Analysis
-
max time kernel
132s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19-08-2024 04:07
Static task
static1
Behavioral task
behavioral1
Sample
a9865aafab290bbcd71ce3deafef9aac_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a9865aafab290bbcd71ce3deafef9aac_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a9865aafab290bbcd71ce3deafef9aac_JaffaCakes118.html
-
Size
8KB
-
MD5
a9865aafab290bbcd71ce3deafef9aac
-
SHA1
b9b27eabd9e317801801a63ba44a66b4e87f4982
-
SHA256
7a9a9899c43e183d681ff45f0c36cba8cbe18d1819eabfb0e0be8cbf2933772d
-
SHA512
e2baed1c37aaff79f5e69653cedea43921108313b369ff66f9ec4ee3b4e65c43fd981e30ba5f687ee22400776e8973cc8f07b6b891354bd5c3916aefa3645f9a
-
SSDEEP
192:9QVCqIuNXfi7utqNwNurds6d9uHhg8WVK6ITdv7QKmI1ghG4cd:+VC7uNqStqNwNurdssb8WVK6ITdv7Q/E
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0047ff66edf1da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{927A8071-5DE0-11EF-914F-526E148F5AD5} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d9909000000000200000000001066000000010000200000006c6753aeebbde95bd86ee34ed82ce60f2cbc921b1409f74104bf7438e888bf1e000000000e80000000020000200000008bededde32ac15c87aa23fbb50cc7ccd1fc99cd9ae2a5b8ed58e30738d1f8a382000000031ba98c570e4349554298870a3a468ebaabbe8102e6c1d0d289c4c7ae1587f3f400000004c582ed27784bb67072d1972fd2b46868ccee70208ec1761dd7879421436c01e6989f16346b53148282c88cb8ed97259e6b47b60e171da5f1680e8c4c2ad30cf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430202325" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2688 iexplore.exe 2688 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2700 2688 iexplore.exe 30 PID 2688 wrote to memory of 2700 2688 iexplore.exe 30 PID 2688 wrote to memory of 2700 2688 iexplore.exe 30 PID 2688 wrote to memory of 2700 2688 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a9865aafab290bbcd71ce3deafef9aac_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2688 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57af2a3eb0cc8854d5ca82d6652a4851c
SHA1ea74bca723b256e892870dea47c502fa3ad578af
SHA256e2bda9e472edd9ade6e8ccbf6302b354f4f86e6768a971817479d824f10924b7
SHA512031f4a70622ae035477a354c74548226bcf9ce1dcdd25a7fe525b8348d7056820c597f8d6bc70b9bf2a3deb40771e6958e998479e101f6dbeda5a9d0abcc028b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a408cca7dd35a584a3576923dd771b73
SHA1edcea330b7a680ad3833af402af9e3852901a754
SHA2567c43e8775c7b0db59d0cf390e714b1ffcebddb3d31c35e0c18ca5fbff0f4d863
SHA512bbb400afb83ee5bc94222866cddb5227ec150b1bf6942c039fc869ab5b75b5437d99443509f4a29e12249695556542d00607b74283af1a27e4973b9f094ddbc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539487160d9a76c89da55bdf70c61cc3b
SHA1e0d0e28ab197fdae7c91c1a100f25c9148b09088
SHA256f0e701b0d37c36b7b0d7f9ac424029ee30870a1ee6b54dd469c7d9e1c13026cb
SHA5126c0296c0a3444159b59eebd9b75c7c9c3f20c15ddc5a6847aa28b75d4758984820a3b6bde176bf5f084e29a9f98f198f637c3766f2680d495e34d012349f19d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6a3e4e80a23a7c28f660deeb9bb5320
SHA1d72a1fff73bd952a154abcb9d7be876211646012
SHA256eee11429238fb723baf715a09ffced4b3dcfd2cf50226b83f9becfa6f313de27
SHA5121d12276e5b01745f6c06da89885e4438ec0d94b7be09c628babf7e6657b255f0be4c9741b09a4f54766d1c569d13078f844e7f18735201be9aa26a1b39ed3628
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ffea3d4c3b21060ab7255929521e30a
SHA1056af4fe2dd67b92548798dedc7a3c7975e49bc5
SHA256ea8db49c0a950418ae352d11f144ba6de8f7736230e381a6ea94d4b812d62801
SHA512877d4f37d8a7626686b66c4c079fea42f2c8b8406bbf3ee74e98d888719031de1a7451c1520528b8ab031092563286f20f5050eb901e28cc686cde84e3bf7714
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae028b56090ff28515d17f5fac9253a8
SHA133dfafc64ffbbd0c980aeaa7c83e0246ca7114aa
SHA2568d384c642b359a06d7d18ed7fd2eaacf51460da64ee461dc17c21f4a38a3d2f9
SHA512f9a5c253239c5e5208ec3d022ecb702608818bd58c34b14c6c57c84d0dac3b43d9c0a8900e1b41d455126df0b636b50509525094acbd774948ec1cd1f3cd395d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ef9d7e37cbd21b95fe197798ba3a07a
SHA107c4f80c4596a0d5d24ec4832216c61356988321
SHA2563190c1b4748b51c58bb7059870c9c5ba3955d16a5e5c980e60d22bc4011be5be
SHA512cb2645e5a67a0362c9e958c9da17971e3870d072923aedbfaeb2511ac6d08ed10c0dba45c42af3a3ca006f52fbca8060855da8b47806ab6e3160fac6fc98d8aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8bfcb87b510d58d9d48e560f03c2eb4
SHA17227c58716d1370de214adced816e15d78b65e4f
SHA256fe5e73925b59e6c5649d92be683f8a3f0fe1e19e24e5ac38e94e7a05de2d2439
SHA512117e58c070134e8f1b755a498338c40ea4034f16c7375a04d87cf50e95e390e7e3a7b50a10c5b69789fea90186fec93d7dbe995ea7143957cc2c31d6cea5b1da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8f87b975535719b8193d6e7438e6618
SHA18fe24cafb4e4e8f675bae5eabdaff284cec1d633
SHA2566f44c215ffb2f2eb36013cd1ae3f25fb485c1b2a85afc1634cf8bdc6dfe5f25f
SHA512bfeda8235a4b7be0aa7a1adf27aa17d5faf95834b2181a000540f55e01323831e1879af871e9a47c9470245aa68504ce6153480dc834d42f2b13cb5ebd669295
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571a4c790ce306eb94d4ea5c5894397a7
SHA1fb03dc5663addb7f70c194488d3b247c89dd5176
SHA256f179b210dccb56bd61e233407952ead4ba38f24d3ed5594f9882d3cad82ca2b6
SHA51236e0b6cee01e2e5e572dfc1cffed9423b761706d6b9c53823c658478438261638e3c3caa532cffd133bacbec3e4afe8d9da8a53c413db31592d04a55118e7ea3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503b2da86af943f481dc1b08fd03df60e
SHA181463ceaf94e92dc20c280a8818198a8854f9786
SHA256711d9dbd3ff3146697ffd4ef906f7cfd026104a39165b644ec6cf2785898da63
SHA51285bdd7b952b6721652ece7138a5d1874ee677e1963bd0b7e2a951e368f865769d3182a44f64f957de91bf6df741902f5cc8ea1e01863b90491ca170da8a727fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dabef2459b0840df7e77f9e5012d824
SHA10133bb05579d4f3056739a0cd95a25f1564cb52e
SHA2560adf5123c0b306eba7422c34619e66ae4c5ee5333ef474738c1c409cae0189fc
SHA5123986b44209a7b413e7f02f49aae00c18023c453e07e73460dd98886866909e41b66fd1daf059b59ebb1c18bcd341fcc08302806101674c1fe57de4beca5be193
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a6a662fe3edb43fc69dfacf54da394f
SHA1f26f32eb393559cf92a4615635f17da828a75efc
SHA256e4317c64f8c6bc29561bab7fb819848f0d2353860eb8398be7de9a363ba821ea
SHA512cfcfec136311fdbccf0981b8dc30e316458531d8dd13b39a936e5f57a36a7a0ca377a888d4867455ab4db97f3c1e5381f779b1874785336dd808083fe06d805b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525668fa3ebcd2afcbef633b0f2facb32
SHA17b492d94c3264400a66f97669b6b132eaff71c87
SHA25653d7807e6a7b0bcebf843cdefeb81c402c6d9a36545564a90a8c37688cea9c7f
SHA512a284f418dc65fb80883504f0172385fc7ee364189a7d8a4d9a48809f78c17190c0e0f7a9345e519be9e954b84478fd732a1b2d447bb126cca24b240ddd84b51a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5206f87751d38e1898be99e7d7dda3629
SHA163502cda14850f311c540e6ae7ed32128623b07e
SHA256de3b0cf5b74d31fd50b1b341ead0ddf9722172fa99c406b0bc311cdd3ab7da31
SHA51265198683252e9dc1a8bd49c4132ecb3e3559de43719c41fb7474752d00d404a5659618ef4c9b92c14f8802f510b5fb28aae42ace00aab648b0b8ef48bfcb08f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fd16860f8ef6b3ce0e138aaad7d4dc3
SHA143a7b251e89370a61d3858b087a247fc8d559209
SHA256e173169a22b7d41ca29d9c7c71cb72291df1efd6e10f8b005a51dfc367d33a03
SHA512bfc002c9e60478cfe4c16903a246ebafd4a79dc37d02953d9caba5ee877fedcc5cfa5e0554bf47723495b3a960adb4770cbe1e86e99f88b9c4549b1427ddfee7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dd8ad2ac9c3f2c8edcf789784a4b00c
SHA1ec0fba92fe31928b642710969e13e8a4a8a77de6
SHA256e632acfbab0602733582a39d5346b0a6b215781fc4e7db40649312221a5dc9a1
SHA512615d65c8cb248b547278d8ab65455fd19dc82c5f9f302a62bdb66f4d1ddfdfe3d41f79c2107ba9b61db71d7a2690840dfc0126ea48e2a219edae7aaf9e384cae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579cff7b2f1720d67faf465cc70a987e7
SHA1eac6e951e8c7d2994267463eb32d3f66bb741d3c
SHA2563dd01aaa863056558eef8366d5b60a86ebbbfdc16d328b8d477cd38e81d9b183
SHA512b3dd1e655bf9644e02c8b15b3edb71e34efba2303701900ed85221ca89b2c12062e374dd9c4e210081256fcfc8ce3ae7c76e1047a5888ab8b759906337942ea0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdaa9207e688b902b62c2d3e40ca1e7c
SHA1cf18270ab1bde31345c2aa18662cec5426fe3898
SHA256f910365c08a072ba89d893111ba0573cf052e65fac698d347b1742d2efe39b15
SHA512b5628cfed913ab59c4740021a058033eff97c31a6001a465466b4e56a35d495972c27de9880ae7faab1cc6a4d6fa3191c940fb2b8766f9b81141b3aa3e74499a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b