Analysis
-
max time kernel
117s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 07:32
Static task
static1
Behavioral task
behavioral1
Sample
731f7f44a485c9af6eaa00a8545c106e_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
731f7f44a485c9af6eaa00a8545c106e_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
731f7f44a485c9af6eaa00a8545c106e_JaffaCakes118.html
-
Size
1KB
-
MD5
731f7f44a485c9af6eaa00a8545c106e
-
SHA1
01d9c846e759e6d4ddb5ca6f4958b8da287ab7cc
-
SHA256
cffd66300aeb3c8865cd04727dcbea69e1301c2f0797c5eac45bf2164855badb
-
SHA512
068836a2c9197312ba20d7bc3aa51850a81bd0bd701687bb72b6bf786c0d16b29a9e222dc89d79fb91be702ce667ae59d58b5bec9841fa10bb0cba4a12c9457a
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 602b19122edfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3C8B8051-4B21-11EF-861D-F64010A3169C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000bb190c407b48672e0ae0bfcf882895901cb005539beda20ee8cf23459c87aec6000000000e80000000020000200000005d623c4cf5336174522ba5f90975f4b7af5bbbcd3555489edf97d65aca580146200000002a0cd85c6df4e16e441a8447c7e5c6208715538220ab93fdb46aa92c6e4f1c0f40000000eaaa53db6ecad6f3e6089c2a7fe3b7b4b9771df04607503e94d020460ca5c8344c586656b956f5764a73fab2d306ee9a5c2a23b4ba97e1ddd226f7281db62af1 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428141027" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2688 iexplore.exe 2688 iexplore.exe 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2736 2688 iexplore.exe 30 PID 2688 wrote to memory of 2736 2688 iexplore.exe 30 PID 2688 wrote to memory of 2736 2688 iexplore.exe 30 PID 2688 wrote to memory of 2736 2688 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\731f7f44a485c9af6eaa00a8545c106e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2688 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520feb0ae00628f0b80befa2f83652726
SHA1925b5daea71da0366930f9be550f8805a869f01c
SHA256881a25f470ba575955d0a95c5766ce2fc4a91c850ff441fba386fa956f988b99
SHA5121413e4817f0ae7a76edf7aafd3e0ba5bdd1c4d2d0670a57b58e175e4cf6c73755a67ecff488d8ae41085c249d567a25e02ecef4c66560046de8c39e83b176bca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554b2f0c19972e230f7f46903ab9ba19a
SHA1c2a1183672ce4fc611ae9d3182603f3498230d0b
SHA256808c2e0a59ff7f0e57c977f9c905e825d72a2e31a280d6ba7ea21f4ecec474be
SHA51270b692ecdf8c442a02c3b2dd8adbc7a6efd934ecf26e382e2f54c90635351a2bdd72d69c339335818ce39e838a770f8bd141dd6c14b844ab1096706fea7c7a1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552846a9d819b1f697f992c89a77abc83
SHA10af0003f27ed9ca524ac8afb93ac544f072e7624
SHA25673b34f18cb0b9fe85d563b85027d48321b739423d330def4557b06a4e5db38b1
SHA512d78efaa0d7fd2a9615ef8abde598876b71093ffaec6373796e4d1e816949409e251a027d4f77ad804e00e9fafed7d6d66b07fb596132e7b587b93128f7a506eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53302f7be6afb8037006c7fa626e09aee
SHA19b08f806f400c7e699cec1d361e48cad5b708d6e
SHA2567288d03f3ae3254f6ff6b9ca531b6194fb37a6dbd17d417c8b97348161212623
SHA512cb039fd18345a7e8fa8aa40ff70f36e4e7eb73bb113d442d1d037ebd0e5607cf36f0aa9e81c30c82260117f0dd9e6e6e1f348fd67a313359bf30312a447398d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fd6cff9b3daa13c7bc9857922f66cba
SHA1dc5a1ada21877450a16570434c2fe26c928b176e
SHA256732a51550966d2e477feb2c4ff4800dd04deaba0f2b99db9acfa5a3987231a80
SHA51291cd2b76fb5b3e9cb1183a0cc8bd5518eb0d1dedaea4649198df13cc4e6523cf612ed88f5a9c624b77b1d03c34095c2ae8168e834e9cf50046f42e85cb59218b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1c72363d43f65a706483d9d1b09e6e1
SHA1bc5f96d61af3ddd977e91ab602d3c766bf839ef8
SHA256f5d5165495476954969c5cd75f6b245745ee70ef739e378a8be95e7abd57d69f
SHA5125ebf68c2abdb02aa6b8de9411a35af73f102f73b22f1b94a327e38b67f6ad3f4a1ec11c4e3a920303b22bed913c10b615f626c62671d5df7316f1ae9aea15fdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea0062acd1b385f7696a6951b0a09631
SHA10fe3dfa402ba2586d3c04c8c57d03bb2930cef8a
SHA256f18c423f8c829ae3181a453c31a2beb94dc483969f0ebf8486b6ff14d3fa8e54
SHA512f1763d5f54553be75adf730ff31e06abf5e8a4a0485e39f89c06439a764ec70ecb65b8a89ccffa55a96e96cd9c137d9fcf1b17f5a72ed598d4a1502cd59b3826
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50447a99eba4c938642d821cbaa8f3ca2
SHA1cb0613678e3025d3e54ed0ad6549902e89c14a47
SHA256ba61b970b3dc6cf4b24e243e19d4eb93a42d3e9417d6019218840489267f529f
SHA5121308badfff072d37fdbbe794792c2fd8afa8f57487c2e8fd7dd7b1e80a18d060adae5880b4ceb5415bdbbe1da2d47cabe3a8e27e847d667b9e69a7b0db70413b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536d98e9a36717afc0ecd3d8c51941796
SHA15f65b78fd0384f45656d1dc372f009398d01a824
SHA256e7143f048336b9e9d613ed72523ce317a23c71ad8033c8c21062353ad0312d61
SHA5123a1d6da9d254b490b6e08e2ad60e008189758e8152ea14050730d3a21c1f8a749a5c22cc13b7ddd9327685e2bebe4dbf9a0e19bd8027c8c90b0477d68879f37b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c49379ff0c242dd3a5d4c7f309539790
SHA16350fdf54854b18259da49a9eafc20f89decc80d
SHA2569d558ad035e4a8ce2ebb8b0868cf3d852e0f47b174471870fbc7ba1562b6f933
SHA5129e4a65f2651bcddb028c217d589c5c7c7a0b21bfce8cc18a4ad9c7a8616b9fb4c88634872d4a01e31908e5af2b17a78a2ed38b8b2b6b4414a1c2668e0c74bc34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ead229d81f4dbdcdeb467928fba482fe
SHA1c379be2e1c6686b9bd28d7a1c15f2a3ed912248e
SHA2560acad7c87c1c21ac9e9e1562e2e21180dfc249ce29c10cce4a8f0a9ea683daa6
SHA512eafc522f43d08c28d1dfe4240402b9c500230723b9c85c3424a393879aeeb2d9dcf6a5a7653fa83abee9b8b3ab90d83a23a066f4365b364c79e169b926d5ac09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596f093448db349fcb0dd141605376ddb
SHA1b4b087b58ef7c1048b361f9e5bd3b239b34e82ea
SHA256defab937c1b974109541d8086d8b9a86e8a76ca46e8f36faddd516ab1b014ae6
SHA512335ccd98f9f06498cab950f27791d5a401a1adb5a128e56df468bdaeb4ffcee01eca62f9ec30cc2eff0c318325fa263fbf33e443d8a8faf8026774f25d3dcccb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550625481ed0238bf354f2b7ff14b01af
SHA1b8a0bc3e6f86279091a7cd1de7c8a2b0bc27bd31
SHA256ae7f9a32364aaf2a574903f88999f86b516d0a34ed696a575321ff6b06bde8bd
SHA512234a3c65ea3330b4b2c533092f0ec435e1d04fc9f437613266086c523a6769b308b893ddca905af59841ceb9c1941df2a09c2aa236c70f3457cf8dd8d80b5d27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e41dda4a1db004644a6196ffcfc56b2f
SHA18dc0f3280f2ea45a8cbeeae6281ee34b4ee80878
SHA2568c09a10524947b7bd1603a114b818f22c78613289766c667ff839601e072f388
SHA51287761a58344e2105da90f84539ae8519cbeb464bd77d7c396f03adc6de756dde844b9365a199570d0b0a32c6b57a7b6990d132fb618f469001faec61c1259a57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f47b97b235c7533530c24d1679db7afd
SHA1cdedfc4b1bdbcc8df8bfbd709278469f0caed723
SHA2563e35f8b59a5fb424edadaad173b597bbf6cab86bb3fc150a6c2ec5db75964e27
SHA5128c4002fcbab585f755f2866b13d9132aac10434dffd4a716a477bbd03776efc8a7268a58a2027cf7cb43be08bd7073088f2401ba240da06bef79dd6d552c6f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b87f539fe57322c75825fd9f74b7ae70
SHA103a29e75167db93afb9b863aea8c81be4737edd6
SHA256ecdd7da80ec1f67be96b57bf282f22a2ae04881c204ea5b92979e599d13ba442
SHA5129abeef157c363ae8b43dcd1993af737f624969957d80e204de7d2e69cd7c63eb856870f9c17a5f480db64b47a4b3aa824c91873c738e88174d25d40a414bc391
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c8050eba7f8755dffbaa22d2fe05db6
SHA1aa267dd68a240e091d902689b51c5e966a5dd10c
SHA256ca6188b6fe5e31964e23241a3d44f2f9bc4d0a37c298f47e5bd194e835a5f4d0
SHA51249191816952e990bcc5a22d18ed5532e8b3682b2d43e40eea0f82e4367284827ab0f2dc4d45db206408c41bbe2c8dc31bd0b56d8f8690ac0781a1c931822d099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7368b9c780997fccacd2a8f34dee16c
SHA1b776f943dbfcf7d9e05a33eb7c4a2fee8416bee1
SHA256120282a685c9dad90970350f26d1f4ade5388935b2e767ceaa48b882c0c55374
SHA5129784b7a541c158276df90e57dd7602cc3d395d1e5ec352bfdd4bc6d1b2340485c0f2673f1006ae15a0be848a08c95d464e527e151c550acb1bf3d222102b837a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e3e4de40491da54fa411bb99504cbb7
SHA124ecd04188f55fedbd20f38887dc816c9b263e69
SHA256ba8879fdf742dfca01433b8d0be6919c5d1119a04fd1cad7feb373e6a751e448
SHA5129dcf79746fa3993de8dee61f1d95b3532b930106802db6d4f7afa39bbd3b8aca2ccf26cb7d5ffd2c6c38e8da3368cc9915e5b2edd31994935f0d9be505449387
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec24bc21319aff34329da45142c2a34f
SHA199c3d6fee1f6f5affda68b65fa95d49d8332d77f
SHA256b65522fce503f07addb34ae0494197f29d2f0d8b7c1b0b2f1b7241fbd17e4340
SHA51296d84f67dc6bdbce291682dbc8a4ceeeb4255abb9b63714fec33dc08468cc6b3cb71425d87cf1e120886ccefb17e438bda3a3b500ae07c66fdd529d8e4f9873f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b