Analysis
-
max time kernel
118s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23-08-2024 05:52
Static task
static1
Behavioral task
behavioral1
Sample
ba9983f6cd7bf314c90bab75e8d84409_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ba9983f6cd7bf314c90bab75e8d84409_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ba9983f6cd7bf314c90bab75e8d84409_JaffaCakes118.html
-
Size
10KB
-
MD5
ba9983f6cd7bf314c90bab75e8d84409
-
SHA1
00171a028af732e031c740dc22fbfa4cec463a0b
-
SHA256
1756153de8c0feae52bc7fa6a6772f84e842c36cd8afaf6f83be3fa3960fe4d7
-
SHA512
0fdb6e3f1d7e4e1c1c767c3967480a1a66d3e528367430dd3a9cdcd55f5a31c7d724bc147e724f5c389ed66512db45fefbbce78a4dec0e8d97f37c18a45b09ad
-
SSDEEP
96:uzVs+ux7pHLLY1k9o84d12ef7CSTU5GT/kocspSTPztQtLDgQRtQteQtQtWlVHcD:csz7pHAYS/YLSS1ILDbI9IWPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DD128CA1-6113-11EF-8B6F-725FF0DF1EEB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0fa16b220f5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430554210" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000b27c83ce9093d5999521e09b51b99588e18785cdb7abe36aa576e54a6ec44827000000000e80000000020000200000003d824e8e2d0dca6aa6fe3b08bbf04f6d31c2f1dc1acd85aa23c915417a2420b320000000e56303050e336c4425e4d7de93ecd6155bdafd618d9cf74a5b0ec188a05db8394000000043a36c738c9a800c1f42fc0e1b7eff3095c9576472341c049dcd263fdaec6603091b9340579c4d3334077b186d15f8c027bdd420fc244a7b69c8c37baf38e3c0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2712 iexplore.exe 2712 iexplore.exe 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2916 2712 iexplore.exe 31 PID 2712 wrote to memory of 2916 2712 iexplore.exe 31 PID 2712 wrote to memory of 2916 2712 iexplore.exe 31 PID 2712 wrote to memory of 2916 2712 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ba9983f6cd7bf314c90bab75e8d84409_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2712 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6feb37b11d69ba4e6896202fee4a517
SHA12d27c78cc3acbc4df0d289edd8b6d0ae9446e05a
SHA2560306dc63ef3d2a6fd8ae676ec23c8b9a0e3d835e3df1bc0509646ae2815dbd9b
SHA51297181462dd8eb20d8cb8f91537f5d491fb0ddabbd194faca78e093076589c02e455895fbd3d3f4f85e7c23bbba8f2f403cea8da2b95ef7a174afbd2d806d17e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b63e0a053358015d8ba805970b12e86c
SHA11ecbb99b5b937e03b6c559b36768de52e2f40dc0
SHA256672c15e549e11c2b7e6ecb40fcd86d31492439236766ba9bd9f3f627d8a6d5b7
SHA51211f216305e3bf6a0f3d92a70341a0654bf1651eb130f002d35435066b6c597aa1c164880f85ddba3298ade58631e95c6134ded1292c8c15d1bb50df375b9e147
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e88f0de0f5ca79cdae26dd3394a2a725
SHA1162dd20450f34c66ccac142a2e04c9b5ab558981
SHA256e9b45c0aaecf50559796ab4449427e1825b19c93f6db33527d653d722b870708
SHA512c0096279b67f88e3586f902fe6c37d07037bcebae1483da58e8d24d3e3f86c0b20bb5c01bcab54e1c2538dea5ab2ba382458ae20ef38ff10c0304c93ee59344d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5632bebfc2d1ea5ac065d8f897e9acdf1
SHA1d2a7882c75c633938f5dcbbca25887663156fb9a
SHA256a8322be9e00e647df62a1aa580e713889a532a4df2de277ae6856e5cd44b1f08
SHA51274a7236afaf69596814e43d19ad8a3bdad19b9fd632989c63d06cf3d2252a9b3eeb81fd4de3346c85926e2c196b1bf44cf039eb7a15eb22e4de85116dc26c53a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8afb5e4b21e2a32615ac514cd561229
SHA1a3ca5dc1c9881c08643d81878ef07882e6a37dfe
SHA2561466af0003115ef5f1638ffa08f907876c19caed7db5cc2e42fa9dbd9a13ce5e
SHA51275d106637e883e109cbe987892f38a0350293d999214e7153c4d2d449116b6486f488beeb2b2e4dcc07fd69b8ad9d086befab504d7218f10ff0ce6be565e4bf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fa98a217c8e2857363b1b8f9f4edf47
SHA16c6b230eb5abafaab12973d112a420fced802bb7
SHA256f0048fee31c894382954c1b7d1fb7c771afadb805e70d44aa58a41ba115b63e0
SHA512d11fb8b42b7eaec15c7a0f1972c94cda61b3028ffcba9f7e57f3e97d8380f5d181ab17d50d8d3ec0df85dfb079b0ed06ac261e138aaf86e315c13f308104e20e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52546a371e2d0a6b733b3332e2ecc71a9
SHA120970d4d31e71b4ad9e4029706cbe07309a42316
SHA2561e545cd990e235cb18be9bf2194d9a8a63c5cebb09722b6a70724fc565418d37
SHA512e5423932004abe1a913f96173adacc29628e376f16f5e2046ccc20376eeaa5f1c15511c7a7ac1cb3c8c7003056b551432932fe19d44e2b3885a6063a67cfd980
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9ff3fc973e5c39a6642989ece11ffab
SHA1cf84db3ebf01e293a127ec0a3dfc1701e879854a
SHA25687b2db6df5674bea68bc40c737293aab7aee64c47697e43673dc0cfae0f6a282
SHA5126813a74f1574d1e5d97d8a38c3c4bf5866f571cc480cd7e45163c360d90184e84eccd45cc82d764709abfb04a3b678d67d580707cc18a938420cd6750056a7c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df96a8491b29d16026f8856bd89daadd
SHA1493af8813127c3e73ba56163e816d5299e7fbc2d
SHA2568f74c68c0ffa6ed5fb7afb89b2ce23ad20e24c5a22ea457cddce274a7b065350
SHA512f4484b1825a91eba6d9edbcae5f1410c994b464e6adf464ddcb315b6aad08e74dd5d1090e20a56a3d6a7ffe1d8730d8eca4c9bc40877d80dc4afd5c18b57c62d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b0bd65a1c74a7161756793e7559266c
SHA1e8e70c8a8b90625ebf8c242e9472fd60656b3128
SHA2561fb12c604f66f5a2cbbe8993af1145ec919b1a2e74e41cac260d1417583da7b6
SHA512f432b4aa62cf1b7a1cd9e7f95dbb5e4c06583549f5c2315b22feb759501326ad730ef60928d915dcbf362ae72be122314be91cde52a25fb7f23306450adc56c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595c74db7d9c26b80aba29666e10f8ba6
SHA1f0f8ee61641f4d142b4e182085a44487822e1f1e
SHA256303fcfa6c30eae529e6ad0f06aebd41a46e92a6ae10c9b96f41685ba2b8862ab
SHA5127f8513ccee61ce42cceb3c911dc2975fbfeb299972edaedb8410fb202dd846ebe87375b937cdf04a34a13f56a14638da9ec94e26b58c806a423b7219da7c25ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f10d846b2d14a3fc2fb26c971291401d
SHA14e60a2a715ad4abc6cf1805a1618bb38e538c28e
SHA256b4f5e8b78458bb1efcae970d915b43885094b4ed225576e73896aa93871719ab
SHA512c9bdf609b4c1af2b2fc896154c5096194d5cb210ddc5f542a4e188747706a6e6f769792427afa17a0a67ae3b0f84e0c23c5b3477dbb4d22de3087baa1dce52ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb8618db0107242d9469493058d35ea2
SHA13995af98b74abe0bcd34622d86751a03570e3e75
SHA256e61c470cdcf98d35a2b644de2282d11e5fed6887d221f1b7f80b5d9fcb4db736
SHA512084c62b6cbac785d731c316da94e1e1324dd29d727b16025e7b5e5381493c78fa52b13cbe2b27e913c19288faeb47c570a45b0b43a82b9fb6a3508076c040b80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598a0b4e41a48ceb7de35632b7d0e85fa
SHA17a6e28938204dd8d2637885b93080840a7193822
SHA256cddabdefb78105bf7d971f2e9907bb6670d8ff78c72ee0ad59fe615053779e09
SHA512ba2ccd2310dd828ec8506597957863628401727b0390bc863efd8b49891e65266f14bbe9d53ef87e2e3097eb3aed1e338019c90a5212566e03fbd396a4304e3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55603f8b77d8143d2dfb785daa2933ab4
SHA193f7cbda7673bf3d40e80c6094a627bfaf69cec6
SHA25662a29dddeca768bba98574a2671f01a3d6ca357a3ae1dff10b8dd93b9daa72aa
SHA5129742e324d098e134e42f9ec0a1a05949a57c1f8259628359d8177bc6ec7f7fa143b40d393845fbac2409b980b9e22e606bd2454a7b4030668393cc5cd0c65a99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf34b55233c5db6b4758acb0108c2df7
SHA1260c6e8941a8cb851825509761a060e44e0e879c
SHA256044b3ef20f596900909ff60513320ef9f0dd941b9367db77d425e8127bbcc043
SHA5125224505f897583789a61672772819b4d02d15e3358ca181f888c196a53e1f3c02b1c31beb3d3aa00ceb0ddde3349965a5acd6acf967ae26df57c19ec126b2124
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bc4fbc7221ebc560cc249ca92ebb593
SHA14a3e9678f8005b8566c224d5c051115722c90abc
SHA2565a3a8fdc78eee8c63738b4bcc6bf281f6c526761d07aa75eaa26bdb124fd0fb4
SHA512f834526f99d8bc8364ab3bf994d70417fe574b22b1b8c911afe94a29712b52e684a026059983ce1516f2cea6ddf6313abed504aed28976f45d204636c7455fff
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b