Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 01:05
Static task
static1
Behavioral task
behavioral1
Sample
71ffc798dfc4c324849530596e0e729b_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
71ffc798dfc4c324849530596e0e729b_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
71ffc798dfc4c324849530596e0e729b_JaffaCakes118.html
-
Size
238B
-
MD5
71ffc798dfc4c324849530596e0e729b
-
SHA1
d3adf0071de2edad33d58d533dc4f604da5e737b
-
SHA256
5ba1e3eed201eb7d800ab1e767824b68bf4fe3c0cceae19f9a8a1c7c578b1994
-
SHA512
b214e76fbd379a2ccc44735d09cb0a296ce4333b563ee89be179372bd441ca85bfea472320ae4c1d6d2ae77058a67a441884905738020075329a33f4d7b268a8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a02da5bff8deda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf71000000000200000000001066000000010000200000004b483721aff33a432ec22de563f89faec61cde70c15bfb562f5036fe8bfc5601000000000e800000000200002000000037414d7aa0cec6e7bc3f96ced8458dd2a7433c903ab77b93e95c2c0b64810d3f20000000d56240359610b750ce2a751e31437e3e15159e23d5d738bd05863371e528425640000000168e5b2478b569f6c361e904325d1baa94464ac46d6f3b58881f50d35c66c13da2fd244bc63ac7415439f20fe815bbc8833496d82ad880e25fabb42aa7ba0303 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428118120" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E6E647A1-4AEB-11EF-8ED3-72D3501DAA0F} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1904 iexplore.exe 1904 iexplore.exe 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1904 wrote to memory of 2100 1904 iexplore.exe 31 PID 1904 wrote to memory of 2100 1904 iexplore.exe 31 PID 1904 wrote to memory of 2100 1904 iexplore.exe 31 PID 1904 wrote to memory of 2100 1904 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\71ffc798dfc4c324849530596e0e729b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1904 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed7ab5ef0c5d2b59207e28ca2c4afaf2
SHA1964f0fd80443a71e9465d066ba95a0fe2cabf32e
SHA2560ea2bb6f0bb41db3e641a624093162d48cfe2e94a304d24fd3c55692162778c2
SHA5123d77d580ab61d2b8190b90d695b3d1f52ffb4604071cd63129ae3d4053ce34d3c06a30a99d43f72df82f090d4a7558fe2b5f191a2dd08f779356460dc4a5c843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faa99ed9765e94ffa3ce405bac8c9ace
SHA154624dafcbbf6bb32c2c9c48450190db82b2ce02
SHA256efa351c8771a50adc3bf3ce01d2242da5cd5721413bfa484f1d8fd80e082c4d6
SHA512f390d4011e4bb6b5260a8ee9b15ed2c336cd2260d087645af4f83fa06e13b998109f82ac9d9ca6b52167aa15dc5b9e6b9f00562b632ebd503f92b11db612f57d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e69c099efee0d524f8c5fa7da98e5327
SHA1b094a8df2e4edc8ab48e7b8d42c4ffac3b0dd3cc
SHA2563b1d29ffb3eaecdc37c3fa2daa45cfdf8a1801f7386d0704ac3fc30d1091cd16
SHA512eab9223c8ccd80455597e64afc01fa4fea38bdaab4af4bd34774debcf3924575ea6083ed114fce5ed53d3d5cdf5dbb289f6bf309c981c5428b10aa074138a2a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bb6abbbac6d759a5b4b597ee74b8dae
SHA1af46960169425d062eb4f3d6b735d2555395454b
SHA256db5eb451ca8688db64d01431e02f9d90138e4e00c03878a0b3833d02167eb004
SHA512f5367874ec0b20bdf5dea6b82bb9a3c0faefb1af3de562e3a3a286e2e417816fab312ba14975f0b4ebc3e3b7976bfee36056f601358445eac616f790bf9de1f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530649300d0d67c081dc34ef523aa7298
SHA1f97f419741fa47276760f8d52ae43add5bd7246a
SHA2564d505ce33b24d090778945ce76050d8f58d365bdab475c528b90eeed5388c9fe
SHA512ff41b04a8fec72a17686900efbc934c631726560d84deced2323cdc11e42bc563fb4515f3f04af0a9d43992cd496e4fadeedd1822dbcf1b0d8d25f2fa396180d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcaad15105145bd5b08a22670217d072
SHA18a86464be66b14b1a5085c08987cf699dab43f8e
SHA2562de2e9653c1c9382e47ff339b74ccf80f7f6c8e7c403b27341bb121f9919981a
SHA512022960750138e05dcd68aa38ff6c02bb23fd993dd56f68382a741205712528bc2a22c1e39b65eb2fe07f93fea64e19e2b1e2f2b5ee65d83144f91af8ed1a3945
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5752cd42b6ce7d412fd505687cd07e2f8
SHA12ac7e1ad57d0185bbf6f56c8533f199c49cab09d
SHA25620cfaf0d4a526df8bf89e880c34b60b10c3450063f6de4816da83ab3c51c96d8
SHA512c0e03abe529c9824777771c75cb74adc912e3b58918b7c3eb1fd717b09c83dba34d20550ee0e2f934cbcf27baa136a225cf4aa209b00311648a24d7654e65290
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5500559fdaf938687e6e953771c452d62
SHA1660e7757e6a688948139cd3073e41582f320b151
SHA256671a7dd4be63f876f7fef88208864287bf7c39ed21dceb2c29b9c81e99b3d3f7
SHA512571a6e90d77ae9369c83663326f29f7a95885520c580f6251296d0f72000f01a53d0234e645432df54400d00c0582cef2724ac37e5f46b058ffe1f2fe8d873ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e96919ea27f493cbcb238b20d7a6ecf
SHA1b511d04683cfe6cddfe40c3c0a58cde00ea293c3
SHA2568dd52b438fa71192d1b4216df003993a7c5c264f63de3dcbf8e18913ee908069
SHA512bcdcbf20f3b9cbe94cf3a8dd2ce85051b7a560aa627d24dd844e187586c0a23fe7273db1c4d9d6c01c18eddc76cf3f7cdf413eb1af3c7d2f6f4d6d3f0cbc0692
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512de08e8ffca4c71fc430a66635c26be
SHA178635f12ab94e2cd65a6dd5b20c977b6b9cce64b
SHA25673424fc461825d7b9ce296778957cf72f32dea9521a6543ccf6bd75c5ebb4af7
SHA5124f84d73fd81214c971220de7f382aa79bab67f016bf12b22b59e7f99716b2a6b7130cc71b660ba78ca5222c6c0497ac9ca646b578e77dabf5d70cc04dc5f0164
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579a83f6a245706e1decc83ec63faa0d7
SHA1db26daef6dbed1aad0491a60617f895ff8b648ef
SHA25647efb38fac0b8e366ebd40a4963f70a3b327aa4b3169dd9dc048200ddf360f0c
SHA5123079852817dbfde3603bff64abe8626b147b98f028ecbd450e655ce82610795effc7561cc243e1ad0d5138e7b0615eb42f81aaec516bf0ca513cdfd6050844b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8b9e7c65cace6d4255d87c55efb3cbd
SHA1492d91f284b97d70a3e4731696de66ba81c84aac
SHA256e44a286863e14189fbe3343561c845ce8ba4991be78be5dd801c4cbb687c50c1
SHA5127a003d4c9683a323ed56093848c55bdf7102e2a7c92e3051db9a7f86307c7f9c69b0a2b69129b3601d6f6afe9c8bb3dfef1e57022107ad9c1dcfa3f82991016e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0c5ac8ed9807b17fa3d49e701f8ba65
SHA133ddaadb4d60d95dce36b1b6dbefb7943e2e52b9
SHA25606371ddec718121ed95af2fb2d18f3c1d9807144e56590f9f67e864c43963471
SHA51299ec0a3407996f80c51a49fdf1332d106ab22fc5910fe7818bd64dce73c56daa611db2390c8f0000f6a1376174aa997cea2b5576e2faf8e8bc30a2c4115adaf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da808e61d6f4e57085634b6e3e3b1cd8
SHA157018dc25ce01eda331f078b1f6f89769c265c0b
SHA2565147bc0364c7b3db00b7aa81c5f2736d4c86ac2b02d34e03034ce437bfd514b6
SHA512431bad2e7e828e59f3868b1023b4ab38a8b328efa4b5cbec1c4e7e0c616f59dffc96a13de34bdf13387985b57df0d13ad7d9626a882c09e569504272c438074c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce7cbbdfc7e263713c890c88ba942de1
SHA14db7f1e618eab9528007c73ab793e87137758ca7
SHA256f9a05b9ceb3b4f7cb2d6cd3aca0f4a038092c1a1d9e3c30f8074048879356990
SHA512556a9266d53a08670a491fac56f82f769b0251fbbb1871b54f604b8a352f7921f644cb468de9c5813bfe2075c2dc8372b7e70dd364cf3826d3c2bbde1b549afc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc4f122dd86346f557bed9d3cacc239e
SHA1faab3ca31ebf94d25ddd6f5418fa793decd0f96d
SHA256c2c6089bb817c091f230177269c61aca4247c876890e71a4117dca2172a842f7
SHA51267b6d54953c8c4eeb5af00f4045b80dec6337a5a3b285ef9ca46dbd134c68ecd3a758a58b942379b9f7f8553d8f6bf1b141c0d9debb4b457c5f3d57d9fea82e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5748acf7384774c1248b5b1490aba540c
SHA1931e4954a5dd2cd299787134ebffbaa56ca0f3a5
SHA25688180db33ee23164c7fa7104f6f3bcef24751830566e32ce0233f5a982edaa2a
SHA5128749789b567d3093f0ddb1fb1c502b57bd0d5367b719a8c759702d3b7aa4326101621528548cb0c8d231cd629e0479e71f6fd86d21ac834f0da433f158e19b8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54271884322437ef816df408d39075c17
SHA15fb332c2e74f5ed1afe9da4a5b704f2265581f38
SHA256496b74885841619aefe6118496e0c425420bc721a5f699f9ba1503e9b7b4a552
SHA512ad6703bec87fadfe9149ca7ba958c7279f66736f4c9ab477b445a0dd6415791db37cdf853cbd2d84f8dd8a7ec8f2c7ca7b266df2ec9f2dc5b538d480bfdb1e8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556de25bc61d9c3d82d1254a9799f8021
SHA17120387b352a9f3a87c85c895ec1350aa6c698f3
SHA256295921535d7b249b2676b2806aa3e851dd16682fa7d7a15b02bfc4e9277af41d
SHA512f3f43509bdba1dd9a8eae4dc7258462cf9a814dc01318ae0f7ae57c4dece881055d9e81afeee4abe467358166adb5b35e89cbfbc26d77355077c433617f9546d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b