Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 07:03
Static task
static1
Behavioral task
behavioral1
Sample
7308a176cb2fd40d7d58fb0479875949_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7308a176cb2fd40d7d58fb0479875949_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
7308a176cb2fd40d7d58fb0479875949_JaffaCakes118.html
-
Size
53KB
-
MD5
7308a176cb2fd40d7d58fb0479875949
-
SHA1
e0c7de4eda2192e23d4e4674fddc8e85e66e2eba
-
SHA256
96d9d2c38868f1764d010f659580414587adc2b8082ad915d814a0538fef31c7
-
SHA512
458ce3989900490f0d7767e1aed17870c6f88d70dfb5cb5076423c361276a4fadf07bcdce8b693d08cbd1f4a033ba2b4c81473a7f9a016f7e979122906a71cf6
-
SSDEEP
1536:CkgUiIakTqGivi+PyUvrunlYr63Nj+q5VyvR0w2AzTICbbzo8/t9M/dNwIUTDmDt:CkgUiIakTqGivi+PyUvrunlYr63Nj+q3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000e3c64256b819127b4c50d910947613e9c6a9a3e5abb6b303727f2b82964fe436000000000e80000000020000200000003c5f388bad1645ebff167fb8c8076e06553cc2b9f38e35d8ab14d8514bbfe3a520000000cd23c835177d792f8dcd76035b019cc6c734b89d4ffe014e3c1f7233570064f840000000b55ee26a306393f723047a48a5a504ba4c27fd27e09dc7845bcb10e465bdfa202df38182ef5f7f020159027066131141987332d9ad215f3bd65670d38783411c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0bcb40d2adfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428139298" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3695A3F1-4B1D-11EF-AA78-6205450442D7} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2548 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2548 iexplore.exe 2548 iexplore.exe 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2392 2548 iexplore.exe 30 PID 2548 wrote to memory of 2392 2548 iexplore.exe 30 PID 2548 wrote to memory of 2392 2548 iexplore.exe 30 PID 2548 wrote to memory of 2392 2548 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7308a176cb2fd40d7d58fb0479875949_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2548 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2ab382e21eb5e1c2d34314e875b9bd3
SHA18e4bb141149bbe49c6461d8e5e5ee7c11fb0b704
SHA256dfe37fd6caae0b45f6584e40cbc6ad70054a060dbe7394d6b178670ac56ee409
SHA512267ac1244827aec959c3d997640a8d9c2e4af78ca915e752ab250bf8be1e46c34dad3a1b06948abff7da76ae8d7f27ff8c480af7cfeef264edb3653385160c5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58da0d90407e916341b3d053065df88fa
SHA10318df63feff82880188199c893e1e132648d7d8
SHA2563e8ce6b7ef2eddbda1bcb27e7790214205a3a04e46f22cc5d1809e86391c7220
SHA5128b215b117f7da6e474b26bcc19a5c4c388d627edc4c8ae4563532066af0b7c1316ac49ba05406910e944ce0d5d3610c6dd461e20a05f02ce96343d5410de4788
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e99257060fe865872457180b981b1685
SHA139be93b33d60b0411c285d58ddb02dcea44a3b2e
SHA25662bf77bc766fe9e78fd031def94ba1832e9455d27a299ae5d157c09766ff74a5
SHA51228be11e10f5b379f41e93a0bcd766cb0d54678e375b2c84098fb438f249228d32998f61d699a191c7554ba0d66011deddf89ab080eff7a3626811f4c8568992a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cfbf282bcb74625cb7978a6c0433638
SHA123d289ac44fafaf85d353088c14d6420e4212eda
SHA256b68ea9ae3556b32a401cf1f2b7cdff61de93c645d6895096d77ad729a5cf159b
SHA5125502c50d99ac25c59d9ba30a8bb0e2e1f2bf1b1b5a823bdfaca8a862320434d75298116b7300e9677157b4c2d0eccb6aa43bad7852dfacceee7ddfcc3e866325
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bc1a7b35c15aec7c8e1c554e261235d
SHA1e8e5939493a3b0f6738320852f6841ede40bd141
SHA2562562709d29bf0b868b03a4f6d28dc6838b528c2735c4e2f9d13ca9afd7ed438a
SHA512b9842b43862c1f75af94d6215d1556c88c2ab81a47c4f25eaa059cbcc1a906f441305cde2a1613fbe5cc676c468a375277f60ad299c3b722f3ac89a2590a27e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e62a7d5c9487074cad4969319e404b1
SHA1785170352352d3bc658c1fc4fdade62848635a01
SHA256a876caff01603f58e2c8e36a574a1fd040997d3e72a08d2bf3c1c9e58617b853
SHA512ad438a5392e6769b903eb3e484420fa11b6e8c4a0f0fdded783554954a82459e797f84facff9363f657eb7cd7dc55d76beae3e3cf31da4d5f31ae3eb60a6bde2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c0f96433183d2ad55601b7401a05da7
SHA1265f153a61cab807041e69d8ab9c2fae30d32b4b
SHA25673f5738aa5029ccd999bcbef9ff653729ecae20e2a28efc855e4f64d580027e9
SHA512e0a80717ebe70ca9715bd0d25f9998ced37c81abf5af44b2ec362eb7fff01733556ed91db8e52b4d41a834215554d7b55acaebbde74e2759905770769e351af4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b3437232b8223f4750795be3e790f84
SHA10d2cffadb274c959652d40c43c6d1f971f671721
SHA2569f8fc30f3f3067095d7cfb1e858c2574af399b5664ae84f53638aefb34e2ca8a
SHA5120f97d9de718704169fdc40add80395675cf7742d2668db18e469bed7eee0f2cbf45ceba8442faef0474768ed37263dd918acc746d08a3e27b9ee98432d34f78f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f547ad70ec2f60431c5df1c532d8027
SHA151d268b8dd85aab031c7f7ffa51ab065bb93cd72
SHA25653198446f9b7197a35522edba47ba4c463f4e915451b01766815d7c22aa8215a
SHA5124be69a5be4d3d315220c89c88a71332eed22852003dc3a773d5fd98fa67501cbbbdef9772836c2c55abcd9b7f0573df04179736dbcd70adb3f57f6eddd35daaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ce278989a3a7f70078bbb6a407b0bfe
SHA1be0f3abfbfdfbcee0641d35bcfae4e640f7617f3
SHA256a5d9be2c2c8ba2b2af30fafd933e9473a9b0e28f9c880e6321b49c8c60ebf4a7
SHA5120c30ae9f516740a2928ef7800f56e222a6ffe0e293204bb48c86af81ac6c9df10c3ba87343ee6c2b0721b063cb962d85d86efaa63e92e27c07fd3cb5fc2895b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb5b656018102bb7f96eab13f30a23da
SHA179128bbeb2d2f9c624bd08a354b29f4950557dc5
SHA2562c4e087d565dfb48ec071b1343e5558d63fc71db64797c7363db983ba3d31670
SHA512c7a34a8daa96a226d4a880989157fd6bdedb7a546f289f367271de50a638342684f28d80baee83acb3c6719aee9c13092ccf26f930023030210041a86651d632
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f499ba84a3af2b541206da4e3e538251
SHA1041a8dd0720bf90098ec2cc97a0a55ebfb4ad8ba
SHA256f5f21c365c2002546281bee0cb468a9098eb7049da74cf82f915d06965afdd17
SHA512e023e75fef22b2bc53e383e62639fda7217d4a0c7880b94860aea1fc344b8b8f247e1174ceebf77943614ad076ca83d204ea164827744bb9e190a003261ad84d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f25a8aa588d2024ac0ff20b2811c668c
SHA13f791c9cd71be71878ffb3ebca6af5d7105b1e61
SHA25659d11efcb83fa2ef72c0ddd6f28f5bcc60014cb84981817af4e9746d4fde742a
SHA5125486bda1765618973a93aad6c07bdb62857c1ae540d972103b1347793d0913f85df55f1f13001d1a1fd8fe962a14f6018b66c144b3f117998927a2b78221c677
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d41fffe292f8d99311eddd2ad906357
SHA129a56faebbf4f91e0b9b8335689186fabd7e7c3d
SHA25693fd5ed5f8ccaf1a24effb6708d51844c17899b3e533d231ece07ef1a8b27b3a
SHA5123abbbd8724e77ae645639f7330b55e05d4de9bf68da97ce154cad000519450fb3ddeddb72b0c421a859ce828a4d02594788cc5d4edd9b48ac2147ffd555e589b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eef6cf31ae6a3af839cae5e19ab7f872
SHA15c5c358e1e650e2f99f9babd7676bacf8b3622a6
SHA2562f4d83ca649176b75d73f1bdc547379a286c972a98a484edf1052330c7863060
SHA512627c3bc0753e9268f129df881b5763ebb11d14c91cb97ad6a0eb6a5eae849ef79173ae20b2ea82360d1c05efc12472f7785156e797f7b810936122ce813f6fea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6cde7b2f608effcc195bbb53e660e44
SHA1bae203926dec39e3d9c83a439f0cea6a017378a4
SHA25603b3f48b41d62204f73a4c520175d3466a2d51cdb676ab3e4808fd3965227493
SHA51254b2fd5249ef0f42184e42027463c19e52d491f3f7cc7a9ae45e5ff7e607e0993a9e9b32008b52419b61b7b165587fae713d0482c1905834a5fe0c88a17d0451
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5493e8889fd6fa38f563f19eac4502255
SHA16f14e248baf9689efe052de3f2f1c628ac3715ba
SHA256b637f47798d0303c19152a7b709f609058487dc4e3f56533a899578e659c95a2
SHA5123013dd5b5e45886d0e630c65bb38512d2b33fe91ceeedbff89e0d638e1a64fb29020fc77cdd5244e3cff7781940c671aa523dd7f7cc41395350f9a58ec25ace0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de0c1803b7f998871508aa47deba9c14
SHA1720d7e649765085edb23d8f8c1ce8b493b5f9c70
SHA256985a50ad95d7fe6089358649efac95306a000946881c1fc81beb12f9967a741d
SHA5126d9653ed5160e35e282e4ebba028b89d3e768b9f9467ba460e5f7d110fca6c5c01be12980465b66a11bda38d777498c897b14db16b812f79386aeeba99666c59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558358f9be6c09da8e97d8590626b5f78
SHA12d86abe3c6425f536e54709f33ab92b88b9f7c69
SHA25616ab765f7250e237d68b035161dc70bd0321d46fc6bf17e12a82d0d80052a234
SHA512befad6358264ee1131c721f16185239e42660af37767846fa07d0b5aa7186feee78b44adf593f91c28f920712884acf500dde53f7501c3b0bb39c1e96bb3a182
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z2D3H3V6\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b