Analysis
-
max time kernel
147s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 09:06
Static task
static1
Behavioral task
behavioral1
Sample
736997f3e64d5f842f0062584dee2491_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
736997f3e64d5f842f0062584dee2491_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
736997f3e64d5f842f0062584dee2491_JaffaCakes118.html
-
Size
10KB
-
MD5
736997f3e64d5f842f0062584dee2491
-
SHA1
381d906720549d4877fb1a1288adb5868d1b3872
-
SHA256
4318adf868f08770d1efadc69c627f763517bb67cbce83d282e2023227a77bf8
-
SHA512
4a01228df84077a2fd120b7d07b6421e1b4a65e2565c67cda9685275cca088917fe593b1cd2bfc7e9281211fd7cb7a244dd104ccec22ad3e8974d4056190f1b3
-
SSDEEP
192:2VylIsr03Dg8k/w1wvqLkZuBG6rnrek3A01/6uBuLbdU8d:sylIcuDg/guuBG6rnrek3A0/6guLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428147262" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000c9fad328a990a3737711e9e5b8bcca53a27de31b77cf3ee493878fe0965b9eb9000000000e80000000020000200000002ec5aa36b8dc8c18aafcc4a9680d3d53762e9567be339dd1b90f15e85b3990ef20000000d70de4f5f7d91b0fb49ed33d1b8f21733b993ee2abd224685c85eb6215a7d9e540000000d7361e82f727e09acc0b156ea68e8507f67b294e53c04b3f901cf50da2d876841530cfb4f20a7897c693728323788dca4f101616a8fca72d390c600c0017a0be iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C0E33AB1-4B2F-11EF-AD83-5E6560CBCC6E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 704ce4c03cdfda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2440 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2440 iexplore.exe 2440 iexplore.exe 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2408 2440 iexplore.exe 30 PID 2440 wrote to memory of 2408 2440 iexplore.exe 30 PID 2440 wrote to memory of 2408 2440 iexplore.exe 30 PID 2440 wrote to memory of 2408 2440 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\736997f3e64d5f842f0062584dee2491_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2440 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537195af6accce901dd892f1076a125e1
SHA11c0e5c177731dfb9db1116b4e80ac86713774faf
SHA256827e74a485a8a722aaa05295e697538b66eb2c8fd45d21301be49c35c400a029
SHA5120b25163184febd3c01ce5a2c566a466f203e3a1df79336a321d953d03c81f66228a84cac2d69fd7ffee5b1bd098b204d2b5f67f3194a484113fcea42ae6f572d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577081e8991c5f92b1fb0ea8fd6bec8db
SHA102922329a081fac6fba8d8e7062d7d70ea939fb8
SHA25642f6b5ef6f39220d786d2fb0c2b984824a21447079c2c3ed463003805226a59d
SHA51284f0c9a89b8d5ba8bf4e0caba125fb06a8ec31b685c4389c63a6b8f678e06a2c4118400005b2fdb2e1cf4d2b22ae325cc4b089d2098893f0ade4bbb2a94d650f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548611240dd0406a2e30e530a9a011874
SHA154ef5e4f7b649bec4e6e88688f6bc4f0df83a964
SHA25672cfdbf48c2984b682541cf16485583faa5d15b0bca75175ff1d7e3d3566eb5b
SHA512b389eabc8a2c4b8d6e5c6cd4874f22716ab77e876dd7806754bc891f94a966d908b3e132b743945cc750be9fc7632d5c0f10e1c536de02b1a35f28d4ae6cea74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc3e5ec0d8d1311493fc4669650a5d53
SHA1d8637a4ec324113b6dd0b532b4bcc6e1aaaf7c53
SHA256547b33b6023d47bd026aedd595f2ac8e9aff17fdfc960823e9bf9f2ab14d73aa
SHA5128daab6500636ba5c777930b8c8413f5570b20101764a60256be3f8d68c2f840ccd5455ee67a4d336f6147168f5b215e281494279c244998c3c4f79b0a984b43b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521b2bd12a9ac8613d55858ed14dcfecf
SHA121715e2f0d644350bdcb052e1671146db99e63ad
SHA2569d3afb7666053ba37cd01d2a5ec0bda1797af28eac5f2e9cff93ebdba61fa090
SHA512f4a08c05f07f4b3010a859d44e770e68e63a850c7747165d4278f8e3c4ea6a02ea75fa11c03c5b63901d95b4e2d89a51eccd558702f92eeb9b166c5b297ad314
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c2654d91b87c47b76d0d48a03eeaa22
SHA16c2e92ce4abcb1f41acfda57b1e88ad729488a65
SHA25638ed930756808cc7ac15b7d0bbead2649f28c9bab6ad9d0c95ce9486cda924e1
SHA512097fb11ab6d33994a876e26bd60f0545cff52d137f9ae57b709e90c42962b6ce63dee90e4c14c0a68141607ec07abcbb68103af2f8cd67a7edb96ffafabf84e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d6ef2e810b251774f500db916c31c21
SHA1f475f3f1919ff3144a80e1d35a3ca00f2bc13171
SHA2560fb243b5fe409b7521d49d5b3b2af174af5e5dde11d36673133cd7635744f9cb
SHA5121ad8e3747e39cfc79ace92f478d172c55c268e3112eb13bf7d77d6fd3e70f3bcabfe6eeb36432721f653ae4dc43349578642b0a631ca7c1d9b5e4be81739e7b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5596658c61c9b361f638b8bc5f0c6edfd
SHA1d6712d9273cff73b6e039f9eab20e0957c5285b1
SHA256c47f4012315e56fc7cb696224cb15d1191c778be0608cf560c55c6e0cfe10b92
SHA512e6e7903c70401897f819e2bbe8918a39ae11ad1a25234ffff982412f31339b8677a62bc6810ad3f9be23436f10091a46fc62aff3bc91f33f80af8fca97221a4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4edc192e2cfdf45f041af47d6f785da
SHA12c2bde37bb0095fe912368186264e0e450439ffa
SHA256520f8de348d6c67646f796815fb36f922e84bca3ef558bddcad4602019dfee7e
SHA512f70532b4647e6613d0294e4897085bf0f3a748f4f457f52e362fbcc7ab684926dcaaa0ee2c1b2792859fb39e3091fe9deb2d355e87d006d1b351e1196f156ca3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593a7077107092d07bf69792ef93221a4
SHA1313b8c2506b485c5e013f58a5cdd38e486bc4799
SHA2565316f3c127067d859d9e1851de437cbe92b30413f9b5e04187b40bb12d0e1cfa
SHA5123f36cfe5e0ecf9149466fb51485beca5ce9d2aaaec206d81e462df39426977c5d6ea660ed3bec7f66282c27a9aeea2e86a07bb04f6c21754d2f65ac324e087c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb8d33efdeed22419e159816f0523ede
SHA1fce9fc498ce13e43d028af9aad7b8ba7b71b3951
SHA2562b4ed6214ec84aadebfcb260000ad1d0d810f81326304c1e4ffa7f09498671fb
SHA512a8dbeb1de23015c8c3b5eaef19b8140c497d5b2507040010d0c3876600fe9025759157e053e280635cc1016f375805656c825d17b5e48c3fe416ed5b03adaaf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebfbd1f61b2eae7ba12408f5fe4d061a
SHA10d71643864b0a3253b35b124f63b5bff258b2242
SHA2569cb534faad0a4b3eaa30926506c822911b680ac9c6dfa657251e9a56a42c547b
SHA512debe64a6ee115884623a5ed21963298a2d1708b1e293bd3e0a0c35761ec67cf1ca4c8520ff2c4eeb7aa8b31f25d1c365973111ed4c3eac43beba15998e1d6254
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51102b6c0b45089de4c47357bba0a7e48
SHA137359d8846c09a9dfcceb8dbdbe756e2b376e675
SHA2563f743f0502e44ec9397e71192f7f8ff71bc94a79110aba10122349c2c07306a9
SHA512fd4422ae49c86f65b3d116505196db1be1c93826dc0b735f71522398b63b96ea8a3ea920eec0a613125093ae749eabfca9d01a9c525daeffaaee8e54db01683d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aeb2796123f0dfbe221d7e6040c75505
SHA1230fdc138f0462e3904ffd24676bc5d43811db6f
SHA25639e9a76296cfa36d0c9d536f3af5f68e774de3dc4e88af0f7d2099f598e9c4de
SHA51244381d950bf1f420397af3f02a474b1fa4029e94e9b3abaa948dc00771b363e3a4db5b6e2ed3cce26c4293a639c4d49b105c6d0bbb2d9257d326b7ba4452116f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565a0b91c404b83f853a924892579e9ae
SHA1458cb6a9ff8a43a23745773641326c1a95d1d9c2
SHA256aac338f3efb580997902daae13536339b5e9391925cb3e2e18563fe94d5e7731
SHA5120357a97eca7e72b008be0661a3eb1c0d558a5b97d832f6e500442ceac7d953cdaf4a2524da2cc8039daac460a350f6a167b43e593bb1e1d81747090e5859630e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5748e3d0f491308344292e63e6624c80f
SHA1d5aaf458d921ad7af92401285e313cff5301aa4e
SHA256df98b1e578ab8238e80498669d59a25d7672e9f2cffdf6d99c85451c1e55bca1
SHA51213033079be4d4b9ab1eb45012b5548363d4a126a6771ef4eecac02ebfe91f95047a9960e72b0497f21738d567c0d745208a5c9efb7bc2e0d775794e415ef52cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5266fea1e212e07caeb87f166ed2384dc
SHA1290e5e015295dee846b1e6e0fe89520c2a7ed4bd
SHA256edc1f30358c3f73662757b402ecdaaf13192b933485099c64c08edb692587826
SHA512788e4373b9b0aa9352ade1ca7d79aadde0af3a86a4472a244155589174f1cfa32c5ac08e28097f0607f5dc8c741abb0c0f7602c6f52795ed3ed62ca8e1a6dbe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582335f6dc9dc56e2d1875cf0d515d688
SHA1d4c9cad4c7075fffb2d65155eb10d884c7df86f0
SHA2565763613c547c333c4c8eef2b0ee59977fbd7412355b28eaca5307fcdb68c74d7
SHA512520df09727f25888b6f6ec7cbdf4f60b085ecc1f5a9fefc16b4431fb31cf1314e305fa564fb57c28b2e8503525075d0c97c16a5d090c96328d9ca7066ef129ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537caf1be3e887e797c8681c461d22f91
SHA1dfeb70e2595d014fabb2bdd82044e5d6822698df
SHA256ec6f25e08710510c6175f5852cb6cd410c62d846f68d1abc971a0516f05f73b7
SHA512e6ef8b27cf781c3de9e1400c92851fa7c87730487d946157b1dace7dd88af62d4c125828e1c0c9db7662355e1696adb734688c82fae48e2312c940f6cf1e3b7b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b