Analysis
-
max time kernel
134s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 08:12
Static task
static1
Behavioral task
behavioral1
Sample
733f8a7dc6a0835dbb423a2fa46a6974_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
733f8a7dc6a0835dbb423a2fa46a6974_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
733f8a7dc6a0835dbb423a2fa46a6974_JaffaCakes118.html
-
Size
15KB
-
MD5
733f8a7dc6a0835dbb423a2fa46a6974
-
SHA1
97d06819c8a989bcae7f401471afdfd87da331df
-
SHA256
0b8a12732b2f74f6fd453f21f6d4ce25901a75965db696a39f54a7ef33c3b791
-
SHA512
8282d4a1427cefa87944352fad8200f12c09aef279833de7077661d61472a0ab76a22efe2ca4b77895e902765679e8b4d883b223f336745790e45f0fb1349af3
-
SSDEEP
384:FLHf02Reos7BDQFTSeBjwORG8LVK4mKPYhoQ:K2RPkBDQwujwYdQCe
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428143820" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BD46FAC1-4B27-11EF-B9AB-7EBFE1D0DDB4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000d5c0297409639654484e1da4170e3d66010b126d744b21d513986dded4cfa9a8000000000e80000000020000200000006e3e166c30759169b30144eedf2d5e118262c3f6de7939bd37e1ebf8372cc2ba20000000d5b3767bb0f7fd99146b96d0e0428c2cb071d0d31132c5723a333b2695c6007d40000000357cc8ced4bb96dd3c172b129da2fbea44dcd52784f1cc010cbb912dc88aa7b0d03de1fc78b2f27f163a7ce21daee964380e26c19e7d62878bfa8d70d630f3bf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000c6c1c6cba516a5888be2061421390c2d4ae4d2a30480a85258196f0a35307589000000000e8000000002000020000000e16de3844c9fb6c3e77e936bfbc762f4f066beac377a290007fb17301d01f71e900000004a1b3ca16f0308436599090d8e5789a9e541e7258c4adedffc108255f3641388de84e08ffdb48586bebae56444e79fbf14c4406c7ee24958a1e6d9d962c9de693eee4058a217aac81c7d31c577a347e7d27cad63aa3b7709394082980b5192a6193d3e602fa65b56ce4052c3e3d7308f08360cc77afdb384936231793e714f933282b60587e2bc996d3f60dc80ecc487400000000849fded8d1ecbf42a10b21766f5d921f9ae8dab1313f2e963db1c0296daf45c6ca566cd5bacd1050733da4406872e1d79a9053d6e40effd29d91d898d5485c0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5065588434dfda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1908 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1908 iexplore.exe 1908 iexplore.exe 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1908 wrote to memory of 2320 1908 iexplore.exe 30 PID 1908 wrote to memory of 2320 1908 iexplore.exe 30 PID 1908 wrote to memory of 2320 1908 iexplore.exe 30 PID 1908 wrote to memory of 2320 1908 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\733f8a7dc6a0835dbb423a2fa46a6974_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1908 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507f32e566c8dc7df550c37fb0cccac73
SHA1b9e6eb6ed6dd68f01fa422c73b4fd20c202d3cbb
SHA25610c8f8fa04cdbc15d7aaeca6531684750b485ca59f492700f08837a66e3e04e6
SHA5129506e1aa2053c5c8301fd8937063f21a0a488bb4cfb20975062f2ed548414920a9971159b376b14acd829049bd7e5e6ce7206477dfa244d6da0f742ef8361f7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573c11665aa754c35bf5af8dd6b9f4fe8
SHA163767e06f2e5681e1184fe0ed902316374d9049b
SHA256c627ecdd61ff3f24d556db50c70a07e9edd9cf88a59ac39d99aa5723e0de2a37
SHA512ffcb90387de7f0dc4c231c915e2960757e9059c80f3b9e9968fe918fb859dc9d567f1a4701a93b4a8f16400133e77cf17f38b9df046440984a9ab57e06c52fd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526b88daa28a5c6b47c1dd9195cc5df73
SHA11c8bc07abd988d8e9be88e40f9630c72e1b373ef
SHA2564375bce7089a5464f9152e9c328dcff7770bd4b838a50dbd70b5d24e6a5e8d7c
SHA512a237e3eb36f2fe45dd48337c37828e2ec7a9d17224f7b7877f9e3a46bd97801d618fa1fab5d77ed9353fd9602c16083a0475747cbf5dce1ca1800ef919eec9be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e78a2c31537e0f027a7e01010028ee6
SHA121a32335e4b5156bfcfa02dbc1608dd1e7508f72
SHA256c4cafd8ac841c67f5dc11059becec6ef1c00e3e4d1d0c7e3fa46e955dcfb5d34
SHA512b29a4e2cb6d907ac518388f3c0930abe50ad05abf441e0918c996ea689d017b2d5cbe7f9f0e288ce6b218d902b35ad7680e6f4dbffc6395fcd6b637caffa633c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59af88ac99def959a79f0c1b6194ae204
SHA1578dd6736f590f211e9f8463ebe8d16ef329cd4e
SHA256267ec20b396537aa30253765d4191e87b4f3c997c66b85ae1dd2c429f2c688e2
SHA51209c6f4b1e38568df11e248548b721414aacf22a2e00eb2bcca901f3627f34de76ae6a74c285eff3cf10e4f17c57541f08ff1bb13ebc525a502570d4853aee9af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e957943662bf9ad608f0b8369581666
SHA12fddcce4580a05d2c1ad12f507a920f9f2cf237d
SHA2566e565343d6caeb3aefb9826a4cad4b281ac7353b5f4370fa24fad7f0c9f2ce2b
SHA51218bb031b8059708dba180161af6ebab2f232ebb07996326ccbd9d9876bb14ac60cf0846ade697cf32545d3a409fd2d4ad281ca6257bc567e74db909f94ef0f3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d288fe2ef2359768414631e0e19f0ca
SHA168e934f2ec6c1dd9ef0fc75929234b13e909e318
SHA256c528efac87173671d1399278bca173a593e960706b71a692c48133ba92799a6d
SHA512953beb46992273cc1d9e32bd3475a180db2c47069d10e564487a17a8023ff3554cb8150cd7834aa52e9de2b4c5f36768f9857a4c0ce29cedf94acd9ac3ce523f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebeedac0cf8046b67632a8b0d6b4d93d
SHA146464d1768d80481dbe7599bf78dd463920ab1d3
SHA2563ed4ac99af3f369b9f5bb3ffe13febc55000780e625f20ec30de31f9aa74bd58
SHA512283f66ee7246bd946da70ab5aed8340911f8b07389c119041de01e7ae050d7197e1888cb39cf092d951b33ab27e9fd2db00ed9cac727da2ebd48f0e934081670
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d10bb45a77f4831a64e8165495e3a5f0
SHA12d9a8ce5eb5b7c9491181eff726b6ce3f14e996b
SHA2568fa53899618c5420cbd9c1c0e2b009b27242103743d7333410b8be0817b1adaf
SHA512ab3d72729c248c955b881b45d1cf7a70908023a0f6d22185c17bca31c66a5dc0909f93aaf7f4836d9a2dc04528fd045261bde878d779433e22bc36c35b679b98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5205e4d79d839abff8ee534362d480a1f
SHA1c195f5451c7769f040ee996ebd3d7d90fe0c749c
SHA256f10cbe38afc0ba9a184719cc17aa2aed35e7e8bee64f6eeea2cbe4a33095d26f
SHA512fdb014d79ec3c0c6f4e58c50f2e435de024036462f87cdf92d4dce6c15c2ef6aa80cfff1e4b362c6eea28dd6cec5d676eb06d055619fe73e253d7e7ae8472b4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe6ef2675b0074258e11ffcd25782b52
SHA1bc69e3644f17cfe60f00c930277cec0d6735f0e5
SHA2561d1aa531086f8f9caa59f622fe32640f41a459d657bfc0f9a00655294b09ef43
SHA5123f43656a7b38a2ec30f620acaf89b494e47133ae35c463bcd629aee0b7da1ff21388d2739565f6a589770ed4452ed8f2d74be2067917ecc8edc34a5c2b21073c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfcab571dad32ea3825fad59ca248ee0
SHA14cb970c537385089702c4447541ea8fd49f3b249
SHA2566b2d73b35628adee1f1587044c6054559e63e3edb81ac1bde8bf4efc4fa8b9d8
SHA51239e5c106d81b7246f581195929d40c370c7e57a7ec8065bec2214ac26bfc40bc29583f819c8fd68f6724feb635b5be1c2940875e46de0e7ca355db987841acd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503aee0a41e83d76e492e3d23aaa0aaa2
SHA11bf8fc4e9e518ddfa817105587914ec48d4a96bc
SHA2560ffd6e6a1beda9af8700fd997ad9ee6b1105b220155665d987709113db8a5f61
SHA5127ec6e8015a9c6aee882d5a634da30eb196ec85beab25c8a80e342863401ab5f053b89d88a0d2e47706eb47837b104b50e6805c0f4fb3a4532127737cfbf77248
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f9e2c2937c22d03959d583ac2658ca7
SHA1a47d1e01a7dd6a63f139969e8f294ef4ccc88c38
SHA2565e402ef57cda7e5dbdd34f23bce47ec7dd1fe7d751ee8bf37456061234176012
SHA51279fb82725bf1e68bc978fdef3e018aaf8163bfd125ee6fbdd22466a0bc1f4c7ece67226dd5bfb6ea596da47c0180b926d17307f09ff2f84315af4cee8e7389ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f2e50acf3def3e4ab3e908ea9fcfa23
SHA1b6fd04d29ffc2fa13c9bd3ac4365ee6332c6dd49
SHA25698a33b76bc8e2b8f591cbf688c84e98f322497cbf882aa46ac5bd8f9c1bfb3c2
SHA512beb3822c0993b86fc10d69c71bc86d82d54bb92ad8fd81b3069af5b341c67a04efd24faf1bad1c68c39518fbec7a3e323f3be773ae5914983a7ac5f8eef33d89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e59ccdecba26e134c65261d497e10772
SHA19eaa6dbc375ae567ea86d36c29731be87f8ee97d
SHA256b682a751342a243ec8a26df578a2c67d52d12c72429ac6b2d6b71c7b87dad6c4
SHA512b5fcc6129cacaf2696b14836a6bac318966b03a4801ac1f1b9ac471e847148e040a6b8aa0b7df3405d856319bbd92fa3628ccec49bac8ee67ce8e8c3eddcf2de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0a3243cc98248c6f71034b38a17de01
SHA1e0ffeaaea60239bd827078803832c08ac8a1696d
SHA25698041986dcbcd3c551f9f49782e2930a2643f03520bd36fa17b18f2b8ab99fdc
SHA5121067b881e13f1ae700b684fed26a91c19fcd2790a8f99159f3d49c24b098a37f1e2c1abd4f6bd4d334342fa19976dcf2a8299e41957c84ea1137c424136b946a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b