Analysis
-
max time kernel
140s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 02:28
Static task
static1
Behavioral task
behavioral1
Sample
7240d50240849c9161a4af57b719f14e_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7240d50240849c9161a4af57b719f14e_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
7240d50240849c9161a4af57b719f14e_JaffaCakes118.html
-
Size
19KB
-
MD5
7240d50240849c9161a4af57b719f14e
-
SHA1
159b7893dda6158a34fcd6b0b9266be2c8e28ec7
-
SHA256
1502265a4a8464a26655aa679f880c3b5c3595adbadc12fe95927cbc3e91ccf0
-
SHA512
d28be886331b7ef1bf8618ba260631dce84d36c71ccae251fe399059d327fa90e3873962064ef437741aa8503a7abc15d18b4d693be9d86581183368939b225f
-
SSDEEP
384:eu6/Kjo0lNL+gkKkpF8SgITH9XX3Y5NI8L:NltW65VL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{50213131-4AFB-11EF-A2BE-5E235017FF15} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428124739" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000aab0c3e7d7a73fb377f6cd649780f0a7f6e9c48585bfee27950fc2495a05ddeb000000000e8000000002000020000000cf1fc33866cb36d2f5d2fe2ba8703eeb2d8d731643273b5a9abf850b9ff11b992000000041c065fb5115d08eb0744cd8608ef56bbcc4c6ef21b22cc4144d5980773e569e40000000f2548044c26becd361b03d9e513da6817ea51101110217b808a61cba784d9d2e74ee8a6f612758af64f3de49c4101d24e916f8355e3df3d2ef90c6d36c453c14 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40237a5908dfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1920 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1920 iexplore.exe 1920 iexplore.exe 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1920 wrote to memory of 2592 1920 iexplore.exe 30 PID 1920 wrote to memory of 2592 1920 iexplore.exe 30 PID 1920 wrote to memory of 2592 1920 iexplore.exe 30 PID 1920 wrote to memory of 2592 1920 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7240d50240849c9161a4af57b719f14e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1920 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539c9737cd982196d68fa2b4ae29e96c7
SHA174dda1c58c76e877d580a5546bd317aef194d340
SHA256c1a53519fdae37ebbf915d59918b30c813aa935a65b141ab09f855de1883757c
SHA51242fc5af2d7fccd7ea26f0c8e6e5b4e80688f98d77ab7d05790641960703269bda05c2d78f207958ffc00efe956165895be2eacb864a3193126dfc31c09fab0b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55be2e5cd5f86fccd015f2403687f9a69
SHA1d867d3c68fd1d37ed5799c4ea6ceb38039d521a8
SHA256919502a286da5995a8b9bc01c2066c2c774fdb0532701c0df173f266c1466a97
SHA5127d8241718fbcc7cbbb9c8bf6c8c3918b6ef9b2e435fc4f89fdd31ec5a1acd28abd2f1c678aade2eba5980b12ece9b5e6d0bcc7b46058ea0c5233e1f4288bcfcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5980810a615cb10ea8fb1ac165425b194
SHA193a15839c35dfab283f13847948531db3685dc29
SHA2562a4d2bb311e979e233c3c78cee7f3da0d235539439adcdb0d9abe6b799244a59
SHA5121edd6c8655307deb22fef52c2edbb5251f152bab3ccdcbde41b8988094617b87685c11da3fb55e81537095d98ee0fe6cf01190f29d3a7d01e7b1bafd04d794fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be1e14cd75d7dc5eac05506c9094dea3
SHA18b60293b3545155da0d2d86c14cab2d5482863f8
SHA256d8cd7b4d9ab3215fa9b44844a3ed49f27b85beeeb77aea8e0ac27d8508fc9d11
SHA5122eda220de477571ca07ac02d77b0c09c4d449543ebc798abdbf84fc7ffd8557c517b884524fe472540edf13fd6df017a7fb0b8663fb44f2d3b02db2bc52c4746
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d074253e2b1e38c440906ac5a25d8a29
SHA1d5f97ec87c99b2e5eb7ffeed5bb6f605226f7bf2
SHA25601c88a4ac5dc0576a2e41ddb23871951fca24590b91ddfd3d40bfaf51251a494
SHA5127fe308a7c282d71f1602e9419501b88bb220220f73b3223c5fcb20c726bf4f402701a9f3bf2df5d44e8aec088e7f61828a49061673f15961452a222c2b947cc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502b8db85ec3cf50bbd191bc441e2f9ee
SHA1f43ac2f695bd5585c094aa785c54c685a4dc9c9b
SHA256d69998e14287ef921c1236c011824d35a1c1bf92cc3cac29551e6fccf2c1dd9c
SHA512a3bb7f04208b38ea3a7f4e26c0c619be42b68ae0ce41f2f18e85dbb35a7f965133cd372b91db4139180ccf5c956a1576b03d687e615b241c47bdeecc7f1533b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1a284688779f80887b9f87512d0217e
SHA10d51085f9524ce7dc6623fb50540b39c167868e5
SHA256d50ad9517f12a33a93de0eafe5c9a9a3e4fe4ffa74b60e9e858e745aad0e4ae7
SHA51235c263f8ca8cdf120a57b266f1bc0c5f696ba3adda99f8408b5fc7f6e784cec4808d4d4afe78080be7f4d1d1e3b67579bc967dc69731d6dbe0c7e4fca1f2df50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54da7d02174cbaa738e94f81f1e50c30c
SHA159ab3799aff263d96cf1eafa17fbf1e48c398824
SHA2568a7417fe0ec73378b6f41d3eded92a789bb185350fbd90092779b12e4899eebc
SHA51205a13b49ed2035403592ddf305517e9d5410ca976fb31823ab657b1bf5b87bf5f57cf0f04eed9d5f0ce8f8dfb33509a647b17afce3959345308afd2874ca04ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dccadc8d2ab170488b9792ce890d4ba6
SHA1a501284d9be46dc455ef3871ebe74779995016db
SHA2560e31fee5670494f077eb148a849a39b8bac7f856acd8383b573f6f658b4d8f6d
SHA512500798a17e1da544ac79bc760fcd4c9a372424c23f8fbdfa047af13b400ce5a52f845fa3412d5f06a369abfe8adc8a45cf6e165a76be52b8d7d1d521dba23642
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bc51566e5acba13d658eb6ce25d6b84
SHA1304162236e88a7cb486d5035e4f25cf7dff38d97
SHA2560975b66094f4ccdf84d3fa5c34b20d2a140561a61d5f539723a12380500b2341
SHA512f7b848567e2ebb1d559a2662ce9e9655e7b7ebe480eda191dc4f8728b9f347268d45f112b7362f02da8e804765c8d57792a1cec842bc8636597e2035a72aa6c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b91ecc0f3d98999daea8d00573d20fb
SHA1aa327d5b305e5bfbd828aa2b09bb4a0f66db5858
SHA256172c4d165fee8c28e48f3f4b45cb5d8d5f92bbf0697d5b1a094475d2e677e441
SHA512df48f2bac92cea3858334b19b3d3e67bfcfe6d5db3c07ff3cb9dd0ce27862a5f3844880686f814ce69ce4f1c6f8c99c9b722af047142e898edb05c4f1d277176
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cadbf4bddbeea4564113dedec9653c8b
SHA17a0b0801f03d27230e249f505f599db88843e109
SHA2569dfa6ba89c2986bd4b33150fdb60ffff6f84fead6a6dbea6b85d84be6cb66f0e
SHA51231d8fb99aa09bf4a45e15de4d4790e02cdd9d911d02a7b8837494918b1a271471cb520974a5fee5b9a5fce5e0df3b02c4c1c5e6dc8eacebcd313040ecedcd62a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d416f36e4e8cbce64e5926918583393
SHA18c47502be6463787d296fc75b375d66bd4e50eb6
SHA25671603802fdcfad7fb1563ba79aa30bf04fdb5dd69ffe620ae56dcdf87251ea67
SHA51258538da7b0207b7446a0e2dc44851d6d37ab0d455a7111109fb2fc181dd0438ae5d5f7735a407a02ed48140d0b7c2c4d554df64e8ec08777cca2454bd4a8cdc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5329e48c7da32854cd131edc92dfd0698
SHA10d128b05437c435c0856fbad6bf4fade390bb44a
SHA256766d9f3e450bb3f4197905cf23643096b259969c03f939521a92e36e1c0ceaae
SHA512564b9128a7cce6a37788ad6f1191a22f529ed22b11a00271b201b3ddbb2a70cc9d8d666428ae855141003afd11e371f93c3c56e448bff3547d6b9898ee371b99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5806d51da2512acbb722fc9b9c5b1c76b
SHA16c7bdeae6f8746f9b66fb138c7b30d196bd4ca3a
SHA256f734618aa3934e1b183e3b68a96fe9341875b425fdec2487b02afae2dbf9647a
SHA51273fe6e253a3e9bc02dd7902e8499d49b49af10b6b65e37a935e0832fcb1fc0081622020023988210ae0bb3200133f802ec0fed0392b4194933f5a960d193fc74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efb1a672a829a8ddd73734164693882f
SHA17ffd2c487cf43b7d669f85daa47806ed59bfeef0
SHA256103873ae9797e26a3796555e99853b30488675e3cbd9014b34bcf8b56c9ead9a
SHA51248b7798914a8d1e3f635669ee8df7a4f0c6511f345a3021a420188f54517291ce728b5d2fcebe709edfeadd2b5d2d30c4b83703eaafc01e87039f5f86aa57dee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a636e653186aebcd8683a2f2ffcc273
SHA122ba519d1b5fc172d4fa504e92613c3900fbae1c
SHA2569b6e819f4a60fff84ad50893ddd7361d4329f3cef71b6e2598a45d1072765284
SHA512bb9abfd7ad3bd9f0c426a94484755ed16cd4af53457ac26ab13f7370d0fd6408d5881d5dc2b08fdbd24ea69ba4fb8602301be86491a6aef836f3903335056dc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d109fa8138e5a2cf958f4b649cb2cacb
SHA1670bc2a70c761ba9efd7f86013fed593bf2cd08f
SHA2562c91d5d0bfe066152d4a8fb0662c6244cd7229ed98a0674b4c57b0de7cfc3895
SHA512d5dd589483e5582b04c43c9da48180b6b1bd515b06be092239ad87c04177f00fcc3a4edc29b4ce00370da2e70031e7b3dd82de4e3f590a6299a0448d6570ab94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5516dc7dcd33daaa33a873992d7caf0a9
SHA19d58e12f3df82ce72013f14cb20c97cd4df73fd4
SHA25656e7a823fa1b03d561fe2f57ccf4acea6129bcd9d41b0bffe1feb3892047bead
SHA5124c15ecf021c7f6024739d35afc257e2d03bdcbb726062c0da98c20e9228b75ac902e95a2ba476309a0e777acd979c471bfbcc187842b98a7f5ad9db8497a1d7d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b