Analysis
-
max time kernel
137s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23-08-2024 05:50
Static task
static1
Behavioral task
behavioral1
Sample
ba978ebc6509728dfef08ad50cc28ca1_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ba978ebc6509728dfef08ad50cc28ca1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ba978ebc6509728dfef08ad50cc28ca1_JaffaCakes118.html
-
Size
53KB
-
MD5
ba978ebc6509728dfef08ad50cc28ca1
-
SHA1
125f5a507c1a6733a46b38f41012dfc9519b13f7
-
SHA256
46632b0f709f548a0e26a4f596b49815a0c8c1ac3d5681d074cf0a794e5a7699
-
SHA512
d964b2bd0aa755134c0b9d549cd23acaf4a93a53a9244b26c16cd3831c7eb8a34ab9e02711304db308c24c1c3aa903f0540198546327a9fd4e68c0a6924d8c22
-
SSDEEP
1536:CkgUiIakTqGivi+PyU9runlYm63Nj+q5VyvR0w2AzTICbb0of/t9M/dNwIUTDmD+:CkgUiIakTqGivi+PyU9runlYm63Nj+qI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{985CEB51-6113-11EF-BB68-FA57F1690589} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50d46b6e20f5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000000b8fd9c2bb0a052a2b7027a8fe12ab78605c54c0c6b00be86fad8d970b077a3a000000000e80000000020000200000001240698d282a494f2a6246707b9e47a428977a88b21725a5a7d98244c2a314c820000000a1326c0d0a58e82c6a7ae41b02b066182b8cf3a27d659b4bbdd3e650317ac5c240000000efdaba33a40673272bd91444cd6ecb91dd4ba48f05b5ecdd4fed78c988e204a53221743693dd1ecab63eb7fac7703b8dd3ba565aa3c289608f3e9d12ea6e7838 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430554096" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2368 2172 iexplore.exe 29 PID 2172 wrote to memory of 2368 2172 iexplore.exe 29 PID 2172 wrote to memory of 2368 2172 iexplore.exe 29 PID 2172 wrote to memory of 2368 2172 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ba978ebc6509728dfef08ad50cc28ca1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54822162864998a0ec99420f2f865bdce
SHA116691577c94c92a27630e208eddf188e2eb66e9f
SHA25685002f36f741ba1fd2a5d98c751d720a458be2d734b6841ea3448233b6c84ae3
SHA5124ee6de81b9e746cf482de1e381435f19e3c38c007b26831ead9098e9df689a2482009c4225a9eb529ce5166d2c96d757ecf126e14eb1dca43edb051d9fd69b2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5804810a23dc4df2d29bc1f0036a05a5e
SHA1ac2499482988e64e39b1018e9fc6021a1c9c7cea
SHA25605c762e16eaefbd9b14093aa59063b6ce6fe25855e9de357ac9c092e462124f8
SHA51255176c4f02d58a308ddb22c3720826917d77fbae5cb5a2a94544face87043e1e8b7a58d7f6ee92a751b49c63ea8478c4c0ec60e69946c2edc0b9fdd0d20bc209
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53af8249f3a5ac42afe9e0b1cd803c02c
SHA1563e1e396d464ea222b4dcf473a7281bb3a44133
SHA256ac5a2b556ad7feb6cbd36beaf8d0e3f6c6ed1c24ab0df6209f18901c3092ce58
SHA51253f117818924ecc6b709cd551f8cf32337dcabf55c30f6279bf296527b356605bc80b35e334c6d5d853f1acc622719a79899228e88c7c5deba1e2705384d835c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2e6f9d540066e3d128cca0f1fddbb65
SHA1181642b99cdd708818b7359c3463e51983f7ce05
SHA256b30540716038f8f868f263b307dd77cd3ef09ff96e7424df7229950a1fe27c6c
SHA512121c022bfe36f2c77213e307a8d1061b3fd812bba791e6e6764d3cd1d80ee1418ffb4ebf83a9de7f2f956c405c6e3c5b71c1f8cd3817aa871d0f8b5132aac00c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b28da6705756416c1470b3514b7804b
SHA1fff9f4a1886ee000ed239d225329cdd6953135ec
SHA256b7ede42df86bc9e19e49a417d180c133d98ff057249c1cdb708382750bd4bb96
SHA512f8bdb5e92a548cd4d38905fa6234df90cde3223f9f9a766e0af888f4d85be188710a189dcbb0175853322543e49efc12653b017631ede4a800fc58349b644010
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56371d8d9c95f0411e048f99b0f832f5c
SHA1ff845dc16e4e969e52f70631464f2a8f9437c13e
SHA256fc90e9bb1f87a066d929e27cee3feb423d486b06e47419af47139872d0a8f85b
SHA512f574506f73450051cab6855554ad48e0784ef807dcb03da6f0b2378823d2b894238e84663762724a58f613f0353473d2027f47b067c5ab05ae1d5284339ed12b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ca7f9fd812acdb44adbed5305b04281
SHA1ed57e1709b92a616ba79dd2a427df80c76ad2c8b
SHA256c0a3955ed23d6b1c2b1f90f06e1a7fd904b009c8c8bba20ae96b4d68019beafd
SHA5124abcb3caf4809d550b5e6d2b267a14827daea5e55b22735daf80926550bda84be376c6bfcb501c4d3a7e324c7c758049d4e8d4083efa1c4e59a14ad9627aa0ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5247e5d1f692201802a7d2e55ef369bae
SHA1325ea8745f31776a3ef1b0b7e9b47ea4ee2e0686
SHA256d0b3aa2c769deb2a4e2555a8ba2dba9383fd0f6458750bbdfd2eb5662c099ec6
SHA512c54b8ed942c230d1fd72523eee797fe8eb0d39aecd2f86ad82945a9daca2a4e492004ec735107ac4ce43326b54b4ab0d796bc77562bfaa728d8342df70c5adbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564d52dbbcf6f1093f26c3aa0ccb9ba43
SHA14ca7d90b9c9ced3e042ee61d2c66a608bd8b2433
SHA256b3c572bf752aad01e2c0690fac32e634e94b7ff0bf9a36e99427d9b36dc01b0c
SHA5122b9ee6c8ac330d164798fdc303e3c565fde44be566a94bcf1acb91979dc8d9f590192dbe1fbc663163cb4ca53f3d13427aca7e3a8b7c4937d9054d2bfccd3f97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589cc3959bf1506480b9a04cfe91d1286
SHA1825e743a01e81ba352a13d982bc975b99850f5ca
SHA256e6d01aba91be63a3ecbfce04506f87b05fba3a1dad734d9dedec6cdf986c264a
SHA51299bb44515b8c7af32b30a31cd3b64da31d67158b3cd11cfc0d90237edbfc980d71e41b838e4dd7631075a85da7718935329cfc9616a8c5a729bc3ff7df201f4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c4eb57e25a902e120e73e045109cb13
SHA1d95b16a23f10feb76302f14af6d3e9caba8ae297
SHA256904134689434eb300e5de101e9d8bf568516608e6fd46f8f80bfddd277ab3306
SHA512b32c29c251188bd0d6c5c52201def11d5ece0fa8cc622ad9b509f1b305cedf1054fd35b98f7261869d0ac8cf8aeca05f260192576b2978cb28861af3346a394a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab948cec9e4885915d6df07b513f8e9f
SHA1e316a98e7d76afcd3c066adbd147cf645bfa50cd
SHA25647631df07a18aadfea002368682d122de1333ea6e1cda4ad7bd9602d238cc16e
SHA512048b3f2fa2ad77ec356bdf5ef9bbb8c2ef579b9fbdb851fffaf56e84c6472393ca55e61b43f7d85953594dc67c94c62eb4dc9824fbdce2c6b41b1c17a637ebe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b366adbf3bc1075858a9679859148a8
SHA1310c123a92087972d26a219df18c60220d016569
SHA256d95a55751bc0af6a074c5d49d5583a384ccbfd69ab2c2a6037bc28b6f8f38e50
SHA5123c8e192eb87c4551dbdd6fe5791500df16179db4326b4fa8570913be1dfb99cca30acab268f9ac235e014383cec93914bb73d2312a708b0a8d8e8fe44a825a3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5427aa094925bdb1487ea8dbae6f4e4ec
SHA1447cd05b009ba0b88ec16a194e9d58c8ea928865
SHA2565dfdfb2c6a6dcf77389bba587314af3bf18418b3e57a898ae19387e2645c0a2b
SHA512200d94b7f8f35917e88b749870257d1f080bc90b07e494354fc5e354ef2547c94b52ffdab0a75dd5f26a76134e497eaedb2c396a913fb26f140b6847c28edbef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db67c89c2b8db79340c935269a7702d2
SHA150e869e9a97b73cd18c745285926b5f397f747f2
SHA25679a3a6965b6bbedcf86d17a646eb49a8d526d905cde797839f5146b8aae55d99
SHA5121e21b9985697c4f52ab6f7923db3dae1b3c0c48292d16d5a56196c4b66c5077a84d185d6617df35ad5961a108af9f046c1a66b6cfda324d74e069c0ca69e571c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NFAY0EOS\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b