Analysis
-
max time kernel
134s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 17:33
Static task
static1
Behavioral task
behavioral1
Sample
70919567b5c2282ebc0f9635cf5095c0_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
70919567b5c2282ebc0f9635cf5095c0_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
70919567b5c2282ebc0f9635cf5095c0_JaffaCakes118.html
-
Size
1KB
-
MD5
70919567b5c2282ebc0f9635cf5095c0
-
SHA1
6ec15b5fb57cb7ea2ac8dae25e8e2eda7937bb57
-
SHA256
3d9be41d1441778c12bfddf34cab9a98ba15d5f628d5defbc68ca608c33197d1
-
SHA512
43423d7781114a7532d23c4e1b1327fb378ed26870234bc0c9d38deef4c8fbe243201b9110ad4ade70e8b5f2f99a60548f32afc3384857d483920b938f200185
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb780000000002000000000010660000000100002000000033afcfafa9012e101af1ec33827987418d74f4b8a89ab0c7645bb8ffa4554898000000000e80000000020000200000003e481f4302893ee07100a153ef52df21bdcf5a1810981c454322bd43be54175d20000000e566bf5f7de60539c07413893109519c588cf7d5df6cb7e62ced1056d8796b22400000003628caf6a22ce1bd561fee8646fe3f580d38d3738e8140d5240d924faa92ebcfc0e118982b31ef81c096b76ec2361a9dafc3ef7fda897ce7c91bc1245292be6d iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A74B8771-4AAC-11EF-B9AB-7EBFE1D0DDB4} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428090955" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0d90597b9deda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 484 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 484 iexplore.exe 484 iexplore.exe 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 484 wrote to memory of 2128 484 iexplore.exe 30 PID 484 wrote to memory of 2128 484 iexplore.exe 30 PID 484 wrote to memory of 2128 484 iexplore.exe 30 PID 484 wrote to memory of 2128 484 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\70919567b5c2282ebc0f9635cf5095c0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:484 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7ddbe81999a366c0c98b712cb3bcd1a
SHA1f317adf667dcb859517a1746c4a09a9cd92ae03f
SHA256b2aeb6278e34779503d8bcb7f81a924df33e53a2b60cc3f47a191e2334da56a8
SHA512cc9a7841a8f0daefe9e6e8e7e6f72c3b01bddd0f8398a61d0fdb7d151cddab0e19ae65df7b7f7bf0d139ca90e13b0b1cd8f514c9972d58cba6a1719f7ff2f19d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f3423329404baa30e4f72720545ce0a
SHA1cc960c702cf7db6b9040e1b0d90c7eeaa4acfca0
SHA2563522a5fb0bf40f6d6571b9e34ac77c9115acd6daa59caf7691c115d0cec18d75
SHA5127d3e14e21b99c010b6c1baf14644e61a1703dd2d55facf3a1f040db0c4b2591a8065a92abef0f7dc14e49400ad41a09ad32bf2ee8c713987f954a0bbadd9842b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b60d301490a6d94a8c46d4a40c85be9
SHA1076ed906e6fe9c6832c98298751bddf434b6df93
SHA2567cefd40b98d3f21949aaaaadf830f80bf3f0c1bae36dcabdb2799f2e5ad5fb7f
SHA51293537182581f1c46d7bbd6dd64b26a77d1d23e77260993fd5c5d7e3394a3884b4117205cb6fcd40231cb7e407b38de5c765a2870810bcb1bf770f5ed547823bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532ee5c84a20130039f649464ced77251
SHA136db1cdb87dd142dc9db43390125724ca392ccec
SHA2567da2de0ab7339f8eec7f4dd5ba6c56c1f771ec585e53fae66be64bb6e88190d8
SHA512eaeacf02d710986ce60e90d02011c0f449073ee7b4d4a1184023c4d57d19a8170bc8982990274807bd3810f0f75edf01308e145029d32003c005cf688c234374
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e5724139a17a7189b79c1e9164164e3
SHA14ab8c88031ac609307ab8c7a2fa0dbb580d86e31
SHA256a4501dd2f85876e03b81f91b12387b999d0af919218fe563fd135be460f278a6
SHA512f130121c72c8de49f3bdc197f3b76f2d8b39cdb78d345b76f30741b7ffc7b50b58186d2c76f8b34ae9ecd20e2abb0587216b26062e94e38d9593b6800da452c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582b7baf333a6573dc3643825944e6849
SHA143ff4ed161e3c0527036c939d4c7a03e7fa0aef9
SHA256628b3b36b3f661e4040122a2e7ae641b2f3bc9e3015e1bf778c7e920b5ffd6db
SHA512ac7ebfaf773e64626d3da78789d0f3db6a3f144b2d06db3a6a60b767c454d592028e2885b69ca12a4334870a1ee21815e0936e7f69d64651380651559be6b262
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564e7a4a22d4506c916de1c876a19c4ff
SHA1b627c981d71169f3c00442c1f773622df60e6d2e
SHA2566231df61f86ce95e47e299f2645a5c3594b0ac89d397abfd994c56621f1b67f7
SHA51286fda9a576412c3c2b2fc43348e8dc84b7b7b632de2d4288bdc387c39a04793b9713d3cf5840388a985fb2a3765301790ade0487fda2dc3279aa2fe6f6be83fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591c3be7bb04d5fd3f53dfce30250099f
SHA1c0da9969f62029b06c047ae7c17095120bd1a999
SHA256e152854f78d206ee9b909fff9cdde57391df4217a3191e9a713e126e4aae52d5
SHA51229796eabcda3c0430ae3b4e82a483ac4fb4059fcf30b7e986205117dacfebd3d8b62ef1503fd6fb3938ded5f43bd5d243deb95cf7e5bfc57bc8e6f36dfb4acd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdf76b8d76a1f2e71f430685ba48a957
SHA1899712a20475d2fc36c38a3c47713b15d0c62507
SHA2563a62f05cc40ed166a0b0765804ac5f54581f89aa7241195be93a441db3acfdb3
SHA512154d556d56c44359560c9e8154c0341596f2e15f8a955730b501e7dad7604d3dcef50792e721a0be60bccc0ad75256708f38d0241dec385b59fde1e3f565f2f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db0c51c74e144cc5b3c7fc9354c7f02f
SHA17f00f734a9807fbd30a935741c334ea0ebd2beaf
SHA25654256c3acdafec8975c809fabd901ea4830deaa579f203bb1b6cf359de01a0ab
SHA5122fa67e5a7b2cee632d23b1c29aa67de90170080ffa206961a399b6903d7cf49803551d361dd587625defe78e25089113807af5d9d835b8a877a6c32ee9fe0993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581c44c8a88f723a8d3a38ac8b969ed15
SHA1e4abb9b8c166c5d6e24507ed917a7301b0fd00b7
SHA25678479e4a902b4c81254b6f18bc1702526249f3d2d3603a66578f527f45b0408d
SHA5127c2a81dee9254a3095dd016facb727dd7cbfb718f35b4fe6e367ebe9247a120c75df222eb3cc3412e9b55aec9ad02f8f79aeee2a4d054c79f1ac57fd32c339c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b75694cf5ca1563c584a2c5d1841228f
SHA10c091cc723e2f68bce727d255ca4f7b26252b89f
SHA256eaaaa0829eab70ac6f0945fbfd74a3189884860b99cadb8f46ec145867066101
SHA5125e3fe2003cefb6713c1cddbb8bb8aa468bed561b21216a87ef3d4f80fdc9a126b1d1b10e0579bb638b78cf719f936476dfef170f65f53ce84773e110575a91d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c56a20a583630c2ca3c012793062fed4
SHA1e7a6a3208fb16252043ed1725201bcab595b297a
SHA256c5567d3a5db0e57a163a17246692ecadd73748f848e6a3f15c5db5390ee6e418
SHA512f662c7efcfac7ccf4580e880e43a8615b39acc99b5698d17fdd0643881b166b49fb232f8b9eccb3a768c1b7d5b6d7c6e6bef99369b4a13124ad35cf46b987f46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a4c307f0e9fbafe191f850507a02399
SHA1297a0519f24cecc8a85d8f1c975febdcabe934ad
SHA256605039bee7b3cb7d526ce1d1b8f510f8b622234c383487385c819a01866642eb
SHA512eafa7bc6345daa418e4c0fb6916f8a228942b1a254e809a8b02e85d73c3d724b5d382c6c0f942a094cb6a81fa47970439ef25a20e87b4e5dd15a69868c72c000
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50eb7d986faa8db6aea4c6ac85150799e
SHA103fa21675a8fa5e3b79a968f41c27532b45ff476
SHA2568265423796ca102d3ced75a08e4ca84505ac6b1a85f5d13b008dab7073b463ba
SHA5121ddb44159dc6e6ea1e2565ae6ba3813ccf46243a05e2ad7b845af1b9a4d75b7f85f9be5fb7bbdc5d287017d3113057c0c42a0b97152e8272ba332449cf0a86ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b8985ebd581ef4afe5582de1bcf08ae
SHA17586eb36e6bfcfef630713f7d3a5d264c1c153b6
SHA2561c7dba6bd2d4d57a30ea199b0bbddfd66840ff9f0ad867e9132304e6f81a723a
SHA51270b48559f98aa1306ae0d7657c7ddbb2c6e557b7a9feb86dbd3e2f13ce96d06e74a30e502cdc3bb58647a8814667028944d8bc65459e4e18d3f955bc531f7925
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a07c4a5b21589ed8306888d301bcd1a5
SHA14129654d45e53c2d598fa32a7c8b9a69e9a25441
SHA256ee335e32a96cf4aefdfa341cd9de8034029f7faad84c3151b7daf518dbe281a0
SHA512f2eb2e3b95a3b7d1f1bd0e946b4261e2e4e48246623bc7196342592d5e374c5d150e5beb93ef6b65addae929a28a0225a851ff5d5d790053d216998dc3169e52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3ca617f16a0aa3cb02d2eacb408b839
SHA110a8683492fe4ae3657c400425ffd82e3c1e779b
SHA256fc16b25b184f1474f9347704d12a764f463afc8c0a3d99807bf7422d33a392db
SHA512299ff37a6bb9ca4479fa50edeca7dd4192c3c1c28135326b00f2f1a21608140042f10b16fa35db3e2a560f2275bb652438edcbbe9d0aeb8978b90e7b8d5a7ca8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b1dd1af3925dc4fdd8be71fca601241
SHA137b7cbb902732c75436b4ea950c8511178c2faa3
SHA25695d63cdfc8ca1582c7f18ae261a2760daa5a3ad8bb8d330eb82e37a95617d941
SHA512f0eae1318769bcd3ee564b0e05dda767bfc278ebf2f46799cd9432eeb325a0771fd6bf897c6adde2f8ec80f31ac2c0bd6efd22d933408c6274016604d1fbacca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e33fc1b6d17f06208a72db0c38c4fedb
SHA12d827977f59ffeec30643b2306ccc001afd4848b
SHA25673c589525edabe3a862bff201983443b945ceb58aed515353787303af8aaaee6
SHA512b4978f088223258abd2caa4a4ed3ca46c84e4aae7ca26d9e5d7cc6cffc3483d5a3d20a65de085d026ec8289adf2db75cbc72f97314f3966064d0420b40441725
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b