Analysis
-
max time kernel
122s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 23:54
Static task
static1
Behavioral task
behavioral1
Sample
76457ba813b08fcd0e26a6d0219bd79c_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
76457ba813b08fcd0e26a6d0219bd79c_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
76457ba813b08fcd0e26a6d0219bd79c_JaffaCakes118.html
-
Size
154B
-
MD5
76457ba813b08fcd0e26a6d0219bd79c
-
SHA1
ded5ec823ed93a5188f2c698cf8820d65aca1794
-
SHA256
d0da3fa55154c0c209aefe4d3c621b0e4ad724c96f415f5de2c87c92fb087fba
-
SHA512
5c4a1539902dd9a9f572d7ecdb6dc37315fa88639c1646d6911048ed618e52708ccc8391a3fe2cfa8aedad25adb5868a960f6012ec2e66c24defe45781c1d216
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3035f950b6e0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000007a344026f683dfe88f692be703345cfc96171f74ba4165b19e7c275b04dd2c2f000000000e800000000200002000000092552fa40aca7aa94b09f9927fd2a7906a28d5a387387389e7652894d13a8e3a200000003704abb96b6d4670443d9f7b47395e07cf5e837994a477ea7f3af2ab39ce814b40000000b6bc83304b76d06276b748fa32c28eeb2932b0c35cc6a10e4d41c1c04b72f742a27a3c976fa4fef78413f6191f57c900b41e86c7f1fa3128f312c97665207846 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7AC31521-4CA9-11EF-93D0-F6C828CC4EA3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428309494" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2516 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2516 iexplore.exe 2516 iexplore.exe 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2976 2516 iexplore.exe 30 PID 2516 wrote to memory of 2976 2516 iexplore.exe 30 PID 2516 wrote to memory of 2976 2516 iexplore.exe 30 PID 2516 wrote to memory of 2976 2516 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\76457ba813b08fcd0e26a6d0219bd79c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2516 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5730460bdb0c3cf8d72fe9ece2279c5e0
SHA1281986552a4766a048ea5a455de34cc42420b543
SHA256271a5d71e3a585666226bc419a11b33b884021a13cc706b5c0e0f9c72889971d
SHA5120ad43bf736a4fb0195697e88c71b86b7b7d1aded9405b87149b5858cde058e4f47857054234ba5c57819d8b4707959585592092f64ea78ae64b5e10572164fba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59732dea0aa851a0879aadf7c43126c88
SHA10db5a07ae5ceb40401cf50672907349a775cfbbd
SHA256d0690c8fdbee702906fc975b709627e4bbaf4f639fa1a7e04b50552e81789805
SHA512063db8d619f20cc6bfc01f66d69aefadadacf0033d47cb33c651eced753acae7d6cf4e6a46ef349a90c64395a72e4d0c1d897ee3b611c9887996bb00e54db3c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552e5c48bcf492d19f7e9cfb02e1cf7bf
SHA1b4dbcb50fe50c2bcde5833f8223d5f4be7f9aecb
SHA256c7da7632ac32abe4834fad7a7ee2cd8a6a36760ec8b3a0cf98d07c7b00133626
SHA512884f2e8ba5f589efcc1a183da233d13b7c353cae5fac2b4143e98329f9f7485f0a564248b1a667461882ce06a49814fe3363cb654a009a3d3fe9cc585523e525
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5570b984142a9efb7f85c215bd441416d
SHA1e35f8ec4426bdb61c0afcdb5147155a4128d01ed
SHA2565826a69791f5e2b90f6398ac7518a4ddcba663a02396d057699bfa99d978a6f7
SHA512696607abd5b1833e2469b872121208bac628ba9ce98c12be0141bbc972506a0b5660088a194d7912f5d2222b7fd5b6b9e563709b81d3f86df40b009f0a07bce6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5884bed3937fccf0b00bfe58c90e4d6
SHA16b47b9d450a2f783550a3700b7e26b5475d6cbee
SHA25608e134c2a4a0d2ba92a6102244063c36d54d4bac290174405ed5483e7b20e4ce
SHA512f2b1acf19f33b8c058102b444e47b00f60f5382e9cb2c1dba3e5dbf33b3ea1e7427bd9908b963388408d5ec0e45214baba4062e4310101d1f1a57a8482e188ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56473616dad3c7027916121e9d30090c9
SHA14fed17fcf57901a941797f76b32911ba89c18fea
SHA256462682250250e1a9408055820b1fb2900b3aa43e86b80289524de0be00be4764
SHA512bc79ca233e41db06d58c2a177d48973346c05b454d7b828eabef0f37c59de7eee6a992cf9ded84e35872bb7555ab7890f6983a327f6643e1f73247631e330e10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3d5f1fc22308fbc242408d9e3b4c21c
SHA1de604fd7cb6310039ec54c33249c24a401524be1
SHA2561138d91c5a4985ac1d1341138d352a05ca6f1c9432c8b3f54132413e926bacb3
SHA5128d31c15611009a16247b883c85c9ff3eb49d63ecc4b04fd0f2a39dd44766ae482ccee03bc5e4856db816c148072e061d7eea0ed1ed775e3aacba697ce53591d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5631bfed6942c1bb7c1ec248bcb34c742
SHA191d7400b02b4f74b7692ffd0fc7303b24fa3655c
SHA2569b1122f31aa47fc1e00b6c726bf51356786ff8f6adeb5af91b2a5383988d9c77
SHA5127734ed312e9dc08ab035638449e8213b6f0e6d0e90f1a63cff9f270cadc987bd9f1664b85bd0582a06680630c27d2cefa23131ce22db8778a09372169770a6c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c204c7a0c26c45bf2510a887daa79c7b
SHA14dfc3f59d161b09885c2771afa9f0a5ba9acc693
SHA2563ed8de9850130a5d29811f8afd27692cd4a1789b1ea4432db9a24e36afe0f7a7
SHA5125d205edb5856b02ecfc499c060da1e1b1c403eaf3b9d0c9f5305a1f27c52ef0de88fcde6313718c793a346b52d86b24c1cd4aa196716d5c04da4d902ffce2a01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e0440250f3f55b6600c4e7d362fb37a
SHA168eba1b3abc4ea7b16f1ce5810e3322f4cf0fc6e
SHA25698aa5f03ec2fb62a8bc711b82e59ac1ec89d1d301be033929083000a47023551
SHA5121294724f77b65a2592fc65ecc2c2cc1f8c21abb75dd05f604dc069390eb5fbdfc0b21e5cf314c465e98a1612ea6e6e0b3e71f7af2f7eb54809c6f32dbc23a0e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ca4c5a6b6dfbd6fce43853950c31353
SHA163b71b346e4010fc94b809784db0235c72ac9b65
SHA25616e896e7c2445ba1988d5c5337d3eeedcac0c8e2b22278b424ddef3746723503
SHA512ab1f1b894ec357f86e164603b48d76bd9116aa1b7ed908c50b565e3e1ca58ba35854c20affa06d45e1050d049e4c540ec5f71bce87841592c980a9f57ef5bae8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fad7008bdf7afafb010a43a8cefa0ea
SHA1baae6682ecf80b3b8a44e9671a1fd8f6d21aa777
SHA2563feb06cb7098ab9e04a64eeb00af1df981a799ec22a4bd9fe0526d7c9d19b047
SHA512526c0b79e2a0a08df7ae2470c566e479d01e6fb9ce0bd90ea7c0a58fd592a1f0b0522198355e0fefb52dc83fba72ba3bee04c2eb0826e280e08ad07970ddd59d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b