Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 14:06
Static task
static1
Behavioral task
behavioral1
Sample
b7ee529f6f6b2dd82d9a5b6aecd6e2b6_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b7ee529f6f6b2dd82d9a5b6aecd6e2b6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b7ee529f6f6b2dd82d9a5b6aecd6e2b6_JaffaCakes118.html
-
Size
1KB
-
MD5
b7ee529f6f6b2dd82d9a5b6aecd6e2b6
-
SHA1
9219bd2de41372519239b54d9b8662d2543fec82
-
SHA256
fdd5181db486a0e1440cedf6171e26f6ce082a39e393c4a4507c54b035b4a777
-
SHA512
cd2c83dfbb925fbfcec73de3e75549906a885b6a714910e2dd9841779f6d7ed3c45b7463773ff682a398d9bc39bd624546c3a78e6212a87e244a40a4b3616caa
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000be33438ad9d39c8510bf024caf67fe212fc3b279fda11dc6fbc25c2558a75849000000000e80000000020000200000005726c1c538d0a808f23bc58e80d95de88eb0ec87ce87a23dcf9f97314f46ef8020000000c7fb32a2a8b0c51631b82d6014b67771968591f20fa9d71d682e601abc0f2e7a400000001267f9f4963fb4b454f34e296469a2fe237d25ead612be906f37b3c6dc4853ca883c866c26e4c9120cd9bb7748b9c1c7fd5b994f78d6b4965d845cb3dfe73339 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BB743E11-608F-11EF-B557-C20DC8CB8E9E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430497459" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e02202929cf4da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2624 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2624 iexplore.exe 2624 iexplore.exe 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2624 wrote to memory of 2784 2624 iexplore.exe 30 PID 2624 wrote to memory of 2784 2624 iexplore.exe 30 PID 2624 wrote to memory of 2784 2624 iexplore.exe 30 PID 2624 wrote to memory of 2784 2624 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b7ee529f6f6b2dd82d9a5b6aecd6e2b6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2624 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599f4e3bb5b2a42bca44516cb048821e7
SHA13fd4de492b792d52a7fe496988f91c3299ba27c9
SHA25664ec7c7cd8bd7f28c14648669de6953093a58dd97c03bdf825366a4e6b504004
SHA512c4cf948a1879ef77e29aebecd668bc07198a4315b431b56591b06c3d33aca44ef8c8ca8e56686ee61749505d9c6f880b026b3152f8c5861b80d636fe7cf0e575
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55304a522f0bf418633528b5a0a3cfee4
SHA168a28a62aa92ffb55a0dc4470e4eaaf7c4439d7e
SHA2560db257bce05533126e84f78309b193fa57cda3f91b64c76e152c31b3892c8069
SHA512d14d8a8f3295633c7d4ffb0d29c3bf0c94afa03c51c3450a845d22510b9a4ff359ffed52158ab7674077cdc6e387c944204c2883e6c404f2a7394e64b0b68530
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf14d88eb439be32027482a0556a5182
SHA1d1abf27a5b493f2ca3f475e0096dfa840509bfc9
SHA256c09f2198d52c8cc30cdae06ecbd17c8b12a33a2e5388c379a0de39206adcf54e
SHA512b89f029ee94975615972e1383740e5883d6414b67b13e0447c218407971e02bf8c53ec45ac6daa3b130e1c157660ec7214e18e86d41de5bfaed141866968345c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577994ca280ccf3b7a5ebbf71568cfc28
SHA1b87ef2e329f238c4235d3b14eb554c8e8ca4f1f1
SHA2563bd858b5d78fe4bb8fbec1ecd3ca013bec52b05b9b386e1819b9d98251e93336
SHA51260daafc16bdee980c693a1df31a97700d23b82b24edd32540581d19fbd2fad385850136e2e54c2181620398d05d68a02b1cab2c2f2646cbf9cb8ff5e766adf49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc0e52ee64ea50b9013278002933a95b
SHA16d246067516007b3717904ce1e67a205deccec5f
SHA256972c161850c97e2bac35b986ada83b71e4949d4c8ef12ae81ce539defdd6e612
SHA5121d90d329efb2c4891ac65db1b867eb9b933d32bd422f801e30192baca0e5b439e45a5f7ef186a37775b378cb0962bb8d19ddac811a4f016e881c9f9bca40cc89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa36064af115535ab964dab70e87d6a4
SHA1b89a674aa452878b4a1732c70951e327c119bb79
SHA2569d612388814bd00334f5896e415dc0e756411756e27c3652e4e6e8bcf8413daf
SHA51241931aef87748f0a663937fcfeb24a7fe9ec57f6859d8ac67c710d29fb426396e6d241ba0385bd0865939e6be16efac8f01595ec2067f540d34d37d668e8a9a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c15a4688156d22b12e01475f6d732b1
SHA131a85dc3098673f3f03c7a87a5b5217431bdf5f5
SHA256b38b1cdc622ae4b0eef08e3ef1f5923349060d04cb1750ba750392cf0eec7fbb
SHA5121ed17d0a121701ba5a2160207c3b4e618fe432f8e2e781119e5686ed0299ce622d20d23b906ef6dc5113d39b912d319ffd5b3ac5b2866bf579dd79fa4def08fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c96f1463706b10d0ae06bd13163a6893
SHA1caf213c98d034c2bde42e7a6282afc01b2753ea4
SHA256779eaae3fff694bc504795fa4610004c6c1e7fb4f73c58f38a524629d3a5c583
SHA5125133990ae49c8da0531d691fcfa9203e46c7a4a9639e5ffab544aeb1b8283b171b913718805ad606e345f82d7e4537be39ebcb84763138ceddf75a1ca7dbb5cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564d68c22d512bfa1b2b4e2401d60ba27
SHA1cdca6c6571dd5dfa5210455e1c6fec3f6bf44906
SHA256f5b997afe1468e3a660d463c7a7fa9cfde4518b031db0516554de5ffe13d4f64
SHA5120f7699d3897452f9d5a58677cd547c439a464e5dbcd63489006e2822bacdfe681e78dc90ab41b6d89e68247f298e00f35a8ae7b99571c35695b402502ffc4bc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e73cdbe4b74a10df7092f1a8d7fdcc7
SHA15a6378ea18acbf64b0bf61f153de0c1301deafe4
SHA256dc301441b76fb814c4fbdd685334f30f352fbb5028fad236924def03238723f6
SHA5128d881748bee8b871cdad69b17c5efc5bfd7d410c062b2bd7733686eceb0cfd520158a917fa8f625a422d7b0cd34edfb91d153b80416e1e64dfdff37f4842550d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502ea4be5b51e4083cb8020f3decc9afc
SHA149c61b0b241b8396eae1c027e325102532470d3f
SHA25606960ddf15e3ca6b027d315602d009783a3adc29a0b10a3dabdbc3d99e469354
SHA5126103dbf23c51e3a21a6e2a4cc7a3c3727b40f5f78fc4e10c77a3e8a12b4bc826bc5ae43d21c31fcf48749bd86e127576fd9ee1d7feecc69b5b0045ed0412c2c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5653c26594ed0597893c47eaa069a3703
SHA1ea2710a3b7ac7c90b930bbfff2bc190c9a7cf82c
SHA2561c2f04d3c2ad8dbee35236c88c2556d5747f790f877b0cb8535ac6f5c8beed57
SHA5129d774bc03f54432609172683b36a004d9a10e833245870d417590f60e26eda4132f0314e9d43fae04c634f47f882f2eda8a55246283ffb8212a2f40d3e1f95f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52118cfed07d8ce26c3a1e15e57b7f4d3
SHA19229c2b339c3082d5194dc1179ee06f86c646df1
SHA2560f3a7b277d760a372c8843fa58f7f6232746fd5680da09d0794e15eaca01c849
SHA512e78d1f212ba337ddfde17913ee1c8ed1387046895783e97f17a07f9f76d6dcdae07d7e7b235d0382cd303aeff641ceda85040d9ac7938b397a444308b33751de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537ce046d692d6209b37fa1e2eb7a955c
SHA173b4d0ce308a45131adf55c0899d0769342d19be
SHA2561913c105958a210f2c036ad2d55da1b73da4664a5b155259cb0b68d4425f42ad
SHA512e1a70cea85afc8622121c0e9bc224e28c9c7191b45d785902492ce54f1f20728b8fc3ead1e95057701a1e746015cf78e9524ad13e073c7a9c856ba7aab8da29c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5139a2d6ef30b1d894adbaaf64c353e04
SHA1d8e53d51b7a5933391e3fd13ae8c067464aeb371
SHA2564f9e9b667f026cc686f35c145e2f95994d88c682f371e09dbdab7899b9988ee1
SHA512e373425c77a1a53522b5cf1a137610170ee574200b437b9dd444590228d02bce53ef6fbaea4c76c1bb5d0c64012d4c2373f2fec4b436cd33fa4eaaf44f5b099e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5823d79a07859844a1f57b01ab506641c
SHA105fbb278055895c660b3e15cb0704120f3c5f2f0
SHA256d4835d8035b62f143eb04a355ae59c7178eaa24606241f9df78457ace7491fdc
SHA5120e62f6f9d93904eb1e58e6d2059e39f66e677c4890bc18a1ecd12015013284c82d287eee19c7cd92eaca0134693b57b272e114981c01874d8acfbb0c1dff19c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5258dfe163b1ccc9654517a7ce2125842
SHA1a8a1955774caa49a655db7535a05d97d93e0e08f
SHA256ec8f1f12a3eccb74076e0b515d9d5b346f2b49f0232ca61a8824445ba5a162fc
SHA5126f566fe4754b58fe8a08f3a629962790db4563af9ae746399a960777218ac7ef49130172ed753ef66e3ec7788fcd97e8ebf634b95498dc2f48582fcf383cd4e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c3a0c5bdef53995eedb12e4a38a9afa
SHA1c84b8938cbd0eece585470f367dceb6d281b0e08
SHA2568d7fc3734752cd521eca18bc379d2b80d45b57997609ee0bc1d07c621a060f80
SHA5128011cf259c897ce662ac0b33cd8f1ed23be570a6e6258d0c338a140fa585f8f927e5386dc9f7cdbd4dec5df49ada9920279c31a7217bdea5f4e7d736383c9abf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b