Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19-08-2024 15:13
Static task
static1
Behavioral task
behavioral1
Sample
ab824f7fd7a8880ed8e0b619aa39d159_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ab824f7fd7a8880ed8e0b619aa39d159_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ab824f7fd7a8880ed8e0b619aa39d159_JaffaCakes118.html
-
Size
43KB
-
MD5
ab824f7fd7a8880ed8e0b619aa39d159
-
SHA1
c227965b77a30462538c2c7fd35dacdfcc903d3e
-
SHA256
58b11e108bb52b7eabb78b68598b933c62260f15723946263f73ade99d0caf04
-
SHA512
a8b85579b694d8354ab7500cbae7e5d5db86ac477e199313a2a37f88997863a26775e3d72d84774df66b8393660b0365445e4b66bb51e9f0a1f28f2eb390507d
-
SSDEEP
768:1tVBRvyTOb9S1vnOEhtznOn9gnVnRnTnV9Kihg50KTmn:BvymKntTO9ANZzX1hg50Kqn
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A9926B81-5E3D-11EF-9403-6ED7993C8D5B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000d847413ae99a1a0a6d1edce54990b9c0642ab37193dfcc71ef9372da106d9bb3000000000e8000000002000020000000c0517cebbbac1221630d7c39ce86d48495a4ff8b9941d088ca27f1f1955dda822000000020cfdae39721592a1779e57328b2432d66f9d7c84bded2f090fd385a01fab66540000000a600c8a799afd565f8e5e1bad4fdcdd781a2384a913d6ad141390ac8aca50909ee3d3aa667bc16aa11aa4ab10b3f0e66bb517c4bf20b5532ed1240236ecbabb7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 600351824af2da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f0000000002000000000010660000000100002000000007df78264892ba25b7f2b60ac624e27a8ac3b91beb63206c432a98210573b72b000000000e8000000002000020000000da2cf2ef098a10fd561cf7407cdc232d12c58056c8d9e418e6d5a5516e756c1b90000000bcd462eb59d05ae47cd94968ebe09c04777c9256823e4053c97e5cf7529b47f01cbe752ee813a7c34c6180d19ebefe8b91c88960a1245aa52e1ac1d6690b85f14a222db78a54855111cef72c1aa19502aced635251693e84f74b22078dff3a48eea0ced4ba78d76e34e40715198120c4ee86ff45d65c65263096c615e283196d7c4b16c6882652149dcc148a52722cb1400000006884d9309c42e061a92bc1ec4dd3af3d961f1d22b72cd2fa7a6609d969610d118ecc446e07e7a93df8bd23b9243dbb63314d8fe2c16cfb56b2db2ca788dbd9b4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430242309" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1460 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1460 iexplore.exe 1460 iexplore.exe 568 IEXPLORE.EXE 568 IEXPLORE.EXE 568 IEXPLORE.EXE 568 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1460 wrote to memory of 568 1460 iexplore.exe 30 PID 1460 wrote to memory of 568 1460 iexplore.exe 30 PID 1460 wrote to memory of 568 1460 iexplore.exe 30 PID 1460 wrote to memory of 568 1460 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ab824f7fd7a8880ed8e0b619aa39d159_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1460 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD59548ae03bb17b3e094f0b90d775b3597
SHA1ac4290b1f9cb93b1afb86a15f8febceefc6f8e5f
SHA256f6e6b0c5318565da07e92c26339e68f8227182266796da2cb1f42cde510a730b
SHA512955a64e629b955e3e17d07bd0a0771063f8c4d2507d74ad68478dd7a050f3cafaed8ea603f60c8fb7b3f217354697c8b8e603dcad1dd0fc6fc4f028b694c17b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD50c3a3fc4664852695caf6d18a976ca1d
SHA15401ec13bd4c9db91cb3726159408458872ed127
SHA2569d4a927331b1cfa967ea19bc28567707ca61f60ccfbe0c5db129040d838e44c7
SHA51247969ce09817ecdc487c61d9d596f691b99ab991cf48d6b9fb1ba664707fb549166599915e8ca24ac531b95031b5f3638bcac2572496536e0aacbb62e0c3390e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bd740a6897b3f01951b0141445333df
SHA13d3954b67198735f035536c31c2be1f6822f5e73
SHA25621675a87a4fcdf3bbe95a90206924ac8c6f7ccc7118be214cab3f8345578a96d
SHA51241f6992fbb2de85256f393987b7ae83930c63824d26f99717dc3205b967de440bd5f3b4291699dd310d8e95d8470451cb1499124240bfb5c14bf0cb9d7f4bc36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd680e193851b4ff31507b82be6583b5
SHA1495cd05e4c7e04ce4c7ceed20db5e9b22e857b37
SHA256923889784dc48fc07e609aac4c0b258b377a6a67451521db7517ea72e002676c
SHA512c48c3216b1ea9878524518ba37bf18f81d216a74282e4eab9ff360add897093c7900d9e495e24f37c44c7a64d0ec2201417270c551d6ca9201082ea62624f54f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b466616ad28d74b597a4f80c9b2f166
SHA1165362da1a6d5650a3a64d52721c96c8f6b24655
SHA256b2778213dd6e12a12f9d33037f89d06a3f0922e6e442c1a0233f96f28c68eba5
SHA512cdd3ea9934f62e4f2eedf2efbae579b7ed4e5ea6769bb3bfaac1d954d9982f0909acd785cde94bf28fac3b350fa870494548a9da4ddd048d47584605356db4b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5784c356828b51453baec4e2a5ab0c33e
SHA19d8af55aafccab6e23afc1cfa2aa1ffcebd33994
SHA2562d9d5edf6f4e4c2f2cab043fe24cd1e0179651ad0135ebd25b1a5d56c2196ccb
SHA51200689bb0717aa56091ea0d96190b14851e6d4b21a00d9ff016fdc408934cfab5beea5d6a3e7bf47147baa9c9cd12a723223337c21964c38068c33c859980ef32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525c811fdb3edd02ee1a8ec6893036ba0
SHA187cf19b831da5873ea7def95094f067932aa1a51
SHA25608f6cd14050b0c618175ba4fa24780072717af9689cfb7f95d6377eb88b4adda
SHA51226da0c4ac337d03efdec35fabb2c43c766f59d9c0990cf0bfc842075eaee35943e26ddf3267e770d848de50114a57a70f8cc2a36ce7337c5d3f4eb5d2a2a8718
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ab84ac4b5856d9349bf3f92b3bad74d
SHA18c5e089ae19e7de5d678aab4c27e3e3c97467c1d
SHA256ce6fbde32857748f91732e6bd20b2192cbd913d3364fd8716d76ef7627e5287c
SHA5128e01b0a883077712ddbcd462abacf56cbda6081043cf8236816bc42632251c10aa611b4c6939ebd79dacf2079a1dae9455ea70d331a46a030949473fe3b78062
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55567e581468525fd2368e384350ad5a8
SHA10bfce7cb782e33c47e9bd1cec2879a5f881297bb
SHA25668734dfdfac1deeabb122802c8c8889a7e576891344dc00e4c86df2fc90f09ec
SHA512102874f22598cf8346b8230327d74adadb0a01ba4013f78fd3990f6ca2de262819031ae150670aafb2d8eb17dc3ae0afa2ebed2525c652bb6abea4f80e0f46da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa291ab0da86424d21e0a4f463176c88
SHA169d5c90cce4007ce92f0c32b84af3790af91b08c
SHA2562216b9a832380c2239cafee81979e4592582f4cec66ebe2ed4553919ac005829
SHA5122ac5246d0b761be523b21b92ebede138156c0f8b781926eb013f5d158a5a0461dcd03dd40e1df54de49865df9f525f82135ab999a2452f1be675a3c0f7e01c12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a82f3c9ac085b538524806e87efa7f1b
SHA1e3e7f56cad280458ff8c85427fa5fd7efac6e8bb
SHA256193dfdc557710deb3e5e84312cbfddb2fa82965d1c19d2a958e576c9da5c9ed9
SHA5124703b5df4c7027592310fe33a145fdd37980239b9936c9d64ba779dd9b6e724f1298fbcb05286a304fbc341824569ed37c2c83698c1f475eac91f3f84b462fc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57338554abace752e1789d69806bb3248
SHA18ece86f3f0181ae8e95521a4fe36158a69286c73
SHA25683779da3e26f184413c10dd2730361f4be1493fea50f254306712f4646a3a64c
SHA512187b45677a11d4c8272b447c6989a682a69f9a48b9994abc7e0a6ab03e2e88cb8634c799869777078ff5a93dfdc8af0f723e1a119d821895f04954cbac85593a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5290251978be0495da66007c62381bb9a
SHA1d1a98a1a296013c8d50aeb01e7e88588310186c8
SHA2564a0c534df03bde2d75070072436b51bbe973f146e96c8fbc4f5ee80f6ac3f5cd
SHA5129d7bfa0efbc864ad35c7e45a85d39a966886c3314a6be2141ae8b022d70396717f2465bd3ab71c3137b01eb6ae33625a5018dc618474f15461686dcaca46bb38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550244af4bda69dda96bc17c3ba762f9c
SHA17d21bde6b332e0362d1f6efbcb60ee35b73c8921
SHA256f78569e0d0f3c3b6bf90f93cddc050f39100bfbc4248fff71d7dd5d959b30906
SHA5121269a8018c62b64f88739ca5f8a74be4ac66f453be5927e8f8e5480274f81f870d36ef01d7f9c4182d0a83b2d8f176c06fda46630cc4221a39068498ccdab7df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD53277fb40af0adb620538204ba1c3da3f
SHA136869cf6a6567c8e9332b89a57ea304bb1033279
SHA256640a9b6aaa777bc3ccd1fd71813feb8e41768cde2f7bd07afced319a682bf33f
SHA512870c8eccd75bf8c416d99f3e1ac5f29c83437f55a234c0c84335e4a7c04c0f7f1f0117764b09bef78ba8dd58c6a3db16124da6c404803064efd89e91eddd7d43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD501686f4020f65abb0a6b4a519a0a184f
SHA14dd0e05f5ed6bb51880e240ec2499110ecc76386
SHA2567ed791fd11afbdf8e05f1c5bd64891eed4ff031e278310eb04759196c1c69074
SHA512ed3a7f98d8af7697914a7a8f99c61ab6fbc8b1bb63b02653fbefc254988ae0f74e7b7ec5f83c95537fc3179ed41bdc0c716c677d8dfd07fba45f41e57c41edfc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b