Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 14:20
Static task
static1
Behavioral task
behavioral1
Sample
af8f624f2f81e849fd1d0b5b71b1e3d0_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
af8f624f2f81e849fd1d0b5b71b1e3d0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
af8f624f2f81e849fd1d0b5b71b1e3d0_JaffaCakes118.html
-
Size
21KB
-
MD5
af8f624f2f81e849fd1d0b5b71b1e3d0
-
SHA1
67431686eccd7dde08d19c67421da455739f8806
-
SHA256
1de20b9ac88aed5cfaa5ff8457d0b418807b285b66206fbfa19b53e8ec6e0796
-
SHA512
d0ee62c8094edb4d0177027d27aaf502491991a021691a3b87acdd20ef31942cf898fdd3a226d725c70f4598721d21a4f6f20d2b2c3615c887b2d7c8154c741f
-
SSDEEP
192:/n4V9nRUB/3ri+bKBlByOM55qqt3NKq6abnCp:/n4VIiFBvMuqXKqCp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4CFCE401-5EFF-11EF-9988-DE81EF03C4D2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60f379240cf3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430325478" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000004e06f57c74478d9904baf7164b14335867ad53f4d29a2b735f55001ecd598624000000000e8000000002000020000000a6160d86e0ea08cbca68e2729d7f64aa6748387b41d48a27965574a76a037aee20000000192871640abf898c7037881dd87d43786e00abddc00ed9200b1c8cb0df724647400000004feb37eaa659ea974b03bea7093f4a098e7a77d9478ff060e0280945dcb634c91d1f8a2ac61061fd847c2d2de2fb6f6f5b5681d94d294eefb381dcbfb144e8a7 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2400 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2400 iexplore.exe 2400 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2400 wrote to memory of 3060 2400 iexplore.exe 30 PID 2400 wrote to memory of 3060 2400 iexplore.exe 30 PID 2400 wrote to memory of 3060 2400 iexplore.exe 30 PID 2400 wrote to memory of 3060 2400 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\af8f624f2f81e849fd1d0b5b71b1e3d0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2400 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9578f7ed743d83fe66c417e92d3cac1
SHA1277f82f7c9915423e5dbda32cf43f1cb885b9e92
SHA256d573010be6217701037126815abb0885867d6bf93fddd5641b0b6b8ecb6960cf
SHA5121e6df5ca53a5c0d54cf80223b18cdf88bd41892f720b2be021aa68537261072b3c6698485cfbb4df4246e0d5921679a623c8682e6a27ca87be3ed0de03b6868b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5095f0f10988867ce54af0421ad7f20dc
SHA114219493e0417998b563067f972cfee5360db781
SHA256f6526ecd8ce0c502a4b88a12764c4b19fe5786421315c7d816337d616258eaec
SHA5122f5e192aedaf59752529dee0e90195edd1e5cb9449400fc1be8c88b21343b2a3a93fc0d5945b94e2e5fbd2866f768557194f41efff9f509e21fc45d9ea178968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa83fb19c827f0e93e18c95c26f6baa9
SHA19bc6db3dba0b72624059b48cfd63294a11fc8586
SHA256f3499610958bfa4dc3490f52f62d114d4fd68b4fed4fe41b4a97e6d5416120b2
SHA5120328f1b0dc3f10eaf6bb96d91905e653d07f2d955884fa2d1030f773cb7e94c1343ec3af6978ee3c95459967404aa2def878ae812ff1092f8090137a183f4c7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5062918299329dad269c7c31e011a62b3
SHA10ad717da96602e555724a5d6dcce29c673f90874
SHA2560230fc882e2edf654cb939a38b8896c1bf090757d3cc3d5caa9e377156816c51
SHA51214d876546cd48e03712669bfc25ee1e6fc88c7e122d52852b96bfddf1931edd42df7ad2f4df9f92136ca173d2672d0f534cdcd75428c55b66a1d020353d3d4cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5741ff718444636cdbec4edbcbe65abec
SHA15136153b42ef8757fac6aa08b734fc372ec5322e
SHA256d6e92284f3ca28c7a233b8fcd9023df78e065bd597c0b41e7ccdfa5820f116a8
SHA5123a3da40e4762c4348fc695f55624a6fa78805a3c58241bd21e83ad25dbfc2779009cb29f594896c1c49cb61ee1f33fa30c8e4ba0dd212445e125355841a70fa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555afad81a214ec484be2bf8a2c7d43bc
SHA1814a02f013b1ed124cff7bba0ac3ab98b232804b
SHA256cfbd1a1259161c47f102ef16b146bd742a93bf1a86ffd94b5e39fa192664fb22
SHA512c5cfcd82db3988137aa655d823c526bec17befe6999f3820ae5fbf754d85f427d4e16654a262fcea86653205d80d1121c84aac0b7e52cc0304b72233e6628148
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b6464cea97dc8b4c9adea5a51d7c639
SHA1cd407b4ca470991b63bf37ed182920d85f0f8056
SHA256839437ea5c455b08b03e3ff8c2c056d2a8689f75537e67093dd209c8b7d13694
SHA512e09c8ab054894908ecb7c5a0bed5e525784f0569002327f9bbddbc0f441aae49814bd339c49381347624115af1d432e03bd51181efb8587112aea5bf5b19d615
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e56aa8f56d36333d1d9fac8cfe57a43
SHA1d1f21962649255cae06587fb640823f869a97871
SHA25677deefbe5f54eade2e198a22d27383a0a83e324f28b28f92e1d975a7269bcd95
SHA512d73fbd37208ca006effd81686621b3ece9f36bd0111d753bb880fabd5bbb70361140fc18c64c37719a6d2d0fee3f786b008ecfcab2b1919189b2d8cf87c2a981
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5346657a30a36b9201234721d8a1ccd9a
SHA182c9bf5c59c1c4e64ab1b359402afb9c35e245a7
SHA2560404e73b1c0a0ee00b536463316d53312b0fec42b8ee16c4e2717ea8ceec3df3
SHA5126a636d6f2601e715054a2c29b2c9d2071574937e958cdc5b70a638346123b0901a5dd77664d1d5140b25520574f0bb5a993facf8792d7209bbc3a546fc6f5480
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b69970842581b49191617cdea4051dc7
SHA12e033e5b069205eb64487d4c5a8bf68e5b822965
SHA2561b1490c5fe251e957d5a0fbb230ba8942ebf27e1b9bc7a26d647843393d8c1a1
SHA512e5743e4b6ea11f61ae9074f7a80c4a112fb2cbcda7b7ed6c534a5b16fd246c67ab22b08f8aa56f03999ee18b3360caf17de67114d412345bb3a0ec9295e285d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da3bd9f90d1f561b1fb53e298f574046
SHA1f05e3c50d56679661f6ac214abb1681f0b226c6d
SHA25643c5a0d93bc0b710553808199ed0561438e88dba3a1e4801bff5d88823041705
SHA51259f23ac2b1841d27073f36aa7a9e274d5509ac183cb98aa99eab491339038815ef0bb9559485d54bdd45a339f153a3b470bc3cf5634474c98257ff9965e59668
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5761e5cd002fb9d9b9a3a821fe3a3ebe4
SHA1c2c000921c2b46f9d3ad49ade0efcfdb1b8f344d
SHA2569d7ffe273f762c84d2e08e339ee7952437805400a6bf34a0ebcccd38d59c2c67
SHA5123a2a2f634f07f9e182e7996baf1d388772145f4c4a4b4c11a82ad77a3590c2138371722a40e06f5f9ce1d9bcf4cd27abb987387dae2f2025b83285ad342b0317
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557d0afe4d0052ef8e8d4c1765b79eb80
SHA117be419d24ccfcf357bd525414f135037f790514
SHA2563c40b84b288d51f31995c9407bfdc94e44cee17879194594f9f1a2c0a1ae647c
SHA5124e025e932e1336d50380b2517dbeeaabad9ef0a1aae0747aaacb65ba50165ee699a15b9aa566127deee42922a4a93bfdd28995c2574485096f6c1330148e3975
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d18a1ee47538f06c38c919283409c8c
SHA1d13fd2b53cbf688b3ec475efcfa9522de2519d34
SHA256c4e9a364c3dd088189895d44a6e5f2b0c1f36c2159b7350b08024c6f74865f85
SHA512d87fc980147a61228e00d6f9a47d3e28e6644413eba18b13b1057250f64bfe0ffc471f17365c5c19f32238d64fb95324ab43adb5c412392e545cc936bb6c9dfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5444dd4725224d8bef3eb1ad0b3d6860d
SHA15e05e0d152ee9227e88451e54c544ee50843c742
SHA2567998c45b98db037eb957415deff9649842afae6a92b8a7a42937999490a8e312
SHA512d5ebbd8594bbaa1e8a03b5a6dbbf985ebe3170cb9e4cec1c0da2a6a800d7e9bf3b1a2fa6c6f5d5aa656263197082562288c69ff89c7910448d1848355cb04869
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1VX38S3F\e[1].htm
Filesize47B
MD506b05ae9614bafae9b0b09cfbeed559e
SHA19b087683529b7b89a117b2d5cbb35a93e7dcbaca
SHA256a60692031ce09be66be89784e8b0214c0f8b6f52cd8fd6a36129a635ffe41ad2
SHA512f97936b6f3dc025fd55cd6a9bb59bfd3a58ca1d03e0fbe68bbb63e8a1875814fa8c367bda3b59029b549a5aef20abb5bfccd01cff1546ead70f6b07123be11da
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b