Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 22:10
Static task
static1
Behavioral task
behavioral1
Sample
b1085db03fbe639aebc573626dc74ea5_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b1085db03fbe639aebc573626dc74ea5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b1085db03fbe639aebc573626dc74ea5_JaffaCakes118.html
-
Size
9KB
-
MD5
b1085db03fbe639aebc573626dc74ea5
-
SHA1
4d1e5057b33672b2c4e980d2816a2b038e33c675
-
SHA256
21544f7e899c4552259ef9889a8f1059c8b8a1f380fc69dfe0d93c40260277da
-
SHA512
1ed2567892e53af622796889707ab0e03f856d958e26002faba951b824af2d3a848a930b8b0faf7330042e2d5add6f1e468fd81bf0eb9c147b4148cfa28326cc
-
SSDEEP
192:LLLjJ+GaGt/vZANdbo6Eu62/ixXWLPfnbGPcOPsdeyXW31:LLL70dM4KAnbPzd21
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c00994d94df3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{05018791-5F41-11EF-93C1-E2BC28E7E786} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd000000000200000000001066000000010000200000003e6e035ae5ad4412c05390c4178e0582259e51b77d1e3e0991f74af4e5705676000000000e8000000002000020000000542c301a0bdb11e175da12265cf3cec766d0f1268c0cb356a2a866ea8371fe5920000000d7cd28c0c9311270498cfcbff79f0adcf260c1ce18670cc23d14301f52a8721b4000000021a7dcb98a2b2c77f318ad00fb3befdb8aba0e8af00128485c22fe457ebb243f6b98de74b19f2eaf6aeb4f390e8cde5c5d562686be6dd07ef3612d6a409ed013 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430353700" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1988 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1988 iexplore.exe 1988 iexplore.exe 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1988 wrote to memory of 2636 1988 iexplore.exe 30 PID 1988 wrote to memory of 2636 1988 iexplore.exe 30 PID 1988 wrote to memory of 2636 1988 iexplore.exe 30 PID 1988 wrote to memory of 2636 1988 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b1085db03fbe639aebc573626dc74ea5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1988 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571241ceb3903a95212b877a2d0691166
SHA1d8759c7c393b8ea3169135654e14777cd822a3dd
SHA256be9660c9f583d37743d542b79596ef22376c0877e07e529e58e9e38f882c9ca9
SHA512998115cfda65c948d70f90fb67461b05a59140fd73453af62fa78f4de07bed10fa2e2484d2f40a38b99b11d58c864584192486e559eb02248b286c69757e3822
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fde0b6ab45c4bdd20ddec7afc94e3fe2
SHA19dc376b6cc7978b777b09c3d31860a386ea016a6
SHA2568a3411ffa8d56d1c809373a0fb45e46acc67f78afd7875cb66a18a91b5e5f3fd
SHA512ec21b45dfc4a9f711f6ab0e3de0ef66f618ef5823b26952e9bc42f85b1d2903834244b7f5aa86a3df23f609409dafb060ce163209514ee584e753f5274c8dc26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a36df7bac5609442008f2316d57357f
SHA199716ecdf4f90c932b53ccdaf1da554bc761ae2f
SHA2560d674a3519f7f4e4ef7f3c9857a14400ffa6e3c6719a0cd4ab5805f100f6e341
SHA51223894f688abefedce14be56aeacbf61fd89aebb8872604b82a6bc80064c8d51cd7d7b90c30b9d5334dc94fd0856844b43cd55d5aed3457b7179a239ed16aabe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8f38ce3961381081a423379a5dfb1c9
SHA1f6ec809ae137561d6a736db70886990efb1e8044
SHA2563decca5b1cc0de90125ea6df5da6024429a90799cb16804b1bc0c98fc25141ad
SHA512e98a70f8676ce104e1cab5ac8da989a21efeb24955ca97b4f18fac3383433f546f44dff7fdd66042ee4d58185b98d55cef8d153b3f4fa4085784ce8cc6e48b43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6b0d11aafc840a49e729a76dd63f5ee
SHA1f87bba9c72d935f93e84eb72f73899a11bb1863c
SHA256ac8ad3ef6e348b5421e45683d2623bcb7325577992b8b44ee8af1550ff5b2299
SHA5122ae6379ac49aba0df59c5443c267b844588c886de9dee200c7f6af801e330ab7535267e1119e4a204675e4b24e5393a6e0d2fc50405c0fb008f5ebf0113e92e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b664793037af3b68102b9ca059e3667
SHA1cf3b15d7aca14bc1aaf70bea4837dd27dd07e20a
SHA256ffded0a754130d3ff9f9f00b1b8eedd20770d1d405ebc600e54810591dfdce69
SHA512b6dfb9d175da4ee270a5b84427a44929bce2a86d2120aee205944999caff59628b5610d986047f58141f75b4265a9c887fde9748a599cdbdd40e3c396dd2a417
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae3e12766794c59527b526509430114c
SHA1be228c47fd6ca8035bb95694a1fcca5ef5606634
SHA256045a694f50ef1767a375038fab997a0762f2e41d1609c4c265ca3d9d71528db6
SHA51213b14e25c211084bfc19c09d3184b97136adb054ccc67891588cc77c8e3b32709a4ba657b7bb58ca0d736c89b783a89cf6abb4a364beaee4cb0c6539fe65999a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6e510259d1031feee4c521cdbfc306f
SHA119189d0534b91ef4c16e21e1e76e4506dbea5122
SHA2568a70d7b7cdd0bca118e44a5a1ecfc9aa245175fea43f4e6050457f0102b0b5c5
SHA512c9d1d4ea493b1758e8e2e8df652c208fc2b3cd0b81fd819820f439d81f03391c162fde0ef65269f078e7ae088eb1a267ca2a064bdc97694a4c9acba608165a11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5483212ba1422680e1a5bece596a096d5
SHA132c29bd111887d76b6bd3127c2c749caf09c1961
SHA256f265299b17b030d0d9af8d493f2bd4ccd257850d9eeebcba86814ee3be867e66
SHA51276038a8314a6c0eea9b055c10050e6a3ed0752c44e0ea9943ac6b49df43a86b95626d11a75c5a6c037abaad4aaee65b1b01d5e290a77de806571228ce15899ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5956e974dddd0977d298d73e3dc209b51
SHA1d850bcb0c71affb5c50ad405966a3f033a2ce017
SHA2565868c5d64c6a7a75162372763694480f61abc1044d94bc83237114dd5852ed54
SHA51251709b4d400041876cb2085a0a18dda634f7a6503fcd0888b8879b27d2e5daed2947f68179ee05c57229cdef8616cecd1da45e93aa10d27605cd2ea1edcfd76c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f76aea00c87b20948d8719f35913413b
SHA1219fc3614c4fb48162d4ae6621ca02a873d71e46
SHA256fdbe96bf6cdf1ec7d3ff4115db96aa6df4f2638825255df693d11e3bd548cd7d
SHA512ba333e758bbcc1c741b92189ec00d8d3c8891c324eb7c67f6ed53c9e3c4f108c5cdea747bf2d820ba35b60799425de8107ccecce75e0db7a78aed3364a6279d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5472c8a187cfc4ca2b1d4e7bb796d8438
SHA141fe5ec10825bf63550ddbcf5c2becfce2b28152
SHA25601ab961e4ca722e459a10706844600ecf6880cef1d44a4445fd09f606d2e02d5
SHA512da60d553b6de914fa2a0df92814c45784b5b2b7fed861b5a4a00b80842dc2a4f6c066251bf410096ddb48e6848b273366363dfe560f319dfc07599dfe2b50e7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a78d241eddb218cf48c6ac962c9322e
SHA1ac7fc9a185b60a6efbf0be96bd73b8f2701861d5
SHA25653f6cc8fcbbd7319bc207d7a5be06305380d2cad4a0ad9e920e0f6dcd450abc8
SHA51263bf04f35f922ad5a5bb9a84f91cc1f7df422cb0218969db7898e302293ea63800ad8f6162e57626304da63382469c908c632718ebc1549d58bd15ee9dfe7542
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f34109d5c86413ebb3b4235b1ae32191
SHA1321d941d16569a85c90358316bd4496e0e6c0d51
SHA2562aa67314949209a5d7a9bd9110ed2448e4197a186257b8e9a6a772c3598a3b02
SHA512300ff557af936971c21a0d317bfa930c561b882de0ab1bfee1d96e5a7883c7fd0cc5992a044d77c15f5bf8e3b297d870070394eda956113c65272cfc6e5661ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea205e420aba04061c243fc51381b395
SHA107181bed1457af457ef784f2f740be00dcb93e42
SHA25662d3caef12c1e6666e896861769bb3581f8543dd1df8f9a2ad618504ea6783e8
SHA5120f886857bd174e57e08ceb507722bb97f495b93f7c2bdc9d5856fe92f04bf65bbe818e58edb3d3b22ebeb46383992a42f8a4d506f15fd5b737b960514d8412af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b87c2c04504b7eb92aa69c75b3fd56c7
SHA1259d40e69a661cecf5f9fded713f5da01d28b9d1
SHA256f5d2965cc38295053c4ac0d94886ffd6b41701dcc9920a6b96257d7be46ce853
SHA512a72409950d452801f16edd008cf0c47b1f3b5b23750f49016131e3dd2937542eec72f164579eac8ef8108bae41b962073de1b1713f516ec978170d1c4c4bb1fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e177f544126bf229f4a6a34f1150f3df
SHA1bbd3356f459b131e6fc5fcd1096ccf97f9c9e1b3
SHA256691b2e61e02e48d593689b02ba76fff2ca508f78bd3d5da31a8955bcd8c0134c
SHA5128a54791b40e0f7a9487cf4592dac35f371fba9f423f4e71184d23be68dae94bd08ecdcb6acb1c893b699bb3f6716a18ee80813c448969c20d55f51a1bcea200b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545656ae5c5a0655a9e81af02e6410750
SHA1a1b6594dea10280ae55ac5ba64b12d5a93af5026
SHA256c011c217a3b168c3056d108d6de2e22f7a653305469f68119d953f5222d4f01a
SHA512910b65d9fab9bc4d2e125c42badca791d9c99d9e78fb805fc68c5569d5bb03738ccc452b858ecc74d0c82f34b8b5f16b303d25b43c380fbfbd5db078773923d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57171c4b312edcd6b7c34f8760370fe14
SHA1da3bbea8cdb359d4ed40b43a088bc2f375390cdb
SHA256398234caa213ac9a7e5331565d7ecb08e73389a64c1a7cfc1f8282a2010f0b1d
SHA5127bc9d411754d27cdbfc277a41d18be55184ca96ec387f4e0d4eb225c320bf7b8d4cd1025fe45a0bdcdbeb75169d810a8100eaebffc37e7c74990e11008e36407
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b