Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-08-2024 01:31
Static task
static1
Behavioral task
behavioral1
Sample
a90b285b5f19276ffd881ba614fbd303_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a90b285b5f19276ffd881ba614fbd303_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a90b285b5f19276ffd881ba614fbd303_JaffaCakes118.html
-
Size
7KB
-
MD5
a90b285b5f19276ffd881ba614fbd303
-
SHA1
5a226e7b63aa3e4f85851a968fe8c13dd87ca793
-
SHA256
d5bf020969e00bec5bd31916b2dae24c7ae37dc492dfb3cab8b800d2810de6f5
-
SHA512
5d6fda107a3f3601650fb9eb2e3a253a33d24f982ccef8a00b9cfdedbb7ce8f2ebc874fc5d6403353ea34f29a67f77da86ea477fda818c48a0e8e6e60e4c1dda
-
SSDEEP
96:uzVs+ux7lYLLY1k9o84d12ef7CSTUrzf7CcEZ7ru7f:csz7lYAYS/Hb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000bb46fdcd17b55b159c21b1b5215504f7993a6a94f12f1b4f8a0c54d42e1a4704000000000e80000000020000200000008b37d2a7331c8ee7a4323fc4c403b29435c0da24ae5ec2629e1db10b4ec7d9a920000000445bcc26305ee2a510f949ce406d8466b8146ec9cb09190bf23bc375944e760340000000b4c6ffeefec138731e7ca5ee50d6f6f677f7ba2b69ee4531ccd693167acddac4206779e86734a880c5a2b60cfae662f0e7c14ca3f84cc63d9dda44faf938f5ae iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430192953" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BFB594A1-5DCA-11EF-A1BB-725FF0DF1EEB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0ddff94d7f1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2852 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2852 iexplore.exe 2852 iexplore.exe 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2360 2852 iexplore.exe 30 PID 2852 wrote to memory of 2360 2852 iexplore.exe 30 PID 2852 wrote to memory of 2360 2852 iexplore.exe 30 PID 2852 wrote to memory of 2360 2852 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a90b285b5f19276ffd881ba614fbd303_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2852 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569ad3cf4232ba0048f074bc3da7cc3fd
SHA16fa3460a0b903586440d0ad3c99929ce0830623e
SHA256238f9e525d93234fcaf27038fd0c7fb94d00177df6bd7a3fef8ebb4f6e873fc7
SHA512f73d08f12ea71dccb5c94b778f4566809006e4438873020ddd892f5f851047ea372cfb328ea16250046737d14e273b4a4b68fd63cdee2054ee376171680a618d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dab84cdf53aa1d0d321cf3fff7b92fc
SHA1dc546e345ac037371686dc5202a9aa7563fb2649
SHA256aeeae342e5b20cee62f2f2123c49e5cd23f337107fc7af820bce3cce1bef86a8
SHA512fc76fdf887ce76ac5dd1be46985624c8486bb98476479cff087d3cebc19aacac0d4dcd7861f9327a26aed08890d29d67503be1bb4dc3e7779c05e402034505f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbd21bda0dd87b9b1f90992966868fda
SHA1fb71d7477a99b94923334fed2aa5e46b4357e5f1
SHA2560d2ecc009b0404e02fa9996cf684c6a00612f323cef7761a635d4cf4ee9d516d
SHA512d20fed486da5539702c3a37c97c945ea273280d0a1c3e8bbbb1f6c57f5f9be6f724b672db791be40a48a07e85576c3def09dbc6e93656cdd6115486ac94c37ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548558f382ddba193cd2f845574ad575f
SHA1d7d043759509cf3399017c8d94c4bfdd46e33e7b
SHA256bb1396e5ff7ff42672e3ef6d7880fa81efc3e79396c82db7206128c12c92ead8
SHA512be9f215f7a516094a6e2ecb67e9833a593236c04532a4f1c8262a02508145c595430beb4cc054127546a12c958bbb4a74e781c05af63104fbea43f113cf2bd9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dae9f2c3e3dadce9a388cf49642b692
SHA1a5fa23a84ebd441d2ff3e7f267d28044d2d378b3
SHA2566b1e1946d41e5c6d951c4fdd94d990cc3d84630288cda1679b3500b109ea1656
SHA51202c29b4b77b70efd6126c26b6e09f1e238aaa26ef16100a9a716824b2a053c27565fe994028c3fd2442235734bd51a8787f580a9b1f9249443c81d943b167ef7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b02f65018676470e147c3a15852df800
SHA1ce8d03691227e480231957279aed4ee17146eb42
SHA256fe8db340a80aad4b5bc96371e0290dd8dd36398fe8dac919f02a15981760a0cb
SHA5125591c1ec668e5903fbc919deb6869ccaefa0a0822566ebeafa001a6c01abe568f87ce6c365c53535a8766aace412e132b2c2ffa7d98320538bf1608817e65372
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a139b96c244a39a4f51609dc269923e5
SHA1059356e963ca4e94ed37fe2ec642c44ae788980f
SHA256be879b465efe37f46cb17df313e1ef6340f12a317c707792a95286dc92d60898
SHA5122e1ec08a9c34db8f2e62f30ba432ee338642536e344997eb5c32091087cc58c990ff76cc6f4460bf825dea513d1228f55c42a3f0e4573edf68eccf9bc74afc3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5124eae7e7ccc23cf8c5c511389cb5822
SHA1df193199e935d80bdd2882885d0a62c18516c9fc
SHA256297502b0b6d6d4e8afa8c9442d67a9f71ccf3b79c777696e7f0a4c26d3598935
SHA512a99e5f1cbecfd0d2a66e5d4f9fc82d5884f29d28d5a180b8aaa8addd1d741482a8d02bebe1473970686f48720a0c8a03261d3c331d3a467fba76ffd962b35c00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587cf94e39e3a7d319925f0674029a158
SHA1ba184baaa7104f515d2d787f12fabb2b189700af
SHA2565481531c38ee04b8c942b28d186d941b2b53471b3ffedf05b7043dd49b454d10
SHA512a46814f563cf3b9c6e8bf40b684ebf7de61cd7d134b4d349bc1fa3424bd4ac9889e0d87917856320208af0705af6ab00ca984c8f030d198a31e9efbfec852e58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f54f35ebe1983b4540734ffaab141dc
SHA180eb7b17b3a5d783023d4acf2a6dcb32c27f9536
SHA2563f8d2695707af9568fbbcf2debeae21a00dcd937c4dd24762e13275c4cf21a29
SHA5124f99f85fb119f875643e2669133511d80f8859075e2e691f22c7775a25634dc79ede5cf6bf546737d614f4777acde35b15b1b310909404b8bdd6b695b75bf71a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3a83c37f6bfce65135ed1cf434d670c
SHA1b6bfb72ef3b64d30144ce1340d6133b179220586
SHA25626279738d51649a8bbfa50a9f879c0b02544d92177626809f0b9e85fe23ce69b
SHA5127dc85d8db0015cd0a664b1709406dd069c251b3547b409e1f22a5b320fb97981612be9a38886359ecb5cb12a101e268c174da5da22f65d7b905b0d6602edda21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55278f3e8611b2b8f2d8143f71e463914
SHA16c18465fd0d72c1198222e49fe311c1d670792b4
SHA256aa62002da0e84a621fe111e8b19a6d25924fa12a876f0e567bccbc5344c8767c
SHA512e2b99253115023c61ab71d011c552910ed142c404cbd6f6d13abb733ef2e7f268be7910a2b3faf1fa710d91c053f823f9896da64ce408d93dd5556f9d8ea685a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582dffb84ce6b7014cda4a84a9bd2949c
SHA1e8aeb099d7dcb3ad025af83a77595d17751b9587
SHA2568abaa93e578a9664974528cc78da9810e85f3539e5a69ea5122ea29df52a2faf
SHA512fb33675471e08a0c6e4010bd4ec50fa3a0fe172f8d5fc6a57618f59479fae079038187d5e347f09988963f8a373e5754e70adc42b812ce1a1ccbfd7198593cb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510a6ab9d27fdd752ef92de6268dc0880
SHA13acf925dc8dcd2dd0c9467894b54b523bfd83257
SHA25653d7f41dfc7701f4d071fd0faf5a2425ed1b1693056ab59ccb6a192575fcea4c
SHA5120db8692bb1fc3cc4dad87ccaa9a1bb1d9205d8ab80de5e6cb2db648abcd7ad97c6f5d640ea5d8df4f6c82f5abd9d458c4fac28b97fdfe948edba5e47bf4119b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5455eb84b4830b6c168b25f6a7ac4f56c
SHA18d2ff6903870c64fd412806127b1fc9c46439756
SHA256f898e1fa11c61b0d3428af5dcd1fe6ae687d15acbe400b416f3abd960b8fb99f
SHA5120a3ae58f906bb36b6fba0baeafadc04bc3ba874cf8eba1df1b861c1c91438a949e895357d7db5c05ede186c1060b0cc0b67849b359c642ce885b87381ade9517
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f2fda70eac1c687afcf044ba6518d30
SHA102f529196820865dd07ea1a9b2bb207736fa3d7f
SHA2561a76eb8920e63958fb9d6f689e07e7ae34d0be2606b1baa25cdcbfbe8338e92d
SHA5127162dac300a2caeeed11285dddf9943b1988347771eb184078a29b32188b72692ccd366609b7018f5fc71ac8916928619225f6f6cc1819e45457b3cd19ef08ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d03f742ba15de57b98b2f54165c97d5b
SHA14eb8dd1c4b8b517f33867ad534b55102b210e1d5
SHA2563b809e714ab0bb4f183913879680f1bed84b2ed92920724676985816fe74babc
SHA5123eed031989b7ddd0058f9822452d377df492d436541229536601ba0ca53bac4d173d50a24de8dbc6012b9738182d198c1efd40c02139be6891517ed8ed38538a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5885782a9f4bd9c46ca65f9a58006e1bb
SHA1ca2572012e8773f094b45bb43b578a35b2426f3f
SHA25663360447a17d43ae4ccf39cf1750e306c674040f8e4a53b031e41a9ac69d8f48
SHA512a27cad0a406a50baf3a72f57b0d7d9e1727b3d432f70719034e02ac014a671ed9124f3dd751656a7ab9b011d4deff85292eced7678b10efe9bb713cd17db31df
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b