Analysis
-
max time kernel
121s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 14:53
Static task
static1
Behavioral task
behavioral1
Sample
700cd5f043471e1cf63f4885a7ad429c_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
700cd5f043471e1cf63f4885a7ad429c_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
700cd5f043471e1cf63f4885a7ad429c_JaffaCakes118.html
-
Size
23KB
-
MD5
700cd5f043471e1cf63f4885a7ad429c
-
SHA1
a02b5f514afd6847634e6a70e398196ae3d84dac
-
SHA256
200c6bf60d894c14b296fc53c08c49d9a98df76847bba378a2e0ee38ad58ef80
-
SHA512
67b527ce10c988623ee217bdb08e7983922a0a5aa558f3c33f81f294eb70e7f88011119db116c8d57da26d8955bc1284517fe07de0884a0a8738347122f9d5c3
-
SSDEEP
192:bhwn7tgVqYcwFpAQu1hhs1SIRTJnrwQ8hTJ24Tu7iyg+khIouQi2gSXlH3Wz:bh6tgQYx5wS1SIRp08g+y6z
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0009a557a3deda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428081446" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{82F75DB1-4A96-11EF-9AA1-FE3EAF6E2A14} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000930ed985b08cdd4cb38e38023150682b00000000020000000000106600000001000020000000acf3713cdc09097fcde8667bc5a69b426e3df2350a51d71747ee1a9b869111a4000000000e8000000002000020000000c35973009477b473be3ba7f938bee612055276de0f51975b99594b914db38a4c2000000045854d771d722d5304b01a5fcf0155d64fec1f84588f2cf461adf8b2275e4bf040000000a11dc64f859edfe1938eb3810b4cd59ab9725bb6b4067b3e6d5d7049d2c16ca10c5ba36c623f211b88cfac1c0a2dc5260e2915bbacacf0b33556b4d96b52af6e iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2556 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2556 iexplore.exe 2556 iexplore.exe 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2556 wrote to memory of 2308 2556 iexplore.exe 30 PID 2556 wrote to memory of 2308 2556 iexplore.exe 30 PID 2556 wrote to memory of 2308 2556 iexplore.exe 30 PID 2556 wrote to memory of 2308 2556 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\700cd5f043471e1cf63f4885a7ad429c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2556 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2308
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5056a4b015b157dee453b8d848872a1fc
SHA14ccce80f2571d97c02fcfdc0286b4e80fc9c7f0f
SHA2563aa49fb52555bfa024881ff89b57edd2d64979c900e10ec65046db7eb99b2341
SHA5123ff6a88f7d55364e8b21f4a6251a24e6cfdfe19aa865692d6b6182ea6ee729fd1caebea374d10d5fe221e366ec663bb291964ce512f4d931d2f58f47001af927
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53964261b6df0c02fa5e630e6cd3a1204
SHA18f9edad09d07165401c2d9b0506d12bd0a7eacf7
SHA2569c085c5a34f19a2a76dbfdb2cbec0c1dff72cdb5e9b5ce90dd9fb3644e9f9fb2
SHA51263d2917b062488f6c765d3db24416b571a3044a40530840b5d898e6372dfa07034b85a065200ea6e02112b78cf22e38c1bc4d494a4cd6c6177e4415370a83838
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ab6ab3241a56078d02ae276d03f8751
SHA1fe7ce2f07d6dcf204c1c6ae4d283b9faf19dfef3
SHA2562a9c56e58c408fd4662318993cc22ea2ca1f622c36deb1081883a6d66bc0ed29
SHA5124364b2bfa356630547986a72aabf941e6af1264db0d43c7947f47f39d49730af2e1c1e3ad7009364b7d7275d1ecc4b686e747944f1e18f8cf8a5398a7c32cb4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4e6b4a25491ad86ef5b3057e003dd87
SHA1f6b5759fa0dde077021db7f60611551d4b3f00e3
SHA256e04298cffeb82fde4422ecf03900819a6920fbb29562a1ed904a4853caaff9f0
SHA51200ddaea0035c43e7f7ef6c6af620646e6cf517cf5f420205d0aa8c94847d217d4a0ade293f8a414565d7fe484c915f9ad887e9b240488c98cb4b81ff6cef13ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7ac69b094a5568c6ac5bba09a766e48
SHA19638f7e0bf0fa6a0538ccc000bd86af5aef378d0
SHA2560684b5df2fb65c4366b101e9cd59e1205b55625d0d071980eb93b25fa62a306a
SHA5121b808821e955ad586ac0ccc0b1b3f590da4c3befd03ab147fdc761c71b75e8926555fe5dec1a66daaec8ae0696d6be1f0126bca2238ccc32067a9080aae4d167
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5235bb35003d7267d60ccc451c308d552
SHA165a213b61c4d8bb73ae8139e563854be8bccb0b0
SHA256596b68ec924032521de06ed47d5e00160821638b07e2ff7f82fe516fac20662e
SHA5127d3036c3867c2cf3116adb4b2bc3437ce5fd5e832f9829c3410c9936bf9e64b18bfedd1a9be7084691ba1e0d2ff0cb3e03a47718e47385ab295b072472711c6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530687f406573d8f7d724b3d9bb87dfdc
SHA10172afa9d9ec0850521755c09814d2653ff840ee
SHA2564e54209b2340a92b280666095ff693f49aeb0dcbf3b396a7eb569de4b6b50e9e
SHA5125cba1a3316514b8bcf59d3e83490e0b794c23960c7effdafc1d7ab1032e0e8744627dced03898855d789400c6c81f2166c480e8665849b23315e92bcefb5fc94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5808c6dc66b3fafd23bd80185db09c37d
SHA148c7a4d7ec8cc5891d08582068f7c82ba07938e8
SHA256b2ba595020431041af35f24f76b569d718e65917d1d34f6eb52a3add1e717818
SHA512fafde66840f68b14ad82f53fd65aaf84e2ba26997b095739e6860ccac5dc16da2ff864cd717f1b6af940d0d16f80cddfb7c4f61d7a6e61580976a0950b59c4d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50571e6f194599b41c058b5db6a4f8105
SHA1f41ee2c4b17b655081786dca19ef8acee428c3dc
SHA2566dd8cb038c9a67f4976f2de2f5f5bf1d83125d94bb19d43615ee4728d893b4cb
SHA512cb1d4f6a2d7995b3ed332aa7eaa9368d980b3653f0e477d8468a9bf93ed8e10f0943546e305109de449cd47cc1f860fad511f4a092b09ea06ffb5a7bef35fcfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe2e47eae37981dae567c9abec3fa521
SHA10243ef562c1259a70ff6c88d98bd8717da112c58
SHA256b56194b8aacb8127550ac8dcf5f5eeacc2459d358824c56d67c1fe67cabc80a2
SHA512bf7410dbb13706cc95167128834c44592e7bfa12b5bcbe7f72cd5a8a0e08faf0e8f13caf5bb6b4974ab29189ba133688a4e18ee540d84f5dc162c1f8b41e3642
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538d69be9d79202ec8412f797e770694d
SHA14fa49d9d1bf5e6eeead5169644db2cc1d84ad220
SHA256327b0637727622f54732f06c978ded8d0b44def4907f229946a7a65d690ceea5
SHA512089161be2fc1ada4c2f53ee4b37bf273f86c11dea91ff93ed563eace2c3b97cf77aa565658acc576d6c51285429545e2d3f613126c03650655d4c2a964a50c9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c79289db050c33c0d7105986d008dee1
SHA13c3020602c9fe2384f93b42d0e26b5f4347f3965
SHA256da25e6b7004c36e6f9a5637bdf4461a79370cae0cdf39cd41bcab9d69c92ee98
SHA512e6b5d6b2773a938e56c82f15031c1eb437b3c85edb90cc6d05b25f365bc15be0e4f79f6561d3a968f618e266d3c8d58ea2c5f8c57538e08152416a1a967df53a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591adb7f0a4a01c089433bb07d7ecf762
SHA137658f9370a0d103b3fa661b138131eaaec45d17
SHA25678f514d2409816658cb40186c94560d45e365846325fa1b7236b0534100fcf8f
SHA51253b5b6071cc8b7c34d41bbc4b6750b28cb0168233faf2123ae63f5b9ce58237adaf7471cffb5a6a59f915a6e3f542b3412b740bf73af776d1e0f3a69d72116a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd2784af84584e5a0f4a1b6fef62f0ec
SHA105528b7feaa6a76c2303278497fe8fb6b82e1775
SHA256feb6a9c34f3be96a62cc7620eb76fd21f17ab1fe307646a65b47aee56d33c9c1
SHA512a0c7bdd498beb67f062269f9b8f48935f53dc05aeb066fa8c4f5a2cb3b49c786f7c75cb1666fac9ef0d4739702671d4e5994a3e6195d32f526c4a157ce7fd9ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec6c07402ba1cac1e80d78e1a0bc13ef
SHA1012019b8ab1782e27408f4571ad4f1d534577111
SHA25638ddf6462319d3663b46b113990fb8b8b65505a26107e625e92e3d1d78540223
SHA512b90fd72008d6cd6e3cb479ea8ef9612855714d22254769a72508e72a86bda33905841307cad962960fb11f7522d4080e60acdf15862311a584721406d8d60e85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537f55993d4e2e1037f0026456da8bd6a
SHA141a3f399813f715544624350c9d8834ff66950cf
SHA2562ecd8c1dd72a7ec8644daabbc303e5e39d4e7ee2c56a60ece3ca99c1a6594061
SHA512c9cc57d4fbbce8aa6520e57bec58cd979089d40bf5bb449e43513b894474e0de40aee0da234b6ced02183185012e6e40250e362dab8806ff45be4cc0faee3b46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fb98eda13b59a147f4da352f4183372
SHA1d78b44ccc4c36b1eddda4259b34938729b68d521
SHA256b9799de26ebd4344565cf46ac331102490b069826f2e17c17a47ee292e620bc9
SHA512d2bb3c710b3f24f017cdaa4445384ecca1a905fb46a2b6d270a178f347cc4d516d48aa8cf1578f125363e8695353af6ebd38ecd5c82a8c5de8c6089c3d6fad84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509aa7c25aec32bd75ceb466d2c168c95
SHA11bc5010f575b981cd3fd5d2b462ab8b7665c37b2
SHA25635012c0bd19b5539e689d33b79fff88ab33a28b8e02b8ece410e912d39ec9f8a
SHA512a47bc016fe98e6dce08a31e83a645fa34d7a08400553a7b120e268d98202184a8dc2e1f7bf8b2d29349af928760d1d60bf8912e0d6155bc5941f7ea2bdd7168d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8e0ab8686cb3ebbb0c6a9f5a118e6c1
SHA16e9e689092126f78f484ccebf655dee94dd4e961
SHA256e3d4f209415c72b797f4e038694e1f35a4edd6304d06b4f7510d23891511ec15
SHA5124c80acd5482f35bde0217151532d5aefa64fbddf1ac6c4927671d340cf6bb06e4afcb113ca46532c684d4032744cc95e34e50c01df5c349f40025e2d5d95bd28
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b