Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21-08-2024 16:42
Static task
static1
Behavioral task
behavioral1
Sample
b43b294bf598d41d2640d828fe77da43_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b43b294bf598d41d2640d828fe77da43_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b43b294bf598d41d2640d828fe77da43_JaffaCakes118.html
-
Size
9KB
-
MD5
b43b294bf598d41d2640d828fe77da43
-
SHA1
d877653f58b173387b6de376431d52930cb9e6e7
-
SHA256
769f54c144390a2549bf5e36fa1ed8d526bf4ff2fdf530c550d991f0e64d7a9b
-
SHA512
d909c3442af4eb53b0d485e1f3e61f014f581ce9ccd6c00ee56abf0d7020099d231a40db775390aaa7b0985824602ee40ed75ee889ff6f52cd29dff70f146970
-
SSDEEP
96:uzVs+ux7oLLLY1k9o84d12ef7CSTUOGT/k3qp2lVHcEZ7ru7f:csz7oLAYS/TA2PHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6AF0C2F1-5FDC-11EF-B798-7A3ECDA2562B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430420445" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000072065cfef35b47f859df0b1783e4d60c6acefca86c23b158c672e6f321eec9ca000000000e8000000002000020000000a4bea359e091d6742cf185ea1e038ab4ffe570c64881e29a14d0e66a6d62800620000000a9be703042c0feda3e7229be1f8179b66fb1bec7e9ac381020bd9fb479dbbd9440000000c89f4e658cce61e0e25090b5c2d4ed6d54ae3e222b575ea1bc101219e5c0a272ff6c9364f292dfd88984825abc59d63a6be471638de6890ad33aec56aa47d85b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b00f7c41e9f3da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2304 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2304 iexplore.exe 2304 iexplore.exe 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2284 2304 iexplore.exe 30 PID 2304 wrote to memory of 2284 2304 iexplore.exe 30 PID 2304 wrote to memory of 2284 2304 iexplore.exe 30 PID 2304 wrote to memory of 2284 2304 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b43b294bf598d41d2640d828fe77da43_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2304 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b3250fec1f7577073803b70efaad37c
SHA1ff5f2e2e5d46b90c37f0876015b33ead8a667e12
SHA256f3d32915e368b94c1fde2dc46923c3422c7f2e8de09d96dcbafcfe7b36368754
SHA51294d449c8060aae7b4211f6d1db19bd2195ca5f18f27c101c938960b3c405fbccaaafccf1b1fb8f25a8ced19199b50f466897a1c0edf4aaded29258704c9250cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571c1989378710efde52f2efb638c31c8
SHA111678290f4c03ecaf0852f7fd91af12712385616
SHA256d5fd172caff96093f42a626ce0f279a31b7afce1f2ef51a7ae3e78ed6ca77fb1
SHA512eecdb6e010638c6efaadb3070d580d5a6a6f9fd7f58aceb5ff81579a6d7e807a14c35909aa8cb6c33657d52bb57b056d3d6bc0d0104752ebfe589ad969c1a6c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50984c97de373ddbb39363c7a1d382ccf
SHA1e1b494326784e91cd894f0645e6144886838be03
SHA25656649ff23aa13896516f4ab91c345e4a03a47297649ec1165adcd0bc34c156e6
SHA51268608554d3e94ad7d0fe60e789ce8065fae5fa27e46db173829efe0b0c3da657a32a41fccaa628f94ac2857d08f25c371187ff3c953bbc7fb3bc989b957be220
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c60cd1ae720879aac18d1564ee44445
SHA1be18af12ea36e620f85e2a05ea0e16f3d93aed2e
SHA256599998518b49f5471e752c8c91a5a4f1d4d0dae2b6a84708977aa83957539ead
SHA5123f9d2b5a3924fd16db05dfb07e80b381bdef79a75a6158c50c658fa735183843cacf7ef616610ef7d8b8ca8d49b585be0d084cfa4d306e4b18dba9720745535d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540ef7144793cdd92a0791e63ad38161b
SHA14690c08f650c9b2115a20730d038bdaaac3e8576
SHA2568abe57f25c683cc546a26f6c2a1f87d6614664e91667426aa8abf28ee404e103
SHA5124da0523fb448002c036a99e423f159d1e9a08a33aa66a2d9f5de60e6ba877da053e8d1b3c85213543eb504caa9f9c406bb614289f7d7a255e9491ad4e4f30fb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575c3f1df095fae3bfc9366f165c4fd7d
SHA13a354d2e4704f19fcfaef807a115e49cbc90cac0
SHA2565d5673459aee17b8a3001f538e9308e2927d7f7ca1298d3e1478d89cd1b011e3
SHA51299a5201fa8b8d58649185b7179ec67cc3c34ec93eed6de5016a04bd23f10463dca50bd4d63099e2d8efbc3518076e16d2d99740d808a46bdfd38cb471c1ce201
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5082979230d644d785f95c2a267550798
SHA1065aae26615e3bdff6065e090859bd1a57d43061
SHA256b6239df193cab19e6f664540a0dec64ee72859b5afbd206744d2026bdca79420
SHA512b97cdc881a4d5185b7d483c967913cc000323a388f595766b35d0648f38820208067c77e8864b22e058274674dd6090db5818e6394ff6c069233d39ceaeb274c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5fb0a06e8cb72b9b0504b449bcac85a
SHA16beaff77aea7eb71b3ae0b6b0a8a06d2be1237db
SHA25675736ac786c02775857cccb37be23bd804116d20dfc811b2457b84d3603994dd
SHA512901f340a90081aabb1eb411c0dc094fd8c77f200d09387d3467415c364523e5a4f8a519a16336e7907c99a527c208d1628ab5e47f0a4bad0e6edd6080f3d8a33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524bae498825b15b7e15233fef3f9c172
SHA1bac526f8bb46beeed69befb6bf9e4f6155494231
SHA256bf072785d94b2748c0a4104ef5fbe68360b4e0e6415e6aa186c2e4bc015f8557
SHA5126c1168658d2e58bbae8b81455d25e2d7b56f0734d26212ad437bcbdec26f1d5e5661d27603c79256b3a27de31736521d019b1a0c60b2cf244c9133012e792cbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f93c8efaaf891f6f444a71bda1b4ec8b
SHA186b2fc4f5493b0f64519dbe6fed39f80e62074f4
SHA256da34aa43acce490134bfef86a5301f24937daea2324cd51b640c3b4d80ee36fb
SHA51299510e60b4c0655260cde16bd2be5706c46fdaeb029304c173723d2c6f283d130f29174132726af069762f177283a79745c7807676842a00439fc82b77627b4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f8d745d6aec96246aff30bb4242eb02
SHA174d3a03ede06026877c4ef4802d036a21108b82d
SHA2564f44cf6d28285f160e151b1802668f0c14cd77e830632be620e02436fd9c8101
SHA512f0e4144ff12663d1c2355f5db4e524f223fed1e5c4b9314e5d70e369510e4394ded95e0ba37c9c84768ae171c6c9608e84d3510cf4048e3fa287942c917f710c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5278d7d5cf3a5510b413f4a5ecfe639fd
SHA1ac1fbbf12e96ac79bf478adbfba420026c1b64a1
SHA25693d8e130050ee86a7a18c2e5c81a43a779724bc9e7f30924f10be40ccbd367e7
SHA512cfcce3e9bcdadc93893c37d16f460caddab8d17ea04da6c477dd4595b49aed165ecccda18041708a58bc83f55e792658a9bba34a28e52e9f485417813941aa9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589f9aaea88ffd3ca8e2d7b097a003008
SHA166012a08fb05934aa7f90161730a08672cca1a10
SHA256b260cd60b5ec60adbf2ced99a15d29769a9de494e0b446b024d874955107e73c
SHA512b1216c3ceb4c5b9ccfb64a5676a4162b5f079a9e755707d2cb93cc871c61a42c516ac0f9147d7c2cc73eb88aa67a8e5919b97848f23f0ac87c19ae8d95744747
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f13aeff4b5570a0dec7d1628e0212ad
SHA1aa6462d568f56fac704bd5b2b5828c380bdb69db
SHA2560d54723b0a9ada28c3e3e8b4ccb4f991a740db2443f6021f25017ebc45be84fe
SHA5126942a037c13916c849bfb9f1aa235bfb61e356773c090db104e15c7e43fd86e67522958a0b2f4526d17b95d9d9a1cfd4d1059d1e962a0679137592ddd3e77a55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571dda81424e5b59bdeb838ae7a743c7f
SHA13523249db5aabc590283ba302d3b8fbe2fe343ba
SHA256456fcc2d32e071cf14cc6c137b931ffa77e210e85c7d1370d92c1fa05465d032
SHA51200a5b60e8d7b7f8e533409426267dc9504f92807b816e533f9c1a7fbd9599a28c91abf07334e89bb0e746c5ecea7309184bf493ee5d491106a6e8ef920d1e4a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f020071997bfca6095a5cd689d7d017e
SHA16531c71e58e22fafee6a806f15255be68d31947a
SHA2562843c4359e7b1087e0086fcab57b7da2d79a66aa7d4f8f93079d20b183219227
SHA5121c3e5d06062e695590c618296aa95648ada62955a4e884ea2efaee83349568a3cd34f1ea09bb735b89ad5637cd6bc72a8596472ff0355a6073571abb2201af67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a13653f91deabd0ec3351bf5a998897a
SHA1a218bbdd05e5af9c273f18190d8e2d2fdff2590f
SHA256f918893445a2cfaa5c198115db9c04ff588762a772c425c20bb2d969bd618a6f
SHA512ad9bc9d5fcd978865cc76cf2f42f9a6bc418005c73748d14516efd0ff624687050c8cb8560275bc939913f16af9688a01d24c0c64488c76cb04fce74fb917416
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e10938bffcc5273720c4360ce40b0e4b
SHA14f11ec0cefb025afd14ea7497699d31038b1c871
SHA256b1bb650a27cf4a195bdd80a589eeb18820c0352f8a9c9abf0653e155722e598d
SHA512f596c293f8527ecb6d205bf661c82c1cce4567610c5ef02f23291a1b2ba2971119da5a1bee461e768e087f4e7d4ac30d3488ebc3e22a9fbbec5b1ef905da8af3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b