Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 11:13
Static task
static1
Behavioral task
behavioral1
Sample
b33e2e2ddcb573dbbfe97ad5ef8de874_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b33e2e2ddcb573dbbfe97ad5ef8de874_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b33e2e2ddcb573dbbfe97ad5ef8de874_JaffaCakes118.html
-
Size
6KB
-
MD5
b33e2e2ddcb573dbbfe97ad5ef8de874
-
SHA1
28c34c0fcfecd9a15b24a72b6c5281b41c68cf45
-
SHA256
48fc578a348a31b388521bc6058b86a1dcf8e09151be600e38969077f3f5c5d6
-
SHA512
e11c8769f570240b66b363e6d11cfcd607840a0410f85871cf5a0389f20e9a15a1585388befbdea7cccd588d688cbab4a9466b1120d5d016f6385a470988e4b2
-
SSDEEP
96:uzVs+ux7KzLLY1k9o84d12ef7CSTUTp/6/NcEZ7ru7f:csz7KzAYS/G4Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430400687" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000041cb8057b95d5789a5999ed653b579e9b048e0206c13f5e0e84e7c655a796b4000000000e800000000200002000000099fd96ca49c9f32f156864bb1d0c7b818e75c3df2d71dc02459f93c9a63b7ebf20000000eb966dbdbb9abe07466ac4e2884bba04de4b2d336a4752009d2259840269ac4c40000000234e55f5ef49a0e5e4654537bfc51d7ae12c93bec87691cd0aa2af245e55e2ddfdb900c19b39e83b7e2ef11ec2c4d9e3ae4753121acba24c5982269c459a5d08 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6AD33EC1-5FAE-11EF-9994-C278C12D1CB0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0676458bbf3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2632 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2632 iexplore.exe 2632 iexplore.exe 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2632 wrote to memory of 2888 2632 iexplore.exe 30 PID 2632 wrote to memory of 2888 2632 iexplore.exe 30 PID 2632 wrote to memory of 2888 2632 iexplore.exe 30 PID 2632 wrote to memory of 2888 2632 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b33e2e2ddcb573dbbfe97ad5ef8de874_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2632 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad12a241c1c8c00370698d92019c9839
SHA1e2f144a3cb59ed506ccb24605f368481853d9f4a
SHA2563f90e47fdb5d01a090e7ca8a59feaf8870cda31de8be20fd43d9e3a77513e93b
SHA51226ae5e6307a0f5d49dee27e543e3ca385e2e8c726c22a981cb8d1356af90101dbb382e961b49f15651b8cc1398cc8c9cd3b1c0585000f8e8b9e355527f3dec61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a6a6530521240dd205e269071cd2d60
SHA1084289cae49f314e3ac30194317f28bef8939bb3
SHA256fc1a9ad386ddf575fc73ac770d04fb1e52b0e411718a0ec9077a13a63b98435e
SHA512980785bca8983dbe84d7022c83b1e32c1bc8ab1dc8c75a8162b5c614db9a5bce36bcbc3b50eb846de0139e9f5f236ab18a6a84bd6b22b9da8f5c47726af4ae1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a80f65df8cd34115d24996dd80733bf
SHA1f37c598c6b1ab4ae3b601f550205d64e951ddf04
SHA256ca6f1808150424b5e415daffa2626c2190abd7178b185b6a5abefc171557b10a
SHA5120f374a09d636f6c7b1058aebaeb116a8349e862d3341ff0bb813b168adbdff8836f190c1545c2eb7304a90d17a315464767af23c636ee3fe602860514823b2b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c384e967a5ca95b4525daee171cef224
SHA15adfc65fde630c2ce3f42cca4d5c74d1ba35d285
SHA256dcce156447c6d16079938bc0a1787c9f01664ac3e990b34979acc789f01b954a
SHA51214ae8bb13100dca5cf00f3c0b5b0de2206c82282c4344611a03a25ed940b23ad1698ae4de654f19877b0b212055720a56902050f70f7c0a403f29cb503fa52af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9c015726c6f17fee090477f2400efc8
SHA1e6b633dad4ce348fae4344023b1e02ff2b7af58c
SHA256aa5fc2aeaff79e63a71e198653e9adab51ba66f87cd42bb805db875618aa813a
SHA5123aed84f54a20df3b87543ad1e0b654dec78c122ebc8d26d3baba3608e856b9ba3b993b58d045fdcaaf55463990a6ae41b3d37468fdd4722303aa85019d07e8c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f46b10d4e77d51d04fcfc08efea2f11b
SHA12952c5a8c84b199b1157867c136092e3f36f1774
SHA256dedf828326d61bd0c4c0452229dd1b24799bba97cbf18aa5bfcad8a029086fd4
SHA512756ed174f8afdb0aed00cb141130af82511761808242434e4701d90c8a59af2f422805c9c9313933031dd2c87d2cdb0975f7f3ef1adac1e4c21538341e071c85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e363c9aac7edca5056bfd06e6937936
SHA1226ac3c6f79bfba7d4ac16240fa236342e2a576b
SHA25621d46404361577da3f288c765b22afbdcbc6bc300f935b7770aeb1f8eef1f018
SHA512764c604e122b2b2207da42eb622e338b031c82828bbcd2b1d037c29819630890e2d0c79d7c8d4ff933b5447b057227beb21362555822916420dd7c7c7ab7bece
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd7846ba6089421abf88fcbf844e19a7
SHA1238aa8dd3c077776344a48a1ee9ba0a6ccdb8845
SHA256ba8baa10c8ffedea50ad456440e4319f15e1a91ee288e31652430c01297879ef
SHA51235755f2f1fedfae7527dcb06a39a7d41286ec9d015b6017bc848cfdca51614c942a02bd24dfb83c30a45d114844861d9a365535cf158fd67fbe0c6d0ee0ab134
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5728d771a6b1e6f103fc7d54a9d73ba93
SHA156f0ff755d1c37ad146844338494710db25ef717
SHA256ecc3713beffa163779105c9ed34df560ba0fd7ed22a815680721f0d4c58951fd
SHA512f99343ba7faabdf276d1e423de65649d3544f49dc68f8181eca7990f08819e54c56e0ed7a7feefb8a71aef40e7fced03d064d6eed85094dc747ece626941b439
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc043f200c13a56abe38aa5e0e0d4c58
SHA1046b89aff5f1e1c67034298c4d9d4910597af4e4
SHA256d905f17d7acaca24731f94b70997d5625d6ba8f9aed523713eb60e68d03b70c4
SHA512d32c74414a25a00087529396a8a1510fda21842f0b3652d08b03f87e4246c8bc14439ba2be159f42b39efa5b01fb6df382012f438d43854e31ee02f2a3f239ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58066c06ee52ca38f5fc2b74ae4b6a28e
SHA16c90753a02b508aaa2bf37852500b0c81455e8e6
SHA2568e3f18e0bb37499363b9d0d7b0b0a45c7aaf283e02fbb94bf7be28b18e3a19d3
SHA512f895855f2f97ba6f8aa98f1aa015d5cd63423c1cae1b0ae53cfa85ccfdd37c4ef012c3eb3e9ed099e0d7b6800a05785c2a56085e28da0bb5e640f0bace912f5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557d792f0c3b1ab8cd5ebb28c01101ced
SHA1e05e776ea197879eaee65b0b73dc9ecac4c226ef
SHA256f823dd5bfa5578442a758afc280511e6001e3fdfd05ef1e0e3c367a14ef7875f
SHA512b5005a37ad165a17f51453a901da2a0c726fb8be6d20477c7c9bcce964dc52787619a3b08be75448d9b9fe66cda141b8fad5285aa2193211bc60e69cd53cfcab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510fd72633f1a6e662ef2dbb3478770a7
SHA1a5281e7c9f63d7cd708adda88559c80484cd1d66
SHA25623308ec8daf51d9f77b06c3261230ccb96a1600aa558c7abef2caa2d2cb506c5
SHA51234045d17a47516699b29f691ed4b36188d98846e1b4c6ec19a70cbf29257f675b7e44e587c1c4e7cb631d1fcda833a4ac8c686d39f2045b6d81b30e5cac4274d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9071ed974494c4fdaf080ffb20747ff
SHA1b87313f5cb9ada19a71c2f350499d0d179cb5033
SHA2565440a99bdbba784ec22fa235c76cf294c9b71ccab3016b29f47bdd95ca71765d
SHA512622ba69e94d3c768aeb1fcf8370ea6386ac974e03e9e81a5fc2d997a0a88a5ef1ff0c57720a45bfcb2b65b60572a69fd7a7e117669b51f35265191dacf558539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6fd3a3661dee25f3f2ee9b3bfd16625
SHA165b70cec8ca6da516bfac404c7907539389678e7
SHA2562962d6efe60b166074b5c61d30ce013c28438e7c8df705ed791dc9150634f02d
SHA512d1a1037a02226abaddce2754a9fd8b7af506f0c0599b53284175146410e3b78a643bb7107929ed85d0274c431bf6085cd6d378ef3b36ef067f15529bffb982ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb461291c40e26edc1923cdb1e72e306
SHA125b17d2342375d1845b7722f38925e8d25d427fb
SHA256bc4b2f9ea80d39800ee5ff86f2ac20375febd45177f118e76a73a8e003ab80ea
SHA512eea65c3686c676dca45756d390556f8fe095000d33e6a3270ba2ed09aff41bb89ef41247511bc11510fcd222d897764c40033801cfbf5e19f32192d5d5686e68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecca2b12aa1012433133a3b99f0776fd
SHA1db2681def8cef6ef15c2ff493dfade6a46b7e901
SHA2567d498e63af88c23f21fe0f794efa5d39afa14d77e2fb9455294f00e8f6678615
SHA512ae588844b291f2c60a562595ce500df7d699ae27d17038ffd52d2c7ae4ca4abf12ef90e143f24b630224eced09aeab8972084cfcae108644332ea6a92fe2d431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbed878b741a34a1b0cd8c999e7fa92f
SHA1cbc4758b4e8531d2bab62b294eb0866a781c6ae6
SHA2560ff8702ef7b2f53431a24e3ce55526419221d250fe13a430ea2800e6dd8113ca
SHA51294dd400a723d7fed4611ecf7e9a90f652b9afd46adafa3d6e359df33271f8c253b365b523cbf08eea2ba32596de9703ccca7fc8cfb35ec1c19d419561444a6cf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b