Analysis
-
max time kernel
86s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 20:06
Static task
static1
Behavioral task
behavioral1
Sample
71086845412d7395fe653bf919b91381_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
71086845412d7395fe653bf919b91381_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
71086845412d7395fe653bf919b91381_JaffaCakes118.html
-
Size
30KB
-
MD5
71086845412d7395fe653bf919b91381
-
SHA1
b141b51e1ff97ed2590666927d420617a55daf59
-
SHA256
484fe769999855b466325078fed1e7aea520a6e613f65ca25fa33bb58df8b8fd
-
SHA512
f9dc5b0414c12fc85315bbd71f1426ace1a68440b51e7e66e3b34d39b7b85acf6656e381e53d13ad5852c12f14cd431ecb6ca6fa120daf7fe537da047d6d1055
-
SSDEEP
768:SbSbFGvb7Y5ubDsDkAJ2dDFiN1YwJot8Lt/pZPk:SbhQ5usDk5jm1f/fM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000008b23ac2882e2ff1ba0202bedff4c1485c42b3808e2f1b2b00511ff3a268a76b7000000000e80000000020000200000009bfa63702e958bc500ebeeaa2505d89dc968bef94230a1a52342cfce67ade18f200000000b9361c33ebf8f11d719a47b2124b76a62715714bfede849882b32a56e4a3b3d40000000ee1dca5fa9676ebc8de8bb033293002d2f0308f54b39f1078f26f82298e43f12c67115e4a0b653bd2a0f1027593118bf8cd65a6cfe5f6264af81fee170f5af4c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{72991001-4AC1-11EF-920C-D692ACB8436A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 200c734fcededa01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428099887" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2540 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2540 iexplore.exe 2540 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2700 2540 iexplore.exe 29 PID 2540 wrote to memory of 2700 2540 iexplore.exe 29 PID 2540 wrote to memory of 2700 2540 iexplore.exe 29 PID 2540 wrote to memory of 2700 2540 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\71086845412d7395fe653bf919b91381_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2540 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fcd3d818b903abee1f2a20dc5f10d80
SHA17adfca54fdcab0e40613fcb3b5c8004c36857cd6
SHA2563f4fa97bfac539a8c82d18c6e8d9d380d71357aa1979bc671c25861ced2d66a7
SHA5126490bbf52c82da8de345fa0bf73ecaf2e36c40a6397d7ac98f5fccd21645f1d449c14bdab04de54a310b2fc5788fc0d378a7b11d04801db0e189d9a869afd418
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b843258140231360e0250d62ced2e357
SHA14df97f9f0f6f6c45a24fbc042af7637b8b65302e
SHA2568408751b040d98fb8d407e724aca57e3a8fc25b4a02a1eac60403855e112ff1f
SHA51296317a5dd135afc711de18f399c58561b18049cf9ab0292c4650edb5f9a019ba5158d80125ed0c23352196b55f2f2e71f51058b7c8fe7cdf4ed47755696fe0b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50be1707ba32722768b29bbd775592302
SHA1ccbc5031092cd10bf656616e756ab416aad87531
SHA256d3e15404bd8212212b60dbfa017a2a18ebccafec58fec4964924f9af1303b0f5
SHA5123b704e29f9e653742e765c7f34758632f4741348ffd41a9feec6d07e3df8638192cab6b8fc0b20741ea302f9b49ed0265530d6fdf0528a7ebaffed09e50e45ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bf8ea9a24c21932c8cd5d24d2024951
SHA1a5d4f569e9825b1165c49cdac14bd0c98f33d323
SHA256b884e7effb4cb97c2852ddff7c86a57d50ddedc93699a57e0df1cdac9b2b2851
SHA512e82a454f77290f33150b2384c24b1880a639f723b1acbaa024248cfa3520eefe463748c4c7dce3fab1163e9df8415ddcc29abc79cefd8f5ca9fd9bc72bc2ccdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b20ad63e9bffa936c9c08ef65f52504c
SHA1be966850230c4f7502ab30c97fd975015140d534
SHA256bf92e5ba4cb8f511358d1a824614d1351d800795835a76f54689d5bf3349a332
SHA51204338b8d94928c598088b3fccf3e400aaf8d5056233729d3966d999c76fb35c73ac2c232d847efdfff709be60cbb125f6c8e47a11ee6c905473f0916b5400e1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a792f065f9552d12c1d379932f218f39
SHA1ad31bee108db32fe60326533e74c9f7a8fdd96db
SHA2561ad3ae17895086a2b05cb54961a2c4ee6101fd6b1362c928d20ce01c6cff5aa8
SHA512e2b5815c3ef2b69a0e6cbe2a286ae36502385c579caa5b646fdd614677a4c59a5881eaa6f512874a68a37ae11a769f4804cb23599e29c98a9f624b3d42ce5489
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eeaac95dc8b864de5fbe73b3734bc80e
SHA13b01cebd33086b8d0fae0ea673b82bb9ce27daa0
SHA256c15eb5abbe92f398bc6da2cb4ed3fb83ad35af47001c307898ec8794b2b48c4b
SHA51234bf5816a1b0ef6db6196ee5ac7b82c5ed120740ba2d397a638f79ab1800194e4c4d21607090b57907d1b14738e5c9a4dd39b71d84f4972e3b3ac9d936818d3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f19dae5986e87d066b321868f5256015
SHA16ab2073dd9dd0641430e093a6ddf6c5cdf665a3d
SHA256ec47446aeb5d575021933da9157f97f341387c631f728ddc7730162aef88c143
SHA512cc55ab39c884edd546c6a3d4c024db1b1cd389a87d1d75f089cc7739cda5023b8eb24388e1fd8c03a7668d9e2a5d924b444dd2d72dd271d89050fb25c730eeca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9ae489d79f14dc7ad24eebf2c27a780
SHA14daed2aeda6d96e576a034b2de7fb36954b4c5d9
SHA256f34fa93c14604627bbe18fdb9de7d505acc99ba6bfd07a761ff21c2260651c66
SHA5124cb41b3d4b9ff6143300a437fc5d69d0fabc18ac228fe35c6ec9a89681cad5de30359994d14c5b8ae8a26b92da60c4752545d53501fb93df6f2c1b2d7d12a782
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579d5e0ca38369afedbb0d31b7ec705bc
SHA10a00c435c1639fe40ad6d91faa028443a4211b11
SHA2560f79ee6e9f7d65173c5260141ca4f66eab3dfb4fbfea04eddd37e7c428158e05
SHA5128d16cc2338a1f9a9722e4d0119fbfa259ec0a325fcc7fa1c7a4765e21458c7a68ab76a97d6067aa9ae5e80b38652b47be27a9b1bb02e76a845523c6a5ab3d850
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f70c8148c2319945b6ca9335e6eed663
SHA122d469ebe2eea610faa9c6e4e3ed09f5a80adb3f
SHA256f9b287f49ab32bb1c3fa8def7254609350e634f9ea8f59ef5c6eb67c707aec45
SHA51274497769d7b959046158696c1c7af933ab66b79291d7048399b14dcb0422747f4a0e5feea45fd0fc35b22574f9355abcd7941926b12e59a89df034b93dcb9f33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592affc316c666b3e867d4f99a4a35955
SHA1c863d5fc4e8737d85bf223949e7698009b8d5ff4
SHA2563fa8f14cfcba4afe4287fc929a8f790e4b78f01d21ea53f1f7ebc730888c09ad
SHA512c7d156c57039be29ccd4d6ec7ac4fbb4bb8997b629b7b59592ad98e5de4e1e126c2d256588ed7717ba4c3f33e0f047ba79007502535d8c658f1532bc23953b28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58461d53c387c643bc1827aefaa81bf80
SHA10c5fab78e52054e124506f270dd3fe7d905c49a8
SHA2569b05b3dabc61c223653e78eb76910f8f0b0e4b7e60fff9c7bf030c60a4992c56
SHA5129101ea2a506790f6fefe3c97f28f0ea7ccaee47d32f9d19921a3b6bdf2e41300278318652b9eebbb3e09d37d7c75f9d47d15982cb3ee2c65a52c28730500f901
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578f2a4a85af76b075092b7669b123b9c
SHA1db572d3ae911081a7d86cedbf423c158e3726b95
SHA2561c786aae23454dd021d4571e4832192d896b0a0e369987aa71d2f27c501ab288
SHA512fe530262918e50d5b468a03a9122fdddc9769dd53c9dadc3d7b4529a89b541a2da68c4c75583427f04634ce67eef22a2da56ad08a7532dbf00539060443c84cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd79a0a26aa3d872f02222edc486eaab
SHA10fcb8e3abe87488054eb241f86c8f723517f2356
SHA2561e21a2496036c066702857cdb40dc890b62065048bb720b5b63a31365833403f
SHA5121aa6d4c579d422cfb386ea6a8a780f4dd5ad9c8a7314bb80dfbe493c03a4818491bdb9843f57cbcf42e87acdc42201bfe97273fb5306fea542f02b2f78982816
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c04eaf2a36e108996049b0dcef04451e
SHA1e07b0d99ef98728d2a4ba213f2e59782fc6fc15a
SHA25603e22aba660ad8d9419decb73e8e42bbd28719472120335d0fa9cbd5a308b969
SHA512bda12ddb31ca4dac3d71849dd63d5b0860a12c0d2be3b9f2c8937fa0495e6a43fbf42368192ac37f267b8debf6f0c9bd4675b585acad98a6eab503d03552b976
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba871c6ecdc983445917aacffcd0dd55
SHA12a194521e994a908943cf5ab1ca621707968a99c
SHA256b34e1be07e81298f9e9a275b8a06e6325c15ef39422f802b6a72cbf2f6121c42
SHA512481e11c9467a7607ffebae702aef06fb1b1040c8b984f985ce11919b8ff2240b391695c0865686a78ea6f12d4b9dafaf07dfba8ffedabeae75cde149d654054d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b854e14c7502fa54f1e85a494aecb2b
SHA16f0d787ce3e17596d8e82d021b860303124fcca6
SHA25662e02a87b4ac2c7629641bd719d98ab054e92414c08989e61a99459bc5d10ce6
SHA51211bd3979b8fd9fe4687192a4f35ceda915528b875fbde9b672b50adeecf5007e813729a966dd8dbc2d49897660aa2082f6016784d520fb830e570a3f00c5cc4e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b