Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-08-2024 00:23
Static task
static1
Behavioral task
behavioral1
Sample
b17201dcb87a0cb9fea68d117ec11570_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b17201dcb87a0cb9fea68d117ec11570_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b17201dcb87a0cb9fea68d117ec11570_JaffaCakes118.html
-
Size
45KB
-
MD5
b17201dcb87a0cb9fea68d117ec11570
-
SHA1
69544fc051f8829b91814efeeeb5d1f629fccd3e
-
SHA256
57e3e35dec2a1b372311addf1fde273e99a971d87698b32ae5681cf6ed8d4838
-
SHA512
2287d43c0f4d6f4cc24b5a430714bf51ddc0dea0e3d188b33d3a52846c03b8e30a6495f5481b8c233e86b9c04e134272358cbad4a2341fff2ac594735bdcbc21
-
SSDEEP
384:SqDp6ra/lpmZvcKalD3vpXf3eByLgWdRRUEfq:Sip6ra9pMdaldXfMyLJd8sq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430361702" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd0000000002000000000010660000000100002000000058be39581a4eefd990f7673aa0c44d118178944cfe732e0f42de9cb269e55b22000000000e80000000020000200000004b1f26714a0190fb55fd628f77d735eb0fb39c8ba18e1e81b2a99847f07b5db82000000096ac77338d41325a495abfa87325c347b07b15a2926333878bf64dbc3698b20d40000000e355c5488eca0912298ce341ce2e14c389105af79b9d4bbb46141ecc4375cdb2798d1db90a282d28133e44fbe259561ea2f579aaa6f42ce8f80d410d7bb8e6e9 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 101f979560f3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A6917EA1-5F53-11EF-90E9-F64010A3169C} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2088 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2088 iexplore.exe 2088 iexplore.exe 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2488 2088 iexplore.exe 31 PID 2088 wrote to memory of 2488 2088 iexplore.exe 31 PID 2088 wrote to memory of 2488 2088 iexplore.exe 31 PID 2088 wrote to memory of 2488 2088 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b17201dcb87a0cb9fea68d117ec11570_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531b839dfb4daed1d4343662e9029c83f
SHA1be776477a5e0b4013a696a34e4f4de0937f00b9a
SHA256093f0ca469b45ce0a9ec7e3ee8dc0c87f188cefce1b20ccfc8adf800ecc84762
SHA51266b7a84082dcf44412220510492bc771592bd73590a903873e756e4b78b9495164c02a4cc0b9f6577d07472854e3a7fda09a3dca7051586522355d51542b29fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f164e6e02997eeaa846a96227de5293
SHA1f13db428d8568c7c83fe7fe58b69ef72975a4ac5
SHA25662585228b2bdbdf8ce8952ae826a83708e8a3d7575be5f12a49457611a46c443
SHA51287b67c6bb0429df1afc2ff8ad7303169a3e317224c24ac19be448d160eb2f829b9937fa42956dd52112fe31c4eea5cf8aa43ddda42203e85dfc982b6b9a2e2cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53852a0e1ce7794772992c51e61157f21
SHA19fa5219aa8ec01cbbb1a157a5bc1e537ac34a690
SHA256d7d99241253a94f7d65d59d9596e0512fa29a4e039c09bbab26dab985ba54c5c
SHA51282c248761bd166cad9d76c6223d16a61e59fcd343e4864250f767a8503bfd8e81ceabffd636b87acaf51b70a7469e2d999564f744f07c22b22cd5e79438e0de6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5915cd6bfc5c77207b09675598aa1aa40
SHA103017df0acdd724e76ce491a67bcdb6290545f7e
SHA25699e8cb26682308e8d0971e4cfaf1c8ff193db71e947e0a80c836382d3898d72b
SHA5125036342d27b7fd5a462a62b5f55c0760782894d0f28a7fed97b593ec72bde89c60d0a72504c4dbab2073d0c270f6bf759d8a28eb5fa083d7588ef7bd1693952c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e659f6361b6092a9ba8e24bd5110d8d8
SHA1f5db97a646ee8570b40d86d4957bdf72268bb40e
SHA25629f11a200f5d4ad7bdda8a5ad842316ae780bca3db57c930a716fc81741ffee4
SHA51266bb2e97c6747ef05fed22960ad58de7a02dbabf66f7469f4bc281d823028ff10a1162f9e0df0ae51ab4dd20975c176e18d5990b7ea252ab879c8fc1015119af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c070252330e268a1c0e65d672a3f18ea
SHA1a50273b4c2fe3938021ce38a367853be30744f36
SHA256d9910d95368a0e37253b656bbd18aa0a5cb42ebdbdcd5ef73f255d2e79b52371
SHA5121349326ae01486fb7ffc2622db25a9d7b12289e01690a1ed20dace8ba3db34d64b9b71c4c711044b5c699e6dcb4c40f1972297aa668a8adaf029a96aabc0296b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa6096345d24f017ebb17dce2175d5a8
SHA1915a7cb4dbb856abcb65ef3a90e7a7bd3cb43d47
SHA2567fe0ce4d7c8fa52f6d4fd09d86cdbd0f08dbf5c73355cc7d02137fe4e2ef3042
SHA51296875db96b7fa338ab1517084ece96c25efbc10a8ff8139278d6fa62f41ecea1ebe4b5640d5bc04403c26f16a403785f2d9d6a3154fa68edae2f942224ed62e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e946cef255834bd6cd3dfb8b08e3b1c9
SHA175d555a65c331ba3d1acd68459904d7df75c4103
SHA25693a4e8bd4ff48bcb86b8f05caaefd4163945f62f710d0254ccc3e2c31b491a39
SHA51210437dcddc1597dc8c4f3c9f0c9db8433bdc7b751a74546cbc166b141f3775e746e701a945cca3e3ea37564ccd419191b73a23a2852d42b32edf77431499ce6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dfe5810b23a7f4897dddc7611c77900
SHA1ef4b35c420dc249003d2aab3197b3302ac4c7c7d
SHA2562d62ffe2aa28440e52327af2dde7614d86d1a7ba98c5a53082fbc2938f9c1d80
SHA512a566a469996d087ae328434d6b7e4e381feb75e9d69331374a77803fa58d060b3b94fbcd883fe66ad6c0b88f86cca4166aacfa6784d109dd22b27bad6b6af98d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587276f6118c418590c4e358b50bb2fdd
SHA1887d9a57dc2195f0000b75cf11d2d8e0ce7b521a
SHA256c4811459f657562b4d0dbe51a700ae81806562ecc28a823a508494ea46d9acf8
SHA51213eb6ed330c11c8b08c4544e4f112496c18c269598246bae0843e5c4ad587690abb6190db6ef1d080bba58cf909ae64f67e6af68c1d146ca98eac69639eab3e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a8b41eb8faca1942f2a52fe2b1d6442
SHA1d238a93b4ee0485a865c843a4b96e32827865aa4
SHA2564e3fe2f5462c7eac274243c06c618bad71c0521220c6b126b015b2032cd8280d
SHA5127fb24db4adf29932940f4685a147260a7132bec3d23301560540bb413da48f51bd12151da6720838eeb6f4a8e24c83af72ffce6bdda646ca361cab9c2dd4b83b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dcd6fb12704b4ba739db6004214e57c
SHA17158b7e51cbc6429fcabe02679a2e95410fe86b9
SHA2563393d463eb0dae22be185f1623fd431e5fce8108ba2135e9acde2490454a3332
SHA5126a5673137c2835b942a699317d052bcae65745bbc869fb2c0c4485362efafe1e302ad771fd307196aee75e8e3fe73c5648973552b570e5f0160313895e7b27ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ec398497f67991e64660c67f5ec153b
SHA1d960d6246071c48afdbebe83a57e010cf6731fa8
SHA25678917038ef6cafdfd36d824039736f4aa6743a30b8c5864bc0b4db49be1c597b
SHA512fd1a62655613e6f87e9670110374486eb8f2b14af1879564219056a1f421328a39f23395b215b7c28ca74010d45e5162c2e80641f494f9e5b974185bab1c13a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5030025fb62e5fbd8fbb961c8a735eef0
SHA1c4f40261a3eeba7e72963762a009ab72529c4ec3
SHA25673806e6002e50505a7f7b0062b39ae5f1b12cfb657d72d63e80f2e1b760c9093
SHA512c4931f0f28c6857daafa97a94c1cd05e01351eb96cb543db9d0b2ceca056f3a51c6416accb513283825362ceb4ec8d00b1a80ee5d45d5829ee0f32cd7bb2bdf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5deb94798172e0dd113939e4acad7c0c1
SHA10a7474a48756b61094cd13aff8ce873c62f82f4a
SHA25664015821fa63397600018be376abf5bdb3b35f433566e6b1575d6997a81d18d5
SHA5121164dd85005b38028cedcc5d2af3a4b72bc45319fad4ca0d7d8f5bbb2729453330be106dcf723a96a6694ad77ee7cac9e13d853d696964132d99f374d0f82599
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c373ef32de1b208e3410e29d30ecd4d3
SHA1a137d7fb6f3042714c61b6078f9753505612c3cd
SHA2569b7d5c1bc565cb06a5a67e3433d4686e434d82079f87242e6684d285011286ed
SHA512d1e0d3e0e0337757b29965c9915d5301b02bea97f38d64b49faf14f603428bcde2518048735062f5a4f5f4985555949e51ad1240089255382dfc4ca2a05de85d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ac59a13c1dfc322cd14fd1e1fae3783
SHA135bb1d7c49ba9a0749d6bb7215846f181cfb4928
SHA256d4495b774b447f552926e0c5f94c9b5a30765fafe923cdb8aa6b24918c6a5eaf
SHA512e83ebdf710c8db4e91fac85fa91d9b2d55ada4e2a3af8942c07705d943115c97c82c7b574fec0b14cc56cb414e173d1a050b8391e7c7168a975868e295157bbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54681c87592d39bb630073137a151dee6
SHA1f7763c08807324d67c8edbc4967c2d55630954ba
SHA25639e63ba9f978238696092a1dc6ab4c743d0d89a90f6cba36e415389df6bbe742
SHA5123a714d84566cfe7ad75bb2210014ed88cb9851ad8795335c56eab014217ad470b81e61fe83d73e79a95c3a80277642c6e62956c8628a936759b9fbe8df602f81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3a99f5902d4636ac4fbd0929daacee9
SHA1880a1c265edfcd449d60fb4b0f2f9369b18314b7
SHA256c6740b7a6d46123c8a321bb1f10439be778b04f19429bd05e5d1f2bbd168a9e2
SHA512080a0cb0be6f0c0d0b80cebcfc7475940bdd2f75f8a83287ffb689673bbbfc2c635dd22144874eb7d1ed81d66d1e6405bfd168be84ac97c065d875d5c51a8282
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b