Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 22:40
Static task
static1
Behavioral task
behavioral1
Sample
71888051c156869911682e58307f9c55_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
71888051c156869911682e58307f9c55_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
71888051c156869911682e58307f9c55_JaffaCakes118.html
-
Size
53KB
-
MD5
71888051c156869911682e58307f9c55
-
SHA1
b289846da547f12d26abada2e456af24f4a1582b
-
SHA256
475602bf2630878509423dea163f577a8999ee2b9fcb68866e7b8aab14722a16
-
SHA512
caacc40373083b83a34f204777d758f3d7356f136934b36262a49d3187927d79ef2506456e1b5d9a095d1cecfa923ef8dcfb21809913e1830c03faf1b8d03aaa
-
SSDEEP
1536:CkgUiIakTqGivi+PyUprunlYT63Nj+q5VyvR0w2AzTICbbGoY/t9M/dNwIUTDmDY:CkgUiIakTqGivi+PyUprunlYT63Nj+qR
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10f17b5be4deda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{84876AD1-4AD7-11EF-B74C-7EBFE1D0DDB4} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd0000000002000000000010660000000100002000000066373aae7a45bdc0f2bef6f849a62457869dfaaf2826adc4bce9bb91a0190f69000000000e80000000020000200000000dc65fe7f6e0ad0532f9bc8d3bb9f61ebcd1a91e74b4d86476e829944913646b2000000083c8cd1daf6a935f21c0d820e8a8ca5de12a83cd236fbb8bf7f01241469ac8bb400000004d5e7c609f39515a5008e2c50cabef17cef4569546e13e97e52603cb56a7bd29940ccc35588676118617d91a7a2ccfc8650952c6c8af9c62002138b6c1330148 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428109364" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1528 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1528 iexplore.exe 1528 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1528 wrote to memory of 2540 1528 iexplore.exe 30 PID 1528 wrote to memory of 2540 1528 iexplore.exe 30 PID 1528 wrote to memory of 2540 1528 iexplore.exe 30 PID 1528 wrote to memory of 2540 1528 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\71888051c156869911682e58307f9c55_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1528 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a4869dd673ff821ecbb15d0062c765d
SHA1d471bcc9eed72f369c8fa970883050102fcb6e70
SHA256f180e961ba9794d5edad9ed2fc191c74a4ef069eb44d2aaf82a62772df07d71e
SHA512ed1787bb0b681ed1bae04962161c8baec252023ce49eafc7244d4f95666c405b370c25cd2f25a4947ebc786fd8b7c597d2ba4440bb6e6b4b89f9a5d1f513ee26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f6486ebda3ff4a39f2773c9d106b7bb
SHA124451ac51addd0477e2fc7e4e2f70448851c2e41
SHA2566921231db5c3bbc4c4028f5991f96a5b585cd67c12735bec845cdcda586231eb
SHA5128d36e83af2a536870c3c6d5d836293019ef7485f307f319756917626c0737d80f13bfbf27237b8ac6d67a57ad541b89de25ef92854b3e452564ba03b7035342d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e656cb71756bcab2a014e1455e14d616
SHA1ec6c2071c824ed1004f0472b30dbbfcb74e1f6d5
SHA256c1821a88767059d390e61d017d4e2b1d2f297b7ef1a5c355fc7b30826e0fdfe7
SHA512663eb08e7637def7fa3053de9034ad33dc3de2f99515d1ae744909d98985f67c89e197ad6a4396ca97e518dbacd3ce597db4a460064144c9986361bc2541d3f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51971f93b925f629b6fa29fe6349691d7
SHA159b379eebfdfd70c9876994a9e0323997ff5e7b2
SHA256760c7a615a277632b22a1a1cfe598a5e2b8b51d753b6618d76e8ecf9c89d02f2
SHA512bf33455bb28e23903d44c12dab6d98e106156b8f0ebe5ab6bee494e8bed71d5760ce4102c4ea19de8f8639eb92554c9e1c565b42c7f01268feeef42f78fde502
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512a79c0b989a8e7c3dad093694ebec0b
SHA1379c7886007f3baf5298c766047d557bc9a51aeb
SHA25626c9c06e73d3d3ae5710250b702d69b267ddc49a43ecb32b9ab8ce596e5a413f
SHA51231f950e6e9cd768a2130c73506af2a8b4b6efd478ed9877b5e0484feed153828f086b2f868a12ecce98d01a79c30f60b9d0872dfd94e093c14f03faeb626059e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518528c6776bbeb8941dcb6104449ca32
SHA1ee5a5de793b093086f717f45f5d79f2b43b0e0e5
SHA25607c1c3e53489c9e328c9fad7aa993261a3637d5019ff3ccf57214106d3efe22f
SHA5120356029c8ddf2ca36d9ea9e882e42cb9ddd526ec35f7ced211ec9a1d20a2ac08741315f4896202a8505f4b78fb46b655222ce48dbd4c3be590ebeaf7a322f1d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a69672022414036312c066fc4bd457bb
SHA1d6376c4bd87c869f108358e46845590472d265bc
SHA256771805cd350d3577d1c8e1dd71fb4a8327cdeee7be8fb0d32233712f70a23d3a
SHA512a55b185e72183e2ba554613c45bf103e0858d04f7ae1749dcd04a385c30898b04d119bc003b6535b119caba061e2451895d525f000fe373646d8bff3f112f589
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547b6c371340f543b0787c0f21982f9cb
SHA141df559a723c21efcdeb4fdf76c2825f468528a0
SHA2564715f0b0eb25c2f89344ba8fe6455f12ad28b3a3d3e17ab85b3e46996961e8b3
SHA5125cd6396dbb3594b5973ba8f1d539d35f02288ed115cfbc4334e279c4c7dfd2947ef902a47b5d7e705a4a7ebad5f5f98e4320deec75321f0a2f12201b56e62348
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8e20723fd2a83334175481b81ec9c79
SHA1b52e988adf55b4dd5488f9181f2e3ceab655871e
SHA256ef6568ac26a9d5071daf7794cb6a4d5e191cbcb75cd9750171d68f61c79984ad
SHA512c217afa85e2bfebe3f6411943017cdedc4aef70462b4737c72979738a2a3b355aad538f90ded1b1f1d3656eb53d17c5a2321dcdb6d666861718860a565971b55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba4eafc3199b1e238c9ebde34701d6ff
SHA1ae97cefcebfd73f62ce2914f6897005a67a9ce83
SHA256a14017ff6ea93dbea035e9524f9f5b2eecbf9c249424dcdd9d90d6c5959791b2
SHA51274a6420af2cdadb73ad8c5dba6008f65b48c143955552e04832dbe2375356b3a55701ad9bcfa4a4285da575e5f6edbab32a32f316f24b1d7ae96ce12bc9c443c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d09809e3e7b56bd4538e7ea6ba4f39b
SHA162fa4d3beea9011f198e238022bf2e18d0e39543
SHA2561ee0b197f85f6566d952911eb8d69833e099f2fe2f2979b3b55a178dc50792eb
SHA512bc2a8d1e5d80a1630773a2537f7295696df9e096ad662bf8d6d79b8bdd67e158f5bc9c5031bfd50f30bddf47cd0f06f942eb756ef5025cd8b30e81335ab31239
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c50fb5b20f5f7381106950519b70164
SHA120939480785b0d972f8abebab8c6f39f5d50b9fc
SHA256354f9690475bb3a1d1fd0b2529acd3aec4ebeb56922365b028278e1d004588fd
SHA512ee667577e7870bee10b06b01591a8c8d9830ea2c7419a1a428e38460b5c0936592714502b85f3073943a89c2e2c421c51146f2b38aca11ac155e9d15653bf1f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c81184f181326f02976b63d1e734592a
SHA14b90afeaaaeee3058c8a588a28266f5a2a7a208e
SHA256e507f63d44a4c7da3b7407b90a1f327b164a9884de943aa400c25fd586424ac8
SHA512eb928361356a81950c29b4bf29d726fa58b4bd0018a80e41c4b18f40d53367ded7888fccd8e36ed932e1a1092f546f94ced19e2a7a9babaebcc2a3133b9a6695
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c9d48b2b2bed0663dcb8a722f856bde
SHA1b069e496006ef366105175b14c287a9a3306fa5a
SHA2564c80c4fc0a39853062f8af07b38b6311bf4a8c6ae7bd8f907388209cae07bd83
SHA512babeb99698afd7fdffd8f054e1044bd73df45875273fe553edcce0c16fc71521137767309e02aae8d62a1c1d07afb4409ff50360ffd4decda1ad8eb94108d808
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555fd414d68d69507f08076e5af598794
SHA1e21345980113d2fe5dbbc4a91ae088cff411027d
SHA2564bee5a26e3d8c269e9fa094fe6948709ea6b66bc4a22d14f7f4962c4e1c113dd
SHA512309099fd648947cfe2e58eb5a1d13fd6b06bf46e330c6c898c8a7e74cda17cb9005b679bbf010ef5352f5623ff335bab9eaf366628fa04b55d9d7522b9c86814
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5715b6ea9eebb1c23c6a93dcf3f884fab
SHA17d6e8af55d9fc257b70874cda024261a05e5e5c3
SHA2562635fec99a08cdbd6b7cc2e66a00e7347411ade5b354b80c26533daeb6ff3611
SHA5123a82fe479a0c0aff10c2118f1e680ac72b7d4cb1d309cec5b9518f79f10067f6497f40d86579e8e47b532a1c56f04379b173d5a718e2b73109d12178c035ca5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd4472f196156c5cfc1cbc17772d48bc
SHA184330da6b4d4a22d2743b8d1622d813a2dce7e5e
SHA25609c5aa30978eb6dfb0964a85e6e05c448d012e48b9b1757da71f2ed2676875c1
SHA512fc406a250f49ccde77497b156c9977685ca1338b444ad2fcae3599aa6885f35ddd8e5f3b8a584888418f2d9a557b00669fbfebe52fb7f6d622a1596e4fcac642
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e40833a2e84543ecaf5f0f058461991
SHA18f83e71adeca8c7579b0c3cd6d905ea08fb63e3b
SHA256c23ba476089cd49de4fc311a6c7e7d0be70915de8e05da17c6ceb1caef6b97d2
SHA5120e78ead4213a98307f8323c6e55be974bb3fe41772920107c505790d74ba3d25368a6044a8fd82b08a4c2a890c212b70dab6971b2a849633ea4dbcfdf0665a89
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YUF3ZB4A\script[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b