Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 17:59
Static task
static1
Behavioral task
behavioral1
Sample
751ec9875b46ebf6b29600cde2521d70_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
751ec9875b46ebf6b29600cde2521d70_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
751ec9875b46ebf6b29600cde2521d70_JaffaCakes118.html
-
Size
53KB
-
MD5
751ec9875b46ebf6b29600cde2521d70
-
SHA1
6b90658b1a110e71b357c18cc7de348417dfea99
-
SHA256
c036c39f834f6936a3b96bccdfb462968feb8c3a46b160113c51bce8a941acff
-
SHA512
5183fc344a52a3b7e0bbaa9e061a3d9735dc03c9badcf800f0374ede70287ad120bd69d73a26098e2f868e3ea6a0e6dca1e16b2dbb97f2d01553548dd60c556e
-
SSDEEP
1536:CkgUiIakTqGivi+PyUYrunlYb63Nj+q5VyvR0w2AzTICbbKos/t9M/dNwIUTDmDb:CkgUiIakTqGivi+PyUYrunlYb63Nj+qu
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0e51fc5a9dfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428194155" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000048eb108265052a2a0837558db9822ed97b6db1754d64752193604a10ac2bcfbb000000000e8000000002000020000000cee25ca97aa280f8d66db86a0f595a68308a107d06076d25704a10a2e3c2b66620000000e6110eea0a1dad44fb72d21657313ba2e2575f566c4e3ed4a8edf7847f8b120640000000ed64b951bf51e356d00fe636438650fbc443bd2c20a9ac5f88aa608b4ac3564f887bbe26cd8e2f58e8463553b9cfaf0b25806e79d682054b448848a6add6a859 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EF469B51-4B9C-11EF-8B6F-725FF0DF1EEB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2708 iexplore.exe 2708 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2708 wrote to memory of 3024 2708 iexplore.exe 31 PID 2708 wrote to memory of 3024 2708 iexplore.exe 31 PID 2708 wrote to memory of 3024 2708 iexplore.exe 31 PID 2708 wrote to memory of 3024 2708 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\751ec9875b46ebf6b29600cde2521d70_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2708 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2bdb838cc7ee0412fd6bef0d2965c78
SHA19e99f1b19f83e5212b8e58c7fe79e37ccd73a169
SHA2560ff78dcc848d259c910fe5178178e42d6796a75453340d4b0587459a2d380156
SHA51242ff9d57c1ccaeef39d255983dcf9f4c01a45c418332d4d624f0d61cb4d3eee4ec51f6e452c9edd89a6708d034895b36c66329c039c0c4cd11972a85b3a8189b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b2bacdaa5e90dfd367673f4383aea8d
SHA1048edb3ae01798025a17c045cdad3b54289f6ee6
SHA25644003b069ca4ae686a1c1a6bda53d7580bceaf52957b30b5ddeb932ad74540dd
SHA512d6debc938558f8e6816ee13526ffd64183073fbde8ed9ba0359ec0fc0c7f516dd274487eecd9c2bca99d47b6185869e4557f801d1c0db7de2f17230e5b79de1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c14a2081cbc5f2748c03d51b8b59aca9
SHA115e2b06a7aa63b8a1186d56b5214b158ed04e60b
SHA256ce71df48da08301510cfe2c5fca50159d49ae06f2ba18ce379c5bb4f77415ce6
SHA512de0e064ee7de6aae09eaefa8eafc001c64acb6a30cc78f790a88a72460ba7c66221538931cf02a7802144e011c0af3cf67dd4f0984f02fc54760c0068738c45b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c63c67a94dcb409c8c0ffbc9f9de9a5a
SHA18dc154fc754b4e4cbf448a816750cc97b76700f2
SHA2569110db65a4601391d875620c9fa966c8990c1ad74d756e17035d9b85433a285c
SHA512e8f9cb626c4e1aec5f56298d07644f380d122de53645a67deb7e1cd3a68a7ebd4c87d0ff9005a1810a9b0007acd684f8eccb0d91852fc21b1292ad5ce5cf15b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58971d83863ef5ba0c257f83fdaabc383
SHA1b50d61f7fc6daaf8bbfe39aff13f663d9dc38db7
SHA25637c7fedeaa242bc659106597130debafc68d30789ff40b85560a9469a0b9cecb
SHA51227f9d2ccb63a62f58b8b76348ebfba01a228528b9553153cbdede3d2b2b167479f9acc305683dfe00cdac1709158efa39229e80765bb7bb9e2518c239349de32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fcbf1ca42dfca5053e46dd2abe04ab6
SHA163f68d7e3eecb3c48901d9728fad556ad9fdd759
SHA256fd8dca56d657c03d097cf8279a97568248d2346a4f61e48929b209705b0750a8
SHA5125b38e1bef23d416c016d67872634c0adc1e3ea491951042fb244e914d105f0f154a7e627b423268ba6b934c1f598bf7a2e161d960faad603f73e01fb625c804b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8dd64b72f501bfc5a150d4a90b1718e
SHA12ed4dc9f57c7b8702f13191b8f4dc2127b30bdff
SHA2565cd4a9b619d9b5e78a753a35f465dd2fd7e8c3a6eaa49de9e8be2456dde79759
SHA512579eb966c9672f73838cc14088b5b642ecc4f50773c8e3b725f7073de73067eff7b6ff400465e5c83a29c5aa573b8cf903688c8b0de9a0a4d4bb6fb2475220bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52daf1fa4a36d5619ea1d22cb908cfa3a
SHA1fb517aa2303414bf416a9a696e37e2bace04f6d3
SHA256b68537278a6c944ff33ed5a8ca084c98c50357ffb7cb7ea24195da167b13d0cd
SHA5125895566c761db58742c9c5734309f254ae128243223b8775a096e68f8edac663a00236f5e2b5c43c4b37c802e549cc75b8530b87a993af55146dd75f2afb6faa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506556d215aba91fee3e57aca492ff066
SHA152a2607945c82bb189348479e333b4ad132f4f84
SHA2562a05b330a160e657cf30a57859a1fc72fcff8be9dd5f0a1438cdccb5ab2966ff
SHA51249ed9b6d915fe1d221ddc1696a3349f66d85db50b6ebd8c2f7b611cf3c9dc56ede8ea2f5da311f3357da813627a1d82c0a92adc300a36efb535582fdd506fd65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9d69fbcf1a7e297261e75d8daa8ec05
SHA12d61dfbf494476a3f4e9cfc28296981c9491e548
SHA2560aa35b2ce26e5fa555fa9e788afb6d8c5a7c831f2195d60c9c5ae6d2680cc29e
SHA512cc2f0ff34796e5f0bf893f5e42e9fe5cf5cfa1e94c19a34c3b4586cf93d024e50d30c6001b71b48b0d3b767298d68a30e3d6086c25b84e76ce4e1db66751c53f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596ed472802dfddd209377fbaf381f26e
SHA1a015032f67c46baa005a27ec2e20b0f46d9fa558
SHA2565f20cf54ea8f8aba260410a7d102ac08faeb42a3589ab6809ed5f330c83190f3
SHA512485418f37e6bea29ee3d0691b77edb8235e0a46b9d45299520bd2e2ece8a6d12c8f0c82309401b58e1f75fd029654072a7c09adf32e8a597c1a64c8a23219f9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5706d570aa9a8d032e3e5cbf6ef7324f1
SHA1b97534fc61a5fbc31b1209b94f530b5b61991f01
SHA2565178aa8901f5b6446f5066df0b9be157da96aa4381ada0b879ec41e920732dcc
SHA512ea487b9d3d44cc67196d2bbd9345b2b6e6617f13c3d7e81ce4ef8f41f11561db0f7a89e1e22dc0ca2056557e834ab37cca8386f028e8ded5ef5c9a43eda1aa52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576906f1f0ba32cee9316ce79774215e4
SHA1329d287c0b4d8f77fc540b5d8c9dc4e3e6892f52
SHA256ca450cacb5920b4d8eada50a82f8079aa6a54ee884e5806846eb75cdb64c0d82
SHA512cb5fa5cb9c1fc13efad37e9e0a76a0778fe30c536c59650c795f67c2cd396734989dff5bc0b239ff57bc867e3b3e810d3770432c68f8d64292717cce9ded675b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d01d7ef5bb9ce1b5779567a875af00f1
SHA1d7e620a253cdb483011f4c4e9081cc6997d90a6e
SHA256a6bed7fda984620f690ef242aeebcb86c9b025c4edb63ce5c4351700551e6542
SHA5122f7da59adb6c1e46333285dd828f51e6e75b08c5aeae0c5ebe79d696f86591ce0c718d380b229618236329591bc3fd4959fa71e6d9a942998f2a4410f38bec80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542fe321738c79639109db35c4a71f98f
SHA1edbd3f5d8b09c3740e670abdfce51364b21c7f7d
SHA256c5b2a22c5b2f00e8cffaf8358733a8682c8ecee66ea0bca3bff081fe1f9c3a2e
SHA512822c5c4b91a8d49d3426acbf7cd71d238566a8efd7af5bb60be19669d13cc40d00311bfb30b4840c6fa5cae3a0b9b20b29cb9f7bac8e8e9764a7e932cd4df0e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5d1a0766693059247d7694ea9eee686
SHA126e7b36db439118742b6717b6663d9f52e7c2d78
SHA25633558e3545357f8b533000c71a213dd01e86c8e7dff83ca5d1f8515c9bb604cb
SHA5129a3ac8416fb41586e8796439c766295b74d05c4ba47922c6dc77e65bd504ccf05796f27d4d378fa0f758d6261924f5fd1879b2433e67194f0aac49e83026c380
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dec1967c695cbec86a821d27143b591
SHA1e552e1fbaec74f20aa2a71688899f9d7e426b4e8
SHA25685f81857714f6c8f7788e042e930f0beb1ba274a6373e4b276083bbe174f529a
SHA51233a309b0c087102782a59bf780eadd25f58f32457abb989c58b5b25c28c35c29b78572ccccb9874975b25db9fa593e017808d0bd72752f680904d273db03ca55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d9034f064bd69a5ec7cab2154e9f72c
SHA1e688c3fd123072d80b5078a69b342cb1a733ab61
SHA2566599141a928904df2192cca5d326f447a76c0c0dee8fadb023367bb74721eddc
SHA51267ed693b38c3bd7f0e75df10514ffc5cb74256eeffc57f4b20e91d02828f2c784724e0fd757d01487a52534e1a92c99033fb021f6a0e4e66ed4dff9f32143199
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\84EXSCRK\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b