Analysis
-
max time kernel
120s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 23:46
Static task
static1
Behavioral task
behavioral1
Sample
b989eaef57702183d4d9cce61fd8cdda_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b989eaef57702183d4d9cce61fd8cdda_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b989eaef57702183d4d9cce61fd8cdda_JaffaCakes118.html
-
Size
1KB
-
MD5
b989eaef57702183d4d9cce61fd8cdda
-
SHA1
389dba2f5125ecf44a81f916ba8fd977a9db2e86
-
SHA256
5da345895d7e3b4a0e622fb37d85924de4609ed2200d49434c5d920f9c7b3c0f
-
SHA512
eb20e4281084d3ff036c7512a7d4d7fb911e90d3d029e75438d47f5963d79da52073ca1b989a609c0c791fa8e3c8c274ca780e0e46a7d59399df0bc1cb70f8d8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BB4E4B51-60E0-11EF-BFD1-6A8D92A4B8D0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0016fd91edf4da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000f6c7a4a80065b5a11632e3efd9dea30ec870cf7fc18ac0ff9241ee4f40ffc30f000000000e800000000200002000000033270d3a06450a61133e242b634499e09a9042a923ec5a20de923acbe4ec0ae92000000067149caa544a71f5c1044380753c74a31013b5652303e23bd8501e0d4faee3324000000004bb83e3093523294b232369adccbe879f1ccdb9803a7f18c8f52b100b6e9ce974af00ab328e95f44fae4532461e538ea8cabd7001aa2eab29319075c3b4ea43 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430532250" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2312 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2312 iexplore.exe 2312 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2748 2312 iexplore.exe 31 PID 2312 wrote to memory of 2748 2312 iexplore.exe 31 PID 2312 wrote to memory of 2748 2312 iexplore.exe 31 PID 2312 wrote to memory of 2748 2312 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b989eaef57702183d4d9cce61fd8cdda_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2312 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54234d4fe754424bc743247ab9fef8b85
SHA1cc303c08ec9af9161b44040d23e0feb9e9ecb8f7
SHA256b07621aefbabf02663c11bd3141838f5814be26d3b6b43762b24a0840e73dcda
SHA512a70ad8e700cae049ef135ba92f2e5a97196218ebbc70981ad8c80348ac1aae08d4dc1c32cb2d41008c4c8480f5732ffcfb92d6adb856c2f024b4b5b8c341c6a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59c812b7491fc49665beecf03179a951a
SHA17039a9e80ba00fc22fe784f4b73994e2ca3fc909
SHA256494a256ab676d63e6feb4f75cbae0ef897134cc1b355905d9498528de1abb876
SHA5129fb8da976a9709fd2d1db4bb8c6e9e39e53977cf26fd5e691f143db021d57362ca1f5ae9ea6755ccbd112705ef91560c9d22248b26d243a1deb3fe36168cdb82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5808e32df19e2fe2d290b5c0b144bd171
SHA16a08cf98603e14af130771c606be6d35ec590309
SHA2561ef81f119c7de5f830c73ef5a92284fcb2d83432c7e8becbac13180e3cbb929e
SHA51205ba5d74c0228f3f47f034a7bc3a86431dcf64ad946c80f2843941904d00b404051084f33c45fc7c0cd11e3e1ed5ae2c917ce23fc42bc8301d6717db64b621c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD588a3f3eb46825cfb88b77ef5259acd6d
SHA1d3ef697fde3dcd37a122e4609d239a6e1ad5af88
SHA256008db40990dba4f0370f844a973fb75d69cb4b865626799c043f4ad7cde89fff
SHA5125bdbcc87edf6f1484b396d18a449f6b76b2566b12e5df1f60c99c8063f57a5580956242bfdce5b6e50fd98ccfc91007fc5a6f99561eb9c2b3c15774d6d0399f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD500d455b76d6b739e9b6c53e68fc7e393
SHA1e785f4fa84b4e431b856bc6e14f0fee3a11b9c54
SHA256d7f19d26490d75af28ae29b7917b32c2b99eaf99370bf65f2e1afa596325b2db
SHA512e95ac38b6795fda5a3049029e9d7880916bab64b43bc53642fc4f4f9136c0394c22d8012bf07644256449a0678c8c2dd729cc7815745129a1b75c1a1860e2a98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD588aaa1e68928fd7d3a5a5b279e482963
SHA1483deeaefc0a5a0f5371eb706c9b3ab25be4bc59
SHA256a87d814d130893f69bc07ce7e9b7ac12064463aa30cd405be55a3b53c01fc3c6
SHA51289734fd870392997a84502d7f639dc55cb5ba10f624b130b2ea79aa141f3b05bcc6ce0236d8199cd945c558688eac2b535fd23697d54970763d542f08d70d41a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57244f0aeb1d2c823e3081b45532418e8
SHA1d40a20d828322cf6b64e5f3777b7d4a87f84733d
SHA256fc5777889223f724978ad3ad2c00a446a5efd8aa1972f33fae24371d1b426105
SHA5125d982db6ff11006824abf00232acb34131ea4387de77d647460f3804beb3e889d6412e373d050a3cc2f99be94aea593013f0201ec883cc770b0963cb45b2fcb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b8367cc393c7dfb330a4aeeb1680e5d9
SHA125ab76340ddb4d38a0e2513c7efdd5fd14b48b2d
SHA256aa3dc7e6a10fbb8afc10b4ca68771f0043c864811d56629a236e0e270b953aae
SHA51294c07401548031171f3c78e0d11d37c97fce7f0f535ae8dc71ff9c40af1ad6975de722fa1c02549db574969246e461ef3e3ef8e7ec6e4139aecade6624c54267
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD571406bc69689082a21417bfc943daf49
SHA14c98be85fb246ee6ad8646874cc9df0d3a53e8b0
SHA256e8f222a8eabb0ba68deda6e7ce548bcfdbac8165cc662bdfbc35beb980ac5c10
SHA512e0e0e5ef48553cc99a737f66b92e39c6e808cb070641908d7e3d4559a7211fbfbb3dc712a28f5bac9cc2f751b47e32b1e11b00509c7b267acd8b285e4380d100
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f2a0bfed13911f6ac0ac5fff3e1caca0
SHA1e2084f346d8332a4dadbdaa010bb2cd4d3c3ec2f
SHA2560d500db1edd8952fa6817e41a1d8e22aca76d3dca6fd696bf52a60dca3b6d806
SHA512f6d656b46374cfac3510bc4ae8d439da1e333aee6331f48e048ada8a8e595f93f66dfd7b83f6f809db0ef2b24553ba7b91a7068a5845a53f72e8d1036663db1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51130994f8870c95c80adfd0d03d3c280
SHA169774c618d5ccbfd1781f7157136d36c8a59a8a8
SHA256031fd0baa26c296baae428a9ddedf2a286b5445fc61762aacf4257a5e58f7d49
SHA5124c08c58cbb2c153e8dbdcd2ab4b8194bfe4065edb3b4a54dc0bfa9d66c6a2119eebb9c18546aa8bc67fc9cfef45919cc9ce4b4345920dc67f9ac1f552886f30f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51dd481d997f952563c33f1b6f69741ec
SHA1edc6f4270eebb05da850d5b3a105d60b62e27ca1
SHA256a8acbc2d1b17fd4351cb39ea4c83a88b0e617d7d602af05e3bebe8bd4129f55b
SHA51257057931ba063cd7869cb633676e5eba9331a4d32f290becff8c9604dd1dc6aeff9b0bcfad3cc9e64c7784552f0b70433f9459e6b11176cf58f9f76c17573433
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c8fc73163a69366ebaaefff482325691
SHA140a96f515a97e4a4d21c00e9aa451022b0a2815b
SHA256a5a65983180f63afe75f6b5bbbd3e716662435ab812b55031958f3e0180811e9
SHA512ae352f9c9bf7f906243face128a3b3c528b831e2dbd3a7a622e18b61729b8dabd7bd3e03b922b6233ebf393b33c7589f0e1fc30c8cd723a03010c1030dc7ed53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b927c2eef3be9c7f7aeab66489299d5c
SHA1970d60d25cd342e60930e38e23bea38f8d4b4cf4
SHA256f71cf681920ce44f77ed642d69667011455ede0c648795340f20143b287d05fa
SHA512346e8681f299fbfc72b39aff6c45933a9d79d8930abc63bf74766c0db06e7fe9ecedc881d7edd2b740ee63a19a32b6ba0fee94958090ef93639315abe7aa06f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD524bd52a84d4740aec56e889a76cd5877
SHA196c27dbb5366d5b1c21aeb18e865685a929d40ed
SHA2567662b8c581f23fb33e6dfe34a26e55cbe6717e1d8ae5c983f99a50ecdd2593c2
SHA5129c343fe001ed11ce019730ab28e9cd06d0ee00f45cc9fa3a6261477713e5f35b2dc2b5e4f8aa2e6fd7d904a1d6441b6a1fcb73d6a335052494659c269b0b76ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5820d958d2bb7244529ac5d05a6c1a6c8
SHA1ad906c482b326955f4ff7e0a943fcda39d0970cc
SHA25630098d86aab92ffa82206f2983cdc8aff5647c1e4e95cc943eb3ac5c615e4077
SHA512b1eb3e33342f09c3d6dcccde798fdf8e9b18f503e7423f092fd890a7b1a208a07a40cafe5d031d5e201881192c96b74c1e0e5869d774da79c79c9d54877bc2ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5aeb597f5399d5569972c50cbee80a344
SHA1b0d70c3579d1922a6ecbcacda92e09497ab0eabf
SHA2561f56a3d21341e2167cee77312f24d2c31bba03c3ee7aba9f694147bd4024adea
SHA512dc14bf63589f05288eed4ce93db0a0cd6f90f4571922cb1defa4e9e56101d3a08eb87c8456099da615d4016c114e9e254679997f9fc674634447d09bc3316430
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57d6c1357a0ce9630ae5f76dffc6aede4
SHA1dc3f8ec651a6217d5957a3a64488beb7f211ff90
SHA2566f700a17fc9e2321e9d2ffbe0f7199a7cfa3747c363901f2a7d44d8d902a7444
SHA512b09b682eb985254b188c834282c2a7b435d1ded9dd2eda8fc4bd73bc246f4425b47a0db4d730ac69ed478ac25c45caa2e1e39d3b3bbd035c7c35d6ef4051cf8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ddca3a115a7883dfd0ee0524ed5f2337
SHA1bd6a051655eee92207ddf24b56ce96fae9ede219
SHA25642f13784a1b6114054fd57c7f7473576594b01a7c4091ee68e350279226e1716
SHA51286101fddc0b2af6401f39601482c25732a7cad351d4ccdc29bb83f1daac2f798bd43b4125967fd8686ea8aabd00c7deb8d5e4fa90a251916b6c96fed9210292a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b