Analysis
-
max time kernel
136s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 02:59
Static task
static1
Behavioral task
behavioral1
Sample
ada292b3baee39715d24ec410e0b9ca8_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ada292b3baee39715d24ec410e0b9ca8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ada292b3baee39715d24ec410e0b9ca8_JaffaCakes118.html
-
Size
11KB
-
MD5
ada292b3baee39715d24ec410e0b9ca8
-
SHA1
7862c85d6db9b44bb8cd45f4cdc00ed9da1c015a
-
SHA256
45b952d05f145deedb5fb09d8c8cd7cfd5fd5070e5aeec1a2ed163714c365720
-
SHA512
31ac4d7bcf0057c7179b15ec5b74a1742b801b66d976a00fc25cc6ce969b2ead332560ef7873bb30e08dc2c7bd0b46cd4638d36bf1f4b2c594052b3139a655a2
-
SSDEEP
192:2ValIsr0r57M4Wxa/T8I+/w1wvqa18LOXuBuLbdU8d:salIcIQ4WxaX+/gg8LOXguLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd0000000002000000000010660000000100002000000030b6d2845d300f370bf428e6fb39240def40ff2c9f710f34af8d256acc4046b3000000000e8000000002000020000000c6eeb8966c1d93a6b9bf19ac4b268e511888e94f36e2449c50df8e7477010e9120000000228fde4c751820b895a4ce438ab6fd05411c2450f7cd1551eeebd3ab3fa99e6440000000b624bbd0de7996d26ee58490440a33454158afcc048725d7ed7ca734088da64e900464e700d5f292693fdf0aab17f0e25d8e8e01ee0c72641cd6aef93271342d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430284643" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3B35C2A1-5EA0-11EF-93C1-E2BC28E7E786} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 605e5033adf2da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1988 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1988 iexplore.exe 1988 iexplore.exe 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1988 wrote to memory of 2636 1988 iexplore.exe 30 PID 1988 wrote to memory of 2636 1988 iexplore.exe 30 PID 1988 wrote to memory of 2636 1988 iexplore.exe 30 PID 1988 wrote to memory of 2636 1988 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ada292b3baee39715d24ec410e0b9ca8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1988 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdcdacaed87b42a43bc684009276b595
SHA1fa103216f206965945782266a2a62072d33c9d21
SHA256405ac0bf948ae3937fd41046cdf1ec542de82552a42cf8cf845f981f066f1b2a
SHA512aa96308ee4e612033ae84b408a0b114a9ae41b9613db8eb2d35b7d8c6b6a0b1a90f60822840db73e00c967bc7d3e5d3f4f9e85c0f8955c4502f07e4da80c743e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593e03860fbe25e9e677e2027748255bc
SHA18cf196e355f72317f3923c6f2d7f1dad3d1ccd6e
SHA25668498856dc322018f835d6f637dd596b3f3480e6d47d1cdcb61d93b4c876ae2f
SHA512b244a0f6f585cd4577c4832763f09345e402b4521bf396ee3ec9091b2b38c6e3c3f6a392fb7184b04a6dad5ea5e1bcd76f64b088279b4ab7d3eda06a19919a1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b66ceeceb0cfbdf567d74a037430792
SHA11ff142c9927cc069c0c9e3d9d7867f93272080e7
SHA256db881bf11b4c02cc403394835a563cd8199daa5d184bee88ac6d3eaf1a498b7e
SHA51218286afa68e746808a3cefd6594c8210f408b33ff062b04e2898a47bf195819448edda0db24fbd3eca2c95b9ced2dddebd61964517e8f942254afc54086939de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d100e5cb99c9ffac04061edf88ca9ba2
SHA1b2ab344b3ea4a9511ff654d4adcfb9ab3b9bb025
SHA256fa5024d85686ee5366d0f57842d964a0795ba7124290fd16bb11e0b29aa738ac
SHA512c09f49e82db470fc1e21e76ef5d44c512dcc65cd53a394b8964786609fc20c8f080c43469e1800c4d1b79ee72cbd50008484fbbc2a976e8805cb1d3ef091f3c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f51ebe101f543f9e78f41a0803448067
SHA19c19c15546ed198c84066acad5c0e573adcde7e0
SHA2565bd3d699ef6d2fe5dee6097241a147efda09e7c8bfe93dfffd832c2d122ae184
SHA512e14111d042be582cd0a6137d3d2140d46b8f26416ed13888d318f21566855e77e3ce799f811eb19f38d16c583318edac7ebcc1542d3feab8015ff9985f8d29ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537dd8e65c66d91e2dd658e33de327ecd
SHA15107da367cc37502d8d7099f806eceb12f1f2532
SHA256c7ee5c562b5ebf7d660454b1adabf222814da8583e20f9702995f187f46cdea6
SHA5122a359e55a3acc4b4be0b300007b7abcbc1ddc4e0d0dfcd43c06a2e5b7b7dcbfd7912fef92bc3762908de145ea6060bf78c50be13188baed64237154e79b61886
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ab0886f36dbbc372eee1abd65955515
SHA191f1bd40cfb216c5cb332dd1c179093c3e70a22a
SHA25623c62920a26e4aa553f32ccca7e54ede8d71b8ed34821409cdb037ec504ccf3b
SHA51242257e43562189e16905e7ccd5c944e7d40916fe984bf59752420911ef648c07ef8859958fd6ffae420c877efb0d877718b34c0a3e33d6743a6fd2f4a7a42d6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf3c4dda6fa20d09dff9a81cf1de552a
SHA1272cfb6ea796c1140de31680cad46e3d495a3ce2
SHA2563bb27fd62214e4bde66c068ca6f594af1cecf0409e5f24dad421c56b3da92d28
SHA512a52b6c09f9f5695c1589eaa4a0f92324238d42d195abcb1f0cfc92238aeb69aca14879dbde57371d76b85137d6a4e611f891e2a1559cd4c2f6385ab0a0e3bda4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a36ffb9f53c90e016bb0ad93a3742cf
SHA149ac1a285dd145d7f6313c14b2c807d80adb236e
SHA256e9cd3b61222fadc0c5032be6c1fafd8cd407e9abb750ade523bec08d7f226b1c
SHA5124ea44d398361b296180d027a56624977edb540ca60e75d063a1746c4dc24adc1229b2acf728c0947d8db4ccb11735d34c0a42366e40b732b7be7d0a7122d5b10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b580f4193525136708ba4f4af7dd6c58
SHA1456e93a7c496c05d5f926a14fd7b93af548a5b28
SHA256becc486c0d194db950f4c1eb29dfab0de380fe6fe823ea1d02057da15d3fd2f0
SHA512c1da0f18b66539681d16a9887d80d37eab8326d673683b074e18dc9cd96ff9640c3d67e9da3b0af1a65a040135b9480ba8d6bd493330d61413327ca9436c1822
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f52648294c01c28aaf0f382a7080e0ab
SHA188ed772468422e5aa7a5a84279e7cfe870ad6802
SHA25671b1c31fb5f0b613320cacb5f6c4ef775aba31bf2f4e3f29c32fa082a1e819d0
SHA5124a221da3706080a478710cb4305a6ab5928d29bdc76e6572e5686595c725235fb33feba5176309e897a4772ac8c529cd2b026ce700951e365a6750b2507c0da9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb92538cc07dd8bdea734c34eee430f0
SHA13d138881b068fefb113ad5d1df994cd7ee8857d7
SHA2562627a69499e227b9b5baf0b3aba63db76d2cc0acf417ca87d3b67650acfcc63b
SHA512df495394aca1f94f89cb0f2f9e9a3e632f6840b28ca7b5f936ac42214508cc466bc03e29ae93377aa52091ee0fe151df7301f503f4b20f6eed5691989ce59751
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559c625977ee386f78aa556b0cbc2f15a
SHA125ca99ec4d97bd8e930ecbd7c728d646683ba3e2
SHA256fb6401d4305b15b76e48e95c4e5d353999d91f745161d60f4133713d66e42523
SHA512ae9d10b007f392cb8e1de47961673f6679ba13dc107dcdfd9dd8da1358f1605148b96f97cf72a2252695b3d2f6e88073f34525f1f64e5504bab14b2580c6167e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c0f49a839d2b355da225137d481dc4b
SHA17aed7516e7b61e3280bedf22e9eb4cef6f94bd65
SHA2566c8fe01ab667b3ca47439f58b2229ac6a3a64ce7530e87029aef1a4c133ad3a2
SHA512cc3198ca06df2bfe9c6d6bfa273a72e825ed2751a767d002f938110abd9d753c79cbbe5ebd80002784b2e31af1bafd7a4cfd0adf996715e7f31c12d96eececf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565ead3492e01d0b785a22fc8aa0f7cb3
SHA13072350f7753d8edf49128de7431f736a17129f2
SHA25685d9f668a187d14a0f6888b97317aab20b1ce51556d6d08e81f44619db7822cb
SHA512283af7c75df32d2fe95de76942d638e5134e299ba347e9cc40db216459cc171f5699206dbf3ca88389df27b9c59a71a1abe9a39c7fc2f812229e6ad251ef7a82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cb4b31d93ef0efb7ab238841376992e
SHA1fa2efd63182533728f4add126e1c125617e3f7b3
SHA2562400ad32bfa9fd6d99047854df81a96db715cd5c66411c060e2323f913c7071d
SHA512a8520d6a77ecd7b3704a11c96626a0360df6db6ab2728e2574ee47be5b76a501cf2e7d47163c635647cb139c63733284ac71455143d22805cc99f69dc971d3b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54033853584aec022435b8e35d749f341
SHA1f966fb4239f4f40cfa3588bc0cfc6c9d077bf7a3
SHA2566c07e0f0249ba04c6394e7469c202d11177991adf567197118c3b2b0eb18ea7e
SHA512c8609205be97e665f6625afe988781b33cd2d074ca6a5ec65108d541d98a241ca182c580ff0198943777dabf2287baa45df992365d0d1fe0e53dd82a5a2b7786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae75991727d73ecb31eedfce52220533
SHA1dd1cdc8122dce920fb869da93b1f064b759d9927
SHA2568dc811fc76dc6284f39b6fe0fbdeda870b167697809301aa185721402b471933
SHA51239ea2ddff7d5db8baa861cde99e5167782a577acccc1d6ddc0bff412def62554ba57d6948673817295703cf0c185383f8078a4790a38b1754aa26994ee31c005
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de73de11fbceb0b43283b4f6e67415db
SHA1f4b8becd129976289e29986ad31b633d60ddd747
SHA2569d81006a82e6593205f038cd210424cbb1129a109d7dafab65174b981004710c
SHA51211bd8484e9de79022dcb5c705cc6c8625a9cd6ed48ac9c424683e89fc97175e0267cde861132f5026e2a53f2582b3ffa2bf06a15a8ac865610887e9e85e8659e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b