Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 01:34
Static task
static1
Behavioral task
behavioral1
Sample
ad64f63b5b953cafb53c2f3d39bcde75_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ad64f63b5b953cafb53c2f3d39bcde75_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ad64f63b5b953cafb53c2f3d39bcde75_JaffaCakes118.html
-
Size
6KB
-
MD5
ad64f63b5b953cafb53c2f3d39bcde75
-
SHA1
37255daec1608a3664f43b3551040624bcf2e138
-
SHA256
1d064b759d35dcbb04036cc912168a039e17710d6fee0daf1ba7f18bec6966e7
-
SHA512
a097061d80acbdc3c5532dcdc0aa93d4c87d84c3f314b6fe34927f1583bd31f8e0ced09d748a95f8921ff2c423abd363cd5ad6019323291d43775e537f1f9a50
-
SSDEEP
96:uzVs+ux7jlXLLY1k9o84d12ef7CSTUJZcEZ7ru7f:csz7jFAYS/Ub76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d99090000000002000000000010660000000100002000000074ea9eeed35b84968bb4c07b5f5f06650043824e7bcec8ed129b433ec9339f2c000000000e80000000020000200000009bc4d137c1b292cb4e9c79ab289d29d42315a6b6d8a93d2016e1b149c8907e87200000006a148e4cfdb743383f68aeeaea8e87c81cfeb1264bff032742fa049c32805b69400000004aa8a385b6bcad1fc37d53f5bf2b9d4574f8ff480ee6321f6cc240cb8e2cea4fcfc0bc5c3428f7a8a823b3db662f8046bb2475f99d14e31f59b03d698ff6e797 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0776d3aa1f2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430279559" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{65829491-5E94-11EF-A1F7-DA486F9A72E4} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2756 iexplore.exe 2756 iexplore.exe 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2684 2756 iexplore.exe 31 PID 2756 wrote to memory of 2684 2756 iexplore.exe 31 PID 2756 wrote to memory of 2684 2756 iexplore.exe 31 PID 2756 wrote to memory of 2684 2756 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ad64f63b5b953cafb53c2f3d39bcde75_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2756 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58860069b7b6be16cffcb31654645d2a9
SHA184ea7c01cbb8359832585b09f5288f533d49f3bf
SHA25665e7e383dbb14625b7de8e6a6bc480608f8be86408dabb695ceabdcee2600935
SHA5128a4aa7a18eeff46d81c2729a76a9716d5bdae8279c9ac9c6ac80e59db245d30f13e107be8dbf80300ccd7e71961cb268bdffc26a3385c55809708e369bbbea62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55adca1ec9d31d81bb81b8ee873e3d53d
SHA1b74ef3c3732d8f57ea0fceb1edf66e1388978ffb
SHA2560a754cb0fb468d239d3de87de0bf8dd93d5e9d45a61fd2d96851fa2f89b828ac
SHA5123509012c5b19faee23afc40c5a5dd4bfe777a2078d5c19eb22029434776b352d5d60a5a1b7704ef023ce5a497cae090c88bc126fa0720c4cd9ac13102a3bc9f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500c6c25e110b54f4ad70280eacb9ba1b
SHA1da144436f23b4acf34b7cdcd967ef3b0bac3ea10
SHA2567134e8a6a09f6ccb766941339e5d6acbf002a5057f5517125af98aa41e264265
SHA512e5d3dfda0a9f5ef5cabd922769867da61b066ad5726c93d6e6d7e1b1326098dc75b71597e0cea4cde033541e4526eb0f46d883c95c65f0963778365401d434f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54aa5bf44503b489c847c92c18950b601
SHA1955adfffec8bbc3493b965e5756bdfd7981b6877
SHA256f80691ee3e235f4daefdf92c874f63456d3aa6c2fabc235d5ea9533841613681
SHA51235fda4f351cee749c060b85f5a7888817b06493417eab42f6ec88565f1e777ef71678bae590e5bbd2cfb604ff02c22c8607ffa12dc597fed679000bb465b1ed5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9e81d96adc284f5bc70d1ad04f3519e
SHA1b69c91e56e23b6fe061839ca09ff1711f97a08aa
SHA2560807c6bda28139cfc200252d058a936b7306865a994cf4d7095a02b9dbd43315
SHA512031c0a7455fa4aac0b61838f0b6dc69b0f7bc0450152c3150e4079750b7a1000c645d9a705ff1d440e9960fba68850e15a37d072bd3417da3ae57fa4bc08f203
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52daf44843fbb4b8e85b56e417dbf15c3
SHA1be01aef5c8165ba2d09480aa88e25eac0234b1eb
SHA2565eba863ed1d76385cc3f40efc1a5cf1d5a0b286b4c6459fe907063fe90595bc8
SHA512666b0d6c60726ed4eee19a1321439021fcfe20ecf8be56bc67f65a1000cdfc5ce32a0d26063160711ae8448d7f75b70418e923802c557162ac832a7dd821053b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500716703b298be778a2d8d1d29373cdb
SHA1314fc33fc0118306a5b0d5aec46f7b6ccb357cdb
SHA2565cdbe58e536c252de1ad3a764911d190bfeb32d691894e6c7afe16bb3aaa6802
SHA5123c82e4fe759117727fdca930e681d0300ba538b98de00cd8a9a42450427a7f9e75137e6a845b7e82bcd4c735f773eba87e533f8eaca56a78791e3f23d70604ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529e55a625d9de5c41e563a62eae20a20
SHA142a659e1852803c19f679070e0a58e587221248f
SHA256fbe336da1117560cdd17c2fbf84eaf3ef94b568bba1b9273ae680d3a46b25525
SHA512ac556b3568ac30d72833c6feef9b0ee4232792d3bbdac1daa95c42b346fff57b8c37ae003cf5e50c7e6388a0b86e099c99c88980a8b564abd756ba0381a5dc51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533f69f251db3cf4c8fd54e3246d8eb5a
SHA17e9132a1e8df78b3b662d6e5c449ea9c383c9a30
SHA256a527742956a1255876b2969b21249828c69221cd6adb89a8b8cfb1c46dd7feac
SHA51281cbcbbc70d31d38af64728c2f7ec0d6552ad1bb4d8f992868b788b04303d27ea5d9fede572f6c163de0b1708001ff30d8aa0cda39d94c471ea76f9a7fb5c514
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505d482b9b55ca973b56ffc20b9829d84
SHA1a3ccee35317b105d4d6071009be32d990129a714
SHA256119efad9a04d0e9783125cfc44b2e39e4eab252b805a7e8a63f781344f9af2ad
SHA512b72c05d1c6b168046cba4542654cecbaf80c106535d8c40b5c66720fa5d0bb83d0f338e87ce8ad5953bff9e91f74e9a12559017ee6fd75abd2a47e9a9def5306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af051d52e07ccd3853abee96863a0602
SHA1e0fc9311fc958b480d61568d404d843028c55d3c
SHA2562cc238162138586335ace701e637c8b5580a41f7c8076d9aa2ec8f7bd4dde1ab
SHA51203325dc77e15518ee90ef996788d122406045d1ffeda9f9502036574504245abd0446ebf32869a65288e3bef06c5f27563d7044e7add0df68c30f5b620692953
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52502d8c0b5d396ed223961d155900628
SHA18eeb9eed44e1d422750d364ad378010fb9db7ab0
SHA25636f92e1cab6de4446ee5cdf10554f69160f2a3b01d062cee65e569914347a9b1
SHA512e5f6904d3885aa0a5fc8a0defcee1d3b6fa392b45eae15abf8f4e4d7452e4a4fd5ca84e99f9c11f8158416253d99e7627dc35806637b2560f424e3b2cbed879c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535581d5f39fb632139f265a96c5c286b
SHA1ea7da37cce632c71741d8762b64b1b2c496df1c9
SHA256d6c03067e08730c8db2d72da78855c99e158f7614b08e6e72bf798954611b036
SHA512d3848baebe85b2dae315ebf2e1fca7826dd994b827be30ef890bbd2e5eda3708a380cced3be92c7162109baed44992d283ce0f93eee61eb8327bca6b704f26d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54eda38655a54a482c82a1474af4bc3c5
SHA1d0cae4f214a037316bcd32f0c332c9471dbef498
SHA25627c20ac4f36005808424aaa6b897cc77a32ff2eaffb12d08caf3b386bd35932d
SHA512411932fe4fedd89d1fa0e53571ab8b2b1836aacf987996d29e3405f4b722790674cb6039a29678be3d089d720a377736c508ed6ea33e17123d5b49977b56c4c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526cd5b670822bdac056c8a32396091cb
SHA18452ecddf5f201d9b5b7cdf081bd69aaa92ec645
SHA25630577e3258835e07fc1d9740f78a1ccfac937a382f82b14f58d9ad8640247cb7
SHA51213f5455078112598267b1a6c28bfc882b8ba92eda63e46d4017137632a10b9616acab05d40ad7f751a157b40cbf8fe464626267ae5a23f04d6ad969ff90203fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537c680fef6574fa9d8fd8eb4d645f292
SHA1277c66d3e9cf2722ca20efe47b6c1ecfcd855765
SHA256309cbb28811b52d3a529252830bbf8738dcc6e35b95e06cec1afe7d3e8cf091c
SHA5127c79c916f47782d1566b3c815e5a5e0da09b8b39a659e6849ced73731a7817831fff402070940627b7c1f7ccb361e8b65c325be0c522a2e25e94470f9d32be9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ed782ef8b59e5b0eefe4f9c98455ccb
SHA1ba263ea8f0b1fd42242067b4e0396603fa1c8175
SHA2567846a7e254fc88bfad9a27b8a45961b5d2b00a368fc6b61f76b1e03fd2905f47
SHA5121ac13285d31e86c89de28c10f51c9cdf6881b029f041bbbd20a774370a90ea03068f593b69d372191a99058ba9b0d68181d2fe9d2163baae3aa35f94a92e3f02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586c37c15a334a00ce91d066fd6d3f212
SHA125edb95cfd53abc6eb49c1a2b0e0f9f9ace6d8b9
SHA256a93b6efe33ef4d3c9862b65767b04567a724e482341775af7f0af826d88c21f2
SHA512fb1afcb574c31843951ccff7f3ffea479d19133a7e8ec590de7d4234435c72a31d1814474b81d74d941b3d68658583b1b85728dae81ad708cf18237def656e3e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b