Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 13:35
Static task
static1
Behavioral task
behavioral1
Sample
b7d6e42356e21a6e872570b6109f9b82_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b7d6e42356e21a6e872570b6109f9b82_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b7d6e42356e21a6e872570b6109f9b82_JaffaCakes118.html
-
Size
14KB
-
MD5
b7d6e42356e21a6e872570b6109f9b82
-
SHA1
3bfa53502e6a267a4ec6995406a660800a942f01
-
SHA256
45d31574233d05858b95fbcf969c320055e26967f357defb12248204a2e780b7
-
SHA512
3eff88030eecbec95a62a180cd069ffcebdc53aa3a8f210695e5dcdacfe1754812c4c71c7832554dd2579690568a1a6619b109fd542f12033536055e57069560
-
SSDEEP
192:Cs3Lc3J9K2/KG6ie36JSfRYOrHaHUiYihaXuayVyI8Kh4F26HR:CIcZdOie36QZYObaH3haXlyVyI8YoZHR
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430495621" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{73E2B261-608B-11EF-8334-424588269AE0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000b5a175bf0d522c9b49bc54fe2716b7f6ea5254d342cc6168e3bb63f1a93d2b14000000000e8000000002000020000000fa71c1dc8a2d608e8ccfa72713e1fea6f1bf92fede9fa08cd52e8b4c2a9bc91220000000c02397252dc82406eef8184823b87b57c37f4e7f97604df7ad134ad80a0c477140000000bd3da500d9e2c5eaea2f0186c678b2990c62e13f065829869d3dc70fe6dda3d13d51381a9665093f362fe7d606f363e09610a0427ed532ac185f841885b89322 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b034824898f4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2992 iexplore.exe 2992 iexplore.exe 348 IEXPLORE.EXE 348 IEXPLORE.EXE 348 IEXPLORE.EXE 348 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2992 wrote to memory of 348 2992 iexplore.exe 30 PID 2992 wrote to memory of 348 2992 iexplore.exe 30 PID 2992 wrote to memory of 348 2992 iexplore.exe 30 PID 2992 wrote to memory of 348 2992 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b7d6e42356e21a6e872570b6109f9b82_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2992 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c04b39f26fa0d9781ae76315b3c5f9a9
SHA1e87054a62cc947b276712da1322eeec2904c6da7
SHA256e4978863142f4fad06bad2c44a9c83bc7b95558515c5994a2b1143fb3db5bb21
SHA512d2e18d898145f3f5c59ef7e5ae2f37d762c9c1d6afcdd9c75d0a9ad5919a9832d04a4ba8129e735f98a9ede5c7adb2be4de8388527a637110769eb55cbec9a06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a48d22df1ec60297989e73022896bfd
SHA14ecef8edcc538362a50225b332acaa6fafda8736
SHA256e0d151119e856ab176a4ba8bd687004999146813a811c831f4366b65383a8bc3
SHA512aa3a1f392c59a052f21bf0cadbfca8689487e983cded1e1b73b01410dfdfda1cc7337123de99a2d8bee93ec0e72228217cd25b6004e7f3c9339c60eb02255eb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cc1e0b6553b4b510b5c64716773334a
SHA170d56439a53756c46e8214d1c09ff499ec39c88b
SHA25635ba51b27155582ee4d47114549ca3d6d57f307e6ac51910e09ca84847890f82
SHA512eb1ad76486978c0600cb45c6d03efc48c5c09b7b1470acd9ec5ed4c7735013fda9e38560ce9c72b96d801e0e2132b18cbbd9854c14cbbe36d4a48e4d9b90a9b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f6c33ed7ae8afb62f1dae15d3e3ce7a
SHA172a7b20ac2f7457e6290ec71710c03f0aeeab6dc
SHA2568ef84b358f075455a3277675d3fb278d23cfb4d38bcca2515e16692a3c318c63
SHA5122c3b8951a262f3e3455a7fa36505f4ef2f15cf0905e8cc8b44076ecec88493c6c579d4fd981571dfa515c578fa7bbae543a920ffe3248e447765f07a60527854
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d3614217afd3f4e052ce242afc0a5db
SHA1036fa144ebc29cca4314a8ef8caec368020d363a
SHA256a8e452d12182a12369c01c4bc087c8e47bbbee14da58590b44b5f95d64df2c49
SHA512b88179f0da926e8f4830e2b449030117aaaef70935977e96832447633619bdfefaaf772f1f8f4ecc5a2e1a21b4c04e7a16c65eacbb105ba53f9782027a70b481
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc3d897a68df0b08547c2fc668bd322d
SHA1224d507fbe2b7180f9f469bc621c8891262b4029
SHA25629dbe082c97862176be5164b315c1a98f879d2f7e2e72621b47c5f8be1e8281b
SHA512b5bb0e033aa4ded04d7289005fb619f453e2ac005e1cbbd34336822fc7ee4ea6287b92b2e67f2c074d910c076ffcdf5654130e805c8ce4acdeebc41df3186a2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8cf11828d017c3a9938b75b5ed2d9e5
SHA18197115a4342675c438a1c1d91df140e01ccb48f
SHA256176e32830a1d64c0b1052611200ccfd73287b12e2e2547fddba3a11c733b840c
SHA5126189da0dd2164569614f4affc0e6043a8c11aa86aa189fe3241b0934de8cc0092a1a3fac0d18cb008f9eca40cee20f7f21010ce312395af6d0921e635a84f372
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54721b68b36cde9a721e753574b2a9f5e
SHA1b70400ec46f47d05128d63431bf2e1fade86d2b5
SHA25606ed482e3ba79e8d597efc72e8d3e1a87e2deca0cce36986d0d6044ff51590ea
SHA51226c9ea3cf70d447c2be04d3739f9d550051854cc4759e1c08305c9e062dc58cd8edf3021a040167c8da3228c7a54816505734ec45ceaa6d4b0b53fe869ef01e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5d8af7cd851e9893e41ec0efd4d3e8e
SHA1c9f84a0999291359e99a73b63cb848af6dc52b51
SHA256bf8e6ac20a898472749eb5574bf57e5469e0c1455b678dc89fd7c2509ab08d43
SHA5126562cb5eb0674d284f85290d38b764b4370fb05250d9ef0b393b9a74f57e9dd46e0cd6d4668f3369ad3d82aa9678d20a23f29f9fc9061f83f69e6b600b6b26b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f83ea9f08c2e19ee6df083b67e41cbad
SHA18e969ba9b0d95f9be3b182720e92adae70c262f4
SHA256a8698c5ceef1d142874871db400c14462210c039d2a8ce8ad2f488590cf2b7e7
SHA51250467d4b0a7ab36f6f57218df1161b110258c396626cd1e015668e645d24bf5fb18bf4467586d6718fa92c8eb8f5917992c712a6e3de3f9cfb78626dc2721451
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b13b35373849da003c6eb9635d8dbc6
SHA19bc7a3ebe6c241817d9a9f870a964055df5199c8
SHA25608b7b2d0a0d06eff48d3b476c6cbffe0118fb2868d26c4a0fa8f3d4cd8d2d712
SHA5125d03617e2cc26fa327fcceefecc2781585adcd50a96a46ed6e39461b657c55ea15609f8576569b1bd624ff455bcca65ea519e59d3fbb446431c68901496e96ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6893eb7f8c44c3ee9f839e44d6e5f03
SHA1eb61f6468c601cee7eaa240cc4f3bb8df7089b54
SHA256dc11e116d2a5f5968f83e1d92cd2b09946d722a46be679ed40eca8d998f80ced
SHA512951b4c98988189344efb4440eeedd94647d7544e6d8ca13e6684cc5120991229ced9127f0bb4ebed72dd394187d4c5c9d094ab7ffe4940bafad585c8f511e4f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5192e7d5fa5c5c0b788016e1e0bb61a81
SHA13eb8422006ba1ec1b3647da0f559119b97afbae3
SHA256afe2e0ebe626bc678e2568d036ac63bdd99163babd331b7dc644daf30fe51faf
SHA512a810a2549c8f0d5053a9e2b81b7599c4d94bfeb0a3650e05e55aa6d3e6baf75a44d3b2196588ff3fb4d9d02a246f4dec758b53008e8d97da98e762efe26927a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556e029ada9a4c0c7dc0d4a44176a4120
SHA18d51225bb3b4a659357a2c5306b7929c89efd00f
SHA256d400b6499a384214049a3a1770a19e5c691f456987a10de5a897836581185eb2
SHA512bb0534c35fe49168fa23fca8611703b8860d69fc48b176ab54761ab4ef18817b7d04ed458e6c0016c8cc67f56017c1140ad2c5f5d986da25ea13677fba7a9691
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54350e8228bfd00399883756ad2bb3869
SHA118a8e6bbee6c4dbf2335c0a6ab38b4cc8d95ea68
SHA25685b0a4a267123d0fa1faccf83e28c9e55df08f40a0c901188e08145b73cb3c1d
SHA51221d47f747eb597f22af8bf5780652f71e988649fdf2afa7074359d04493044ff7e1dad89ff22b93045fdea60b97f98c1f684a4bae03edc5d5de2d36c1d00a140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598943ad432ba50d79ecbad55991d3540
SHA10d8907740796e8ca1efc725bb4212a3bf1ac9eba
SHA2565078ecd7d8e4db08db35fc906e4a3a5efbc21627f7f745b861c7eca743c740dc
SHA5124747b08ec5cc0be67c0f9bd99902795f2468fca0b8609413d471a9282d56fc3e360c4a4592da4f989e6801c82c81df13aba83c28a098a9e2bd1ebbef869d6530
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f0e6fef1dc89b96c4ae6260b3bed0a4
SHA163fdb85d55c9c3564dddfb53118909986c6241fb
SHA25624833b1afec929b1df30a636a9f972d971c2e38199f469c8cb238d91866c5d4d
SHA512a575c8597981e8206b86000fc1b3005ce579c9991fbc4de12a02d4022f296444343b5bc408f266ddd293e941b54d23fb89fd036e56328fd47be0e2677b5c449a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5467db0002284b3695e15195702573989
SHA1974521f44e0c0a855171b18f3f3e6d3b48d8d7e9
SHA2562f9779aff1777982cc799751d813b297dfef120a751b9c79502b9111f0821180
SHA5126a809fb81bd9fe9af3f2305b2aaae70db5a810ce38d4436402c3e8e5be47a849e55763355bed2277f9e1f216045b4db00fa8b76c6e5cb2aa5d404b32bb11a28b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b