Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 17:21
Static task
static1
Behavioral task
behavioral1
Sample
b02357fdc4cf224194b4d48e3f288a43_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b02357fdc4cf224194b4d48e3f288a43_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b02357fdc4cf224194b4d48e3f288a43_JaffaCakes118.html
-
Size
14KB
-
MD5
b02357fdc4cf224194b4d48e3f288a43
-
SHA1
2c91398139e616e3c1848920a808897d0f49988f
-
SHA256
7aa0f45e9befb3738cbf2f462eff87bf2602a9562dca3266fc949ddb58701d64
-
SHA512
0c3c336260dbe10cdf82f6413514df4d5f0b7dd85fdf216e012791b479b6743ce98beddc7f96547e16331e9f1a07251f62c8555501786bee22b7119b375e4bae
-
SSDEEP
192:HaQ2659B/J1qajcPABm+VET2gwtlA8pla+bdoQBRFc:C4L7LXVc8/toIFc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5084807425f3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9DC92E21-5F18-11EF-83B8-FEF21B3B37D6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430336348" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000429c2960f6d998bb240c194d1e6f9a58c8e86f774ad8960d1762d0f70fe6670d000000000e8000000002000020000000c0f86b915add665f0197b04ef3b7705d561361a9a85e27773ed70ae3d53e562a20000000479bcf42c787e77137e78a8e87b0279363d54ec88e87056ed9c236ce7a763a754000000078cfa17dba87a4b09987dc2bd3fdb6b12b5926c5c2d97cde2870dfad807475b80a1cb246aff5108b34d22f88d74607a2b0cf680ff41beb56b2246a34983eed7e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1828 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1828 iexplore.exe 1828 iexplore.exe 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1828 wrote to memory of 2512 1828 iexplore.exe 30 PID 1828 wrote to memory of 2512 1828 iexplore.exe 30 PID 1828 wrote to memory of 2512 1828 iexplore.exe 30 PID 1828 wrote to memory of 2512 1828 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b02357fdc4cf224194b4d48e3f288a43_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1828 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516cfa5e2e59c104c61e2fe932516310d
SHA1fe6721bba9a06877ec1a231065c4e4137e8ed5aa
SHA2569327ffc77d31253b9ac7bee400dd65abc6578d180ffac0f72f2d3dcff4434f34
SHA5126a35de3169e6dce29e8a41881059a00758dbb25474d984552e4718c458968a16e225e54585fd55117928753743e412c143af99fb5e9403975dc69c1496bf7fd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6bb21b08986161627194285245a071d
SHA1b6623f851650b1a1456b4c1ffc3218fcd154b19d
SHA2566568229882cacc3d07de8c8603ccff6a1b5d38491ff64dbc387faec1d24643aa
SHA51229e681c2b952c0e44b648caefd382fc6ebcbdfd3d957efae63124f93325244f98823b199d0ed41970536acc29cffff33210576df9005f766b90a3e9fa8572f1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c2775784c6bd61ee2806aafa0f8762b
SHA1ba5a96b3864df4b7cbb9545e4805e0659146cb6c
SHA256f088de8f0c1bfa9bad26b3467a86ee14820b0dcbe895db1a5f0c996e6f2b4fd7
SHA5129aa8a8a71513b7ed63e414dca78bc76eee3dbec420760f34a52d534f4119f029d4dc2fcd3f06a71f7d3d52b47b71e6e680f56b5f13b6bda64577bb77818e4beb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b98a8071a316eb2db62a690a4d8fb900
SHA19ad44e2e760131dcb67881f492e5e0ce07d14f03
SHA2561b49bf6f91ffc6b2503e1428b48c759926610cffe8bf273c333bd785b0363102
SHA51289b246162d0e89c2d5e12aaf896c8cd9d8e82389a6a82cb2bb6042423ff5f91c6bcf2423080a658dd0fdf8a0d6252539fae26ded934d2b427d0d37ffe9a2ae71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9db30d7082fe9d05efb2b16b89f3b47
SHA1419c6c41d4d6e067c8b0bb3fcbd0937f67f14a63
SHA256af454c096fe2f37bfa3229f50d8ccbe5df5f459e8f942e0263ce37385ff940cf
SHA512c5f0d1985f621de39824f2b82a3b04c53088d105b5ce20a6d3d25ccedbc4813824763c87309842d2ec55e9c03145970326a685f36d4b6ee348f6e9944394933f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a34689927aec5a599b80de564ff5ce0
SHA1915b4504992fa98fc6b083e0819a639f2cae7212
SHA256bfcd563fe535d47ef8dfdf55d57a2b096482f2fa9eac394bc662a991e5ef8457
SHA5129be71ccd345a960c9b01c63e1f661969597dc7aabf005cd2df5ecae6333be38e4cba92a1bccfcb9ba1c7078e5f2fe85c5c4a73f76bfcdabd86e355b33d2d8445
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500b817c71a71c24a0d6540034275961a
SHA147fc9b99587d87e6083ecc0be90488dcfc9f24c8
SHA256b11ebeaf1d53c4555cfc490713999fa3daede4ed2b6c39ef795eb8505ec9c9b3
SHA512c7b5726276e389d29b0ef46a600f2c0abd7657b5431edb59bc32341d34bb48337cc0c26c9112ef15b870ad1bc689b0ea40b3706c2e108380505eeafc7182f28f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc42d66f599a19d3851084085b70a5f5
SHA18b848d58515c38b6e1533c1390ce0dd1efd1ef8e
SHA256591572a6d08a576f4cf25b1b8380ebca4d3a72c089770fd4f8abb685bf8b15b4
SHA51262c23a1c1b55eb8207673066897cefd7a1cbea42bfe46431106fa632c7e2eb1f62c8903e0a7a4660da5d14aee8f39ea4231727969b17dd517f4563223e653d13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7a7820b83bdaeaeb212502839489b42
SHA187e9b9af771cdbae470a9656a5aec663bec9fadf
SHA256df5dc6eb8f68bcd14625d9f7dc2f2b14575414c4653c3a2d92553987d6b355a2
SHA5129f0625979a44e2e38bf8877000b3fac7a65fd9ef7a00d60800def50f0f75228cf83ed4764584b99308eb3d96a458f7eb80bb0c63955d535689372110ba0ca255
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596b80d9a5380b22529d396506050c7c8
SHA16b0177bd72cc040a7375e57d9bcb5736e649216e
SHA256f56bd226ddc12671b2078ced56fd99ac109c9c85cd72e234428962a1854b9136
SHA512876d37dd86de51b81cc68fadfaf03470f9ae337d8b8f74d161c80e3a7eb0bff1e0d9708e6e21f1ba126d1eace9e2096019fc4aff6a5b67917f73daafcd8e2e2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d347c89828b0caa6752d0b8dfcea4630
SHA1cea164bdf950afc591fa0527c0e57c29977dcb7e
SHA2561b9e7b1c2b9bc30644cc0a2bab06f674c8e087b13aecec6ad42805b734c8a5ae
SHA512a9c035160ae30f5400ad64a8d6221cca7090b9a038ac73cd3f44738d07c1d7093e0f1dea03cb8dfc918a0c5add6502486834a514198fa979b2d1ac94ccec530e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da18b303d7af95e7528e3d2df264a328
SHA1fa54992a5f4d248a8a6296b45b186f85d2c13643
SHA2569f5c684de1b33d34284b52bb9b45e9bc1e7e3c7edb5ae698bebbf15d5c3c614e
SHA51265a69a0f9ce95da7c6894d12330cd14231e87c545d117a577644191bcbcc85c73ff79a9c25d9fbfa768fbc9f34ef2cfd44ca983ebb213f03871de8a9d0ff4406
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bc9e014c2e0830819fa36149cf9c366
SHA16b1b3623d5585c16290220c8a8dd89e738341a55
SHA256bacce9d49f3f832ceb7e3b5d853a70d5771a73f260cd12ebb3d169937c392b77
SHA5122120e43cbff6fab723d2f9a61ede6661716bd99d2f86a807e0a798b084f3339525087848a138bd5f7d362d133be6a5149f4363e9da11161de757ea99c2c137a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5963a47633ff09fe4271e9ad59b0af4cb
SHA1219f38ff0612f6720b0d020ef891966171634eca
SHA256b6ced72f750168368d07532236a9fcc3b945d2d62df5f939642238cdec0115b0
SHA512d4ecb740aeba3406bc367926903aa3bf32f6be7581743f30297a39df61ceb7560bbc7ccb1b83656014be0bde09ab5d64e79144dba743e967297fff99d3887395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c649cf9b54b40bf2002e3a5836857e59
SHA1a93200482dfe14946547ee7339cc9b0a246daa33
SHA256ddf269f555acbc34bd145dfe82da071aee40ae00d78561441d981f753707dc4d
SHA512215667b1859f34fa13514e33c40bc2a99f7c4f16dba5ff5fcc0bf23df06aca3de2957975f8216c260f6bd13cb12fd8f98623bd76f95e9673d38f5416cd1bd380
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582bf5b28349c166afccffd3550441c85
SHA16b10ec3aa3f2cf31fab369aae58cc2939ea8297b
SHA2567ae2b01492ccf78126cd6f6af493946c6544e69a50bd96e3803bacefee42e6bb
SHA512800c2648968ccec884aafe09088cc3801fc6db7ba0aba6981ac73ca53a21a3f4b879a3b970acd82a15126a814b43890703184a01cb48e7c8679cc9b0a72c8387
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5011d51beaea608a7a86b05ec0bb40c6a
SHA1769889021286b163b9ba2d6329c532a2b26a0fd2
SHA25674eee4fd202cbfe91e954d6a7d0554c7ed9252403d0b988d74f73be04ba216ce
SHA5120d5dfad010ce8a6ba4097a9236923d4867e499d768e26859af36c52726985d43c793f73dcc8a81ded4f885a96b66d5581c3e2be0580f5d7d3e8f178c5a82fd51
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b