Analysis
-
max time kernel
119s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 02:37
Static task
static1
Behavioral task
behavioral1
Sample
724828db7fe9a66fc60cb0246fde3d05_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
724828db7fe9a66fc60cb0246fde3d05_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
724828db7fe9a66fc60cb0246fde3d05_JaffaCakes118.html
-
Size
94B
-
MD5
724828db7fe9a66fc60cb0246fde3d05
-
SHA1
bb0738ab0e861a04b63b0624da49b409c80281ac
-
SHA256
023d8e3bb9f892318d139d9890f1e70a1bb2bd0816ba5f0fb117b5585ddc7e95
-
SHA512
22ce26711488375d3037efb1815bb154d2ec0deac97dbf1571308c39c6d0cf5c1f90914c69c758d1a615d1d1951831641fa8cdaa0a8c6e0def8083e3f1e740c5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428125255" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{844E59A1-4AFC-11EF-98E6-E649859EC46C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000006859601992d4b27aec57bd9235ba032e5e58be8431ec9abc0562837892145cf7000000000e800000000200002000000007d490e3f0ca1f0b9cc4b0ed715c6b8fc7a3a94684c04a508d1af5ab814eae4220000000abe2c315739a9b22856419bb9d35deb0ae784acaf3d36513f52ec7c3467bba8040000000ddde48175077dd5494f6f13afad84117534690a49268049448069bebc30f9ce677cc43a9ac3c8b18605ed2db3825928fa79cc49735e5ad0dfa67ac79b398a828 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a00ec55809dfda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1380 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1380 iexplore.exe 1380 iexplore.exe 2364 IEXPLORE.EXE 2364 IEXPLORE.EXE 2364 IEXPLORE.EXE 2364 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1380 wrote to memory of 2364 1380 iexplore.exe 30 PID 1380 wrote to memory of 2364 1380 iexplore.exe 30 PID 1380 wrote to memory of 2364 1380 iexplore.exe 30 PID 1380 wrote to memory of 2364 1380 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\724828db7fe9a66fc60cb0246fde3d05_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1380 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538c50db9a0e0f8b3ef97337f648febe9
SHA1c777b34e1fbfba7de469305d97b48b2dd4212c23
SHA256834f61cba98c99dfb09b582669ba41b24fde3e7ce8f86c73371c31af6093677d
SHA512e6e0ff93dce69c943adc93ab77ecb6c9e24622a4b3cab15a636a7f1ca17a6971d93e3cdb6d20982e9f7b0ad9f9d70b22f479445a389891e93d987d347edaa840
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a1fd699439124902ff0e38ea644b4f4
SHA1e886fa6c867731c86e3e737104bf7df9972a6bcc
SHA256d43ebf0bf0c4a12194022b2f38fbf258fb2fa35752210de1a0d0f2ef32e3de3d
SHA5128c5de0bb88be8adf3d86c7cb843238304e61a942a0a5d47c0881eba1f50f107dad01cf78f595303f600b9257e13d1cf5c68319726b7cd263f5a70650196b03fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54668c521c668e1147e121221a2183682
SHA1e5b6e467c804878e39f80d1e1ddff124aeb01823
SHA25663584385e01ded182f507c408f6b3a8a657fb33001b2e50b15cbb441b86a016c
SHA51281e92cf02e75a1fe283b0251f7f776f77b846369d1a5268a53ed70dd5868e0071f0dd7c15cda574a23fe15336152a9e758dfa9f14c6487f7c9e217d837cd9083
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537e349e890d094a31dbf228f7b9367c1
SHA16e3e470205005c42ea7df8d48d0287e4edd135fc
SHA256c2911a117e3ffd30783fa31dc730e5b6ac85df5addc909a0ab303c86f5b8a071
SHA512da68f7a43f890b2201c2078d5b5aa227a6cd87af9958b93a3bf02a22de81c68b758a7a46281a2a9816e7e43f30271a5fb8100c4b92e02496e41712411cd02ec2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5889b67fb1e178100ba2b2905037b96a1
SHA12d67a663abe7d766ff8a405dcf900429aa540453
SHA256b08d5739bc431232f2a39fee2c7139ac6390b3dc312ab46eb506018fa524ab2f
SHA512b24d35d3b4c20bff0d293b424c613799b53da5a551b7188f0cd5d0272a3318f6792c8900f1001cf4ea5ac1da672a65475d415cd669609318718c538d1bb5903a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fa5de42bddd0690a24924a47fdc835c
SHA1a11c695ca861ced6b0ce6a0e80a469f134057f03
SHA2569a6fafb30e6e019a214e553bd29561f49161449620774b4977ae5f154006e0c4
SHA5124ba4c20dec9fa2bab21ae7e7214a9621b03ee190012d9053b5762f59237918e86a30dc1569d2e4da273b4d6bf53c9717ef99c56633a47f396e99441347522501
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fed611f6c17487e88af330c61cc93a4
SHA18d4d859f4a080861c28a1c715c9722ff68240c0b
SHA256461b9b30f3bb4707378ee38ede41a1a73284c2f8a3eac9cf74f35e41452804cf
SHA51261593bd551acf31e054f02e9924da791180de380c0a79a40d1cb27046dd17d088a85a2f5fbe9a365c422bee89db20718629651dac875d6a4882f58e726000b61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5088b53365349d23a7954b4afa7a32cb3
SHA1cc97cbc29e6cc2f4177aa65a26cb65c0c4321202
SHA256d9d86962e7d38145be2738ff9b553ce37898f6fd0fb0c3b93af9ddd6365635a6
SHA5122f374b7ccf106b39330422618d14fdf2112d496b53cf81a75ec25c3ce080deaa13daf64219e50d9ae7baa4dd4997ff99c8b38ed86e547297b854d610a0b49619
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dd2272204be303a55dbcc3891fc9641
SHA16c7e2d6d271c7b0146b8503663edcf27ea2d7437
SHA256ac4bb52dba2372eb25bcaafcae9e14dda6df3af3142981af9832737ff1fb5ad9
SHA5121ba181233b435413d24a73ae1c65aff1332718870f56c665c4fdbc04cdd50ccd41fbf771beabe96a0d09e0020c032b8c63fa3159247c99c0dbe36fe72d049aec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8f7e1b55175afeb8e741134a5df1e41
SHA1025e08e3f93ae2176fc21ebe52c9a0b34868079d
SHA256e13beacf1b371aa017b6e1573e7b5c49adfad6980e03725716785c4b20e764c9
SHA512600d27194e810badfd54c12054ae63896617730b8a3f0a217f2f26d01a3d8b468d5a4160ce6944a2e6c79d4f1a6721b5ac14d57380dfc9c1ed2fda60213a6208
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545312d0b9464b1e93f3c49c895d0187b
SHA18a2a25321dbfd49c0c3fd9c58606ace499de8f19
SHA2560f10717539996848a839996421d6573cf95a2742a8f98b30fee0fa5f4aa947e5
SHA512ec65f1c133dcb6f06186d781f23869b21de5965c7f8dee24908f68f0064bb5f46a1b97a51348493e5a59c078012e57c72acdd1f7275f02f9e9d73dc7b66c592b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c3d46ea0073447171ec5db1288b0606
SHA1b9913419ce7cc6b79c9f52bdbfbd1dd7e868a142
SHA256ad15e4feaa028c40c8ffdc04397a6f5fbe3d1dc76434b0b9e36a2c4c8cb2a4d3
SHA51203e4b5192bef83fcf7577e87ea7386af8f93d2562e46ae907280cf9597674f4eb472072fd2652a576927f6a2089a0c2445acee986527dd371169db12a53284f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0e4f80cf7b22a11ab912411356f72a2
SHA1d2b2558ec42f2f73465b7e008f75a0fa9b95f61c
SHA256fdae0e76cbc3e7f88d2bc899eac5f5f7f47cd64154f976d56dfcccbe6479a761
SHA5122b357a0d2e4ff616ba8f843462dcb070291fe50d54954ca46d6e60cbaadbc51d61afe5ab1b796fb1923b67bdf9f80b3811884cf8a06b1fc35828b93a806fe80e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58235766c606c8cecfc9f71c95b682ad5
SHA15046d19cfd3b084f85ead8bdb6deb3f0fe17bc29
SHA2568edae8ea910ec90aedca8d23475438bb7d8d3d39e2b747dcd37d2b7a29c0d2b5
SHA512da861893f3fc042b12ad469e97317fca5679a1c53defa3f7fb0b77432deaaf0b0f978ae19d770557b3030986dbacbcaeacfbab9819c2895897d9463de7d304c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ca219349b7870d2be11edfd5e8ce685
SHA1060a05aee43aabf951d6cbaf5cdb4ff9b6fe678c
SHA2563a511733b6ecf01e8907a51af1e0bbab71a3036e3727bd72f19310864226cdb9
SHA51255c0b4fe5d87bb2d6f35fb31b234081efbd87dc3e6c2960b11cea4155a5c2700991c4375f122c8ac1fe27346b30da64210e6e422afcb2f8460b23c168f6d7233
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537c8321b5e0b7ee17358e5b00c4ca16a
SHA1140ec39b9bac42044cf2abcc406b2bb025e2dcbc
SHA2564109f80a313dd4870f2c8a14674a7e9aa947c79a001698c7f99af8a8bb1a5019
SHA512305a102d3fd10e25bcd2e0eda87a3325180892d3eba6c164783cb1ef136ab1f7ff5e1b68295bd8f496a79b26e1e67dcd59f6c47666b45cfbe095191150f0a6f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b90df91298678b842f955475e5f83b30
SHA1a034e1a716eb71f71d5eda8e0fb1d752f29ebfce
SHA256bf36b1700557e151a2d60095665b779c603f7d6504267cd7197c76160aab4750
SHA5125c9a0b588cb73011bafcf20391d49a5ac2a4dd4de236348c07fb64890e7593e3c14aaf0280048c63a5811138d3f4c3aff953b4b5b77a402909189675f9cd611a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b269fb9239c5a35694352f2860e4e47d
SHA11a096f5d3495d1262229fc509819e522ca03746e
SHA256cb6f7a643906c80735fc39aa0d326b9be8b95298a4c1eb1e4115a6db3851a732
SHA512da9c6939f32558d8de7560779b4537330d9e0a565e6753bd2eddf664ed61bf55af986168162c7ccd1b91caf1a67993631d6634aa27297c02ee6dbb149afe8091
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b