Analysis
-
max time kernel
133s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 16:46
Static task
static1
Behavioral task
behavioral1
Sample
74e2cb973ba8e65c4f562cbd725362c2_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
74e2cb973ba8e65c4f562cbd725362c2_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
74e2cb973ba8e65c4f562cbd725362c2_JaffaCakes118.html
-
Size
50KB
-
MD5
74e2cb973ba8e65c4f562cbd725362c2
-
SHA1
b36c2287f3ed6936661fb22dbbdb30653f79bbc5
-
SHA256
8ad53856eb1871457fccac9a7bc4b6b7081054427b3cb665cf01360e50d53da5
-
SHA512
404427a5de06a325fc578db1de3fb0ffa757a6dc0b0fe98b588bda61ebde44b5369679b85b4ebaafd7d14b697b303510c7479dfc61c12b6f7fcc4017d16511d2
-
SSDEEP
1536:Edlt0KeEeUe6OeqHebIeEewQebed/eMe4cKObebeueMe+IebeLeMeOebeXieMe0x:ELt0QIhilOKYUR
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c000000000200000000001066000000010000200000001a55eda01b26a6be62f13cd3deec6823f264f8deefb7b36f8ec9cbdde75537e9000000000e800000000200002000000078390921f2f8ffd9787754747c7a9c5a71539e588083ddc86587a5e0a289a41620000000d8d77c4ec96a37e0f08965711b3974392635e78e38ae3cd520b4f5e40b657dfd40000000ec4ddedd39496dfc3149dce4f19bd491d1b8ff8afd2e999a2aa316b06babfc4fbdbfb165dc8d1bfba3f8829dad8314966670edd4f16f6da57c5550d1925e4cea iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428187860" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 909fc11b9bdfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4730F221-4B8E-11EF-BAAC-CEBD2182E735} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1944 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1944 iexplore.exe 1944 iexplore.exe 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1944 wrote to memory of 2848 1944 iexplore.exe 30 PID 1944 wrote to memory of 2848 1944 iexplore.exe 30 PID 1944 wrote to memory of 2848 1944 iexplore.exe 30 PID 1944 wrote to memory of 2848 1944 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\74e2cb973ba8e65c4f562cbd725362c2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1944 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c3507922bc23c4ba197f53214f680e2e
SHA19f45d3181108fe4a045afaa3e6aade6a1881dea9
SHA256ca7d2943c63d613a28edd18183540c503fea4e068ce1677f50a494331fc8cde8
SHA512f081dde8ccce386135672e5ff538059d86789aed3ee995769452d3f5c1b5a9396c0f315b9c0e667d6a9809921828ae51969dae5601d5dc2c089a69acfa2abfab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52af7fa0cf1980d2a95cd0d980b5b6466
SHA1fc6672c43bbad8911526c190f9a38c9c69d5a7dc
SHA256729bb8fd08ca43771af4b19ba660c3a0da82a647ef1bbb08532a5646eae0fb56
SHA5127b4dd22a44fb41c3319e17505abc15bb134cb2c439a6e45a4fff35775340e9326e7a4c182c8c5f6a9391a4ce47dfde571d4d3a8289d02517cd43f4afe784476f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53e25f0dbcbbc921a3518e3a46ef378fc
SHA1db3d2bfdf9ed15e9d7450955ebed6f2c545b10c3
SHA256e84f3ab78547f26b2344e923c655e53b26adfe352c109336c6b0f9121aff675d
SHA512b8904e2416e7d8c2d6e3e25c8fee0a50b077da4c26e649472004702bf81409a95c8a5450a48c1d0460cff553d351aac6b0e8d09af80eff9f281e1805988b6142
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52168c36f1239e5e8e965edf745d5fe6e
SHA18b2399ef770c4369bcb5c67b0e7aec6cfade9516
SHA2566a27f0d5c86208203ac42c87c8530db985941ff9a39de0a15eb6598871c7e074
SHA512fb07914fadcd7fb8ffb175a483ba8cbad5487f24b670680895043f2b0e1d8c3b239d6a6f286c8b846548578119b35b3cae3543c01aeff280956b7a602395c03a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57f6904960ea05120b9e5a6ef0277474b
SHA16a08dd2bf3a2af97ce2ed9be3dbc3b955b4f72f1
SHA256d95e174bdabf3306c4119ed6101d3014a7608d4357f877b6653db4929b7e23a9
SHA5123c5cfe33122ca0a6182423a7bdc6a4c4c064dc1932d02594e38ba0690e585636839fba5a21e668b428b26f20aa3dd7780148bdcd5c4b5a7757e21197d20e6683
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ed8a1b9c53383cf970cc74802c1da908
SHA10c62a4855b45ec5cd7ff784916da426501cc4b6b
SHA256562297700a7fd326aae25cf17b21aa4770cc39e45c6eac01c9bd04386cf0b6fd
SHA5128f8cca752606cd2b9b22f735ca8d44f4370f07acdef603901e5b45c3eb8a924a541ecc901d71f76c7b87f2558f7aca7e8698cafdbed9d5f52addf516b57b8fe0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50badd136a361acb78cc65b1e8abce8a4
SHA13eba5098fd9ec3a6abb9f0a792cbdabce3ffbb9f
SHA256947af312753e36c82e76e08de81ee1d962616efe2e8704ef7f526d965eb2ad11
SHA5127d458fc7a19924b88feaa3b7a578d8d0e6704ccf0a1828b0e4e824cebb815c60bd147ed882ba1a215a8ce4220de9ee6ab776ef45adc090ed1c403d43fdd8ad91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c782f56f20a1e513c00ce6ad54ab780f
SHA17911de6c88a2eca078c37ccc22376e8d08ed17d9
SHA2569a3b6beda565bf549f364ad3bf7ec50e2015c0f55753f624eddaa5e49147be64
SHA51266e59abec02fdeb8df725a77a5c8576e34cd303b2a1c41a29c6b4b6da13366719dedee0a3ef7bae49f9dde4e65f53bcb53e2d589a7b6bb223709f3df2f83a1eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59bf04f4f92f35b3adc3bc2f7941071f5
SHA16dfb4c08d356b16886f2f3bdfb41da72539c3148
SHA256c4c109389d8f22ee641eb3d4c97715307014643c38dbf9f8c4b9fb87b547060a
SHA51220cbaad119dabf58f0b56ec8c8fe351b002c2bb402be2de8997afe3dc34df9c6f60a0b55e02e3d0d6505b426f3798740195035d1ea9b8633ae522d0675cf18b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f128343bae4c30bb0f31de6fbcc7abb6
SHA1bcc9e9143fa66416dd6a97e7e1b3e8c46d9dc7c3
SHA2569d1da6aa8e1e9126b2570d227955ca8949e7e3c90d9f72bd81cbee5a6b90d3d9
SHA512340dd52d3b050195b795803c796feba14cfba0db84587bb0fea8f347edcd3f6e77eb4e0de7a55d7b80cedce74c6113ba55a4afbb406fc69c414d9aa1b0501b20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53566c05ac8187712036a26c6122d5a7a
SHA173961b7bae0e55485124d72153e3af281e22cafe
SHA25644cdcf2c96f8e4f174f7d864de2580cb8a405033220a7a91d73282b998b1f331
SHA51222389724c4b942514f9b013c349e2a759240aff7afa624a257319f7a22be7c9a4f926b35c2716d0e2f28f426d0dd1fdba7009d4d849cbad3a616bd1b196e2ef0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57c01744bf75b035550184345525fc059
SHA184e7af3c48ecd6ebd6e899773244edbb19276cc9
SHA256edfbbc49705dd2881e8bf901088bfb61d2de757008799e978689e9f3760b85ad
SHA512f72887afdd954b2416ae9064a7a976ae76662f5d0ef5df95dc41c37e99770069005737bd654bee9f113cd5bc37024c042572525c254eb68214e41740ba303846
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD539d623569d6c5a15517879dd9ecd6d76
SHA130f84dd3a760afd63d98f9550803fd74b6732c88
SHA2560765fdc0812c7d07fe74a84184909fcad40ea4befff6b555a8ff4bdf8952b66e
SHA5129a150050be95414ec322c335b3d46064be95daecf868e5ba4d609960a8e2e1acbda2844858b6effff0f6ebddd5965b4a81053791e89306c03a6094b724568a16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5da982f43c3744365593f2fd8b6e108cc
SHA1bdc72ee6a562219ca4062539e8eed2351f13c704
SHA256aefd184580fc68528b92e35dc9c1d998b45e0d7c81319ce9bfd2b7e3c5d5d9ad
SHA512e02e2f533c5353af8cff456c2d8107b9ef92de59b4d82539e487bfc677194dc0bd3ddb32e0d94521c7c45e66a79edb0e7c776b94fa44c0f7a62a831444efbcf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD562d18417e584de689ddccdd9ce075d15
SHA17d021a54b282c9a67b9bbe68b8d206b93d68a685
SHA256bf26a2c09f6f687abede1f1acda3d77462cf33ab1709d4ad0f6397eb72ebb811
SHA512720f91dcc16ec5e6df62dd3307eaeec95b24a094bf5a2ca4dac83afe285165fe8171a7ea92561885a279a7a2160ee7968ebff1d26a02249c85acd329f19b2622
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50053a4ffc28c14a789a1308adb24eadf
SHA1606aaab0cba7332bafeae51792868af0452405ed
SHA256e9a0915a0cfe59e6cfe7a7073804fad4d3ca63a04202ad631fda38ad4059c1df
SHA5125ad9920d3eaeaed457d232a2d5e1b3eca2e5b9cdc5836895a9fac3e17f4c1fa9c56e88ab8e75121551aa205a3d952e3cb9dd8ce372066092f107f06cf0b32d50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b3c9711b2f7974fc33deef05cc496062
SHA16a12a5fdcef2e497dcd6820b50a9794b8e415f51
SHA256b4ab5fc3da0137aa3692fdee3ee9a07f03543aa2292a1210dcbc3cf8c493013b
SHA512aef0f9847f0632ea47459ff53537d9dd0fb3bc2d944f9cf4bb1f4dd5e6e30b89c2d57a44b6b50272f0a3cb5b7e9968bce6d616a0f4afa6a945929060576390c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f191fc2968ddadf5059f8a61e33fbabc
SHA18b8e6cc998d5b89924797709f06265f8f1782ad6
SHA256408b5e4aac56eab30335607c6ba11d2f1890abced367925112526cee31707c29
SHA5123bbce1efc6d5e9ce28fc93f9231708ea7a1911bdc210327a0c1240aaa9b54f10836f822bfe88a441974f5541754d0806112583d4a68fdd9d6e9d045b0dc5bd15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e2e2e22f2519b46407b429dec69bee5b
SHA180101b19bb1e08ba4449a0099f8c0b2115ed38d1
SHA2560b9d44bbdc48319493c7314df1f39c0af59c60d16802d174e8b4f18fa9a9d7bf
SHA51243d3dec18cf0893870015e32f0ed6d51fa71f5afc22cb632f4017ddf7dacb2f13db21c2493f148f61a30a5c85f7595c22a5afabcaa398f014cf112129409b1f6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b