Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 04:31
Static task
static1
Behavioral task
behavioral1
Sample
b659b3e2b5420e63dd875ae875ec124a_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b659b3e2b5420e63dd875ae875ec124a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b659b3e2b5420e63dd875ae875ec124a_JaffaCakes118.html
-
Size
9KB
-
MD5
b659b3e2b5420e63dd875ae875ec124a
-
SHA1
6ceea732ea05e46d35f72aedb761a30493a08b1a
-
SHA256
ebfd58b9a9950db912ae2741a6bc0bf47c708040c196da921ef0fa22101007a7
-
SHA512
121c25d62513dd22141b66349f27d653b61664a544213f36ea976fadae51fbd5c4914726ace01a3a446f28bea54ad19455362e878780edf12472095a958ebda4
-
SSDEEP
96:uzVs+ux7D2LLY1k9o84d12ef7CSTUBGT/kPsofpUlVHcEZ7ru7f:csz7D2AYS/IfxUPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a050f62d4cf4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{58ED1FA1-603F-11EF-AAD0-E29800E22076} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000003c9e0ad6202b9af2cc25231199532f9495b49f201377b1e4b9132e8125233e37000000000e8000000002000020000000e5257d9ed0b52bb9794d3eb80467a72ac30413de612fad0d160c43bd7f6019e520000000f45bc2225bb01dcc5392a9d9e392cf271ec62a84c8c240aace34192a16983dde40000000dcf3f2541049cfb2a44293765abb648fa0c792324f061fd907f467916e984f8e4cc5997f85796a87ca649c17137f9a300178793efb5aba2b8070f18d37cc4115 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430462934" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2668 iexplore.exe 2668 iexplore.exe 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2684 2668 iexplore.exe 30 PID 2668 wrote to memory of 2684 2668 iexplore.exe 30 PID 2668 wrote to memory of 2684 2668 iexplore.exe 30 PID 2668 wrote to memory of 2684 2668 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b659b3e2b5420e63dd875ae875ec124a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508f3bdaf1618ed27ea39ed5eb7e299a2
SHA1356ce0a7a34e8c5e49dfb42f7905b96d982800d2
SHA256d35a6066b01ecd89a6e1f55af00f558820f4e72a0e3871a321ecd81b5f86d5be
SHA5125998c2433c853f35f22f9254fdb1be9f17d821ecff8d85fa3b5eb3ae964b3834f37771a872c960f08178309cc403050bde9787a6a419e84d443c4b7eab27a8ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f58fd3aae50abcd3048872ed0ee719a
SHA1d2957eefb25d343a3939a83d5f43884d7e9c56b1
SHA25632079c3b646da3b2bf5aef85bf09e9461423ffd741f3a2b25a9d072737f97a2d
SHA512794909cb11989723aa3698eac7e5af062ec69c81448ae6d84dd61e84f56a0287304dd245abe366d0ec6361971c6a0f7aa24ac1c56d53ddb51151385ee1d0b065
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59834649698269e826b67cd950c40db2b
SHA1f7fb625c96a3e5bd0335a1dd5bb618cd741e55fe
SHA2560a7f6d18127e9c994e90be2dd90b8f0fe6215f4d533be87dc2d0b34621666578
SHA5123a23b943d619ad455e1b1b893d8a2c121f301ee0e1b2e9705bd6c26ef9aa203d67e4fa4fa1a293658a4a02609ed1e6c641ecf038fa4aa769cee6079442a297fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b60298bbbc0b847297f28117dede10b
SHA12bba77c40499485868720f6330da469a3d05a18f
SHA256fb451d57cf7f03ca287bbd9e352c553b07f04529bfd9a4b6dea513a71c55998f
SHA51260559c79c1138de5fd017905d180f3306a1f9cbaa95ed606b4ff4fe1f8d4ee3e906af7e661207879975f7dfac5c5401b8bd493a2740d93e183eaa6d168321c08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572559dd2fbad2dc0fca5a30bf0b81a07
SHA14f183da47004efa69cec22451306e08d2f58289b
SHA2560b69bb1193582d295822bac823adcbaae911711262eb1c1cdf64712c5b671424
SHA5127cada6f79d28d809b290b57615e348583bad34eaf8cf4d572a15a4b10e6cbe57b75de89bd4a7af81805db8afc958d31005392e4316a89c8d8b5a91d1a027acc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce00401c1bf97507db52dda2080e5301
SHA158673cf0e95ce1d3745b5442742c078956b38e4a
SHA256f96d1eaaf127fe264ecafd3b84cf797d7fcbf9db9236e32cda5db36e7cb7aee1
SHA51244f5e0c0b4d42247639be826c87b4d86f8b45d17734cb689e341fe72513a2c9f417a4712f6f8b2b469cb5f8b4e6ed619f6a562169d4bc7cb27bcdfb609327386
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514b209a774ec2163f2b75629a20e5b40
SHA1745ec18a4561001900945e465c40e03624d31715
SHA25687c1efe2c5faaf84e3f13c6cfaf9cbdfaeace9362382d2b100a11f15a1034400
SHA5124c96da841372d776d5ef9af838636f3075879b86ce86474238daa3ccfea439991ee9a59acfc4d91bd9f009df187acdfe933a16d95e90521adf8d0b3c093fe3db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6bf9b23ffeb4e04ff0135c920e89528
SHA14750af3b75e9e07c155a973641de22258685781d
SHA256d445f5c88a3ed06899559f50797e0ef7c78f5857e284df73a990bf7be8b257b3
SHA5127d761e2618ca46d8f78f46816a1f3b13e8680742c4027e5362cd13eccd205c208d40d1bb31be89449b49e940fc3e67da99c4d06c382609ebdf0bef3542a6c688
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce3b63085a788c3fd9bdd958657588af
SHA1cfa8e1bf0677f93fe84bf77e26a41239fa3ae861
SHA256777f25452185e44e6428a8bcb4feca9f43849a92e3386cbf2df177cb67539d21
SHA512cb333f269d43dc586f7df31792970ac9c5e6f5f078f18a3173f1ba1482784b6f4508f69399cfe781109662c3c9aac84147f0096fe4a1b9ba769449d552daa314
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d49509107e7388b9d2ec4550cc0e9c39
SHA1ead283640213469f913a2a0b0042bb50f34cf910
SHA256bc441ba4a9870ac2a498d67ce59bd4f99cee0665474fe40e4187e23157dec1b7
SHA5121ec84bec575cc333993a3e21ad32bc4c2680195c2169713068ac2f534976f418622e264a0204079ff32c5d5dfe92b0fec48580e870f1d86eaad6c04fbd2a9c91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597daf127d9527557b74203872c81dd74
SHA183fdf852b8608b4e4ee21c6df8a0208f53ba2116
SHA2569d942b11e0f5b36dec6609ea969a741124fcec7e7290797e49928815a3980f86
SHA512987fc7b4d3c95a1f606aa0d559d2d083bba1ddaa206819a5fb167e367e29b058fdd2dddddd8fdea8464933908d325553cc92b545b0e4bf5c7026dbdeb1d657dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5543bed0e485a71379129c5c1983955f9
SHA190753041a71fd3c4a198476e3d73105c89ed28fe
SHA256236b3807f3bb045f7a2c501e99d93be49a3f7123902f601baf3982e50430f969
SHA5120a0ca72c139e38692562653813be6bc78e8dc461430f2a14aca3434de856bb183d7d4ecb6a62a0d578c2893bb93dd25d09969814838d766e89cabaaa57a62e4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f12b5661b802659bb198f9c320aae19
SHA11dfe6540305d1eaf505dbc8dcb1906ebacecdff6
SHA25678d69587f02b41b011730c94b870653c5d1fe71b416068648e895ba8afd05258
SHA5122f8d1705d06a296ea3247cdf1fe4e8f29af51b047ea512b274aa26aba0d7a013e77a7b62d948811c21e259afe0d5641a52802c7512a223b3d1d022c396e1162f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5698d81625ce5f77c927cb384d89117d4
SHA127cace5b2f23738f3980dbe771bdf70247c1cf1b
SHA2561a63c6479da3ec432bba3dae38235186126c1b4ba040337f310d66dd00402b29
SHA512fdb711d352c7d26783e2c17532f5fcf44a5eddce71ae9200bd1cd3cb9b32cbffd2083d1b6b60182a59f11f9bcfb02d2e33fb3a2b11c824a1dc8402f4e0453fe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5654675d510210273d0aa0d0bfa5dcc
SHA1be71dc1b18675d5f6e725c921774548ff425241a
SHA256dc6cc3ed5af01b75a08433c232700e4d49b30f3068337e1e101e752d71c2de69
SHA512536e6212ddd370b5ea6791959f88a8735174d27197a2cf2f937abb4c9973fd1aa8de09ccc6201ac261778a4b689b9b77fb47f9010cb7861d2ffc3fcc366c1f39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c80bf6d4522f98bedeb32734f9565e73
SHA12da003bc5a90ebf413ac8e388141670bc8f61c29
SHA25612c9686794cae7a9cbde57c01e955295ca304803a0aaabbb82daccb23e87322c
SHA512609af010f1c24e50bea2d65126bf39755b28baa14eec48c15ae4643801c0c54b46ff5fca92c38163f8327cf43d38477f13234751f2dde2a8340b9d7587514422
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c25aa25197492bda185722e188638bea
SHA164ce78eba5ae4509809493c91ce43cb231c760df
SHA256232352eb21bbf48218211b1855338367cd6087465264bec23ef238dcd107b75a
SHA512c0bbb5ff3415eb9cd68defc9522fbed839e2ef20d6c64c7bcd98b9033b896be0f5ac79f12824ddee98d2bea1643b95a1e2bda0b3144593b381f0010408107eda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d253823781252f59956691f979cf6a9
SHA1d3868c2711e58310c2b4f7e466e1943ff32dad56
SHA25633a40709cd5b6a5779ac87573d6de66030fbc83bd1ae19b1275f7f6395535cf6
SHA51233bb47db5dd8f24f682eb27464ddf949b7ff54ca7904c7c2f2bfdefd13134e9df33ffc708abb318bbaf2c433b37270de11ffb36d5ff1a50a80428aee29ed4468
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b