Analysis
-
max time kernel
67s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 13:13
Static task
static1
Behavioral task
behavioral1
Sample
b7c54aa98f170e3e59b8a5c937f8bc57_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b7c54aa98f170e3e59b8a5c937f8bc57_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b7c54aa98f170e3e59b8a5c937f8bc57_JaffaCakes118.html
-
Size
6KB
-
MD5
b7c54aa98f170e3e59b8a5c937f8bc57
-
SHA1
d7f74d357f1196ae3f959c699ced68fedf459385
-
SHA256
4e6e2a88359438b458ace1350e55d028b4cbf76198c7e735d5c6376d5f339d9e
-
SHA512
04ffc5d21d74333b8fe4532ed25952d48197ab44859caeb5258b2e4375c02754d66f6f6d0985379c8aba8b9bc7c35840c6133c15cff2ddd6991206bf9d0952d1
-
SSDEEP
96:uzVs+ux7wfLLY1k9o84d12ef7CSTUBNGdcEZ7ru7f:csz7wfAYS/6Gdb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf71000000000200000000001066000000010000200000003dddb4cfdacb0dfb1835f5c02dfe0a3452aef89df9ff1ee7e60eb4c982341b73000000000e8000000002000020000000d622182038c5358664e39346c160c7242beabc6021d3187cdff0baecf519d4fc2000000012cf98b0d351fdf21d3ccab5d3ef40e0123be003f2f075dbadc9d085dde0b2ca40000000fe7b00efcb3a8e6678d58eee2644fec98dcebdb996eed7623ea7aff65712d9e36ea1280e2e495942c5516410236ee5bc2af211e2f7f5ead374431fd0d7bf5145 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{624DD731-6088-11EF-BB93-DE81EF03C4D2} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0bc1c3995f4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430494303" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2204 iexplore.exe 2204 iexplore.exe 1204 IEXPLORE.EXE 1204 IEXPLORE.EXE 1204 IEXPLORE.EXE 1204 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 1204 2204 iexplore.exe 29 PID 2204 wrote to memory of 1204 2204 iexplore.exe 29 PID 2204 wrote to memory of 1204 2204 iexplore.exe 29 PID 2204 wrote to memory of 1204 2204 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b7c54aa98f170e3e59b8a5c937f8bc57_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1204
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f52362685adcfeb88958f8c24d67de7
SHA1e88ec4419a97b06af80cea8c5f12b237e5e1e9ed
SHA256aea4ee886c68c8945d8dc38a4c44368f63fccbed2c95f2ad8518c7f5f5eaa920
SHA5129d72069ba8c5a81a84463cf68c001bfb01fad1a0ff760e6c9fb913846c2b8acc2d65cba67bd059a8261a9156cf24a822d617114fe6911586944caa1871a8dc02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579a2f95f2d7f0754fdee4113c4fcbfcf
SHA1fdb7a4857d4bbec115ee1154299d814e29e1c1ba
SHA25609ebc8fcca1731ee505baa2d218f2af70c879e13eafa63dbff755992fae2921c
SHA51241593c534bcde3f3c60dd9a1a2827f36b1c84c7e31a51308bc2a90a43e7ef79eeb1ad2ac0e9819e2fedfb63d3648dc5e9b50a4e578ccc699e10ccd3ca9b8c5e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c03ace1423842887e904aad38af4692
SHA1c874187e4150f944bcf01649abed8ca7cd1e6bc7
SHA256ea21aa0c7f62be464ce222457fcb53181bb1f52c7a1f8560a2ccc8f363ba36ea
SHA5127ea74d8d50d47cacfb78432a19a0ae5f1ea8da3adf5f78d765d9bb6f67b6111b175db3790d12159ae818e46978703001bd9b1deae8874b880673a5f3416cc816
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd823ec76c6504664a28eef81cf78a5c
SHA1e6804cfbea66ad485a9fedc31f9f55043d7d67cd
SHA2564156c56ef4cf7361c3ee79d41880fbe14a3113d9b4bb4867a0e025dee9958528
SHA51288a109e030caaee817694184c1b9bebec2a1dd7300332a3171e1f47280280944d67a44d9a3c06cbc7c368d7645d1cd38114cf778b34d61b60475d4938c73e311
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589cf52b8cd2d4a89a9b585090b1843e1
SHA1c6fd936ddae9157fe774f27771646f9458fe81f3
SHA256938a438fc4b36cb23df3655cf8b25eda6cd91eba579dc291d58f8d963b30075a
SHA512e076dc396037944b5b2b9230d9c6f7233490f1703a65677eaff899d97679339efb4e7a5e2c8010e262e0b779a7b243421a8c3a37502486386e87304e67504551
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4e73e40d4d170855e35a9ba741d6a91
SHA10164de80f0e18e00e2de4becb39f09966e65d9f7
SHA256bc418d69abd05704f27408ce82faac6bf44038db738afb5029165cebf013f57d
SHA5121da8e3f4ea31ca47d2ca634ae1523ca75894528dafae37d27c322c50b937e6e9e554bfc651fb409a18856b667baaf427a8a3f357ef6993ba25bf42b840d84ee9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ca095a9836cd88ebc976236b67de166
SHA1f12640c1aa2ccad9d67eae4a999b505c27a5577f
SHA2565791f3b7a7ddf83fe23621b8f9dad8bc59b9be8056306329996a8fc45c92083d
SHA5123977765742283af756746f4ccdadaa2e9036358d61bb46d9af0d11c9a8c5b5af97352a9429390a22133b98430f28132ffe3553597a9f5944ad25b060e84c5233
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5235c5730dd1a7f08d5c5070974d6affd
SHA1427574c53f63c9cea9fad47463f9582e17fbb996
SHA256be4cdeadfa06bf5bca0886adbf8ac738cb4c5f8c1604f80df7c7aa9b20729eeb
SHA5121cc5cdde4d165593765a6a570cd421e0953e1e90faa27a12a9d23f150d000af2c167484386dfa106b3caad0cfa92d4c37be1d7266c16eccad23bf7a9e386cca9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ad732d865c95f277ef426ea8ebd9d03
SHA168010ba0086adc99406c9c32ff9a0243719bc242
SHA256fd619a1df89822070bfe79aa6c3bb61e754e30972f5eed6c2c1dab3d4b4c968d
SHA51232e7da43ab8dabbe26483215f59e70f229c447a2e711a34e69feb9d3d2c0e0603705cecf4281bd2e9648ec4ae126a1b4c105acf3d313b8d4c88c01a9179213dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b3629875495ae30f0e614226384300d
SHA181effda7897af8efdc3330a3efcfdfa4827b1181
SHA2566bcde12df2a8c711cfea2d8a25edd0ca4c247b15fd273ad85bdea356bb40e51e
SHA512f5528931ad14f7d9751dd5047f88efd9eff7bff1e61442061ebda7d295cc53c72b1f4861387f03f45316d93022d135ce6eff48797cd272663383b4bec92be513
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6364b773fd31e9366e8b2d5106589b8
SHA13824d40a5848e2f3e3d3a5d15d6ce56b57914b2f
SHA256a5a33b8fdb042cb76a4feb73a6aee91bfeff797b663fe0d70eb2f4f12bd8590c
SHA51252d1d9c55a8d9a71d212f120205a975a59bdd0d96da3d771b50b0776635919f8225f94e5d09c3ffabae15cc0a5ff96cf9525ece07ed27f9fe2dcf53f4083c336
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ab3a661c23679f215ebe2a489561f7e
SHA102e77e164d02486783b4a2cafb389d04304960f6
SHA25636deb3681ac87d60baccda904b1713ab9b4fb2090a41c21cacdbeb5c69ed54e4
SHA51272c1ebd4b38fdb2e37976ebd106b2478028f610ca7059823efcc2f0efe94f75a1f4587f49103733c817bce69f26c2aaad9e4ae40a1a297e08c9818f8adae91ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565da89eaa1ae418ec3488ea8fdc6faf6
SHA1e44304a1bc47ee3d66af69260bf0d2aa5f0affad
SHA2561e810b6168ff4f7f095700a3c8381d56b49fcda3843ca68f1211631bac23ec2c
SHA5125527f1989c636b95e50ad912874a38aaca5d8f2695ce9876768b5c81db26e00a35c0b164ee0ce659826ae33f384f49fcc52dc6fb5951e05c5609c2999252b599
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513cfb6f7b29f0ad0e11827e5fe4febef
SHA15532c41e8f12bb5be365197651f0eccc831e8d6b
SHA2560506e1b85a59cc9009a330adc4da9cf8c13021a0effeeb011d853275a0e727a1
SHA512e6b464fff9e8d9156be0949ba00f803ab4d40c5fa376254f4cbab199f3e9bd278ee03c761b02e5f17960fa08b55e701d4a453a7da651268a262ff8a9afad5884
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5699cb32b349e605bb57137c1d034207e
SHA1f243f10208df1833b236633884ac823a37a09289
SHA256da7f07fc86bb756a1871a803ed1fde199fb6188890f0bc3d5d729c4fccd9a91d
SHA5123f2d20a529991fafaaf374ecb0747ec490a4ceffe3f3f83ae886195104bec05ddb18eae677384c240693b87c0512a6e4adcfa92052cd0d3912b77ed0f090dad0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590d57bd2ebb38637a8559f4b7aa7a5e1
SHA17de2126023eaf7ac756b0a0012de862d88fce780
SHA256363dae94cd352c43b69d8f741397fa48c2dd4ab5501721bca8dc5bf72833aa62
SHA5128bdd280c3e5ffdc308a5bf70f7d938f5d51cabdfd6f5d3d51adffff8ef2fbe618d78e5371024aff975832da624c27c585f19016c4353eeb3f4a593d11415a991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e362e3986be790e192b484a745615217
SHA1fe53142f830dc2aa2261bdbd3e9b803ad0f8a14a
SHA256dbb6b7a9abf3212695f1449303011076a010e862c8724948d1929d050b153ff3
SHA512f0194e835928e2da13563e4a8d1afeefc7561b45fe21c9a7790f578b107d8b512c635150a77231cbfb8ee34471d733a36ca87a3d81096b829cdd42bc1889fa88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af834197596224f8f0d6f3c09862d05b
SHA15c8d152c8250f1a27dd1153c6d975ef325aaae3a
SHA256fb1ab69fb38450cf4918e87f555e9e052a0b65ae63820803e413449e3842020c
SHA512bc6f42a645ecdb348c3b0f3d3e198eb9d8ff22ba1deae36030d0b559ddcac62e83a5305907844c1b38a5783a8a6f2d1959d14c952be9b06e225b8d0f8e54c92d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577f5a50ff6043332d768c096ad7cfa13
SHA1bae339ecb9f2b4c3634d493e1bb8e96b8167271c
SHA256a09b3acc48cc09e9daf158ca1f5a5c1dcce59113c226af9a6d0e1cb41312d6f8
SHA512ad68c9e35b8c3eeed105ebbcf4f779dea4d8e29735e3706daa9babe77a4a7e62b52caa2135a4a945982502ae4e8c935a00793d9c2325ba06f3693eddd0e663be
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b