Analysis
-
max time kernel
135s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 08:54
Static task
static1
Behavioral task
behavioral1
Sample
735f3be28d4edc8d1aabe3932897efb2_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
735f3be28d4edc8d1aabe3932897efb2_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
735f3be28d4edc8d1aabe3932897efb2_JaffaCakes118.html
-
Size
9KB
-
MD5
735f3be28d4edc8d1aabe3932897efb2
-
SHA1
3eced761b99881512d2fdfa735849f60aef619f5
-
SHA256
28945e03f27d352f9a4843d33269ed40735cd435b1fa757a349691b39012089e
-
SHA512
98ca53c3d097c13ac05157379af9ca2dbf30d87482220708fa3ceb42b8eaee0a473816844f9886c2d2af174e92bb6a7027c480393f19814d423c17491eee87b6
-
SSDEEP
96:uzVs+ux7lCLLY1k9o84d12ef7CSTUazfzx57FBcM/Nd/QeuupJxv+yUGyY+eCxYp:csz7lCAYS/wkjYFTXb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b03434183bdfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c000000000200000000001066000000010000200000009920070c00d8d5012c2899229c2403038ed7664ed309418afa6f014024c1d22a000000000e800000000200002000000010674336e1a1cdafb6d0ac6d49fc4ab55b2a3b917a5fb6837092640644682e1d20000000923faceab92aed56707fcd874d97a372e8376c850c486b3a5e7d1d0d770cf16440000000fa142bfa0cb854605cad50f889a897dab256631acf529b7dc8f5ef26aa8695827a5ecb99d90b224040fdcbccd9ae99d83ae1eed671f61f3dee785377d11c5142 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428146620" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{41A175B1-4B2E-11EF-90D6-5AE8573B0ABD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2352 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2352 iexplore.exe 2352 iexplore.exe 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2336 2352 iexplore.exe 31 PID 2352 wrote to memory of 2336 2352 iexplore.exe 31 PID 2352 wrote to memory of 2336 2352 iexplore.exe 31 PID 2352 wrote to memory of 2336 2352 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\735f3be28d4edc8d1aabe3932897efb2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2352 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5febff096f68a9d21f6acf2399439ef13
SHA1da570fca72ef53830cc61ff26f21b715e2098fa6
SHA256e2b9122a30d88b637ddf20af70119e1e2b02f67a91529112ed995e151ae49d0e
SHA512c7559e844adb9e057579ab01caf63c1159d23536584d4503b0dc2bb034e87ebf27d2ca52e1736834c4fac18f2a95719fbb052e2783b8e8d0a948d683e15c271a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD588b0bf89eb04cfccc25cd1e283b6ddfe
SHA13efa1f11295d6649d566d637d3948d7e2f163001
SHA2569aec2b8cb8766cc91e5d114f04e7a33d7207e80ff1f2196d86f8f055b7e6e29b
SHA512ad0458c0e4495fe4d161bd5ce25fcc7d0db51f565e7b8ae4ce1cd441dbbbe0b6ae8c4da55056bf33cced1cf4c18b7615dea5caa91a4a7aa681a7b81268401271
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cf0311e3695f0404c4eb6f02899b817f
SHA1ceb402be24bcb4967c60e23b8ef17ff41aee2f10
SHA25604881cde91087e36566415869de4fb9247d64b05972b8db3eea1a966e4633b24
SHA5123743c633b812ce7773138e36dde7efe60e1e521f1282800c3241164e3bd089423c046a9243b35058fbbed7353d4a9a8b82b7b6f7ed394b932f1085215e731f5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59f9340e8d50a2ebe7ee8bb05d207cc63
SHA139fbf8b5a4b8bf5559faef0bbc5aa9b7f66ca3f9
SHA256522d077cc327b7730906f7a7fe06e2c403da8d76476815ce23f9ca3e46135418
SHA5128af4affcc0802d45114d10dd2e685a86461920e4c6571de19e42e50b7f25edeb4fdebd57832586ef022a1ad1bcd36d4764b9a8a1195f4ce11acc1a4e8ddb4442
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD575051a26a1f270625d6b18e9bba6501c
SHA148b6d058f11cdffd0ef8b0cb84ce431fa225bd59
SHA256545650eeb2eb800ca1458ce28e07887a46d30ae0b866d5ad73fda846edf28ec2
SHA512f2db9380fcc68a6fdef40a474eee7c7e4126b92031125c531be91d1af50f6e46a776d59a9718f966030d4def4c1a2f27a18ea7c349c59da635ace7379105b33c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d665d43592f6368c1d04e0cc5b433c83
SHA1da2f3c07a94b9a9a19951971bb0498b4bc6b2391
SHA256c593ab050fce6cdfdce0babfa9e1b897953b7fdf2765f97072048deabb38b4bb
SHA5121ddd6adda41579fc4727e5f55d862c136263e27f0a743e194c043a27698c5c7f4f0fd4c41c48896b591e0c4d981128fd756bdeb5f9ee13f4af599a300c5552a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD589eb6199a921152919a886a741152e09
SHA1248ffb79c875fcff4d249195935d2776c5deaf50
SHA256b07f7ceae68eac5a5e21c4765c9859b5461d8fadc93ac39f59b288d82ee62faa
SHA512041dec212c8ceb8a6671f9f450665a90a067b52f078e4bc1044d8356800d8bbe79682ebd33e723098baf6e8449f076d0d9e5da21e5f51d80edc8384d68d86ad5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ea0d1120872d9feb1d0888e5fd9ba075
SHA1d4000c10c6b865511f48f40531a868fca6e65e4c
SHA256db466176e40c42ce7f5d34e950eff9b1276e9ebf52b7f03bab46375b9d8c7f69
SHA512ec4120cfa9eaf387f6736abfb01230bf5c7c713df41cce566a00101666c4ead84009ebf7437d394ed4cd6dac54b86755d749c0fccad0366480c42e08c5b0494d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b7332d9940008d22079612a79cb9a1fd
SHA1cede4866d7938e358dc4bc1e4912211031ee77c0
SHA2564aa681a9d90fdeb69bb0fc6f35b02a1cd2a8feb85deace3c424d7baa06f73913
SHA512aee2c9cdbf791e277cbc56603734244cd45fdddb97f9e1bf2a5c48c61162fc254f36af09296a4b68dd3a64b4fee191eb6e8d643b5050e7ef498eb3e21c51395a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52b99a3c82a59bfec3b3bfe9f993d8abd
SHA1a65e0f6a8c4b00e66a3f623d9aee10d64c4fb2cb
SHA2563aef5ede39fb5a2bde363b7b09829b78f47d0a63f7a5fe4b478b9547dd2240d5
SHA512363a87a0c3aedad0465f4cacc7d83694ee6c91f02f14ce5f9b9c192b5ab42c8cdd6b98842d8cd9d330e802a403bd90e396c2e7b5da0128c6d2a74eb113c35594
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b417a0fb0844ce6afb41b8788d4e1540
SHA185bae5629b846a9c00924e7692947115a8e6be3b
SHA2560558de21111a917571f7eb4021ac89e4d8f27ead6327f88c3e61397e52f5a15b
SHA51228448138fe991a0efa5e69e0fc95e8cea1c417b4f60b624cb045dded66fa4abe9591404b936e627248151eb3bcc93e4dac8f473fc6b049bd74d8b548a183b6f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5329734d51479373e7cf58a668a1e14b7
SHA1fe77f535deff73aa10e41823cdd7455ac5eff658
SHA256bb4653f9c8c1940bb928d5f4a0755611af69629740e6cc9c057272593cf13509
SHA512adab3d4253e3e740ca420c6b642d0f306de66ac30a8c8d132a207b8fff0977d3929c5268289743d6398b96b85789da50667a04c9b1e2cd6b632da5eec587f56a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f804a0e0e021696eb405546ac7b4e2e5
SHA1e010ecc4db1c5cf7dd8a3b6e55afa9851db3af27
SHA256ce36c02b78e97ce81bcbe20083b831fe94d1ffba150fe21b7c5a8fa51bc04886
SHA5123a87590bec9123fe0b18b0de5b8ee6df7203fccb8959b1ef493d8e317a45ad6dd75a258ea90e38ba631dbe48f3fc626252d2b55b1e9a6c3d90cf898af38f142d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD552729dd40bc66934e056fa4fc02644a2
SHA17aed1b2d117e595cbb3b8451cf26e441783ec060
SHA256e3b8812867be30c61bbcdaa6942f52fcbe240dc18102e37a0f9a196785789fe2
SHA512aec143f68a18e875271644043d57cc3e489858aecb13e6a8dd6af8ec511994066f14f58f5855fac5f94de8ae040ec5fe93a4fb7b8af5054a0c722d90d6bdc4e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ce920b4fa8a0b50d7ffc9511d2a9125d
SHA122f28b5d0dbf5be2c3ea905d90d9bd5f13911c4a
SHA256706d3c809e95c1f31250fcc66ac84a32e37b3d70c9bacfa67fba3423efa7301e
SHA51222e07404613dd03a2b8212f639c299dd4e4c313c167a32c37cb0d1bebdac209e8492efa1fe23c3d51210e79fc0fd24618a55d61695ee2cecd5c5337964a42503
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ef1047fa6b4648ffdbbbe5e87fb4f3c5
SHA12946798fe83979ad8a8b06a77b6655ae5549e512
SHA256b8919126366b867035063682f060f8a4ad8d57a915aa3e9904219e9396c5c9ff
SHA512e3f8e37cc30634397d5d142616a8242b566376d788faf852c736301a67f43369a21bc7ee90fc52e5234c69192fa5ee095237843a3735396c1dc5ce98b9ddbdb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fb123f957a051b22dc00821d0818a4f7
SHA1687e76dabe05a6797e128b5d3d3221166844686a
SHA2561adbca09cd1a31616c351a8dfa9fa0359019eecfa00d955e1426f0f62fd1fdec
SHA5129c3422687d6eb2e09b74a5f5f16064d72d9f8077df94a55a6b209eed114f02953cced85577f0c447c86c2f7104d4812a9a4e96ffcfd5b717cf8152705888702a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bdc258506a439d0f1832c9450badbf3d
SHA11416f088def7b4ca42b0a3defaacca6a8c9add11
SHA2564e32d295d6a472c6880a49b632a716282a9440040d485c6f634f56f4d583fafb
SHA51291dc451d6191b9ca7948ed59765ffab7ceeaaaf29954fd31d60bbc8361d5e6861d43577ffeb395a54fb13231c9275fe72cfb651d107aee7c4717b95649ea4d70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52c8aa34d916b9dd6ba4edf7527f80b0b
SHA1e277957a9d62f241d4e83a264585583586365b9f
SHA25679b3b4a7b9f7d7c197e7617c07cafed095e3e0d6723cee1efee74a0469edb15c
SHA51222153a589e014e35056a33a0d14f199d4aeb2506dd629166ef24ce4e539cbd7241d90173982afa4932ec368abfe040a4fd175835d25bda9dd920f9a57c06f322
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b