Analysis
-
max time kernel
66s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 01:58
Static task
static1
Behavioral task
behavioral1
Sample
a921912da0d956f59d9a260f6f9fa3d7_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a921912da0d956f59d9a260f6f9fa3d7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a921912da0d956f59d9a260f6f9fa3d7_JaffaCakes118.html
-
Size
10KB
-
MD5
a921912da0d956f59d9a260f6f9fa3d7
-
SHA1
e1ee2d82dc3ec797b6d363ef26ccc5532384d7d5
-
SHA256
b699eee78cb86523f16387f495e0fcb505916b5eee987ef8d642e38f39bf23a3
-
SHA512
e3ed5ba939db503bc31d3b4321a10cda7081e3263c9151161794e6e337547b41b84deae2bcba1a4eaf7fd07b7cd6589e265be2ebf0d0faf7ed5c9739cd59595e
-
SSDEEP
96:uzVs+ux7U5LLY1k9o84d12ef7CSTUBGT/kGHp7+RNssJiusJbsJylVHcEZ7ru7f:csz7U5AYS/ISu6qxqbqyPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430194583" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8BDBAAD1-5DCE-11EF-A17A-428A07572FD0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c9200000000020000000000106600000001000020000000c9440e4af94fe23e595dd7983de6cda47f1245ef5403388f5923736db591a294000000000e80000000020000200000002c6bd1f4d362d8962f20480d37fb1e40dbe8b684ca0520838de31b891fc4423e2000000033b9c835f862300e3effa11ed91324b0e743e58bd44c3a0304db623872b8973940000000f43ecbb1fc152163c741d6653dbe8c36156251d9592499564bfbe70c34c6fa51b335c47d2bcad8d4acc0b11f98bd446740736951a78e858580b5716da288b2e1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70e0d160dbf1da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2000 iexplore.exe 2000 iexplore.exe 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2680 2000 iexplore.exe 30 PID 2000 wrote to memory of 2680 2000 iexplore.exe 30 PID 2000 wrote to memory of 2680 2000 iexplore.exe 30 PID 2000 wrote to memory of 2680 2000 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a921912da0d956f59d9a260f6f9fa3d7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2000 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565eef3e8d043a26c3ae4fd04c56a9acc
SHA143eb70444d2cc1ff5e90769445d3a63d21d6a503
SHA2566bf53fd4b37e7639bc409ee19cd04fdc7ba98090dc64213b40a797f7e66ee527
SHA512c97d24df2277f890557cf24172332f331076bca98acb19ffbf31c6c50f389c8efcf070db2558f05c3a98062d9b975647a00d949054f57465147134d71b43556f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5460c074449cee5ed85d38b9326692871
SHA128e66e75da516c91a1a72127f75ea75874257836
SHA256bb0bd697fda73fa1faf1e531fd72990e08f756c28f82609bab48c41f2776bef0
SHA5123f36a549d1969c989668aec5d62f46e767f8f6159206ac65c0a03422aba7ade9079d0971c5b535e84363a6740f98ba52eb9b67c5c7d629d5c27403e68add1713
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b85f5c69fc875e79319d3b13f744bc0
SHA15d1d64e45259ba0bedacc1224e36f1716cf66b59
SHA2568c660e32b9f8d66728be21726edd2647b9eadaa9f20d38bafe403fb66f9d67a4
SHA512dd34dff7a0f9b8282d4d4079bd4842164a8a6aa3ae0ab633d69ebd784e9dd69ed5943ead0b577694f44a46c24bd0d7f88da535b1dae524c3f563d50a35c1e048
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e22f380de3652438aa4d3276b75828f4
SHA1da1f631af8331035a688911a127d4e5b5476f8af
SHA256ea29dad1b23e91f2e0c743a1ea12942c8bf6753263aa376ba0eb89921068ef88
SHA512bae643cdfc1beab013ea6d6dca5782627691252862de951e59575dfcd9cd7c54c37852be9a1d90a626bbe2c5eb9254c0d81ac8223ed6ff8eebcfa6d277b793c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54962932dbef584792cfa87289527e3c3
SHA19c6315d98b7732e08e89ed77cde97b7cffac487d
SHA2567e3608452cf730561c0fe9d5738f453ec8656a3ff9c1f0fabc365e4609f99fd5
SHA51220b73e12830d08e1456a3f24a93a96cc54990e567980d015bce2a24a722fd086828bb6735bd2f7661019c421f3d05726c9803e9d1db468068a77f60e6e88cdb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aab20ecd741de752eb52804f91e528b2
SHA18394d753691b1e310b1f68853c8ee849c767aec3
SHA256295ff4d52f2eef4f46d08b531075bf199c174dbb59275f2d3f6145298b243a20
SHA51278107cc7de2168f58dd8b9fad1646445fdac91c75e9a2d49d46ebf36f87d523db6d40bbd2dc91a180c076c9c82c63c8004e1f9501f80f3bfe348efcc6cd1db5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d62d6d0e76ed51b9bbb80539ad33bb1
SHA156f8a3d7c3918cc882f84f66185e3a25758d6d3f
SHA256d6cbbff43e5b738d985549f46542a027985db136916e4528d33b5681eff38b1c
SHA512937e995c39f90dc77c5c9382a5f81c5375d5faeb13020f1b00f34e8ac037bb5a37448b20acbd864e3347a48b90facd92394b0c9c6627c3c93799f6f425b5e2fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b376d9655267aa8d2fe94c89928de0ed
SHA1ed9ea2d29111c6907773ef46f343cfe37ab20ce5
SHA256cf8487831cecf4ba27b5343bb0516fa2f5257bbbc07db822576e24096f93757e
SHA512f309cb20aed9a7b6ba1008703fee945d235842b6b3220d47728487f4aff37a337270f833d4c152d0da1628751d13e934a63060bc1da87330589b3ea4b009b5d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50953dea59244800f19ee5ab10f4432f0
SHA1c5d5c57ada411afe82a687b74ee8a7e8fb8a6928
SHA2564d5cd6440af5887cf8d495d49846a6c3d77751a8ee2dd9350ffda2a9ea505887
SHA512d017385811b766565d93f0322f9861bd948d77743f84372ffce4c2587cb684d8d5f9aa4961cc8d5e9998b6deebb010b80775b4ddc47913aed2ed052bcea205f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c61befebb08a3527174cae44f9c06c6
SHA143c5a4858f255c94fffcca7680ea46156a037024
SHA25693a596908bf3df0913a4952bad5099c3ba609d67bbae2ba2bef964bf49c06981
SHA51237bff19de8daaf01a389a0789b3ca599ea99098b782a20ef7b621529169a1e4b4093fd2afcbdcf207adb498da2db2830bc645d5e699154a0eb58119b21b60db1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f9c00abacca5b9c70fe99862f35c22f
SHA15bd524ce1f636b6cfe29a13da06a9c3517376bf6
SHA256badd5c8d84d3b850f3c93e6a8ef23bba3532c7f4ef6db1b6df23c65facdb1150
SHA51273f1f9ae6838dec3f82a7ac7a26acce48708bd20c44edb7982db387453c1447fa87b10f0062f7f8de69ae379190b04a6af653931c9ad27758dd99accd875455e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc0364e79264914c4b15e2ed3308b062
SHA124b1dc647fda43c202e9e7957fab96959d629f9f
SHA25639fbc1c659aa7254536987bed18624558323d43d8931e4743fa73cb25cac1c87
SHA5125d4de8475b88f5d27a389aa31e7933526a183eb367e61988928bff669cc496558e11374bb0611a2fd51095eaf4cd8d30d7ecae42f39d933ba31a3afae51744e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1f69d61b9b41aeeddad31dc5ad5c32f
SHA1888ef34a393eee884d7bc1619289f5cc8c4a4532
SHA256044c7b035e37cba61471ee105ddbc131899d6c0edc65c248036315e263fcb1db
SHA5129088423455e3fbe848cc8ce935a5299d573d4e844c7bd4db47cada4d0051213824dd8f14cbe124649fa944ee04e088e584f28f581846224addc98812b98c2cd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1f4df19bec0fd388d3241946811990d
SHA1943239aa3b8f8343d7e8dc86908ada6abe9077ab
SHA2569b7c66c4d2b0ea83943ef12ce9b85c2ca2eff441fff182c954b422bdcde83695
SHA5123a5ad0a596b9725a86373258a3a79fb40a3d95622fb87c925f0cf5f671a6e31823abd87a4934308823f35078f20243ac0d9c94e0a1eab18aa66b023c99105830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5419cbe477ac3953d61f6d4ee6b5bc8ad
SHA118d527a5f389dcaacbdf1ff884c8d4cad948536c
SHA256873c47f9775e596f774fe48fd1cb6c88d4f17e824c9705289eba7cc2dbc003df
SHA512132af4cd90f67bab87f583d374bbb70d01c11f42d4dea02ade512205dc3cab5fc3a87dda6c77efa0020cdbd3b58b72b8c200c5211740bf719c984bfd1efb7971
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c89cb45da60fdd03f66e446ea53c9641
SHA1a0c75f55e830ea0109cb4ddc30699bf6d4a0f0ca
SHA256563108ee63754261d6b80deabce98a5ca80c8135f6bad691bceed67dc948224b
SHA51290faa80bc1043d9a4785cae0c45ac21f3181c5f64e4f11e3929842bc63b403c8d7f857720e5ff36498c1fadf6a1c08cd77d41adce62e7fd386eb6065bab2a77f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57318bf81cddfce90aea86c0c49586dd5
SHA126af8c936422d565091af261c4b4d995e9116482
SHA2568fc8e9ebe77e6db8dba16f86d24e23f5715731e730430c2a2bbb30cec1d25b6b
SHA51285f2dceeeb21681f55cbb94da73b348dca1a91bf6525eaa10f46263de084a231d7f46c23e72a3a66df7f87ab473a96e6c97ec276fc599d2676b5b10f226c5a10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef09b4cf9aeddfe373eac7da698ee5fe
SHA141e4377393864f16743e7b402750edafe070e101
SHA25600d3660c4816e30b8ee5068004a3823a512c7fe310b093232cfdf23a7012e95f
SHA5128bba19b936358aee72f907622f560c6b5009d9d6e5f020fec10b42866cf67f74d607ac4f49a9e632fbc0fd308f66c8630bc771d00f0ef0fd66c03bd6d83ba727
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a161c6a9322e27542373e53a7e210a41
SHA1a8037088bf1cf42b8260cbbedf6ca5db33add3f5
SHA2561b0f03658b7185e4a12dcf3a068c62574b6674eaba298aa8b86e34d73da7e668
SHA51255f9e75a7edeba8b37842cbeceee2b9853dc350c70ce28a5c0993105b3045a8f39fa9a230f887f2c5fa275390176285876b189e62e9bc828287cf1cc391d2b50
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b