Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22-08-2024 02:30
Static task
static1
Behavioral task
behavioral1
Sample
b602cce26b7200e9755858bdb6eaeba5_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b602cce26b7200e9755858bdb6eaeba5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b602cce26b7200e9755858bdb6eaeba5_JaffaCakes118.html
-
Size
49KB
-
MD5
b602cce26b7200e9755858bdb6eaeba5
-
SHA1
389a1d49d2c0dd23a163a569cae2e9cb118f8ddc
-
SHA256
40d62abb2b1d03c71977b8490e37919be01ba294147f9276991660f226072996
-
SHA512
0dcce7e70165b226df3d119965685c0e89f67eeeaed6e3202f2119be5b01b92fa38b7f6d934f5031c8c5dfc5380554073ef800297f2fd1ce82a61a6eaae98f2b
-
SSDEEP
1536:SE0NSYfwxG6ivVBVprqoaD9nouAAF6Ee5WB1v5YcSk5953RrIKY/TEW+H/:SE0Vi6g1Z3S0Sk/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430455697" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6008d26d3bf4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7F55E341-602E-11EF-BB93-DE81EF03C4D2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf710000000002000000000010660000000100002000000021de3ac66c7b89e00b4c2d02a0f595299b3d70770f41bf6667a9ff0c8de3cf4a000000000e8000000002000020000000eefee5320714e43b645019fd35f1e9b40ce97a4a1c0f4c78205f90a09ba35bab200000004cf1cc0b2b460564e768ba9b34f8ce2cfcf95302a3cf1d28d80f13321a597e3d40000000db1d906379f92a6bc70766161c0d6ca79d35e16ff8ce92ca5cb497e7738aeb3752ddfcd79e53ab89c364b70cceb8a3f3e0dc059c475293de016e5a287aa595a0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 580 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 580 iexplore.exe 580 iexplore.exe 1004 IEXPLORE.EXE 1004 IEXPLORE.EXE 1004 IEXPLORE.EXE 1004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 580 wrote to memory of 1004 580 iexplore.exe 29 PID 580 wrote to memory of 1004 580 iexplore.exe 29 PID 580 wrote to memory of 1004 580 iexplore.exe 29 PID 580 wrote to memory of 1004 580 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b602cce26b7200e9755858bdb6eaeba5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:580 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550cf27f97f44f1d93c24ce28911ff582
SHA141359f5f6f67857860d727f776ae362ea8b15d55
SHA256e3ac4501a34b553c85e7e2a8e5c976c14f89ebf0b7efde78e55ec392b701379d
SHA512c14d6abf9b57cbb5c08703cdb012e10023de2b7a7005bff2939f62d73e75e753cf5f1fe3fe27be044160b842a888c981c00a69047bc2f9dd9bf8f60d3bd698df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5141aa89b52bc76f99bcd67caf64cd9c8
SHA158a934627de1476201848921bed23c46824f20c3
SHA2569f2a93aad5f4c627d98ce22384e2551f9d655c5d6285c94c753a741c4f83bcfa
SHA512954a1b751621f4b003cb0bee20a73dbd22ddc59a732284c621b0e144be0e246b6800b0976f930a677fd6c01e192366c1ab8954094e6b93522779b0143ed334c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f65d26cddc0ee049ab319e29fe30431
SHA1cb029558ed38fae58deb9c5637ebac81adb9a933
SHA2565422814fee0d5d77f9bc12f0d4e2643592601f71db88a3327877fe3b11650206
SHA5129669274f8fd4ac1b9e2796d3e958bfb78705992a21dd01f28d886ac26be5efd2099509a85e066c2f2c3a4815546db1d7a7c486c1e04fb4d972b5d6710bd0d0be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e94faa4e82719adf4df30de1d39f54d2
SHA1afc569805aceffc0e292037e723a4ca3ee00608c
SHA2561d40bf837df59db437d8939174ed3af4d1575ddfe7b295d144e034fa70f26c05
SHA51227c59bc8196bb8c16341fa60968849047122b8af40b8d85de3a0f124eb456727f789fa37425e2bd1ae39f47be2f6f3ad80fbe03a579d9984d44618f2238c015d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538eda3b70c8a9baa371ec0bdd580e2b3
SHA1b67bc1ae3c0585982c03c5c7a4b65b6244c1c4be
SHA25694ba43ff918f944fff96de76be3bc9d9f3b00010fd6c46b720927d087935809b
SHA5128a06e73e71a7193beb638437d843bb335cae07e12a68eb85d2eb43eeb915d40d68670494903b47809b3e82ab1fb7db36dae20353bc53ddc47cfc1c360ea68d19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571e797a3d4ce8e1d0e8503abd47474f7
SHA1c3643e19ee5b26f0e990c06a08d19493d57e544c
SHA2562d83fd35c3c65b27c873223998daa717f9f14e76e99c0efdb0cd394fd4742f6a
SHA51264728d5cef21795da43e9c03bf246f9a9e8fe9144599a2791d2e6c85323f51a5802f415170d9670ea2be6028a9139274d16cccdf1d6bc212dfe052336d2a52bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5457a022db3e0ceb80d1109aa2ff854fb
SHA1ec70d091ece13a96ab734732cbe80f37413ece11
SHA256405d491a891c0ba0ca359ef5e7dd96366d9e8cbe846801574306c86766923d35
SHA5129e17a032a68d9c07eca7dcc7f146a6fe05f7b0bc80736ef80ed72ba86e1b70087cc90d88bb6a92f7eb5b8aedf54065666441148f9badbd70a2ad6b0c64ff1849
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df3615d8de9ee271b4abb6ef1ca3cf55
SHA14163b07dac128400efaa4223adbbcec1f8c87066
SHA256751df640a8caea7eaba92107a2e92d10791da5c96ec8b385e2803065048a9ba2
SHA5120b294c85b1abae7a8038f5a50ed455220a258efcbfdb7ac7cb567d7df55f047e266109599193688618ca60a8f09ab8ba8e8e7398180fc0769e87e2758a870164
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50935bac20958007d3504b246bc96a18f
SHA192e78b47ddc61cbd0ec2dfbdea022048d56742c7
SHA256e28e04cc0c0601750f9288754a63767da11c2bd1afa99181b67d7344c0bc6c56
SHA5126f0f55af1f6265ee2a4038074a43ee6355a8f14e15b738611869cef741d8ddde8e44f6992dc56bff8d1e0ea519c11ebc8a40ab1f9dd356e4145c187c9e38829c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56370bdbb3de1f4140f7dcf51d489a96e
SHA19cfa9486ba49f46a530dfde8a83d2c8b0063276b
SHA256e6a42b19bccfb2f6e75decb05d5ac869331478b30db0dee970d8eda86357123c
SHA51211b58be16d3cb1879b6c5ec9ae9018cc023e28c55470d48ca2710d8e34d16e27d4aef50931b766f0bc09ae3913dcc1e79a89ceb05cbf968d5e73e21cdc01f60f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5443f6faabe938c9b3a0d986ff397b24a
SHA10d4e549757d6d323983f55a07f3ca12d96c3618b
SHA2562b0c4391bf04458f9002632aad635fa5dac1d46ad22c4524720fc3536312f69f
SHA5120725aac16528646b5e533dd5a994cda68411ff520d0e2224db4a4a02021637603885b6ccf31eea376b1260988b464bb661bd7ec072c7988b753988c51235f403
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533634364f422e78e9d6ccc33f230555c
SHA1cb98c253a613a22f7632a9603b44ac4d65de020b
SHA2567f26495c42d153c5f563ef591ea68d02bdd22ca4ce0a3dc7e1f7e79c0ba15d28
SHA512d6df10da3dff71488227bd2da835c788860d49108dcafe4abb3a9ab55b811b6874ce3963505444fcdb62be76f57fb0a40f0094116876960912bf65b7203ad92c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ab746f82524bd43f7463e7c472388b3
SHA13ea1ea655060721de83cd826206dbc0653863b4b
SHA2568d1b19337c6addc119e70ea99da491c7319d7b945e15cb75b2eceb16e7d43842
SHA5127ade1b0577544e3c12ab86d0f0d8b494247a391e40004814a1cc999dd7360ed5abcd0646807d4f36b005f40cb54daad493d65e3cf1e4499b322e3152a0c8af97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5122df6f6595082d633663744cbb0819e
SHA191dcdd3217bfd3c02ab207641a8cac06255ccd7e
SHA2567765213b7537f4c4c2df96c62a3d0b9ef8a4dd0b8f458cf1ea09c22ba91e45b4
SHA512ce0bbe4bf77f764d964088307c1d778915d0503191477ef9093a1c94e1755c6fa9973752f9d576a3db33239a6248f99a4d6eb122c48c888d0006cd47e53ca65f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1184dfec2fd441a9df2c68965f8544e
SHA198e38d68e8e350b358e70d996a8b8eff279b1a8f
SHA256b23b5bca8b82942aca28fa92bd7fdbec8fdb898c5d0b607490d8ba862216d7ac
SHA51204f228feaa318049e82e6c21d1cef8e901f28c7072a932d4b50623deb18f2b4914c831bdaa3d78e066dccef23f8e41dcbdf221d962309e25e048d47ab03660e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50914c87ad31d20f63e2ccf4255842ff7
SHA111edaf77b2c6811327a42754bea6920ce6975d26
SHA2569e44bf3d9ac6954a00ed6d019c436d7d26235267b5720646e1d8f843ddb1189f
SHA5126869365d46e29d42fdcd6ae5c11877781b5778a45581b4c8454854c85554764375623a4e9cc14c7b55fba1bc8b60c93ca6a65c51552aa729848fef6b6987d775
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6a6286094946de57eefa017c8a93304
SHA181d88ae17f8672a41313f0b76a6eb847493950fa
SHA256f7cdca04f759f0ebc65653793d225532178fb61f3550e78d10596323d90caea5
SHA51228bab35963ea332dde17f2760875329cabbb6a75ab6a0706325019d72ae56e1b9e1442530a6f96c174c0f39d70c7ed32916507f7bc1e5340711900ce99cc2d38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55529e981429150d2ef37b03e5dd4f751
SHA15f7972723eb6751c523b739588e9dcff807e4234
SHA2562107b67eb895424a806f4b2011306106dae61377a79a3b74202cefee3498b146
SHA512ba07db0a898babc4b48ae6a8ed4231e89a7f851f94b141cdfa0831ee4c8c4419e83c26b0a58b2fadc0579627bd8ef5abff75cbc82e34a84dc89bbf3abb6cbf6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edb530389c818be51384f5bcc295536c
SHA1a1abfe86c8396d2804bc4c16d2dbc8fe86be33e2
SHA25605e779e5e159f9d9111ce00eccc0a8212feba0b14cb9fb8200b267362d7d22c0
SHA5128571171ff65bc45a7447b670c751af6bb7e107caa00f4fb80ef9c48208217da12a521dd303f89a83a3cb51f4386ca0a7ad8c83d664ee78c920a9650767e282f0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b