Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 12:09
Static task
static1
Behavioral task
behavioral1
Sample
73fd62fb26a86ad3547275ed16141435_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
73fd62fb26a86ad3547275ed16141435_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
73fd62fb26a86ad3547275ed16141435_JaffaCakes118.html
-
Size
11KB
-
MD5
73fd62fb26a86ad3547275ed16141435
-
SHA1
b521ca40377e94acf60598a059fe0df9992b2f2b
-
SHA256
13d82f3ecbc6447518fcf7f51d98c7a1d6e5d1f6a786de5a8976b8391154cc3b
-
SHA512
b02d9ecac8e0a227ca34b32a07974491f1123b604e2fcc50926f4e7bf719e4e7ddc01d5963296aacd2bcbdfbeabb5da8bba0f92a7011bfd5d80f515f156b6f1d
-
SSDEEP
192:SINpfuut6ol8XyuAuQX69T9iqW9TMpkhmixpvjre3ceQH1UAhdPuCpaPveD:SIzuql4AucoS1pvjre1QH1U+krm
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 701fc1fd54dfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0E6EC661-4B48-11EF-B6F1-C644C3EA32BD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000efbecaa49d294c07f4f53a7406aaaebd8f54e11b6ca70f9fb61a22c5f3a28168000000000e8000000002000020000000dbed2b20be71e354ebf0c1da0e49a55fbbf08e5d00e4064ca5dbf1a90c7c0d0c20000000c7f46a8ca2bd94e48003ff905320bdeb7ce87a28c9bfa231517bb8747e11a4fc40000000abd8ba9fce2768cd15885e0868eaf1b0c5de5e8f1c5bb49bcdc290e1644b301a51e0e7e79f575957b16a37eec61e3c231d93a24361b42404fb6263164406b1ce iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428157700" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1108 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1108 iexplore.exe 1108 iexplore.exe 2260 IEXPLORE.EXE 2260 IEXPLORE.EXE 2260 IEXPLORE.EXE 2260 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1108 wrote to memory of 2260 1108 iexplore.exe 30 PID 1108 wrote to memory of 2260 1108 iexplore.exe 30 PID 1108 wrote to memory of 2260 1108 iexplore.exe 30 PID 1108 wrote to memory of 2260 1108 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\73fd62fb26a86ad3547275ed16141435_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1108 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2260
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d80a7e0a0242c1f593b356e92f146bd
SHA18e06fa6ff57ec5be40950355608be5dcfeae1aac
SHA256c2331fb36515113c230ecbe8d8d47b2b69b2be0f00fd7d517902ac67cc5061dd
SHA512ad26c5a1d97aefa943901f61a6a654673c08dd91c3843cba46edf21b637723ba289c54db5e0d4c5f2e1e1261c991ebf6d6c9f28eaca0d1a8aa8d4fa19281dfab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d59e4405b8ef576bd92507da50074608
SHA11110e97c4be6ab4b521f4cc064f197673bbcdbd0
SHA25615909507729a6c024643c2f2f6a7617a58781c50e85c26508d0e7e0a0b8cbe43
SHA512e8df740b0bc70933832fe9062f7ef11e1b91c61a50baf209cf0cca18a44bec5811b035f4509edf6f6ac87b6a100125a209ca8d3e4563e87cbfa6dc6fed6b24e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b15b6e8d788914649bb28ec8f679d951
SHA1afd18cb0df7c68a63f29b8cd1b20d64ab27e2f20
SHA25655ed2051d67f5d6258d2d5c670c5fddb7760483f209dd2ada9af7ce31bfed53e
SHA5121532c52f1bfa0e28b2ef9bf8042e6b7493f954845666dd5d2e8d9a67a6de0cb49ecc50457e01fa49459b89a2d969ad2ed99b1cf99aa49330fdf2c088ccbd1192
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50de798dbf1633b99ec19f6c676aae706
SHA19e80413204c8ceb2851bff8ba9ad076746508b2a
SHA25699370d79b1a8c8bee7053e0c9b05ac06a98a3e431ee229e4934fc089d35c72b4
SHA512ceac39f13d409331e26331599723b6e022e3f72573c2047eca5ece2333fdf4c571afdbb14869fd1965fd685a1de5f93737c7ca653175cccec85713dd43e92b3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582f184e9f8ab48e3fc4e2ad5d4a43beb
SHA15330f12a082ec58ebf89e5dbb62a40e629bdcbd9
SHA256d33a9f897ded020637d6f0e0fcf1d8b71b8f0efaa256d2168ab15486252f6953
SHA512514b06a4d2b0127e794658fc770b3a0979e9c37cd348f1ebb5f3fb678c997b0c690470471cc31819fa784d458a720814edfc68a47a4a2fa2f2024f46a67a126b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50260db23f2ba6d854f9c62eb877da83a
SHA11b89f72bdac99327432c9932ef2341bf42c0c68e
SHA256dfec806e3ed8c743b23e8e026728b594125e46b8e37cb52f0a59a5b2830e89ae
SHA512321f4f10e074aced305e16b4f89da46d53994eabd969558ea9e76d059b77514333e45a366053f64c0f23a8035fd6ba0113ef4cd8f17276b421f060c3b9436531
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583f02328c082cb1c6fc4618df21def69
SHA113ace183e0227d2e663569483fdeef280ddfd2e1
SHA256a5890c08e8631ddae5a966c4305f183651960c79b3c7b6011eee754d826a7dea
SHA512abb1c08bc94312ea6261ec1368735db83327c20da0ea2e707c4a3362bc28c5412ff9ac811991dfd3cc10ebce1cb33e25a0cc190ee46226c1a1996957b1171d59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f6c72e235629010311fc3c50b7013f9
SHA1b7a746c466557a8f03b222e0131c926f82328032
SHA25696571c38e5fdc9098cc148211bc23ae174d27daf87ac2ae19139d23fe03e79b2
SHA5122c6b61cf79f4effd9ac97e5c9cd4c1d0f2ab560e69df105c85a33117806d3b26a7d9203b3d770ed3f9ec9739d6fcbb301762f97a0396d4af65e291b6764ad7f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffb8d0e6a53ef27d64f8ffc899602ab1
SHA19bb6d4e8682d01018bb7658a40de6c2c8617617a
SHA256460ccfe79a20ef6355936e8832d7f46c9a81a5c5b08d3f0ebbc1d865ceb6a255
SHA512c84538c5746cabbb177d0c606167d67945cad9e1682bfc46f618d6ffcc9ac272f069c817f39f5e24eee7a6880591fe455a33b799adbbfc4777d83c6e395170f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520aa09008c1ccf3912d1d6ca324db174
SHA1cdc04fb0f293c1fe410d790f8e06c915cc77a955
SHA256b3a0e198532e9e8b44b2ada8f30f48d5c60ecfa7a6da981f5a0b6340a92653fe
SHA5127d95f8ed00c178a821167009b33706230373796a98e928c6c106cfab2fa45bc10e5b5346c3cbfd9ba008c406d1a81096ad78278d48e095bb3e4666ecdbe317c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5974174a3fbecfae34eba529f20688842
SHA1d3904fa5b64a25558f08a7d66166bcf605dc5add
SHA256be5bfbf0454dcab5e66d7e4c6edc4df942f8e9afbc87a829daefe2cddccc13c2
SHA512deebc4e008a47d19e40536743101747d537130e74aef76adf906ed1081f0fbbd6ff4b4526c0fcc34c962b52a6bcb666e70e4d0d08c1c9010a79f7fa0347aec1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587850cf96b736a31952a53c50d981829
SHA1793c32d011518aece3ecfe51da0487ab3a0c9d38
SHA2562d06a0cb943bfa473d5325d5c329fe6ae171ad92b9c29703cb54f370cd571e42
SHA512b7a6449ec325fc5b626dcbe4f3dc18ed2466e9db099246031015a8c11570ff7c7bbe42b1683ba87d22bf6c80f3b9c8db04e53f3e7abc4be2ee4f7127ae39d3ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5141982404bf84a8a32a7d1b9c79bf892
SHA10ab19044e7ab79bafa9bc93981184f946e11518a
SHA256d10cc296fcdf07beb030751c12216f341feb634998e4cdac0b5540f1f6cc5132
SHA51215614accb5a40c2a24ba08b326c48831a2816ee81bdd3f64b7ad70cc8113fec3c9841e8f41cf7d806a09f945969eb62230cd3a30e3e46300e581928b79f6ae88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e374a52433c8d382fbf487f7a21e347
SHA1327206c1a9b3f0d303df9d31a3c0fa271a346be7
SHA256a00f280988d52615976bed71391be09f45a209623c46ec32ded2efcddb08f8e1
SHA5128cd26122ce3d411a8c1ba3cded0a7365f6bcd6d4b0b5c69aa8ab76ac7a6299997b0497219231a6ca378f22d93cca3b13c18ca6420d1557a11077e3b8354b4d5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5390de15ab0e66adec916a57b7877d132
SHA14c72f45930884d05668bc48374ebceac9b9ba226
SHA256b4de93ef1921a13833dff6659e1296887d51f99328d216851fd8f12da137429c
SHA51226a979aae4f03552c43c6f7523151a99b82538a4e3fdb4c4d356adcb602350a2dd672f1917fbbca0d43ff0bea32a04e945beb1fdc8a7485395a49bc9e4c32fbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556f6894d0d5bbae55c0c3e847c884433
SHA1d1c7eb971047a7d0abe68903b2e6093b81d617b6
SHA256709678c91b0b1ac637b888a9442e681c8220da4bd0db16f75b55d64f2c386675
SHA512f0280d830b631b3e2c9804baa09d8aa467de3ab571211eb2c9a38d6389085da2621faf1fc6bc753a8db06139973ff8deff4efa0a9ffe893ac74592ff4038af28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef9ed19a90be732df25471aacbb15cf7
SHA1cec7b028de38257239749a3ef61fc3401af31ac7
SHA256ba324c00624dad94cfa9edb718d968a1587dea4b6f80fa416e73b8498487e459
SHA5128ab091866dd8e0d536ddf60f597b1771fe2cad2497185a39328e0824435ae43cf2cc6db426322b0b9020f49bc8aaf1922468da316e17e71adf1775da86941abf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a405137c12fb91d2bbca36bf27581fea
SHA1feb61dbc74b9e3dcfb2e5d362edebf5f9a0291a0
SHA256b2e258b0223a4cf8eb310955925cfd5a4a4e874df652ef222b25d6c0841db09e
SHA512138f8ce0f8c820008223f954dc155d3466cf57c4a932e74e2b41777380efe354cafa9e198503db269039ab650a29dfc932a71f8b418979cfedc4e55f36924f54
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b