Analysis
-
max time kernel
135s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 20:26
Static task
static1
Behavioral task
behavioral1
Sample
68cd044490e56a4dcf0015512dae732d_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
68cd044490e56a4dcf0015512dae732d_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
68cd044490e56a4dcf0015512dae732d_JaffaCakes118.html
-
Size
19KB
-
MD5
68cd044490e56a4dcf0015512dae732d
-
SHA1
6c0db67f2ded43fca515b53340beac52badd3510
-
SHA256
b77b809825ef0d257d9000d7e05697b40093a2514f05f85a7d37cf8ea6002841
-
SHA512
746f7a12cdb722b860f27ab9f41fe51ec980073585d177b8c671dbec00612f22c536ce742660bcc5a506abb0e9c4ca24546345205e7ebbda4f4f5fbe765be880
-
SSDEEP
384:iw2PItv4PB42xCPjJeKJzr52T9GYDkuTSXGyvMj5qUnGZI0oj9DAYbdHohr:iw2PQgPWg3RuXGyvcH0ojFtbdHohr
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 307414b83eddda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427928275" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000036528c2651c5a14f4ed5ca477a5aae64e09b7a92cd398a75588e0578b01b0de000000000e8000000002000020000000955b36bb8c5aa40e15c423920175183279dddf8f650aa11ce71ae9873e4d672220000000087beba3958da8bdb7b186d8f4b0d5d993a6b6fdbe80d5cf779919e7220947a940000000f07204cdddfae6a20f2ac19a6ef9e38d231665a31cf413024e6b0f9eefe90ea669a71aa5ae1e0a17fafc37d4c36fe06a4dc53fc4347797114485298cfdf0ba3b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E2A62861-4931-11EF-920C-D692ACB8436A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2588 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2588 iexplore.exe 2588 iexplore.exe 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2588 wrote to memory of 2920 2588 iexplore.exe 29 PID 2588 wrote to memory of 2920 2588 iexplore.exe 29 PID 2588 wrote to memory of 2920 2588 iexplore.exe 29 PID 2588 wrote to memory of 2920 2588 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68cd044490e56a4dcf0015512dae732d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2588 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50aea3d9752e7b66410c42156dd5a1ec4
SHA199603a4a0027010e2ede60c9ea59def21c7ff01e
SHA256801529cf8b35f2b7e035d6a17035e6d6f4ef64b3385e932f9ca6cfc51774a3f5
SHA51262866708e92c9c5adaca1bf4fa6c6db2e8b612b7b1bd4941b7e1e83536a22788bfb3b06b55410f61d802274816f7fa587cfdd57d74f80d234da7b54861f49753
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503df4fb046f4214ff638747e69f1d0c1
SHA1f57ee164f526fa40d914308b29f5387b6988060c
SHA256f8f44d9562229544917d8cdd50ec8fefe9fdf1f8e586d44518886fb2d1af1af9
SHA512a2a7f747bbadb6c3e521a8c1bc8bce2b3b4d1239127d207a3fe3103219a932e1807001b67cae8d2e0658ebf6becfdd0a3c1900aeb30bae05c72c490c478af753
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f2a27b69838de71b18f88a51f1067dc
SHA1b262c861799678ff43eab4e556c747a46644aeb5
SHA256b61af87d1a5d17307961a438eec17dc09449099ae95dbd18a8fd4b8b7d4aa76d
SHA512ceb09eb575e748a7cf849da523fe0f387c93c124e282319cb13776f358a330bd4c00e0497e3d6a30458e980ed753b3d42a29d584ef3db5d7f3ee55614766e5a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522d90c68f1e1e261a9a32442a39d3535
SHA1ee970d4e23a02cb52222fb8b8f1c55a21dc67178
SHA2561a5a6eb3448b094caff15fa1e2552974e8a1ed03645d06456b822fc913128590
SHA512c16c18b9a6dfdcf9e132e3f4ca11cb808bea48431119ac1b89b73b855b878d1403e8cf916f1a1835b03af0144a523975bea43bc20f1392554499650128071972
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56882035602c7d33667ddf59854304add
SHA1bdb0b128c7bb93503d31ef89bb5f4c6dfa3f4453
SHA2566a394445656facfe91ed0eb7fe983bedc23241a2bdec79a6f1369dbc2559c66e
SHA51294ac3232d507697163d00ca65ef600d8ab46ede6254f0cf1f546c8a9c934c37aa9929758f8bf643fd465080480e9959c579d16278a2408f912443997fb2b8756
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c6b49d4da1446062d99b3771d9bd12a
SHA1ce878dbe7965826f3ddf1e52ccfd467fec82a67c
SHA256d8270b874a9e881d2c4c1f8d08a35c7918a1b47ebcf941a2386c21247dc8b4de
SHA512c4976803d5abab67a2c6d4a4a771d10131d7e5b2339c52289128159b32c60dd6bf1a574b558cd7b42379b1b340e92b480f45374b76a22f89fd0da66263571434
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6aeef8982487aabbfa1560be48e8304
SHA1a85992f00ed7b07f48161a648ef2ae0e2af4e98d
SHA2560eb6c0dae515714350c0eeac413c4bce7414ef1a7e6a94fa5ce8223736ec5c6f
SHA51275c8011c318b61da045c5430c2ddbcadb3ac6eebcc8847950b360b644df1b3f161300bf391d00ef4797e71281395e74d3bf8aaf2b4765530a143c1d45ee9a882
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591dd3a93175bf3fa1c8adb0909b98d20
SHA1d9d0545effc82ca467c9c67c1aed327e8dde89ae
SHA256a77caf990bb45e6df5d9880f8dcc745358ee99e6015a302c640313945881f6fa
SHA512d2d81bd0ae53d09cbab5617adb74b02125e53d754230548a8f8b919c49353479c8a28aeb492bc845a697b3bbdd87bda4d2869b1844ba2e5e646db6d35701d059
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0a399da880dee80f15ba84150add87b
SHA11fb12be8fd4f1726a8108fb0d61905f41d58814c
SHA2565e1e42fcdebe154786957362e700b42019858841443e0bd2fee29db497d570df
SHA5124f9b4f2a6004c3e36881b5fab3ad49016a1a2da77f37238c3a0ea7f4c99ea608e5edd66dbd1cb7dd73a7b0ab26704a559e424c1bf75767f58cac67236897bc43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea37ebd234762bdc3c9635f94acf5744
SHA15581b1b8dea54a77d977776936c8f561a625a32b
SHA256b26b5bba2e2e4393069c8fdbea41d3f5ee4e7c459efa442f1804acd9ceb35743
SHA512a15e37ae2822962338c6b6f7842552b03aa2d5a8c5917c6992ed795cad61daaa93795b793e968c6ad7bd3f073044e829a59254c19422a970b932044562187078
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd21909528b8647c2f9b80b471f6a867
SHA150e1542bc779504797c7bc859650e54052c8511b
SHA2561919bb8d4c8ef4f65d6df94093801ea81a44cb56d43bfe7f2ffbb18efab71379
SHA512cd0e71bae51adba410f6b557063def4516c0e189f24e3f938fc362c69b0da54efbd476ffc3fbd7166ebc35db59897314505ef33411dda0f020691378ff292a00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec9441ea477d725a40feafc2628f651f
SHA1810fa3217c8e01e5eaec5c44c755078bc69788ca
SHA2568c67ae6e31b35d22a6c643cb489942ddc1ee6160c41e6791ff61baf0dd7759b1
SHA5127a0e90fd197c4aa0130509a7a225283e99c12a9731eefe9ea32543431164cad6388a36704712a4f1a71962c17bdef9683f8eb95bf6578a3a37ae9829768354a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c22ede703289116f3363c4846fb662fa
SHA193e6e967d2a7721c4c3aecf11fc5eb62cc07e4b8
SHA2560cbf1376f8e802a91cc1b17170ba2db7caaef2c4936486651dcff9c201fbe3e8
SHA512d0ca533657c3e4ad0789e55321d749bc3d5454aa4ffc047331e3ee9efafee2921a06cd2cb93c3621b3dd8ee3058520baa1af2b83c0b4596e8322e9b66d0e8f57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e4d3aac807737e06852ddfbeb6c1fb6
SHA16bf683cf6a021442aab1130c3fac2196e4b38dc8
SHA256e19eede10e73526c541043fb7a1059788b5c31ee09014060d8f393d70ddb88dd
SHA5121d491658bc7401d71ac37f92e6b5e7a8992fd83b78056470ac6100ef7abf13add86943a5e726d5332aa0bc778789667b4ccaeb8770ae861df2f5868bb4117ade
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5745c7bbcc35b7d934cd23c02d1fe1637
SHA1cc601a663c31208dcca1b6bdb4fba79b8a7dadb2
SHA256bdadace1d35d819e4d34a7f187f501f7dfb3804c7d6a8c2e9c711fc73528fba1
SHA512833cf1a5009dea2c5f8acfd5168216c945ecccc6c7cf373b2df60e32a434eb2a6911eed7a1c65fd5a6a82e99085813c016e16497d4548e1d2744d61f08639896
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5b7ef818cfdcea5d694ac78ad0b47f7
SHA176cdcaa287fb403f00169af752efd333f7406f76
SHA256ce54bbb5abe40510b13501288beb990bdc32ce7144c213f5e1dc1661f10b5295
SHA51268c6468701e9303fb1592f3af8953a9dc6209724521ff14149aca288939ef9cd518b5ae08803b1ce75b104010672e81d852417ed2598d18f07b628df9327e479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50544c3992e42886174db58d7f8e00b39
SHA167f3a33e6374e9f6acaa47fa1bfddf92571e3c3f
SHA256d995571960929e63c459846a352e50363b36e5a323c1ffa96989b9143c40a439
SHA512076fb453b297c0fea344d61e1485d2ef0b63dc9c18af536b2663bd6b569e607f06499b375b89916aeb5e815835635999f6cc45c263439361167be29dcb3c21b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c2f8e8149194c9a71eb3796794382d4
SHA1cd6760346700ce77e62da2dc8e94d398047e0ce5
SHA256d74f4f60bb679ebb88c3355915ab51ab74e9b299e851d779e93b20f9472e7520
SHA512676ce564e362782020ec1c7a7c06b01c9741493d64057de2b5750540efec11305907173ec6b5517625b17c104ee7faefb50c2c11c8531451c94e308f15b60bd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a66d5bc326518d9c5455f2619d3d2fc9
SHA1319c81936167417d8763613bf2a06c54241fe9ab
SHA2566cc1d6aa0b9d32daef888dc4783a5a31ee3f86a815cdf1dd3912e37e17bb8d26
SHA51227f974cc8b0a7cb72241c171fcda39491db91ff70c7b39b2f9bbf81b0eaaca040c357fc53b68ccd76e90901ca2d1e98f8e0403d77cb163555b076dbf4331690c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4f589ba014f2f639456d73b5b53058d
SHA12d9c582a43edd31ed6b8aa006f7818010d72e523
SHA2562f257c936df5a30445002e08031624a4ea05fbb120f34909324e640d319097e0
SHA51294c66e66142ff9c5a923fc0191f25b8d1e938edab3d85f661198498826e7c6c638819ac7b3bafaf84138eced033c31d6962b005d5ee578cf77c353ba88e588a5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b