Analysis
-
max time kernel
136s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 17:52
Static task
static1
Behavioral task
behavioral1
Sample
70a157fa2e9c47f53e40befdd48d321e_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
70a157fa2e9c47f53e40befdd48d321e_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
70a157fa2e9c47f53e40befdd48d321e_JaffaCakes118.html
-
Size
6KB
-
MD5
70a157fa2e9c47f53e40befdd48d321e
-
SHA1
05ed5f2935a8348ffb8090988cf601e1e14bf8b0
-
SHA256
d7a64d6112283b86b4230993c605a865f2bb8e081c2e6e1d21116cc90e5b7671
-
SHA512
921921d748af112870d354969e4d7e927af6b48ccd8cfe6da016bd90a17e90d944387a57baad6971baaef0feb26660244b906c25234c95796eae9eba2159bea3
-
SSDEEP
96:uzVs+ux7RmLLY1k9o84d12ef7CSTUEZcEZ7ru7f:csz7RmAYS/jb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0ecee8cbbdeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000f439debb446ca3b91b65a12748422069f013f7fa8f5c989632780ab3dd633778000000000e800000000200002000000096a6a3db6b63dea774805d586a8e13399949300268b7f9f3bd1ee2e2818a0f0220000000470626c4194cd228c6163551dfe32983b96f13c9159b88d966880a3df425ff0940000000684c512e9cbd51c8496c38e42eba1585462af5873f1d4bb4d21b5ab030c215df39af73b7fa341c270a83ebb21504fe8a67c3bb7ff16bd4a58fb2ef701c2aff68 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B5F8B111-4AAE-11EF-AF97-4E18907FF899} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428091841" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2316 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2316 iexplore.exe 2316 iexplore.exe 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2316 wrote to memory of 3020 2316 iexplore.exe 30 PID 2316 wrote to memory of 3020 2316 iexplore.exe 30 PID 2316 wrote to memory of 3020 2316 iexplore.exe 30 PID 2316 wrote to memory of 3020 2316 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\70a157fa2e9c47f53e40befdd48d321e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2316 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588ff73794c0ef4d37e3b9a0af6cf9f00
SHA12840c6c5ba4c6208d438647c9328c2e1c2f589b0
SHA256bf99b54561159da1af1ff991afcf46c0e00bd4b9dd259176d7ff4b830fad59a8
SHA51294fc4a2d9f6a653eae73f56a36c19f9d55dc3059fa5f6084803e07919d090b8bb61ee9c46617d7d228bf61a10d2e684143fa9d11e97f5762fc30b8f6a60abe4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6d5cedc4b5b6c3422d4e11098e32739
SHA147aba43b7cf5a4bb38d3d6e404cb4abf9440ca19
SHA256f92b42b3d567e408d42393bd20bb14942268ee262870cf27624be274db769291
SHA512ac934a7055eea2fd08f1ceff3163580fc474ccc4f6a51c5967759df1bc90d256f8bf2505e93d2076ed3e9a905f12a0564681d61e3dc318306e26df6f137daa38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5926a9384839fa7ac2d5667530aa9b48d
SHA1f9e55da31933836584279274b8d135db30930bea
SHA2568adfc97d5ef794d29b09a1515dddea17354e78aed9aa94c7b3379c91c4162fce
SHA51282bf34ec0c575b126f963a41538b80954e3f325edcc1b08d5342edb8f821ed107a19ba7c7347819a9a8cbc603fa262fbb14736ad3aef8d7922ac1079b82b5089
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a4e71dbd67902152eb830f077e7f108
SHA1c1533a497b15a8ea492f29ee84f628c649068a93
SHA2562b9a17e7c04f1b6678fd1eab35cf98775b02e9a49ffe214c46210bb51d6d0513
SHA512dd97438e4abb70603eef02484c066e99b0f6f40da0823e6f37946d2fa4b416ac9249e71d75eeb3b4928ac998a76fcff0a2a2e3031445eed457399403e46b6994
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8b4d4075de1abc2401059874469a038
SHA197a63d33ea4ded37d1a18f5deeb383ee0cef88f7
SHA256b922a026564ddd74470bea1304c0b29e74b90a40f0def16849ab76c2269bca39
SHA5129e21272005bacbde65142064ff048253b06c2eca24c477562743251831e89fa86a41a59061797b9e1f65cc382d5474903e544e497c1495ddefd9be8cff555f92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595a771e4988bc3a2216520074c896152
SHA185a0e9780150948c851730f87d79f13e8ef2f794
SHA256f8b4f10f90fdb5e0c2c29098c633d0072a02c3b276b3868167993a45d3928552
SHA512b0133ef39c5ebf2cd17d2471b2c7290db70610536d0b999bd8282a0060eeef969ff73fd428624ad677c654ea184de8d438568b9b17e900d624156ed920d7d911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5299f0d1eb73d20d24656ddcb26c5f3b4
SHA115bd45296a2ffbbb67ce55ee95d04e1fc47db684
SHA256c810ab2db877a8c0ee392bc1c6a1978a1c68d963a7361e9739912e1fce630289
SHA5126be2a39b51f91dcd692a1d1cad095297d040741817803162aac8f9915bee217ce4d7a1f16781d38c4b0def7c0eb75589e5e606993284cd03c65050fb78212dd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd3162ec81d6c5aef8bc29188f0d55aa
SHA12053af53345b89770c94f5783a8eddb80ad8b956
SHA256ab0fe7763b0c593ed7092190e139c688365fb28fb398f1a6c627fb1c5348ea1a
SHA512cc7fb1d1b67ef29d2a59b1d4718623c4979bd7dc430552a93d9e9f58e429af5239757342c83121076d89aef0141f748b2bb12524f9d5a82db11c1bad89644643
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5888e2438d8cda8fd2e302d7d3c04c3c6
SHA173eb7f35259a655d76e946d3e6bca3895a849b0e
SHA256cb22c3402b911a27c04e7eea7be24e8e5c62ee42453b5557674ae90816c7be38
SHA512543d1726a488add9df65006310745cb3c09b0395e40aeb74ab827edfc803b1587b5c8d0e42fe227d49437f6fac1083447646aaabfc96cb88a83eee202cc69e70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d610a7223f1b2f4b462732070a0dcae0
SHA180a04b345cae2b0916656de059fa4bdf2f6ecb3f
SHA256dd54635c4e2ac372f7f71e321f0772966a534f7cef4d5a10df1d1da67a430e76
SHA51200fcd781d04ec6a7fe38f4984ec9e06d9213d5f1ce072dc169b065e929f1f9fe427edd8c2f584a2592bac5113be92b68d261ce3d9f45ffdfe4becbab94654109
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fe0bde358d630ba4c1a67851aea58c8
SHA192e2e0b0e21d6f0cf0d2d723bc4c7cb79354f44d
SHA2561209d667d1ed06703a093393656be211743961d0cd7ef993eae9d8f291139f71
SHA51248b8d2c8153a24aae353d187954fc6a5bea14712bbea75d5101dfdbcbf1623e94625a5ff8240a70375832976f93de1b91094b0372be9ad348905542cfa15474b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ff1a935a20d9e9d2e7bce71949a3b4c
SHA1b481d2ad1bd1c7e35ada49abb5b18d0cf944aee9
SHA2569242df60622772af524180379df56e594de25e750ea0e0335eb542e578cc9fb5
SHA512b3550c37a38fa54955438eed1e9e4af8835ddc12350188026e4870aae468420c2c609a5c8f5252ba7abebcb3558ce3e3cdd8ddc81d3e665456b58221d803e285
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580159efd2af91db40d0d848fc7b79706
SHA1c7c5f26b06874ab68865beb57b38ef935ca5d2c4
SHA256d5777afe3d81cae63d2db2046cbc5510d23bf0608cc272ffdb5bd65c726008b9
SHA5129aef438f0970f90a1ad96f9321804b8e30a9ef08304bf8767062241580dad509d6e53d0e34a048982827380e2d5364fbc155e2ef7bcc62159f46f24dfc76fc38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c80a1e19f11b529833855542ae106a8a
SHA1b2ecfbf4dfd92e6b4899030f7c2a8730636fad14
SHA2563a8f0ebb8255fd5d0a1721015169d350a9b72c35b80b94c07be9be7d7e2d58a1
SHA512ad118235d3902e3c052315ddd2ac73dcf441d67c4018f9f97f9b5b4486e6c2b891a68b96c00cf8919aba95ca3d05086eb7d3e18112ad1cce33e9f24902992db9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51408cc20a6a567e3824ac345dc0a29be
SHA1b8bac72df982b6551be7a52322a325992b8d612d
SHA25641bca905cf2775ccff91ac29b39a77bd34b45ddee44557423019e4421ad5ffaa
SHA512c93aec132d7799ef1728c18fe9ab867f5aadc13b64d96badb49857835920ddb5f00d956f4c4ba2963303cfdc3ed452be11deffbad005c3ba8ee01f3078af4c84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b58c8a4114289289c7389dc5c8022e4
SHA13107c018ff350d952598aff18b8deb8d69e2f141
SHA256b06038e3108ae36c01eba71ebdd4cb4bd8df464eef6842c82efa8ddc59d5664a
SHA51245128dfeee12c2850edca08133ab435a223bd29148196b7993a67455874e2a982508a5a69091aaa0262b82140320242a107732d2c4c20d4b8ba89b33e6847e8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f149fd9961a912417e09ea809578694
SHA155f374da380f742d3480afd523b596cdabf27118
SHA2562c4da5d1c9cf0de85389d892bac4d4d24ecae6160e2d6ff851f6971a7d45b5ca
SHA512d47a2f1a0b93b5ef01dcb8566d0b61c7c8911870ba77dc688eca6233c82604e1382be5d170d6828bb664ef27609f2b6d16a9068ee9945c298fb070ab0fdb84d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52eb2f08685652967d16ce9f7edc549eb
SHA1cfce49b6c0a30c78bc9358d2f5c2096fa5482704
SHA2566bee40bd749b12a42f9c4c911ecce15f1980459738cb7ea156495170edd1acec
SHA51268de62e50afe4b044f53c940a71c23dbe3b049b21728a979652f571036e81e380967ac408ffaa5c2fa408593ba13255e6ef8c74d3b6fd3365a4a7b842c80e43a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b