Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 19:43
Static task
static1
Behavioral task
behavioral1
Sample
70f6b150f906cd0791482962f0716c39_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
70f6b150f906cd0791482962f0716c39_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
70f6b150f906cd0791482962f0716c39_JaffaCakes118.html
-
Size
9KB
-
MD5
70f6b150f906cd0791482962f0716c39
-
SHA1
47fddc4569d59a19f128b0f29f5339ca881f2467
-
SHA256
d250f6b7ee0eca08e33c17548440f238769e191501f94e9aae6ce26fe5da7807
-
SHA512
814c2b045f9962ea3b357141cd9df0be056b601682bd67c74e909fafecc38569a77fd22375ed3640845a154636b78e423e1cae6450b0919edfe1c56d8149b0a0
-
SSDEEP
96:uzVs+ux7d3LLY1k9o84d12ef7CSTUSzf7TDBEMFTQEM85T7+TKIT6+TEjhTCoqTe:csz7d3AYS/yMHMDJhb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70091a22cbdeda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000c696af000b65c5256885db4741a2330e0ae952a4a1b5fb3369f542850d0539af000000000e8000000002000020000000ffb4c29b5d350051a3ade13c37c94e2fa6d3e64b70202e9983f16c89b6e4c4ec20000000df6b3253fed07bdcd51a72552867b2a5d06101c57a6e1fd4a9e3080cf5c4282240000000de2864959b70fc2e383ca2ec6dad9b0fbd4924b5ecf9754e492f2b0367d34ebe1cad8cb326bccfb68a9afe82ad9cdb4321c93cfb0ec8f7eeadcc475cb1d1f8a7 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428098532" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4B897521-4ABE-11EF-9D6F-6AF53BBB81F8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2460 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2460 iexplore.exe 2460 iexplore.exe 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2460 wrote to memory of 3064 2460 iexplore.exe 30 PID 2460 wrote to memory of 3064 2460 iexplore.exe 30 PID 2460 wrote to memory of 3064 2460 iexplore.exe 30 PID 2460 wrote to memory of 3064 2460 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\70f6b150f906cd0791482962f0716c39_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2460 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0536815e7974788f79598c674792fad
SHA1d33d5d57edc9b95ca6cdc48c2648fc555b823cd2
SHA256df7c9b1a001f0a93ebf7b2231e35edfc06e109fdab01424dc2725f3a24094d17
SHA512b3c9cd05a58184eb3c95aff4f58b4528739b6159d3e03ccc833a0c2e20388017649dfa61563d98317460956a06688cee5dd228a8867b4666fe14fc95edd30750
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ae9f2c858110ccbc370e1d095bbfe30
SHA154c2b342e1500fd3931f9028e87023604a6e15c5
SHA2563acabd81d5ce4b17e50a25382759413c33e99b74ca5cd871094b64897f54e5a8
SHA512096fcc67925a2b070ab2fcb5a3976b1b715c2c51bbce1d17abc042312e3525fed61f4a3c227562bb6739860d4d19841a438fc9145a2201adc1e2af9338a4353a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aff8f5a23cfbb1cf8fdc37c135e35118
SHA1ca022ad0c10889692e6d7b8f38b1942667ec9578
SHA2565db16875d955aedb2cea7bfbf80884a47fbdd592a01aae6b6cae17d43b348019
SHA512641a8f22fae312b3972cf3d4438278db10a07761b0cff61c8b038ff48da129cc7346e4150e2513d7271183a0882949c22ade8f742c29ba8b9600d757a072e98b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a7fc2ae7a19a25513df21e929f1c6ae
SHA1914b5a1952032ca5387ec329d9afa82a37de4342
SHA2560b49cc0620cd3e6e7bf4f7bcbd36fe2abd99562771771097e2974eb4eeea6899
SHA512acf3a8b0ab86c8d91cebfb321e2a3dd3582c48c6769ce0ac4777d76a3f2e49c6dae411a25abb68ad4133dfe766a29812481e430191e663125e49d2fd7944c08a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516294a359dcc12d253fcc2ea62819eec
SHA13b02c346cb655152b7a08beccabee7c2368c72dc
SHA2568ab9432b3628133c188ade20c4a100af3cb6797f7e02071c0a723735f02fa6b8
SHA512d324373a37066c013800e7ec4709f4a104e000f29aa1c4d59bfe26e7d05e642bad2b3e2e9cfdf783aec69bc86133e42c5bb6b98b71449c4f49864b7c3fcb5409
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570045ab3a6bfe94b517aff1247d9d4b0
SHA196cdf90c78fa4341d8fa73d9a1a3e03862b3040b
SHA256e4b7186009229d4f898ebbbe40adbad442b6452e11aedd0507f98372f6889b63
SHA512177d99097804a29e564a57c4fee38eba773b7053899916c3d923412d5a3e47bb9f5693b173699f1905058753d2dd9946f8ed1ea84a537f351d0d061291acb935
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3e80c431bd0d1fc9230931b70b4f659
SHA19f42defb53d8a06c63e161a4df843828c7d830ee
SHA256612c3d5f0c25cdce3c36ff768c21a9df2d713f1579ee0311b4226cd884b9fdea
SHA5127f3ff025ac64f7594361899c0027c8b63f6aaa13997c59024b43107335c968935cd8b02c6384f65a0368e36ec21763801a4259a3ae8ff3f0821a9a250473750f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5027d8cca6f3004938b8f85b3b18f84dd
SHA12a4759aa83648bf140dcfe372a2252727e1cda6d
SHA256550452bdd74d2cc5b088a925fdd2e6e03fc8aff97ce7e928bb3855e360d20ac6
SHA512ef6202f938b4d8dc5eab03c0aba61d626748b0661909810b5df806a882a313b34f38efaf64a12e281727bef436d78d36b547ed3b80da8d5549ee57b673a7d575
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5300d2ed2fbc3f2a7fe8e11363896ab65
SHA18dfda8010f88f22a54e3bdface8ba4342692eaaf
SHA256346d5da03825b4afd75591d1e1206ee8cd7c4c6da7ca6f6ea8baa00a2de20fdb
SHA51275197d1da6b7cefff792e4b025e254956f5835b5fa1e0e4e1acb6df62efd8757918fa981dc719ea2b2f7f4ab4dde99335e52081cd9b341318d661a0929f246d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536d2a71b3c4a4d763992075a8b2add7d
SHA1fd186f7f6d085246cfa48b5ef126abb3bedfdeba
SHA256bb67e0db00da8c850e8a9ce9bb482ea83ec1d55445553dcbe977a22ae3162dfc
SHA512e1f261f3720dbc61aa21407b45fdb3ce8e4a8b25ba55002855644c0228e0a3d6c1a36aabc7024220171cf38301a1f2d18e2c9c21aa67bd6e26875b2c379d2ada
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5481e9a638356cebd75247ceb5d46f6b4
SHA1d96f4bfd90b9f39ee986ad95967824cd45fcdc84
SHA25618572e5bbbbe4892842de93ed6a9f061a67112661d3fd48d33d77b2c2966011a
SHA5120e7724bf54bffd504969e06140870f46d0d38e54238cf1bff85b8a8aa6a25b3a2aacb8f13e8ac6c0b8ba552ae76e5c55fd6f0b53d53962f99ea7bb4ed0375291
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db27240baf5a38bc1abf399fa4bb7653
SHA11fc21008246925140f85c5bca4c1d3cdccae2019
SHA2568827bf325bead21622131209f5688ad34f3e5f230c52add7c07277aafd641696
SHA512b00267c77c9985176346eebab3b39e3eee45e247d86969b2358fa9cae78d02372e8a682cd710377927adff21ed13b3e428794167e21e84c351495cc042ec0569
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9a8f3c1f64efb3ccaa0cbff48857692
SHA1bbe8b6676db9057649c701b18fd00823f4651bb1
SHA25647465e458d8584fa62ab5bf871b032ac7a265775506bfed95c060b698f0e16d1
SHA512b090f148999df0732a2f8051b82c4ad4772abd978223f6e55f6ea0a51ccef30dba126e21b0d52dc674649b5218dcdda5ab85342d819f01cc3832e1d3e4edb0a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510867d97c539401d8899c835fd5e9b45
SHA14f7df44f1ab43a237d5c490d832d0e56218874b6
SHA25686147b99c23fc5385c363ebd882ae2c8dbd6991094dbcc4f24c6001975f3a194
SHA5125b689974fad74bacfe5b1c92b42cb9d28defebb154dfa27d2817ab6f10a801f78e2608ece07a7d905da3a7c7cddd415fb1c8bea381433f94b22e446909980610
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5314120540c09048352fc955e289a1c1c
SHA179bb1f860153597fdea5d6e80f919b4e2ef03e92
SHA2565559aecb0606111178c1032854d021d70ba8904b8dfa76c0cf7a72fca51ac00d
SHA512729381d2b4121bc07041cd976b8eebb68286521c1a3fe83c4327574b9bd6508f8dc1899a5daa4adc269a84515575873cfdc68b55d55ec0e2c15d6c1871cf31a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549af08ede726ffe7756b3143f6994924
SHA1901c4478d0f6d75bfd933294fb888e9941590296
SHA256262241b52d61faf6acc58dccdb77d854ff190f746ccd57231abb3bad1b18b264
SHA5123d4a85ee9648f9233dea555c823749f5b5610e057a98e5257449b0fe94ba6000b21f6c2062ca7903f4ed9d8cca4c51512bfa31a6b293b26e24c2cb463e39b99d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e350f2e7a919e539f9bcb30818a8691
SHA1d5137650d0e2eb3673eb0de3bd33cc30120ef797
SHA2565eeb210ba68aa7456b30d9b26cb69fe4d41ab9341a26b74a31fea56beb83fc71
SHA51248c063fae4340099efc2f46fa2cf18ecd43966013e212950aef4a48ad8eb881c5e281e6fc2bc36f01b98d901d342adbb9d157179035599732691ce71b74cc108
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2acfce9b6e93c916573faee84a9be2e
SHA1a7a209db630a1fc9e0a1f8109183132cad44b9d7
SHA25660f1124e9e5f852bbe1af0ce53fe4a4ba1066ee9722b35055621663dcea5f374
SHA5129ce7e8e68fa87cd145ec85a51b233e4632dfdb45861d5b19b20489cbd34ff04c774c51f0a1bb91c6ed99f83959aa1df08ad17669dab370664d6393e226026f6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b98b957cb907366572420d8612facf77
SHA103f3b508728915003e5b4044e59578587f9abfa0
SHA25655907e197008ae11365af29a0d441065e9154b2316c9212aaea3218f4df73c3b
SHA5124d8d73e5117621a73ee8795f10a0aa650ca6dd0976aa5562a0fdfc1a9365a8ac8bea2e87a0569ab160dcaea237260327a03e687533745b0de8f24cd1e12226b2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b