Analysis
-
max time kernel
136s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 13:35
Static task
static1
Behavioral task
behavioral1
Sample
b7d6552e8b62d8322194c14be0165f78_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b7d6552e8b62d8322194c14be0165f78_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b7d6552e8b62d8322194c14be0165f78_JaffaCakes118.html
-
Size
6KB
-
MD5
b7d6552e8b62d8322194c14be0165f78
-
SHA1
ff973891a7090ca510a40b63a338cf942e1282a4
-
SHA256
c944ad5832ba3a38d5e2a8be448d7209932415618e7d7822fdf7682884ce55d4
-
SHA512
0f8de232179c98fd3bffd4becc81cf06b9ae617746bad8db94178cd3cd1c120415a6231aef21b79a2afae4bc3a5ce876fd59b550d55a26a472ccebb8ce6172df
-
SSDEEP
96:uzVs+ux7PLLLY1k9o84d12ef7CSTUWR/6/NcEZ7ru7f:csz7PLAYS/94Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430495609" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000c00ff7b611bd30d3706114f0627e3aa20cb274c46dfbef1dfb5d61d833f7b609000000000e8000000002000020000000430fa3a7e735b75b833df7cd9439919b070043aa97a9ac8f8e947497d6e0b41e20000000f5b0bcecfd26d09f438ecd2172b43926a8df34bbaf79aef34d0ac4c34951c52a40000000dfb33f36adf847898bd23840e7557c0433d276879cf5dd25b04231fa037a5592f5514da26b3396089a8c28dc427c6138ac058f596bac0fbc1f0b32d7918d6d3a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6B5F6021-608B-11EF-A533-F296DB73ED53} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0fd395998f4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1980 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1980 iexplore.exe 1980 iexplore.exe 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1980 wrote to memory of 2736 1980 iexplore.exe 30 PID 1980 wrote to memory of 2736 1980 iexplore.exe 30 PID 1980 wrote to memory of 2736 1980 iexplore.exe 30 PID 1980 wrote to memory of 2736 1980 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b7d6552e8b62d8322194c14be0165f78_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1980 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd23fd8350b9459f7b4a8f8431808ed4
SHA1e417595bb920c7babcd85b6621441d8a81f551f7
SHA2568199d6ab0a9319ab1e7cd0786d6f9c2486908d23936f1bb0800e72fc14a898a1
SHA51288b50a707f59ec8c7fc9a74bd2d702722dfda5361271987177f4486c9657f204ead99b24eff65df04254871be401b0aff377e73fa4a0239f8eea3e4725c28255
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af362bc94174e98b7dfd03091d44cfa3
SHA1542116971f38fb42380a57cb8484b6d7b4a8ec50
SHA2566048440ead432c1318205bdb87fa2ec70ac94f9b92619d7c76cfba199cdc78a1
SHA51261ef1e40ac3686ac8203c56e59a58f9b96955798c4e476636837758c0720c20f58ad5c453cdb8ea87daf1c47cdef7d918294d37681f7e683370f479e49ae6072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f13e399c7e88947ad863e8cab52c3bc
SHA157fb4b299273deea6e3e24b5925285e04623eda3
SHA256703a3cd6fcfd5855f9df670959f942bff0bfd4f7dd5a249509749f7201f814fb
SHA5124c9853d106aa3430b368170733ba3b278b2aa37ac02830b39875a38cc12455ab1ccba9ba9a4cd3c9fab8fcee229b8ff89fc80821026ec2ad32e70f91c8a64d44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a92d4564da1a3561c8a5d967dc8513d0
SHA11d81c218d8bf94eeb18d494980914c8107f2a585
SHA25609c4d5b9e3cf2d8b8fff79b5885d1436f8f83eebce83b1dc843a0c4c1d539556
SHA51273f392c596a498dc24c9fe474cbe04cf3477708f6031452e1ee452a49d883fc18cca6f3321939609057f96a02d01dea6df8954c0c24b47d6fb0290624d8b8402
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9635752e9e7a27ef893ba9c485a7518
SHA1bbb50941a06108ad94b181db83802549fa668b9e
SHA256093c746853c6163b6bf68712f70f885795dda9faebd85ef852514411a79fc37f
SHA5126533b782db921bebfb7fc206c9259e5a5037f76ad0a1fa64c3864af4bbdf83c0619c39411f23e03eebe3927cf5962cee1092922a335c05616ba06c9adbc69743
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c88c7d0ae9952a52aec8f59fed2616a
SHA1849271751640672bc8cd09e0007e7ea4b632bd8c
SHA25645f2b73b92a879981e7b6c5ba3b1111c1f7db70a403de522851e702759ce416f
SHA512ed47a471fc019a0fb8a15cb8328465429f6286c50f9cd9989d7948dba105587995eebc6ebaf5fee9aecc3837350573cf0e60e2f8df6b875d7bb7687a63f5073b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c752018a147615f6082b5944bfef4955
SHA1b01e2b7900e0d2ce4625643959bd434a3e5a7626
SHA25640b1914ef8dcf0717421de7caeee4bb95b746d91d7b1c2f63954dcb983ec179d
SHA5123e33b1f6c8023994420cb9c265c24cda145579d523159809748a87f8413976d028fdfdb5a56cf20eeff583bd6209169624a3d0f17e570e6615b2f3f0d87e3d92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b903a39e3edbc61cd7c0585443a00886
SHA1582c886a39e93019c9142baba32132b036bbd748
SHA256fa78c1679b7fd3d8d31f1838dfa3a3b20ec55f157718012a468302344d8b45d0
SHA512eee88f4c69a526d027066c2f92aea33cae37dacacfb331650d860f3d9d46f5f829c79c320cd85edf0d89d71e8b61fb6e046262f3e718aa3ebf67ea9bf3c4021d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503b151aed3f4a00b619c46f1f755ab95
SHA1f9c7e31ca38e11efed47819f1cc3975be40504d5
SHA256fd3a04c34bcb778bd1d59149e0f61ad3c11d2ef05494a3ae6c224241e05d5f12
SHA51217739dadada10113c53d82352ad551249bedc0c9063460a2c84db186ec91552c83df1d8e95ec0770278e95c5d99e156220b5aab667beb386dde0b8e87d35a586
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe0351edf04fb6c62f234367677749bd
SHA1decc3c409c2218cbb4ce9bcc2cab3bc51a5a8712
SHA2567a73148c0f587df1f8f9786aac11b323e06fbc9cd68f22e792b16878a3dd0b5c
SHA5120b6c7bf4c0f46f59f0f5424ac70ddf29c664200101fd97f7f10c3c2a6df7cf0bd49f7f382e1141850bf8f6bacafbce253dd149830a96db3a9d001ad8ca2b3ea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c35d8e3c12e694546443fae5f3475f7
SHA104d956c0c6bbeeb5426d9e1d1c89e47b4b33499a
SHA25657be53065ab674748e9ce19e21e2775afc6a6000e2d1a1d25218cd7363989756
SHA512efb18ce1e59e4a4289d0c4e5b354025192324a6bad0e0d4a9c39e9161c1496d3ba21bbae6d0732dd257b27025cf4d72fb66cc3619a5301a8013328b8c5be09ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51337d3c4855b0e48df9f3f79eb1e9e41
SHA1ef98c9998c351cd1bb5edec9368ba2784a0f1826
SHA25644b85b57091400962fa4a445f60450d9b7d5cbf07091fb5858144a52f2b8bfe3
SHA5122c3d8479d94c4e3f2cff97d31151c7c318f47b520d27d1a2f5b24275c45e75c14fb1ce00c0b720de18abe150c960e5d13437369654012b60b5fd01a14ad462f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d08546b6cb135ae93cba1fb5150cddbe
SHA1c7d440e449f3bc3143779f139230189725dfe6d1
SHA256bd830d78a24836cc13bdb296abd8582c8377f54093e3de06315b24d0f9dea0a4
SHA51222c364477a3512f40b96140fc6389af8f289c04ca5f06d1b7971de6d049b2084fb566c5650d9024df9a48f2680dd188b6ada80e32b20b43a47f061942933c7f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e17b78bf30d810ca2ec0e6fa1bb0a7a7
SHA192f46e65b7aed33d4bdb1b35b607f28b8f7ec28d
SHA2563b7ad2375e5037b5edb4fb691ce27798b21d322fe11fdda550c01a37147b76d5
SHA512d916b248a1910a455c5d00792494f29b5783eb83d2a53d6a48f255e217aca560b0ad923eefb2a8daa50b41dff7a788c0886c1cdecbb574fa5f1719b292592025
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b32ae5bf19aa03661fad23ee0c4b986f
SHA137cf93ccb1a3a122d479fdac3a3547be17703142
SHA256a460b09c0c3348f014443503c8cb0c7cd7ffdd5c3be0603c8c90719ed4c7cb70
SHA512dd895406e684be6c0826d13b45de042fc244ab78471d557a419dda87a4782e0cdf835aca1ecc20c516f937f8c1b75f573d18911a45926f1736c559ea5d3c22ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed203f36966d2d1b5833b048bd78325a
SHA1032e0f48040ce1da6d7b723112f7b8191f81d900
SHA256dd3d0dd670d89de9b5adff2c65c5b553dd5af9f4deb6455d357b1b38b298ac4c
SHA512ff98ae3b742331dadc8fa3b94efde0edaaa21a43dd0d4e8c57637245c61ed722c274875efa3f02af6c1d4805680ccf601e0124805efdaec7625ddad2b9a67fc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5138bc8d8719e37689ca7e3def8c7434e
SHA1b91b47aaa91eafc6466b3b849e5ff833658af169
SHA2569c7bd2a8c2b16ad9c6f68597f6afe478ee655b86b60635a8324a035c3535e650
SHA512964d1191dac417023eebbc53f185ba059be295cbb089b3c3e411f28171fee173a3883358aa0852357d7c82554ca72f2acf66ff51473a645cf4e357ed1abf19a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5021885fc34a3d6b3aa01c80c77ce4bfa
SHA1b47e1bd7f1140f9d91e96fc6cf644ac959345c11
SHA256d08a4acb5615af2ccd534288296b588545767205d2a34a24e29be201ebac8648
SHA51282f36d66230aace5afa7b03b04f3317068440c3237548f8be5c042004ee25d6a1d79c81f9b741cc87573e443c95d7a07fa3c6447759eaa1dd580c480ba1578ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6ed19ce328f3ff1b6dcac7bc376d785
SHA18e5db6a6aaca2f9433d0fd20c8f248123dd40ddb
SHA256d2fe1afd60067fdbd4b7239d9a092a068ea74372776e9627b520cd71288cce3b
SHA512d9740fd174a71a098412369e1dbe489c17cd1e33184b09d847c3ca1dd9b5ab138014d939fcbca792196b15821da4b59b8b0e020219fcd511d5f7fdb20a091769
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b