Analysis
-
max time kernel
134s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 13:50
Static task
static1
Behavioral task
behavioral1
Sample
7454009276c6f8fffd4258856702f2cb_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7454009276c6f8fffd4258856702f2cb_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
7454009276c6f8fffd4258856702f2cb_JaffaCakes118.html
-
Size
6KB
-
MD5
7454009276c6f8fffd4258856702f2cb
-
SHA1
bfe3eacc30cf358a5b9720d35d57ca6a3a1a6738
-
SHA256
461d566811466804ce2a3310badfb4a1eb33b1ff6f326e75aa3d0f4e981d2e27
-
SHA512
5654f3ba414a792ce7bc662513bcbc13bd90fdf1e48f20f227110af819f7b0e39dfe63d72a3e51a2f3e486c78ddce1cedc0647f5955a1acaa27ee2234e7b7bd8
-
SSDEEP
96:uzVs+ux75dYLLY1k9o84d12ef7CSTUxAcEZ7ru7f:csz75dYAYS/1b76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{55BDEAD1-4B63-11EF-8419-5E235017FF15} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e01d592c70dfda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000dc03c6b148f84e331c1bb0576625042b3b817252442af6364208f1b6c6e4e7ab000000000e8000000002000020000000ce65667bb0e62eaea84640b5467045da880d85ae80e6729ec463e34e68fcc7af20000000fe7a19dfc958dc7faef63bf2d464b52928f0802be408134740a19c8c1b633aa6400000007b66fb81eb6a1ad36352a3778c5a7f2fa5ba52fa3874d8d8a6844fc5c73c12fdd7f716b1f43e45e28ab103c83a1b1c0cc4b4e40fb3ce271bb9aca3d7d5ac0820 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428169416" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1868 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1868 iexplore.exe 1868 iexplore.exe 1544 IEXPLORE.EXE 1544 IEXPLORE.EXE 1544 IEXPLORE.EXE 1544 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1868 wrote to memory of 1544 1868 iexplore.exe 30 PID 1868 wrote to memory of 1544 1868 iexplore.exe 30 PID 1868 wrote to memory of 1544 1868 iexplore.exe 30 PID 1868 wrote to memory of 1544 1868 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7454009276c6f8fffd4258856702f2cb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1868 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551a26835cedf840affe13994a93ae365
SHA19926d649541c71fde5784abc2fb3957b50368dc3
SHA25605a4cff4fed340f925d833c743a9dda9d15c5f8c1b8e484d08ede3d8db5b6649
SHA512124b26062f948b9a33cdec29d1eae96e59af666155860b8acb3690fddb5eb9f829440499c3d7826625197609bf75639934e5eb8eaec009d86e6e3b5d098c3e63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f9991ca0e9395dbda0ae5ebbdfeac98
SHA1029e090efdc72d0e7263d31c5ba283e86e9c00b1
SHA25676eeeb7866f3a5de0135d7196d71dbc2f89d1230fd85072a0c93c39bd0eece89
SHA5125ea431bed9be495d65bb4936d9d3244fa5e61b4d648cda3629ee61015bf2ac13491035e70b8f129a11856af0bb4ebaf8b74283dd6edd97d3e37104b5a576d7e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb077839c7f8cc770d8ca012cc6129d6
SHA12b85d3045a0f0b32d060b03966b7d20b65bde1c5
SHA256f7ff44176fef2fb1ca7594a31e1077696f3bf9393235569adef4d83881d801ba
SHA51278ee790ec54622634573aa074aad99ac907d609d3731cf9b3537f44b7278dd0de4fe97a9bd13eb478602bc0365fddd968dc5ff01f2265d1bf5e7a8a3c4f3bde9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b468f3cb853fc0fa19268bd938b9300
SHA10985523584d4ce494570d9dc173c84c40d5a406d
SHA2564ab3afcd1a1b6277e15b18010a5dfae5a6b50ac5a9e2b8b642b89c4f44f2681b
SHA512bafcaff343e915825ba2128dffa3e038b47a0b20dfe3f17bc0d3558eee1546df066faf71078c46fe2d547c375699881ffda16edaf8a0e41281ec8dbc23af77de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd968baf52aaac3af4438faa4a480bb9
SHA19065ee629b66dae87a48fa08f894fc4bcb67a8a0
SHA2562be367c260f0e2cff60d638a80cc4452b3a9ab85d28539094afc2fb7cb6ff6c9
SHA51269171d69d2fcda0612e1813e66fe8cd2ccfb8ba5d102ff25340a8f79ef19fc041e68775318416ee50644af49631a97f7aeaa00b4ca8ec1306b2fbc391e156df8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd84ca147387ea8f904dc26e6f892119
SHA1d2f81cf89e86a2a2d4c2101ee2be660720eb4563
SHA256cf461bfd310757c02d371f30f30079cf9ea87bc80863d269b2e01c28e9ecd35a
SHA5125913a02257632bb7b52b98bcf5cb79d06b2aa000a4962e9eb8ce4fca620f0fd6f9c1914c99077638aa4599fc1a47fe813da5d2b2edb3dbbc33bc83eceef1efc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5564b80b59a1c728504f52c93f034ec5a
SHA1e637ed636c3f7cf71d96e2f14cfdec28edeb24ec
SHA2564b36df22fb3d30a8812e534623d442072e0899e0c41e100e88613c3408efab19
SHA5124ded9c7d3c0792b819bdbe474004444716c953cfe07eecc2b54434cda5b9d26b9a8363643dc257ba32876b81b9cd94b175c8c36f582e679a7f8d77d5c24a73ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546951a6927de55ee89de3459d4919861
SHA1ff78e60029571ab15a50456216f9077b0e099fb6
SHA25611ece56deb51132764778fcd4d498e6209470e4f755877d6b9e9beea39a94035
SHA5126d34d00e3f1e68e894ca4e32c8feeb7fff2ecd5cfbd6f6d3acb4e4a5546cdb41da613165fb392ba3f2fd6333907af60591b2af3d21096cd93883be7fb0283bc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5151d867ab80ac9cc66d6ca66acc23e48
SHA1aa6e906ced71fa5679e25e336a0edb33d5e887bc
SHA25635c6ae447f5c402756730111f3a483f6097031ab98d677f6927d906d2440d350
SHA5122ed5a5bf00b1033e06892428689d116de4213bd2d80e60605862f41a551fffb712972def1551eb6e9d5386b29c95a99f7081663845b597fcd8dc814fd9e8022f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58610fab5e09e0e57f4120401a899c920
SHA1efc2b830289dbb7fc045fc80a851b9940ed27ed9
SHA256ae6a11399c6d9aa4d3b8f7873fb4ecdae3db798baf25a95009f8fbc99cdf581f
SHA5122f07b4e22d876fd86eaa8f9cbb1b56229069501effd345cc73415a0c3e3b7c527f6616bbcefe1ef00bd955ac973b04b3b9fb8ee1d928d7c8e85d688ef571db11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bed8bffcfdd786c27c08854333b37b92
SHA13456828e875193629d2ba228564e5ee02bfa0c2a
SHA2566619accdfc3dfb1fd348854277977e7bbc79b9dabda657def9d3e222f3febd87
SHA512c6668dab760c7f68c401703ae963f48a846ae8c3afd472cce2e46f62d74525b40d603865af93821cba9654de27b2d009bd22ea8c902ca7c5ebe91801d9285ff9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e06274356c01e9ab0e5ed0915280a17a
SHA1554f06ef7492c271422c15ed0fa8ed8b0d6d0964
SHA256fba335763a2b8a06438c69a01fb980ac0a63a39a0f97c3d487033e0fc33aaf43
SHA5121ced67b619f011221922b5cae1238622c7fa9f394f1c0af06cb50539d0bbf873709d36077c5e2464853e77ecb233eda421b36199270a492d0792fd3cb715795f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bf386cbdb1d9aafe1fab634e31f99cf
SHA1529522156728da7a768069b84189f01557f5634f
SHA25677d5243ab711d7fd91667b1ba1ac835f6c1116dbc8b9d0264ae63231f0203465
SHA5124870e2c2626b91521478902d4a9d38cdba57bdc764a7f3f2d0b9afc0d94be14a3127021a328c189dc4dc95f16079af964846fe309c6060d422691fd529216a87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a011a60414003845035027b0ce2e283
SHA162ed959d788bfb74ab90d92f39b91dcef0ce11b0
SHA256a8d716734c39b54547fbeca92e7facbb636be42f50b3ee8e0040b0250e179e3b
SHA512c14d78f181f10fc5f1bc1090a66a82e5ee736e77bb6e8f2f4825705b12678a4dc6bc33b88fec53e757b1c64cfad3d9375bee53f41f86dd9abcef45e6e88f872a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1b101e2dc4954eb05973a3f15c6b374
SHA1d95949f1acf8bad7819e511d6b15beef828989c1
SHA256d9835dfebb9644c62ab90476f822f955fef560abb7d2f6a07c22cfe726bc7646
SHA512d7528db4fa44af3cb9d55d04d92ec537b1b1d2fe241846ab36c153d9044c3cf5c72373843fb8efd4bc132810390f582bab6280f442795d8352cf6b3e584a66b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586db04ce2dd43ea748f0a35eea5ec255
SHA12dc6f50bb9cf2ca192a6e068e0ff00e523605dc6
SHA256cbd2a0f8cd77d0a9a2bee26f664d3e39facb988f2a4f47ecfcddbbaf5f874d8f
SHA5128a85997e98d252d2798bb70b692ae2bb41f346b31dd783acdc41130c137c53a907a52c6733f04eee24a7ba3fa916cce6fb34988719ed957a86183819c151d745
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2124494af2b5ccdbde68a480b27dd8e
SHA10f3accfaf36976318dda439257929fcf9b2d86eb
SHA256373344398592daef9410bd7f96c03d72a1feaa61989a1692d16e4cd55a91b456
SHA512a00d4e3d5b18d30d1b8098b2867264e27773ff3caa61ca4f43c2729a7d2362d50b6dfcbbfaac850eaf22315e662b85ce7dfef04485b4a8d4aafe99a283dd05a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571b67885c4607411be527d6e5a0f77ce
SHA1e7646a0718d16d176c1e51f846dae05d038b4064
SHA256439fb20f15954482908c5f87565b42a3e5ea6a8f0e7b964524d5b0f6ebf0c5b4
SHA512c32e05f90bd294d7c0053829763252fcd8017b71342e62d164fe7142832eeb9562aba9a9417aafdcb1662b41da0ce64f70abf176f02013923c761cb349fea9eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e64f710626bae8ac6f0badcf354ad5b2
SHA1035e61037193546da1f37b17c0f2ed9effd367aa
SHA2561af9fcaca9d62271c31a19870f71a09074609cf39007ef727f211df0d9cecbd5
SHA512dc1aeb56c5c32ac47b56c510d56d76ca6868489ce91674849f72e999dbf41aca3ea0ff13076f6a445500bdad2a264a86d6781bb15f0e5c13578ac6c8387df67a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b