Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 15:29
Static task
static1
Behavioral task
behavioral1
Sample
b82a2e74b8b9a0b576a03c249148a2d6_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b82a2e74b8b9a0b576a03c249148a2d6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b82a2e74b8b9a0b576a03c249148a2d6_JaffaCakes118.html
-
Size
6KB
-
MD5
b82a2e74b8b9a0b576a03c249148a2d6
-
SHA1
fff825baece5d67c087cbb8ff4f544ab1b30d5d8
-
SHA256
435a565100961b3dfb56180bd1fd7c35d7061361411cbbd6d30fadb22c8e7e66
-
SHA512
095007301cd6738389a5cdcab1cbd671b883a5aaa33596a782eb9fb66849766db97d895eb747c63f6a8913a4c728f1d4a395d9625a0d30e63e2051ab9e739015
-
SSDEEP
96:uzVs+ux7L6FLLY1k9o84d12ef7CSTU8KY/6/NcEZ7ru7f:csz7WFAYS/74Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{502B7771-609B-11EF-B5B5-D238DC34531D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000002301b8c04b49bbaf2ae183607eabbf2260ae9616ea79532b8e7e28248cffc00d000000000e80000000020000200000003c93e600957b155d951cdc5405f00e84254313c8406acd3615cfd3bb7e2dcaff20000000a477e1ab65792cdf62a089d6c08b62ee8dede63d56bf22476d67a355eb48679040000000a1976ab6005bd3601ce9e60d8f4dc83369acf3fbc710b51d3f372949619d7c8baa251e5a4a927bea1700e5c8b5c7612f44c41864fec62e84af77ec3e3f8aa566 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50c9413fa8f4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430502433" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2104 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2104 iexplore.exe 2104 iexplore.exe 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2440 2104 iexplore.exe 30 PID 2104 wrote to memory of 2440 2104 iexplore.exe 30 PID 2104 wrote to memory of 2440 2104 iexplore.exe 30 PID 2104 wrote to memory of 2440 2104 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b82a2e74b8b9a0b576a03c249148a2d6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2104 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594f1eae789ca6adb005cbf3686e66392
SHA12d055fdfa9bb9b681f41eb789d16c7ebbed8024e
SHA2567b2660a528ecae6acceec96c5c013b40b1831712ab153f869e3b59a58dd54d6e
SHA512106dbabc39f5036176981acabbcb9e180dfba515acfea6fb3d98d56224359e9fb1633558906d92bfea999bd05017a976ab0d7b59519ef9f92d9f144004aed40e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57213ddee9807b0529e5b81d93fa98400
SHA11d8516d53da98360441757c117222e0b1c538491
SHA2566f85acfaacf66b8e56cc50f45435bd4cd31656a0ad11459c730f1185bbdf9905
SHA512f35816ece2de9270d49e8e418864f3b49d6ea5893cc2f3110289fa4cdc3acc52dcb21f3e273b15868874061a7208af00564a3f5e5f2222bf7afa14d82d91d4de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddaa0835ca0a65a9d3fa3b32e96363f3
SHA1e38c751d5c72c195e445ba2c0565301e53a3d900
SHA2567a487d95df4a7ad6b141524dd73112a55042cbab23614f7edc321b236ee0eb54
SHA512595b3978e5a126a55c0a319474700a7dbf588afa60bb67f96d8bf3e6538a8e1e7779ea2a974224ec155cbf4ef6a72efb44d41e9fdf7c02c382044bfecbcf7137
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c66b1d8a44354c71d46deb1c64e2b10
SHA1d1121d774b3a550715dbd88cb0dc3ed0a6a64749
SHA256e8a05a5edad34fd98a4da89ec63b44d3001088b145c3f24c15f8bccf112189f2
SHA512e63e87239a1087624161353a17ae4a3210a5e8d0dddbc5c4c29aa0d50300e485892b1d997759c9fdda7099315438bda2fc77e72b5298e7121a6f222a76fd14d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55de7b2db469f82781241721e20f5dd12
SHA1b8cccd16ac58372c8f06b30230d85f1af507b945
SHA25624e20c87ba065e4ddb4eb1a33fb2a13696597eba2d2f7bfd53b6886c2b2f775f
SHA51255545cf7e497995b5f7b810e25141628141ec168aa3176cff6d5c998ef90c5f0040954b5b778f4d8edfca295ba61c959032ad17b2a21921f23046213da128783
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5524443194a6687f917854032ef15518a
SHA1b65aaf97350a053690e91a58825414bcab5b6d09
SHA2562dd3709fb1acc3b1d4b9101e6b5d12d8fa7efd14c9e8add8151723f38b5cc608
SHA5120640f661649f901cf7980771d1f33f04ade7a52c649b58da6080f1a53364e2e16eebc80b936a3f395b2cbaeb5212f843d53039a82d0f94dea9b2fc659b328b51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58eae322486e3648c59b21cbc15166706
SHA1f328e75a2db8e6652b90c1abb1fb0711c09728f6
SHA25672b902a5df4210463b676cf3b13564a2010dc75c2c7079c17c2123e6910b609a
SHA51207139b2e79eda1278b783d5a3935da2c8cfcb8ffddfb6450f05188a77cad2f745b13278c247e6d252c7725565dba0a1845c98036fb5f0e9878479de3cf78e130
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589f8dd243fa07f60f167aac5440bbb93
SHA1b9596b57786f6a3b68ac3ec716950122c34ec832
SHA256ea7b3eaef19b132c42723623a8867cdcc6452022e2871ae1f27b7eaa8e21708b
SHA51278c332d892526a86e20335b243f62423f941ce982182c2d910a4e5c5316c49826aba712ce3276cd049c5ad4e2d7925392713496f16998e0973db489a1a420a26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551e31250c756adcb26cf89dd4e8d8fa7
SHA11cb7a08cccb13e94046441eeaa69ce76cb86bbb1
SHA256a2dc3363e5024b43ff7db364d7994b4e4b69d48627bd03b68a0c47f10b474f89
SHA51266f514e2172b0f09747a78c88613035bcf74b573f3999b7936ff6504b8e5d622b3638c9f6c801dd9c214d1db48d679606f61104032d08b4c87113ff891032658
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c59496d3340ce56750209a721284b672
SHA1589c2a72c299da769ea3b582e03687c606468ab0
SHA256f6767f1fde287b72912b1cd9aae1d31c4adcf53e0af336e6a704e57b53441a9b
SHA512ec1d5ad615e89e3d79cfc0f07fa53107ee5f0258dac63f6bffd5b9b2a07cdaaaa8edf70a14ed2be0b1a1f744c986351d5bf5f946ca25ca2ef84bbac1de9121d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e432c5cd0d54a49e090654b95baf56d7
SHA1dd38dfd4533349fbc900b21edfee25bd5dcc7d30
SHA256be9a1431f4302c29b22572c7aeeba5566f891e21c3bdefc4bade28f5abcf2fd2
SHA51224d2958b58e5d5f35a685652b839179a287de890c04cadc41439e62609625a0d8d6be5cb9a350551809236336d9f1a078132e0b5335b12ba217622c0614171d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59746dd234be2d5fbd6c58be989cd05d5
SHA16505f659a7a9fc1fa9326e4209a2f5b44587a32f
SHA2564979f4154dfb5901c13bb90028273f92c9d109fffc8b6241d08a6651b07b8c1d
SHA51233246c348d2465702733c14a647c8e4990e99b0520a1f364e7b79d71e40c9690a1b4d8c12acbd8d582963c8b25a08b781224353da904c1810a0715e18309fde9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5945aef093df56a1bf96cfa411e1aa5c6
SHA1ac37dea296d381c52b208c2f79d405e252b9314f
SHA2566f60ee2e0c139180e6917a3831d6bdb7da1e984324ae9b61c53d9fa2961a34fe
SHA512766b52aa308b30f101ed0876b06f683cf57e886ba88b42a78564257e13c2fd265253f078a46eb4f4c8b7c3c3762fc8586ff7353bf8f35c56303adb9f71b7c435
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ead405758ca98af6f0fcf7857f61de7
SHA1143b64cd19f3a4cbfa3b0a16340582f4e8a8f9a8
SHA25696b033a023e0c86c5b46237dc5b1e10dac82525b38cba3644e33d006cac3e8f2
SHA512e1524a508a08ce4a895b0d7a706d9dedb3933025d6c19108de64c1da41d7e721b9ad12711275bb75c2dd05f14a6d6671e8c28036a83727584f68910f0f2cd2ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587babcf90bd7bb73283a6f4148fecab9
SHA181fdc042fadb1e8607eb23e8be2dc4840d91d323
SHA2564b4559a5a2ce10e0965409146d29c3444c29a9dea64271f9be8bebe3629d2d4b
SHA51277e9304f49f57ffe62243bbb6afe217d41719f3e0337f7b0cfe9068ea3ab45b4856cb2f249abf42e11f02d101e53e0ef93cd1c01efc8bb274fc5ad4ea1033668
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a4ce3e6cd2d958ffee1f53cfbc82a16
SHA1ba7919795e337224dcec7ccb157afcb508cb72d6
SHA25637ad53ae395f11dd52377969ac296adbc1545f28caf089033504f990f8e2228e
SHA512ca2088e791db47ee592ed646dd3e7fb5e91304df30f5741042b2c64b0052e558fff81fc5a154566e6c8f2b71ffc65dabc2cd65e75ae1ce90255da6ec5f7cb831
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e00a2e31abcd34cd713637dbfe257af
SHA1ac267a29a103767938d9011f13a249b7ebebfb55
SHA256c5e16228157a028250ec851c95fe1099cd09eed7ea300527ed2c5f469294cf1c
SHA512e7fbc63451de65ec13960d0619aaa0400a4a6800bca6af7524417b8722bcbddeb0f2bd04cf92f437814c3495801a1b79a334f2a8205720546648861c33eee1e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5792756811e19963243d060a58af83980
SHA10c86c518354bbc5eb9108d8a3c51e473e8896710
SHA256a7480918bd1f4180be11d00f82830b7a8689615be4ed90cb476b2584e0e5adc4
SHA512d537c6c80575782c11e7365e7dfc7ebf4f5788f25a35dca2094b7da5d2b031f455c55930b19e40c9f24b22cd34324cc5c855e20df344479b98153b6718126c50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5701e5b0a520ed0db1d739b1afd879adc
SHA15474b73a7a69de8d1d222a033e08c0a863276409
SHA2568152b6da60c266b61aed1d0cf8d9bd3f2eb9c1efe26c2bf4879569cc0643aa55
SHA5120cb128e375e5911d7c420513b02aa8c59435f1f853e183378fe9b03e934491f080cb137b7f7b7897a58360d67c98cf85ccaf41a37485b0c33bfcf95e1d8a3f5e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b