Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 10:02
Static task
static1
Behavioral task
behavioral1
Sample
b307d56454bc636b8d563a04a1ab2da7_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b307d56454bc636b8d563a04a1ab2da7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b307d56454bc636b8d563a04a1ab2da7_JaffaCakes118.html
-
Size
56KB
-
MD5
b307d56454bc636b8d563a04a1ab2da7
-
SHA1
7994142a219acf6f5793e76b39dbd79bd9110c30
-
SHA256
162048080e935b8b2aa5407abb1926d09bab1f271c07e9b6035adcd52db06732
-
SHA512
b98da6a46adc1bd1bd8cd3ea63479fed52c88de4e9eb49cbb0c7b3424d705445a3a9f114ba15c14ba33c29060b3d958563658c8f7459721f2937423763944e91
-
SSDEEP
1536:gQZBCCOdj0IxCuxH+Ujm0DlnPiwcss8s6gqqaUGYyCMaYeASmiuywSy860Uuw2IC:gk2d0Ixt+Ujm0DlnPiwcss8s6gqqaUGw
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000221f862973269e2f41d8521b0e8e9babf4e2b9be06e3367d9ba6c97232f85d73000000000e80000000020000200000004264a4741e2a422541821d53fa41e79b6c02d7bb848dfa61f057bac77726fdbe20000000ce24f7544da0f23cfe63f6d4846ec338b8f433ada622ac982ebef36bf528072c400000004fa76d1262041aeb1e50cfbb79dd55adc54274f756db0f21a97112dac831ce890e5d88b1056fb55ccd130363171f1a90ec85331b25ccb1abc28153394476966d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0211e55b1f3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430396424" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7AE3A7F1-5FA4-11EF-A5E5-DEC97E11E4FF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2148 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2148 iexplore.exe 2148 iexplore.exe 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2652 2148 iexplore.exe 31 PID 2148 wrote to memory of 2652 2148 iexplore.exe 31 PID 2148 wrote to memory of 2652 2148 iexplore.exe 31 PID 2148 wrote to memory of 2652 2148 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b307d56454bc636b8d563a04a1ab2da7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2148 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5fea9edee25f36d303afd714860b97dde
SHA1c5b6f8dfa1df308483c1998bbc627d17775cf324
SHA2567db63201b0c290e20f590d35c90ec7e8cefbf9b9b4ff94507c01c8c20a16b0e6
SHA51267927e1b14ab2601d1148e1f86cef8d95397201af59adbe073ec416644c75057e2eeda269cead6165720489d07aa13b15e79f1c73d418fca237d418b8623021f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df0062e44e7fcf4871bf97ebe92eb26b
SHA101f8ffe2f3a4c7063b4178b3ffe467d7dc540f7b
SHA256187c7423304ac85ea431754a9364b19329434c70616a61f7b24744c3414c22a8
SHA5126cb471053bc47d28b5496046e8bd1af803c3c728a409bcec87babec19b6b246cda90982ad6963d6a9e9fe4516e507fae8f3821042d2f888091f80fef43bd1e6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501388c6781dfe250925d960ceef207d2
SHA174c0a273a622c7683ba2f3e8f8f36230de8fe702
SHA2568cc0ef5b62b207e95b84aa3c6f8c0ab0bc5ea9bee801b05fe2b3eeaa5c64e00f
SHA5129172845190a46c1b9337fe22714afc7a2700a6ec827df0c6c0bba4356bcabde89cbf02d714fafdad92cd5163706deb26a412e18e09c3706135d271c3d573162f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bf936eaaae7594c8a015030d1b93a2f
SHA17acf555c112d6f4ca92a3060778c0df890fec076
SHA256f9bd5718d19c5e9642395594881d7f855f6ba78eb67024fdf5c670fcaa8db2b2
SHA512d334d1166332dd9bde5a115a00a06f8a190da93b2ef65446db23137f950552fd1bf829abd27fa19307659b83b498748553e6504499be59e406030eae70df697d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f62de4688630e0bc0c82b8e92bd0f39
SHA19e5a0a965198203cf0be92e39b8795ab7014428d
SHA25657274c4b70483f662f35819d493ac34c1f1b7922435df6f951e16a72be2c6993
SHA5126dd555eb39ba6d21e72d572ff13e0b69e01e53b07bad17f9fdc47088ab36c5358bd1e6e6f51860287b584b658575064f9f5a9f767be96ddfb834c26ee3ed6394
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57026babca02e022c17e81a1e3bb473b9
SHA10d631334a00b27aedc0cd5f3a24e27dd83d7afc7
SHA256c3f36b0d7fe5cf7c3bd52b197773ff12ea6a07b0194b84774b194600d8ea10ac
SHA512723cb7e53d1c47298dd10d3e5e6bbab694d9556da6556edaaa63c354468a5ff3478eca940b3748289c5603301c8f0a7833a439cb3b6999aa6b683f30fca74a59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ff579a273ca57a21fbaa2f184a00956
SHA12969bd9a33842e9d0eaf82b987976dd23896c343
SHA256677774b5f259de19e3c95392618af124aaa967d7f3f6357244987675a6cbbf4d
SHA512f1626051070c505ef66dc0d300ef8ad80c750e9fbeca875680ca9e60b96bf9f809880c0382910ffb9851c3e097e6001ecbb3741e51bdc632a2d687ef89166a8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aac9e04f7e82cdef1c3a0a2bbb690448
SHA1e8fc5d7467485fc83b82767035ef57c7c4bd2beb
SHA256d6d392ac5fe3f0ee060e17a411d2fca1d988106130507208e05c255de2b91412
SHA5124a3054ff8e632c606e60bc598ace11ff980aa6ac66d9e8db0338630ecdf19ea5536a71dc0b791c2f4b622f303ae099aad37aba65c61c6622f922470f66c5f68a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d7529582e5c408ffd81187ae176a52a
SHA194d74328f852a3e8d2dee4540b0c38379bde09de
SHA256a85d50496f48cc5f72725dfbbb076f9a5c5eddb34115023d1f5498296b3f0b70
SHA51231df9dc93c8e0c01225ecf8d576ce23071e42b6ff1a70b4f0d06f675ff2d37411bd1b55027f8e26ab9ab23cda2b73d52441014f437b915b4e40f538e3caca681
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5341f590b4e025f04735de9f466d669eb
SHA17aaf2889eb6d82335136298af7ba85dabbd0867a
SHA25693e6afeb90c1b2aaefdf7e45d20b2fa49cc266549a30d6ac687f397a20eec28f
SHA512eb86b40041b2cc0f0c93ca163faab1701cae0e5369619dcc7161a1efff67ce7a80b26c3c864e516a341e3c947b225827a5888008d93d46327a089c9c0a2b0adf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54320b561986d35eddec3b4c6450cd47d
SHA19381b46747fe49469d276e0a974b5fa7d3533034
SHA256949870e87f0d1ec88966082ee82d9ad091292f2b3360afd82a8e97b9c3195418
SHA5129d85dfba402ddce5a74fc0877dce8d98113e0b186f0b9c4828fdfb2ac9aeb0fe9092f12d327b222d73f34519c150f3ab708dc124526eaf11fce9c37cc62ebf8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b7e641fe5f59c2efc3165885ec28350
SHA19674702ed5448d7b05e77bf64d3714cdb9b679f8
SHA256783a3ac4cd7460b965804ace19dc319a19e1aaaf578465dd46f740e42958e56d
SHA51223d5817c9abc3f6502abb574a5711dfe15f386d73aa45835dc7e92b363021488ba2d4d2e71aea0fd3321907ff1148184362bebcace992d75e8221555f75fdeb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0306181862fe6242d1d563a1197e1ab
SHA1049e74268d8e53f4d0e4c9b11e27bb6464a58899
SHA256a4f87d46b2577f777a934a6cd8eb3b028165aa6e13c7bed82cce0d0163f4cb1c
SHA512862cb58123165cbf458026d9663816aa1df8a626bb69d2aeb3d07f46ce3991e6bf93c53149b6ba217c874d9b431becfc75e3e74e51f8a4dfb83beaba8e23662e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d254c79669d0f12c90c03815f055d54
SHA11097b164b7861f4ff9183f9002cf2eecffc33976
SHA2564a06adc82ab736dabea1beb24693ec3b69b6a31aa16d8d36ef6aae5f05761c63
SHA5128c38457f782f853f82db103a8bb50eb7128fa87cca85421e5995d51a0d94abc0d2d369ec29c4bf2c8ae846dbb7a61f6b352b373804d9c7a84cfc1abf2e967236
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5cb8f5b566bbfc775141d5c2658a5ec99
SHA1608af0c7c9ded439083f9e9a057eab1ac41418f8
SHA25667f5e1650a796789674a2e443cf80deb146986b77668491fc56f88bb1061bf73
SHA512bc5414f15d8bfe64700edd8309c18c6d7600cb5fdec8590f099051a112bbf605d2a8e13c381723b7750f4cd7d2a682946191f08df09e38dcfe77e159f7c7919b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b