Analysis
-
max time kernel
139s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 14:35
Static task
static1
Behavioral task
behavioral1
Sample
747604a91cc1f1ddc1c78cece9df1fd3_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
747604a91cc1f1ddc1c78cece9df1fd3_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
747604a91cc1f1ddc1c78cece9df1fd3_JaffaCakes118.html
-
Size
11KB
-
MD5
747604a91cc1f1ddc1c78cece9df1fd3
-
SHA1
3d1f43c0df4c8ea63cf535338ffa8e2b22b82b5f
-
SHA256
d5c565ebc2fe98775ee30285498d9f9904e54fe6d02f69df04eb70dc10408ab4
-
SHA512
7faa754e18f364f87e450de2b5cf956ce5427e1a890cfed4668220c08283c75e75b332ebc094be32ed1c0947b6bd64ac87219c2f67cac780935a881e533709c9
-
SSDEEP
96:uzVs+ux72jLLY1k9o84d12ef7CSTU7GT/kqBp2IZLOiedxxWQLiYNCa+RiVa7ika:csz72jAYS/CS2IMxWAuLPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{59947761-4B6C-11EF-91EE-7699BFC84B14} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428173293" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0a7183079dfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c70000000002000000000010660000000100002000000073b5536280c8972119c301fb80cd67f2d875e0b5c7b22e5ba91cfb9de6d4653d000000000e80000000020000200000009515ccbc2414b8975f0fbf095b1b07b5bc64d169e20d4f2e0bd6aa1b317dcfa52000000056076232b6e6e2b12e047f65e46b0eca77c1621825cdef8fc758ece18ac6ddbb40000000d3bfb0f3503ab9db2d765360d7d98a0ce55dbf8509e75a33d70cde69410477a41ccbaf3e0d3e3042db496592a1c2ea84e60830fa001bfed62ec366e6d66828d5 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 756 iexplore.exe 756 iexplore.exe 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 756 wrote to memory of 2528 756 iexplore.exe 30 PID 756 wrote to memory of 2528 756 iexplore.exe 30 PID 756 wrote to memory of 2528 756 iexplore.exe 30 PID 756 wrote to memory of 2528 756 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\747604a91cc1f1ddc1c78cece9df1fd3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:756 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a93ec1634571a54d09acf729b30ac36
SHA1e62429484e4f14b978f2e0617e43299a9f95374d
SHA25611953d3bbf5ca637907aa73e457e35fb00aa36e81c148be20b976162f628b638
SHA5128580074509b757eb804c6732396f176ce91f432da0ee3e7eecd04420c3d1dab89bd9fd11f95b0f0b66525c43b0219b597277cbfe547cc170be524b3df2167598
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce9ac51203edd174c83ac478e5dfa31e
SHA120fda23f6c181e7e1cb2c4d5da417fc7599a840d
SHA256c595459830a0c9dd2ca7c8ef199c1a743788f1dcf9c9bed50ef5f55af280e6a4
SHA512813c776a2eb0b3c44c2b98965b4876c2a4aabe9ce42a94c85d85ed3ede6d9081663f4abc577061fc391c75edfd799c91fdd6a292103f95fc44e722454d96f591
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dac75359dcdd60851f575789457e1ef
SHA14d10fbcbbee31a2bb429fa019bcbbb5b730f129c
SHA25658664fad0c88f6a1a6ef0184e8d90b08c1f854eebb40974a4380559c2a23e245
SHA5129c882d1c469755524f3a90cb0f8ca27c45a4b2bb4a9108ea6611215d09f40d40d955b99596ec5b20b2bfb6b34d7e27598b0a584f90bd89a3df47b65ec6b0fc1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bb3b8d9a26a2f8e9567be11d6491212
SHA16a0e8b29a09529e3ecf792612c08c6ab9b8c9507
SHA256427ddbf0d584366fc4be0a6e6e06e012187ef636f7960432db3ba4c2ffd74f89
SHA512465d0c5c2aececbb0d532fece6f3a97833760106b02b4f0ca2b6a5357e7f41e003e34dc855d5ddcac1456f147644598684e5483a15a90bb5ddfc333037267822
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53371d95cc1173f1fd370ba8e6760457e
SHA153cc61598f6ef01036a27813171db803409cec55
SHA256e4e215b528105a47e9b58e6a8a851dd6d744b98b7c2eb4907e7fb89bdef0d7ef
SHA512a8bbef42575b650708fea0466ee036d01d4932493b65168d49e7753f15d61a2fd65c3580f93a6b8064031082287d339626b986bd4c8216139a9eeb346fe7ac65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fabd51046697b87928fbdecfdad43a5
SHA112820d83288f9cddeb747f7d3d46ca89cf74260b
SHA256ab06f4d4f4899c3b89848c4301561a7c05cf7b69399c7a459fca2c32307c58ee
SHA5120d0ee981bec55fc10017e1b7abe3586e00266519718dd592d59ac516427128153f4a5f050991786bf82ed2bb8b48600dac075a471dacb0c654db017666875f49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588248459feb4a5b5c2c149b88490318e
SHA190fd3d7df8b7d56552b5ad9521e49a14c43fe9eb
SHA256db3e9ca11c69b3793bda17695a1b3dcb29c3fb7bf4771f64f7a5c068ab919d78
SHA5120c4a6f6ed2e8a2c79c22e65931b3876ab2dc0645690cf7f8e7965653f648c05f43e5a9fe9b0bb149d619f3a3e8b275463d83c33ed1950abffc4510f39d09c581
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad501db9df7301c8dca6080285683fd9
SHA1ef624d0691bb2bb461184b032b1534fecdaa0e89
SHA25666dd60cb97737e12b1a76a73bc576127fe76e22b81b0678e24d951907ab6ed97
SHA512a47436962d8778747e656d64bed1e08685723b2d33d03780bb31f80101c331b36d1b2b22ac9b9404c2a1f0cb856c6d8d8229284112cac420e7ba2759c392fabe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da826c969978111ea2e4a119af773a45
SHA19aa6e5caa7a7668edb88d0ee2803342314a3350c
SHA25675eddfd2410170e232985a407672ccd24f3f4a89386db76cbb35d0c402b1715e
SHA512b3a559a0645f370dcf60f50f72f2f699225423ab2a1244a757394ed25565c4118b990e28ba5c438554816bd210b42ecbc061650444da4f8f4567ed7ca6d6c4b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d7f2dea9c731b2b7e649ebefed7a856
SHA1c8bc6a9e5df8580ff12a1e4f537bab87c1cb6ec1
SHA25644b0a75ba237c992a6aeaeaf6a89c8be3ff583c27681a5329d112a94da884210
SHA5129f041ab3407c194cb9e54e3d884d9c5b9e1304d4f2aa6ecabba35790cb39c54e3d57560706137f837225442cc2fe71d781521f8c3f7da0978ec39df0056a89b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518ca7d44a257704131864ad250bbfbcb
SHA127e0a80e37af685329df386d15cc518d9e18ffdb
SHA256af3ffda393d267cea3e6aabe65abaeebfb184c943541bd358c0bfb05ceb2d4ce
SHA512df39c5632e31369e78f2b259ef9bcfb0fd3c47043de2b1ca1758fa39126e55ce70a89605cf8a83c1105ac511dbcd285e8d81b0162ac819f197ff8250dd3bd31f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d984557b22c61e67ff734fe2ad90877
SHA1d9f21b9b598f4ea0f41c4b239c62aa63342f7ee6
SHA2565c43dd3e4fdf14528fa24541e85f52058cd9ba1b06b1656e73928acd23b1a607
SHA5125efaf8e93a1c5493a62315b07c464080622f0cc87315621a1a54c9aa172521247bc1e38d40c7e161b6ca28bb132b4cec6bfbdf6ba41b89cb6034bb761cccf4ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533b57ecd3f46b485a59e88cb110aeb98
SHA1f16d311140cad5fa5532724718fe05908f086aa0
SHA256d3fc4e90deada43ff3a5698253e1b3e64701c6ccb1a2a1fe1c81faaf8bb7a3f1
SHA51255f0c7864e38f596dbd8da216b7650db92c612231412d1082718096f84080a6d9cfeb645e6616457e4a6a0486de459284a7eef8c8b5e99dbe6b99dc1601166ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a36cc44320efd5905c672389fdf38ade
SHA161ce7bf998be26e20c40ad384a661dc909f1d06c
SHA2567665745529d7c0463d979a15f56ef2ad615d5d57efac809ec1f61600849083ed
SHA5122520e9a343bdc3bd822cdc7b75720b44a4b03bf47b82d567c96a8a4ffb02db48d144b810a358fb97a73d551079a7e88ad1adf27bb3a717a6b3d3b09c0ae8c627
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0e57d1de91b60a2301b7571a5ebaf75
SHA156b900c7c524cdd481e6326185055ed5b99e7564
SHA25614b5e7ffe444f1b5ddf7efed2fa617f79db318f2ed9ccdd9eeb8b08ffee6199e
SHA512a8946a8c4633a2f8fbf0db79f13459606bb8fcc80720564c2368a4bd1b51f9fbd7ec12bcf552c623a47e29055f70f1f81047209a139d0b2d09614c783ea1f8eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525be499d9ee6b854ba774ee9f0834911
SHA17ce9a46e8a6cfe5333ee18ab5793869b96c5654d
SHA256f44a55c553f2c14ee2542fefe42495ba0d86af3abdf82971ceed33ded886916b
SHA512beacd8c7feba3c3e3d36da497799764f09af81c70ad8b56c63efda1aa35e943b6387ef6dd85ba01cb36df50c5ae1034ed10744e1f9fbdd280559a8da38f758ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5134925a66df20df52a07bc2bb3ded1b5
SHA15026cfed56da20d9b17eb19e38dfabe1d411f816
SHA25617dda2ec70ec56ef32b01ea23f121d8b3db05d6209011cfab858e450ff1b7a35
SHA512617d4ab6501853a7790da1900fa02835279f69b4d2f54b231b4e5739b978419bd312c2b7b0af4f4110013539cfbdd746f2627f901b6c9b89bfe5c151ceba586c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5306a507b734b5f72689e33553f66f216
SHA1149401251489fd017ea8471051e542736bdb6280
SHA256abf7ee32bf338a4b1de1bf3ad49da532cbe3ee9d7b843389b42b0bfee8c8ca42
SHA512c7aa68b283ba69b838963ed45480bff56fc24722f8789d8971ceafb081c1c0d57ea06918ef95c1b31e785f97c1c7e0509409c6f855aa4d87077177c7123a285e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b