Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
21-08-2024 01:38
Static task
static1
Behavioral task
behavioral1
Sample
b1a8c3c766c38b97e259668a0d7d1f94_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b1a8c3c766c38b97e259668a0d7d1f94_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b1a8c3c766c38b97e259668a0d7d1f94_JaffaCakes118.html
-
Size
10KB
-
MD5
b1a8c3c766c38b97e259668a0d7d1f94
-
SHA1
a601378ac11b20c5ee64ca4267837c9cb81a59f9
-
SHA256
8e8c5d5610123ac3e4ef497f0c0f0ba123b80fd031ebc313ff737b143ee5d997
-
SHA512
7b1b53a40d63e6669d5539c3f314aaf6a8159ca284fc9ce7c1930d1353dac58f9804d50b395201b36d97b0cbe869a85eefff6321a295cdbec21331f118eee7a8
-
SSDEEP
192:SXw4nNIy3fMCaYOc605knox+xIZj5tnqWdZZcZYN0E:J6P605S6ZjPaE
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0520af86af3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{21579071-5F5E-11EF-BF62-DA960850E1DF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f0000000002000000000010660000000100002000000072e21dc0ef09514f535e6d0e1b9bf681086aedaeefadfd64850b890c7f049f29000000000e80000000020000200000006fbcc9df764ba9d18c3fed796aa740a3516ae6856152ff4b366828c7af16ccc0200000008df414da3ff7f7aec0a506576802745f64a6b96a8846e68ca0fb4e1651926d1d40000000574a556cf7a72bff41f3532e33794a6865bd74d8dd2d423539d5368e3278093ee4d4c3ecbf82c9e6d27abf9895845bedc01d06ab10f3206e0cb8ae8238906706 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430366205" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1996 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1996 iexplore.exe 1996 iexplore.exe 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1996 wrote to memory of 2128 1996 iexplore.exe 30 PID 1996 wrote to memory of 2128 1996 iexplore.exe 30 PID 1996 wrote to memory of 2128 1996 iexplore.exe 30 PID 1996 wrote to memory of 2128 1996 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b1a8c3c766c38b97e259668a0d7d1f94_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1996 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b256dc5e2a57fb1defe9fc0ee760bec
SHA13ad708664c24c041ee5e9c5c63ddcd6f1772affb
SHA2563b620c39880dff902907909586d80e2424fcbc9bf558539e8a46d3429d703eb8
SHA51265bfd83810440ac52b3690e2a12fb2d2d078ddc725ca6fb8bff1eb3bb0359082b9252125175c0519fd281dad12a64a7ab560cad02ac6086d95570f521a743b1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5551d04c3822c8c4e1fa8738039fa2200
SHA1f36ddb675a6c72b124a64bb674108ae29400681f
SHA256dbe48f3095c2bdd8f0418a36bd38708cc059b71d5d9aa55144327f253589fc5f
SHA5128390580235227952f4406adc02e64ecfe36d3454c28857741e2f8c625be06d10aa008922d3913596cad6462181ede9a867fe90012c0b9e4c5ca98c2b4bd302d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5762a3f808804d7564cf3bb94d4fbdb02
SHA1c6c0238e275f5b554c65edffe04f323809f13753
SHA256d4359ef4f96c8e30c692b6eb8350d34de6a50b2205fa16361bb760e163be0417
SHA5126ea3f78f49690203dbe74f66dcaff0729189fa1a26ee6a5f63441d403e17b6fdf487a3057b70602a8c6a8b02aaea60172cb49e99afa0766f78ae5c2fae93628d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0754d1d593d11ce11e04edbadb987bf
SHA17cf2b8f36d74fad14bd7f6f753d78a818a216eb2
SHA256490a6f4450745cdf7451ded9915f6b7b02bbd29e06b954d1367ffd867e9a5e10
SHA512a60e421890bced1dd478ba9e2a1d9de00a7e05e598de06fbf6f5dba15ff612888a920b744abbd3385d12e167e869d6d2d266105da67af6a0b3e79b9de7dd6811
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd72a507b6b1d18b9feac9f951eb91a5
SHA16ae0de1977c9752f8ab4bab5be4b2c7b1735f3b9
SHA25619481bef1f5dacbcdaab9829c437d62ee2f480716112181c641f017e7c6822ba
SHA512839a9e4388db33127137a84219202d2f29e747fcd9c83cd2a215c761a5d172aff81c1385cfd20562aae68c48b3d8dedf7f681619df2afcc432c9cb4c320a1eb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb5c44f88875a01ecb5405e457e2775f
SHA189edb3d6e27e05c0465ecef04860ff7c61dc0232
SHA25630d98fec4d0fef5d99ed6f9a89e0952164e9cbfba9c1a557e40e11e7fca43a8d
SHA51207c5ccfd45b94a8dc4817dbf266e8f6345537d4b8ffea48a9c9073251896433a41ac603a38c2c0314c3afb76b49897855a30ae2986bca81ab5d5800cd4e820be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fd558c396c49b01bb8914ef8d05c9b5
SHA17ff994cd42d652c8fe6274333ea2703f9430260c
SHA2560fbe671e0aa8b0a2f3b28547d656699125ce4ddf898fdd852af4fc81667bd062
SHA51288f44359886a84e83b56f32da56e56976be0fa6781290a9dad4ab7c5e49610b5823f1255ac96e44f61f133f39d4b1e2748215b217d2bb8e2b6c76dcbbaa8763e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6b7b046a4673f28c21f03098528e5df
SHA16fc47fc51446714188e255909bf2319bdf8bb711
SHA25647ecfa2354e646a4ec325369265553deb93916d52facfe8dc8620e91f0d66326
SHA512b947cbba0590a900e9cc8530527ea95134b3edf9f5c4af775407fad070a667aaab5299bf3b878222a1da4ba8898704def7288cb2b828660f784ace37c246e91a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548732c09f800ed2fe5f3304fda5fc01f
SHA15ec4b5c6ee3cfaf2916151187a85a6bd6ffa400c
SHA256dc3181acb4d2b1603347c56b9700112464e841e5496833aef2c00500c8e5f0f8
SHA512feebaab978388635215a14cc857fd1b0d3f00b2fc8504dc98946185c0f14463c24ddf4ccab339329aefa87def1dbfbbc8b0e28e7fd78473a7423dcc6ab17a91b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572f20a5eb3af4ff28be86304bb52a342
SHA14c11229dff97a95b37417e63d8ad15d25d5eb300
SHA256fe80b56dfb1d68d51799c09b9b13e326c46e94bc9d61bc0acb14f3e96bcef8af
SHA512e227cea82985b2bf59fa5aa3b76a40ce30ae63824d76c9c6d11a869784df447d2b0d53190f5edcfc3af6d8dde2f75cd927469a3b80e3b42abeb5b44d114cfa84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eba61b4de3b5266f7b449e7811b5f4d2
SHA1c22bb98cc546a45763271fb5db126099e61125d7
SHA25637a066b5fe29e9c8a2314462c14846cd860b83b4b4ca825afc59e4a51d5980d0
SHA5129cc5bbae1e06ca5d992ba99151233c5c87c9ffd73c339dc346545c49e8e7bd9b2c3e6be1a7ee7b26949b06ab4e5abb37f1156acffebf1ab5160e6aa337906823
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c2ddfb382c0027d62baf47d2c87fc52
SHA19a101dea5fd947e9fc16571de4d37763959bd776
SHA256b695fc03a08410628b505abed5d63a4deb98ec66da72edff186917ea50c25ee6
SHA5125076565b9539195d9f23c2a5cf07ba5b42b9444d89591baba2ac49b1ab1ddd6625229b43d8376c5e3754e7a8084826e8883baaa2c51920553de708dca02c7826
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a769958dfd7905cb1b8c65a4d6b7b32f
SHA19db076e9401b84fc8a4ae3d1e1d3feac12990a63
SHA2560a956e1340e5cdb5fd0025739878872f944428cad25925813d1dca0457c8ddb6
SHA51264cf1b48e0d639c22bc15c55cf8a4be06e017601136821662e058854c27ff4ac81618e1b45d4f77b1a38e5b3119fb318651d826335fef291aee3078c6c947a8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e71c5fe5895de5dc09f04d09a3d8c6e2
SHA1b90253fc19e56d1cd5db58a35c62f0e55cb17e2f
SHA256a5bc3513661e3a2b546659fb03f149acbee6245f6fb368d3d72ca91f9c761797
SHA5129ce2bd3267d7513dc7dcbdd9a2a90c9728409b74926ab0f8ad3b1a6797902dd43cd15cd5a73a857498cfe0a20a68727d847d6c45af43f4a56422aa1e645d75da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ac91745877c2d15bb1450dfa88ab005
SHA1e7a6617c2e621cacaaa251e44f36f58d70b6257f
SHA256f5df5725bbd9119af79a5d585c8ecf9732593c91c623fae09c874f9f26d4e09d
SHA512a8fb5464e1063dce97d9a8490c197b0c9626b9a07a0423b36bf5b7d37af435b3896d304fe3d47839a1933ea837692d370da74eba4bbcdd13b2a7c5ca0392ffd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526d7a42a38f0548b4df0782909bde2ab
SHA126592061a03dcc8c46655dd70fb8850125409b8f
SHA256d3f3404223ebc8297088db4ece829c793bd136c84b0ca5ce2efd9f48d2139efc
SHA512ee02c47ea2635509d4db42db26dd698af4964a425f367ed51219704954ae06530de06e6e44f0522fe34d4de36343aa493be322c28a9815b45fc03186c75121f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2966cf18c6d6d1944098a01448d78c4
SHA14bd8072a19bd35d472c0eb8dd1aa5cd61327611e
SHA2567504dc2cc2937450e0a1ef07ae30ef5abdfd10494d363b06acddb6b9d0eeec98
SHA512a2edaf20c47ce1fe0910f1dc77b222d2937ae74cff8f74564e59ed477ce0238120973652e3684a65dca2cf174f1df486c2c4359c5d34eaea4f23a20d83bf57c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5269f46c4eeed0bf08ea30d6aecbc3276
SHA1570058f75de54d2d64ed6611ca2e98f2579f0f9f
SHA2560b909dcb5c880388e99f9e379c3562d13866ca0514a4f5ba2bb73cd2737d3c30
SHA5128a11d35483dc94c682748216d069c6b68a0e03016278cd6fadcb3f4e1fda752d1252fbd6d10221067e3d0890e6260e601f082bd16edeab1ffe71e818347da5c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543d169ca4ccfcab8971261a902026d09
SHA14edcdeb78936c82781578bb1d11ef6beb3077c97
SHA256d777849d39fe806c039268ad184fae533cde40e61085e573bad241b40aa6c4af
SHA512d7a4eb9c28229b123fcc2bce68837ff717f7361fe81d9da0b25608c85274c8ce2405b0e3adddc079185607453f08ab144fac9a11be94a1a7a180f609e7d61828
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b