Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 04:57
Static task
static1
Behavioral task
behavioral1
Sample
b66c5564f37d4bd0d3bfad241db05ef9_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b66c5564f37d4bd0d3bfad241db05ef9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b66c5564f37d4bd0d3bfad241db05ef9_JaffaCakes118.html
-
Size
9KB
-
MD5
b66c5564f37d4bd0d3bfad241db05ef9
-
SHA1
c1e41e0ffdee59272c543f0e0eb4c2b7c8b3c4ad
-
SHA256
1791052b2f76314931d2ccb8c0790204f53d4445c9bd3bc633d097411a0665c6
-
SHA512
734287e8845194fd3b6b9969b3b2250566be2b3e783605dbb19a493e12a61d43fbb774a78a4550e5f4866e11ffaf5b340d50838c6cf05ac195f4b94a7324826d
-
SSDEEP
96:uzVs+ux75FLLY1k9o84d12ef7CSTUnGT/kPsqOpUlVHcEZ7ru7f:csz75FAYS/W/UUPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000d5edbae6fd11cefa68a77fa85a0c46d8c20cc6e2475144710fdc175c0a2b22f0000000000e80000000020000200000009c3eba884b9a6725e2b83cdbd8f1d80644dd51a7d0187f693fe38cc183fd065220000000fa8365323a9f4cb4515d652ba8cc4441b5f74206d357eec6c51b0ce8c2f3fbb540000000253f2329016d3f56598b82c05e685eb45820bb16e03c38170d6bb034793d74268f9da55381390ca203dbc845b85743a2fa982e421c6ad1954b6e64157dba3b2d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FB5CF501-6042-11EF-8E5A-6EB28AAB65BF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90df58d04ff4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000083fbe5e9b48e19ee8bb936b8e0c8a0a437812fef1e10430a029b3155b038b127000000000e80000000020000200000005967c16323dd9fe02653b2a1c03fe1f2e2724fb97837bee3991bd95c6ceaeb34900000009e1eff6edcda9cdd73e99ceae242bc9504b92e80e0aaf5a1221f19fd6e307170f19a3062552dea0bfa59f662691ed36affba90005db9a70899f70a4b83b2ae1e2ad274a24c9e25a6efd0363ad6568b9ed36af41463c8d1d0b154370f6a8dd722935e9118430ba2698e8b0ae82645eef813bdb2b229fef76f9112f7c74d6d05d809b8993cb662d0dd3d54e35817bba81940000000d00be6e5deb70bfeea63d3605b3603ea4844fea27a724712d6948df2bc1aa24e5c61a1e2a96d53e2acb64040d0fd05090cbdcfdddf8f6456eafeee591cb46e9d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430464495" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2876 iexplore.exe 2876 iexplore.exe 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2272 2876 iexplore.exe 29 PID 2876 wrote to memory of 2272 2876 iexplore.exe 29 PID 2876 wrote to memory of 2272 2876 iexplore.exe 29 PID 2876 wrote to memory of 2272 2876 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b66c5564f37d4bd0d3bfad241db05ef9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559be16964703d8da8a0ce922aa1e2d40
SHA1c9d2e4c548b2076134c3831e3c892bd26bd58922
SHA256e06916807f5d3515c710b8f32f1856d680dcac5b371fda1a282984206c247ef8
SHA512e7dd65dd8c0e9f6325563e670e99d0c93767b3c70d1683869edd5bd10849e3ceda71ad6a22765dea753b196664bb5e0461472a923df65048341132b9051cf72e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb181a5489c4941bf5c6cb070bf89435
SHA1f00fea04732cccca4a9488059010b4b110941bfe
SHA25645cf2b59419ff485e2be9d8dfd11504745040a98a8ad3837162b44e22a69f993
SHA51280cbf549710115c81b1e3fffb6ed889fcda79ac299c720ce86273f6731f95e401fd77981fd5de2ba9373c4f349b7d3286e9cad31137fdd5d324378e48be5175f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb0da76cfdb66489b5717d7beb307178
SHA1a74f306440ecb9f79d13b5deb9ab53eb6669622e
SHA2564437bd6788e6cf7371b52ffbd15779db726fa891bb141f82066d906dfdf02d63
SHA512b8b1df41a6ea916237f0ef15d3946edfa11a0d602fe34c16f64505517ad1c27d6f55104a3ea02d960614416e6e9f43b50f98fd00f90b21d95e4e9dfb2920454f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533fd3ba7abc603d87e4de5b0d8ff3ada
SHA1b73027bce18036b766ee889eb4975bc829553796
SHA256a1f085b93c7cd62b98c16434cbda200f95a14706a132ea87999b245d1c27c2b8
SHA512e094f6461fcc572833187d9c176acc44b4bbef3bb39af013fa79c94fada9df84309a02e01850d9fe21fe0324058de9db071d8eaba3251ddf0a1dcb1ef0ba8a73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b37a675badd9f6115716e284dd0b939
SHA1f9ca846e5f59d83357d9c20c82314f3978a4e6ae
SHA25691c75199b14d11cb6342d744929a6a7d5f910028c9c8d959780f0a937fc58274
SHA512b0d42cd6a919d4861a408cadccd550e5cbcdc2bc1c28a1c9abe25efa211e3c90f41562607f68fad19dc0219cb564cc37496f1db2962f0cc0b5c5fe8628109594
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9807f7da2c1eb926bfd9d4626700548
SHA190e8aa50d7f3897cfc6d1b77d85ad136ce6e1612
SHA256f657ca7d389463d874a9456cfd474a8ea61ae32bbcbbf75cda1e2dd4da4ab8d6
SHA512f6dab9ede1a33e0b3c224cf1f6dd871b7a7607cbd8346863cede87e6fd3e7a1e46e7f67be9626a87b70c5ec108c7d3fdcbd958192b1efe1d7f72ab07ecf96a3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550c952aec3d4639e65ff56e0e16fed57
SHA1ee4a3273b09a3fa0f183e14649737f466f42ef3e
SHA256eb8bd72884fbf05d51da9f2091122961b0b11b98f3e994808727aa8e6aff829b
SHA512c7ac3bb9bd4ab315a374d5cef4e746f5b3de0ba76d07850050fff13799bec27ad2a3e2895221fa04530ce7b80090127a96e6fc378df65f7e842054c82d2fd3db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9327a38a3d83d5e5f52a5f69eb49025
SHA1045f475bde1e28ca0c6c958d00c7811d5451975e
SHA2561876ef5045c74be281535e0aac4267883404b72361b8c6d9ac0078039fe2989a
SHA51277b8d004233e1845355eb3d1230bb5d3418097f5310e03e906f91d078f745575e3a921794ed7339455d4d85a446d7c6be4f807266b8d4d7ace6ab905bb8f5170
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ced1933fdfc4a383e15b6d43e4fb007
SHA1f1cd6f3e285c1598435cf7eebb5b4ddbc08b00d1
SHA2568bbf02616e25c87c6523651bb2805229fe26a0da76472c6ec86b083d19339335
SHA512a58bfc509504ce9a28f4ba76ebb7c7d458dff093c9157b618173ee17a4644feeb499085dd73471fb1e72f8805e4313bf6fa8e50b2932fd9ac7981dc31c5ac218
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a023d549b78f55012ea0d24322be48de
SHA1f2e895079cc25e2308bd6651ea76c7ff528919b3
SHA2566e7f50226ba1fd982edc40e8979fe8a93e1ac8aea94d8ea04dc888065bdcc748
SHA512e5475ce733acfb3755087c1619506434d5bd4b2049b8b96adaa1bd19c9ab553ea509bbdf6dd7994c648660a4977be0cf5836302d64a7808695653e36a913398f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d1e86aa26bd318e5145cb5842159631
SHA1775a61a0aa3a8c05f92ee6a89347fdd426144f63
SHA256b110dc4a880072c3d50d6c07597fab4ac8b6dbc96d42fb6da781d66cc93b8ab9
SHA512a384a3aa6cd1a480a6339e369330e6e7d0d08a3045828e1aa9c932a2b577e47c25048a672741d1143c5c5d7545a4b82d1c144c9745a020c75d07abd3f679f718
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5447cb96abd95f7cf280979ce25156e27
SHA13ea396f1ac68a4474bb81d91b0ff3f427b45f61f
SHA256f2c6fbfcdd08aaa20c6adbfa1f0452ddfa79cd254de63da5da003d447d031ede
SHA512d50da3f49044acfa797811e322e43c0b9688c691ac8abad2824c076729f177ccd2aca58d968da820cf56e401a52f6d4b24af919fb32f9c201bf9587ab34ed812
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b5743e43eb81808e8c0467a702c37c1
SHA13e6c1e7197d820e9687e7cd4d572dd097ab07f56
SHA256cb90acc00197b1bf07af7e6869e5529c1097eaab0027227ac536925d6ce130ab
SHA51288286e7d398af324b189614a81c936017fd6079f14e5cd239818abf0d75c94be7870d234c11f889d683b241f9910b190dba9bc519ee3ff17f7f1de8c2ae52144
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c54df8922968b19a8d43aac04b989d8
SHA1faa5e3fe5999d39d442a51c68eaa42eca5baba32
SHA2564b44ee119ea03a695159287d8a63acf695a7663dd3e006197689668d0d6ff4dd
SHA51210d4aa69de045c6c6c92049819231724c9b5614cb65d4dba9b52fb37a7d9fc19ee41ef59e0ae9e987356e64b8f0bd88957633e9043524a283102889ff4e40610
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff1b40c306a6faa1da35cda186404b5b
SHA1cd96076d22174b6d85c350050aae6c4fa8b623b4
SHA256045a716052dfec703ca6413b6cafe062e1f95737ab0694648b918601e8a3cfc7
SHA5125e8dac961fd60fa7a5fa34f85cc6840a6c8fd97195e5af018995a0d4548ae71d3a29926e7ab83feb88a9f04ec92f8ecd085f34e2c819384a8438dc86d3c43582
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cb9fd1896d50c5579ab039cb0ea27b3
SHA1e8caf4dd9f87a041062d0a8cb72e1830c1bce65a
SHA25698f9912f8af8cbce2b2414010fd383e39b15be49dd2269cc05bcc23a33ee6d3f
SHA512398e3c3b2d0bb2a405ef0f9c68a9ece365542ff8e89187b9d246d2a64331b231720ebfd8925b5e60dcf36d1fdb9b1e24ce7bd8f01b1a336a4bc7671838cce588
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8992a2cdaf663660d7963f65edbb25e
SHA161715319cd0024ff122d2f37ab66d1e95e2a063c
SHA256308b1d66e7739cd03ab12721cd5e85a281f3dd457c657c9d3757316b7743153c
SHA51273ae4d465d8003152ce035b3a458d12ed695a6a2e0f4b47fd2fe3dd6f140491a5ac5ee28ad4b6b6e9ef6717b7519460dc40c111b430241beb24907befaff8047
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b