Analysis
-
max time kernel
140s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 13:00
Static task
static1
Behavioral task
behavioral1
Sample
ab1f70cb2ad0677bdd2ed14f0c1241f5_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ab1f70cb2ad0677bdd2ed14f0c1241f5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ab1f70cb2ad0677bdd2ed14f0c1241f5_JaffaCakes118.html
-
Size
77KB
-
MD5
ab1f70cb2ad0677bdd2ed14f0c1241f5
-
SHA1
d46d9374c6e72b8b92400249a0ccedec1a48f2f6
-
SHA256
4401a1109b8aef9c331c67d0feeb2bb6bdfe9514b5b13aae8adfde26fe1bb049
-
SHA512
8eee8392742b864a1c75563619f718cd1bc6fd7a6edfd74f4a99dbbf124461576de3aceb47bed9e11b096299cd1ad9719572e042feef03e5b51af38ee17acd01
-
SSDEEP
768:Zcd9QZBC7mOdMAfpC5I9nC4CurBycuo9Pd:gQZBCCOdv0IxCGio9Pd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FAEF68B1-5E2A-11EF-85CF-667598992E52} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b069f4d137f2da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000dea810d884e36b2022d4b8cc8b81c5c650d9988b9b5729147e833f128579a0de000000000e800000000200002000000031b8b4f46f0ac321227d35c413fb38d6bf6bdccbdce8f043d81bf5aef1ae7966200000006644fbc563a41cb079fff657b8715e9bb38e25106023cb2a838fef3c3091dfe840000000cbcd240e7b2a62208814a7bf2afb4172142369160f3f665a6d0884db48f4bdce4fdda7a6cedbcf93ef852750b5ac1ca8e3a4291cf4a034e597ca597b63d7589f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430234284" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2512 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2512 iexplore.exe 2512 iexplore.exe 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2512 wrote to memory of 3056 2512 iexplore.exe 31 PID 2512 wrote to memory of 3056 2512 iexplore.exe 31 PID 2512 wrote to memory of 3056 2512 iexplore.exe 31 PID 2512 wrote to memory of 3056 2512 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ab1f70cb2ad0677bdd2ed14f0c1241f5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2512 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d395fd679a3bd8725810b948e230dc7
SHA10109772acc5115147613b6199eadec0eebad38bd
SHA2569b96f394d524a6f8d6b4fb35738a775196a955f0d3a60e67e4763daa077029ca
SHA512c311aba4db3303e32e72972d39d878cda86ab495aa9dd7036feb92830ddd52b7ad98f5d1c471418b95964c55e13df54b980c5b95db9ae154628051ac6f40c3e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566ca36f0739861da02f078090acc759b
SHA18dbbef1fd4187d1b6a9a699de05df50b3336f57e
SHA25614c6618e1fa739896026bd4cec0e62e6d8474a97bac03fb46c6e7fb7d94ade3f
SHA51251567b7257b288e00de886dd35424708adfce5fc9aceb9cc8319a2df5590b72b5aeb976f87df66fd5983624e626ede575175bb2dd5883faa3b6ceb2db5b6b6c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577c0764ffe63f71497bf9a1ffd59c31a
SHA1829fe91fc479e5d0e454bc17c78505f0992d3bb4
SHA256673071c38fd26042f73f937c9d0c250fb3ef2f3be8ab132d171556c4b2c15bcb
SHA512ddc85387531f71d9e832eb16a0a44a06468de5cf95f9a004e4bc661bb70783075fcdde94928c0256fd6fd421adbad1ac5a0af741a10dab603d5f7c0aabf443a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56350838fcc286a222b7769472f243501
SHA115468a08e2f571376424c02405a7bcb93ba6aa58
SHA256764757dc57c79fd1342331398b8b38304b97e3b532c41064dad3027b91becadf
SHA51262f478fa7f046b913b71344b064db701f8e0372c87a71eb6ddc40a1a932d9d23d00a6c41845a3465ed4ed857ce9f126ffd2449c038ac95bcc47cb3be2c38e7c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548e2d93c854ba0c042ebafca1043161f
SHA185262e6a9342fe0d3536656a463d365cb82e0fb8
SHA25622dbfc42dc5de3cc036172a14d323ed83ca17ec97b5bc1bd91e32e1564188dd4
SHA5129a83a5499e5a7e79c0bede366f6432400e82fa722df36db8993754df5ba5f8cabd42637b25a54042aa92dc8231f027257396022e5f3cd0ae6c4118ae0859547a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5305b1349e16b9124f847c0c832bedbc6
SHA1f41756094e1e3bbef27a91b074b3da7be0e2e422
SHA256eb676b7e147591d8c453e5e5417d8ee649912386a7dbee392e77837ebbcca469
SHA51270edd60137631366ab9f4d8187711e8a26540c87070f50e2c8fadaf4b510899e055abd1c4c3220af1e30b78984edb16c36d8683148bb76b0572c7b6672a70d95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5069b94d2a2ab49d05651bac6da87749d
SHA1419dd3a7f292a94e1da663277ea64b4a798054bb
SHA256dc7df30f115903db45b51fb492af0f9e335e1a5d7bf7c2a51978c11c5c0dd7dd
SHA5121f1f6d57e1a13089de0b2f9808488ad46e8cdb7d94fecf86f80b0b9955e024b074b54db8975db99dd982bc6ec87db04f1aa5103ce29908f2d8d98a29e0c71a13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551a731f538a6da907ae78e45183ce104
SHA1126aa17e99af94c48011245738caa62b5d4bd7ab
SHA256299d9ae0cb1682e21fb735d3dd61da74630d7387c1cccbcc4a5354a9e394a8c2
SHA5125ab9cbb086a742b65138acc6d42dd950e849b3460ab5c5834ec800d71ee3aa349518df7fe61d4669dab55517c46c740050dd4f0e69f0326b168c661a4e4fda35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597401de6f53c592d73317d2253d08cf1
SHA1644cbf8c9d1749914e7facd9c48a503ed138bf29
SHA2566acddba07d5f555bfe7c7689e1251d6ed7d4dde1613b780a69e685adf292e27e
SHA512b0112a64fe5df4277d9cea3dc388f02e7570380a5d4db99048173e67dd40fad7d375422ed3c473974601b0365013569f147f0e08fa25293a73c63c3152cd742f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5734d17d9cb7aa939f8c311272108c4ca
SHA18903cf5c784399b56ff9a7cc4a43457022e52082
SHA256d5d76a56d888577e91cf41238ed05102a73997779830c9f0c854eb9f8243c20f
SHA512e9a8299633c25f0a24e60e985d4849c1194c7e87b331d0f7bebe927ada8cd5329c4517fb4e0c66abc67891937f9bb87524b1beba7c80ccc7f3b881210ca6bc93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce600e7f8599827e101a6aca03204981
SHA1f3d20aa2e677c345f0e63a04135db99a986358ac
SHA2563c3dc5a7048679f3a252b8ac9e20f6e7eab3ec359b2e37a87f7120aa338548d9
SHA5120defb05278369761100b8ac6d74c351e30c647d11d82be838a2c5884f3ec869f53ff7db6c3b3a2bcffe797f4b23abe472bcb390be55f55d6db3de8319c4e9bfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acb42b75fe5ec81618a9b8f5efe015f4
SHA12d938802f900d9bed6a47ab237ac5fb428848273
SHA25688a1d1a44bd9d29fa5478f9dc9b148134b5907dc743df83a13730bbc80266bf0
SHA51274390a958af7b2fe7890ae9ef5421219c71b16a24d8953b8177e73022095c600924a08bbf827a6bf5fd83318f0fc448846c356e61b3f7ba966ebc7687cb2f4f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d55e6de1735c5ba15f2b78e868e5026d
SHA1e2198b0b46b00cd9f99c2a940a615719ce1f7657
SHA2563e55e609d610660ad67d0562521837763f0c00eef6379317a1614a1f2d216862
SHA5127cb351b19a80950f881f4c6d661c978291a6dc027d47672506e93d1b07b004f672feebf53172fd3f872870d721d274eabcdbca3abb034eb017f260d17a3bac62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e41377393cd5ef07bda154b33bf550e
SHA180ff9bee1c3d8fa653d6295642efce6bb52746f0
SHA256fa3738442663d7a77f4859dd2477ee1cf2fd1dfb4a8ceb7d38ef814d4ad31541
SHA51249a2ddc9693dd7bc2aa166a477269c7b3a2ef6b38ce84b76aafdd4c4769235871650b4549abe20bba7495e1a3e5ee51f3e740d11be52f00ada1397cf7c624999
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3ad39f7e375af1ecc69b4ac4e4feace
SHA1f3180c9b36784d55d7c4020882295259819995bd
SHA256fb5f0307c092ea60e378aa0d3a73e2297792bab033be28ef863056f62b21472f
SHA51241953d2ac657582f81a802ac50d605567d8e9590030ee027f703f3f057fa4c8b1fe6b25586a58654ec2adb9e0f34a86d1f10e499dfc5504e2b47dcc9c1e3aac1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50515ae37e56815a3241d781cbceeaf6c
SHA1ad62bbf0558b379a099cffbfc581866630cabf2b
SHA25672bde017f6d8476b1c8a3c5699f125c3b265b6b69f802a8fa5fbe3b62fc2bbc4
SHA5120c035f1312dfce5cad2eb296a162dca625eb8bbabd6bd4a36fc96df4f0acebfc83cc8af11eef855c50bbacbece1789d119349790ff20e869dcb366ab59646cad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0fc4acb7fc8421c78903ca70cb1045a
SHA1168094140eebbf5bdad894034191a77c93996219
SHA2565c2875483ea01db30a5be258658865c83f090c1e217d438689a0e5f826e5fd80
SHA512e84cc40522f3f2f245b412c6a023718b97f94c488ccedc731a122d73985fff0429a648656dfdbb25a584351814e3ff0716bc0c45971a3f0af39bcc6eaeeb0057
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b