Analysis
-
max time kernel
137s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-08-2024 01:20
Static task
static1
Behavioral task
behavioral1
Sample
b5cd1a74622db75b59932105f8dac175_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b5cd1a74622db75b59932105f8dac175_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b5cd1a74622db75b59932105f8dac175_JaffaCakes118.html
-
Size
36KB
-
MD5
b5cd1a74622db75b59932105f8dac175
-
SHA1
78d1468e2eceeaac08cb0939224ec02e4c2eda25
-
SHA256
0dc6346fd6717369819dc92d0f00a2f9cac3a74056c81f746a7c38a1ac78d9f3
-
SHA512
af4183c626946972f55f24dc39551c3226ee56dbba92a07be266b59de340748bc7ba8d3b66d9e72b3f7733a1fe2159f3386ae240268f4d4e8e92c0b860e977f4
-
SSDEEP
768:9sIRIOITIwIgIiKZgNDfIwIGI5IVJ7SqIRIOITIwIgIiKZgNDfIwIGI5IVJ7SZRW:uIRIOITIwIgIiKZgNDfIwIGI5IVJ7SqB
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000036d219aab177c1afaef8e6880c442af01320376a5ef8ca3821ba232d7d10c88f000000000e8000000002000020000000f6fb2d3f54234cd11295eb83ea3afa7824c6924a159a3ee7044151503c2bf1d52000000075714652a7801767f79a533ca456346f8314bfe96062a5f46b477e0a431425c24000000056302dbbf014d135b5b09c4a6f22ed98b954d7d9153f482b73e8d8822203c1b5e443c2f3c19bd2455dbf3a7933ced1d1286c7f471a1550d0ff82c3600ceb2a57 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B894A831-6024-11EF-8E5A-6EB28AAB65BF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20cd249631f4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430451501" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2876 iexplore.exe 2876 iexplore.exe 2268 IEXPLORE.EXE 2268 IEXPLORE.EXE 2268 IEXPLORE.EXE 2268 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2268 2876 iexplore.exe 29 PID 2876 wrote to memory of 2268 2876 iexplore.exe 29 PID 2876 wrote to memory of 2268 2876 iexplore.exe 29 PID 2876 wrote to memory of 2268 2876 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b5cd1a74622db75b59932105f8dac175_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5117736e0640cdcde7a2654e559230a16
SHA135cb0cbd25b94070c8b2a25306e5e8a865a926a8
SHA2567f6d2c568d0454a4831f87d767f145c4ea9de0fb58f71b8051c04ff7216c42c5
SHA512bc4e19873220cfd3accc73f07c2b83163afc8453896cdb2758514cce50cb1ca3f873166d4c1adb1ed14f3476ef71e72173834e8dd24113ff669b3b1dcdc0b5e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594ea99bd6f2b224956b4c30694af7a3e
SHA1486ebd6036d39dc40870b88a05c64dd7e7cb8e1c
SHA25676e1db2fa9ed9050925525ac3f2f77d156f0669526d80368a84203b91c3dff23
SHA51270a4415ee15a608eefbaf67b88fa24e6f530c1f8e3fafc75303055dde701c6c4df1c9c15d6f978e9238385d3d471a83b68fdad86e4de28f029558fe331d29217
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c23b53b919df276dba4570d4a208fdbd
SHA1685bbe5d750a6b0ee76515f362b689e1a1f70452
SHA256a843425381a03cfcf597e3a157cfe361c38b7b25dd73d8329d292950ca7ecc96
SHA51282b21d53d0cd015d3cba5c4808da80215d69689ddb9e66d9e29da8fd856287b0c1f62f7b2deb8803c392613857daee5f6ae6db37e01744a52204949f6920114e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551dbfbbee3150b5cdd533670f9dc9a11
SHA107af7cbaa08581dc373dccba9fe602f6fe091e47
SHA256135ac39eda51410fb4d07f3772160146db45d9cbf161976cd3138af16be29c4f
SHA512fd1f5e7f3be4380382789401a5877eede66fbec6addfabe9ba632c5e99ad9d1344b6f234b0debdb954b472f7341dc2878a585b8a2607ec52c36928c09164c068
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530dcc2d71f38f0d9285303558acb6284
SHA1cbb39cecc4764da6826eaad05488427b3034867e
SHA256d06896eb3fc7dba7e3bf2fa71a6b8bcab3f5b411ee898c843fec10aaf69e4c5d
SHA5127e5955510d65f1b7a1021ffeedf069b7fbd86b2a1eebdb2889a724fb58e691172935affa5b0f0a7040dd5b7ea334eb29c577c6a6990e1e4eee31626b221c6c40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5695d23b7452942f4d1a5f88382bd3bfa
SHA12fe41b7d3b85a954a0c53fe73220ca16af4fd5f2
SHA2564ac05521d9ed4eeff1aa5d409656eee14f89db90e785e8cacdb2dffb156a3ce4
SHA512eec161555c77dc7869fbe4d784eafcc6c93876de754ece199c0e6fe3474eb565a664d99897182bc035a20f9449ca7c5906506ea7de7b28ad2c9c433f969e80d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5026177a831f8269f611d96403f1d63f0
SHA1e464f405bceca6fbb629653aa3b007e88cca051d
SHA256f39e91f18a59eacd9b4ca81b74c52259832ee40a10fac9e49768a2e40dc7e89b
SHA512e1974fef064bb769b75de2de160d67e00a5f758beb81fd599a2718446b91528601645e7fbf5c68d93b188e00ae8222ca4fc7901b3b3771711d71fb24a658b4c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552bd39be33177afadeed8f32bf306ed1
SHA13566dafa19ceceb7c3fcfb35222645f5dd137f7c
SHA256198a8e1ab779d9cd1981297a352b9300a6cc1b735b6777dd25585bf63ce9cab0
SHA51247baefe9eff6a59cf7230ba5a5912ff51abd21690c79aadb0bc318967f06c23a4392dc6634e3954e3a96005fb10bef2c73a4d9c4683296b85d0afabc59298b67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4fcb74640d9da3353d012dc1e6fca0b
SHA179fd99bfc44b3302d897d22dde4eb7558bb3833a
SHA256bc45652f2a91971bd4132cc75120ca1808324a7a308190515c7eafbc8ec3c82f
SHA512295148a90e6e4f96d5298fc4d25763dfe2aa5615d9da9cac5cdf87ddcb8f30af3c0466b72d0ef08c61c4df618a99e5452f6ff5377d0b5d751debb941e1beb008
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abbeb762cab174c5fa27178cc7dcc10e
SHA155f47b8f1784691e99b932f44252047bbb4e8ef7
SHA2566616f5c02045ac3a8730d44f1a9f800287eb6e436a2a4af69d465c04edf70a68
SHA51208e858f432ffeae240c7f005bd08d08c6c36293e1eb0528cca36c579c1b60a67b76afcd313b8264c456ac4977fa3ae266d332773ebdf4b2f7926654eb47fe512
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8027725e0919ffefa7fefd32d8eeef7
SHA1014db4f365a39de70c966c638ad08191151696dd
SHA256b878859935ea30e7167809753ed6d62de0bdbb74642cee5efe3d6985f5bd4a8c
SHA512b3dd74dd1ce820610176d002a718d5a8269381eeec2a59d5f4a9e9faf2df635968a81f03b4d3e3fefd3f4e28267d4dd3645b83994c8dfeef4fab6a971b67a0f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5165493bb3bbad844b2dc3fbc7caaec12
SHA1cb8f29a7a80359b721a815757ca0cb4630f37bca
SHA256a6e35acdac5a42c3d5eb65e3d86b0ccc80bb5ddde8b4ad521de9e80241526551
SHA5124204cf4384f5491179cd45643f4b30f75291c72c07b26bc6324407671ea37f156098fee44728eee95335cdac96bb4da6a67a94a6c9b6238a82a960646c91f3cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5415b8e972285cafc15cb49f71554db32
SHA1616d34b65775045c7248c86300f75c3c734016e5
SHA2562aff4686caba9cc7443a14aa657769c2ba1afea00e0e593da9dee842a51d955c
SHA512369038076b20719a35752c5d5e12afefdfb0ed688cda8cbfd49eb45224f906144d68ea69ffbb913e654d58ef8b2611ae347b9700847acbac1b2c33c467e986f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5450ef77f87d2dc9420e3fdac2f343c10
SHA18d1eb14cc63efce14c69cb93624863b4d460936a
SHA2567761fba54477d5ddf8b47c56f72bfcd56e9b920789cc8f06dfdb41ddfbf494d4
SHA512a2fe1030cde097144a40ecb78863bff10fba2ae0cd2b641bb6afda8d02c842cca6432760efc0b5902f0c4fc8d4c27b25b28c4148bd9a52e177846752d551e7f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c6bd45c799ea40ec078c37736281de9
SHA149d59c969a260b1e8d51805421aab262b315ba2a
SHA2563a4225eff1013936ed67c57a326898a7a43eee3bd06a5ecf92b2153e4ee3979f
SHA5124d693d039805986af3ed24d4684e24c9d1330faa5aeecd942f97225eb45a071e53c89e2976c9da6aa850bab8f7ee75245769449ee8b16ce975ed8d7e7369daef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8b9d15711471be6d149983326931656
SHA1dae40533cf43c2c5a906f857b8a2c54132df0938
SHA256c8af68b2dfeb6ccd1e07d9a778c5e74ddb929115096464d2e7ecc0bace7698aa
SHA512f0a01f0140d99278dcd6bc90a540e7e5f0e6a22ae02bfe0c23514a899c7a682126565a29f19d50e97d2c0ca7f6a83a71de1251e8bb1b3098ab08df1256b8f253
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7eb0aba4335b378a1cb912b304979fa
SHA16ea112c6b292c11bfd566a0da35e709daa60549e
SHA2563cb689c5b53f9beea779acbab4a93254a619fd4104d5efbc679d4a123db3cf3e
SHA5122806fc50a2dc69b1b8ac48ae819161ced05087fa8a49e02e949d97403f9e8559b11a5f65e22978692244fd3c173d9eb3d9d1d015c95be231bb54e779a99ca6e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5f45adfd15720d3a28e708b95198b595c
SHA158433ebe86544be6e6bb0fc6285759b3f96c6d59
SHA25657bbab02fe7fafbde877cfb2905706027b7e7aa25b8ee55e1fce93a16d035e83
SHA512d416c72bae058e8c5037f70524b1942f7d0a8489ba0e7216966f3180429004f3ae24f7c24fc9ccd544765bd3c59ea62d63a4eb309822576d5e7e01f01e554a28
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b