of 2184 808 iexplore.exe 30 PID 808 wrote to memory of 2184 808 iexplore.exe 30 PID 808 wrote to memory of 2184 808 iexplore.exe 30 PID 808 wrote to memory of 2184 808 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a7ca97ce4d9b08106e37e5b2bf6996ba_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:808 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592ae2e7ecc0b51687c0bea95f039dcd2
SHA158f8e69daf72967bb01fd8d0b276002b4067c115
SHA256e139d8c943b8ce71c5771c7b980bc55af54f62c25dbd4594ba09ab4a0dfd20e0
SHA5125bf990be3b4b862560ebbfc9fea6e07ae4e8742b8945406f04fa43a3f1d26520c52ee1d4fab97503ccea9f0582402675398ab2fb0b7a87b8e5dcbb5206083165
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59481ce10d0b1540e6bc1fa7476d7f7e3
SHA182bef44f2bf49f4475f2d5da688a581a60f6613b
SHA256aa05f593c36d994d0809f71e4de44f5476ab923cecd6b2141b6b46ede9daac05
SHA512d8f87c658219274c615a8b2b4a093d5d666b576a92f3a2cf49677eb7c0da8c4f7ca069fa77a037633605442943c121b411bdec0e0eb3ebaad667f9b1a9f32131
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5592b04e7a0ad7380f4c5a496e5282c74
SHA180f3957ae985d297c74904604f23038643cbba1a
SHA256c4a7c01c98182780fd54d06d15a4beaff065750194a67393325049f4bcc447bf
SHA5126483b7ffa7ec3862b4b38c9c0fa59060398e88c82a97c880a97d4d78ccd217fbedc33a7044a9bff6bc264e9b03df2f945ec84a42698ec079092eac3de9c57547
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d9fedbc7f4f78380a953cb3fad3d4d8
SHA14960a1d93fce783541ca87fa79768e0935566974
SHA256f127b885d0c73dda1d6f800f82690be10d4f8f04279ac944421f77bd199ef406
SHA512724f8f6bcfaf80fca3d1c06727ab88352ad96d71ddcdcb23dbe7b342c8548a6d10ffa0dcf54fe6c990acfc4eb33fcfa114925d0fc4c63613e442b016208ebda9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594891084b1fb5bb8989ebb1e1dca63b2
SHA1023f2e444c914ff6e29dd4375a6741a1291df0a7
SHA256e0010606f87cc959de15ded8fe9047db0010476a773df1241c0641970f0b8df6
SHA5129ab5e7229794709fad180d8d6f797e46d8a0d820c7883a8bcb42b7a33ac835ef0b1e5fe8454fc9211356b2df8949023c70d76477874781752a578747c9df7eb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546d1e8f09e291cc5e71e8a0149f09369
SHA1f28df88d45e074d6d3f901b90151415626ba0ef8
SHA2569af0d16d53b07e7bbfeffa64fcab476347d71226269a3310c2accdf95391bc5c
SHA5121c9780f55a5a1b880980fb476fde39cb6e97f6d4e3120abdc2f3329ad3e5562cde13f6b0f1a91be746b65d4ec0566afc44b5b26f4767a39e7d6bc45318eed4f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5742c65a3f84ae5e5899046d0cadfe1f7
SHA12465cb5fa8f177e396efef07f95559d494fef935
SHA256ccb3f4b156f9bf37c1d244f9d057ddcb7e6f4d7f5ae02d39b0f93446557f03db
SHA512c0aa2cef8d1272295bddaf6fd33d7893a3708f2f50ad14df440057723a831514754f6e55100e902fdf0e1f19f970b061571caacb0b32a1ba7a8017430874c934
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5510c947b414dab2ad7882be975950daf
SHA1bed27ba4c8bb17b96af873291566b3edbb24f733
SHA256c3a7b819b54d5d8a1eb5e0fda376a013250f927b8e5fdff5e0e1f1869796a70d
SHA512448d4d1d0f78adaead39377d4bd0edd76af97f2273087369895494041e25a04db85c37d5ffba32eb5d6cd26e05400ba72cee6f5d4d02fb5ae8373df4c3d613a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e51e829db04cb94551568bcda325c5df
SHA1aa343bac2d9fc11889e0c059c78b9e031d8d0053
SHA256828a328d716b016ae9f5e9c1b715d5eba1e915177de69987ac09a75be44e07cf
SHA51261441d21586915a9b7ff44ef2d2ddcc92e3e371b41c2963a5dab2651b48abdd98dbc9060a80801e4f7c7d31ac3820a0d6d0ee1c877af898ca1a23615979fe951
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6e7b2f519b2e61600a36daf922443d6
SHA1056736835966db73b9b84920c30055274a21a242
SHA256f4c6561803a4d2d39fbc0bf902b27a7622275a273a8f649529cdde6761865ff5
SHA512e127ede1071eb8ba65c1a2038cea9b6cbae7ccb029eb66c9f6272442cba6797d5cb6f71d3cf24cce9f0e94b3e12e774520ba76747a9c9a9d331d3a4f2994c0c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fbe99467637a1e18431184c707ed8ef
SHA1b7cbfaed58936b0fa8d997f9676c71b2d492e8fc
SHA2568364751f027daf5fe5aef981107c9730e98499a02c62b4703e07546dcfc6ba6b
SHA51272e8adc02354362f14df07ca1addddfb72f6438acbff58d7fcc38e179914d0183ecd6451b672be8ee45c6022e076317c5a96820bc45453c29947f4ee40f44e26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5063dbc8e5cb05af72a4a5b5f096121ab
SHA157176a115b8abe2d1b8f8cfbf500c1ed1e9aeed2
SHA25653d1ee7e567cd65d75495807d1b9c0fa0d9c225a28873f86fb18eee9e7865ebf
SHA51264b82a1a78482accda328409c3653659a2ff67ffb6551ccf48e94795f37513293267a967dc401f76710614569e0ddaeba0f5f395885ee976f43592251cac1420
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a149150e931d270d42eae756c91b2bf8
SHA1b157e1a9845643784862adfac9e6e199bfd36511
SHA25604889e9e31ece4abee39ec863804bd3fbe37921fcc46d94a805e1eb272c44843
SHA51236c25cab04de0a53f40cbaa640b9ce315b592e0a72c5318d6ac2aa2013e0df8a513227e06fdecde4878c9d7211278b5cfc25172489bd67acbf12fe889c142232
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adb0695936d90fc57cd6769daba9e92e
SHA1075270fc78987077b79a05ad192a9980af593952
SHA256b423c098730635ba28bf504e47928322b5d4f8d22af930157944b7ca7437b75a
SHA51231e3cde49df49c52a40a4b2f388d5a349c6ffc5134cfcf46569829ab4c01972cde7828c1ba3a765d542e4ce60a1dad45fcede3598d0d35a261a1eac37a241d1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0bf3db7b7e06c6d25da96ef8a16be80
SHA162393922849ed65a1b62d2658b31d2936d993190
SHA2561c5b5ba45dd0a84352e42a9b7aa3a302afbd3d216d7111295552686cf975c6f9
SHA5125cdc50f68c5e4646a83ba53f0755e45b86eba7c98f977698aa84b9247bb7dc92deeb9146cc4a5d112b128cd08e9f9ff4149dfda23fb8c70d78d6f53362e0472e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dbd01f2adc08cbf6df7e640b7681f6c
SHA16222181cefd64e5bb44d12f4a731c1c4c76acba4
SHA2564c21b59c371b45c84cc5e55bf9cd3e605858914b7317d4e6cdd3c52c4e3a937e
SHA512eb05f9875702dfeb8ca5605898d8f64e1137d2ba8b45d66b2cc024d7db34a5acc34c75338bcefa3c1fe6e7f26a460ca50de349a8d3c13f528e7d26c761529f63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ec90138d50f385baaa8a44fe63c9034
SHA1c39be508b37760c103852207b81deaaca3f6df3a
SHA256c645d55390a3e3a497bd3a4ec7bb26e9ff2ccc1f55ca9caa4032a024ce4a3470
SHA51258b1535d049ebf5908c5a8e173d28945c135718d2e865dc888c9544f5a5989db02e5b50c9e149954df19ed26162ddd5c3660e6f8a61d6a19cd33fcdc0d56a8fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556cf303da575d9359cb807fb6a0c32a9
SHA16eb383b689795e000ed5c6518bd1246094b6c5a1
SHA2561a97aa5ec819a19dd27ae06b8eeac0ca7c5b15d0a54fdaa5c478ad7de8b9dfc8
SHA51213e4fcd87cdbea6b7cccb7f2a3228ca55d5745048b4f3cbcd42063d1c673270508a5735d597bfd1c5a1fd1b9aa26aadac4129b52a7e970a619c40bf3634121e1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b