Analysis
-
max time kernel
120s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 02:24
Static task
static1
Behavioral task
behavioral1
Sample
723db5deff6f34014ae2a97795dce5e2_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
723db5deff6f34014ae2a97795dce5e2_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
723db5deff6f34014ae2a97795dce5e2_JaffaCakes118.html
-
Size
91KB
-
MD5
723db5deff6f34014ae2a97795dce5e2
-
SHA1
51fb067149c23a2a79f104559debb924f4adc375
-
SHA256
93c4aab200d67a37ab77e6ce4ff563ffbf7965d8643a8979cbcfbab45f35bbcc
-
SHA512
c5ff7c6a18007d8223371b12f92b5ecb52b299cb04e78fe63e9ecc0d608f1c77d2f1bff03352f0e9f9497b780f0526113f5bbeb5df011c91e4f219746edac7fe
-
SSDEEP
1536:Zdo9KdRAnu5DWE3i8i1/oe/l8+uyH/joYLTAN45hATJSYTJSZM4Gjnvlr13dM:ZhdU6330B3RYxbh5W
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c70000000002000000000010660000000100002000000018887ba440fca648721336dcff0c32f8cca12423fff37945963982ddb1d5b999000000000e8000000002000020000000c4d9ddeaaba1967169556c39d66da5121bc2356db80fdf9fdf819b5e8cfbebd420000000f1650a433a6295563376233721e2bbea389e3a584c2080d12760fc2bfb17936f40000000b29af0b5afe96138428dda2805bdcee232a80d276b3e2a4e2caf8085663ce274bfe9650109ae5cf547729e14fea69e61263a7222c81ea61ce9593fb44222d70d iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428124036" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0014f38106dfda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AD1B5B11-4AF9-11EF-AE10-CEBD2182E735} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3068 iexplore.exe 3068 iexplore.exe 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2460 3068 iexplore.exe 28 PID 3068 wrote to memory of 2460 3068 iexplore.exe 28 PID 3068 wrote to memory of 2460 3068 iexplore.exe 28 PID 3068 wrote to memory of 2460 3068 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\723db5deff6f34014ae2a97795dce5e2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3068 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2460
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fbc594b65d705356cf2a19fc1b5fa43
SHA1c2955fa5196391f41a73b92ff6b4970875ca851a
SHA25668112c8d6039291b5b1deed465fee56bdc6fc1346a7119a6a4e30aea04ada365
SHA51276c4832c02102787decf305ea509946594f881bde96351d05146196e8e8202ab94984f20c79328283ca56afea667f8734b434bbfe0f2ac87ba3ebf582bd25302
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7da66cedf948c9a89e0119fe4e21a9d
SHA1bd877415b0e6e37d9fc21352a2d080fbcad476ce
SHA2564e0e23a48f2e9ce60a511ed40faf917e39aa9b1790179b712bb1f544eb5e6c8d
SHA51263a2d4f50405705b4aae45bd03fd37dded9d03ce1be8eb6464b35ff849c46f762b669c89571653c57a94e412ada730fe96423d2631091bc50d3d38fb31243af4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588ee7a7325d49be491ec9032decc678c
SHA1813591fc43d33a79a9210a0d3095c469792f81e8
SHA256bd45f82a9448ff7b1a86eaabce106ac42135193c14cf83fde8e32ec38d4739c5
SHA512e8513a2c6c2307e317ef654005ed278dedbbec13aa6bb11ae94bee02864a6bc388dd6658b2a2a278e9fcc6d70e910f41c7287d760bf5ea6b46267e910fcf0add
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acad124c39595a2c0f22051250e97a3f
SHA18614dd9b15dfd4af117ba83de85b00d8e4dfe94a
SHA256239a7d08d1ede60b0b6d1280b5fea803bf097e1989d1a213ab5d109d53fe566e
SHA512ec23d166671b6fb39702df72397a3e53f64f63a3190008de5804c2ce2cb95286020ab5bd9642c129a47fe43ace3322dc90f5b31879a8f5b7cdf5e5eba31dfbe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513ea8eb9f18b47f1ef97a5202aa67d79
SHA19d7f6b8484c3fe8de4fa842c689c4d9a97ff41e7
SHA2566d312b10e45685d74bd90bc284951e4dd15e0c40963689fff3ad6946be9aea00
SHA512b06eae4e6a50548d9fb89ff66838684483ad2182b84f56b332b58c4c519ff7c3133b1ec9fd8aa0fe85e218a0896de43533b7513b2dfd0328b192522670aa48ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510b90177152406a2ba7aee8ea84c0679
SHA1e7144d08d223ad28fe13700f685c142a50ab2399
SHA256b5154d3ee9401b4c8af3e619bcf6ba9d51eec1befe8d2ef2e830222897ccb3c5
SHA51294db879786cf268c258a1c319390683e94268e96d596190a54319e3d8bf694c465ab7f3390f7a97770a9ea95b1b467726d27dc0bbe9967aa3ff779ee17ca850a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a913a1ebff14a6c304e88f926ae1e351
SHA170600f799fcd431346567c6f32cf6b68b9821f9e
SHA256e60e623e1810517ab9b9f5529ffc68d1ad32dfe15f47298daa7666db8424c4d8
SHA512bfd1cd2b5d661ce142b6fe3296e461faed8b88bc4a239c1bcc1737f1b49d733d33ced9ae82ecd7bcafd3a2449f99b3156cf23c28ba44a0a9e4ce922b4ce2ad5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532f8cf797dd131c31742d520cef6bc6a
SHA1dacc983a3190f4f6df3a1d5be2e97333fd5835f1
SHA25680e418a198d0632aae7d1342de2d32ae5dfaeb78b5939e2835d059f7cb894f7d
SHA512ba094221f12862924405794485327b1e96f94f3c5bb50ef15a46c8e747042639f51d8a8f3be1d41a9bbda870723defc2276f3e40ae9201eb0d6bd3f7d1bc3831
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2ac06f916387c60de14485968e29dad
SHA12c1f854a9e429a8a4007cf4e2a10a71d226a9682
SHA256f0cc2bfee9ecd4eb2f676bb578420102bdcd1eb11696da5ff38a26be23d883da
SHA5124830477e478f091bc3f66ad4b06c87235ec9979b5c86361fb9b3cf8e723b43010d77ba67578a08d8c4b483f07fa65e092b72974edec16c81209c6fb784fb76d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f97bc5be968443e85f53994a955dbde
SHA1038533b432a2f692b5f8ffd71a6df69845fb6180
SHA25628773846ccabbb99ac2921ad4a93266c17500711ce1cb33c7eb878687a8ddac2
SHA512ce50659410551d1f502b6f67f3f00e8d143def164dc1065ff8c97dde24877f32c8fdab0c2d066348308188f17f68b4290364a0ed17794dd0720ed73a006b482f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2efeabb82014e0e8add2817c50a85e9
SHA1a6268820edd014efe5cf096ad090141548a3db95
SHA2565494bb711b99c522c39a6163571e914c2259e5aa9cadd12168359237dc0a4b77
SHA5121a593f63528f4e38dcc2ab8af6204e02ea48bbafb6d45b14cb0882a6f8021ee01d83e6176568b673f546b686f1b2f95b1e85bd671fa9e57152caa309b74be8a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f105ffd58d21bb4b6b9aa6f587f42e93
SHA1530e735e4ece8c3166778ffbc46daf36c2b161e2
SHA256a4d4220e2bae111bec3a018e6b9db44d2a972dea324c312f10dc6bf1b608dcbe
SHA512a434fa4323a4b85fd39232e8a6ac624a0ce552db279590b14c560105e1f9f6bcc4e4f9340b088c5faf7f7609fda848c0c828fa2c6f2cea8ce7182544d0147d26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b821373731109e7fb0b0f8ba0eb5b87
SHA1f53d29190a38fb5231475887df107db34a671d3b
SHA256b517c756a3e6d748aa33e3f297918dc6d203fad709acafe75f70c4af3089a42a
SHA5124d9d5747d9b8f12372e023026b04b114322669935615ba9fee084a0b94c0210f67cd9e993df9c8d94bc762a3eeeb505efbe75ed5eed787fa73d1c555a32aeb7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f239cdefbc842a1067f54c26437c6c6
SHA192d3124f48e7e77f7dbc1670ef1ab04326c07df6
SHA2562a085c595ac231e97c67c9511e456d73de1ddb81d2397058e897ba3e2428586f
SHA512db0ec0004990f48e860f9a336b5c02bd5918f5352986fb5fafac10c9872708ca635a34b7f5e0c66431bf7d3bd7064d2509d1a0736124b485850cd8a5e1aa9c51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53067d32e23d6592d70539551c10a93ee
SHA19113177b6f9ffc4d2e49515fe84da9ba5ccfffd0
SHA2569aa5f105f9cbcb5a8945a16fb58939e1d8a1f47f9cd0653d1c0fda164047aa78
SHA51262cb76d7a28ccf75d58d5b7fb91280489162284ce04947b5b18f2df4c36c33715e5edf3c2aba606c26652c616c2d674fe3f7d2201b867cc6bf87aaddd04be9db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5453cd9d60cd43cbe288e71d6be1f05f4
SHA1f82e31fadca016a8e36f7c0f08f9cc1bc682ab4b
SHA25653a9b86a61d1ed376a2fdebb4fbbf3d304afbe0df0aae62feb0704b190537efc
SHA512286d1bfcc07aa7a095600cd91b668150ec965d58c06dcacf9663c563d8476b164195ce452e1cb669efcbef01a8ed0f1265b5da4bc4251bd90271f270f3717fed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53350b4344cb25d867def56e71b164fef
SHA1a55b3b0ff5952e9ed1ad4e982cd8e52d6af0a2d3
SHA256680c6c7117c23f0c419ded27e48b3e45e46a7fe2054256e159b64e6b0efe2915
SHA512bfcdc5e261dd4161cdb018d98a8c56abcc72b8f4b5519bcb526a15200fd675ba7351218be1fb5027b0befe8c21f90559755a34482ee54ea796d5e3f6a84ee0b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a74247eb9c51e17778a7528bfdd4c027
SHA155ad875017467dc029bd648d812b797d2f32dd23
SHA2560e9e3f95e6c664f4c96cff2a96c0938e71f53bcf6ccc09d066a6380bc0849f5c
SHA512938b7ae8f9e0734a387f71e24d89e8b11e17d68bdd73e0d8f2e04abe5fca0ff2adae01cc374bd2f830f19d925b4b3c01620af4368d328df1794997598b652b0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f02d179aa2192ee689269866a4fdfb2
SHA172ff77fcbb9ce71cd372d805d699a109073c2a64
SHA256dd4b000b4510ff80597bf43dc0f22acfb1f5dc93229ded38f4963c33586bec19
SHA512df9ef60e3f0c30c416f9c6f3caa0affa5df3ad27665319bc0da4207937a3e593c21c762b668c0c1c414cd8474c14d22b78c190a0a58a6b826b9cb40fc2bd3bd6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b