Analysis
-
max time kernel
69s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 04:09
Static task
static1
Behavioral task
behavioral1
Sample
728863c341497bde1739af536743e72c_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
728863c341497bde1739af536743e72c_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
728863c341497bde1739af536743e72c_JaffaCakes118.html
-
Size
27KB
-
MD5
728863c341497bde1739af536743e72c
-
SHA1
d99fa224c7264fd405eed91511105dadc0ed3fdc
-
SHA256
0e39e132a90abefb3b90e0222962229ea0ea3a453c51189a739cb524450791dd
-
SHA512
57a3902c3fd6a3b752541c2a06d60a460ad9997c4dd1d18f41c03f0a3d368c87302c626b2c931e116c8e2f173eb272cbe2d0ec96079b4b87dc6219543e722e8b
-
SSDEEP
384:SIZIj97alBrzPczeCH24CPQy5USrMNWvgmjDLqf6UTJkbJ9QAJ9P0C:SvjglOLDQQy5B
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000003dd6478574aab7c7d5d0aa15af626f4b2ea8cb92ce34a73a2c10ee6244abdb2b000000000e8000000002000020000000389f524a7a4bd8c333e63371caa8bacf0e079f68d240e9d65a41d278ebee23f820000000f5cc876c8efee354aa0fe947c820fe6fb4d99f483ae0b0b58994020d7eaad155400000009ff40eb7b7192ed9ef020035c5b6211ef7faa28284250dca7ea6310ea34bc2f9bb0c7bd88c8006dd7f5bb718be21bd561a23291d7a6f9d62efd3cf1a548398e9 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428130325" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{50700961-4B08-11EF-81BB-526249468C57} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9039e02515dfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2388 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2388 iexplore.exe 2388 iexplore.exe 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2356 2388 iexplore.exe 29 PID 2388 wrote to memory of 2356 2388 iexplore.exe 29 PID 2388 wrote to memory of 2356 2388 iexplore.exe 29 PID 2388 wrote to memory of 2356 2388 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\728863c341497bde1739af536743e72c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2388 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5828e21b891da9219ab0561f4a97105ef
SHA1c02476e805c7b17d2aba816b7e4d28d1704e0776
SHA2560c6781158e8c79915ded4348dccc2b795d3e5082286514b5fd6922d8914fba2f
SHA512dfaa51d1cc5c286532ad3c6900dabb8bf3bbc5d5dc39ee227955b8dfe81bc2137449726847f0ebcf30b315d939c1177c1a392b627c59264a168ec83775bb4b5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53805dbe2de2f9ec33a6d1c0010927cb4
SHA187860ad913550dafbe8bd8f617977007fc3c0909
SHA2561192f1334c0f174439c79a6db2d2ef44bd3b661bbaee78dabd149d41021dc603
SHA5127a054961c3dc48c56f58dd392d4caf2fffac45ffca9146ad911dd4ab7ae620cb10319ecb814ceaa0d0878b6f4ce25baa1b8171f871ad50ff1087662b67a3936a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d416d87ca91c0852717b8a884d51a40c
SHA1bbe51008217dfc6657b93bbf2278b38225d18886
SHA25635d0b45113a31204d1a5d90785973ee546dc074877c85e7a3b1f7a30defe651d
SHA5129ec1fa50476dffd0580d4a5a39f65920a2eba7157773de150973b5f1ae9618c93e959092150a444fb6fe4def7887693aee13aab0c6fbc4d5c98adbca882c6f5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d438f0ad1e529cdf13653cfc979a7549
SHA1abe8925fca572fce023557ee8e6611647094426a
SHA25668eb265ae304dfcd132de1c17605b1f49aecc14bb343f9f52b11c573aa8b4de9
SHA512ae83d77d07b9bbd797955dd4af58f6416763ffccc4d1f88322b2a7f37ba1a92fe98e029d3f972cb092dec86a1c7c8f6335e677b55f2f1e484960f858b7eb68d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582c3a7a065f86ac5436ab09a6f2aa041
SHA1f741dfdfb0520d47370980c4ad72223ddc364bc5
SHA256ec5bbe3dfab16e3ca4448bfcb6a83af1527342a87708faa489d59b9429eba645
SHA5124f39d9887f9f656031ec8dc6c98780d6355e57dfc0095cd3b355ce9e36a8f3d81a9296de53db701433db98d79ed630cabfe0afc56d868d56f442ba5fbd0cd151
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a878aac587a9736a4f3fae3fc996a3ea
SHA1058060c9ff64964ee1aa3fd39d0c99a2ffaea46e
SHA25679fd4fe8c7551cb37543f3f0f0ddad2146d1643badc05171f6fb5c494aac8e5b
SHA512810c1b66fedaa32737b501c46bcf41eecd57361b6e27e81c83f21966f8bed0afa1b4ded6739af0f7a5aca2eac7caea66f5ddcf45bcc9df719294fbc97a422f98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0b8d86cbd69fb6574b4399c1e834b93
SHA14337bf2cb16aaa41627adc0921e241f9a4d67cf6
SHA256552ae0c61180e7c01fff1aee1e06261ab3cd4c4ba7bd5b345d74783cb81f34de
SHA512ef665a69037f1a1b7196e90ecd2e5f2fec48dcada4b0f08fd1e704e4f71137076e3d4bb63bb57ed9368a922bcf2519722b6347441498bad805bd42f5e9238dbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a5401f0c8e00ac55a654bc7a5586b09
SHA17c267580f4c67deb784e17c17b6bb96ce091a84e
SHA2563aa845f9714d8530a68aa8f58f461b9ec606b5d401b3a243b1d9cb13851074ad
SHA5122b731d23af4ab11ab3cea1e4712de56dc6099370cb84affcd2c614eaed39e39610949a1ba3294915ce4d05af067ce88f8098d26a0c98d7561cb08fa95f6af6ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50057fdcfd53a0090480e351cdbfc9380
SHA11a4a2321c084ee6de32289da0447874d982c0a4a
SHA2566f5af213e793cd1a5255b0ba7bbf4e5ee9849aa0ba95c36b7d93d50213a59183
SHA512a2ea9b7e578702c9f13cf62716528386d932cef008b7a98f2d34aed4571dc89f3cd216fcbf90aa16f5e7d29f36803043bbf35fd687d2d8b27f961157872ed26a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd1eac51ddc9415452726211f109b3a6
SHA1e2101e0b7d39f173f56dabeb5d0b9f64c2e0e1d2
SHA256e5714602a84d8379a03209de7bc167006d820a58f28a3e64be7ed46e43c1cdc8
SHA512fcd2f67d88ff90cf945361ba8cba2559385f471aed27d28aeee5d76c669148c96280ca1004d1bf39e08a0afc1d6ab7bcc3ee1895bf05fcf89cc017a2939e75d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562a81aebcd4057758a9ed7ffca984a4e
SHA16a388352824b24d5ad41135c9fc91fd9e037e8bc
SHA25633f9bf0d259150f2c66598ce9e217c34f0d923511c18dc2e8da2a29d0b104f1b
SHA5128c8fdcebbb8f87985f6881a4efca3b6de16f89552b58cb1e4d3cfc9c13363daf345bd2c0b24c8105db18a6b11991d0058ee5d62ecde7ec9bb84a85fca12f1bdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1cfeebfbdd2b10e104a15108b7719b7
SHA1ecad20ea84646b6aa5a1f2e0f83e220053c526d3
SHA25609c584e7a27483eeccdaf9f8e0d22f50f52fbde802851f841c174b604d127bb2
SHA512d1317130edc449058de5f56145d2e1b18095d01881bf6456a309618ce0ba964654340a8ac6d6d1ef4de22337893fc1bcf42ff9c1f3ec744d0e21cf400cc56be8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cd9a3b06ef33e21066ffe4ea4d25d26
SHA1f64e7d1ca11d62196d0a906fb30254dd05e6867c
SHA2562b21a8063eee99282e5d8418a4d8f9f30eb8b058399a114b57c23623878b98e8
SHA5129c7eaa6b046333f8d1a310246b1ade10864d284951fd5aa45cab4ba6854be3d53185e4e60f740d6d0ce695fae390590e050657ab602237f3b44e19b44f02e31d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e1c806b3320fe712ca559c6cfc1108c
SHA1f0ef29656de355299c4b81afa8b5a457b756e35b
SHA256c4651e5257db355a2796f3f8445353f497556647026892f512e23b9e6226188d
SHA512cb9cf44795dc6f43e306bc7b9adfc84d830ed4bb2de99e19cc4b3d9e6297d2f8e4d9fce55aa1d2c423b5faeba66a72f40bd3d162345fabc34257be4339e0c56b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503bbd56f9bf150b0fd45b141aca6d1f7
SHA1eae05e8bb3448418749350fda024b4ba253f0812
SHA25660c043c4f54d30ea409d0d0f30e55a43a47f35a1e33e7a7c62a7ae5ddbb2b34e
SHA5125251a55b82bcb4ad35590d20179d36f152a5fc7c05616d0dd021f3b156a89d3d2c77c8af631d1e5032fe54672aff1c025790e4bcaabdf5e1667c75872493f200
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57219427dd285e7c4b8ed127525bbe960
SHA18abc2a0428bb9b8def8270b1758181884029ea5f
SHA2569340d5224a842be228a560a6400d5e7a8cd61626a2c20ef500c1911ff4bd6fe0
SHA5129bf8df1de00082c61ad88734032d6e37ea37f91645229b32e195a411ab61d8a07b09bbdf3e4d019bfa21833426ed265f0ffa7ebdc46924fd76527fb0f537d133
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3e864e562bdb87960f5bc1e80934512
SHA1053c1c125c5252ddebfa20ecb3028d02131ce002
SHA256c5e3c020baff15ccdb621ca9f25f510e469c19b89490d46b114d3c570514b8e6
SHA5123fb0cc250b3f1f37d5daac8e97ea678bbd1105a4c739955253198539a31d0ef6820897201726658217a5ffa58f7ce00d6d37ebda89a0f428064e70b7386a2bd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cb98eca25c4ab314f3aad34b77559e2
SHA1779739967cf5c535f15a1f356671e278bb4db84e
SHA25636223651fe8a3902e6ad44c91b9add517af43058156f7da034b06c913c4c4c00
SHA51253b09cde5a9d2bd5dbc75578544406a876d8f8d50e9e8295d2bc3c42006cd76c5ac25b844c13840097c31084f18d53ec3eabb760f76477cb691a078dd2edd2f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac31b2bae1fd17b3b30e90afa6728b7f
SHA15e4f55fc20acfd64b85cfbb245090ebe6a89da07
SHA256e4c881615589e3075dde7f1526b1b3709cb975a756c28ca8108ab43919869cd8
SHA512c091c91c8f35796e4c70c1e1b9b56238380c817d03bc11c9af8cc04429fe18345e61a805d33e030fb959c1258d050fadbc8f254975c2d7e709b70e3fa0275757
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b