Analysis
-
max time kernel
119s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 23:16
Static task
static1
Behavioral task
behavioral1
Sample
7626c65d6ff5854f634667547c10a7e9_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7626c65d6ff5854f634667547c10a7e9_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
7626c65d6ff5854f634667547c10a7e9_JaffaCakes118.html
-
Size
11KB
-
MD5
7626c65d6ff5854f634667547c10a7e9
-
SHA1
24b84b28513026bde3bad6aca8ac0bb7deef6532
-
SHA256
40b97cd6395614ac035d3b2702bf7a36d238ea9aaefa06afd07dfe33fd00b766
-
SHA512
1c262133b523e1ed3ddb76a09e547843792c57538e24e34ad5a694cf0c3c964db083658fdd640b13b3e4f3189a7bae56d6882f1583ee85493e37097e7cc29c55
-
SSDEEP
192:2VflIsr03nE8k/w1wvqVkZaBCZnXK2Kj801kHauBuLbdU8d:sflIcuns/gYaBCZnXK2Kj80WaguLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000005541cf69d1298de4038cae412094723f4f3dcc12405a6727845d99e56dd18d14000000000e800000000200002000000040d3c806a8ac7b0e2194ab8c15cf7233e50750f596ac9945d4306fa165a1909f20000000e41d6fd9d0d011f4626d9851e29c0340843d20a7df535f55e15be8e2228e483e400000003c8ee123d35f5cf6396853338346cb24ab36e6a5d28d21754ec85af221c98f45c8e741f4d133b17ad188a22c5d1864bb328fea678b646e5281b59a0f86746f40 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0ba1773ade0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428305644" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{840466B1-4CA0-11EF-80BD-DAEE53C76889} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3028 iexplore.exe 3028 iexplore.exe 2952 IEXPLORE.EXE 2952 IEXPLORE.EXE 2952 IEXPLORE.EXE 2952 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2952 3028 iexplore.exe 30 PID 3028 wrote to memory of 2952 3028 iexplore.exe 30 PID 3028 wrote to memory of 2952 3028 iexplore.exe 30 PID 3028 wrote to memory of 2952 3028 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7626c65d6ff5854f634667547c10a7e9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512058ea9a6953f1b0d6974d998d61e69
SHA1d18827262d7aab6affb6775b36f62bfb2206501f
SHA2563bea6cbcac1751877d919bd332d2fa3c794495abfe66c04c3fcec2b68a83c7c4
SHA5129b3e56b90105941e4ef39b5b31b4d7abbf0a53d600114cbdfc2077c4c621d3211e80fa3acf1ade62c383b95af49cb0b76fa54af77eccfce69ef6e3f8c5843c31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0ec8563d0655fa23ffe3dd2e9bcb7f5
SHA18dbb49d2e49e94a85832a1517e2ae7d3ddc3c14b
SHA256047cc2fc1fcee27473e79e8ef0ca17adf29a2fac20ce210e5a311f178fcc4620
SHA512f43f9e517d596f816cacaf06af43b32ccbb3cf58be19fd29730d3e59143c0ce8c8e80ef150a16f9cbc8a17b8cd46bf2b0302e385489b3275d08df87b74ff0e1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8e9b297f9c93dcbc16216241227bc97
SHA1b364a482892cfed294b4db6b1de42953bd68c1d1
SHA2566d701f30e848b16e0c8ebbd1e68b67176a208d92ddbf8f6dc8dfda6441fa0fb3
SHA512c3950600d9dd0e0ff6e35b97b44d17caa88d4fb12dc0e8731deb4b8ef3d06d1ae3d515eca96d90bdd2da8172a9c8380ee93a9302ede549b80e96a935c3ba491d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57781ddda4756741b7dd3e949ab34e617
SHA1fd495b0499f19dba716438282e1128336595619c
SHA256d853091acacf918058c1ce3c39e9f069173bf645466a9df35b6de57d6af03f1d
SHA51233bef7196943f13d034caf8420b4e0eb1698d8f1e3a9d3e02dc41ee92d84c800bf195c694e69b6816c50cf32ef0ff39a9067bd6023d68ce95cba82a4802bd232
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f78dc7956a5c33dee49139c60096aefd
SHA17235878ceba69dfae36c1ecf39e410584f776587
SHA256098ac357000311ef75c39158c920c81c73381fc90c201aaf58c69720e5a5e1b9
SHA51295869294c7ce2d804e3026bb3c2ba076d4898733af822d22eb95ec1b85f27d65a0943270b243ad77d18d0bd7344f535f2b997e0a4ae502adf1985908acdfe9c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5581499a1ae0a1440bcb572a29c7c18
SHA1f274cf2243903b372ef6e672355bff2d87d05a2b
SHA25630439ed3186a9099f39aa407ab4ced2922736f39e295475ff5f91ce472e64ff4
SHA5122142934d1cd1aeb0ba505105ac27a5e73897783bd53d40699752186bbb22393f0a7d7212565c1ff728d387d55e3c3817747240fb992e0bab43552d61caf33347
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551979c5ea8181bd2f1f9a6271dd3681d
SHA166fc2f1225ccb3809be1e03ed4e51b6a9ec0c813
SHA2564970416589d02c1958545e92f20765b1aaab0ff0112e32aca37aaeae817f89c4
SHA512367aa729a5fa454d273340fc315cd30063fe2631d9dcf15f68c9b53bdd24d4e982c538bfefb3add2cf93b6ddbf5dee03bfeccbad7571c1a96d1cd3083f069101
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eca5dec243dbfe779911d9ba58581cd
SHA11dcd723a7e5c04e6faf63134c6d0abb0af960706
SHA256768548258ca40323844ed73abda41814745c7e047edf0ec9d6ea795d39bfaddc
SHA5122a5868df197893159a2c99c373f91990ebc317b2529648f4e771c659fa5fb83c9b32fe2461389b0bbe638a39af0f2ecafb3548f2261517bd454f2a58e089d809
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cfa353a6d0201aa30344bbba8c48667
SHA1c7d575187b97a962007a21fd640e5727ac04df67
SHA256cfbacbfbd713a515f2b0d310aa0133f3a92dbc7dfeaa8a28b17bf9fc9f689c0d
SHA512a3bc4bfafa3ca7b299b85372d24d22be14e2e912c9fd5f903a2b41aeefc0d3f82a484aa3e5794e0afc2d7cda53ad9436d055c99fe63549206fe7166dad9240a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545b41fe9d700d95ca7bce6bca68d29af
SHA1290534ff28cc209648e7d4eb2e28a635b8771838
SHA25652353db6d3f0d6f6e90d5a0c20c095793a44a41693a39777a98a6faf384fee94
SHA51206b87c476173be26c0ed5284e50af67005bd707775ba1a4c2a09a26c8c5e29e54776315e961d89630c2f08b622035a51272f7d93dc29670485f465c95d8d6d7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5392a1e6375303f4d89680e490abebdba
SHA14ad957c6329c4773c5e11f4040701fa7471b7543
SHA256b0e1ea80674cd1b3ab2921cadaf2582c579a5a509d6fbf23b69df4ff9a9d80ba
SHA512dd301a5a5636d62938771138157882f4e213a34246432ae027d1b23b1844cab0f99e33d6cf9b31965638769caa35ef8b1594bb6d64c260e8db17fb11162c119b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5993afc6cb2b2f6f69c0336bdf4f95ce6
SHA1f4263548d307d0434e203d30b5df63ad646e3bd0
SHA256f222a591e9f502795ef220d686f0c4d309999242dd220614e7574d7eea02ee8c
SHA512e6eb8346fbd8520b71a2792ad2b1092577755b2075ba5538d46ad2f6d4fb7070e197173befaf492a16901f0fc7973d30bf3ab5d1714979130e04de7aa6ebec13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffc3e2e0f455bb6123b69f3d31d7d23b
SHA1301e0205531715c0effb3cd5133bd81267e1eda3
SHA25612072ac3a1761e8d68e81fdafab04c8a2f752ab674b6d4b1ef8e128ac79c8fd9
SHA512cbc1bbc1a6ff98f0ee3617f309da0699526a0711dae343c7f69f7aa24aa1d51b016b414c98556cf850680538a121cf203eb174b37c844b573d93a20ec76cff96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8df8c74256e99556d466b20f31f518f
SHA1c3b8b29d94a1edb0805a9b213abc768a84346a23
SHA256e9521932ded68afefabeae8b70761731b63cdaa3cc6d4c9ed4d159e81a8cd8c4
SHA51214bc84d94fb54e7fd663d3a63d40b0b0ff37922fa1f0466963d785fa58845e5aa21e230a04cd792e6327e6af65cdb78822f03b9bcb77c886417fd5a82e5be566
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c350b4e2140ba9d939e76e184fe153e
SHA13213963fab514129b5073bb5b29b2d9dae465ef2
SHA2561c5fc285501cb666acaa300c96a6ef5c5495c7388461d8e2ff006211fb56267d
SHA512e86c9150ec0b95379a52bd776e740b0d77842c616a291a28ed62997c8e29520f9d75cdc61abb9d4dccb4fc69436201f06e3bb11f4612847d4707a97b88e35290
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5847ac18a5d084fa1f0084799f7833f82
SHA1afbf1a287033f1fc87f8cf227d02941d3bc7e5fa
SHA256fdbfa7843a168a1eff5a504fd053c80d4bb3ccd98b4448bb719ffb1dfcf10e71
SHA512df79ff07172a0afaf38c25d1601b496e37f72cc3c2b907e0a6a3074c07ffca439b9b16e530f0b63165eef92ab5e9baf403c67f33b910f1de0f78f217c7f34cbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541fccb06a61ee771275467bd0bdc265e
SHA146b636b6ce2de151a15d3f007d74d099103d5c5b
SHA256ac1850b13117979527f09c6854282d432b46cee7948c4acc16425dd7aeb01675
SHA51242e9faf6602145ce4feab93e14b70789bf2a8c3c8872c64b296bb0a1594e08993ad7ba0b4f974722def452f25f4073d2bd40d32018bca2d04254dbd88d717cf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527933cb2f3ea9de1ec9fa047ff3584c0
SHA1947e99f96bf61ec679d44d2029638faaf6c33d5b
SHA2562566a350b3726bfc4c66a2fc80532da10db0feb3f97542835e69fc204c701d14
SHA512b4f98fe4516a8c57eddaf73f47509cdedd30748ccccfa02f08b7840e01d4767be18ae1c02314d01fb9659bab8222ff43dd5d0f7f45ff01a66c3f2261c5627339
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fb014ab3a062ad0fde2561996ce2eb4
SHA106a529178d3741af3bc98b38ebcbc9fb45e06f81
SHA256cf17dcfb60a8b7a218dd437042301a58d52f967516f1bb4222f247242c548e66
SHA5122236b674130abd99d72052fff7ca8f3b1d07dab34a4cf76375805638a945e9aa2a43b0581c200f0f3f615a6dae45ba8231341fb49d6394c54fe899b36c0aba8a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b