Analysis
-
max time kernel
122s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 19:14
Static task
static1
Behavioral task
behavioral1
Sample
70e14271befb163294082862075e42ef_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
70e14271befb163294082862075e42ef_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
70e14271befb163294082862075e42ef_JaffaCakes118.html
-
Size
3KB
-
MD5
70e14271befb163294082862075e42ef
-
SHA1
523da3ba35ae1e84a935caf11f2e558b3e8e1775
-
SHA256
c98abf6025c8c4799a323523246b30559514e31cc9588f1977f1bc619ce13c21
-
SHA512
75ac70eddb6902178da61f70f21ba47977f2ef9134e98d447d5c2168e59bab900af1539c9b2ef4f63a22747e2cd65793ae01dbc4c873121eea3f09a80fcd406f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428096922" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8B288621-4ABA-11EF-8D34-5A77BF4D32F0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000070e486ff727b46c6820a6c76462c018ed38a0c05ad6f0ad745b4978f24447a7000000000e800000000200002000000085358dd71f2a16cabcebcd817ea1731e4a80ee6aaa7f1c071539b839db3f176f20000000aa305b71a18638ae3b5abd658c57b52375cde0dd433b720e3d0c6828647945e940000000d53ad97bc8cd2ade230fc815267a036bbefa2c7c92142adc10472c75c06fd112612a037dea9e06704c968707ac4b8b5b55312ddbae281f64f3a805b88a1722ff iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e00f8a4ec7deda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2712 iexplore.exe 2712 iexplore.exe 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2708 2712 iexplore.exe 30 PID 2712 wrote to memory of 2708 2712 iexplore.exe 30 PID 2712 wrote to memory of 2708 2712 iexplore.exe 30 PID 2712 wrote to memory of 2708 2712 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\70e14271befb163294082862075e42ef_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2712 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5542c0ff885fce6ae52a833be970f5f37
SHA16fe95079ffe636e1182657799d3a492b7d7ab918
SHA2565014fd556e4679c869c13c2a9ad0d045f5e90a6ec4c2e170bb4090ddbda78c7c
SHA512b584809b73bd654171cd72175be0cca2ea83805d9416de09262d6f6e10245e517bedb9f31f35b334644cf4bb6f97724861daeb4886fd408fa5467cf41dd5bedc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5353252c8b2fbf42c9393790a608f8bae
SHA1f7202799178b301137ecea7e3e9e44bbd2eb71e3
SHA25633c9d4e675650de1f8485b756a6c48bc1fbd927e1a32e13c16f4b4f13264a4ed
SHA51280f50a376a3a08b6780b7fda9364e703034603ef6c6a262b62dfaa4d0bf4b43f5cee450440186f734fa816ac6225240176af8f3e50186ff17ee83499a8c5f868
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55faf39540899d6f00c414a4534e8393b
SHA19e9788fbfced6b361da82f120ef50b761b991ecc
SHA256690deb02645d66b835ff3b7e42448acc94292e817f5e38b05a11b4fa324caf4f
SHA512af092e842bc1d0c4fe8801e34f61073a7b9df5090c56df4bad27ae4d2b9b9f6469604bbc00883ccb49bcd16c27f9ecd2a8578b4d8c66c64499a61f083aacd2e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a563ce6a8956cde0da16f4df4ba86c3e
SHA1fde0a8e7b8ee9cd6e41b8432756d7454e9f9ed38
SHA25672ce22e2c96f42bf3b99d76000f137db01e739eba8abdbde63ec8e4cd4fecc7d
SHA5129cdc41a33a032ace22b499cb9504a01489660682e553c0765a3a363acadbf85c4e39b5cb8aa53d4ebc9a5dad89702e9c49d81daad7cf948fe2b5eb8816c296c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a1a3c73a6850f88294be74af8a27b57
SHA19de76688206bd6f6703415470bd570f43766dce4
SHA2563ec0023fe03edaf3c94cdc04594cdd5979ee7469d143804df80d510c1f251f93
SHA5125f2a5071539ed254aa1952c3274cb0e0796d51d17a6252e93b410f1e0c4de25327274681004b0b4aa30d8e78e1ac15dfed70cdb10b6d7447e289509d6c228b76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b50e17de0a5ee0fbf09bd4e03ffd36d
SHA15b31ea127cc6ac1e8041b50cbb0bd2439af24f25
SHA2569fe18a8602349a24707c6292224ff6c8333e9706dde9d5cf54fa16c1d309edb7
SHA512e1016e993a48f67d7a4b92ca2fb76b63f646f7fc737de343b9acc6765aa7b1f4358759b4fa217a67b6ce5b289a0bd7dbe97e91038041377bfd48de1175ea44eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad74cedecaeb808a61d9e9e2f19325b1
SHA16f627ac69099a0d76a17d10f81ce1d97f1bfcf5a
SHA2565ab7a1a27c8786ef49a40ca719219e08e24a4c58e23bcc24b1f416afa966d3f2
SHA5129b0b701e96a1576b4805be10312595e486ec565938f86c4c98ced65fa1496f66b0ade6fb86a4167f2a4c7781d58d4452e0c995510e419189357ba98980467d97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500c881d2438a448b328fbc36427912d4
SHA110e8a2ca653ce8336ea79b8886dbba3d7dc1c52b
SHA2563723debf0e32b4e6db372895bdb29897ea4b9ea3f0d93b197e29a3ee2015c726
SHA51200591bacf8b5e93d64d76f75720844edb279010232a315529422ab62bb465f0302ee1b59e087fba215ff83289aba0a2036d1b3df263d2f59e988dba342248d11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5800653e8ec947264c5fc6590569448c7
SHA195b27dcd8f11071a63a760f584f93df880ae9ec7
SHA2562d1043c4ef0b71a3907567a6dbc8ceab40c870877fe91f9dca1c5fcef89989b7
SHA512f697b28795e4d22f0a48bf2111b34b815205c30618d2348e1a6683c69de1effb6bcf6467d49b5f296f2ccad7359a2ceb2fe309fe5ac37385479b83696535e2fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f81770e961be0aecd4830b7a5386230
SHA19c711de31d1bc0634fc76bf830669271aab1fd0e
SHA2561894d16a91378ecfb0d9a6c6e553e3371c7ede99761871fbd6f467e893645c3c
SHA5126e0be5b2a63c8d335beed5b4d986ae9efaad8bd7b4d0571da4a1bfbf4099dc9d09581cb7b0f7e7685a6a87ed5b728587db80b7fe911a982b05bea888fbf282be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547a2449d7322d897f10c7125b1bf8306
SHA1b616160799fcf08859dfad5c3d1cbf34724b53ef
SHA2561bced900aa54f00fdd8be6b315dbe130942c67d6383a2e4bc6a9f274d730a908
SHA512f30b4feb82b420b68fdcd3cd6e57d746d7d130352cc134ad62353cddc73d02994daffbe0c108ebb982653d8455a2b14ba5623bc8aba9396122588a65ee44498f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538bd887e62c12d5c857975a128b46f61
SHA169fd24bd5afd1be5c8ce8516e1461f149ede1151
SHA2565def946e311581c830762d96cfcf9623aee39a604269e59efc4db020adde5257
SHA5128ab908366ae6d8ec298371e7d68a8d2528bcf197ce380d013eb499246b1a990760d8caec7b1c3460589c631e7851026652d23312ba6025c0a5a21e8dc5e4ec5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500cec94ec1805a4d78df10808b57c862
SHA17677c9d92e3fe27d6135809f79716c4644b53028
SHA256f90a005f91b0502f467b240c05673114bc9fb0f649e3601cce788eb6c96c661c
SHA512be2b959e1fdd0a8c0f21ad10e8e91c6cfc8b98c13648940372790f2862ef5b5c722e671fb098dfea12ddd7bea3e17b6207f51a2b55c95b7da7aa10c96a546264
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7ddd038e8f4d8c662597eb92244833a
SHA13b2beb3782372b4b9b3bff6545bb01ec49a5dd10
SHA2569cfb7997c9d94e28b02964e6d2ce1d3f9bf182419108e5950c3f970df4bb19d8
SHA5122f127158846cb437dc568a32e843fbbec8414aced6810f9af0a3c2cc41d519c3bb3e9dcbf20c19b983186288ed1cbfa474c5169fd0bea62a5a56dc84f2298be5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae7dda9c1a1878ddae707e15e1f52ba5
SHA132d526a68eaa63d34b57f59d4cdd60fbe384c804
SHA256c0d0e8225ccae74276985d9160aa45184b5f30cf2a8890bd4c4b85eca1812851
SHA51299ed31fef6865ad96f0ca94b67c2f3c10c7520be3066a8a6722cea2ad4da384c5566179502b084b946d381b666b8b194016d2af4a494b0c904b637d35f55f1d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ad7aa24410f5f6753c02819403a54dc
SHA1ff13a31ead431420f86380aedfc854ee153504a1
SHA256eba0ca349cdfc55fd872b87836ef9f0af09c7d9af9751f9c5d8063871d90dd28
SHA51264c03236298076e6df02d05cce7742d4b8504e60a98fdd01bbf5103c12c51bc24c9e545d25dfb0e82ff8b4a314da8fa33857080909768ed3f8ac7372338dc9f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5781433f1b65ea6215539606d4c2e1351
SHA149e71ac331b8e4384d5fd40b68e002859d5f621d
SHA2560392e054e8efaa84eaa6342d339809345878266bdd4150f27c5cc9f897c30762
SHA512fbbc2868feca546eb5e98242ad8755715b3059c7825f33587a0281436d30c16e6757a8c1b2ad73fa85bc7642373c58fcfd25e5f5ed72076898d8d0cbd6f96fe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5618b36b0e9145704102027dd214fb498
SHA10dcba58a03841907be6c6ac8490e13a14c03e97d
SHA2564ed5a3fd04df22d38f9f582954fe89aa2814d52abcb5b687b757a3b273a7993e
SHA512fbf54e061bd1b69dd78f63874d815fa17d08a386cf1a929737893172207bf311b7970f7a4c2d44ae26e7e09c4e29f32db4f12f5823a7ac0d6fab269da9b9230c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51568adf188c9e97a7734a5d40757a214
SHA14cb15e5d6e5ccac4545402eed3dba289e6c35819
SHA256576dc1005f98279963c362e16407c9ce93a40b02b4d8c457946043a368361641
SHA512a09a6fdd49ffbe79cf2cb4b29ea480134a58243ace585744a797fde4a74aa37a2b65cebd268bf6defcafacae14bfeb9da2e3d52411642396603e9a2ade5e1ada
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b