Analysis
-
max time kernel
137s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 18:31
Static task
static1
Behavioral task
behavioral1
Sample
7539d45c118233917dd37bddedf020dd_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7539d45c118233917dd37bddedf020dd_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
7539d45c118233917dd37bddedf020dd_JaffaCakes118.html
-
Size
26KB
-
MD5
7539d45c118233917dd37bddedf020dd
-
SHA1
b7be482cf8aa0eb694d48b10c84e9a45d45f2d4e
-
SHA256
1aceb83e5c5390411839a94b3ff0bf3514e165cbb84b0f459c160e242979fed8
-
SHA512
879de1a6aed43c8ff70dd542446d26670172e54cd4b756b81a73b09372aa0c4dc8de4f68ed176a1038605e7827b99bf9fdc303377356c1de9ebe569dc340fc9d
-
SSDEEP
384:4+QfPFd9QZBC7mOdMgQBKfpC5IgSnbmFe7Acxc6AskJvAgo0iqAVPd:Zcd9QZBC7mOdMg1pC5I9nC4WIP0iqOPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000bf45c34d7d64ee15fbc9eaa6b35807c9592a851a87ec9df0d91db2e1c3fd4284000000000e800000000200002000000011c1a7c511db5e6fc74921c347d94f52a1734ac62edf3fc7f00a1b44ef62b5d020000000c360462f876b61b3dc76307499c8d809050d082d2b39ba0e79ea42425634acfe4000000032264b6ca168db00067943d45d5e1e371eb23f0596bccee3a83be1cfe26165d50fc4d86dc0ae04732ab8e878e359d02b6d2c11ad2ad2b65cbcbaf016afbcd842 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{19A31231-4BA1-11EF-BC5F-FE3EAF6E2A14} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428195944" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0919cf0addfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2500 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2500 iexplore.exe 2500 iexplore.exe 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2500 wrote to memory of 2636 2500 iexplore.exe 31 PID 2500 wrote to memory of 2636 2500 iexplore.exe 31 PID 2500 wrote to memory of 2636 2500 iexplore.exe 31 PID 2500 wrote to memory of 2636 2500 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7539d45c118233917dd37bddedf020dd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2500 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5d439ce8e59b32ae79470ff00ce91ef
SHA108a20b94a301073f8627ca897cab0c627115088e
SHA2564e3d67424abb23b8d5ba8389abe9666a504c3177e99be37fbca7c8d2592983a9
SHA512351f7b287a59d4f72030447f7d0508136cc480d83cd10dca3ba29523a2c8f407a5c6c9bd26ee55992f7c8b3cc8694c935fbb062ca909ef4c9c161031786cadaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3c10720f856331b0bdd37fe6819fd41
SHA12e4a8cfac30b05b8e8928c5f34eb9495df7190b7
SHA2565c1d42e8ff1e5c10daa377dcc01a06ace5c317f10276d6f1c328e87091161b9f
SHA5127864f1add02857dff989f0e132bbc3d0e6417228f8363ef07e7fb534b91159fb48b7d89409a43dac137b4e36e68f50fe2688514f9221c701333b1d4c6aac9c4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521328dbdb8e281bf2b35221eebd8b846
SHA11d362376b0666c063975d1ab726dfff2c92eb81f
SHA2568e1d021414a6f45c6e8bf26f01095e35b61214c65993c35a51b403e47184bc87
SHA512635cfa1c311643baa98673aa26928e9f5cdca1a6aa245ebf0802f2a43c3d18297617ffebeb9e47f63ea36e9bf8ffb0c4196ebcaf62dc1277c52a0b73042da456
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5405a9ed1e0eadf4710eb5ba2f9e8f960
SHA1eb321aced60aa3d41152eebd343ee989431562b2
SHA256713a8656c612b68e7605eddc1da83f0e499490a65332c66fdf268caba437c0fc
SHA5128a7ec57128f3f375cf7c3d03d328649c40382c279d9f61ab51f7e1aaf5dd705098a78b0d7e1c2862bad565248fc7e2fc739d8ca4b9bf8e33a9407206aab40cd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5301f15f74be3f8dab9a8d6ac43191065
SHA12a7a867daaad2a56ce60cfcd978d2f1655a00cac
SHA256c699d9d4389e1448b27e79b9e24a097b2014b330ed60f2c30ed4b51e116e03e9
SHA5123a8bbad4a050c7878b5a63cdf10fee5ea053edde3c9ebac4e9d1c66683351df8e25f448f72ba78896772381ea443f2e4d10739abc69b0cadc60887c1a4cbcabd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a34d813123bc745ce79b6e7607d8d9a
SHA12cab0b1658e690ff3f3680a73316a3c53ae2f126
SHA256bc7784bc7e2f0d5798e0116dfb41aa5868df3071175b1bb037f49d275c31e78f
SHA51217de0c7e4650aea4475c688a32ec1dfd3d22cc7463df27f73130e012b3728addaa8172a25c74363303f18f05f95816088c11ec738e93f6494774209014f3765a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589672475d397e48170b693f3c3b5f9a1
SHA18321d11de0d07bb3ea367fef54927d92577103f7
SHA2562099c88d8a4faed22df65e9f838dd6c065d63d1180dd7c22bc8c9327138feea6
SHA5128a25b968bfdbab23e08945f76699c944b43bffe17180c620f84e9906fe03fb866928e8d9b23d29dc8555c9ae7105e16141a7fc9f48c929fd6018b4592f8ff1b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd2d600e513abe3d5cc6b3bd5d386d60
SHA1eaa3b6f72d86ef4e566990ae44c399342e5c5c8f
SHA2560292ec0a32c449f8cfacd8a281293b0c35299b7aa62d9d4c5dca3e8bf694c23f
SHA51241bceca3a5ed393fc1eca1151d575d55b0164aedaf6b63da105ac376966829479441cf8f78282e265112020899a83cdbf68d5549fa435fbcfc025b1b8887e8e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56747ee70f19ffebe72863791e786fb51
SHA186aab5bb670ed85c005052d22202b133dc287b62
SHA256225f246897723c670daa00ae3cb3f7c7434627581baedd4a63d90b446741480e
SHA5127c46ef64ce0b670da0bc9ed204ec2ec25508d89fef8a768e13ebad071a25aafdb21a8e0d2f8a72a93071ab340a7c136ce48cedf6d62294da56bd4d1ca39467b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7925f228267572652237da95c6bb31e
SHA1bea921de1ff06f092dd1b67c0cfec5f78f8feef9
SHA256fabef29eba1e4e2c198ceb72637556c978c8ed0d984a126559d3bd0049a4efb0
SHA5129598d34fab5f518b451b82f78de7722d9e04fa8fae1584ca95741e44386a5b234f66423d0beeef9de48bf4f018b416f773cc6090ca9e5cf4c94d16496f5add9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d8ce579795abcfda97d9f2f017589b2
SHA1eedbd0ee62e8705de163b19de37be571d28dee7e
SHA256099e2a6edc244723338182fbd49267a55ce956a0168f773dd0378fef111e9e22
SHA512d3d64a67629c6e4a95e3f04d60c1efb76efb4a34c0cec17c89048ed5ada009d6d5ea1230543e619fe7240908f8cc44eacd1091deacae04c9a382a04e37402823
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5537517f6f170027ed3d1975db1423428
SHA1dd730882e03e6d4174fb7b12cf084542c997d042
SHA25651e4a7809400cbc305fc8072f2dfede63a5e2043e04650c6dc6acf206f8538ab
SHA512c4548e167d903eaac18f74aa96e14f1178fefc281a5668b9014a3410f12cf6544bc9ca4e479ff69b0258ef3896c855214cb63ae5be190cdb4c9126ae156f9a86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594089ebc5f5741eff1077507575e31da
SHA186ba8ec205845be4f8a96c15bd179ec7090ad571
SHA256baafaadd66164587c923c5d7c6098b06facb98fbae6467fd20e900e4e221de56
SHA512a416247e9173566b22bd0e2dfc96e5a4c56f3b010f3f548dd78b2134f51f621f72ce6d61cffc72493ce30900466877f1a7a0d72bedc4d3d6e191ebb0c7bc7f5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563758e5e6bb7c962176ae31d9d50ea01
SHA1f41353a3e5c034752e46fa4f219639d0c5c20303
SHA2560af6defd499551ebf99b55da56ab0c5d1b8d43186853ab00bbd7071886b4ca1e
SHA5125b6ac157dc145dc8653ba0af1c0bea2afc47386ddfeb4f5c9b5fdaca3facdbe32ea61c674ab15a2cc215113821e018ad95f76b4b94d07743dccff5a68630ed37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8f7c057f9b57f7d626baeed6e2de26c
SHA1bc51f17e3720ad83a5d9ad42fb364ccfe15c8e87
SHA256c56cae532a8a597de8ef291320cd209ae411f968d2a01b29404ed6ec3f487fcc
SHA51284aa26230847f46165716f6276277b84d5c6a16aa5502ce5400a008b8a35c289b937fe1d3f5ee662712419d589ed35bb9cf79fbb9293f0c74c868d1036db46e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a452c11d5f927d0942d2f913ac70a9a1
SHA172f4bf2b2b621fac6eff65f0ae710aa09de290f7
SHA256b51bf10aa68141bb23615535954ce0119897f5542894bd8a7bd9a9997c48ab61
SHA512a891b728e81ebc3d7a62f6429bf934e2e990c384eb296bb519d3285048ab8352509b8deec521fc8f2c2e83b12fde669d5d6c57dcdce4af3433675ed539db5f0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518db09a68a21aecc7c6a5fb384f8685d
SHA102c593823bf613efaddd85d2d4cd55716aa8dcff
SHA256b42d9f0112c0e857d860d3dad105422e61d30581cadb96c0fa605671cc0fa6ce
SHA512d65cff2384222c80072be017c7d12b1bb69d281556fdcd74a581d88fa93561749bce558c1381fd8cabced0c1afe9864db7917c6bde5f008aa0414418afd534f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580e411e9095f72face754b71252be176
SHA1f99fd53825fa9eeb5c3c66a7650b2ec9d0124b1b
SHA2567bf37bd0ae7fe696b97a032352967af42e9a7811060213f4c284f89b677528cc
SHA512fbba8e4ae5f0461e6f9df35f4e602742ab059857ca92fad4d9f29af9e30f3d06979dedd1e39f6fb656037df276c39aa7109e573cf7787660509d54af1b191231
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592892c1c907b06f7f3ff724233a49e10
SHA1f81f007d38bab74e87b44644116dd135090b7946
SHA25621ff8300715001dc9465f91505566a642919debdecc27a5673331d315ce2e200
SHA5124058067e84b73dba272d4a633b9a6f72964a271858319f02c1dbae9d66fed597c3e81165e0c5e820690b6efaceb013d543c9178c27bdddf56bee3c9bb0f7e87e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b