Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 10:46
Static task
static1
Behavioral task
behavioral1
Sample
73b8c27f51d6aabf70084209f2048652_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
73b8c27f51d6aabf70084209f2048652_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
73b8c27f51d6aabf70084209f2048652_JaffaCakes118.html
-
Size
6KB
-
MD5
73b8c27f51d6aabf70084209f2048652
-
SHA1
e2a033d0d171826ca83931d222bf9b6294b77374
-
SHA256
959fb0517c128b82ede9cf4622a9a904aef2085310007ed69850c76a458a8996
-
SHA512
21d70ba3cb276f8af13e92c3d6e988afe54899b7287649d90bc90ace2938b687334297cb2d3bac42de3e54492ecfabc7842f2aa8c17a13b617da12bba557225a
-
SSDEEP
96:uzVs+ux7o+LLY1k9o84d12ef7CSTUoZcEZ7ru7f:csz7o+AYS/jb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428152647" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4A8FED11-4B3C-11EF-B0F5-6E739D7B0BBB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000bbfbf90787f9fbb245207aa6b734eb051695ce48bcbf240aac4f56791da70fc6000000000e80000000020000200000006c3feae229b0b2bee79bd182889ad01c53836b2f863362fb90f6349b5237451e900000002b2e10d84091fb8c8ceba483f73fadcb7fbda10adc71e173d40f7dc4e1ee1a23f9c0e80171f78f469c226458d1a88dd6492b8f2ec9b167dbe50512e45281f261aaea5c0e9946db7a9b22bd0a98e20ae503af15a0570967d72a3b3eb79930df0b1a3c0c5113a3322c92843b501e8e7f5150ffaf01e602886d1816ea6ba97a0886c38d5a7cd59a8def2aed04df3b7aeee940000000c556f8b0f42b4102d4ee320b50bb2c6c17b354c27e0ecaacaaa8bad946204cdff2d7917a68679637d3e5d6b15b53e71634dfeb7f845cd4afe1a573b21a9cfcd1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c0000000002000000000010660000000100002000000024f860fe4659c748a496793ce34389d4c135880cce884daacdfa8d604e510873000000000e80000000020000200000001c1795e396e28276026e78003ea8d5247e9274ddc9f2a23a0985eb6cda1d971a20000000cb792d6580f31270995bcb5d94962958e1646802cbcc41efd27a36cca73650eb400000008c8690803148f0a0ed43bc0ceabae51244bcbd55572506a72165d74de4a49513fc5e9c9f4a33075ab8305d0a8a7a244e60ada47259cec6886f56fb7e5cbfbac7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1069bf2149dfda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2484 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2484 iexplore.exe 2484 iexplore.exe 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2500 2484 iexplore.exe 31 PID 2484 wrote to memory of 2500 2484 iexplore.exe 31 PID 2484 wrote to memory of 2500 2484 iexplore.exe 31 PID 2484 wrote to memory of 2500 2484 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\73b8c27f51d6aabf70084209f2048652_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2484 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ac8601a2e590fbec5380fa0f6d524497
SHA1b5ea982e4cf72db5ae45e761bfbff7e3a42f9bfa
SHA256e2c36a7309465f626826c3f650f6e959955e5f6a40a05d48e2b580b8cd591fa8
SHA51265694ffe4713aa90159c21dfea1d48d8f13df4023dcae6e326de3ada3c2f983468f0308c8c72f40d4797e81ca86e1563054cde861b478c18a7d973110c02f6e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52303aef51db1c1bd9db240792acc8a21
SHA117c13563f2555e59002ca5e6bc352ef2d4e55f10
SHA25681bb0c3c9f073fd0e19a598920f283685fcc13246a26764e513fdfcd657ecd24
SHA512b80dcb2c59f44898f3d72ece46728b8cc114cf82eee7c34b3037b80be385cd2d678038842e268ee66fc046b2f8a4334c68258852085c77de5b15dbe34ecbbf61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54821d0145cbf4d399d5ed16542fc5a43
SHA14fab4a18d96dffa4f968e5ef4b5b5b2bf5c40802
SHA25672e6b5b83291bd7519f60ac569911b45652a6168202c0ef2f058eb9adabd8105
SHA512ca683d5b56852913bb1b3b64535b9a576dfbd81750c8d3ca2609fae31a32271b5315ecb77da2df57b2a23bd69267c8a46a18956bca1dd4c2dc3d8edea0b20d4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d492099ab11254229171cdfc987e655e
SHA1f1d7b3ff175c63c4d4d49174e955b955579a2a67
SHA256e27ea6692d12641066b8ccecd344b47ab247cff4d47c15fa59dda277d20717ca
SHA5125af672a027c950bdb95936a35c6f4f7aaa6cfd8e1587a222f54f8f423a89419f70b59871e4def8e368609a62812c4e19774c5b089faa0e2ccc04a2175b9090d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b6b16f23de696ae9a39240742300aa25
SHA1c7bf90684560f676b1cdde5ee01319d7c6e7e2fa
SHA25690180567e1e1a06a8ebcdaf14042de5c97addd42fe69ecf15758b443316f2e65
SHA512e08ee1a599afcac763191913d5b7bcd5fc3efb0b66e57323aed74b5b7abc20dcbcd7777d5c5a36da72d1c14481a7b5390261dd27564c26ac76baa485eef47d65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c11243ff73f790929b6e7102f4eb320a
SHA13273ffada78539ec8f80dbc130efe4e26b680ccf
SHA25666a9a034a5bf03d0fc83c54df959541f79523c5cb9a66e716adc57cce0f798ec
SHA5124672cda7273e7eda9d1603b83820f4907e52d7819f74900ffcdf3efe757914312cf3dc68c2e50ac28b36739387be79f225db4f84bd311c53edebf3991f6fac2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5de9cee12282961db9be2d370693f590c
SHA13f54436bc7c664fdb254092f20a97050c66b0690
SHA256d83874d5dfc650b5171b2f5af3f0e704bc85560a7aa253b402fced96739b2d58
SHA512a3e8e76ce4d3d354f927a9ab0f1d7694b77edcf26e293f42504aea52ba32609805918f823ca188f9e4cc3faaab2cf18102ab81633a5b61abfe8e866a4e73167c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c4d7fe2384de919bb98fc834188ec32f
SHA1f98f566c76b5c182c3eb075608a96f222e2c7478
SHA256fd39a60dfebf5d591622ab5173bd6dca60dd1100ef166f5ae3463c6d75a92483
SHA5121ecb6c73d0f84cd2ae05e26d1d24e2c278d7bb3d560d9b20a284068f96e05248f231d5f1b59f2baf6158b5ef16d41b616b81347a85520674d82d6bb85aaacb86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f898ad02e03b1d3276f539a2d2da4b54
SHA17a0ad0d44d1f655dfa30baa3250014101fbc9cac
SHA256f36dd4c3b47a87e116dc5f4278b450a92278ac35f9e070bb3f28f8acb43b14af
SHA512fdf4060bb88f46959a12faf0a5441de1aa9ee98c2cfb5422ecbd1f6e0ffbe957d7a3c9b4e947b71efeabde0b81ffbbf6c73f1bb1e369284df1824d5bd645b2cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53dd9ceeed4b1561c4958af6a72160e3c
SHA12984becd89ab0635ab3f05f613681d7f4a566d29
SHA256e7a512563c3e70e30ffe14b3869ad6b283aebc466d55c5272a5f849b1934b0f2
SHA512efabf723a3b4ea1723b75365627480c1f73b3e3ad603caef565db8a0da283d175b6b28a993b87dacb41fa7b3b1fd29938d2222bda324c5e36f3ffdcb1c64f16b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5333798b3eab5ab782afe32aaf7718fd9
SHA1a4cc0adbeac34e6e44f42884afb398ff9cd496b3
SHA256ef3580ebc90a2743c2e6f88b0aba59a8691a885c9bc9ffafbe9dbb90e22300ab
SHA5128894cea6abd2a59c995fb840f07670c24642a3b1d799fab55f1d7a48ce3f3f9cb088832b3d337cdcca2e33908cb228c7c34ef3da46350291285fb9ada1206f90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e9ef97d324628bff6f432fb842d8b917
SHA1d123e2ff0aceee77fe0e567e8a6ac7c5afedd839
SHA256104773958dda4187f701a4d7917a1e7672a2ad4d21be8497c9dd7817f2e72b0d
SHA51296199d2567a5cb6330f3e043bf6493ea8eeb24670bb1f56e54221023d6afd31170b1213d710f795f7a734cdd1d06b23805e352e3aa179a35b2efdfaebd9ee644
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53cb93bf9dfa2f268f11a2d6d9f410c07
SHA1c885b45fbe4c3a968b25daad7a93bfef11b6392f
SHA256013ebe436a67f5480d5da4aac405679b57ec3f446c3a55869df26beac8dc50ed
SHA5123e47e9a1468b70e69d7072ae8ef6a9111e2983cf463b881270037c96abcf16309482f01d00546c2c005f9637183ad21bac7fe9a340ec649490769d7311a1f271
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58b88f107e9b66b0b8067ff84358949bb
SHA1ed099fd26ae776c8a5dfab946b3572b970b30daf
SHA256ba15556f42f608c2234f72c654b3ff01e6f29f807e046aba53e786b0ebdd25ee
SHA5127cb2bcd483be795a4981ff6cf4c6401a3b99f51df99e45ec0b6957de691c6103e8d709e25268b3d769735ba2ed7447dab5650fa3b1d9f0b14a6e5bf0158d9bcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a854f77d27b610fe7b9906af7818ad4a
SHA192fdc2f0c964132f4b0c2e0bb8bd8942addb1235
SHA2563a97d0e8e95dea72897ac98041824c65ad8323ade875b898dfbb0e7874f8723a
SHA51272c784c6ab44b66dc142fa2983af49e515938354130b7b0cc7e91fbf7fa107d8febaec2ceb9617e2856639d7262e6be856b4fed50e0117264ec3df9be9ece58c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55faedbf941294ec72b90094311d91659
SHA1cff6d62bf817e07e5dd974c56253a487851878d4
SHA2569f506cea0b70466112ae64a59bbaa899b212fbeb43d23cbaa1cb0a5ae0d7fe0c
SHA512a49b9c66c5bd4b9fd8adadfa09e536fc2f4df8bd5ce077c63172aedc181b4156dd2ba1d8c00a69a541869537330d93ddc9f4568b4f3ef6ac1226db699a54b2c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56aba8beb6b838f2e14e6f4b741b5fa44
SHA138f1d0746fc1c57f0eb9150696eec2854ea39420
SHA256a61952508e5297d619580a45d5da19ffa6365f2608c05882066eca0929f64bde
SHA51246fe42edcc924c04aa00f670b9f2c3c6549ac47314c0c56716ce69d361e884c75a3fa4e5c0a928c5b9b9f319c0ce5bd7b0c08222293547e6592891ef33acabb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a24a3bc815eca0e7029bf855a3865fa7
SHA16438d543a70311e442bad04f732c04cac0254e15
SHA25639b631b794d638a01bc36b15c557aa169a90b15bcbdc7bf4e709d8f976c3e2ed
SHA5128d1d290265c350a5e6c0050334aeb4a8339f2fb1f96d6a100f704b32642e026f777c79cc6283aa2bc67788669290ed053a7bc927a2933e7e65ca4d0f6385f59b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b