Analysis
-
max time kernel
134s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 21:22
Static task
static1
Behavioral task
behavioral1
Sample
a842b90f157ed4f47224d07693c88d89_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a842b90f157ed4f47224d07693c88d89_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a842b90f157ed4f47224d07693c88d89_JaffaCakes118.html
-
Size
10KB
-
MD5
a842b90f157ed4f47224d07693c88d89
-
SHA1
2a2cf6f7d9d3d800ca64087133b95e2a049d44e9
-
SHA256
eaa4f48482b7e370e5b3f94276377c1849e0d3fd0dd0f6c72e8bc5b090172fdc
-
SHA512
6d8a741802da96aea6b2ccdf9d7223c565a405328d03034ef95892fd0f35c7a7951a0a349a0083c0d886fc5e7b6125303657a83933d95c4df8fb63bcc4297655
-
SSDEEP
192:l2wa0Uvz236zIlr75JT/bovUB2/KlZo2oeaI:l2wp1e4r7vT/0vUhZ8I
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c70000000002000000000010660000000100002000000003ae255ade0b52d61f3c8c217512ce26b6425996f018827bcc5ff4381a6a7302000000000e80000000020000200000004da925fc4be38aa46e4a8e2e3bcca21bdabf77f1e1d3f598a3ad71967c797785900000000400ae2e41c380a5a5d57288da5a34fa5ba49ecef29bba15d528f464dbba9314915a553ea29cbecf110956c61634287617964bf981a677b10539516b1b5672e764639a8a235ff34ba6843918139f739649e910d9cec823349fe457cbc10f53db3979601c572c9228d01a7c272d4e285b3b050edb2571e72095fe9e299ed8bb685c3c708c4a771191bfd3fd3fb799213e4000000068e77942814873a215ab7d5ebc02f07be5b22bf1cbd9081b9f333db96bfe1ba454d52d1f5927b17aec2768390cc94ca81ddd55694ca2cc3c99e12170c8414bb0 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430178051" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000895862f3131f3b0878e6159eccead046edf6c363bdb791a8834d5985c2b36aae000000000e800000000200002000000058d24af28bbd162750f0b4eb1ba9c7e7ba714b0225749b7f790387c02f712837200000006a86a6bef892d7539446019be773df9dbaae015ad8e43c9e2467c2415f86143c40000000c2960a41588dc1d95733ba8309b1cfce76a9fa8f839197a6abfcdb7591e31880aecca6c245f71ff9a45dfb3cb366ae02ff4c9eefd18d7bc08bbb72fa91d9b19f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0D77F931-5DA8-11EF-84B3-46A49AEEEEC8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 408e49fbb4f1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2332 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2332 iexplore.exe 2332 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2332 wrote to memory of 2832 2332 iexplore.exe 30 PID 2332 wrote to memory of 2832 2332 iexplore.exe 30 PID 2332 wrote to memory of 2832 2332 iexplore.exe 30 PID 2332 wrote to memory of 2832 2332 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a842b90f157ed4f47224d07693c88d89_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2332 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfb108bcb615f8f603f229a5a96dfbd9
SHA11b61055cf4ffdef5e7442dd237ae2e635376f395
SHA25682d92cd5216bd937d247b0513d81a3ddb39a1ff5ea423f6b5edf2db6499633e3
SHA5126a98f15a8a61c208d5cddf824ea660a0f1eb316d009b84aba2e5f618148a7f5222d8387cbaffee820fb0e986983142e1a3f5d8d9c6c6cdc5a6320e8c9d02d231
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53873782a960d756e2293cb36e52bfb0b
SHA184156a068d6bf557a5ba2cc56392fb54f12146d4
SHA2565533d193e53340dee3475d26da120dee3b81addb4654d9c9ad34f0249dc4f381
SHA512a70464d018f1b684af6d42e48a16faea6c187b4c5e55493f8af63280c252236a9782a04a71dc33d5180710984500b97df106aa90a339b9990add7628cf3bf259
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526b5aea1f0f2d2ba9855b0d5c8f9079b
SHA12cd3145e2a058da16686a95a05681fc6a3e42a4e
SHA2568b669426da5e5032f81921838e9264b0c7f147c8e7b14abb8b1deaad1a789fe0
SHA512b193f01214d4ac374824c234e6d2c6e57a7a3aa0c3fb73568a2c5cfe1fe069a94a44fddfd4fe71c5aefee362de9d9d3b0ff33e599fac90f82789872de1c5b90b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d23ccd60826b12548138e9ab58a47da
SHA135805520df625179f9a2bd065729d26583559f75
SHA256c036116dd11eae1d0e71b07428c9170d3791d7e96581a4c78aab060b592fbb85
SHA5121cbeb97ae78c8014f94e760186e9742c1bc5d52b4922dee125846c2d29fa8c2c5eddce68147feec4c6cc6e4524edbec5f41a927c622f14134f33a94e992a015b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590c4868b57adf5352e47b6501eb2e9b1
SHA147f8e86d8c5bade4972ba7858c459cc6421eecdd
SHA2566bda4eda53b5ad5bb2e686fee46583a80ea273784c9e9c72faed5cc6f6a775e1
SHA5122dd4a887bcf7f0e115d263a219371825fed9c775af35383a43a67a895b6a5b70272afe87636990ae21c242ceee9890535a4c122d9ce03889d6dd49e1305d0ce9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb26725abad586c7189f454d8dc95575
SHA19a12f50e0f88824794782b866d7f4692ad404120
SHA256bb5a74b5cb1a92c49c191c3f80dc94b34d8bfa9b0e0e7774a912fa6d8c8737b0
SHA51263cdf42433b7b8444e1135278fb016bf8873cf16321dae8eaeb5df8efcf6407b92d18fb22a8346754447451d19fab87b5d0ea024354b3a32e06424baedc68bf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562276ed14475f898b94be93723976bfe
SHA1d1766b62eefa0803d616e30ebd4a25f19e520ba6
SHA25657420ec5a2b6e845f47068750f0123d5a1f1b19c600bcc09dff4a6fd07234e4c
SHA512148408cb5ee59b5995254e83063c536a1e3d574c4894fc97bdc3db761050ccbfa462768166b769a25f85f86f9e1a49f2b9849dec62f91bbf493aef2dd1d281cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537c6ecab0d8118ca89373e59752c0257
SHA11f1cdf598645ed96a8d80576b2c9c1ba798f431f
SHA256f7e8d95c9419763fcf4de04e19b2048f3e644dba5635ae4e94e511387459148c
SHA512b4204b723e74a27d11278eae6bebc0c14fd13e1d0cc7a2d2555566f6a114e6bb625a2c9874219b4975655149879c0f4952df3ceabcd6dca8763db4d48249cf85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512e54cdbc86012111b595f67171dd4df
SHA16c0e1e6c1b74ed61bec2bdba68eaf20591fef735
SHA256ecdbb334acd5e976d6ba79fa526c0b9c8ff0d0c8462c6eda8234257d1e731b8d
SHA51289e00d270e8a05557538ef87402098e4fea186ac1fe6fde2fe9a73fbb5f558967557f58d43f9d76476ac93bdff68eb4e8d6b926b8c8b6025b9a858a3ff662dad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e4cc8f0efa96183212787b3ba92d02c
SHA165ca4b9bea81d0130e413be4bb16d59448cff9bc
SHA256c14ebf72e2480aa2fd832c71be6fee505d9a5ec5947b9c537d6ed55242da8cde
SHA512dfa636144e7730c37f2e79d652be449558aa7b67f059b40a1d889544dcd0e71150c3b4d09fca9a66957cb19e53ad4e5d714d55601b05f56034da86e597731f37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537f52558787f0e7cebec65085a83bb49
SHA114e3d5bff6937550a399b013200c2598942a2ede
SHA256b9cf1b85acc5051fbf50d876ee553cc7e8c3e588329e62dbfa53fcc7f4173e53
SHA512e3bc46586af8bb0f610b89321e22798d03e3ed4563a27c0294e95c7477b254da7c7b019704d77361cde2352317fdfa672fddda70a59df85b08f280fe36952f34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568deb7ad384ae323459a6fe72f2dec7c
SHA13359eda356a03ff9af7edb074c4dd2faa3cd98d1
SHA256016c9442ef067b89a76cd0e540f390a2b795a7db518dc5ac1f659f56e4c91471
SHA5128b9c687f72a4f28767bad69c13a866d332516d87dbc17c5a3254898adb22d637894b21449d7f03680c34ce45ac35a25f8d9b11a5ea093fad833ce07509c368d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bc35a0982a613d68e1d712965e9caf1
SHA16cddf94b88923d29fa41d418f23e87c2dce47d9e
SHA2564d24c67cfebb83ddb2cd6ed19806c57f864f89b8bcfe2135e42e317f96c43405
SHA5123ef6e62ea299cb3e013b5979a601c512e5c886cc8ec9ac03c0eb382049ef889edc5072351ae4660a781097c03d03c4fd48362c38e4a43fac62a6342774add4c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0b7a463337a69264fa350d8e0442f48
SHA1d26e58934c05ded80b233e44c10473e149fd5e62
SHA2566a76fccee5de81634b146f4bde98ae78f31539ed3187cad5656ffbadf88c4795
SHA5129524cf592060163f85b3039ad18dad4a04e434c990f3ede3a9e73295d628763e68d0911dc75a1f3207c1b96393f521d7f7b9eef6ec54a79f3c7d2a71f6b223ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aae25319fadcdf988717cef6f8639500
SHA16d49dec22d1916f67086bc85a2dcaefcb0c25b50
SHA25606c2a786f59793dffbb631fda593e74c674ea58d83a43c88d858b884ab59a6b5
SHA512493c9e891c981ce28415dff6c79a39e8072bb4abe83390198f51eb05803210d71c9c901a0d04e9490ef968073a56983e0b799a3284b8ae645479348deb3a5bc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8d2e59b5fc8d1d670018316b6da1a22
SHA125404b5493848dd43ad176c86ab7bdeb63a09cf0
SHA256294acadfbf7e3f21329350574ef9896d0223aa25c494abd4b59fa4ae426f08a2
SHA5122c0a4fbfba8df2b907c35bed08fd3864f994b7ab69925b046120ed9b5e960290b3d84ff56000ad196d6a1254298ec8599061e51a8bfa827e33b6059565730ef8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bde1f57b49d4c7756f35501f0583234
SHA10cebd83e9874382673e821bddfb55ab429c41e1d
SHA256bfdf86ea47962a2c53dcd79385b373f21b73568547adbc2b1c6835bd16eadf90
SHA51216a34877eae9307cb5fbc24e4db5652a15768299e3950cc636ccdaa3262172b405f7a06fe70375227f478598c3bb4cd97f06476aa3004f16eee59acb0774c223
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a53efa46301fa11f484a0e0ebafc03eb
SHA10376f46ff60d0a00d819fc3f7e5d4304ef1bab6d
SHA25697387bcd768004f3faf481e98c2a7363c157624e974e9ddfc0244335d1d1da25
SHA512c7cc7531fbcdd30f0e977bb1c0be9c15d7c66b6e8c493e24c96c580be8cbad37f16c0808ca3b58ddfb8a3701c3e739ddbc0357fa6f25c09c048fcbe8ba9c4e12
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b