Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 09:02
Static task
static1
Behavioral task
behavioral1
Sample
b70f6dadeff7a34e55ef6e7ebe850d55_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b70f6dadeff7a34e55ef6e7ebe850d55_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b70f6dadeff7a34e55ef6e7ebe850d55_JaffaCakes118.html
-
Size
77KB
-
MD5
b70f6dadeff7a34e55ef6e7ebe850d55
-
SHA1
74d42ad9f4098c8061389b850ec0ddbe3350481e
-
SHA256
479878fb85f1d5a91725e84f9d030a0034eb309093c0d5c4ac2fcba5d9abbf47
-
SHA512
fdbaede0b65d922bf06982f60b5933983379431a2155f6d76f6de18a0f589a65ab98f4bcd820e127e203c0254f3ef88c06af6babf0338a928721c9c24a621c00
-
SSDEEP
1536:I5rC5A6CznpQpQTmS+z9iTCizQquDtVjhd6f3I3hk5mE75Touy:ATnpQpQTm9GfQZDfjhd6f3I3h855Touy
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3B303851-6065-11EF-8E00-526249468C57} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430479206" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 328 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 328 iexplore.exe 328 iexplore.exe 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 328 wrote to memory of 2424 328 iexplore.exe 30 PID 328 wrote to memory of 2424 328 iexplore.exe 30 PID 328 wrote to memory of 2424 328 iexplore.exe 30 PID 328 wrote to memory of 2424 328 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b70f6dadeff7a34e55ef6e7ebe850d55_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:328 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5f23ef20b23a591f9170876065a8291fa
SHA1bedf168c17547294345169ec28280afdbe80fddd
SHA25600f364dc4e833085c9c21a64da45dd3887599bbc551ed1b5cdc7d539c9805cb0
SHA5122edcc31eb411a867300b7d6bb0a26382476fe2a87aa26aaca57b3fd079161923bd68b7cf66dcaaab9a06acbb696f484a488d5e08578d774cf78d957ad1abbaf8
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5a7c5b4ac02ba563193f01ca1e69d74d2
SHA172650714a30c8baa9e23a4cf8b8bac9b9a2072e3
SHA2560d41efd0aa262cb501b6642b11da9eec889ec7dd4e8ff9c6d9f3aaa2dd55c9c6
SHA512047d10ea4fbeed1d67d11e0050c52f9d68d4f75429a55f8172e10967b766bc609d2d359aed959f7bf22fa64f6b45d91a5197401ddf4f861da507b0a75b6c1548
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD552b3c42cd5e683a2a0e1fcd9f8758c39
SHA1ddedb3c652583a152c89f60b5389f40e380053f5
SHA2561f77e5d72728451e955d2dbb58fbf8c66d07a546a8876cd65bca0f320350501d
SHA51277024e00e0027d36f53be6e621ea5f87e12e071f700567ffffe1ecf2ab284c66d19a9cc2f9e81b61938a7749b209f34c0c1464ecb37e63598e1321413a3c7f0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56a8ebc032650ad51eb869033cf75bf8b
SHA17e9e65d5afc5199cb1eb2859c9c6b20f19eb150e
SHA25698772b062e00cc2e50211e140566fd5426d63d2571abf7360f22a8d98ddf7a9c
SHA51211937cd4f366f884723e690784be0a445331aa8a671220cfcd81874c7b34ee46396875a5d08e351c721b48b2bf718007fb21458ff18ce95e9ccab07ef391f9b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD540c643dd0862a4160598ded3d52285ba
SHA1f8c1089f80a2ac8df251ebf07780ff3b28c74d1a
SHA256289bdb11ba3859b308781a83e1ad98ecceda547bc695290a337b8a0bc3f9a4f9
SHA5125769f3909c80bb99da6e7b0c1a85dc4c22a4406e2ffce760b3be4e7aa23dc0606a6a4303a149d8c3547c140249eaea735671d3f4cc089ddfc48ab1f83b43264f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52062cb490ba9d885b39cf11430569e0a
SHA123122264473842802efbac6e89126e534b815296
SHA2562c4a149abf2d54dd828e3ddae6d225712eb0429983a8300389b2776575349e3a
SHA512a2834843457b6b575834044e3faaf72dfafa56868908ecb770c1a7d553fbf4b7ec7ba233d5afd9764f890381fd01969673769523ac3b362a3c055d27f0e934d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5307648f0c3d3f9bb86d59d0ab78dbcd7
SHA1b1942e0ea35a496a2e261f48f409c16c5b7cce0d
SHA2562d6aa9a297a0d03ff914b4ad9a8b14f30c87fd880090ca9564780f6d88ce3f44
SHA5124e87e65204fa05e54dd85f89f10c01bfc283497cf0fff3d73c990b848e6e6757c28df1e852ed8f2f7fde1e911f04f39a36f3c8172c248ab7b82c07b287e636e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bd136ec25035991cb8bed7da38707a7a
SHA1cacec6754ab8378731f24366e644b41adab8520b
SHA2567d14de3fae8e891562be8a6e4a211b6cc3984d21becbcf5f61471420c7e34ddc
SHA512646394cf37f3728155525e294040b5a49f8d8b2f1a6e60dfacdbd2a9b55128618890a4d07e0b58ab8fd252238135526517fcf671612e8d81c392181a821d1fef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f08654ba536c3341c0194b854d700f40
SHA16a485d02c7c3fed455faa5f3a3065de0e35555be
SHA2564bc1716f3bde920fc2df95b845ff0d7969f2d53857f1300d024b011900f68363
SHA5120a9d467fd1857dba9d22fcdb87d68da0ea368cdc4d6e03f431d907764211fa351c40d36aaa447195649d8689ab4ec90d8b8bcae9e94f6f8d88c2000042cb055c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a4964141a0c0b0c79e04e090fe825eca
SHA1c954e11ea63426dc8a082527d2f380ac3f15f1a6
SHA256521adbc04b78b3cfa650b98837c730806af81d0456d26e92544a736abc3ff223
SHA512fb09092ee87ccc15a2c1a7570a3b728c1291ac6099720dd43c4346df1d5dcc9e5ebb254207b3dd636b8b0272ae85826b0e0f0440d943a2317457e15b557a39c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a28b1973d8cfa76623a1120761719dad
SHA154369a468e79daa22e88b30b0ac0470fa937bdca
SHA256053eed85dc971c6dbf2399a22d7eef2c051020142e15bc8ccabc081c0268063f
SHA512ba6199003e58e5095175a94bd2c3b1def6419bf4bb81b9eef26524eea42ee50f7eacd1a6484b439f2967b9ed11d19dc714513a31739b4314050737dd9ad27105
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b9a840b2357f01dfc768025a22dbb850
SHA17b908cfca35ae31c6ddf4ee828461f42c53ccb27
SHA256e1018c496d15ace49dfecfa1ee5266df281e43dc98a56f873e26e48ffdac1f57
SHA512c620fca8952f4e002ad876aecc9860478258c28fded92cea1130086544802f0af3b1b598b969b576954de7820715570e2d61df65ce289ddc2a8ad9eed0eb5c70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD504584ae9b8d3866035304812200f7231
SHA19ec635e56dacdc1f12dc9bd7a9e952c40744f726
SHA25649f2d40c9190393aed9290cfa07fcce4de40cb05765046959440c3da61e20482
SHA5123f31888a31e2b2abdba00542da05f6bbf78f97a0f0a8470a0faaf7898977751bee363371ca6f95609fb8b06107b8b61ecb570e10b7facc69e332825803fe4a7e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b