Analysis
-
max time kernel
136s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 19:10
Static task
static1
Behavioral task
behavioral1
Sample
b4af61ec34f9611a8cd68f76b6fe385b_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b4af61ec34f9611a8cd68f76b6fe385b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b4af61ec34f9611a8cd68f76b6fe385b_JaffaCakes118.html
-
Size
122KB
-
MD5
b4af61ec34f9611a8cd68f76b6fe385b
-
SHA1
e577f5f237076187a72acfa0b627dbbb0a9f85a0
-
SHA256
50fb21f5dbf0c58608b18bf399b7f2abae54f9c5fe13221234d9c0a9d3cabda6
-
SHA512
dd210400ca82af346a04e828025a679808ee911b4a234d764b874406d29ddf9aa3b447f8e792c87d102cac8a912079b7b22eaec2792b26634ff896832b91dc89
-
SSDEEP
1536:WJDMiM0J1jpXvgOcMHDMNKouF1072s6sYN:uM/0JfDHT47kN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430429329" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c091d716fef3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{17E465C1-5FF1-11EF-BFD1-6A8D92A4B8D0} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c000000000200000000001066000000010000200000003a1e888a150b109997db292e49b90a60a6a951b66050b7faf9b89714f77fdc15000000000e800000000200002000000042d1b2ea720a2c298062a2cfcba3ba25e4d23de8dcfabfff15bc78e06600d92f20000000dead6e53dccbdda2a0b9a601d89ac95c71f4b8d3f551ca3246ef9ba8482f6fc540000000dd17fa693cedca8f058f72f7dc8a4aa3707fd5794197f56c815cec0c9c40255ae89b7a3775072a8966aee0d5ce7d17a8439798d97af991ec2adffa26f664a228 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2312 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2312 iexplore.exe 2312 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2748 2312 iexplore.exe 31 PID 2312 wrote to memory of 2748 2312 iexplore.exe 31 PID 2312 wrote to memory of 2748 2312 iexplore.exe 31 PID 2312 wrote to memory of 2748 2312 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b4af61ec34f9611a8cd68f76b6fe385b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2312 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5133d78fedcfe632ca6c7c14dd6e2d45f
SHA1a5a00aeaf3ff36b49a7c81c8663954196c635756
SHA256ccce42b4601a06f9796f5b3b6b0eec0ba806e833f05c28490f4101cbe5e1a67e
SHA512fa179c371989b21aa680be0a52595fc415a4212c0e523ebb1495394a4f116ffd884414c83b22e247169eb9cdd55f4f33ee96ad46c61f698c3dd530de04e87bf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f0f9535cd1fb26f2be1f636df5d23e41
SHA15dd73730c0043e2aaa932e540c7c9fa3cf6e7bf2
SHA25674961261048d2e501a3a108341c11273c5f7038aa1a96359bf4d12f0b9080ebb
SHA512b7899b339e3c534095d06423a332e9c7e2aea3012706b6c5c95685242338fb2fd1a62982223adbb730cef44827065ac52adbb2a70407218f0ee68371e21e6adb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cabeef1f87cffcceaf18dba38fe96420
SHA17fce13b3b65742d3e4cc9b9004bdc0ee3a06e89a
SHA25605c76d782bfd38c4cfeeaacee4599eb231ec1bd7b4df84afc0c4941211463824
SHA512f80552a186010ca87d5c5a8710dcd5e82ce915a5de88043a4fb80c49d7316089eef2cb4c6449c46d7e5738bb04e6fba556e2749032614447cbf377e1f39f88fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50749884f3b4b6282a1adbffe47f02f1f
SHA14d5a6d43a4b6338754ff08164c72619cab905bb7
SHA256bc7a15505de60a5a51e5f8d7eb0ba50f447428699ac2e87977d177577e203029
SHA512fde95df31a547c7f1aca16378f040b1c3b96646505151cb01943eac119d46becd75dc9ce251ed37019e052f022a9baceda54f3abc4e357ef5f4245b32bf931be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cc10d739bfecc508a6eaccc94b8af814
SHA154ef3f682bce1b6519b1651970f6f2c23e18a9b2
SHA2567d4c9a32ad3dd3193d2a0d0fdde7917ccf4221a5f983ec33cc1fdbd0ac8e2a06
SHA5129cb18175f1d2c494c153362d87fdfd522ac881b27a43d0eff5f99eb3f9f24cc2bc9f2f29d27b92fee53a5680d799c56e27f1a1cf4d575447cde6b89302c08557
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51c89510d98d489cb4b3b992ee0ba76b9
SHA1b5e9e1230f19bf99512bed4f970af8b8583c3c65
SHA256179dea2768c1ad177b01340009640d430049257e8ccab7be891df15bb1f05aff
SHA512c7b724b3870a661eebbcc3b26cd84a235da08901ab478f7684213f14d4ecd4b09b5eeff26508e890d61b7ac509212bf3ca14436d909c03852a379cb72b4969e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e492c2cdfb1c08db1d6047847c0d72fb
SHA17334d4a01f2f353f41dfd22bf15e5775de0d0844
SHA25656e51adbc8ffffff1663e2641363719c0c69083f04ea49061579c528d4d44697
SHA5128032d60b9daff7db99384bb0cc871ed1a96e2b2b18ee025ce0e53be1bee203bc400e91127752a9dea10f281be7f045a0846fa3451fe66b5c920196b2c4a16292
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD597423cf9dd74b4285f6f10ee444f3db7
SHA10f45b47d24d706efc7644edbfc46e8b6e9a3e83b
SHA25651b6da1922eeaf071ad5240849b31a92d60129afa1400cbefe2ae0d00eb9097f
SHA512d4e8459115010ecc7b76e8a9920f1fd7d3106ae7b23fcfef9f6d021b24b38bc7f77fd9ffdb709c2be0c7a06d084f92c0ae7577c0789f5fdbc0caabb3c87f6953
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c63be1fd815ac5e7f88c09c1489381e6
SHA17c420e9eb6f353112c38887efd1de872044f3193
SHA256752933e97dfdd22c5960f78fa087c80d956c606971275dba0df1674d22589e02
SHA5127fac382da018c034babb8f9ac0346548ba17c3ab20bf99645c2753b718626c7f3d02614e8091ef8040e5e6dc22251015ad13f432d461ef2c0f3aeff96637e2ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51fa2945a3f265a85dff7d2f2bccbeb0d
SHA1fd581b5cf43f6c89022e0b97387a820ceef08b26
SHA2563f361fac7ebd2edfb856ad19a34f093550a4acc0c399be8c326e30ddf72585e4
SHA51256637540fb389cf09625dd22f26ae78a2b50e39018d25ceb84cf3c79592b99c9f6b44438922ef9b6d5dbfb6eca896da52dc367eaf4896f9059250b230f43e2ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e16368765621fe44b11f71fc5a9c55be
SHA1333bef09651f6fa358a20bc3b3728394536107b9
SHA256ca74e999dd1ce6cdced570f3fc3d586ba1279d7b4adfd2bcca80e89591a3687a
SHA512a8b48ec6a35df9a6efaf48c7c8a1ac765b1de03e7354662fe1ffd3f97f8187617bd8eebb288deb8a06df84f3160562c52168cd4bb053110fb06b7d886142668d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD561af3dbfba718ca3747501cf1edcad52
SHA1013225eb15e353d134b341de5d70efc24c2f4e76
SHA2562fbd64a2aa8c4bfb5a4f8d2f6304c63c7553042dc2994d9b12dee1b4b7d5697e
SHA512e36443abdd02b83dbe0d25e5fa47e20d310d58b7d7cc7f6549fdacba2e123d26452aa87a79783b9aeb7562ed0a241100862257c4dbaea57af1c67875024e191d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a989c70378eb6f6be35df388411cdce4
SHA1c79932023bf9822c1b209578df60af5a56ce1ad1
SHA2569dd789c9fbb3df875ff72090408a404c087e793605f5b3664f0c1bdc2cf1db59
SHA512745ad6602d577c883ca8465613716860dfd7733143ef29e0a5ea78f2d77161371f18f286fc211ea307e59ac36fc7bf52fba1d8f453168026f491b71f9e471921
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b