Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 04:21
Static task
static1
Behavioral task
behavioral1
Sample
ba5686991b8e27c5d11f07d534289c61_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ba5686991b8e27c5d11f07d534289c61_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ba5686991b8e27c5d11f07d534289c61_JaffaCakes118.html
-
Size
90B
-
MD5
ba5686991b8e27c5d11f07d534289c61
-
SHA1
aafe9c7f0bda9637af84b41faf7693ff9d5c48a2
-
SHA256
64844110264f6bda2083e678c972354761edcb5a1a8bb0fc424786eef6f2f29f
-
SHA512
e3d7e61d86bc2a81c861ce2afc7b818ea521dfd9eae06c13d614f9e7fb3d8a1882c34c7118fea9482c185fccd61848172fabc67dc2639c624a59daecdc2e477f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf71000000000200000000001066000000010000200000006a3d8e0177ed52d2b37578ee7e206138462841928e95269152ce283adc092510000000000e80000000020000200000008eb973bd21006f37cbbefb3a49ac08c689a635245865ac0ab53b1cfd457cdef320000000c059dc887a256a86130332b470ba8bdf6a5033ff398b11bfe11a6364c0d8ebf74000000033d9cd8ad0a6d5f01d7757b70940af0fe5c2437e652bbf84dcc476e664b523e7142ec3b9dbb5f301fc0c9029d557bffba2fb1a502bb544baf50d556572bf702d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430548733" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80688bf113f5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1D27A711-6107-11EF-A504-6205450442D7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1052 iexplore.exe 1052 iexplore.exe 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1052 wrote to memory of 2948 1052 iexplore.exe 30 PID 1052 wrote to memory of 2948 1052 iexplore.exe 30 PID 1052 wrote to memory of 2948 1052 iexplore.exe 30 PID 1052 wrote to memory of 2948 1052 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ba5686991b8e27c5d11f07d534289c61_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1052 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efb7e4278dfc61b8896d33b7b8bd4ec0
SHA1be6c87c759867a97d5e7bdd999e1611581b832dd
SHA25615d15f3b045ce1b2560d6c16c4f0e1c42acc0c17d2d607ab967d752686e74eeb
SHA5125ad1c4b158f302e9ec01f47e48c9e324e8f7b2f1d54dde874c120a72fe486788d1fb96a606b91f450a7cfacc54f12aa3cc7b14ef35bae9ca46bb12c9e0785b29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518a76f609696880dcd68fa39e57b06b4
SHA1477da7c719ce8b323b6a52cbd665f809b86d15ca
SHA2560bb8182ecf1e88ae180d64fe493a51fb5bf840248db40d0adf93e9c61a038127
SHA512fa69690cd4fc98a5dc71a01521b9f393bdda427e1571a206c19e4d47c5cbe5f3246dbf0263dc84236623ef3cd323f761325914fdf5fa8701da856b50c1cf9fd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5415311a4a0dbbc9655c92b8252b40b6f
SHA1403f2425c8bab48da317201a809eab185cb7cdf8
SHA256a53fe8237cc08ecfc4593ec6ed2912c1988df44f1086562ad3bf0ba9994f708d
SHA512071ea4b64133490ed7053f53bbef0bc1fb3d77eb1097bc7a0bb2550c53417cd72ee651defea7dc6c89cd6d6d2f59972b5f2473c842c5f571d84e456f173fff00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5600d6eb6d44eb0605360753e872d8f30
SHA13f191329175099ad71b71a656ce952bade93c180
SHA256bbcf8bc8323c0ba768b027d0bffcfb7174ffc75112dbeaf8c982db2692159f96
SHA512839e35c098a0c6f71681bc0f37b93cb7db48ce4257b8879d576dc887d2fbe55c1b7951c08d48918e917fada7d495d8a712f0d3b0924b1b85caab85187d831d98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53002e460248fc88b715a73b36418a1a2
SHA1e8ec269b3e5e36131289c8c4d72f59a80fd2a79d
SHA256e92433ec85605d9403224eaf70db421648e8b6d32633e789d6baeb4876c7f0ed
SHA5126ee97099b91373e6093c1ce0d75bab77afbebd5ba1d5b308878d8448a7182cf4e4c6ec6b8a43dc8ac57a5266e1f6138ebc6d26e503211c117a90ad87f96192fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c4c1685a0c92ecf261ae1d5f2056cd5
SHA1b073d046d22279c849381a9944c5a5a4052d169a
SHA2569e7ed533fe757f5a8c1d9a9134e23b905df57e6e1740d0d5d365cf075246c7c3
SHA5127953b32e2f11f18fd545b8b508e9ee61a908292fb088f8f8588abf572e4040b617d1a2f61794b4d5b8c82041814f941d7a7a8aa606f5ad3fa72a375f114745be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575dfa1d0761a7eec02dc00ae7a3e6eb4
SHA18e6bcf4c688c9d8e34cc5e9edf6528ebf850b0a0
SHA2566dc80216b93bf29b1872961afdc697f9f30cebffbd5d16495ec49cea1a5a5d13
SHA51257e4d618b3ad8f8934d566723331d81227d97fddc969b06b8a7294f9fc104fa078461e2311eb8e88af14c557218a70ad1dfd1250811a100cdd2ebd78d81dfdfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595e53c2a138176415d3705f0df1c128b
SHA16dfc840cc8dbe13bb2a4de45fcfabc5220f4c2d1
SHA256a0664b72761feae6afb3f77ed09a01fb5d612a37ae2930da948866ea15d29ca8
SHA5127196fbba328bdaa1c5cb550cc36e8041a5fb091e42d19707188f7b7fa15a3bb57dcdaae500d2533f19bc2983e42e844a5376edd6b290d53d0271a68d5bb9a3e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f448fadf66597ba02ec1d528b593536
SHA1226e0c417f527c604e0388fe4087edea83b46e8c
SHA256307194a5958750826f5aa50e140742c0740e37284793c5d0aa63fd8f75efdc2f
SHA512c941d756945fa597708d18389907c681ca010e19890811236faf08826504072214efd4f28f72a69a5a7c6a3dad9b4c4c6a25ce92657a09afaab6304c2a77b6f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baf81f3a8a7314db79ae88fca8b8a6a2
SHA194595047c7cc77e37c9d480c4f720f89531d62d3
SHA256bc7f13cadc6bc9763ea99c0779c9cf87f69cb8dda2063c05c0ee0fc9b2339440
SHA51216a4152eb57e2faa999008ef1f31df530325100c29d25e2d6b14a6a0c89deac68e4aa8b6da32cb60c8396faf701c561aaa1d95cc93a5d9b6ee5754ab01f36a2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c23f62ffd328ee1c22e6363a1d487fef
SHA13f4749b7446599cf0ae5cbfb885684cc5169f11f
SHA256f8c44efa0a532832a58dba6ce32fbda6c047b91013b872a3bf6c48ff44c3a1c1
SHA5120f8298d285a62b0032f59a4e1d49bc35cfd553611c4374e3946e802124914ffadab0d646ad3c9cb4ebb3398daf2e8d56a8d38f3fe5f3ccaa3279103fc2555244
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b