Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 23:00
Static task
static1
Behavioral task
behavioral1
Sample
71999193f8bb5dacded9fd897b93c10b_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
71999193f8bb5dacded9fd897b93c10b_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
71999193f8bb5dacded9fd897b93c10b_JaffaCakes118.html
-
Size
11KB
-
MD5
71999193f8bb5dacded9fd897b93c10b
-
SHA1
29050553c7fd436478b070f84e936052951cef0c
-
SHA256
95da6443a1b2b6ea8c6c349d4d0c220edd012d854a49327146f6179ec4da2f4a
-
SHA512
6a0585bcd8b53d6a1b8900a30c4f978628efac9dadd89cb720098f3e2025e38118cbef334a0644c87d3567bbe50281e28fd16d2cc3436c7bce60511aa0d2e51a
-
SSDEEP
192:2ValIsr0r57M4exaXT8IG/w1wvqVkt1kHauBuLbdU8d:salIcIQ4exavG/g8WaguLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0ed9b4ce7deda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000b66e1d7466f9b2ad85ea7e38ba6b7b2ca38d5fbfcc3bd7ad4dfdeeb8026073de000000000e8000000002000020000000d8b98f972af3482adff5e1e71315b895ad8a239f677e0db3b837b0bab9917d6020000000e2b3f2859bb715e8949e8752bbb60a2cb21c91310bdee201eaae77480eee011b40000000ff15375ccfb7a4062d6355a6de023ba8b1e194f64e92dea05141ec0b73244e44b33edb8cc6d6d3e8b279e6cff152eac49c17974a9632451ae03c1a9847ae1fe4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428110542" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{42021F41-4ADA-11EF-81FA-CA26F3F7E98A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1508 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1508 iexplore.exe 1508 iexplore.exe 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1508 wrote to memory of 2836 1508 iexplore.exe 30 PID 1508 wrote to memory of 2836 1508 iexplore.exe 30 PID 1508 wrote to memory of 2836 1508 iexplore.exe 30 PID 1508 wrote to memory of 2836 1508 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\71999193f8bb5dacded9fd897b93c10b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1508 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f21ae72b11e50d4c3a7226d2744345ca
SHA11e40ad9a1eef35c441603bc08327b638f57d9d77
SHA256b53cb29b4d5f612e1b6ca6737aef434c4df5853ba6cb3b2679642c0fc62c75b0
SHA51283655844d14eb5dc703e51ae1e62b52c5c4ff557389efc1a8d2dedca881df528357b74784eab4b9181736c87f15b665c3601bd5d1db60f50ccca5c9e30a792b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580ccbfaabd7819f8a66b6b84fd4ff09f
SHA13133d7d2a65baf5381b5582a0e972b8695924028
SHA256cc7cd9f6120679843ba70ecd52b36fb38c4d36a167c46a0bf18d54cc2e225818
SHA512e22bd0e83276e9a7b3e19f64a7cdfdb36955002daca6a6628216063faf6cb5ffe05feb9017d9dbb5824329a078fb009cd780941e30ab6254b329640b71847edd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541a7301281166732ba4e8678f7f44eb3
SHA135610db4db27da0e4a8a7bac56b964e0a4df19af
SHA256cefc9b607b252b59091ac065b6751049857e702eac8a4bb636903963f51da81c
SHA512dcefd41b55120d2f94d4f83a49ae0878db386df15d420e6e20649c6c89b37a1fc6d3ae8779dd0808f2bd0e3275b8df39bb1885c1425772694203c6c07d4b8c31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cd2e3539efa1721707c6b70e09793b5
SHA1e824b28479e2fe2ed212465e84c0f20b686d9fa1
SHA256e829ebec35943100130d316743117070da324a50a781ed3dc8629e9b39bdeffa
SHA51208946b78f0a2bba07bb56dc33ddb0151316c93fce4cdee0814efb0908bcc8848fd0f553969621a3f12d6551b6d7e11c58debedc006077b79cb2d875a67d1a422
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a938083aaa1a8fa031add2a90492132d
SHA191d9f8667ebbdd809db21f9d49b486c8e43e6507
SHA256ebb3037bb1fecd07852ab5c71d3177c37156241b71112330550a7b0f37dfeb22
SHA512cd00210ba137023f43d16e61d8c65c532c243bb927ddf64adca8b1697871ef40812ca6f8a1de9c67ba097c3f552aa0ca1be4bebffda8d1841f9dc9f7c64de718
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dff71e2993647124490fea3b79746b4e
SHA12cf18655b699fa3e0a3b2b8809ba95d60311b4b0
SHA256371efcf3094e394ccc3ea4ca2e262b47e6f29cb4ab6e400f35aee395574d47a5
SHA512a3b15490b6052d64386be47188999f1fa1f96db524eeb326595fcef8aaf13bde8b841ca89538a6bcaa6ebc9b7969749e380959a98f825265dcd4fb0da34c4639
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59512e5225c16058e33e9c5ed8c9bb26b
SHA18d76454de5307b133a1ef41ee5301871392aa541
SHA2563f04bf8c0a6594ba01e263f0ec148cedb904cb87eee4bf30d8b953ea9ec24bec
SHA512b6c8bca10376f5cdaa825bf2abf6b36b8b416f61356332b98bae3c532936f6e7646f5c44fed90d2862e80240a85829993d1f7bd3d73b8752ca179caa8da51e41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5fd1e49c87d0aa2481198c000048526
SHA15a685099f4786589243b90ad58ab896e9538c843
SHA2561c5f6e647152e3cc6fddbfa88ac0838bdf95bb7c7cb17a5e00ba11d96d42d9cb
SHA51288aa511d31201d34c1f97b2a73ec7a706121bb86948ad7a978da1332c754016dcd1d1ee98b777eb66684da095fe55eacdf5008cb8e6de3eb513a6fb5dc7f7fd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d5f62bb8d138207fcd4408a98e3e0a8
SHA1a224732ecbe93cb48acf4ce705d4ca99810dfc73
SHA256eed56223b3a93dba5042375f978d169547dbcfce280f556477e112c5623bcd5a
SHA512f7c5fc9522b1cba8b7c4cd0c59300df5f763e6f590fee817eeb4acecc008850247a3dff5ff8c2f649c940e260fc2614ea280243dacd65efb309e3d652629724c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53929add6f45cc8c277c2ffa6ce3ec86f
SHA1c016cfaf5d09a2b5bd350f86c1df02d586ee6e1e
SHA256c50196fa40d7244ca62d58577ee705a3e3b71e14ea67f52c0fe96e390bef78d3
SHA5122df36a5045d22bf0a14261e6fc5b930ca7ec861d8786daf95ba594a5e2d97f013b8ce60a3f21b5dfa63af5c16ac79c2d40b1bea976df2c21e3f6dff1e787de38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ad8f2a28d3f3b740c0b2ec04747bae1
SHA12abcce22c429237e7098f02c57ada9e9cbf3cb84
SHA2560e4482656fb2b48012a3c56982a04e708e9ac6ef95e98c7cf15781dce99f5ffc
SHA5121286d4de35a2516842a9ab3c6100eff29f6ab0eb6156f35fa4ac4ce1993dbcaab97ea31ef1b26db4e8af4fcea50394a8e43069218722a7b0855fe9bcc0098863
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55acd6af5e9e4995ca89981c628ef404e
SHA1b9f4451ea7d563b5dd4979079e4e09cb8a9de864
SHA2566087a0f10b1953c13756af5e6ed6560f707b791e4e37145060418b656bbaffbc
SHA512f4a95fe37267065ca4a9e5f972e4b6167a222978a2eca49de0a9fd1a8f32792b72ff24efda7878931a814472b9fdfc6fa6db43f5d4a02bd1dde71ca52d5c8104
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a97d064da1d0cb3322688245a08ff2d2
SHA1ecc1e958cbfd2c5fea5aedcaf71cb2c04ade1d00
SHA25629934332f6ba99b02ec7ede418d6fc208e10a67158ef7864a543972c45cfa626
SHA51290684853ee6cfa3de2c42a9966f1ba36a5d29356b662f64dc272fda60b159c2cde31df2c22e5249ed9562187dce753d232e4f2568160941f55be68f493f83f32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c3b73c62162617985548c25e3adebf1
SHA1f7739e9cccb5af2a98e6af1b2ebd5f7e30367441
SHA25688ebb185f9386b7aa5175838f1a2ef4c9f24a3ae11abac56b0560945b9d15f2f
SHA512d2658da414f0092354d0854cdf834691b14456a27e7741b263e25374d3aa941a7353db03ab665ebf8a15d3b714f80129b922bb348dd7987cb601bec1b33cb445
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526837c4771008b586c7632e3b8770ef7
SHA156652a916f7414a68a05feadf9b133aa7214ce0b
SHA256becc6c7043efe2ab1118ab632374ad925400f652ce69eb5a7821e25fbf2d48f3
SHA512c32e74506c6cc1a6d6be1f273a1093d3f4c4d90efe40961593c7e6af0eb2c5f06f3dfb625680325e5078090a993f2f9413e19c30df5aa58a084d4743b8b4897d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d4d0e92751c353b06727341e4f07bd5
SHA146d4cfaa004c3c27fed855322bbae69f09782e7a
SHA256e90da05c789a29c6f29099aaa02f1cb2b0d0e96d32888b6e9f6c5a75698ab066
SHA512425d19d6c284dc482e8b2fba7bf783ed6e7f45f3c347cdc7533add4e9ffd50e26dee1d097f9c08b32c08d5a280ca92b033c08848c7f6996d4ae15cd26fcb840b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513b9b6a793665c012d52ee69626c604a
SHA1884e43af7f0c275548c1e2749dad2c70f73e8aac
SHA25696f7cd05ab5a73f8fbd482faeda1eae8cab0ead7677fcb1555081cf543082c0f
SHA5129a379f99a6c8d828b16b6e7e345042204e49de80697f36ea2c2f08e6bc69ff420c16c40844de8c9a9770b9a6bac2bd18daf99ef3d2f3f288cac8358177a492fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52af760af37dfe95e46e3e5ae173e7e3c
SHA1100e37b6790c16be857df8b1ca0568a6d9e7078a
SHA256bf9d4104ccf47908ae906b90be82d771ff359021b4f6f4ad599327b0ba234cbc
SHA5125e0f0a9c9c644d892fc69775a00af8e1066505ee4f22d4a49caa89bd41d42140c7afdc8d158e3ad5783a0acf8f11ffd9c78f5bfbeca1b693b13bc951895c0cf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503a130e215be1c03ae0b37e7fda1b410
SHA10f6d7361e9e1568f8013526e6bb81748f9aaedb9
SHA2562793a43de32da34803cd7c2416424f8a30e4d43d97eb9d822fb318b94617132e
SHA512b3b2b9f6add8efcdb7b2df574b81e32328cc957c8d13644749affe4fe5ba28f934d1785c495847adb7a69a14451f7d13e97afce5450c29276cc5af2b5779a108
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b