Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 09:19
Static task
static1
Behavioral task
behavioral1
Sample
b71af05d5c6e3be085e1fffb84611d8a_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b71af05d5c6e3be085e1fffb84611d8a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b71af05d5c6e3be085e1fffb84611d8a_JaffaCakes118.html
-
Size
11KB
-
MD5
b71af05d5c6e3be085e1fffb84611d8a
-
SHA1
2280dc383da853182c35ddc257003ade678ad0af
-
SHA256
17e415bb31a9ca90d1c02e00a0ec7892de3c1f5337088895ec56950e06508e83
-
SHA512
7986731e9f9fb05de920fe45cdaf7a004c655c47c3e953f4b9bb29d57760e61f45cee0cc18c4dbc00386f97159f97491161703cc5df908a4f07ad27df5068b1c
-
SSDEEP
192:/kjEay4retHH1KrGhX8+ay4rzfay4r4WpMQBT/ltSIoay4rxeOay4rtj:sjE0kVKShX30zf0jpMQBT60D01
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000d13ab440b71fe086c4f48b8c572ae94c0aa89358a338a36f463dda20f1de4f28000000000e8000000002000020000000b95b25058d11f2bf7bda7ad601816c56cb4f27909268a6f923174ea5cfeee0ef20000000fac9d5d538452564df9282f9290fe389d7fcef4b3dba15d569155b98a478b8d540000000d9ff53a43f186a7d3d3c0dcda58d690322736ffd8f4d65aa92ae9ccda100305658e10f4e26b4cb84cf7d4ecd5ce2df78b2ddfc700c79fc660bbc924244dfd64b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430480267" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B42B0171-6067-11EF-AD79-76B5B9884319} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 509b959374f4da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2468 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2468 iexplore.exe 2468 iexplore.exe 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2472 2468 iexplore.exe 31 PID 2468 wrote to memory of 2472 2468 iexplore.exe 31 PID 2468 wrote to memory of 2472 2468 iexplore.exe 31 PID 2468 wrote to memory of 2472 2468 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b71af05d5c6e3be085e1fffb84611d8a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2468 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59b5be1bc6f06e294acf473a158a40923
SHA13046ede53c5f9e26399f0c2c4038f45f6d298a61
SHA256e14b1939f407cb6493b773a5649d83ae482ad0c94f03629d5a8fb20870752720
SHA512d6b569f2b8d82f2b39a323499cd47d437fae120d7cde267b2a8c5314137e4a8f87ce8fa9bcd43d1c9e040aaa035818cd3e3c78f04566a132224d0313aa664d42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58238fdfa5d6f4c98abae572babbe054f
SHA1da57d0023b2b981000c4708be0df1ed6aae36564
SHA256186c5c413f0423b9bb2c82cb99f32b604980381dcfd7a92d365d7a5c13e3fda2
SHA5128c88a4891a608bced53e0b3b41654ac12356e557fbc11d8eed88238c3463d20a7feffcadaf7eae55348ebf3bea77eb07bba3c81414532c0d9f0653b2840cd4f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD558ac775492921da9f27ade3ac8d7bc2e
SHA177132a1350b24d1f7fce82b7cb2fac5ba66dcf28
SHA2564bf00b94b3d038271afd22affd083c052355fee99fe86642b8b3d587c456d97a
SHA512c739ba645d2081e4b6a8216f184c9d3b4f634b5904415c584b89a280b0e49700ce7496e9971c0afdfcd114c16ae60c81b8c7d60f441b4348a74fc63d276d164a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cceee3287080ad554ba8aeb601c3a580
SHA1df66e310b76e3604af89e617e987eaefe5d8f56c
SHA256410f9bc1bd620856b48f7fef9ce618a15120e3985511cab6a24d397b63b9a9cb
SHA5126d22ad01fc01243fbedab938bb4e747fbc269510783a6f5cd93dd0f1d683c778f26b905bc667440529b2c4248d11b673748924fe466358c1787a120ab05cc669
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c16cd501c882a2979c249c5b22c93af5
SHA11126bedc6e8d48ec140f32239644bc76946082b0
SHA256aaa0bd7917841a7c064298f9eb166fdc97152f35569cbf91f28954345f43abd9
SHA512ffda1ac79a4f3843670ea8dec6eda292366658f9169f3e0ea0af0dbaaffedadc8fc5e23e4aa266925ac771f6e8cb55262ea5f57c161a724976aefed17b942e13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f3c032a5693f9a459aa6c2e1740a1b52
SHA104e3d8bcc12bd086d78b69bd35965c2824130d30
SHA2567e016d2a5df37701f4651b80c8370880c368db1d7b28e9b44b04da548fc912b5
SHA5128656add18ee8f747642830fc807b35f0cd7192cc836b234b728dcfb0b423918af88a542c62f8e11e6eb4a8af0a73d4b6ac2aa7f8155f561a7e8770386063742a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b39ed4d6f19fe80584bf1fce258f50b8
SHA17a7412e7e736db80bfbfa84cd972eb9d7819209c
SHA2569c34a305bd2aaa62346f91eaa2c804714fbb736236e8c1c351b0c6889958e45d
SHA512c8ea97770b4f5c69a3d941c328ef251fc6c3f44a85e9b4c40ab252bb126b146221ec115d65d6b8a495d4485c58870eea4779fbadcfff5b2987bc8ebd6a76372d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD577b3e6a0fd73c8f7af71406d4a73eece
SHA1ae9264785097a7c33f76c125cb4e8a34ef5a4514
SHA256860a6350087503536450e71627c4fdc63678c45fab1b137987127ac906bde6be
SHA512e23095718645a7aba2607d0de61b2e72e60dc7e0dc4f2df9909ce72eb891f752962228c6b1ebe0e15301cc27d27a617e279ca1683d083f9bb04af91b17e0230e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5751096f97db9b2732609b3e90dce1848
SHA1c3b0ace821a7caf64d4c49be64e215746a49f9af
SHA256f33fed18b6fec6752a877a90c11b0a71d003ef84df8b38d701426695a0db1d1a
SHA512b429889345322e347158116d6d89a8a8a3888b5f735c2abddc399ef12e7aa51ed768303e8381605789b44d0f2fdd7cffa0e3967d831852b602ea83d130b078b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD568d94fbc5eafd5de2f0b78981f9180b3
SHA1eb6747ba2aefe0b07ec69406598163af3ff73929
SHA256ace2df9468ce1362e51b6d394732b901bae164b75c713864b5747e32ef5a4259
SHA51286760b07066dd9943190154bc379d5f084d8a8f7a166ee99c3a68b62b7173c2654e492e02519a317c6079da5839bb3eb302e69a2f975f9bc563512a11089a697
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b7b4d06d6ae8d3e5d6498609c053c980
SHA1719357b1699e41d8ed3fff6000f64398485d22d8
SHA25695ae0e15d222d0088e53b1ec48eda959f36560d359a4642ade5cea2ca76a9371
SHA512a1ab4f5e9173f1a09a635a7054a3043c5c7c3f7f9ac05a56f7ac2222e8074aafa710d59f2cc1205b64efe321b2f4ee5b40feaee0f5fe8b9f043ebde5711c2abd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51d128b8efe5f5adecd5dc740768dcf87
SHA19b54dbb662166e8cffdd444214e0285b2ecf862a
SHA256eed06ba3537353c2bd2bb801ae07c08860519b0c0fac7bd3cc270c535bc9b279
SHA5125acaac75c34dba6bc4f94f9de38504c0715a6ef67487776584a749d2e13196ad391049c0f6a351c9f4f0cc50be5f726b7592fc03b8a945404cceeffee0df5d17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58169addfa8728785c4ca851280904b80
SHA10c3546b54b353d82464801d07262a2529aa879a4
SHA256e5d1a0e89a6acf31e3e52b3ff659565a6dd3d7a37160239f1c1015b702ac9c93
SHA5123861e9d07a6af2fa0052a4cf1b0c26b2e889ff256adbefdf9546f31fe54080958b24450a623cca3ead1980adf30f6f28b2919649cd06c7fd778da5d280c0f30f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f090f746d8d70cf42bf0907cc5eb96f3
SHA1355211e7d5ba32daa71ac34061cfdbd00f4301a1
SHA2565e90777bf9e7f380aecaa9bd435ecc9f9c990959096082a12327ce6c215e9be3
SHA51212dd0103d214055e092e10ad18a947d2b76c8cdb2fb90832735add2c02ef077e76254b555de6ec97be892375c3e9f882135627a10e385f26ed6d7187612502b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c3d4a209f3beb433a21ead30eefb931c
SHA1117145e46b61699293aea70128f38e375fa1d436
SHA2562df290673b22c83c5e7240c0258e52dac6ab163fc65fba2256652274cf417d4f
SHA512111193966f4c50d6ad85256afa6d07c0a387dad1631dbfb0a4a4dc1628e522c153a5debc7db1685e5cac6d93df5b0d444a4344375b3b8b32fcf6cd9456193f44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD503db1081c44c5fee0fcf1174e5712146
SHA1b3d0cd24562b2a8adaa9d9e6f39d8301ded9809a
SHA25693fb12cf7ebbebbe3c1c88360ab3d3f33e2a30cc5e3be9a5828cef04d686cdc3
SHA51286c615019e00f19cb2d97a82b313ed8717c124723d3c1906edc25810211c164d679f39bb1b568cbe0919e1a2490748d901cbf61eb4a1222c263d790164d862ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ae4f28172ff46bf60700cfdb59f5f920
SHA134135c1418fbad8569b03b9a8f33dcf0b4004fc4
SHA256c1e1e10f7bc6caf8f265a9b9f5d05db9535a6390d07c8f1e8061550155847354
SHA51276d23f4f6be3fe04fffdbf9005f0a7840c9e9d09fca9479c5f06985c43345f35b03255c7cf568134877e02920159d8716117a30cd0b8e417dff3a1b30f789917
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5eb99734cf57975da8165332303c89590
SHA15ee9acf0a8fb60fa128ee71413b38bcb365e2cec
SHA256e51ea25ed417eb1b9869892352bcfba030cce2037f7c887ee2a72a81a1c3c07f
SHA512d1828a93ecb81ad5091768ec7f0bda0dbb1aac2c239c78876a39f380344b326d9575d4d329c88e0ae987d877ec812e28cf1a4198e8660f0f7b9896eeca18a72e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55ac929cab21dfd8d3dd84b15b952653d
SHA1bed06c7c6be3c5293a17e2dd485e96b10672292e
SHA2561b553b9d74d2797a99bc71aa1b609adf045d445c662c37ff289e4e1a105462e0
SHA512eabcb45e9b9a26c7a269ca0691e7452043f5f183cb5b7d37c0a661d2ae5a7e00db6404abc1f3020dcb748fe6a81a20c1c9134c4be01294e16bbbf121b89d0674
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b