Analysis
-
max time kernel
74s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 03:46
Static task
static1
Behavioral task
behavioral1
Sample
ba3b3ab06217daaf65c557f6832328a9_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ba3b3ab06217daaf65c557f6832328a9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ba3b3ab06217daaf65c557f6832328a9_JaffaCakes118.html
-
Size
7KB
-
MD5
ba3b3ab06217daaf65c557f6832328a9
-
SHA1
ab73c5c21603bb839949eb93ac5ff0b3fc0c0849
-
SHA256
e3cef47ae6a09fa6dd81068153f43cf4618b2f56b0430772edb1e7fcc86f3f18
-
SHA512
11582b3cf7ba733f0eea9824c754c189cfd22d3021e690c2b9e21a4cc9e5fa323221ce213780e32a1da68c1be34e3433f99cf8143fb393ca660b7d09a103d4a8
-
SSDEEP
96:JxXsoPFgPzxvpbzGJwKi2cWzRFoc+vzrBnz4AsK6zhmVzixQzJYjIzk0b2zdrrz9:JL42GcWsLjMPfis2ee+q0AT5Dxcjw3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{443E9661-6102-11EF-81BB-526249468C57} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000dece87fc33d60c92c4e9688088bd98a5b5f8708184ee02e58201743284c7e6bb000000000e80000000020000200000001cc62f899ef27a07578a65b16e9fb48208977398b8c4b2f128eabc323864054620000000f53a36396a9a50667dbb6ee2646f81ddbb6b81ac46046ce1ceb67d3135919947400000006c06fedfe7352d2d2a274ad8fb45ed10fc9421d478a69330750e556bb960b9eaf1d353965f9b650f5d59f4973aa65b4b18dd2a9e3c32781549dc9a1d1e3b7091 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430546653" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90d1a8320ff5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2488 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2488 iexplore.exe 2488 iexplore.exe 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2368 2488 iexplore.exe 29 PID 2488 wrote to memory of 2368 2488 iexplore.exe 29 PID 2488 wrote to memory of 2368 2488 iexplore.exe 29 PID 2488 wrote to memory of 2368 2488 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ba3b3ab06217daaf65c557f6832328a9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2488 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dac3e26ffa4751884e9271e5ff20aabd
SHA1f36176f12ca0c6ab5b90b6fd35f0ff728039ca47
SHA2565eaa6d986e40432f51ae88925b9595f21e1775c10e8b9910105d0da1865d29c7
SHA5122481da1a84865db90a3c40c0152c9323f47328cb2d5bf069d31f67f706b0957a904ec24a26ada942eeec36e018c7ac3f2a111539baa6988d90ab559e36ee4c9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3123e02294d54aaf2929cd607da65ee
SHA19fb7b0bfae8ff8fd789895f81ef9af38a83d8660
SHA2563af97ee19ce1b9ed91ac5d67f7b9589e55a9436890c9e63a687f54feecbf1bea
SHA512f6669550aa464b771024ec48ce65b9a4c24dacbe9621961a04a96579e0122ccd0e53de13f7eb333ceb7447b0919a3da57fd2afda68f65897d70772cff4ce7d15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fafdaf911868836dd554a6fb7c9d56a9
SHA1d0b569dcd2a17c9c1c5452ed5077437d592dd353
SHA256dc5dc97ee8630b53dc83ad349390d6c160c67bfd4e3f61725c5e37795b66769b
SHA512444334bbdd9a17e7c19347d3f2236c504305cc41e7b29d2ccc653383ff59389236d56968dd6f6f0bf9fc52f40dc2634164a4bcaa683a0a004307fb6b06c57c3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593d6a9e1d1451ada4fc412501f127095
SHA152567800232ced4a4aaeb5c294adb81f050bccd7
SHA2565e381922f7abeffa3879229d765d90d266de3018e30bbd74a9a073cbee8bae77
SHA512eb28cbf6eb0322009053ca253d5933e66a1bf9889be3925d0789bf2119360e708e681c55e12e32933420cceaf638d173509fc01b749e43d9fab56c6483aa174a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546a398e1afdee105165f7e4df6df57ab
SHA19a6df336d22c3974e6b799fcf054ad4543aab595
SHA2560e2f4cc2ab2628b96544ebf381603812b387c661e0514f949b7bb5405c1bc201
SHA512bba513ea4f50e33d63221d9255f0680cad4922c69892901e6b1ea742a1e51adf5a9405d0d38c9b5bbbdf21a860ea584a5b6f22cab6bb3e1f747434b37bb2f84c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536cab577c2a3edd6656378f89322d2d8
SHA194d4a6c0bf2b438279e630a3dfe844cee9761b5a
SHA2563be7f3d2a73430c3f0a9fa693fa96f6ec265ec8c59f4e2d0ab5fdd0677b2bc1a
SHA512ae3fb5b17645306259c40b5cfef1c9228ac052bd40e06927b879b00f44f4ccb83d6e0725cef9bd60c756bcfb75353f6decb831bafa324d848dda7e1933697cf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc4164107a1ae184c4a74a1b090d5265
SHA136e64f1112b2cac045d5acb3e1e0eaa3b4602391
SHA2561aae2f5274fd7df3670d5ee3d2e510d6afe8272e48cee25c5ae955c697fc3544
SHA5129653e470c12c092fd994a2bc697023552741f9a06239bd5a95640a9e83d690b0828da69aadadbc15f4217011dccd4f2a24facdff39096917af4fb51a8b575ce7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5487efb0f4cf023ab9349a2f6f0e45eb6
SHA1526670ad98a6846c06f0ab42760d21ba54830db6
SHA25616cdbeab38e80c8e6b3a2447c367449bba67f97dff2262a7084e3930b74be23d
SHA5129becc05aab9cdb422660a9f26d66d97ae98f05d51ef6edf7e1dcdef1778dc08326203fe40b0b61660ab829becc21e374ac48e96648bcb5aebb2b851f71bca714
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c6480ec1b7ce9663751c35ae6dd4ed1
SHA122107538a97549c16f16fb6e5e2179ff56afd962
SHA256dd4fe604a505f91d54fd8af1c01432e18f113521a9cef5d987d7dafb1b75376e
SHA5124993150368c820b3022ef053e27d0deccaab01abb91643d992185700eca15bbbb3cb85c5af1f1baffac4616110ff24572865abe338bee334de608666128ce1b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54328e5eb0d0c503488cdb6d9e16e87b9
SHA14e3ba3c8317f400319a21967c6b1c6bbffca4984
SHA256b516230ca551d94b6064c2e9aaaf7901e0630b973817e28e2447d53751ae8719
SHA512bdeacbe50b18cc66a228df5e941afffa7dbca022e843dde98b33ba78091dd918fa5c2c0c06ebed8062ae3f68e209cdee25da32856aebf4c23b6b5ca9b4adf6a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3b29ad40fc3ab24b67b545c30b22425
SHA19095431b2f8d69269a722a528cdb9f8cc62b6e53
SHA2566ec87cd683cd3c31463f0079a6919461700b4517753a9ebf507be5e25c9fc017
SHA512d72ba81bf8f14b006eeb320ef06a2b71f10d97d76094db4d0d19fa62cd03f079c4d91a7d90197512634fdc28d07d75a5491f109524df3f56ee3e5eae9fca6dd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c191310861b30fb4d0002b0c416cdbe
SHA1a3d104a6d8a1506c483382e9f7edb74b9c1dc4cb
SHA2568efdb054877f49a120f940aa6a502ba64b3c839f24de33c92c7a0557dd57ea3e
SHA512b47c131798e4e678afcec7f8629ba817063c70c7b4e4c32d7663de519e9496d3d686a2cf9826c2cd377069fd8277bcdc9eebf0b64b1142cbc3da3d5831a3af95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebd89ab4ff048d61510bb49f8b33b788
SHA109050e40611f14ccfe663d635e177715c183fe97
SHA256b1d1202dee529dd7b6d81b021aaffcee5b771c8212dd1ecf9f0447d3fd3bcf1a
SHA512e586036e561f84270829839eb6671db2e467c4e9f1a7adfd62b07b8cc26747bc9feb4fc08cc7d3f2aca0ba5e65ee0c4e143cdbb9f7ff39a7a9aefb08ba19dfcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e8d1cb54623aac7f0ce15de4e3561ea
SHA1a26dd106a697122bffc57ae33a233558849b622f
SHA25611accd4ad2ae60d8bdd467abc2de8ae959eacd2c83cd586044a605b4bfe893b3
SHA5120f8a7724c3015d02ccd28b28b055338450c974335c9bf7758627c87d04f1015cde4cdbfe20333e080c7f4889a152073660c930be87f6e06511654f5090b5119f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521b0212947bdbfd1ea9b6edc4b0b4123
SHA1d527b0047c2604ed9d1ccfac78ea87a8644793b5
SHA256c0e23f41d08d8e53a8bb7661a71b4e7d6b80048307ad7dad2a44311a196d5b50
SHA5123247c5181e3e657170af51a23c9337bfa07b376c09c69ffa7cae7b1f36cc19a7ed585beba4597fa485ce704c21a798c773ddcb94da261888b0466badf4f7c471
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552b7a659a977af2d63170aa2d2f650b0
SHA1e52d2b9efacab68da6ac1bfd5480e01fc9ef2501
SHA256f2508da6c22289067d4880bd8974db0921571a6fedb3d63e13e199da2b26e648
SHA5126f44da1853f626fe39e65aca9a3da59e4d6f8208f8caaa01b449d5f810de590f09e06c582c41fc515adcbc80d91766941d7a35f3d78a5c05ac9ed8be5a47ba80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532d60207eb8f0dc7dca23de1169aa8a7
SHA1225c06c6501f9ea4cef7ecb992e1075ffeea7d9f
SHA256e73b0f4293c9d4ecd02b299cfa2d41b9ea402e817247ba63f6c7138f9d39b266
SHA51225542a43fcbcb26f1fbca36903b36f7a3b9cbd1549b1c0327a13927de8029bce0d5174178db22f347b6be020ccfe860b26a761db47e567675e340f1c517c43e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522a7150645020896c4d7f864ee8fd492
SHA19ab399ac54333bf5468cc074e7d89756808d2203
SHA256db01906f985f255ffb0c27cd6eef706d18c1c3be589fa00a1873195ca16a5697
SHA512d2be799624a3608438ec79952aef7e96b745ca74ea1b9e2fe0d41dc40d47465a7c65346ef07ead50126b286e833d25b3a3cb731d3fca3ff3d2872651718cdd1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530bb260be1d1c7b6dd058b6ee91378fa
SHA16837c88804fe4547a1dc7ffe129d29de6b64f741
SHA256a60284a49a21765097a62cb9c12ee84c9b638f7c05cd9d6d832ef4adede1e980
SHA51276655eaac74b9374e5eb7575673ed29d15bc1bf6f19f2b77341df2bc02bef13345c6d06ca60abaa76e0d97d41cdc55d34160c74677178af6e3855433788cdf35
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b