Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 11:53
Static task
static1
Behavioral task
behavioral1
Sample
73f13a1f1251792ec23701597f52734d_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
73f13a1f1251792ec23701597f52734d_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
73f13a1f1251792ec23701597f52734d_JaffaCakes118.html
-
Size
9KB
-
MD5
73f13a1f1251792ec23701597f52734d
-
SHA1
051c7c1b503bc28c583705974669b4e4eb0b5b88
-
SHA256
d08fc17b8c46f294f3a9f94e298c38df07812c65c65775acab6af764db7f677c
-
SHA512
543d384789f279ece1c0d6a36c9a4780eae3e9c65a0fab119bbf318acdb27e0025a318d05bf328aabf6fed34f94656f39ebbac82b973ca0094d966fd70405e61
-
SSDEEP
96:uzVs+ux7M6LLY1k9o84d12ef7CSTUqGT/k/+pbr3DlVHcEZ7ru7f:csz7M6AYS/bsbPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20c7c98b52dfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B6CC4E21-4B45-11EF-BA93-6EB28AAB65BF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428156694" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000a3d687149a2bb12693d1f3986f52f1af1e7d2a503d48fec297cefc61f511ec21000000000e80000000020000200000002f30500b30fe24cbb8e7707e79e16e653ed68a690a915d4e1822600000cb2b7520000000822a0ad9984bebfab3bef5c0e90982a742e2762870d0cdab1295487990526d884000000060b213eaf760b9cf86f068c005c3a0f938429f594f43b2a84289de33905fbe9a6dfd0ba625f073b96b6f01a6161f9a3ec7e47513c0de00e597ba265ec2f6aa10 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2660 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2660 iexplore.exe 2660 iexplore.exe 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2932 2660 iexplore.exe 30 PID 2660 wrote to memory of 2932 2660 iexplore.exe 30 PID 2660 wrote to memory of 2932 2660 iexplore.exe 30 PID 2660 wrote to memory of 2932 2660 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\73f13a1f1251792ec23701597f52734d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2660 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574c53f3f0c8a1394dadcb68c9ecae928
SHA1903e4e11ba4dc515ae363ad9477fa127b22f14e1
SHA25617bfbc5dce946f01ead16095fa9c9c9610673245491d5365392ecb6278d7ce9b
SHA5129fcbc321a25624d37de48754b71cc5ddf4c1004e69b7bd6a2de59c08b8e53ed2dd87c8f3c6a3e59b784ebf7bcc9dc4d9954882a7997d8831c9905fd30c1b526c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583f51cd4543a270ad4c5a33af4e76cc4
SHA107eedae20c357d5ceb83b875251cb7be1d00616c
SHA256f70c2cea5c9d3ae9d884ea90fdac1352b8b484eebd8b11de05b1afea52ebc920
SHA5127bbba17b3bc0bdd6cedea99b276d33c6c61883c4dd2c9d6a73493673e71d884e97911ceab7a28ef08a949b40ea9be67aff83e6afca69742ced9416ba9e43d821
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5732f2a31d36515975a2acabefc7fda3e
SHA11949338f0c577eb77156b99c98ce15a1cb1eddea
SHA2568d88c6979e578040d516c83a2de7d183e84b1572913bcfaabc712f1bba1e28bd
SHA512b7bba252ddfe8f1999132626c42a1e9e4248596e3a21c52f5a4fb262e66c36b9b8ed61f4599acbee9d20dba1a8f01071628dce83d64abbcf3fa6a0d7f0a067e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b75174bc1f4927d141b28868f3b413e6
SHA1592f9268d09dc5709c2da47ed8b86317b9e76a86
SHA256e7f8794b4fef154b0fa2ee42e4786184eda86ded1847c3c373de0363e87d0192
SHA5125c434e017cc4964c08ce0db73cd464770d52920744f50dc1d502f11cd9a51334700c12941050f09961fe3c7b2a1f1ed7d6e4750a408a450323fc30f9dbd98acf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590c8e6344fddb595cc2235c33165b30d
SHA193f3bf47e8be12138a8e6e82c4184b21f2a94ffe
SHA256c664d08f1a95085630b771f28043bf518fe89d64ed011ad4cf8dadaa1af5f80a
SHA512efc4220a268983552d08e25ccbe3831e299fe2a38bccb915cd28ddbfa4692f30a6f8d56c130ed58c2031b09b8b27c09ba8360bb89ce6d43c4136b50c61515b6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538e71ff7383b51f6dc4b85d02447eb13
SHA163beb76d4705ed62ef2380c86a0c70213e14d468
SHA2567ecb9e1de74a6a38cf2ab5eff49a99d2ec6b02def79b8fc5e27588d442a021e7
SHA512c11fb6811abc1251c70e360c1b626f5920e1382f0e9d840f48c0da520d9e48078fce3b3a9f65ec27d5d67e20e6dd55e0d537206cfce605654ff253a068db3558
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be55bef5dc73f78030b5a92e13d25816
SHA1660eeda87465394864cd10bea11897e573f6cc48
SHA2566ccd0f42f9f59c465b001112fdd3c74546ec08d4f9e164adecf3877225b1da0e
SHA512e9b405c302a14d80f4ea020d77fa51f2900a6db1d299ed8653b11485591c3b77ea9b45b4f231ba7dfb14b4ed92e43a4b9f94ff3a4ee0e08e830e80c85b5c22a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55401df56a283fa7700b88b4e8f7c6e32
SHA110b508514bb07011de6c90e77afa910b7c7c7db1
SHA256584e62e9f7277f3b5c285abb6ff1ecdb751a3e6c3bc2827cc3ccbe45cc90052a
SHA512de5aa7ebef8781d68db42416e58d606f58ea49f06651f13eda3c7b86444bd6a1b5b9f7cb1fa8f52095cf15a8d8708d64f87f44a8516699bb0b3ec7c0309510c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b68efedb5e21f1ae80d276300366dfa
SHA15bf939aacdf0cd40561f2ae46230fe4eb1e2515a
SHA25622fc8a01bbf3023a693f2d67768caa1ae783d688e04967b169f9437aba39355a
SHA512e516c83b35a131ac5cf063cc488ee285bd8cbd8f270c05d76f53d225bb5431dc3b4f6efe5868498d2486daddf3c1ac10e8e8bf25ad644556cd254c420ddc4ccb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591c9ed15ccba0e800687b7efe720179f
SHA12bccc5eb9e8c827346d0dbbdb3aa8dac41a1bc04
SHA256f5f9c91d20364feac2f89e0d4e20a5fadc179353011c5f1951aa6e2127058bd9
SHA51288aa605debb64f9fcef22e1b6d243b53bc8c3278babb14840a7bc5f72f793db7a163ea9636d93f61a88b99956bb98f58df68a36931b57f1a6af8fdd24638d731
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dfdaf4fb231d4cef8dd6e921965537b
SHA1b21d72c89a51e04dd2bfcf645dda9fad0f511d99
SHA2564b6759b5eee8579398955bc546ead4032646146127911da06e055ad5d2155b4a
SHA5124a1ba07ee09e43a1a147c6354473ce354b2461f018a5b0a0f7d1a36c040474f0b90815c9498cd7a3bec810056b731130d47def7e984cff728027823269aa385d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c28a90d6df3ac0f4ea3e8cee327d711
SHA1a4f5d22e826cd650e1967d53a0098b5c32cf01a9
SHA256a56e469258ada0abac3bc556d959b4b620829cf1f7c53641e749daaf037abc1d
SHA51292f993e46bfd1f205962472037b0b58286fcd4bb4b0ac1aea84749851e75c0734722b81c6e7f2b6557d8d3dea1b22908e31ccb3eed7d693961f0b03cd081931b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c64ccb93cd59c93e2a4463ad19e4fb00
SHA1b776fecc018713e4bb230599aa18f697d1e48767
SHA256d4542b2f65535e178a8207b640dc5d4827c4e000362d7a661a51efc13f3a8a30
SHA512975abeac79c4add4f313c226a9854d47de0ea9a09913aa9c51cf0175c8d8e34e81ed37d5adafd136f4929dcb855bfa80f2b712dd2bdc962911b454661929c9cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58289f2459435a495ac258e513e170951
SHA1cab4aaf4cd0086516bdfeccfa7f50a4fec74d0b9
SHA256546e5f1a4fad528e7ee88234b538a7e3597f69f0b15bd871aab42973b1d31b1c
SHA5125e7d6239b44799563b6a9e3f5a18efef6d0e7aa5380684b060f468fddd1713180fbd301e211b65a08447d7152181ab6c0948d90c2a640382f4d47372be8ba5bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f56d2107181bf3e221050d5c23f9ad00
SHA17a1d3b5eaa2e9bf86418082c89dab2fd7ecc6fd2
SHA2562c5794518b74a4c7f9bf16d40699cd878b45028f107c6ee0f3fe3611ccb3fe41
SHA512bcebafec9c48a2334838aeb290c81a1827b547b1725b097ad6de97afb55e2d47f7d2f1bdd0a1d1957fe5dd24c9592edc30ad7b453c9706968e246bcd02e9a886
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5ade68bb8abe16f6adc97c1e4705195
SHA146ea69f2f5b097806b70958878de4a267144f24b
SHA256e0bb899a5f349d5439682735d7230703b4be6bcb09774487ad7b451a1fff6b5d
SHA5124c2a4b5f71ef315df944d750ed42424e4fff6689bb8cb8e8608e29e4c3f7ee7ad8ec3da7367ba05364e66e5192c8fa19c9495a572782c5b823ca707b1967c82b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515727dae6b07f49da2c93c4dbc38bfb4
SHA114c1de01d073c3da952816e94a25b7d2bff02a28
SHA2562ada7a100741517338f1500a909ff2c754ce011276e6c47e28ea4f3a493ed30f
SHA512a2f12dae4a5038dac2e1fd4bddd103da2e2b49a71c5ba515ec7ec61e1d6c453167aab55d2854fbd68b37f88fb4567c9ecfbe482f9dc8e71795655a8024c70c48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532e9a4bb49694b0988840bb91c7768f3
SHA17c02ce473c4c0c3684e30baf55e0d3019436d419
SHA256fdc12a39b950c86bca6e06e88248e57a73c0eaa79ab7124d01c8cca51cbf18de
SHA5128ce86ee8711ddfa4d871acd49a88df705c6be1c8d318ddb3ff531e721cbbbbcce4a3be901e492a2d67786d1622ac6588922cf6c357ee9874a719f68edf871328
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a795f2e7223cfdcd0b82209d20d45d6e
SHA1e65bc88514af80a7eaab08f3c3fc3bb667113f23
SHA2564b12b01ef6e4f18c9aa907765643cb19a2316416be5b396b08ec8c7f1ad294fd
SHA51210f4af6de60b967f4bf5a7eb91fd289eb12d06916770d3ca4167e5ba8a5ba5603f0b25cfa4c69d113b01c26cf2704dd62159bbf3a81f51a811923fe140443509
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b