Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 12:37
Static task
static1
Behavioral task
behavioral1
Sample
ab0d4c06762a3643cbd6f99ee276cd78_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ab0d4c06762a3643cbd6f99ee276cd78_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ab0d4c06762a3643cbd6f99ee276cd78_JaffaCakes118.html
-
Size
34KB
-
MD5
ab0d4c06762a3643cbd6f99ee276cd78
-
SHA1
a49be841a6f7e1725276bdb2a812d83e2f231938
-
SHA256
d157ff7e2cbe19255c47b566520de250dfc89e5d56203a47f3c086b8bc706ae7
-
SHA512
09f0731590a81e04a0d2272fa2f869128d8f962338d34c29269823f971bf3ec4ea991e8ccf7c4c046cef80b5893c3c92d903def134985fb97e92ba2669147ec2
-
SSDEEP
384:xKAH9QlBYaP29JR1O275PtHqLBg9Zkj73V1eokbJpHNGgx2mfGWJiJYoP9H29GGg:5/X9kj73z0JVMgxmH24mMRrHmg
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb780000000002000000000010660000000100002000000017c70d3acf1e69d39854353aebf786493d5873cf7a51b1373b2e508a5e9019b5000000000e8000000002000020000000194fb2afc473fd7785999342c876d49801baf20b298547c4a792843ec99155f890000000a74f26ff90a3885dd2029b95260f413d4644687913b42ae76bbc7abc65963d8c92b7b2ba9c2df1e52caec1a9136d36ba09ef2139efb7965c6ee1e0c959f4723ed78dbe39ca3ce6cf847331d9acc6752f3f6e1231b47ca1feae8feebca568ca187a9a762f89de3040c9c142a8ff03a85f0a7617b22b207ade7c9138f0cc2c59e54e87c5732a51bfcec2a406090a2245cd40000000a04cf7a572eea9ac2f546fafa24280fc702e9cccd6ec1aea51b59ed820a7dd79ce5b31f4e6b3bd23ae8994e03b026c245d424c709ce00b98d945ce4fcfe9c536 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DC3BAA81-5E27-11EF-B36A-FEF21B3B37D6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000ca5b17021bc51a1335fb342d101ecbc44cad0417758225956a36555b0df0b9ec000000000e8000000002000020000000fdb3c8691b63b4b412b3e8e914bfa24565af105e3d38a057ab7161b531d00c5420000000bb070cd75f0712d870c4089bd1006c1f6890bb12089205bcabc7afdab0dbf902400000009ec29897d34459d830b7de8ae55b072f6426e1f33fd3ec85219e14777601e3bdfb01751c0b75764a753875170ec91f66589f65e81d8fc466ef6cfca2b7b3ae1b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430232947" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 300dbfc334f2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1964 iexplore.exe 1964 iexplore.exe 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2656 1964 iexplore.exe 30 PID 1964 wrote to memory of 2656 1964 iexplore.exe 30 PID 1964 wrote to memory of 2656 1964 iexplore.exe 30 PID 1964 wrote to memory of 2656 1964 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ab0d4c06762a3643cbd6f99ee276cd78_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1964 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD51ac5760ffea86eac0a4d2c5758e29f48
SHA19e8d41f9acb8f6cea7074aaaccfcfd1ca49c2084
SHA25636fe9c74c9476392789e9e49f8bead330f3f58e3e79b3bf17a7149cca4f144c1
SHA512b7d789a9c7583653c22dc3672b667245022e0520af89eff8f10e2e8f8698972144a54a5929463cdb4dea1992be496b7f10cea21ce238de72d77ecfb79c9cbd69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5818a157e4e391728bbb1846ecf841f45
SHA118a57e9e77686ccd2e43f90484207e1108d790a5
SHA2565bd20d9c0c9ff49adeef7e91718598c56ce129e3b14df04c4d1f0591a44acbc1
SHA512e35fe03c2802cadb9e4cbdaa24bf6e066d5cb4dbd36b562e89b36862258cef352dd4617f1ab156271c29ed7a1b9fcc5019c8e5fbf9f0981293b5a294fae063f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7da7b24c9814487444c0f5776db85c4
SHA11c04546e87678553db37320e93012125ba8185e3
SHA2560b2d489d07528106af376c3a81f41fd82c6f08d389d783f399dcd939ba258113
SHA512031eda93b45f486b3244649ff59bb09ffc72e3852cb23c9a9d6d5a8befdebc407a2eb69bc8c05f5b78bb4cd144d594d68d00e619c7fd4ce9cce02221cf34d637
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdc4036ec9b69fe615ae16c05e6803cb
SHA115891aac371b4e495dc8171cae65f6fc0b2bcef0
SHA2569d27c504688918c830e21dccfa049e5042bde7cd45a3a10a63db81d402cd8abd
SHA5129d1bc9731825f388495e3a9c12162dfd4d1fa1302705d5b18226e73b18f7fb23cff663380b72c793a75c8f058e20c0357ebf543731ae4ee71ca79e74b912f82e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569bbdad9bb7063747766cce14c238f89
SHA1e36a815f5c1f8b9b323280dfc691fc50c86da300
SHA256cf80a6b1316fb5ac8ff5f3cad752aac1ae75b4dd3c1bd457273e33aa9ba83e49
SHA512746768821ebdaf658ae41ae42af4a08e2464b09e1375dbc50094f2acef2b6c96908d272ada8ff2f6b0c29adcb31bb0bd4b47ac0c95621a45e300d2f0f575ed34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc6a01f4628ba90669c149d5caffd1fa
SHA1f34e300b6270bc7347dae78dfb7c162b1b35e166
SHA256d0caff011a33de78ce0417e63c697fbb9e2109a975642c291e84993e9b64a9bd
SHA512f9a4ca9db7aac1600af1d7706b38898cfa1f5479507e05437547ca6ef3723f89aa2c2e06b0186812221076ab5815308809b4250e79fa1f0c57a14cd4fe47f383
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56381508499baabaa265a9f535c3dc72c
SHA100bd66fb7765bebf9d5308f8154ef8523c3008a8
SHA256bf1cd3a6e513e956413b285a79b934e37b2f4e2c8aef8c64fec9b79b8d03bf81
SHA51247f0b23aacbe5cc21ba475e97f669b1ee71a6d51e050ab54da01c486fcc793c673ad82b8061800fe02f389157e60bc6f08e6e2b25a1f285f460fce9038068915
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50969662c571faafb7957db2fa85df42f
SHA11ef4613ebbce87924cd74f59621bc3fb1742b872
SHA256532a331c711c912eeadf309a6d9bdcf8df24a9c67e3821857f97484beada234a
SHA5122da2a94676b092f1fed12b731943b6d1f69221d17d683bc2fd3e29ba14ec9cff9afe2afc6fde9b10e2123d4c9087ff6944421927b3a26b83c299e5f1909e3e23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e53b4a098215ac5e51958fd5c15a6c23
SHA112aa6b07c4929867dc5dde994ab29ccf08cddef4
SHA256cad303c76df42f6576d994e026472a2416ed90d135177be7ac183bdb8f344999
SHA5125439612d22e564fe1909227e38aa0fa810c959cc48d4664484bc5b5a09640c0dad1241fe13f58141304cc9126df3825258fa0befca562360b87819266c991301
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591d6e8692d8bdf6ad0ebde82e3ce9464
SHA128f5afdeb048ba79d3eed5933e9290f48886a664
SHA2566a3ee64fb042a9dacee90435db00406419860521c20e0de785b49e3968293155
SHA51267bdd83beea53365cb91131c92685e6449a4d8e46a3d1aee8758590dbc24d6081feb2a9a5693c3a3a759ff2f631d5832e53c60479a5cbee0ac2333000b24fb38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5491f878a38118d8326cd8f87c789f10a
SHA1ef43d07b574a1675e8426c71dc8a62c932a0d85d
SHA256967385115c45d1fd6e7c233e0659eaaa0f129cc7bac5b0728bde7746b358f17c
SHA512a2a488c0cc05c5e2c1f24d559144aae58227cb8910c093fea46852815bc3607defc4bc1c7cb6eedd70c9854696e157b3049b936512995acce45dd734a5102f2b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HTBGGANG\R29G3XW2.htm
Filesize31KB
MD5f26dbf3e6c46372126989614208c3298
SHA1b0153dc04a62915de53f1194605da6fe5c31466a
SHA2565280e51574abc7c8e391124fa4e86265288f292117b8c2dbfad2ca7ce3739ca2
SHA51265c6ce4c15f4b74f540a6fd82c1ffd5047150b8813a5a539378b2ab72f9000674b980b541b8222e0604b0d9280e1dd66f49bf83eecfb4dbd3d76a89f7863ee15
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HTBGGANG\style[1].htm
Filesize321B
MD5e8cb0e7dd355834b958dc977b74ceb74
SHA1adb4fb7f9dbdd94839cc464701397d6b6e5cd23c
SHA256d09895f3f9d249019370cbb41bec49106be3beb2bbe9eec63259aaf582c27d74
SHA512a277fdc201493160a73c911d63cb09e2288fe76d0c00161544f426f9b4b7b3865f58bdfac182a0dc28523ff051a3bbbb5b0968ee65d2e590207ff5281aa2afc4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b