Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 22:12
Static task
static1
Behavioral task
behavioral1
Sample
acc88e8afd8cf78cfccbd42d6d6bfe8c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
acc88e8afd8cf78cfccbd42d6d6bfe8c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
acc88e8afd8cf78cfccbd42d6d6bfe8c_JaffaCakes118.html
-
Size
28KB
-
MD5
acc88e8afd8cf78cfccbd42d6d6bfe8c
-
SHA1
5be95219cc4ec3addebce81e3881818244c5fb03
-
SHA256
32b963b7e34c2b2c7a3e2e2ba4dc2c8b5d479f351593760eb1792862da80c128
-
SHA512
c373703e0a94ec14a4ccf196c4c831725d43076993a4baa4d1dd67ccb355933665863d8942cf8bedf5f048bba8d80f5bad6dd0544cb227721f9f0370b2791a7d
-
SSDEEP
384:9TOIBb/810BIUsgV2z5R6unKNmJS0TuWVWje5a5Cdip1+ZM9eNoETPh26gaZ5z2p:9CcbzIUpV2z5s4Cn
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430267391" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{10315651-5E78-11EF-A205-6AA0EDE5A32F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000ff7b4b81a6ef963af1bb3b93d8e22cd4cb3221a20ec5873677ea6e7c0a6c105b000000000e80000000020000200000006b8de2e81881233d2d8ff8a920344671102921307af161d7ebc2a9ef54ad066c20000000a10117d4460ee200c7063aefca14604ef2d1419f5010d24c9e4b7d9d8984119840000000500f34bc29b5e0a4a5a840dda9ad35ea9836fb996bc80f39607b9f72b93d87861b895bec451b6ee58ab130d0dbdac0ee6c6a0a06738f92b979bce09c73c99065 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f01e3ce884f2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3016 iexplore.exe 3016 iexplore.exe 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2692 3016 iexplore.exe 30 PID 3016 wrote to memory of 2692 3016 iexplore.exe 30 PID 3016 wrote to memory of 2692 3016 iexplore.exe 30 PID 3016 wrote to memory of 2692 3016 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\acc88e8afd8cf78cfccbd42d6d6bfe8c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3016 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a6436b63f8268db2ffed7c841bfce32
SHA17aeb7ec1ac9da9c682185e823e50efe6b270c0c2
SHA256f6f92b5677591b76799181a5a78056894fb2d511639b5ceddb3051061206856d
SHA5123791fb6b0fa65356993bc812c9265109bdb41f536cdd3934dd8694457cb365d74c8291a8c89d67f35786a0fa6e207b773dcfcacebf2cdf7a881d458c619f03c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e68b355e85bab7e8775de2ff559e2ca0
SHA1b858118cb8a3d9804b72da14054dfca2a2b7a5cd
SHA256a66347c52debebcb31cbaff289d64e5928b3ab7398ffbd8e6b1d45ca02f5698d
SHA512d31509000c78c17a8ef6aed60454ab5420e637ae26857458107200c9801f25be4c56d1a1ddf4469404de72adf6dfb65e864b253b1c5790f431bc62b9fe6cce06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b7231b5a649ec49ed94fbf9cedb48c9
SHA1570795db059f2873b900683bf694164fb93029ca
SHA25655ecd55706bcbe59ae4372a2d15309eccb0a890188787ecb00bd65d13605446c
SHA51229a1bc5b2fb720f6ba84cfefbc069807c6dee22fadd6a2b67f7a9a25b605cddb1cfe629aa398725b98c4dbaa2d78a61765a115749d4635f7631d60b33076df60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab76eb0bf3b632c04b3bf418ffb02941
SHA11bf1a96231a2d493d883ffdf719997ca4b9e6e53
SHA25614be5fd6a1bdba1904e36b91d98795ae618ed28222059f91ba564dcdd1aea762
SHA512a59594b2351c82c7eff8c1529ab75032d6fdcb38d145c8c3ff565e6c88c34dc4e563d6d63858b4618936992669c0ebf27cee4123bee9399f6aaac7f32d09f36b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529960ec724ecae365cae97618c38ede9
SHA10ea21695e3e2e0a55bfedd1b79948711963318df
SHA25617caf5177e7ccd7f396b903b68b831c3ab87a51222d44474654be6a1ab89c310
SHA512de71460fb8839333c452d4fd4169d8e48cc7ebe287db1389c3fa94d8e283a03e074d2f1c277e53872e12ebd0bdbdfa6719f3b856903a3f5e2f2fae2448de8d67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9c6860528403982cca7a5ae0e0586a1
SHA1b5248c49be638a2dc343118d1dee0af9a8af9e68
SHA2562dbe72ef41ff9b70bc932881adeb92a4dbdcea5ebffb265077dc2e835ef75e19
SHA5124dc500626cc5469278e59a2c7effb69cae3c3d65083e1d5fe2b13bf692ad6967b16f390f8bc0509bb43900e0b69efb446004b150e6abed1a6cc7b00d628f156f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eea34467e176897349dbd3d5b7d447c7
SHA1836c1109a658599ec18f20cd74b8301704843f09
SHA256a8b26883545b4844e8541d626c085470b96d33d2d9bc204865426ed99316cfe3
SHA5120934f04469b48bd6188e60d484e1aae221b39fd7fdba6a9240d1d4887a6a07d55e9b480c76578f4d8dcde94246205f692681e63f963ace0f7a2a30c26b676ebc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abcab1c32d7f289555af2d9adb9270fb
SHA18f3ef316cee5ead0c199cb1aaa23eccb61f14f05
SHA25622fd2c404c9ec6f1e9fa943f64c254ff27ba156cc9c6f43f2be257a86489a0e0
SHA5124245bbeeba8a48c6d3e4024f9198d6cdbe866a8f187975acaa54ff0ef2f9965309227dae892f49d5b8183f1bf1697e9b25cf1bba4f3f68f4ccbd48950b7df5a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ecffd086d35cfc63de323c481a9d7a0
SHA14fb4c28a46bb0c442dcccc2af4480024440b9656
SHA256ac4fb93236a2fc4b8605436bcd5de30787c1fe055f8cbfb4cc3dae6c320e13b5
SHA5122642336704f1fea79456daac521a150a8e4f78d2d5bea36fe909e8cf57f4a2328626828ddb93ebb3ce1aebcc495157e6d4a0c1e8e8628de74c8443f34917b0c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ee4d5b77f6c0e283119e08cfa126e4b
SHA17ff57d3b20d3bde805f4320c76c9ce39c0317fd5
SHA256c15c46632a6438bdee20d40cd807d2cbe957e2254bd5af3d4dff59cd377e7b75
SHA512360aad47cf3a52314a040b20167cd7000f0afe411da85ae05a6896ca3e0a28863d583581f462925a5701051d8a3b84a6d97e9688ac4f5d141b02982b54308ba9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b2af2d51cc0f90d86f5008fa9cd252d
SHA1b13ecc6049d1beefe5870399a1734f9822f6bf41
SHA256396c7fa3134c91d65b746cf8c494f4e7193142dc1c7951e15dee83ce66ef2c18
SHA512fe426ebd793520791582927a855887bcb34cfefa213af01542df65319ea933aa5d5c5b2f7c81dbb3ce62270a884347e133029c742ea0b4d00fd8632c6a99d4c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5499bfe36ec1a3a7ed843553db244edae
SHA125715b6950b95cd2260d09b116d0fd2f79c55d33
SHA256c46b5d9267d54e5f92ce15e733b4317ea8d8a842afc70de4fe47e397df7977e3
SHA512f9a2db35b5ef70e5dbb338c618bca64544e1f6d9c935b73150969e69424c99c771ca6000f3256ba9963f321885161e599b0e6d2d0d901a87b840f5205fd1c841
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6c9c4db4fbf6eeb5988bd23a10c0095
SHA1842b97c9caa03e439c8cca832ee7926efb132e0f
SHA256e94c9cedb557f209cad66fd757d10ed6205e39d5eeed74d4d31f2d901395d179
SHA5127ed3253cedcc3bf249b5200a3da816c1c6b9c3b39fc5c65b5eaff96d9d215afb8abf900d88c354a978303913a6ca6e8e64de29077c622d077e3f17b1b1986bf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de9a39d7b454977130e76cc71470744c
SHA174f24e424a185fb14bede7097417c56382f351c3
SHA25649ab640e65d298aa5909ab701b13ffc4328d9a452517fe7f1e8934ad05d0702d
SHA5123bb1b8852fc8156aec6259e6b1e9bef10a207eeb3e8fc94a0a018098b6e0227bcd4a85d8571885405a530a282e1893ea7ab854956a5f10f068d02a9250ad1657
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557f2d46d4f08dd36312c8074bbfc99bb
SHA14b523e831427b5a26d8b9b3477424f3d11e49e80
SHA2569bf84b0ab2331c46780e84c56a542689843c2682c708dd728518ac4e2de923c9
SHA51280fcc7dfd0f73e272ba9efc4cf1113c6af1109d31b00afdccc4736b580b8c6645d90816f5ffb0bf420f547300f8b40fa3a2cfc78aedb5c3270ce5cb862e72e15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e30fc7f026838dc7cbdad4a1e23904e
SHA1b2d78583a68cb83930aa52858ce7cd6e618af142
SHA2569b496293d70eef85c209eeb9261148dd56854f4dfbbc324e8261566ad55c8cd8
SHA5120b2b836d2368d7a22f9ebd065c4f55b91bff5bb64d88cd544f75787c39b92c33394d4da5b148dc60585e76707a6f4c5a176f0d2d432b5321549d279fd9688aac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54efe0879ceff23bb1640b9b3ee8d4453
SHA1fd7ba3777087cd3a4692e11fae30d3737e1360c5
SHA256766d0f98d154a8bb2a5642f178d3fe7472ae8531f3cf6e3b50e76ce1ba628c30
SHA512596652004172a4b2bfcff88667fe05041a4ef4063ef16c7be3856e4bbc47ce6d5bfbcd35a6112eb998d6ef52cc17de3af916fa8572f4589cc20c893ab9a10ee6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5850aa22b9564eaddcc67ffc0fda672af
SHA1bc2489a7f014d08f64f72f013d6dd7069bea3b2f
SHA25626e937b0a1cb69d3d00a4dcd1c1b241d1ac8bf91531949717a523ebb0dea8ab2
SHA51294fc767b51fc50b76d88f1525b3574d07b939d8a41e6db66483534cf6ba7d8be2dc018fa5d488ecf1f201b763cdc370f7960fc40ad4e266ab91efda27231792e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ecf859a6fcd0ab0708bf3a7a85386f6
SHA1d2c0059503da9ee82572400c865725b6a9a61a0a
SHA256b1885ab8a749bf70e2fb96543f1fd9d93a6f6a8b800f802e8ee0615814205580
SHA512ddb3d02cd7e0934bf8db0b21794d703d078b2f0fee39e00ca232c5c7c4c291e959b2a84273a9c626f3c185919dbf9e3a01cdadf19fde20efb6fd84dc53ef93ea
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b