Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 23:49
Static task
static1
Behavioral task
behavioral1
Sample
ad157bb45cbf4d311b29426cd9a3ac45_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ad157bb45cbf4d311b29426cd9a3ac45_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ad157bb45cbf4d311b29426cd9a3ac45_JaffaCakes118.html
-
Size
16KB
-
MD5
ad157bb45cbf4d311b29426cd9a3ac45
-
SHA1
4eeacf139998c6ccc6eae92ffc522e321298585b
-
SHA256
c6f2d38f214c9d0b73bf0ca0aedd3b68b26ff91108a6148829b964afb1c874f4
-
SHA512
a5b761a77ed4ea628f0ac28550369fce40aa005ac6ea147d9dc0be0ddb9ebb426bed4276f516025449f1f8763687ad3050feb51cc98ee0846a2b071999874bd1
-
SSDEEP
384:SDA9uS7vXRZo0d7P/ZpH/3WP/TwkSZUg9fvk6yDBg1f7IJ+nSedy+dZ2/4Ep2soo:S0uDChpHfu4WLGAWwgs7K45D1BvG9Bw
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f05b068392f2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AE75ED01-5E85-11EF-AD79-76B5B9884319} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c0000000002000000000010660000000100002000000068c480fc1d3427c1f9a70737a1359eeb5471b074429170e661f63ba76977dda8000000000e80000000020000200000003fe14305572e760da5956c7583b5cba0f79e206d8ee3cc439f078affc0b2536020000000cb571f4fd8f005dd78bac71d1a7dc8f9c3a47d8b16a3a8613d4487c7c0fbed6c40000000420caac7157cf21c154afe8452e33e162c48a8ca7aa44b738c19c6c8c305b5ff2759683eb22d0b12ae5825e37efd4160a64d55f5af0f89c7773b284fdf58d6e8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c0000000002000000000010660000000100002000000061ae305c97f0b49723c01f199584e85924460e9294cef8a328c377a3353b7792000000000e80000000020000200000009ac976a89abe3adfc425bcbeec115ac6cc258cf5e312d3969b11f07b98ccdeec900000002f4b8fec8ec9b373f08de6d95c82d7a365ff26a406702f4e6e470d5985be68e7f31d356218739845065c00fa4aa2460a1a3b8ab9d1d30ac832613e4315d5d899d374cc1e06e6efc6f0a83f201a8032812880c23e61b5762e081d53ff99fc39d931916ba2cf2b31b1747226e0061e4174939ce4e7174aef782c0170d4e232816c4f1873fcc67a2b2677fdecc97f565afc400000009578ee099cd07f71ff40c720dfcd291a0cda09cf0d3cb4a96aa6074e70edb108bb5cdef9c2fd6fd6f4b218053d71c23b04b272994e8010e6f72b772c2150cee5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430273240" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2468 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2468 iexplore.exe 2468 iexplore.exe 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2488 2468 iexplore.exe 31 PID 2468 wrote to memory of 2488 2468 iexplore.exe 31 PID 2468 wrote to memory of 2488 2468 iexplore.exe 31 PID 2468 wrote to memory of 2488 2468 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ad157bb45cbf4d311b29426cd9a3ac45_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2468 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a43493de3ee9c0656df82bd3b257cff2
SHA1f31767e10818285e60a6e2dc7fbeac861c8b9924
SHA2566e3c7ddda8a9d3addab8e16e667505472cb141b9f1d7a19602964e110703fac4
SHA5128c0c66d3fd8e7095eb06e7482cda853d2757590025036616bd599fb6a0c544f163c9800e9b9474d3312681d979a94c63c6bc0858d3655e8ab4306674cfbde318
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD598d11aa00b828ac3534bcee9df3d7bbb
SHA14dc5d34a2a9b76fd4f2367a1a5b3e527dfdb66eb
SHA256e4c536e8aea09399427ffe8df15a40e5d2a5e5f9977dd3edd220d5efaf0bb9b8
SHA512242025c375412d142630970dbec19f4eb990077c5bbfd674c0d6e3baadbfb642bf9f35f9b0a7be5f9f1cbc6789b0038f84954f66a4a226c9af062b09c2b5f73b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c8eda2bcff81d77d9ed5b26bbac9be52
SHA13cf0d9cc2592b0eb7c87fb4c82cd564458fbc86a
SHA256adc0f0e9c498c2c4e47f42cb8d9b2b087b7fbafdebb48d09eca679c1e4f7738e
SHA5127a5f245455a09fad335c93a3662319b21854eff367c44da821d3f7be19e7c6b212c04ff5d1be7f3a94ee177c1ea2b48bcdecf6ac3e3c4cbe809991767c472650
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5200141a03cbed98cef45c2f0543ffaa7
SHA1dba99d56682dfb5b0fa440bef03bb3a58f6ff0dd
SHA2567589be6ef0cce22b0ceff701082b88867b193a195817ac71edea933f868e8553
SHA512c1335a0589b0a5f34b0219175280aa125af8a8cab14bdfab17dbbf35e92685add188c7afe4c5942c36f1c676453348b02844a123f160ff5912a70672a17a96e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fdabca3d79dae6c76327352a9ad2a6fa
SHA1d2f8e98320bc17ca135deaf2d9b9adfc49ce4b0b
SHA2560d42628f24aa0c73d2b48df5383eb4a403ee899ed59367e0ca251f1497497920
SHA5125abf00104f1787f475eb3e4e5afbe81c16315923b58f931bc86b3baf9361d50a26ff462fe6beabff0453882f88a519c998ddfbb463bb5a03ba0ec93d7b9f1764
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b588549166324d172b6e816c25315329
SHA1c06c47290ea3e36c93c92793627c80400737080b
SHA2563bd5b4a0d716a458e115742945c26c487f96a24c47c0ff25a14e2bb22bba4fb4
SHA512504ed5d7c520e3bfdc2cf59acfa07414668904ca2069b292680dd1c2d0bdb7dcf834156a751a788b566614fad818c95fc6570792a4e2802bba3f11f3419a833f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57de157930cd57f7d0a24758136c8b393
SHA13d043c0c86784abc5257199b63fc24c3cad4f762
SHA2565f9d00cd667991ab041ecff9a35cb5779b8e04dbeeaa99f46b1c0c370a6189d5
SHA5123c9c7db2d29098e32e2003846626f39c170ca1afd0063eca11aae2ac5984ad879384a9c7f19abcf03ff45bfa82885ad881ff771f3dd8992ee36b0a2731080966
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD552ab60fc27fdb6233bd2b1ce9c1d5b2b
SHA12105f0097ffeb733f9d932685e53dcfa18f30f0e
SHA2565b1ff14b367c71f9cdb12ffcec5a4863a804857aec9e67a2d3d1f264a46481bf
SHA512a4574ce1388d3a5af91a57b2b59f23f8c40ff10ee862c9f295f1fafc69e9443f5ed0e109630fb136f0a960c392cd374b29149905e8b75a3fdd29caf09f29bf96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55092614a92f14fc93370712276accfab
SHA167d29f9d7962e65f802b49d8c7e8d390b08b6e9f
SHA256cb0cebc64b145ca26965e833c533c31ba2d11654bd97ce7718e05cadc80f3094
SHA5121e447df31c6138c53c63df967246f6997da80b6ac0676ad94ee52d1bca6be4b810c5deba6fbdfed44e1656166efac5ed42c528c53527c6fbcbcf7acc2be1182a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e13fa87e6c42efee0af63245ce16f468
SHA10bc4ef49016ce6eca44bfc4ac1b6d9eea5750b21
SHA2564ba80c890a54bf593e0deaf592c248c9c062bd3428fb05fb98a86445c4c37aff
SHA512cc2bdac0cfecc3e0817c7cbb031d3822fc686cedd6050d59c50cafdacb369bb9ed53d248b125122d1b589a21e03057c4e19d908ba8cd5ccf3525667b7c245d74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD521beb400628060ab695e6f40bba2ba88
SHA1c2bb5ee1e8da5cda28301ca6fa2a2dc843fda7d0
SHA25637fac283a9a99c928ce62bf77dcc4e69d17cc203f520abbbe855b2020ca4ab0b
SHA5126c3819f784e931fed96c81d1cabe74eadddb6f75f2072c4c02e71884ead21546345b821bcf9b130346711cf03e0a702ac6141f5fc6565b542a2873d2755f57d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD511be3178c8f11a2cfdb80d52a4451c85
SHA17d0dd81f45761266a8342e3b8b14a5978b31ac74
SHA2569b574afd16b8fa3cb2eaaf6fb33d3471c3b2f15d4a8bff54544b11a9e36dfd41
SHA512b97886a7a56ef32cd80c2d679ca89d8effc09c73a51c0217c7dd0938f0fda14bb7edb37c73fe8fd9ae941f1f51a0b4780747b4e379fb6d37770dc937ead7af86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a9fb97d0fdaa7dd563ce328642d1a2ff
SHA19e9cfda2c5f220bf105328a830d8911114118ec5
SHA2565d223f7271a4472c2bf9dbe19f4b79c1a6385a92083d71abd800e868dac9b284
SHA5120f907b30138b2f28165d55be6c835d9d50b0ff09d231592d573f8f9c4b6a897d2422a5ccf0a26af359dea1e8a8e877a265385ec339c495e141cbc9d14d654690
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b