Analysis
-
max time kernel
133s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 13:20
Static task
static1
Behavioral task
behavioral1
Sample
ab2e8a83ceb3d5d5c97c1c934b877bd8_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ab2e8a83ceb3d5d5c97c1c934b877bd8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ab2e8a83ceb3d5d5c97c1c934b877bd8_JaffaCakes118.html
-
Size
73KB
-
MD5
ab2e8a83ceb3d5d5c97c1c934b877bd8
-
SHA1
3e2e8fcfbc6b13a83b9be94f3a097494e41b3426
-
SHA256
6a9b1ef5072b241c250636d08988cabe4c2c41e70bcd99e24317aac9bd5a9eac
-
SHA512
e4bf76f540b88c9338e5044a29adcda1c5be5c960c756b1684c8846852307a955c5bb069972fedaccd414b0379e834b7f0bd76b85379e3ed22a7283804970858
-
SSDEEP
1536:phFGsKwTiI5RmM6fS4yZIV91E6AAIj4LVKe9iaDHI1ChgC6:5cEM1E6NI2Vl9zfQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430235494" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CC247F91-5E2D-11EF-BBBD-C67E5DF5E49D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c9200000000020000000000106600000001000020000000b75c0cdf2438a0046e0d1b2d72844994e1eb9a46565a1c8f56ae72e56869e227000000000e8000000002000020000000100ffab9c91d4817f4d3887915a00137da88dd259d5e57d7591c60028d7d8b7f200000002e3052647a5f3907ef69761812129f1cc741bbcfdf7f30af5fa51cde83fa3bf440000000ef5c53ae30cd68342b337d65b5d9780ed49cce287998c0267fe314da1ea74384dbfb89e7a35f2b56149b2c509d60c2a59262e0c0f56a8a33aae2b4dc3cb511fe iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e08afe963af2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2876 iexplore.exe 2876 iexplore.exe 628 IEXPLORE.EXE 628 IEXPLORE.EXE 628 IEXPLORE.EXE 628 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2876 wrote to memory of 628 2876 iexplore.exe 29 PID 2876 wrote to memory of 628 2876 iexplore.exe 29 PID 2876 wrote to memory of 628 2876 iexplore.exe 29 PID 2876 wrote to memory of 628 2876 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ab2e8a83ceb3d5d5c97c1c934b877bd8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3d1efec970d593085ac70a3037eaebe
SHA18a199e5d974ee8f05a60b8dd11a146a8ecf3e58b
SHA2562ab13b4f3e52fcbffe048ee18e3d421df2a0420f8d84404617c487a724ab3e03
SHA512a94504047ecd4cc0b271c10545e7ac610720fd0727918207cdeaf2f20954ce933f46f1b69ebc5c61fb1404cd46d909f83b08ebb974e0941bb4099c40808dee5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfd86a34f0ed070d2d0ea6bbf2db3680
SHA1f3eeb03e60c9648d15aee419ad171b04cda1284e
SHA2564cfb46820b0eaedeb6a3b74f97d5f0837a652f6858bdf21430bef6d1a6833aec
SHA51266ec0ccc8526f332b60e773d1c8dda2bc35ddf15dac28afb7843dec9e6b5f144918ba79d32f0baa8f00532a83bf3db1e2fcf4c36d19a7e11a626303f0c16b349
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528f27e280b05a2f4fbea4b8cd444c78b
SHA1a438d2e74c4d68938b327ba804f7c55a1dec1cb8
SHA2569ffc434fd71ddacc81a5fcb723b1004b7f4e83d391a37044e3a5e725c0c6c53e
SHA512f51c0621a9534d15a86258f1a04b35c7aec52db15b57ea9f23b1028001d738a5b433ef8887b5586a530d9efeef8738147bbb173b5d16b4895e43b28f5c10ddb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557f0c0c7dc3ecb56601e10693cb05f76
SHA19fda681dc3decc964507381c8e37ed2975a3fb46
SHA25632c9771392dc298d40bca90caf9bac9109c00a6b030ca00b4007408a4cd85955
SHA51239b0951a753c42f3bd312cc7498457c26bbce4d6ddec3a63c448295930b0f6b4212d6c3eab236a2522d8db633b67bc796c049bf0245651fdb0b665c424e501c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574274d2e6fa94dd347c6bcfb7e075323
SHA134898070dff29fe5fa50d8e586634819ded19944
SHA256ef05639f14bf1379537b9c19a852f648bf824d11cba6480de9bde4840bea093f
SHA512f63dd434826682666d6673e071fc71a8a4e6c22fdc40fda837665c449c90ab0459dea7325ec40b1b772e95f4e1dd12ad8e0e605469e90520bf2595aee1fbd36c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5917cfd37cd072408d3c15bd2926c57a0
SHA11eb01410ee4e29a4c3ef842cb01e821ffaad446c
SHA256a388a98d90514de7b925ca9ac83b4daf304e14810ca8ac430a2f734e4718c993
SHA51201c4c46dd95d4abde559ba17f472690e73136b2cfbebb67c94f02da8522de7100f9a9ea9e819e46feaa012f55ae655e87d07df5c41052ab833c095e043e43a6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5637a55b574e2b734822575627159db69
SHA1ac96ad9936889117a5bdbc1561c7ff225f5aa9ca
SHA25661b212e1e07f5c19993254e4410d4772b9caa243c8c3866cac8b0c299d3069c2
SHA512e42350cc5a61019fab596a5f445cb4e75c5720fe332ca5179e668abac9f59be635875eb5eb9727add4a7d5f939878421f3476e89be63887b4ba3109801742272
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c048f43248ed6badec002b671d2dfc1
SHA12eb8506fbe5ed7c4df882cf798a4f807a56c418f
SHA256520e221d0ffa25a4b17c5d8c23ee9ff2d6cd9db375a4e2a9d69a99e7fd0fc40f
SHA5126823643e7f8b0732ec9e05261d7f919c37de7a7d509fbac75d09a413f1aafae7f901a9cc3566786972d9711a65ad14fe65dc6eec74036339dd00d7d20e5a7212
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd4d6da0c3af13886a812f4bc0979a38
SHA1421268148cc53ab15140decc6d54518869722ca2
SHA256b6ab76003da325fc34e0a8b2bbe6ad7d79d5c7e25dcf05003606c3780da2018e
SHA512275239bccd79ea82b7025354bb01729d852719698a81eae43e46f4280531c7d64d240387879c9fad6d6f8c3e6caf445be683666e63c06e5e735b975c88ee47c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b26f64088325465f3422d70f97376f13
SHA1925e80b503ab0cfb400d125fb930ba4fa08b2e12
SHA256be77a395553ad4302d1d26efde7ead6d1054ed7dcfbf743ba6022ba3866924cd
SHA512e2c656d1b727c196aa21256022a9dd1a859469c896e1822801bab4a50b154554ebb1168ac32a37595d851a36c75b00ba138322ced462c945bbd925d1b4682cdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4e13d3ecc6fa232b36110315532f4c7
SHA119d4254a234874854ddebb8b9787add12f0dbbe3
SHA25627337a0242a5d3937e225a3a41e23a2739613f44bd1b5f3246fa03995afe29f2
SHA512e111004d172fcc9fdaca94cc4719c8f5a4d782137027b94ee5c2812837d1578333b5a9f0a88950d28c23e5abe1bdd3d75d32d133bc0fdb4d4bed748e46c77bd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541feb009531a4a73788aed00afe65d7b
SHA16407db1b7dee8c5c03ae36a0ff2800c2890d97b0
SHA256fdecdd60e93663f7f586d1501d2e739c45550d30ce87e6423a77ca27bc699fe8
SHA512262c0da28c80f7f54e5de932def55240f820fa78ab14dfab4d2f5bb8e3b0c10059d2e7fe7acbb24f61fe2d376bb8cf8ede4fb4a5f6b16de4875c57b1d96dfb68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563e58e8da9a60963f87c44ad0f43ec01
SHA112444f92e77506201cbc11f675d7ea9735366897
SHA2567e4b6a3e7457d9c800567f4575ae99abeb5cf4fbd805dd000ec9b9c2ddf51f7f
SHA51291f8e6554cafec7d9cbeedd42302bf42da4f271ee79638af4cd570620c78a4ddc5bb30c5ba3fd5d0898331afd1cea545471f8cc721113b27ef5f3fe0b6e7d02b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d119b1580b095e9d7bcfe3abba2bd2ac
SHA1916db240f8d8bbd18a0584ed45dadd15c75c70c2
SHA2567783fbe78612cbb1777e7c8c0ec89467f1f8d71d7290a304c2f258c4af8b9420
SHA5128686cc31588fc922173ce9e5f8d93fc4a72b670f7512ff437c1dcd8eb3066214f9aa2dbc706d2b2cd805a51da939392932f6967759bc6e41a0f20101d7c38ecc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1b52311fad640c50d50f5e26a1d5a39
SHA1280642b6465c7e9140ff76f83f47757402c77bba
SHA256ca319f5886a4d29a1f04a2d9eac6d1a0c1288afa252a779c4b91e5e7d590228f
SHA512cf8779c9a4831abdbd96f278fc1f64fb2b6e1407c80134de75aecaabae5d84ac0334e0368c9c8a30b3ba57635c7580348b98ef6fced0535e97892556c661f7c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd5d0b52ef4fd077b1b37abc2baae8fc
SHA155be5567696d87ee6ae4a533fc7b943212612c91
SHA2561daa56f00c9ff9d9276205d77d5ce660ef7e5c1f7b37c978feebca1923caa156
SHA5124b1a3ef3bbf3041806e89ae4c1c9ae586d809b1bc5a6876152142b99a954eac0b950300b3ddf58a21b4c26de6fb687f75c4533fd7d41ba658caf98ddfb0cc7bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a0a7ed0779c546a19bd1b07fed0bb64
SHA1fdb685685026b998d8f656053db7c3717e9fabed
SHA256ea798190633fd80d1029fbc54033161941106ac93353fba588993ed9eacaf1c3
SHA5121a18cd96b6699514f5dc89fd089f8a5a76611d4cc4452c689a319024a9cbbaea5e810c62378a7123f6c4ef2da7c835f9e80206cddfaeff789c7cb4e7bf088e9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578dbf173a1ca495bf65c188d9a789b9b
SHA175967930d9979624be8beabfefe38221c774ebc2
SHA256e8a3a71dae0503ce7fe8270ec0de41eb51390aa19bf5089cf6ca3cd4757ce8fc
SHA5129bcbd44f561ccf43025bccbf34edc5b27e9e7657627d0fced0eab0725f5df70e3636e68fedb31be2814b4e8efd9d0f6eda73666f5dabe254fa860c78ecc1ecbf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b