Analysis
-
max time kernel
133s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 17:27
Static task
static1
Behavioral task
behavioral1
Sample
abe8fd7281072f47110353174f7ea178_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
abe8fd7281072f47110353174f7ea178_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
abe8fd7281072f47110353174f7ea178_JaffaCakes118.html
-
Size
53KB
-
MD5
abe8fd7281072f47110353174f7ea178
-
SHA1
981d97adcc55eb71921aad2a00064c0f01be6db0
-
SHA256
16c71d5809438ce9ca0176362f5da37ba4c14cde19807a7cfc48c0ac4a1e94b5
-
SHA512
7d7bdc6900e26d10858a976112f64290d1bcf9e25b67df89e8a020d1df0dcec2b1d5f777b27bb129722398b0ebf8f30778adc27b20c0a73193745b399149a097
-
SSDEEP
1536:CkgUiIakTqGivi+PyUvrunlYV63Nj+q5VyvR0w2AzTICbbFoe/t9M/dNwIUTDmD/:CkgUiIakTqGivi+PyUvrunlYV63Nj+qp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5014ab375df2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{47024361-5E50-11EF-B0EB-7699BFC84B14} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430250306" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000ab27db6235ebf1bbd3ac08b3a6143608f07fb623f9c6535d76e9ef06608b4db9000000000e8000000002000020000000aa27cec7ab90b8a45dedb21a49854e983bbc73c9a6d6b2d67de573259e8f11d2900000007643ad00de39509b5060e7b836322aaf6f0f67ed6e5956b94259f523f93dc252dfee36f9ce4103202fdd9c12654811cd321fbff0059d7fdf667624a402bc802baa6538f58c6d021f3b66c64efdca7f53c78ca97a8c3ddde349790b0b43998024f9799de54d408f84a9efec2853f88b68f34d91e91b86bfa03f8ce4b1a8ae9290ab1ef007f9b3dc346c9a441eb2f5261a400000005de09a57b99c75b473ea25a18e83655a538ae7dffcae279216ff7012f69763304cce9f6e5e7163bf0f76595bd0bfa39ae8707568673ff957b0622b3533e01d34 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000e2a91d2e2ab6e024045f2c74989c107ab81c88bfca8716140266b10bd7ab204a000000000e8000000002000020000000efa4cf7d7b531411438ddd1a799adbefb4348de48daad37249e5638f17fbb91d20000000a15d39d4ce655549c04d1aba00ccccd99934422d8021b3cfaca6c10150e94f1f40000000596d5d0765afc306725a906d5c8ee7e24e51a1e935f331c1ac0936b7f6bd8cb772f982682308deed51512e2863672f8384802cb82f7bd77c40db4dee71647daf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2232 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2232 iexplore.exe 2232 iexplore.exe 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2524 2232 iexplore.exe 28 PID 2232 wrote to memory of 2524 2232 iexplore.exe 28 PID 2232 wrote to memory of 2524 2232 iexplore.exe 28 PID 2232 wrote to memory of 2524 2232 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\abe8fd7281072f47110353174f7ea178_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2232 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5207be686d59da4b7d39a76d9e97e148c
SHA1a4388094e50c071d78e2486a76fe34f8ea0ea8a2
SHA256b810646f071b4e56a68188cab5c7115953e219813aed60586c9c6cb45e409c9d
SHA512b9c421f0f7ffa49df044bd2a2a4b2e8a93dc852553b64173ce176715781c5ff1cc88ff31b393c787f9577b90ab695e59371e154cea66c376e6cde3e639575ae6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ced19b86ff296aabe46ec3aed6251f09
SHA15621f0b3d11ab74d5e2e30184e74816b15d8e4b9
SHA256a2364c71823aaa5e62f11197483ad1ee6ec773269b38bb4fa2aeda16c375c9a4
SHA5123647cc054e8cfe652b94202c98be790db944d42a27fac2861c2914f0f1f58466142a0043fe93f4e202f96245d1d80e24db9144840b08a596a789c99d61bf1061
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510c33a5d77ae05314805dccd9ea1d648
SHA1a2ec042074594738f48b59c8861cbd0bcfcb7be3
SHA25656d2a4314e885630c29f3ae4830c005b56165bd13f883c52515365702d5b0486
SHA512b056b3921aa6601b8b97093c1c655a4f78411054fbf66cf2cdd19096a553e20ad9ec8aca09d7e274eee490013351aca00d2e761c104b5be3bc513685c2e94e11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a593f579ef5dcb16243b559c186df8cc
SHA10c16b6a4802a82b3e9efeb11ddd58e310949e67f
SHA256519b1589c717af0e80b81880beccdec70e857aac665f319ea38a703bf02caac6
SHA512692714773f6cee36a4d425e745781df3345432dafc7adb78b6be90d84338829796bd9b1516d2f3192762426e354a90c908f50cb4e92e5b54190c7ac1f37a0172
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9f98de992c70b54c2459163d88e0fc1
SHA1de485eb02eb1126226ef95eb9e9acf1802d85b11
SHA2564e9ae6b6e5a3347b3abc9477a737199dc7747bd343b97da1cde38bc6f5211f7a
SHA5120294783d5e09e4179cf0c3cecc9a3b0f23a6ebd2b9459ff3ff7bafd7eb5ed0710b7e79f0e63cd63b2c6da2f9a2bccbb742dfc3e44ab5cdf35f90ec3605018221
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6cdb8b72d8953bb61921bb4e33437fe
SHA17427b2b7887e0c0d8dd28567d5db67a81f1b4e6f
SHA256e97992099b92a87a1ae223d1cb97e8824f181b735a0eb56328937e0cf440ad40
SHA512804e428a9338490d292e17cfe28e2bf8c88f8ce239ab68e319cd59499fa1cc11bdd801636ce6ef0576f6e3e83d84b056d1a731c0015fdf5f9906bc469fa509ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db621c29398e22d572e4bcebf388bbd5
SHA183056057cdc4c5f8f06db6ff4ce944bcc1588f4e
SHA2560b7bc723b8b82be8879572979a170d6fff433ab6e407b6821c9ffc53503d19ff
SHA512bdabdb9cfa6dd8c2c0efb51735b33bf1dc1f08bac2c693a061ce09bd63c0781ca1acc423a2aefa4d54fd22af22bc29c3c16f9b410b64c7e113690f1aeb957ecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f4d8195593ec4e0c4fcca068fa43969
SHA1977d457884a72b37f022080dc220d3e75d745e15
SHA256d9501cc20e65d28bc70b81f14a167eb1efa9f9cf7886758b77e04ced8d5ab76c
SHA512e5333588a20821b89f3bd6e89299d7bffb3bb6ca9a485c6990b72eb88e5e838f91adb3869abccf8631cb18399ca36af217d78f56902e704b5af46271e9cbd7d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8e2ad992fd5b4d66c418a0697614790
SHA1f8f155f6ad96f65d6fcba41c95fa776c9686ac49
SHA25658e116b4f97255b6fb280b84b7563c122eac6a7b00efa1a35d015dae69bb3ff3
SHA5121953e16ab7b728b91150e86fbdfd71678229d700f1b59d627c52762c86e39dd558e69dbe15bf5e3956b8aae578bd461ad47a4d3b373dd97b3a106ad9b08fb560
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59accea42cc3e85568088efd42ceab2b9
SHA1b90e3524fff06ac2452df08fa1a04585f1c0f465
SHA25649d572abdcff63972cf05b0aaea2f88f7c175eb2c5bb40d1dc1fdb2ac6d58a55
SHA512d5af7b73e39c9712e3a373920356fc1f9ed4499ab93dbb437349fa92359d8f87efe846a8ea87e1595e67ed62f8c9fd929d08b5e499c8791b9653a01de37b5a0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581ff83d2f70c066e3263bfc0b2983d05
SHA13b51e0e98c47d110a132732d7667615dc832e050
SHA25648bb76fffb8fb83663e3ee4651fc0677585fcbe82e82a9a0122064d8fd449601
SHA512524c402f9a83b958b724d75cf8424f14e7a0466bb465d6ffcddeffba85aa6a9ffffd918a0d3ced99f66ce899ceed1e98a32da77a9a27448b48ad244f54933f2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aec7a493ca5750816cc9eb2d75f977c9
SHA1a9694aeeb0fe13fdfd8187f4d21d86383afd2a4b
SHA256b951816be93a11344bb3e84babf91eaac319d498952bcae3c69caa076584b784
SHA5121f791e9864571d728a43a66983cccc7abe0b8b1b3d97bf5a2858d88fe6f3044c78fd201ffb2d16537f1fb0ca91e6e806b1bc887f55f9157fef765a1bf34ca347
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3b7ce7adb78a33908f0f77ff4d45c58
SHA1fb71a0c0ce10a2939a5e68955c4caee95e91ccb9
SHA256b3e07903ce6f2d1dbca0e0b46e843186148e58ff9fecfc16bd25c44959af77c7
SHA5128d79c4809092587e879d5c66680c78071f20d9df252043149a73bbd8c1937bde04f22266fd8e5e5b0dde094531e7c04160d9eb0d3793ed8638793a307292c13d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567b547fbcd15b5f93da1b31f899605ef
SHA1f07f0b5852083f1e5680c509a3790ef858f4b163
SHA25695f1273c1d445127d6fbf287cbbcb31c4a6bffb5b16d8498e78b707b9b6b3771
SHA512d9f8b4e5573e8ec7628aa1ed129c9244aceedf16fd31e611ad8b45769c2a5896a4af812056390e188aa00a09dafd25efa95046afc8c0668428c803d156f007ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530006de256a465d54cab8e04a6cf6b8d
SHA18818c4f50fd0f4a378376d84b40a5dcaafa4785c
SHA256041ba0fc80a6bed78dbd8a6cace2d556d53319a3be627521d2b52c5a6a7ea2f6
SHA512fb7d4a103111f6b3b16a4beefc0b358f40a5042090327088dad5ec633a19b575fc4e7bdaa7d766ebbad06a4dc7fcbd60921e8d5afc0a550bc3f951680d4f96de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff017a2961115d5518066cc8747202fb
SHA1f1688d54170418abc0c3220e973d157818c9e901
SHA256cd33e094d2555f2a56e5acbcbd69317f1db817c759fe39d20a8bf7085d150552
SHA512f8465311e603f2b58e1d5f3030aa17b5918f6983ab060dd5c9866a2398e5e504f7cb082335fd8526966923c3c5709fe6673c4ef2acc90ed7d59565498d7928a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fce9ebf18488e2a72d7da5cdcea63b35
SHA152a204deca7addb3c59a403045c77e76da326b3f
SHA25663464679fc1d8325ea3948a0dd81539870c7d413ea1d38c2dc84439b5a8e2dc2
SHA512143725caf41e7fb029e5372441f791a7c7041d1c1fb64e8388a2580cabe3a2953e008876e0269443acc44aec72f85e438357082a9726e23968d4416140945194
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\84EXSCRK\useroff[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b