Analysis
-
max time kernel
119s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 22:15
Static task
static1
Behavioral task
behavioral1
Sample
75f26bb398002ed137025c85ef88f10d_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
75f26bb398002ed137025c85ef88f10d_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
75f26bb398002ed137025c85ef88f10d_JaffaCakes118.html
-
Size
2KB
-
MD5
75f26bb398002ed137025c85ef88f10d
-
SHA1
d9edcc954a4725c0f4e15c61697441339f6e9617
-
SHA256
889636f8df44de87b0413756a28528f97cdaa330112058d329b5e83e70e9b137
-
SHA512
09a6b4b97201849fab69136ca611dce65e490bc97ca4e51dacbf9ac9d8a20931fe4843aff01fbf19cec8b35db4fd1e74b7db7b2fc88346f8fae70bbe39288f3a
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{34C53851-4C22-11EF-A533-F296DB73ED53} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428251395" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30df540a2fe0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000c7dc39cde45219bef2f93908eae2212fb7ce3e661a9f1f5904394ffefdda3219000000000e8000000002000020000000ed34c8ebbbd4da181a30e3daa509c9163b072a0e76ca42c52a017613b700d80120000000323569cc35557140eab4d5189a36f1adaf2cecfe297bb6fb7e14f956cea544c040000000262d1eade073d9a41e580fe94c4c13a6f3352bc4ba9ec7eb31807f7470e55ed4c82998cf6d2a1ea058ca0fb72c644a7021dde1652262a2ed15756a25dd426d6a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000f6b00446bfc8fc4a189df6548ff040a5752a89f486b36d7055dcefe92719c635000000000e8000000002000020000000d68f1a69147b924c83c08b4d02ac3d6aa1665520d53d706d36c9e2ccf8c12c649000000033d709982990e4ad2de25b9edd75388cd208b03a5691751f70fc9f00c0cbf39cbd242e89a65a089c8d7c94b1108c267b62126318db5a4b7dc0c17ba24f93d038cd32e1787578e6a588b6cf82458b9cde27a192f61c653375b5eae6366744163aed1be1659b7423f1fbcf623e957d64fbb8c996e38b6afbcf8a32c48e372ed004c89d2acf299aef9ae26b21349d74383b40000000c6e37ac2960d241bff3bb0e6ccca5db8277b9492a9765e6403b495f33622c92e28414a965c159fa67428a4706b3e5ffe3ef911ba891e5efd658b3f9a4771658e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1188 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1188 iexplore.exe 1188 iexplore.exe 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1188 wrote to memory of 2920 1188 iexplore.exe 30 PID 1188 wrote to memory of 2920 1188 iexplore.exe 30 PID 1188 wrote to memory of 2920 1188 iexplore.exe 30 PID 1188 wrote to memory of 2920 1188 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\75f26bb398002ed137025c85ef88f10d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1188 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5719ae5575e6a7b3fec3013339aa0e934
SHA128146379696f51bb94012cbd70f69594af41f53e
SHA2564021a9af5f6f56d02f00e3e066172bd4dfaa94cd5381554210c0e9d1d310a0a1
SHA512d6f48b4db231e3d6af3b3967a333cbc4325339152e374744cd430b7dd8747a46b7c4eaa1a8cc5f481dfd7dfdb091628239f783dbf26dc7a1f6025ed365011228
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a013d9b5e94bc74b22ebd5159f42c6a6
SHA1e670f0420a5e3a9c9f0912ba86fd1a97e284a9b6
SHA256f8ce25a6744003b097e9887096de4cab439a629542202369731bf0c9fb280b1b
SHA512709ca2f321eaa8b4960f63e8f907d3c015c479452289f4dc23610315e921e1654c24dcc03679a6e37c70d7ad0565ddf80701cbbdf60c99d4f3c5ad1b6e8fcee8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52853615a90277b73f36edac6761c9526
SHA1f8fe454fdee9b59d69102a44aed42d97036c3c4a
SHA2561cc5722bbb2121221f9a2b4545a1252ad4bcd90708f14c5c1ec7c172bbee0ded
SHA512e713781884d449f6c89880d4ff9f06ed2804360f1e679715409d0d4664a00aa2f77856a5671efe47e3a0767c5a25971cc4846bc496d93c2a139c4fd701d08d58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2f13c46e5260fb25fde1a85ebf606ed
SHA1cd25a6198824dc63499995b8f5b3070cabd4654d
SHA2561318964c5fe19b2a15ee688dde1ffd30ec5ec63f8ac6a54ea2db30a7caf06331
SHA5121901d20d19322302374fe30e15e17779a27f047745047115e238fc672ad47ed6c20c09bc1c79a40fbe3ca7b6dc2ab040c410323f4dc16207691faf1ad1e8a27e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5055978da4b2d3235d112f1e601de49dd
SHA19c1d43ac7a24824cb2b729edf059ff1285484249
SHA25681deb5c9165706a17140922b3163a583e76aba220780b0f5f51c0dd4f8c70f63
SHA5124564d1ebda62b86857dd951cbc2c6c7f493b78e3e5dd8f5916311afb77e64225c232077e0de150f973a87d939c4f442fadd01c3ea34ba8ad2fc032700bb17995
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c09fbc4a3b756b5973e3a322f417ea8e
SHA19b2e3892bfc583ba4e69c090f43ce05269755f9a
SHA256c14a5222ab3defa37dda0b7b814e35bdcaf1c67a06efbe6392942bc032c512f3
SHA5124ef5f85380e4fe347947d37faca91b5f8f9bdec178680167d90ba0c5d70d064b6fa57ccd76968d9f9474c195165bd1091e840f449c8b5752331fe1c00647fc6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574bce7a15858a6e23bc9ea53ffd6c4f5
SHA1334ba871be3aedb2680f3f2057b867be83589c44
SHA2561e9fd274b213c44b331d72d06cd5e23998e67c45883a535fa07675d7384dc184
SHA512a237e7b6be74328ee58b2d00ccf1f858bf991be8d3e4b0acd92eed2b589d6ac02e344182caca695e6709b183c6e077bacf9052463e27e0f454427a55dc8ac1ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534ea7107630f9f3f1e13969e277b10c7
SHA1e8513b2de420f38280093e8eb997b619a97d9a52
SHA256724af9ee6813e3c1374034e3ab9ea94be07169546dc49cf3158f7ee5e1ac82ff
SHA5123cab4d0b7366b12cf75ca2f8b416f69cdbedb4ca4de54bbe9b55fc20651de9846132a9aa66ebeb82ee0fb99a6b0f69290a7c44febd135d7754947eb654f5541d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e42df49b242160234009feeceaee50da
SHA174acf538c164ecaac1dc6609dfd6b4654a7e6c17
SHA25657888f407b8d2d5256495d4d17fe9e29729f289f4362e9ed58289a6a25e44291
SHA51248f5e89402a907b82ea185b21c108e7ac6d0d7afef621b0eb53881a1aea090662f94bf62ce475bddcecdd8e026a1e7976d74f478e2444a2f99cf8eed28907287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d3ad528f2bc9a7a2f6437cb9c0381d7
SHA1e8ac06e1512b3892c025b75d34bb43b4ee6029e9
SHA256dc2182e0185112fe4118af741da0d71706e9718c3622873b3c4b133559daf20a
SHA512c124f6b5ce825cf379e7ab18f048697f6c99f44d23cf98181929613f6a74c5a0dc8986a9c971bfae5a86459a33bdc84724f262879a6e5226cc4ef81b0e56519f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554ea443b468625dd51373c96a01c0473
SHA1f2a47d7ae54dca73deb9f43fc085e78be8da69d6
SHA256b7a52ecbf59895ce651a890e8e294cd63d44656c70ef64addd9c07a03a9717c5
SHA512fc5d1439c6b9de4c1c34f086b43751479fa0aeb8bd1a3870d950ed2c62fd5a45451e91753cb54cb0423fc9f9e5f3d54952cbe37f7e70f9e5d7d0c38a9d270f83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d29dc7d23ee8080e81893403073ab37
SHA1307b021053b93dd6da6b81e535e5ac812c3433c7
SHA256c1d97bcde3e9de2a488574daf06b1c80b6729432b894122be3c92bb71af432cf
SHA512d821314b266b21bfc0ee499c1f7ab89d44e33b837da77edb2248a19622e7d82127e5f28ad26426561b500bde825d9003cd2f611721abf318ceee5b191329499d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55924842d1930fb16ab81a303f9baa57a
SHA1216d31e03a28c69d73e17b28480f5ae13373e838
SHA256ced25170cffce8fa755df3e54417bbbdc274586b09bd92b71ebef7ab0a523e0e
SHA512cadd49253ee26e9ea15b7505cefd01e363033a6e385b9eb575d704498956ff8c1ac2c66468155794fd1405b7d7ba62e066ce9445ce4305077294899bd3213ecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d63273ba83bcfa7fb3aee88222afc62
SHA1d33ee76a1c2e33ad69c5d1d4dbbb742c7679c4c4
SHA25622230a8c086387ac620b6db528db2f874befcb7a68f23025144b1c7889495923
SHA51205e2a9675b14593af39f410c6b0798ab984d9e06227145f3e6f68d065ba51823db88302892698fe31ae23f58094fa40a20ed1e254ef30011c85e3f7843307255
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c08dabe00dee8eba45b52b1ccb56f7a
SHA1ffe8cb031ab1906e192710020cb9980be7b15935
SHA2566533ef0f8537fd14ebd289b6d145852e49aa97acf37c735f23c4c62c422af861
SHA5127c136fbfb08a238e2fd6a6170b769623537c3cbcc532d9c9f59efadc7afaf87fba9fde1062d5dbc070c6b4ce8aa54c349c49c243c1abc5189c7ca09131c58131
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539a676b98e1317f78a054b3cc4bc56ef
SHA112519275b45f81e3f91d3034772729fc619b1c8d
SHA256dfba810820aa1289ace3a3ef93cc6972999e990909811a377fd2a283c2202340
SHA512edeb0a4ba2da4d942efc2e39dda95b96bc539795fc376b64556bcf1564115d37e0dd93a34ae295ad67dce9a048c681f1276526e7abe740af9a47f51d6587e903
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc54d2a3f139e02a9436cbd956fe9c4c
SHA1b91af956bff4eb17633b9b6459bf10f70a6b2d2c
SHA256a4f0648dcc09a8ddf1a98eb646732e5c634c84eb3bad2237d68c3488eef9eb87
SHA5129d40d7db2fff50e625b763621c1d77316cd6d6def714c669806634e65a8422ba4f88aad35b9cedf31510db6feabd45cadbf6bc3300b30685b35929a7e2bce0e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1b296ae7899650e94ba5dd338595047
SHA1b2c2051898dc878462f8d73d3139bba078e52b07
SHA256c083ef3b17d20ae0b1666616ad23395dbb9cc0d38055d268cffd4e8970b519ed
SHA512c602e479136836b8ff904c644f3b2558094edca1c65f3f05fdba7729f7934d4a33e7ca940caf546d4b5ebbb9e625f2678b3674f78a90997b983bb194672a570b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b