Analysis
-
max time kernel
135s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 15:31
Static task
static1
Behavioral task
behavioral1
Sample
b405b0c4b2fba26321076db5373c9885_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b405b0c4b2fba26321076db5373c9885_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b405b0c4b2fba26321076db5373c9885_JaffaCakes118.html
-
Size
53KB
-
MD5
b405b0c4b2fba26321076db5373c9885
-
SHA1
a4f8621a10a8dd8cbf2731b210dc7d1935935f7c
-
SHA256
152052bf4da19e5f2e0f1c7aab1a3b32d00c3e64049e4857751034351a78650a
-
SHA512
da38cca4a4df97ca66fae0226fb7346e12a84a35c795c01d4d74c1d55b7c9f59c3f0b3f61d5ec473c060ac9f1f10456bcb33db7ae9538c045d32439ab3a9be1b
-
SSDEEP
1536:CkgUiIakTqGivi+PyUDrunlYo63Nj+q5VyvR0w2AzTICbbBoZ/t9M/dNwIUEDmD4:CkgUiIakTqGivi+PyUDrunlYo63Nj+qm
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{88352D61-5FD2-11EF-A69A-C2666C5B6023} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000004813053024bcffdf1490227fcc81cca11d06ddd0e12b2b6b3199eab13e52df28000000000e800000000200002000000003aa52fdfed378a9201de241c3b4364127bc80bff4596745f9fdce0de6fac91d2000000016c9de7ea7bacfd9e25d484346aced87dab389899665bb51d44fc7155cb9711940000000376d34b6a85812425893c644ea7ab78b59ee690d72969ab23c261fffa4e0dedbf8498bd7f0535d3a5045a68c2a29d27ce681a398779d83c762632997b7840271 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00b96a5edff3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430416199" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2080 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2080 iexplore.exe 2080 iexplore.exe 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2144 2080 iexplore.exe 30 PID 2080 wrote to memory of 2144 2080 iexplore.exe 30 PID 2080 wrote to memory of 2144 2080 iexplore.exe 30 PID 2080 wrote to memory of 2144 2080 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b405b0c4b2fba26321076db5373c9885_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fc8432d4d0a43e114adde24b65af601
SHA11ecb3a925bf39b797caf0abdf8a511e4018e6cd6
SHA2561679e608bcd1531fa7f4974b551e275c27b3d0d517da061c96e5a3ebf55d63f5
SHA51273abb83464d011fcaf755d7bc47b8e38b50b92a6b94dc7f1b58d833d4a0c17829f4872aedaafd6aff22046ce47ae61bc9956f3aed4ddf20ca9e4ae2acf2ec97e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514fcfa42d2baef7bcb343a08bf38bdde
SHA14ff77a2b64395b017908dadb6e60412c4241bfd1
SHA256ffc09a8337acc1c4d9b36d9fada4fc5f87451bb59606d44fb9728f10a2b4a74e
SHA51294281de32d7a3ba0bfa40ce1b246c2ff2520d4e31a51c825a727259845566c90101cd3da88912182bd0a81bf36b9da5eb823ff03b1ef977121fdde97067f8649
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571d1817112fa7018cfdaabdbd388d631
SHA13733a25f2d98bfdc32b351a8bdb53cb27bf99ee4
SHA25669e65d2bdeaf36014763057a9f948d2783c4a2cc5c684df0187a225a2dc19215
SHA5128191a4a94748275aaff378dd7d934f527c044b4d57726c29f49205bb03149435e23cf1debae067880da5a9829639537bd0f6fd6b590b6cdec45d5260b60669d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5872c5d35f7fbf5e578978672c92e55cd
SHA1892c57543e1a946c340654475efbc4ea65a7e437
SHA25682254eed2c2ce9ce118d0c97910a2bc88c641fea2de4a7614f10c76e736fba43
SHA512e245ae1b3618ad8193615b061f1c7c933fe85fcda8bfc1bb5da443d2718f14d9bed6189d46a65a9efb268e7373748bb49dbb525dd07982d04164dc3515c670c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c6f07e0804ceedbb1763ffa5fd3c7f3
SHA173677839773a31312b87c770ae7b0690be59ce41
SHA256887dc324be95bd66b2bedeca9e1ab876ae8b3707871aa2bcb770ba49445f6583
SHA5128b0380eb580b53043f87e51b19ceeeea8bdad414d1617655fa571185401afc445231c085def26b33733d9e00f15e0489c0608eddbc593723fe53b0a346edb7e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f8a01537b60544d9c159a31d7c1a54e
SHA19fad074b02268a00fe7cf18dfbbdbe89a9556763
SHA256cfa58ba8b6428c13fa668a33014d89339e990cba420bded8120a3e15fe6f52c2
SHA512d87440c6d80d232f7aaf26e53df11208f7d5182ba70405c3dfb3232dc7ea0bb18ab00f4b7f24661336b6676d7230cbd0057e2db90691a070fc7d5ed7803c0125
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5484350636e6f5b9ecf34724d1d97f4d1
SHA1d4e7f073cf40a160c8cbe602005e63f420752d0d
SHA2565b3c88691314bf03fd62ff042599d9c50f266c3732c8f60c78f8d4e746d199d7
SHA512cddea36337cf07baa7a8870a68b4b9a95fa4597cf9d5d19379d48a9d604aec4cf0fadaae3c4b506c3b689254830bf2e7aa0a2bec3211f233021101c4ae313127
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c67a1c7a92d1d0456002d1b369336d7
SHA1091de42d25a90dadece98b117b9c536d338d60a1
SHA256c435de88d55314f7e637e315d9cac0ed5432557b1182f3c024f89270965c9b31
SHA5125fa049e52c543b66585f34ca8c32ac4792e5bfd7d92d0632475b21c78a0d823fdccac5e02285a19ba58b1b67f58e01c8e61e907ad16cf56f1019924d919aa7c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d81ce39a6a415dc96bc44c43e93cf19b
SHA1d0ae92c3a410a42770fb80be5abfed08c2fb7940
SHA256f2610e870c2dbc5e78e0ef0e7325b8a6a650c72b4207684694a2431a161875a4
SHA5121c9da5c2b81076b74178d70ffbfe4626d40f5cd13c4e77b88080e35c0092fae614d2b4d97f38aaefa43ba16a7725f1d825999cc0ab0e44aabda7503b798f52b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b303d83d47a1673a0009e021eaa23ce7
SHA1dcadab153aab92de8b424ec9f40e1f99c3c99f05
SHA256adebf6d4a34d7d4d451c4babb1d90c4fb274de5938b57d5fb955f684870e5d9d
SHA512016e416887a37c9dbe31df7280326d85beb343cc96f79b5ad7785a1f356832e35245263e2294946a17f1bffa121591e05be142d4305370d446056504f96ce01d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57054663186eb1aeb9fc42dada20b6b56
SHA1ceb06d8ba938ada8707f84ac97cc2b5faef51550
SHA2569f6d519db5f0a0b66d4ce208224c13d55756a439689b95b60d718d7954bd31cc
SHA5121a295a58bf9d26af26ebb1f8f41948bfe8bb1da7fbcadb15692573d2bebe889770463dffd99fad7603c10840ee2ef2928aacfe657533fd78ad68f5e01b8b8a28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544cde90bc1598ce18c16e5f75abefdf8
SHA1e4d57f851cbf88d92c8ab23e0f05cb327cc20b7e
SHA256836def7b397ddfcc823697a3ac2579111a674c09c2df3af17d4630ca34a1cad1
SHA5123cef8fc75dc69fda52da70d1f757d667d0cf356f80ea907822003a4cb89bc48bfdbec3dbafb4e92cdbf38a9a35df36a62b72a0d5b5effc136199c2c121c4f258
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7beaa23b011b561f38789073fc291d6
SHA1d2de3b4b6ba78b101338615aaa922a1cf15dc2d1
SHA2560bbee069c3f43ca02a7b5b6cd9c0f42651bbc1ff6df00d47dfe113bbaee0a2b9
SHA512ba208f8c5e22bbf2630ef5994b2b0572df78c13f2f9a4ab9c2557778bdd1543d0c8b2e524e3f571a3d7121e26eb1a271b494e6de380dff365d8ed29d84f95cd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562b14d7cda16eb89635389003de61741
SHA1ca5096dc64d02d91b660d3c33cced2d3952f04e8
SHA2562b296f6ba6445d5a5fd36d89b044b1bf4cb7d26479e2f4169ce7f530d89fc60e
SHA512fba7f23fbe0d29f9c3fba149a3ee7f0c94b91f707ab21fd83db31c5c43676e618981b62f47731bd57ac29ce41405f98227b3c0bec572d13e6c8b022a7617c6f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d3f617745ad277b39da1d329d09344b
SHA150a5eb57ea0d3cff8ffebbdcbe876231fe9e7857
SHA256ad40626e2f166125e5a3629dff4f2244981ad8740a9d81dd725869f17d96f9e7
SHA512b577cc3aeb8fadf2efb57426870fba1ed380d109a9bc6c39c74fe1f8dcb666efec888a614a75cb26bc78af95645e7d8167b4b372e1218457bcfc54314b2015d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a87aab164bc1ca7f68748e54382e942e
SHA14d2b63ecbfa1af152965bb28cf43e774ae5df2ca
SHA2560f28791302208e70ab266960abde355a14d9980f3866ad115524bef4d09ce511
SHA5120be5072271f493939b0766c95a0fd8587325ee08ca3072349c45e13d4e218b7a0ea7c2c1fb49b6f8f5b8e2c7105f81d0a15288ab0e470467e3055edb346baa30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edcc660531ff2468b9a4bd0827b63322
SHA152711370df4488b58f5560ebdacb58583bfc6b35
SHA256c3b2e08317d3032ac053dcdde70231f09f8eac54bc5719038d2c1560cabbad7c
SHA512f6da20724da65c750160cc6f78a8920e5d6bfc24138b6dbe5aa51d93e05c8cecb07e4116aa000f9ced28c21a4e1691be57bcbc3cb030b3b792b9c215f5391627
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559ff4c0ff182cfb1b66779edf65c7e85
SHA1a0f04a6b6810cfb84080262727b0c78dc6047fa6
SHA25601f378bd66a23e24824cbde947ecde5ffc9280f2fee328a123f199d5a9123fd1
SHA5129c3c0774ed664e789602593319fd05ddf253bf4f08eccb5d41ae631aec3a618314760dd72d9e8ee18b4c34b62dd710efe91da4008e7009bb2abb0c3a8c265a0f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z7V06J7Q\print[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b