Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 06:34
Static task
static1
Behavioral task
behavioral1
Sample
b26e4aa63748b78734258b61f44ba4bc_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b26e4aa63748b78734258b61f44ba4bc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b26e4aa63748b78734258b61f44ba4bc_JaffaCakes118.html
-
Size
8KB
-
MD5
b26e4aa63748b78734258b61f44ba4bc
-
SHA1
6cc1e2550e35de27dcf415d68511b054e90e8f8b
-
SHA256
912c78786fba636d64ed2c075320db16a5611e6d6d27c430dc0de6a98c4845fe
-
SHA512
06eab3bb596e6748b42f45a6c152a68a8d714766f72171c2348d2a43b581463e813f1ee1f2defd4e0a5edde7c558d9c46fe35b29d4f1f94dbf3593152bceb571
-
SSDEEP
192:QO5WoZkgKRxQXIhleOmjCnW1h4EQ034g+kIsKIcBB3Yl:QO1VS4IXevZ3IsfcIl
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000e3325f624bd6832e61dc5901becf942934ee3804c8b9b56ee7f7a11fcba2a13f000000000e8000000002000020000000ff0bce0d45d5924134af9cf98973599eaf465bd56774772478e2819c638238882000000091ffa2a0bb84a391b6281efcf20194f4cf18ac06cba24c7dcce1fb1340258f8c40000000f8b3fc91d173100bb3d018bcc9ca770a61254af94e62b2d6247628f865e50f867f936ba4e11e82e37dbeb388a1867715eb08be8bd0f9667a29f1d0d4e813f71a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50404b3394f3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5CC039E1-5F87-11EF-9D6F-6AF53BBB81F8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430383914" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2308 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2308 iexplore.exe 2308 iexplore.exe 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2308 wrote to memory of 3068 2308 iexplore.exe 30 PID 2308 wrote to memory of 3068 2308 iexplore.exe 30 PID 2308 wrote to memory of 3068 2308 iexplore.exe 30 PID 2308 wrote to memory of 3068 2308 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b26e4aa63748b78734258b61f44ba4bc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2308 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f96a197412536c1a74b2ecb772aaff4f
SHA1ac7d96d04f30c2fb7cd533e541df0850ca32c24f
SHA25649c13f45fbec84f67fc02d84a15d57b210953a4501158d607d85454a189befc6
SHA512e6f28403b527b210c0a0873ded8f897a833e48dbaee1365a325721066ee8352b16f9553ac4811b94123208a67227e8627f8f5455e37f017a37358040f84a2ebd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c29d0f7aebfee9c30d7afc5bb080bb51
SHA13bd24104373e9d37261f630a05b146e66de56413
SHA25678e6f3383f0153e0ed15014fd56019d321659487ef118ae61603c0bb7aefbbfa
SHA5123c13ec1f2712c4af6fcf4d83b508d04b5890648c9f588ff5ecb2edc650003a4b1899c759236c24754b0ffd44f4fda24b5fcd0a541f868ff12a193fddb1d18e80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad6c0bd8b8334ba822744a819e0804df
SHA19cd5bd35a1cd97d0cb7c6cc7987db86c67d00643
SHA256bb8354a6d67dbc01efed0e50a22eb7190afb568ffe1f7f04bdd813ad9215d936
SHA512a0b41b111d651c4b806730278d314b79dd9fe1e361712519e0ac1fe70f7c893b0e11f3e4218e79759a89692075e43d4cf082eaf8d0e11e054baa030f018abdc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a76596c86c057ffce252430fedab224e
SHA15655d79266266c10dd4b9284ea597cd328a154e9
SHA256aa468876449875cf9195ba1596200ea063dee69cb354d8c06d1311e872a1bf1d
SHA5127dac2e774f6712db416ee1939f6205314630165cf3e3bf3f2ddbb84b12b31df88d0b1e96d746c0b4379bb92a01857185f8579645ac2d3bdd1b879bd68105e530
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551980d501eb9c5cc0354f9d662f37206
SHA18cc021e745ce054a227d7fd10d6b41ba2f240664
SHA2563c0ab4dd53712da24e5552335ddda4576d5bce4afcd0825b6e95dcdd2c5b09f5
SHA5120cbf9abd535c3957a4a5866519332c3165370650c7c72274416ea9ba0aee8f0938574bcfd5c401126843a6ef24cec2446f51e11b695cfb3febafc6e9ce45328b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eacb04ecfd3c98d2dccd13ec3c5be27e
SHA1c7136993601fc313f9d3ef1b911f4fd53772e4ec
SHA256274b83bf30940ae39c3579b09ad3dca837970e343e53fb04899b68c8a653d1a6
SHA512d52373497f4f003910acccf597df242f2f2f358a386f5f6cdc690ac194bf3694679691b3f0c4c1e6b9d1abdc92c01604b79628fd42f871bd1a8ce5ca2d79c439
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510f210fcf130401f7c91b05cc649321d
SHA1a9d21c232fd4cd5326969e8a1ef16304f32708b3
SHA25648869b598ab99b8e6d02c16ad7fea8140fd13c5ff02bdb6b6ce3ff56a65af73f
SHA512a667e7e8837f295064cf972a29e71c3a810c9ac726e47b5d87a10bbfa005453d964bc52b17bb2993fea04bc3727ceaa8619e65e6244380896754691b85d6bc64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5998843b5892e98fcc004de517b3ffbd9
SHA1b59f71dcaf378e859c1620e0b8a171931b5349d2
SHA256c9386dfd45fa6465e650344e670fad8ee94c2c04a064f469fd518f276076b6f7
SHA512d06cad58f3ce7a75d4e415f78273e35b20b4468d1e3a1f82455bb20574bf74bc277c58b4c90650a8b042292e533feed6a266dc1302c6c05471038393692309e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59610fe2259165013f80a8fee06b88205
SHA1c3400203399e30780b0c0bfe809fff8c4d312d73
SHA2565af529c36b2f46276e14b379dcbd903b4c567575b9b7516e1d00d8e94c198eec
SHA51272d9b15d89061979bf8ad8b8ae7f045d5bcca32b4dfc0d524ea51760c605bf2257cf56d93fdba760f2bf83f1246c7a3041d967979287d7ba78a70cbd0c394166
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b90de7d34029ae97cc1d33e3624ee5e
SHA17cb783a0f0f4c7e7e2af199ddef4c6a83f869327
SHA25684037a76141a993ef164dafbf2a3639c5b83e621883b4e019db8753b3efbcb54
SHA512b60ee2e4e49a451eaa50e3874426d25ec7acb597867030280ff7dceb4b263a28e67ec0467449c55a84928e0b724c34db65f0ed83d460b0a399ed37be100a8e16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3b7023abbeff7683a995ab5b3a492da
SHA128d4c6eee9d556fe5c550efb8a6793d54bdae3b6
SHA256611f3e8139ee698286caf4f7212726c94cd06cc419b56ec6dfd087f0cbaf5207
SHA512984017691c6d8be3686d5b022ea0f10194aa624ce8785fe962b4bcccbc1f12f264281f35e79a2cce4070da1362c130a8c3e7d7b62fb82fb3682e57d93dfbe866
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5765a9f359adcceec491d11779dbdd9dd
SHA12665d188f40d4b997ce08b9396bfe139753965db
SHA25602161c7f45f2fa64fde8ca479f9d499b9e607a9dcc982661bdbd015de95ae2b6
SHA51210b412579baa267cd5e5b610d466114296ecfed86ee336f19aa481151cec795ec7ed7faf05c7317aa30ea3503ad3ca65d72167ae960a81bcb518a2d18fd38217
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f070963c5e468f4b23a3e47b31bc4b27
SHA114f425398125e137c4bd5c75500b0d8b5177ca25
SHA2568033f09ea9c6076485372cc47e9843ed145fce0123d881a327e053bc3e182964
SHA5125346bf9950733149bd3c5341b60af7c3bc8f85faca2f1b79cd7d1f3ac20dcd4b91118411ca308f4f11c08ae745a86f5e3729e0097f12eb63afb8952761e5cd16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec549e8b6428d720abb67d57012ea355
SHA1811074a16d1ca7d2bfa5a4c390f6d894e7de22a0
SHA2560581469a292173f86e59952da82f10e2d5fffd9ca1d423e47f2ffe9eadeecf71
SHA51276d3900d9cc29a8e8b5d41e6c8e7ee6e5e202e7f8a1743501439dc7ce48fe471ab4ae1b048af9b82ff54b795a1b6a1650f3e42cf99185626e6e03e90987af523
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594a68a92c9001ead4c3a97658eb3dbdf
SHA1e4cfc0365dff2fd398ae71c22cc3894ddc29513f
SHA2560661fda870d6d10e9dfdcea6bf4cec217c78b573766c99cb58343d0b167b3185
SHA51257e2399012b5a132e8ca8d5d3abfc288847aac41dfdccd2d1d9754297667cd5789556f01b4925fb62de202048e58d0103eb286515a10682c9515680e32f921bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550c55463de439aeb1523900fb67deaf1
SHA11336192954894c560e964e23c974ff4cfab3d1d8
SHA256e875762743883c72b86ea457615b4cf3528ad1d6b3178894ce58902f6d0595a9
SHA5128b11334395349ccf99767ff3c255778d66834427fd39a6c1371ac777734cc7d7860a9977fe3b74fc0802f4773f6310bf7c5ca41030994ca196f248a9077beae7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5585d2536a6b7b76eb6f277e47ad51d28
SHA102f123fc9b17081383ad9a062cb191e553f4a2d3
SHA256358f0f85bccee5f0b8f95217a0e6f80c0ebe6df78100b3c64f373f7c6f290ddd
SHA512ecb2cbbb5bc14365c8557d6daa89d0ca6bc4f60be6d3305900e3efa1f9fb3e6fab94d4ae7e4421176ee47c8097a4a35470f04ccbc0432e580d08450b196f86b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5a8372942d8bf7326e32826c4036fe4
SHA16099cf71c79503b11efd7c136a6c43b6aa2825bd
SHA25655c9f74accabe2ac43c2567aa880bfb3cfee8572cec8994dd3174075bed7b7d1
SHA5120da399d04160c854502295db86b5b5c21c35e978a730dabba00583efb2fcd49d56d677d810aacfc5893a27e0540d3047ee6a307652fdc83591dedb238231767c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543e2274fa8cd6a0e1970f8676b9a6253
SHA159b09f8e5cf4f8dfc7dfb1af64d226edf3c56f3a
SHA25637dcad35ae1b844c32d948e55ea54b5eac26497353fdedab3fc3340b1165a5b4
SHA51225424347cd31090403bed78bd40970fc37e37670f79748c26258bc7fc38545a122fa483e6ffaba99ab89e5c4e25b2b42be544fc0dd9e6ac10bea1444f3a6aea2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b