Analysis
-
max time kernel
137s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 08:56
Static task
static1
Behavioral task
behavioral1
Sample
7360fde5132f7f980cff3c1f31b97033_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7360fde5132f7f980cff3c1f31b97033_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
7360fde5132f7f980cff3c1f31b97033_JaffaCakes118.html
-
Size
19KB
-
MD5
7360fde5132f7f980cff3c1f31b97033
-
SHA1
ae7adf1f35704426ce1a9c1a6eeea077f4db3b00
-
SHA256
177a07b2200cd99d734d1edc970d63021775ca15d322cbb24612ea1fe8a7bdc5
-
SHA512
4d9a3267553cf24cc712f6074a9cf56f137a78d69d897c818b44e074388f203f3773a042255150c543a271e653a9bb16fe376fb94c58424f66975851b84a1cc3
-
SSDEEP
384:4+QfPFd9QZBC7mOdMwstKfpC5IgSnbmFe7AcVI64hLAPd:Zcd9QZBC7mOdMwtpC5I9nC4/Pd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00dcfd1a3bdfda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4405E2F1-4B2E-11EF-BDFF-5E6560CBCC6E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d99090000000002000000000010660000000100002000000000f3e4fb43c26f45ca918848d123cd18bf032e4db46e70210aab0c7b54ece698000000000e800000000200002000000037fcc09fd1a2a8c250cd93c887e934091910f4424b03eda5ad96041cbad09cc720000000465557a7a9835deada3971e6ae7519eaf7ec84a8ee4df94119226ebc9b56b654400000001ad72cbe51ccfee2311d87546e03427c4452430bf0684bdd4626c9d88a94e03f238311ac30dc8a8ce6b1c382abb43faa829e2e31ac14ca7fc784625989889e3a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428146623" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2324 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2324 iexplore.exe 2324 iexplore.exe 1120 IEXPLORE.EXE 1120 IEXPLORE.EXE 1120 IEXPLORE.EXE 1120 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 1120 2324 iexplore.exe 31 PID 2324 wrote to memory of 1120 2324 iexplore.exe 31 PID 2324 wrote to memory of 1120 2324 iexplore.exe 31 PID 2324 wrote to memory of 1120 2324 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7360fde5132f7f980cff3c1f31b97033_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2324 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b37e446acccfcbf68d7c58a0d7441309
SHA168d97f186a7d17fe869ef2e604c7c98c2a824207
SHA256af07ae2912b21e3b84f8cf382620cb94f35aa05b431bdef3c3c0b3ac282120be
SHA5125d3d77c48a25bc5f3ebd9d9a4139845c88f711c43691fd65ab4396953b236ef100df8fda6def396ac61939e733904287d3baed1cb8b8771d55f5914c7fbac094
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0a079cd4d0df6c4bc259a8581599b17
SHA1c7fceab0cfd9abc7e7dcf41b47d715bd0ee0008e
SHA25632f0b2f24bfe54af812f44541d4945eb3e2db41d689e40ded5ec3b2b5bad5f6c
SHA512105fd6c025c01b34e6761031ac0b40e6dc7f4fac6dc8adedc01af70b2050642f0c4b5c827459767ecd88b7ae62ddc229655063e7d87f9d70178fa4f2aee3dcdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515d64e129a3e02396281f2bcd3c54e7e
SHA1182a49b41fa8956c6371f1afb3901c9336b531b8
SHA256d82c8fc1aededbd7215bc725c20524cfc5b78697a80ed38af8da3fb948560aa4
SHA51225934556653912e96ef807441a1db166ea269d35a00fb262855de2a0399db94885fcfbc379f787d12811f7c3fa98676ab4297f4726af5687f1c612f34cdd4306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5365fee61c362e5d8456aa984bfdf6ad3
SHA10d594c48d4a4bebf24fa094e447b6ff4f0ab4cb8
SHA256b19b79a67bd373ef378b69a5675232b87f7db3066821f2d4068d270a62044ce9
SHA512ce3b49b4a16f59cdca328ab1bb30646a9dd1179f7053fe2f7d7a00448b837f6054ef7d90e8082b456ba640aa63b4ee4e9e15804dac2774f89275fce56f0bee91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59744e7d6f322730e5136fa5a44f9fb75
SHA1d18eb1591a2930878ceb5a80939d5644f5d59eb4
SHA256d25b89780566a68d03adf0bbb433a41d633933da562155bd62b6085a7f711650
SHA51212ea6e591f9377450d9e8e6e61bf1059779d0196ecdd318748e115fa051ea5901a54bb485d7c6a5fa51774a200e20c489a14c93921a7d947c9fa80137445d4f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53abe82a4134013aa258f61d5b0d48713
SHA17571152e83b4a2d15cd64d07c180ef8e702bc293
SHA2569839e2115fa53a5f10af83f1f57612d1631b368e696f67df6716c465cf2a88d8
SHA51297776a3e0ed3ff3b5e7bfcf60d30a087423b7744db918ed241209428571913cfbff5a6033b0d05af7bb6f43fa12f43a17947e0d0b0b464b26308d9c514080431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b9b466b9b391988c1e28efc9a2351cc
SHA1f2e0eb3131094e7658fe7fb71e055d599459591b
SHA2564e7e8e55d7f987d5d96cbe0f00115ff02edead410533ff32843d01455979fb27
SHA512ca0ea459bd2c022521be9dd69e7f89e53d59144f8a262b2047cfc847fabce1ced118918223230035ca949122895649f218da0624855518c83e0247290f6b6b3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8b9908c612069499f02801958872344
SHA136bd338d19ae3b6760196c84696582d4fd0b1790
SHA2563867ed39fad73433aa915bb9ab520b974a09961fa36316a1cdaaa469e83b7d85
SHA5126ea4545eecefb05e7ca7e32cb41b5695c47ca20969fc8ec2e30d84c8508802bdb62cb206e62e8222ab9ea06801f8f4df26eadd6f1320a40ac1e97775c3cdb0c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fdf9ebbfd4f149cd49d189ecff102d9
SHA19fc490aad09485bd353f7b1bb4883a9f140fe90f
SHA2561b1ec113e2f858b14ea93163d04af27a8cb71e0a8f33246aa3bd8854c252bb08
SHA512d62a06d43fab001d63708eded28c3c854b7406a1c29ab53f0ad5666a51bdf115ef2011592a16281f0f8d278a069d9d86f1de48c978da27a7441cd99fd63f873c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e271da6a9d3dec9ef07d168302e9d233
SHA14fb7017236de141a9ffa1fee7538adfa614d51f7
SHA2567da1c77526ca61af5ec443071722cf22037f02e334f7333ee96ca11e310c185d
SHA51222a73453b4d0e67bf84c71291f01ec22e85d1821efb7a67060c7bb23e922bc4fd2ab56a702be36ce856459d484650a4966a14854b8fc0b1e11bd6b11993a3f6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5cd47a4d82b676583b434f1f6ac1db6
SHA1025365cbde5a43d445c8c8927e4daa5644fed6d2
SHA256afc5195fa17334ba40a6a95195dc160fce608fb3001bb6596601833c79e918e4
SHA5122a4d0fdbf1793818ba590a77da9fb2e12496935f6f4bb330c0d524d795f4ab5d76fa23cf765e2b528238fb5d23b49b4f80249fab9c241dfd271ccd5525347def
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d737750a564fe43d864d87cac48b1a56
SHA1ac302bdb0b58fe6cd97ffdf2f3dd2a529ff311c0
SHA256d3435ab5de396c80551627f2c7f6e6a59a7d2d1e481e58b9050c476561108cad
SHA51247a8a6d06e4bebeba2638bfa9cf9dfeda55ecd2902c52d53486b556c53f92796ebfe7b9636e403c50e06628781174e7fa5fa4b938cc3cef845f3098c1b529670
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535b0618696481f02779ef74d7405bb19
SHA123b6b4fcd96189df1369cf27ac781aab77e1d9e9
SHA2561ee8e4b998bffd7d51a3d39497e434b3ca13529ea7e0238fa419e6b7026844ab
SHA512a6d3a84e197dac8c582cd83776c58f676d9e0d07cabb48423f7deeda6d982384a972cec8f592068e5ea6f48f2dfdd8e06b4cba817fe88c9ea394f6273bfbc10b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e5ccdccac505aa62bcb092141cdbddb
SHA16d81352d435c6ef0224a29d465c24f796c382797
SHA256e53936b823a5bbbf4f1f12b94af8bddb5601b1124cae50a5c170dd2e941e24dd
SHA5122528c1ad51bd029acf6b4e91213b4125475a47a34f2ee31a0b58eaea6b1c60932577a19ff2c4352124b276c45926ed16dfb6e2d3e8e4fcbe132b80ccf68b318e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546753bbb2961c9fdcc83194dfe303803
SHA156bd705b9cb4df71c59c0979d6edba0e277f65d0
SHA256eb9fabb947b13276c4a3f0d7612a4da018335ea42f11f01ca5bb378c0e454df3
SHA512f76edea482f84c2e73d41074dd886dadd5995a464f2cdb6a3d3a4fea414a37a5bb6f19c715fb2cb8cd8a783361d21334d6b105ae98096ced838df61953e28f46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b42c5178c00721b3225032fc8aaddce
SHA1a6e0489379e62f8f5e06ff32cd14930ee04d212b
SHA25653cf8580ad488cbaf9775b0b9eb6ff3ff2bd1a2a8ff8d9927abffbe6882e745c
SHA512f5e0e2eecc476d7eb01b3dc78e5283e1dabd87be9fd1634f34d0fbc18cfc6970fc6062a6aa35e968d699abbe9d32c60c2ee51e9aa88debacb3ee12595e4bc89a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6e6cbb80d2b35278b856bcda2e5e843
SHA1a32980f7325084974ff59fa41e454700a8a64236
SHA2566cb1bdb3116c77c6624e2cb5aec830b3b5fa4e10a61304c9495cebf945784c04
SHA512bfaae80dbb735e9ab08cb257bc2682b67e8163d3f3f2ce22e3126aa5cfdf22833b885825feaa220f59217ddd75b34aa3523a558e9857197aba91a416781595f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520f444d202495eead3ae1e7c1617ef2a
SHA1e9640f7533ff87b2751bc5154f12cb8fd1b9065f
SHA25679df735d2c3b03473915673888be0f0382431501ad212305d81cdb4c7d1128a5
SHA51224ffe66303fab9245ebfbf67e239e5a528d06d54f30eb1f9b0e7fc5210b46ab44ee02fe60b4af3fec90c9b4e168167ca6ee30a671a70b8b7eb316ff4196200c9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b