Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 04:21
Static task
static1
Behavioral task
behavioral1
Sample
b215cee8036f02bbba830ec6c1dbc7d2_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b215cee8036f02bbba830ec6c1dbc7d2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b215cee8036f02bbba830ec6c1dbc7d2_JaffaCakes118.html
-
Size
27KB
-
MD5
b215cee8036f02bbba830ec6c1dbc7d2
-
SHA1
650f7ef2a4c8857b106b8b425c221059d9dc775e
-
SHA256
153cdd6cad6b272f96140b4f5a69561b8d4c5daf8a5d0788f766edc63b2ac435
-
SHA512
697554b057218e82082418083f403e81290e12f17d68ec279e6d6cbcf1791362e50d051b07f5368e7d9b489dfbbe02b55454b7057267187725efb24849784d0b
-
SSDEEP
384:6ALlIJbVrV9x1/LNHDZe0pCz+LaMBcG6zwA4Eg2IRxCCBM9dxwcGHuN8bj7lNx+e:6ALlIJbVrV9x1/LNHDJ1Ofe
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb780000000002000000000010660000000100002000000044c4051aa3757ee84712c68fac90ef2ae181a9d88bd5b1758a2a296450e35a55000000000e8000000002000020000000d83bd8eefaeef6cc56837c57127989f230fd790b2ebf81954a93191c7b5ceb0420000000603c14e931de0e32f6a44113610af77ffd44d0f7202cb377f42f09603a01169c400000007999d059913b859b2e70762f8a882726affe433f65b5e0bc6d2c3c7bedc1c0786b50d0f9190a5cc95db0fb54fe1a1c9803a43d743708d29225e5acd831c6fb23 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430375982" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E581A291-5F74-11EF-96B0-E6BAD4272658} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00679abb81f3da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2412 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2412 iexplore.exe 2412 iexplore.exe 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2172 2412 iexplore.exe 30 PID 2412 wrote to memory of 2172 2412 iexplore.exe 30 PID 2412 wrote to memory of 2172 2412 iexplore.exe 30 PID 2412 wrote to memory of 2172 2412 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b215cee8036f02bbba830ec6c1dbc7d2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2412 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebb31b8c516a1151557c578f129b09b6
SHA107acf5efec701130f5651352c5916d67673d0c50
SHA25674d40c666853b1730fffdf6d82d98e6f354906d523d25325fd29e2fa7b372b14
SHA512d6aee3424ef6052084f343d5c4ecb3c6042227042601da8fe99f27d7fb3092566a637ced15c1c662998061719c8e8e62e457c04e1b1ccb2dcddb81cc65a81a37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58be989309249174ca6c8fc6dbb2d196c
SHA1dad814578396128adf19b02ed1f8551e05e9f5f0
SHA256b8c93c5556b3e6ba7df9780391505a4848a67348e48effc6c80cb873ac42bc9f
SHA512facda1870bd0ddaf26ba7b1b81d7e95d1e5065b5bd00cd9cf3fcef9e6c61c975145c2a539b59aedb8925d29148ed97c4c28316580f301a84be2b9bd88bad3306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efc4ff480d87e978ea6b8710cae639e9
SHA1a220b65e33562ff105f3893b52c476de14fdb167
SHA2569cb6ed43960427b027320a2e16a7a376eb90e63e86f91a8b0a70239b8860cda9
SHA51217f3ab8c0982235c11bd4939ea58b775646646bda018bc8833bfadf60fc3968b7f040181d0a00d83b4f99342c5a03ede2342fc03da1be1b9107b84eef073048f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5847fbe372075a67329b6f17483b8b708
SHA15e11fd988292bc62dfa37ec1f9c02e0a727831ba
SHA25618b4f44011f246e759734221054280040735776cd7be89e13f766e7700895d5f
SHA512c92d75b925f29daa3c39a9ea598ab35c6bedd4b2afc989a9e7a2a0de926750efdfe5329f67dac5ee6234d3aa106db3cb847a0fa0e761ce6e1fc61ad2df06b7f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5795964a9f72fff5ef5cffde4920a9022
SHA19cf53691bc4fd536826d04cc767ca7162c729c05
SHA256fccd6b979cf4fae8331fc4b916f7c4905fcc50f012a8a9e4b2003371c3c54c17
SHA51290df51f75614d4f776220da0581949f0c776083aae88c64ee1c3efcb33f314003d6f19dbf033b6a9195ab91fa081c5db78d8ba6c37d0ef0816888f7f1df24cd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514e9a1ec0e1526a3cb5127a86c99d592
SHA1b93a007c991619561c2c28be8ff5629f76cef6d3
SHA256303f92014e1fb78d9e4ba678428b62d5771a4f7f13e6985effee41a6e5735a33
SHA512991ba0115068b8a0242ff59cf446534e77de0160aab5e1cba51e7c9bd98d5a504507fc3ca18fe7069f9e5ced97cfe7b7085b6135ff1e842baedc1aba65d786fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539c955763cb269b2e692418c68841d78
SHA1cfc9646d83a70a235adef1304a2255718dd0d5c0
SHA2567c5dc47b30fcaff9be5d6ba813758795c78d4a95ee03b7204c67c45e128a4fa9
SHA5127c2be83efb0becb2ee79267f1fbcd3c5b6f8d0b68479f1293a79bf6a906ef7c75248104f58937de18ff64de40ba2ae5faf0417a5aeebcf82dd73dcf4e95f9390
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a81913808ed567f31bf810e68f74807b
SHA1cec3e5683793dd6c4f59d9eb4696818b66953d3a
SHA25662a23d5b15187a897f4c049d58631899f3ac769554d3493effb0d8f11ae8b8c7
SHA512194ac6eeddb095a7a059a7e05f0d315db74452eda5991497102bb5c2f23c72204bdc779312feabee9e9820b3a686fa47c4cd48dd5877b49ad48942141ffb00ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b24d9c3d0198ca6d364a4fbac6513428
SHA17f86605cb58d5c72bdd0ccbfd05c0cf736c39a33
SHA256a8db8a0b7879861ded7a58eed2d28509ec8d1f1c998c9310f58f26a8a6001782
SHA5127f686eb3d64cf786225e189c9b6ff6d3806a59d3b2e0b326efc15977e3395e2e72c938aeb66cd8b3b47d227b9bfc1b6772a97ccde84562d6b6a2b9c1d265c4d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506d9e84370bf2de4ef2663b587b35225
SHA19bc0c4ad76d5df09eb98a5ed2675fad86717d736
SHA25678922b792cb3494b50860cbd2a15e6643b9d4c2a3a460683d023a5c11b9e55f0
SHA512486745d44aaa8462c4a338434d0d079a3071d78b6cb0e3528178b9de373d9a8f4671954a7cbf313f01273aded5a4509b4dc30f3618e5ae1e3143025c19639048
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591c3727d0d0d82fb139aec15b50f0a4b
SHA1d265d6d419b022df949f0d0ed7769c05af3f4969
SHA256f0a0e24e2fdd5a8d49eeab7aa4fb793f79ad2f20d964850616c864ea13157a3c
SHA51274721ee77f5038a494f6568ef6bb6f2ef928b5f916cd73b92fa208b17920230d36e5ee76edc4354ecf5b8d7bbf9e0b90c9df1d2df6cc4069248844467d7ade17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580bc93834bbc0ba1f06e0e19d5015ea0
SHA1c3554435ecd69cfd8e47ace51428bb4af1a1f284
SHA2562581e0d4ab0fc7c3a8a9f51d0d2878baaa6f6c7fbc4ae54b99b59eccc88efa4f
SHA5128ce9ed25a85501a0540e4aa1ea01dd017df584804964bdbd80e0de37c9de69544255353103683da74402c6dc94db3fed30c913384c178f69f8291403a426c013
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5680abde68c62ad774d0b03746b49be76
SHA1e05f5bf8b44e352ff37c7f021bade64d110b34be
SHA256d2899192beb49de60b9a1bfa5b242a49bacade0ab8260b1662ae86ee64ae56b5
SHA51202ac9e29b14a04c5c2beac500214caaa7eca11b4358dd7673233d7daebe82f6e477db0fa8f423325327fd56c50548de67f9218e36140f9e53922fcd49010a7f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ee05f9b870ad69b18d172ba8464373c
SHA1d7576854467d737576a86f0d75d22aa0e53b21e8
SHA2560ac599506fe490e78b9de39ed8b4d5d446744a2131391a7f557d6008e02fc35f
SHA5126bd0b74020828c2cd334754476c34940e9bbb9526e270a5523181ef5f5fa890dfec803078fdbe0f2f8d17d135b8fee209873473f916ebcaf1829f9419f0ca836
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be5a3e4081778ba4894c4249d4d14bdd
SHA1596b31bb8ab12e1afe2ba10edcb50702634f9c4b
SHA2562f8da596a9c61d53cb518edc36e46fa73407dc61da65682ebfc3dc8394558ab1
SHA5124293e3e97082a3ca1fa64bfb5300aacb31d94dc71908a09323edd296739055c3a1a24ad7062968724280903637a1e21f310d10f362c1a52d276c64ded52781a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf58fba091dcc2e6c150a0684aac0524
SHA19e18c164280fb60930940ec39e4d10c93aaeba78
SHA256650cbc4fe1cd685b4cb8d9ea505eee8537d217a80243a4138a1620444ef5cdeb
SHA512c842091fc638a56c633a856c6fa1cf20acea967264b9d376169cbbbb9dd2ba02c2f0236079dbb784041a6662b90f1176cc301e44ebfe44324ab53a95ecfdd38a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc6458a518ecaa959453841743d3b299
SHA1ce8ba9664f549890739e08a21f96199a923757dc
SHA2562b6129c4574f80c7553c284a87af90aefc42dfdc525190cda34aae8a55c8b926
SHA5124c91aa8f5cc5019847dac2a7c2d9ff1248983dc5bda61e02b6ec31188ec6f770953ed45853bbaaf66cae838bde0f2f874cebe1314005d1f8141fd98e95bcc4ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c908fd71ce8ef749226047480f791cdd
SHA1458951749a69229254c0776a776e6ea0842a8d8a
SHA256aec59001a4d7698102f5dd684528602189078fe1bdb80c0a4951bdcdf2cc043a
SHA51218be27e8caed3a1f78c54299f99acd0c8f6c585068ea1bfae43e3630a8c96afff785d52696d5921e52ef72fe03412fa38fe437637af2166570a021132c6bb4d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e92003d5d0ecba7de75fa3933044097
SHA1eea31a7d5df7a82933b25ffe7ea557bb6b62237b
SHA2561dec24630fd62cc3fefa92655aa30ba0a2948f342643c93189b6c527b58bddf5
SHA512999c489942f80020bf4a18dd2f7bb5412a87db8ccb87fd9f8349f0aa2f99c0b76ce970469e7e23274e195f8287b09bb61cb5a8093b620639ef69962d3d4876dd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b