Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 03:46
Static task
static1
Behavioral task
behavioral1
Sample
7277bc1fdff2120577dc9142177fe8ce_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7277bc1fdff2120577dc9142177fe8ce_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
7277bc1fdff2120577dc9142177fe8ce_JaffaCakes118.html
-
Size
10KB
-
MD5
7277bc1fdff2120577dc9142177fe8ce
-
SHA1
524f5a86961ccd3749dd31fa5b2fb46b84434d75
-
SHA256
e5691297d1bde595c5e9dea9a2cb2d94c90774606c311528a4097ea0fc0c21a3
-
SHA512
c255af381378e7e1e2be584a4e034a678763a5b20cc6a138c6c400c80d9670970295b5ca66f4a893349792bd50cbd1ca4bfdb3e4f9778b9321a38b4f11daa974
-
SSDEEP
96:uzVs+ux7WQLLY1k9o84d12ef7CSTUOGT/kzyCwpDMPS/LPAlP8lVHcEZ7ru7f:csz7WQAYS/Tzv2oYbAd8PHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000e7c5aed8c5b92ccc0aa581d106e1d03948d9aa2a5080e3f9ead3c53565223f8b000000000e8000000002000020000000a9daaae5a845b338e0f2e42468c8c9f3c67f5858f504a7d2166584a7237fd6eb20000000f43642833800eefabb1be989cd4c8eeeb0ffd0533a65d062f0d0626ef665c7124000000071ba750938ca547cf28279dc2891dbdaa76d6a101b8f77f06e9e88737126c901641fc6f68b78450daf1efecc494f9f6992be7495ab77680f9714e37b6b6baf40 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428129447" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90df781b13dfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{466054E1-4B06-11EF-8705-5AE8573B0ABD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2060 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2060 iexplore.exe 2060 iexplore.exe 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2776 2060 iexplore.exe 30 PID 2060 wrote to memory of 2776 2060 iexplore.exe 30 PID 2060 wrote to memory of 2776 2060 iexplore.exe 30 PID 2060 wrote to memory of 2776 2060 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7277bc1fdff2120577dc9142177fe8ce_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2060 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598d30b61daf59168f9745509a6d02146
SHA1087dcb9e0ce472b9cc6ba37696f6042253c62ab3
SHA256054a554b8b0fb80e9b4a213048b4ef9014a95fe0e2b07a3d4b2e9b3ec6b95c9c
SHA512225696e400fdf98271875d56f4714543fe41d70d08cdf6f62087afc14d423491e4248349d8d24cd31f09dacb69da4ed986a1c04b919ccbee27d73941e539b645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7b0c2da3e94246d03dc4c845f316b9a
SHA1d778fe203b3a9986f0f0788b871798bd914f340b
SHA25646ea8a633f461a17a0daf92cc8a1e24f7a665304c09a14148c32e61e80b34b26
SHA512a8464943212033ef6b8d146ca1341d05ade495d0d88d6799d814a5e5c576c1ce5b52411cfb2f0282529e653bfe1422ff31714496fdd87f617bc233f5aae51b24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4b92847d576ffb62a8285891c9a4746
SHA1cbe0ef26d70dcc8b7c390ceeb9c138d64707f7de
SHA2560c935dc377b031ac6d75db7de63e1be069a7690b376d2bcaee696155170f3bac
SHA512d6a1cb7032e6b57b45c957d25f668aa9862b926f96bfc8798cfa088b28cece79c6d06f43bdacc64b91f32152825c08967cfaaecf8e38bd69ab4510c57760ecb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfa0683e52ee2d372cf3f742bbde87d8
SHA180956c8d5be0d3018c4e35348a7b34af42fb656b
SHA25674f134a615302435ae58924f0e0d18b2c5057642d93d7f568f86e40e3c2ac2e1
SHA5120c678468d7684b2dc39f9fe2ddb8af7c3dbe04a047d2daf44e498fb5bb11a72c8c9f5939a818ad12913164da8a0f859b00f37d0cd8b6ef9875f800e4fb828d02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f19f7cc22dc0f65977a0c3754a907b46
SHA1483545a1d405f97f8a6c69f7f74a1e45ab100700
SHA25689829e3523d5fc40cf9525094d054e6d23da3d2896a155e278aa9f229a26650a
SHA5121da921725e6c186257aeaa91dada60db325c54effc7d40fe10e5e7e11c465d4cb9241c8eb9788e1f030c67a10a3d2606bf67c3f92aafab8f49ad4977699b2c4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da95319ce58866d94912cc22ac322aad
SHA1e9545ec6dc94864d512c470cb71d8387106c25b6
SHA2567d8c391586eb96f1828ee719145cb02039699cf2dcdf9261f655c2a2adb79c14
SHA51202785c5e60e8aeaa5bef4edf39309c448f9c789b6c8618d6b652bef8ac3ff8f19844da7d2ccb4f7bef6cd4d9fb1df04dfc35bf0f387d99c3d6827607820d2768
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d94ded588990f44d3a5ec8ab27f1db4
SHA1af9af8504f8e8cdb7559fbfe1a67c93a19fb61c9
SHA256cd19014fefdb3497231ad2fe6cb91e3106e1b20457cba11d0ee0f1e48022ac0b
SHA5122fdb0ede66a6cfe03f4dbcb08a423d830db04f30fc9b924bb4cef4c4c6888a5da91c32b527cd63294bcb5c3664a39a353ed119e18fb286c3ac987f12c1dbb8f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515e14ae45a576c32f630938fae3b948f
SHA13a303a1e7862e90efd35070578741cf16a5dc2fe
SHA2568b4d8520e8c5dd01176c0b5a07686b0d3001b7809b7f139240e28ace5895c965
SHA512f9a8f34e311c7252aea21ac73d7ab77c89367f568f0c082e8c21aac50dc0728130cfedc58116c35febc873d506198d53cf53c8be97e4f546a5550978fc6bb121
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dc60147356eb88a21cce6c2e72ae9f5
SHA1a771f2a37ede2faff7b5f7892905c5e19507973e
SHA25640a2fa733bab2cd2fc7c7a6dffce211ba4aed9bb93f808d8e90b5d9bd2923b86
SHA512ca91c305c90ddea04cb9ad11e629a99edf049143a21f4ae06435d4d3f17990fb0cf1978fd707b130cdf3e75878bdfe47a1b0ec0f90fdbf023640de9ff07e26e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c009fbb0b7cadfa2431bfd8ea20761ce
SHA1b43c600d97e25c60bad295d60388547080b818bf
SHA2567f76821d2ed8394f6d979a32799176cd7888f039b2a780df13ab3ea5798cc7e2
SHA512e58f66a60b6e352ec907a47ba22d2ce977f4cc5ac461405d9de60bf056d597e30d545a071d0d2179cb25ede463ab36383e5d950dcf2eed8202b964f19f75a957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b6765702b148ad26cd49f67948b0bbc
SHA11f343b82acd028a06ed4b2e6dd953fa67596edf3
SHA2566c314fa1ad8f8958088ac4e50ad0e51742da23aef6e8d910dd5b6ab4146f6e53
SHA5122faefb9542a75fb64e413ca5248aa05f0553ac6367d152707c20041d63a1a65076a0dcd93cb34a169e7f52f4768f825612efca291364995c4cf0fe6f4673c8fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e46e817de2a091b9132ea6cb32a1ae7
SHA1355686bc9f80cff7b1b3cebfa2a2efb9fc570fb6
SHA2569b5de529213d4cbaf5bb71637880a2eba7c454360a854c64b90a083974f3063f
SHA512de133a91a396b7941bc3557e58633d6220881cc4c105c0ba8262a412bf13943133c21831d85e4ca168f4ef584fedd359707baf33fcf83cb6350930b3e9dd6ef6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574e4b7e9262db975479c5fb879ee80ec
SHA18e131da2a2dfca374ad01b03b35759f9f30e6d85
SHA25600d0e78d67651295095e0aa37b842fd56f66b1c4377b4095d5e99a814fee347c
SHA51284467ccd692a17fa44d43c2c6e199f31543dc1a7fadee4434dda7551d1912133ceba185fd892e1e6f99f84639d5613a603a874793b432146dd13a6f6a0cc2396
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52108373b6cf776bd9f7b47b7b593a1f6
SHA175c751e7d6a222dbc1be7e7c7fade99d840e439f
SHA2569646ff4b96dfa0425b31bbc91354eb92a4259f1f7cf4813e39e71462b07a1f83
SHA512c64733c7138310ad50bb7786139d93f825616a39f10bb5483233cf137b8148cdef47b686d2af3098993b0f30a873db946c0bc40ec35f1acf2afa71280edb2839
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5914375905ff41ac45d8e50ae6c01c24c
SHA1defebe5dff0e11cd53392d5f1e9d418f6b609b4b
SHA2569fa8faef6c2e315a89c42af10c086c1c209b126c0204fc547e4263b3f20465d7
SHA5126bc55536434901a089ca1b6bee11857dfa8c069891dfe6afb7ab137cf30946da38ab905c5054da14e5dfe81839a424b25781a8b6535ae70ae877da4a3b216041
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e56da369ffd3a1f734ab7182c94edde9
SHA1bdf79677de8dbf28636ac55eeab39db54cfc7de3
SHA2562ec6dd3aa0761cbe9ead6c002f5aaee38614bf75d823ecdb6270ea7fd10c6e7c
SHA5127f7841854b1f537c92833911796dc57949a550596160524cb89951891454b8d85d75fcbc0556bdd9e96f5e9c3984522a6df79fbc21e2b906cff6c1eed341a85b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524fab5eb796e4182c1462cb4cf75efb7
SHA10617afae510f70587d7d4c8b3b4921da9fc7ba40
SHA2564560a69ccf6313411019a40a8939600527f77e3b49f41b41ba30161190109fca
SHA512072de5183e152d41b95342ca3b48c5503c432e31bcc7f40b017bcd36e2bd2cbe7f535b766fe58a2a2ac21b9f56a022eae38d57121a30c6a1a4ee3f6b9b3dfdae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52551a414e5c60b835ae52949e42be12f
SHA160c9ba8473a1e5b4500c21c2177d0c14ca9dd49b
SHA256b91f6b81457792abc3d0d1af2ab5258e83088507570bb7d0ad4773fecc4ec7a1
SHA51211c29890e6aadbcdd6499a12e70b72ff795a47fd2cb2bd9ab6bb6a64b6edd081c0143076c9479b7b0eafbb165fb4e47bf88334c5aba2fecfa03fea8b6efd4e19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5688872fd4966c59370dfd7d92c957cbd
SHA1cd2e7c401ae607ee4b1612c1975e76bbe8e960f1
SHA25606a94c01cabf92b24766e939f008b19511e715caea5281d79e20b8000ad82b4f
SHA51243728b3d11980b534bbef45797a1058a4f9311d72041fa08350078c326a3337a6c47670c70cba11670d9c27f5d99974b7a9a45b3d9fbbb378d8a9860e2bb221e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b