Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 13:12
Static task
static1
Behavioral task
behavioral1
Sample
ab28752b2d8f501d44738e914a7b9fc2_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ab28752b2d8f501d44738e914a7b9fc2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ab28752b2d8f501d44738e914a7b9fc2_JaffaCakes118.html
-
Size
37KB
-
MD5
ab28752b2d8f501d44738e914a7b9fc2
-
SHA1
de2de7ba433c3c59b5a5916e831c07780a1dea72
-
SHA256
dbb646526fa2bb8985c1b32c0a3218790390d4f33fb4387627aa6120953f0937
-
SHA512
053d15eef7d56add336bce1303324a8583a878c1c8a5daa0c6bf8968dbed1522ea09ae234d44255f7f2e9c4fe5b410854409935469cecab86a3154b948fc9153
-
SSDEEP
768:rmIRIOITIwIgIJKZgNDfIwIGI5IWJ7SBIRIOITIwIgIiKZgNDfIwIGI5ISJ7SpOe:rmIRIOITIwIgIJKZgNDfIwIGI5IWJ7Sj
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b093028439f2da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000b41f73df4b3228955bbb546b7d301500c1729388e35242be9cea6a0ccf2d8df2000000000e8000000002000020000000be243f3fc6d371c4684a7dffc458901587484d02f50d99d67c7586fb90ecdb8720000000b9dbab877307fa9fe0370115914e1c18d0e38a97470b9a7c2a2cfa186a2ec8084000000094e936f1ac3fbf76fa60b3b7e7917c6d14ccea9c00663baf1ee41f105e292b8862590bbcc56521b3b5240be4694d14fb9933a9e975b35d36b97a25ff5f8998d4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430235012" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ACD2F0A1-5E2C-11EF-9988-DE81EF03C4D2} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2548 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2548 iexplore.exe 2548 iexplore.exe 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2336 2548 iexplore.exe 30 PID 2548 wrote to memory of 2336 2548 iexplore.exe 30 PID 2548 wrote to memory of 2336 2548 iexplore.exe 30 PID 2548 wrote to memory of 2336 2548 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ab28752b2d8f501d44738e914a7b9fc2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2548 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5c85b1a3d314d7b47d90535bd43331576
SHA12c092e9e66dadbb0b38e07d893b923a56d926850
SHA256c224e009c1cac3bc06fcecb579d9e52c978e61799f44b86510739f06714f631a
SHA512444852ab990b5e091ef2fac5c93b8a7e17f00a2505ce77a3cba1293bddcb3297aa887c83234331dc91d507cd8efa8d5b821e01e1f569dcc50b6a88309ecb17d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55152e6446cb962ef59a3eca63cb5dee4
SHA1ddc9b7e41c2fa471c2320e8a0172ad069fcef7f2
SHA2561d0cf4a27a340b99cbb8f0c5e5ae01e0cf7b560fe5db0a79f5fb4bd59881c213
SHA5120d4dce055fb1342bb521dca7e2472339d81779af19687b9cd8f8e8d1b236bfedb88dd2d4e2790ccc2ab4785975c3287533849523229afd4923e12cc3d0c0eecc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552c9a20cc75e74ad1e84f8ea5a076730
SHA10a374543b97b1e3d3af4221cdbc6f4516ccb8b3c
SHA256c04f929bf9fb49f6023f503812815f31f114211ea59ef1387f5a6623bc432b83
SHA512b2360c8afe0cdd532b886f927a2c530e54bf62278e8c33512d43d3ce5b9d93309dfa325c9f85bfab56045c255fc370dd46925f9516308610bc0606b163906107
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f4ed3de8f11905c70e514516cb0b991
SHA16c730167c29db16582526dbecae66d1f3c38e670
SHA2568ff3cd76a5f264b877c507ce9213ec41f1341ef2347b949219b86be0a3d844c0
SHA5127c4847e8445e1fe69dfa1e46fb670b49b3740b52d11c8e802f7f73563282668d901ef6f3dc99d0cbcfc943bb793d0b4044f8e521a950bb526cb6bc1bd22d17ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55437a74a47c58588aee22aa583681fdd
SHA104eb640b3083e6c23eb704d30ef2a0f228a538de
SHA25604b78bd6b1dd3be127b5e0c1e715f000057cd78b899f74951f75f1c7bf38b334
SHA5126b76489a868199f91d0172d9a05462a6614acccba2bb903c0b505e0a524170e6fdef5443afdbd56b01dd6d724654b06c0cad82470b5904b8d9d4d093f475c1d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed991d74a37224c25f6ed6df1b71af44
SHA10f3914bbbbf7c997a69b5114fa46772bf4fdefc7
SHA2561ae3a4f97f9850bb9492777f54393239f5f244fe905734c55339fa591202b8d0
SHA5126b5e679a05aa17daa131bf5d73093300aeb45c0e90ca77073009803ae65cc963b780de7661bd02892e03e571da320f9e4902500b165799ac89cfbf4246250a4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585b57cfb0228d85f5611134773b17a99
SHA1f1b47ae26991013884532be429c5cb0b32d0d966
SHA256b647add09542172a2398d3dabaa550e86c9e8dbf717cb26c52979e1a644c3180
SHA51202eade9e17e5cd702bb24a40bffdc128136925fa1b187bf019294c4b705588d139a5b587199440418c4ac9719a988c20a483782be3950a51774f43665c53b733
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dca7fea037c8485e87b6a99c8242968f
SHA1da6be0a4bd6a849d9bd371ee5985d45f59d03168
SHA2561ebe371d6836ceae587f391becb61942b66a3369710fe00ae5181b808fcda710
SHA5126ff95f63b76c7e2f1f7bc21379c1fd99e6d27fed1f9621eb5cf1b4071bceb46b6dd3d494942e9fc13caff291c7f404d43163400cae79338b1d1810307ff4cc99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea9213dd59bd1820418e15e0ed784b58
SHA131dc89f4cdc92cab7ddf47994ba1eac32149ced4
SHA256677dbf2a1ad1b94e245041839175fb98ebdfade531d2727158ae25c5add63011
SHA5125ffb0c9c84699e96d2117e01af90fb4ded26307a133257a25bc365952dedd0f986ff80299f6fd70ab049fe79c6046fe43ee97aab8876fbc9b893e6c48c1d651c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c62db9b2f40edd466968efc15d143ab
SHA134468609d06e4fbfd01387bc6cb12e6283068d81
SHA256723a169c2c800f40085033dda6bc4ada7857079d6007d3df67896cec4c9178a3
SHA51218d871a17ea4a05d65214c040c723225d5f2a0aaac955fda931f6c41417397436bb00e994af4b32c79ced5dd398bedb6a472682239af74c2946fdc14a3d4a2b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502fbee98ba88d917b8f729d3daeffa99
SHA13fdf3312265e3e60b55de57e5710aa1554d73f86
SHA2564bae59f211c550206165a1afe0e2a2053ee4928c787726c7d333ac40b5961bd6
SHA512009e9fc2e37f3bff1035c60cefcb0b881c64962e7b79d4adf241dc9c4a0e79e05d6b5224a4d1b25fdc92df228b5648d33d2ad7cee8065e4bd7c2c318e49ea594
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df5b2bbd55fb1eb0f7f27e4d44a3ab42
SHA16e6245a15fbbede47920f00b1f01f16253dd627f
SHA25641abab97339bfb9b162764d46ed75fcf831a4989cc8b45dabc2c5ed117413ac2
SHA5121810899238cebf6451310dcc943e912a1658dd8f2ca9ef23c897cf5b38e09d4821df80ac85bd55c8c29ffa19b0d1290df7ec253cf3e4429432ce7a8cf55c8901
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f01b9a7f4762de73366e39f6c36cffe
SHA179188ab84d2fcc40a9bab02d2267356f55162bc4
SHA2562c84fc891ccc5c9df52465842cddb1158244d11d70ccb16f9c628f3163b47af8
SHA512b94862ffd8e3f944b695695af9e8f1628026dee27a5966bd7e48a3550e76eed17615e8544e88a2a24da247ec7a1886244717b5f78886112f9d1f0ca6935499aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5596bc9db1eb8bd64c7aa8941ebca085b
SHA158c9ad263b39aace15eaa594f6fbd09a71944abf
SHA256de450d2158f9801840d76dd930a62a93478afd84f191cbdc34397043359b08e1
SHA5129ae7021da45efe24faa0414760d39163f767a2c5f09b21be280ea5a3425ae9debcdcdc7585f1efe38cdbaa8b580a170935f8e10adcd2ad7240bd2a688e5eb20a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5fee07cda644177c3743f9cafa28d628c
SHA1394bcbc2044aa62ebc9bf9c35b8b168369fe0743
SHA256fc694d0b6022afb1efa1c5f837bd30bc9c72d6ecd8e94e293e05e2ccd38f408f
SHA51290c6335ecbc4f185234fa92907522f5dc2139b46d2fd80829b20aa35a4f30410d7831def081bea9046c8aa57611291422a7aaa9ff2226e61353ffe345df252b7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b