Analysis
-
max time kernel
135s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 23:02
Static task
static1
Behavioral task
behavioral1
Sample
694e922294d3bb233e6818181b116600_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
694e922294d3bb233e6818181b116600_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
694e922294d3bb233e6818181b116600_JaffaCakes118.html
-
Size
49KB
-
MD5
694e922294d3bb233e6818181b116600
-
SHA1
663f164f2e21aecdfd436de24d66e496e6092794
-
SHA256
62b047677da576093e824cb32529a6552fa7f7d2e990d26ad2a691c0c7b4dc46
-
SHA512
b062956535360bc3acd1352e5742b8e861d5d56396e33d5e6a20d089684474b1fdc6fab5d453db70f014b9c6e16c911819382258101aaaa56f21eb97ad747818
-
SSDEEP
768:CgOriWNcaSoagGxs4WIs2q1OVG9xt1RuNc91l2SmW:N/zs4c51yG9Gc91j
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4025547954ddda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000009c289a4ba2359ee4700927e524cb12904dac15f4d54b7f79080d12323516f8ab000000000e800000000200002000000078a42ad76b6da7d3e8ad05b86a2409d2279e29e4ae0cad3746a6711d90f5eefd20000000075d05ced856d43ca39dd153c6851b1c2a7f964a9d41a5e6327ef1d36a269500400000001f666b016247bcafd861cf9c481f71d546cc35f37fc1ea41e7d6e68b70415da3e4cb27f3ae1abd886acc3a36f524b037d0ca9b213f36e2f831df2dab41409dac iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427937614" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A0688221-4947-11EF-8D34-5A77BF4D32F0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2712 iexplore.exe 2712 iexplore.exe 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2968 2712 iexplore.exe 30 PID 2712 wrote to memory of 2968 2712 iexplore.exe 30 PID 2712 wrote to memory of 2968 2712 iexplore.exe 30 PID 2712 wrote to memory of 2968 2712 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\694e922294d3bb233e6818181b116600_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2712 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1328e40457167e97a1a9d0255eae423
SHA1c094e48bfa3c665b7e719ee022546b65aa768d80
SHA256d30e4d9cf4fa90579b3d1bbae6c360c7f9b68b4a15226cc71f4add7fc625bb31
SHA512b3c602525e085c0413948b8c4fa9dd4835394b2dbabe0ee87e736ee6b091ec4d28d7c75ca050fc32b9e30ccc9b578d7bd11d7a8c12163ff1c4177347e3e3dedf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cb69677ef6fae091b8c45830faef077
SHA1d401afe67420548ed8d5c88d01089daa490d3d78
SHA25693f73d73f77f496161022cd341e2be569751dea5433042a5b0c90606cf04ab20
SHA5121482a4e3d47ea23157f662aafd4362a58a068735d663fbf2e58ad38d0b8a6606f0def50ae097dd87c8131377c86254714569f6f723fffafae76640950c49a0bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a52c3b455dee50f250a827730f8fbea3
SHA12a5b7d0efbb28cca8041b10f8c6da24f2406e060
SHA256b1df7343f164893966b386156adb496c4c9c472430768efcaba9b4e3843e3cf6
SHA51263e81445002509be00679a44b04cb5ca98bad64569788c3e60aca54c7f24565a70a0ca806df2fb4cc2fd9485c272a1a61a44c49ba86a09c520e7ec2a6bf27cf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558f26626738c0bc835faf9364304c0a2
SHA16731d36b0e77a2cdd8f02afc0d52a8b0890f4d45
SHA256a1f8dd7c0c15dd5b0b2e96337f1a3aa51240d511f5e467c152c7ffd53a386fe7
SHA512c864ac9864ac6292efb553520c0d9f84996fbd049aa6486c333471d3ccdd684c0077919a50660c6451e15875f02d6ebebc459927151ade84a7c38e706ded16f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507da67be77ebc1da054b233a1ec6dc0f
SHA135a8a294cc17dcf1dc60364c16e12825e6395212
SHA2565d8e8456a6c791ae2ccb74cc6c2cf6aa631dbd3017a6d733160aec3437b79cf5
SHA51218a9e0bc4cda35a0321de430bebb80b2de418793423ba057bedcd4031ea27c7883aee9e5860f948a29aee4f270710f8d6a8ae6096c2fe49c550a3ddf383413b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54db7601fe9a9c5327741762a374b0d87
SHA112e17d66e3691e3782badc79fd362ad03d96a9ce
SHA256c58f912aa72528444dd4ccbdd6d4c5a5833a6807cdc25013413d63d24a7f105d
SHA5121353ae2cc93f9e3a91b4d417ee745f36d6139b66df4134a365217158ed26a085f114caa5a0633d38f96171ad5931af335ea73cb04c7c98c1d013252508ca7955
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0c7a4cb8be0ae3f95fab35018f5e805
SHA1e47e0911a3d7d23ae414be7e57482773490ea656
SHA256803c8b6ec25601f4577b804d601010f184d665a3054455cac77e58915fe9cae6
SHA51280ec510b5c6fb23928690b346354dcab7d11b361954ba862cede20a9636954b4ceb42c97bb8c04ef5b59aa632e35479f22a271b5f28c347493780842fb09a27a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edfc86b7da241384e6d535d3a1e86888
SHA18f50936ccfe0ef0de1896eaee39489a48a53f8cf
SHA2569ad2dc49ca4b3ab6adfd3e984d2df602ca5b8464e7b88796c59868ac36820762
SHA512aa3769fb7714953708081f1becc046d1751a2961795e344ec93a7886bb8f303483c9bb2d5d99b481956f6c2c0a77958ebb7fde283b9d0082641d79668a10fcc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da6924bc39cdcc746906b69e1f2ab7f1
SHA10e57a46294b5d84c772ebfa528de6511cec9fdd5
SHA25658786163aa92eb632ce2c1bde1d548de2c4bd10b7680df2583da092ddc3a0c2d
SHA5128482782951c199ef0e8328e6fab8fe5c38bbfe80a73a4b21d9084bf4baefe0c53eb2efa3da761c4b29f3a3ad8101102f67c976684f510ee934f59d5031036f2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fad970ef0c5f0bc8e4fb6796c805a42
SHA19b84a387a8a2eebaa85fc8716a6ce39a11ec3669
SHA25640c53d83b9ef0b26904d5bc766a4b34d7e26c51b350af69a53d3acdd03f614a3
SHA5129628c9819ee75d185a364e3ff348b57a99ee6af839895d444a74421a4cc86069f19db5e1d2f6dae0ce549807ef319396fc3e2797b3a6efc295c51d0298525f1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5402f3c19600e08d51ea28d3038726a68
SHA190159bdd79c5d9b045bfc104e2f7817afbe7a1d4
SHA256102bc4e026b734f9613daead6cc4e07b34fcff43c271a6e2bd36a6fd68177717
SHA512d823d36ff3ad2f74ba648b648bc707b9bc84d676c0b9d395edc1e4760f4fe8739b1f1236cfd88b152410b9e9aa6cd8bc1f9896f5d73826454317bb3f5a8067fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bc68fbf3af861cadd1f5245c8edf7fa
SHA178fd7930f7ee41e75729cd0a677d5ff83ab28027
SHA25697a596dd7213c71758e86b5a8663770452dceb97f8dd578e466a161e2c77d680
SHA512feb5aaa656dd5bc25fb4cd1a120d1f833760cafc8da01ec19561f2e61770a93b3b77a7e7e6e39f6d05c2ec34b04d1b39f422362dbbaba19dbcd7901d82ec91a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dc31da10b5732038ae260eae0ef1ef8
SHA13d0f358977181a9b9be39ffea832450c4b5e1211
SHA25661360bbf16df11d29c72aca8205dfd5ce85f359247a287f51b8c5f0eac3012b0
SHA512e8da5592092de0eb569bc76da6c93ab4ff48b5ece32fa656ac0444e32c627e957736214150c13334d5ebe4da09b564c0d1eae5ef2f23149c898d6bdb4e477fa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575fdc5c0d6c363708b5314955adf1841
SHA1628c7d4bdb4d60becc7e771982d38dec5a0bcbe5
SHA256f7c015ee2b5b1961e2e05c01bfb24f382e6b87ed10eb449885cdf39662e50cd5
SHA51258afde6b80378240227445f24db5e0c85b0ba22195b2d7acc8b0d5c127bafdcbdae70a8932bada27f061b5c39711037f67942cbfe57704fe66d1993e3e26e1e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa16dc47b3027e9dcc6319ae99fc8823
SHA150fe210427cf08345426ddadca94a789f837acd5
SHA256678f706b197b6702c83c4c1b506464bf3dd08ec61a100d6e311c16b1cd36a1bd
SHA512d92c8bc4900126af1fc80d0ee748285e82fc68fae99d98df35491186aa093d56b0cb01b221eac8e71ca9268a4be1cbc7212478af97c23096c952abb869997dea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563431e0e2b02da749f2d6b95221d7c6d
SHA17619fe578ad661f4c11cf7f4dae1e9fe21d79ec4
SHA25651b24a8ae67e997f509edfdea9ad63d654c683082ab412a47fcd95d54666b630
SHA512cf77d00867a3d0cde25feec43372f8733ac74d9081d77781b29c86f2d9557a2b3d8e188c2b11aefdf07dab531efab13d7f54a1025f271a2b57e0eade5887c8f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541d18c25f7c96d57d4d6bb588300d206
SHA116c8bf9c70ec665ce86694668f19f5508105f03c
SHA256d0f3c5e7911db2aaf66da1abd669dee941f3d178a6977d4453f8320b8b6d68f2
SHA512ca8bbeba8c017ce1ee74f3335f28a48baf79eddc79444dd0dab27a6c665fa897a5d75abbae8586bacd27e47e2089cb7fe393d83845737bf76dd94cac1f125839
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a66aa3b172fd053f1ab8ea761954480
SHA142f8b4572407f7021f356cb2b4b9ab2104ad6008
SHA25651d65d2805958572afd513f5f0ff4ae8c6d5e17d0fe3d385e87986b784312835
SHA51287e5c076228d38c0d2acc08cac9a889146a019d6cd3d3a0d789c6564214f2cb8f7e3ebfe84b97de275b5700a1b92cf35b9ddb95f725df366f0c13dd9d2bb837a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f1b7442f88c8b03776bad1bb0989beb
SHA10e9110f07f9bf52e98443e5b68c14f7e62abf8b0
SHA2568c2ff6ce78ce92888e1f204ccdac21dc1dc58e6f15e22990c95c5ffef3cfd13c
SHA5128fdae4b3149fcb003048a2a1291441675295defc3a768f6c512dfc77f1d5679d72fc6d53dbb172347acbe498788fd7f56b32ab7dd624eeab3aa0b2a12fcb5559
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b