Analysis
-
max time kernel
135s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 17:32
Static task
static1
Behavioral task
behavioral1
Sample
7507d4b158c2f831aa344ef5478ad751_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7507d4b158c2f831aa344ef5478ad751_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
7507d4b158c2f831aa344ef5478ad751_JaffaCakes118.html
-
Size
44KB
-
MD5
7507d4b158c2f831aa344ef5478ad751
-
SHA1
ca2113897b23e4e94e6c4ceccfaf02ac9c3845c9
-
SHA256
794d649d9a153ebe34749ffbe3dc8852c9b6106cb5e0b701acc580e1de4d06c9
-
SHA512
e1c58a1cff25d90787188fb92099450e67cc28bc34f2fdd9084a5c33f1628b7fc5beb8f2a61f0e0c72bcb6bb6954dc069e76e337d8719c513baf85d179561dc8
-
SSDEEP
768:ET0Tcv8J5JDmR7JUnYfFrtAhXo4UfPqJMUjQGv6NM:EUJ5Ml+njYNM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 306e4c59a5dfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{84A24D21-4B98-11EF-91F6-D6EBA8958965} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000028ae1dd3c847ca9ed718ad826c70966d77ef4b5deaadd87952c5e4b432a65e50000000000e80000000020000200000001e780baa4317013d94b0b7f4ed7f4733be0a485757a12da5fbc93d77c24687ef20000000e17baa505e129063292dcb62bb815c8dbea032044cf2c1d5e24fa75126a14c28400000006fd6b68d8462a6807d3b37bbf38b06c115ab363a3ff3acaab11ae31eee0a781800c3bd76c40c60087ff20a43efeb0785e935f085298a9986131843bfea6fd0fc iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000b553a7728dd0eecaa929f81b9e397b0f508b06d37d3cf4a4d831b8249ec18052000000000e80000000020000200000008583e6a591b4f4e683e019106b797770a87a32f0dcf43841f58ffb1d6472bf5f90000000a4a4c051810510b4904a634db711dadea64bef7d48066154b6bd6a0cbfd65e807dcadc4a83a24f0730d9ca388591d6e6925d2c73b9ee8fe323565878f34479112dae257c6060fdb3101d7c82b656f7d063c1ae95c298f18dfac8919b9a9744369e0bc706fcb48eb1ccc1ddcdd369a0205482b8288c2b3e815ef6a22da558dc7ed0997e188ab49300d45c7fd39a7eaa4640000000746955f9043fd087ccbca97034954b3b0ba8957db5ac23d83acba1e181378f854e4a136ac44fa0743882e88567078599a5ab09ef39a92c9784fc3b78a2428d4b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428192259" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2512 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2512 iexplore.exe 2512 iexplore.exe 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2632 2512 iexplore.exe 30 PID 2512 wrote to memory of 2632 2512 iexplore.exe 30 PID 2512 wrote to memory of 2632 2512 iexplore.exe 30 PID 2512 wrote to memory of 2632 2512 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7507d4b158c2f831aa344ef5478ad751_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2512 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d7797c2c2b68edfa293a1220f24906b
SHA1b82713a84a3c6e6f12f5e0dd3b6921a22720436e
SHA25657ca0a1b2a9da9c1d602748fb50690f586f41c63669ee60d7056bc9ecc63f327
SHA5127084da78ab163271b39aefb93ff243ca39b324ff652d0eecfa3ac10c9becb94ca8158bf54b308caf004976a0748b6d5cb85cc1df63c09a8b64d92c7c765c4888
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5193f409a475076540e0891dd4139a3ec
SHA12e161e6ce2eb0c768b68c01395941ba49bd1a5d1
SHA256407742fa08e8d7ff3ba62889a875ae1de5c294137fa48baacd12164c7502b12e
SHA512a6e8b5525ee8e8dd85c84fabb6a4e23424318db4339bec52129bb17cb0fc68ef7bc8824302b24ac8f8188984cda47304b54b72d448f8f90545acd04b0aae9367
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5347d75efb816f85c9ff94851b1d45001
SHA14c80a16318939003c114976277bc7b2b51f47075
SHA2569380a8d26f2f2a87efc3851d54ceb39aefb13c3a1d96cead87a9acc71ea9bad1
SHA512179ecfbbdace8c98b80d6dfab4beff27932881805717783d043988a033173b8c42945a72e70cf9a3058f85659a246c88fc4002f48bcc6d69d47b882e6d6acbec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5135f0b7ef8d017eabf6c61dd0282c8cb
SHA1285e32a336ada4814e3db7d0ca818cfd6b8b96df
SHA2563c307c7ab73db794b5642f1066c3cb206505a0f3fbf39457f832c38df856e906
SHA5125c4c0ca36b2c7cdde45000f2908f928f74ba69dff0050ff3d569ae5d754290619ca436357943078d6b488bddfa06af30af88fda888a930c2a6fa745420284ecd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582d5e304a8c0abed4c2fbca809ef5dac
SHA1363c2527b7e6b2dcc95b6416f1404dd7c80cbfa4
SHA256c32f8f4e074a58a24781506dafee7beca212e3689ec2c62d897697f0bca70a77
SHA51225a813df2b5566d8a08ac1d352691bed839544a522e3c4b9e2c6eb7f506a177c0540e00a96a536c2b8af153023127eef9f0e509f5965645f751657c28a2ed755
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519592f53666e96c9b6c791cacb081f9a
SHA11a2f43749d20c811ea9cc5d23a7037aae90f772e
SHA256c5a223c6eeede78c4aa08466a41facd602d564677360737adaacd3f368b9b33b
SHA512bf3be25cc02f3a3958d46b89da684efe3c39a34f8b0bf82d456228d3fe357897de7d3856ae2375d67288a41b0a41b311686813b1b90f8766fed6b75fd0bb912c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58767f119a480c9b00d22647526e1f16b
SHA15e4e9cce0028ee2863ae227cafffd8b68568711c
SHA25685e1e9e2fa73e59793cbe3704763e62805385a5543a420aff9637119ff60cd9b
SHA512961b2f668a84724d659563f4c08bd05048d4b547b7e292b4d9929410ea44e2f62ea113ce006401588c49210494202b68d9714ffa07a648b28b972e0fd6697d31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b7cef76d0f8fbb708d258cd72a1df6d
SHA1d59ddc48651348fd43ca077ed0b683e556b18d7c
SHA256bd51512f8155a2009dd63408fb092d5e788370954c5b8cd07797e632682181ec
SHA51296f24553a044ba9f9f16384ff4550cd88d364b300b2abdc913b1ba12171ade73cd31cb713a7317a0ce95d491c6930552bdbc1c42ddc0d00c0e2e28cebf7433c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3b8c7c6a496bb135527a79e9c6f2285
SHA1256895de3ce8b75ec49940a9f529c68e6078d5ba
SHA256e6cf4432925a952e5581d44ad8c30dd09b700da571d40001982f79e0fc5397d3
SHA51274597574511d850be56520013a15a7861ca104fbb030b4ed3602825b4aeab65b4864997b59555779d4a27e2907051128d529aca4f99595bb772aea5f8279796c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d62b5eedabf6092fde1a3222e8bef376
SHA108a8adb87405c0e8da6dfc6c55b48dada1392721
SHA256eb884013ebdd959c6394348b5f315957049a560a52942a42181426b4301a0ea7
SHA512ef788eb056d3b190846fd36784480c03e5780cd436b22e811fa26e9f68747284610cd983771372d471f1af84cf40008f6016c932643a7a3e2d6287ba84bed88e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c2c9cdc210c6cd3e993dda2270f3809
SHA1e148df1a267404d0b4bb588ef3988640b79cbd3f
SHA256bd358122a64bbf3ec27111534c8ce52dccad9a5135c408ca722a049ec71ea357
SHA51285f2e43d8a50480a8e35890587e7497aace815d5360659f336ab252a003652174966ac18e568592a3a2c82d4f1339b778e717c44294f3a0fcc655919dbc44fbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d73ee5ac780166e645e42c7680f5222f
SHA1b6c415d5fd7a9c4dbf16983086a7d643878c2c85
SHA25672dca749fb3bd70041eca6987e48916f84fc0310a4d04b2a12b4d35352642ac0
SHA512763dc3e846d6f57d540be7980a48f4f8c5022ec463bee44dde188843388ec7d9d336e712ad9c382274761eec336aa99afbb60fe39549dd5211e8a37196225009
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a69e856367eb3294934b055f9b9a9c3
SHA192026fb601002b1b2e63d6c06b331def9f2eee3d
SHA25635302dec4a25806158cf3616ee4381285906f3fb42ad5fd9c4cc6cd7abee5d5f
SHA512ca232a7a3e424d421757f601fd3a22cc1e02b55264df6301322819e1ed54bdb6df4b8e532a80348ab9c494f0c9e21dd023081ed8341cceb054f20c0703ae808e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bd12c0555ac0c50b3164499e3252306
SHA18a97a968955e8cba59f062f86551bc1d97bef1bb
SHA2560915c95a86c7278de6c69cd333188a56354832a12d758794c6535565eb65157c
SHA5122378de8716d452f28eced146bea6f600dc36d355c9b42352a5cb98ff6a94d75ddbc7e392679b2766c2f90c9f0c866a73429605ebbdadd2a092fb1502cc5269af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54722c44fe1f85c3b69c64387228f3476
SHA142871e3a6a77db1bd848caa3ab814feb78a857e1
SHA2564e079a528b88e28883021c4c71667295fb208d0747e064d822694faf7e76bb01
SHA5124d400bbc763062f810fcf2bbfc78ed8c5c0e8d740b2711c3a92caa08c93deafd390636e3760d6b653575bf23ea27b59626b1156b54cbd5ecbece12765441e73b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575238f9ed82f6170881a80dca8f9b516
SHA1647d6f44db394c1b69bf26420d59fcb5858a6fb6
SHA256aa379609302c266b88024d0100dfa4b4e96292b3ce1047d93773a5083af07a00
SHA512b9c7918a276f85de4fff3938512f2bbc12d6e0483fdad8a7af7a51a6834de10a0ee3ea63c6c9b85473f24bf30012681d478f5a105dd4a7845347369fc667759d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b