Analysis
-
max time kernel
116s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 16:24
Static task
static1
Behavioral task
behavioral1
Sample
7059a77b68c99aa7c0900832a8dbff99_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7059a77b68c99aa7c0900832a8dbff99_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
7059a77b68c99aa7c0900832a8dbff99_JaffaCakes118.html
-
Size
68KB
-
MD5
7059a77b68c99aa7c0900832a8dbff99
-
SHA1
c163017c374590d5e0bfd7cd0043bff5b528aa01
-
SHA256
c31fa46d4138721df871918518186a461bea14dc69dca9d76dc74a15da7d4ee5
-
SHA512
ddc4f1e5e0304775a61cfaf9dc8cb388b05b5c53ce5b8af15f01629f9ce37b1d5a55655003b2020dcf49f37d7ac352ea343ba01416eafcf520f1466cd0d1919f
-
SSDEEP
768:Se0hqGbIiP//mdvsYSgLj/DVWmTMYq8Dfr7Vq3t40MSxjfLD+PHgkyMrj3DZ+/Vh:S1Ik/itnwOHdzucu
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20f9720db0deda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428086821" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{063405A1-4AA3-11EF-BB68-FA57F1690589} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b700000000002000000000010660000000100002000000015877a34ad760742c569867173a173e98dd1eb6bb9443b648fd72bc430b583d9000000000e80000000020000200000002b3efb888f7891829408315a313c07036ab8b082414036a642dd747d1c94f0c320000000cb208f3989712f4a247b74a020e1a2722f4e5e26f804744416b4a3de73061f0340000000c0c6899501da20a5b5d447280cbbc0a795418b81aeb1e85caf30630116cd1ebad720d082cdd4801c1ee2521a427773e79a9faf88371aa39dc8722dd8bae6331e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2152 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2152 iexplore.exe 2152 iexplore.exe 1304 IEXPLORE.EXE 1304 IEXPLORE.EXE 1304 IEXPLORE.EXE 1304 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2152 wrote to memory of 1304 2152 iexplore.exe 29 PID 2152 wrote to memory of 1304 2152 iexplore.exe 29 PID 2152 wrote to memory of 1304 2152 iexplore.exe 29 PID 2152 wrote to memory of 1304 2152 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7059a77b68c99aa7c0900832a8dbff99_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2152 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53027162de9e67f49f2962fd666c454ee
SHA12f3146ba84458c7b6cda60bb085a4203129dbcbe
SHA25696a4f63c099fd76d8910649bfe8a95a87b7885c5cc39454987ce9186d4a49502
SHA5129fa797c92a743cb2859975884f9582e3b9ddfb5cd5f032dd9b854892e2cab337dfc216278a092b968a35f76592d72ee8003132e508088472d8819d3f929d7ebf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506266527d473b5fa3ac4b77d4c2fa1db
SHA1babc18225082f03df7a549cdde1ba277eee67e1b
SHA2564ba7505c2b8c7ea4e7dac1b26f63eb0d987e7d1ccb0669537f3bcfaad7ef1f33
SHA5123c307a174778407435c02cb2cc4a3b8c8c716002fb22924c39df6501f8531f5360d514bc0e6aec6677f6de1f9d64fa383d384bb522328d36bb5fe10318b793e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb776b652e44943cb15311ff45365417
SHA18e1458258f7657dd91992c7bf47c6dddfdea737e
SHA256204088d3e6058a8cc8336adf855bd72a7ddad9817a5aedf909ead1f39a24d8f4
SHA512a2c8e8f040aa97bc91199f2fc152f8fd9dc4f58581f169c61694a540f42891ea11b52a7a1fc19c615e1fb36be45dd02007267a5f08afaa29098cafb9065c70fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a090ee044c8f5c677e935ca8ece150a0
SHA1e1004d6592b277bf67af35594bb1464bc0eca162
SHA2567d824711f6f34685ff3de8b25fb7feea19bdf7e7ee9ed64877bca00428212528
SHA512ea207944a7f1570cdb3f7fd3dc70e9fec3dbbfec60e6754a210d18292f312959c8b45fc670fb904975f70acb8b119ffd7a131d110021045f4ee3582354b39c09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531e02c84fa03d9f70e3591300a2013a6
SHA1ded1a4e147b1b12b7aea88fd5c37039f38572593
SHA256200e54cc51801b1d216d851b01ee2288299f2d2b8eab1b7772eed967268b20e5
SHA512ffc611e8be650f1f97e4c5e259fdcc322034cb01ec6b2e027cdeeb50b9f88a90c86b9ec71e4b36adad102a1c78a2955ab0133f13aef988b44bfb8dc42a2ef6b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfd41d6fe4fb62c1cccc1e0e7bc6960b
SHA18cfd5b179fd1178fd25668c5b2d8c4b60fd78cc2
SHA2564a1e1ac7f2b12ee579616fe4ed5ab09de6c82cd3dff76fc803e89889de2bdd06
SHA512afcd3e2a59a2fc71bc0d34db47d38fbb9ce0b64692488d347bd4f5c44f7f7761f01ae3a8d51666e9588534397d0982378c1ec7ea736075303bd669b916dc59e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598a561e88f2c232353c833c07bf138be
SHA16c0ffb9504670097506782864005983ad84eec0d
SHA256bea581d22e6f197763327e6c28589f4ed03c10c0b6d046722c7bb7457ee405b2
SHA5123db196195faddc40196b9004bc6032ca879b9d4106bd5e78c0fe651c55328ec42377fee17e7a89a0ffb752724331a71d65dbc2590105e3e405eb6f12d72920f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c2d5028468fe74740293e2bbc162458
SHA1393f88bd23c2ce3e7ce68a966f24442857aa4cf2
SHA2563cb114bd03f7a80164e9fd85ab427e1abe3f8cf36430a08ce60b448419fbddcf
SHA512d134128b75a77b6d510b33763c05fd25ec4d9ea8939213d8e39352ce459b95828b8c182309ccf56fd85a03382190b69e676800bda199b2798391016a1de6d29c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e85f4ebd83cb9193f51184a7c7d0ea7
SHA1857ebcec2fa69f41eb6e15b945f92a66d9b1ee03
SHA25699c99c09ec9cca699ea7fc8a66f72bce60f3808fa36acb9a769585a4ff7bf551
SHA512746ee4d238d8278c67a9a08ef1ab07fc70a1f49cba7ddbf10990b1ef0a94afd2b1094f5e262125c8e90b24065917c2fe453a131029c58e8162fa673153a920f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5254f7e08a06d40dea31ea53357a72260
SHA184453d18fc46caba1c4ce90575015a0e401e382c
SHA256be388b67a2fd7cf7b6ca47fef4668084483814ed1d07da728444ce4488ae7878
SHA512d6a3d75524dd2d9c46b54ad486325af6a3a49ca0aa4f26c8da53a88f25e41966e367a97e833bed1cd57a3323692e6c3f7dcb16fe457923b607dfa223aa5e70a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b357bb1e7d19e47767e8b6a82e84d17
SHA13ab25ffd9cbbf3535989f087512ad35625e4595e
SHA25658b9b3cdf17f9272715e88cf60443bc8ba19829c643b3e0b9de88de289af805a
SHA5122f9688e012e9521b2b8dd9aa1f8b5cdd8a0cce7f0a819a3dfb3486f1be338c3939fa8ac096e556d4be0c51fec3f0fbaeaac1bdcd88a81d3f68d874b3fe6bb7be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac8940c5191820f29ec79d4d5b359404
SHA1b4c744bfcbdf8ea007722b7745b069ea8565e211
SHA25685d3747fc52f38d1430775c0d8b6cf561a0fd7c8adf2697c3b0953b8a1128636
SHA51219646863a6516afbfb2686a10824faab1912a7679c532ff05e69c0a2e3186bbb4091031815ac6ac6c69d1a3fc85f4408fa0f571fbbafe76832136f860cf1734b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e740e1cac90d6d828411acf0f21e516
SHA1a28299df4249abf4f57d803e486177f7726fe526
SHA2565ad32f036927f842f50cf59a450619c8911f835ce35910b51f4bf8c32ae5e7a8
SHA512573eee5cf94c57792191fedb27392f5969cf0b574d203066baf7f79482b65ccb40786899da5c5f64ae17cb7461feb55351a7c580b5b4cbe94958945dc879e89a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5804496617da64b7d8186d6cb3c257922
SHA1745e1f1cc49d2642ad09a6177f75bbdbb41ef0f9
SHA256d7d411703a5ca2d202fe296218b6cb82bf0129409df5c77df80d5b852d9f64af
SHA512e64b07db4a3a445be9e97f7d3b1904516655dbe5fe712792179f4aa8fc07c297971722946ae07fb203231bc5498bba1a5525c5c389ec71c8ffbb3133a21dcc5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5621240a49473bc2d85b48fcf784ea4cc
SHA1c45834d9358f7970f39aafea4ce9834fd0d49def
SHA256751d53f5bdc15b75d3900afdf7c00fd206e6c06d03247a682dd693aff7e4ecde
SHA512ccc0fa2786d17c6463413c592b4ee9a6e904a4637d2cd8dc7bdbb94b62733111da788aad3d137feec667009b8e74e964fbb592bfcdab3bcbc6f8d17c4f61c24f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5228fd6d71f1fcc289787b5b19a3d1461
SHA1fff6f163be0613b4a8db836e4dd04ce00b3835e5
SHA2567de97f8141dbb6ecf109c4c14108d92320bb4152688bdd1172ac9faf9ed1fb4b
SHA512f36c2b19dedd1a03f3dc1f0bfbc8261bd33d9dbc011cc40ac4bd7798e0504a8d2ea5fb726c7b43db40f7e2c0dfcfe02f294bd88cf6dabb3b76ccdda84e178e53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5279e29dd0f8d6d31a3fe709b022708c1
SHA1b75b5459ebff56239d0bcc183c69050aa4f02bab
SHA256316dc797db5f555a4ddfc0310005607a949b96973b48e5784279ab648f4ecb1d
SHA512e732488385e14789e4ca152aa582f466d87d3b6b657625b9d15b6fe6cc010ad844cfd617cec76dfea72fc1150231b4b9f8971ba787d94f119737d83fc4aedbd3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NFAY0EOS\ga[1].js
Filesize45KB
MD5e9372f0ebbcf71f851e3d321ef2a8e5a
SHA12c7d19d1af7d97085c977d1b69dcb8b84483d87c
SHA2561259ea99bd76596239bfd3102c679eb0a5052578dc526b0452f4d42f8bcdd45f
SHA512c3a1c74ac968fc2fa366d9c25442162773db9af1289adfb165fc71e7750a7e62bd22f424f241730f3c2427afff8a540c214b3b97219a360a231d4875e6ddee6f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b