Analysis
-
max time kernel
120s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 17:31
Static task
static1
Behavioral task
behavioral1
Sample
75073871f7e50b888c91721dcc8e7c41_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
75073871f7e50b888c91721dcc8e7c41_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
75073871f7e50b888c91721dcc8e7c41_JaffaCakes118.html
-
Size
497B
-
MD5
75073871f7e50b888c91721dcc8e7c41
-
SHA1
eb5a26dfda36adf5379c844a655a8c4947f3683b
-
SHA256
5510e43c24ff2f87169abe627a5f57a81cb21305f25b2616dbeae7eaf8ff163f
-
SHA512
81a67c8d6f0449f8080f7ce4b27ab5ffee3f20e7b7a2741713ba30886832b674730e25cffc92ca9bf67f6b628494036ecbb20f49f5cf7dd0aae6b28c92ba895c
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000000facdf3d054210d8dbc02a2203dc2b017ec4d8a08387d8d6ef6adc01695d56d2000000000e80000000020000200000003a36fa241aca44417dac3f1ffc2281f88a96264731b8d236ec8abfe831662ed8200000006c7ed817a94efe9f4db40ed0821baeaf2d7ff082a24ee292a9cbeb82cf7e560c40000000336f48064df7a23c5fd6aa8485291778b4499f2b037ee70e99cce4d68b820180eeb41dde896b4a50a5a81e98a298be10bece31b5fb57d3dbabdc7b60d94c551f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{401D1A41-4B98-11EF-9629-7667FF076EE4} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 506b3c15a5dfda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428192144" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2376 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2376 iexplore.exe 2376 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2376 wrote to memory of 3024 2376 iexplore.exe 30 PID 2376 wrote to memory of 3024 2376 iexplore.exe 30 PID 2376 wrote to memory of 3024 2376 iexplore.exe 30 PID 2376 wrote to memory of 3024 2376 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\75073871f7e50b888c91721dcc8e7c41_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2376 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583cf3ed1150a70404a51bbcb8f2bb7d1
SHA1712cab5d1372176020843769c68389e865434c9b
SHA25673cce172d8315e2ff2fb538ff8f3197d93c415deb484a16890969b0c2b786de9
SHA512bb287b45b31c910f366fcf38d752ae35f9f0330b7a1c0490bccaa5f26db665dd11eefe3c351373d1d346990b977ef4a183662a55399e54bf4f4d732f78b021ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5303a9e39d3e3b408f46936208ce0d14d
SHA1568dd4c99c7e20fa3a1084ea3978f7458428e833
SHA256bcb3d58eaf55d2b88f5597fd76915607fb87ac10fac346fb82dfcd7e3d3a95e4
SHA512bedfe88af3da599de72819c58236208abc29cc6404ae3061cf6547bf1f02025af39fae07f8b840d00934a8aef9e06124c92d1c6b10a65aa3c868cc2c574ced43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f022d18fe47e046c4abac718733a93b8
SHA1fbf9339436468dffbfe83271f8f56182b59ffeff
SHA25646b1e595ae68d53e14a794034447846262e509b874dd58c63a696d14901245f2
SHA5122071ac25af37205c31ff8b94fa9ecca8e9308f5dab4ad3ac6e75998aed8f84d2b16b74a393a5a759eb23c264c60e50e57166d35076e5dc3a79481e064852bca6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a36f54a16da4f96d9228af39bf27a92f
SHA1e5697eed5b1a4ea24c60d73a180a48436948534d
SHA256d5d6fe9e8a615d84770a20c596c2f6d42ab5cd4c38e1603b86d68411ed2179cf
SHA512fb424c7323f90830640c3f3f42d76b80594534a6fc512e52ec0a275943466f1ac54addb2a887464f384842dbc71fd7c3506553dc38596dd6875828a464270a0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508aa9e8e16fd9c523acb863353e22e8d
SHA195a8a0e8b274ef1bab1f5c7acae487f88a1a404e
SHA256a1b8eabe22dd1be25c25bd22eb077bb12b8d312578df33ac80dc257f69839514
SHA512038de6c15cdb9918d50eccafb9db07280288310b967f0b8a09d22149fa539dcc9b6d0b0926b777ad1ae77657d78bf0e31199e1367d50e9506de979c46c7b71c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e799ec293dd3c6cf46a78bd84b72e20
SHA1db7fe79bb3a572d6f69ce06db7fd770531d16bdc
SHA256d21f1bb1723cd2631d737d9227a5cb99de101cfa6c16b07ea74b3275fe5ee6c9
SHA51239b20b929e93382419978ec61dca1f7ac765ae8f0ce041fd2da7d901ade37bd0e6bd0ae27cfbce930ff0aafae31a36beb386e77bf63b897bdb03141287a5f75e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54eb952debb262aced75851af056280b1
SHA17ed84278f4b08e8596ae790e17eea85e7efb4e16
SHA256e1c5209c046a6b885e7575e09d7bc01eb09b1af1aa4e69cba253385972f44206
SHA5128d7d016f5116c88250d5d88a381d2e24d7876eb38cc664c50d11f259013970459e9f2e535a557e024dc201b42950a61c8f58a23043ab3574d3faa161f6909e0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5654f6310afe274bfa9d2578e2b82b4ba
SHA1616afe2726df598e71366d2ffa9d225cbfcdc412
SHA2568e0162503a0a2e89793b02504446aeeae39ca15e1c74c17248dfec21b7ef7396
SHA51220be5748f61f38b5040a0dcd663ff1ab9195af812f032ae224283ad7a2be791123f9137a38183dd53c97559406c0caee9114679c6b583195836de13c990403d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf5fc9b86ef163bd5f531365d4526f69
SHA1d9bd12aa9cfe50cbfd55e04476162dc34aa9cf07
SHA256669ece2233edf37d0bc90e8a2f7acf7af65349e7f5be527c071275b1ba71e790
SHA512382f062153bc632de1bfae1786041795c92e9a13e2ace5a2ae0ea85576a58aa1b8c0513266ea3ff50c48b2e400bc9c5ca5b86089eeb4eb930aec1fd410a8123c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5f801e81d4614941b62e9dbfd4b1b72
SHA1793bb541242d82e27a19557f39a922a8ef7a639d
SHA25651e2071849edfdeff0ff244b2e7f1b2248c97bc8424d23bc69e950964f4ab2b3
SHA51275914eaa30fa9e2ea582f2518c01be7bd0f312437b04ff254facb6807c4069c11567b7764ceee4501bf630ec07bf343d426968c8ca683687d6ed99d6d2e56ad9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4b044e9ba6d7cfdd3c7506deb9500a4
SHA108a1013659ccbea338fd4410c6e623f1445d9103
SHA2562ea568ffad34bc1bcc89379e14457c6ab9fe10d0e1f7d45efdaae986d0e276ab
SHA51236203889d79f33e592fa1015c8525852dc6b9fbcd109ac77d29a89a64c2d268b94ff5c72e9bb6d5b0349923624b5ff4c14aa278370275c7fd034e17fe3f95eac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5312621f0efba953f82b8de4eea486121
SHA1a7a2e3269d232cfb5a959c89553d4a0dd3604f6a
SHA2562df66bd00a5cd10307ff34223188fdc250c5f60b200903e680c9dff4c6d91f7c
SHA512d70a3e67c291e87806b53706831493789991224337a29008d28afa15ec05f83f0a74e797075b115d2faf7d8550970544bf83f4875fc17f0e77f2b1e8dcdc5786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585b4962ff555bd20dbedf32512b8f1cf
SHA1cd77bc809e4cc459c5d8b5e322255b04260251d5
SHA2562394b3d54e1dbcaaf951fc6b59855e9430d0c4be214f573d110643c293be6d67
SHA512ba0102787ea6ae76467dcae51800e4a87eed28c5162de585f75ac0f68e48f46234d965fee4e82fdece7410af8423bbdf5f72721531ac0d2bf837c9b4e53f1a80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58402c81370440692f520e8f40cc42ef7
SHA1983366fc5f70dfea7bc45efe501cd93ce24e2d71
SHA2564e616ad6ec23dd5f828cbc39223b10132682c691383c1e4930c2a5c16b1bc6e3
SHA512c297cc41e2e86c17671547b9f46c93b05960c75c750155d780b04f1de0cce944d1aa31422a9070e701b8a61b03e52b3322ecb2a52728071aee54f9fa11acb022
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b57a91dd9d730f12b0e0106dba238629
SHA14e65d2c3c7b0d31d886b2ee1072097a0a0c145e2
SHA256a2266099f41f3444adbe16566b0a3aece5c6f7166d9e3fbac9200a58e513e2ab
SHA51250452443dbe0aa7b9e54e0e2d2c31e0f638fd418fc86d6709b20ded95e5c2cb4eb0b3e02e7b367e8392d5a3bbed0de88f5d3afb2595f47dbc078078110d750ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e68d991d3f545395b7f9a189784fb0f4
SHA11eca69fb17e62d8bb061907bfe9c123756b4f39c
SHA256adbbfb3fa0ddee219956d115807d5394f0ead7f686cf94c29584db63c249e34e
SHA512f2e5384df45cf0df7f14eeee31ba42c77812fe7b7ee7411b393eb855e45616017d9fa265e844400ebe6b93f3b91b40f73b1f4fb48ff54904b671c5177d00e0b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538b50109a473d729533cebe0f3c79e4c
SHA18b06c217ef37c8554f4a1c32dc25db5ae4f28f59
SHA2563299f2b62ffe72d8ff96a0107da7a5424a3d9c85bf9157aba03f09db6da7e136
SHA512b0d4439a01cb72a90904a8a76106e737e96f3d1e092e81f2536a8e1f505b2702545653a495399560dd34dfc2234c9c62dc900cb73124625fb0b771c80e0cf266
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5918116f6308f018f2c995ac6ab1ffd32
SHA1bf311a02103927073ab54e06d128ae0a85c1a959
SHA2569282a8998f1ce3648330b635ad0f00ec94abc35a0ef2270bd2f9e213784a69ff
SHA5122f145dace5b8b9933346fe4cd3cd35487b76818eac32eaf44689c59552afcb87e423a86f3d973622d39e6669f6ad238bde5832ec971efa1b336fd02104efc476
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565ba9c536ac63903392ab4f5e15fcbdc
SHA1b8bd7a054a3fcda74efe1a9eba0d3860ff6a8777
SHA25673d47a39094478524544b69170b7dcfe34e729785c5576fe1948b5f2fb46d942
SHA51261f151af0117c950dcbabd542736f1247c1b982d07768091ac82a71968af684bd1feda49d8a28a950e6463c83afb50773ee2a6b38b713396972b04187f3ff183
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d21f4e0c8feb3f94d2c137ce42bfacc1
SHA1f639f3d7db61686b1fead7e3fdf71d770c70ddd5
SHA256259477d679a781afc2771b4938b6668f05b5b4965da557e70dc1d734c68bc97a
SHA51204ad0c9d67531078c67fe164e9dcc0c4b17e3031510d1d834b6e5eebf1d84df06a674547c1fb6d3a8be656948d37f614c83d68d6e38cc35308320e5d714b5e30
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b