Analysis
-
max time kernel
133s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 19:05
Static task
static1
Behavioral task
behavioral1
Sample
7553937e704ad8926a3b2dc801afd6e0_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7553937e704ad8926a3b2dc801afd6e0_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
7553937e704ad8926a3b2dc801afd6e0_JaffaCakes118.html
-
Size
11KB
-
MD5
7553937e704ad8926a3b2dc801afd6e0
-
SHA1
e841ca0c283f13dcc9edc23bff13269fb9d6d19e
-
SHA256
5b4a4d76deaa354aa6883a51ef9e648f0f411b0d8c202d00d5c8204b364247b9
-
SHA512
3ef684944656299a9623df6a40d2a547e0e21bca9a945445743f4d1b4b5bf6d23007eb9eca94ce628d706d61fb24449102e5c28a93b766a3270de9d783848dd7
-
SSDEEP
96:uzVs+ux7V3LLY1k9o84d12ef7CSTUUj3OlpKIoB9bRcEZ7ru7f:csz7V3AYS/oQzb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e07b1a05b4dfda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428198555" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000328fe5b5fe79a1a773c3dc33e539c3929eaf6a5b1b67605be7a517cf7dc6c0fa000000000e80000000020000200000006cd56818be5c38718c085770d040a3d7474f15b8a633f581c7fc64dc9656545a200000004dd3cb60af6e74d5a29ac79c947a61c988f14a0e88cdc1665b3fc36baa70cb64400000006fbfc2cfeadcbf53b629a7fba4fe7f2c162536eca3500609c836860e42012ce62b170ac78744d249875dbe622502fba0e780bf043b1312d8c7ffd524eba3b2f8 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2E860761-4BA7-11EF-B5B5-D238DC34531D} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2104 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2104 iexplore.exe 2104 iexplore.exe 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2456 2104 iexplore.exe 30 PID 2104 wrote to memory of 2456 2104 iexplore.exe 30 PID 2104 wrote to memory of 2456 2104 iexplore.exe 30 PID 2104 wrote to memory of 2456 2104 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7553937e704ad8926a3b2dc801afd6e0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2104 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542ea23d2ea23f7c48a198a466bba42a0
SHA13e6ec631195e58bb0fea9a2fdc373d95b2b26d13
SHA256ee1c5979650468e4d95ec0e46c97f537597f769e3c34e243a40f22f1ad641ba9
SHA512500bdd40a403236a11491d616ef6a83b908d63d299de64e17588d14077fa6fcfe059d9d2b99056ed6133845a630c07a996f00e966e34fe5735333fd59696f21e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568077087a3709db0fe8bcbe6bdbfb4bd
SHA189ab2335d7f4242d1fab58a3815290cdc44cb727
SHA2568d33dc527a2a692f0b641f43506f98f1544ecf0a8395a84b0d91cb3c086acbe2
SHA512133edaed05748c0bd01bbb6a0fb71d83d72063b93847fb40dca40a3820c57b3e809c39befa84d1c2db5603c6cbc62f3241536b4c299f751eee9f42c99419490a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53efed9bf4b71c50db30ddbe30e67d208
SHA1b3b5ac19c89a2efbb1c41dfcf41f23601083b16e
SHA256d4f668a65e072a8cf612d782e5924d2eb287f1f7270a7a8113a051420f336ece
SHA51285fd020cba20fadb64449ce75f4a97ecdabba9542077aa380a2d8848dd80d9cd3c4218836cfd1f10c84942da725434a783e2da47f0865cb8722fd098e5bbd7a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513258daf5f3ff72519f10d0214799602
SHA18c53763046cfce4bd660fd559c9a62913340f13a
SHA2569c16547bb5e577b9fa3437b3f30c258fef93365c1826c32eea0b5983f30abe10
SHA51240503ee0d02917fe437532664b65298931b3620af5587dc3eb9a95173455c7c9d4dc7884ed4ab802a7a58cb4eaec9e3314e8070148f72a928e31d2d8fc7a0300
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a3230fa560374c21ac906ba97a53cf0
SHA1837e7d0a9b7632320bc9580d5ef252b4f60f77e4
SHA256ee8c708231d3cfde067f56682bfe20f2f3c2aad1431b304377c2e2c20012e075
SHA512caa4ecf4a1e6f0e96bf2a09c302dd7a729ab09ae4686d890bdf4f0bb1e6f044f1ef913a84ac2822c9a98601dc71259f411338eb22b8fecd5d89ff38f92342d07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac322e53ba6ebac14f3a41c9c58ea7d4
SHA189faf93b3f56f61323368b5898df975859f71891
SHA256182045b9cec9c9e3637bcc3f72aaa044fb956e01b1f04a380feb2debf5ed8f89
SHA51209dcbad5eeb28893be7667bad66cfb5d873698c08cad7a68fdd3b5750f1a88e93c504c1deece508fe061fbd70c354c451e3f189dd8d85addf9b1352fc837c479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59adc0b39beeb9cf2addb5f678e4b73f0
SHA1a87c07062c0a56f9454092bc145916904e88fdd9
SHA256f3a2ed9f64ae2b6336c5d6f958ac51b1d9e54b510c9304d4f1314e07a4730cae
SHA5127cc687d22db64fc52fa443e3955af117699ea85bc8f5a87a9dba5a52c1ba23142ccd9f8f13b75a8647c9d0be795797717378d73ff979e23031b1d1e12e97dea4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57956deadc61ff59faf29f14ad315c3d5
SHA1d6191fbff3d85fdb042ef9480ec33469cb5e114a
SHA256dd4d40c9f0e869dbdce570070cad097cd93b4489e16a3eeb35c43d88e6fde39d
SHA512d3e98a619af905b72164f6b0e928ecb5dc0aad5b6f54f49882f33a557031b7215385cfd12dfc9f927337e44525dfae575aeec39869b0dee10addd6e3b249be9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540dfc125c84c21804a45469ae2efb720
SHA1cf4c29069f100a75a666670238aa56dc709a45e0
SHA2562175676ffcc2357ba1d9223159b5a69efe4ecc50ff199bfd32983bf55b2f735b
SHA5124903680a332d60a8dff79dac8347dfa43931be1f209997dc3d8e18fe053f122a7ea532bd1fa34868d4a8fed77912fef67845c7f2e3093a96f5d4dbc14298b131
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e98f1ab3474d447e0aa5237ec6ed1d19
SHA1a56ac4a93b0eb5a230b801c9fa2f2fd04b55dfc1
SHA256c08ab0c9aca6ce325b2278ab73809fcbae6ad5709bc956b8ce87babfbb7442b4
SHA5127865642e611c23ac151e4c33edd60ffaa7465910cf227f84ba0060367aedc6aed0e89b4d46845b089502f1a40731936a0d4f11b63cfb03967f893069c3589bef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0a9fd29f224bb9e499b681bb0b24b18
SHA1925ddfc192fee38fee6957f58126bb987796adfb
SHA256971c82bcb898a26924d39bdb86f3e44c61ebb8a9bd9cb4b65e4d39ef6f84d0ed
SHA51238cacd5dd53d08367e264944ee5173cc694c9ff7a8e50a789b7036fd40b17f08cf88149169fc542a84ce58bf00d469dd71d8257176a6ef985119de2cfabe9639
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50779077c61f55c04394d24aa36906316
SHA18a28166ad1e7910a96ea59550eac7527ae1e4c27
SHA256cba361364392f076b2c0e52a268ce9dcd78cce7b9fcaccadf65bc2bb76dee5ae
SHA512cc3d2edf1802b2874310b1fc32bf349614355e479964f01592782b58149cb272755ccb6b2ffe42b322e6464b004d7c3bb38860f3d8db3c43839ebe478a6c305e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53467a799f59fd34c4d0d0d41ec29d049
SHA1913c66ca2dc673cd3a1c9b90196a8ff7f2a2f602
SHA256808de61d9972d633f955a1493a8489cbcc79f95a3163df6d430317db3dfbef4b
SHA512ee3b9ede9284a30d55622abb062c45ab6e4c9e821c8f0103a3891e673751b9fa403c62f93fb8ba5af98141406df0dd1b7f1945aa5b6ad1e34d8da1c0aaba9030
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce5273668860f23ad56bc7dae7836607
SHA100fc19ff031cec811bfb87dd0c28167750f6a0f0
SHA256e52bbe9b4f92e6dd78340891bf53f06c8e9f268b5d95e8483bfe291953661b8e
SHA512c34b533ce6a0121db1595a26179ad15b255050a8c1c1842c8c1449c1914eb72d8ecbb6d24ed76560690b2fb924adba039219e04b8df781cfd45e87387266a945
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ffdb0ff8921b490cee0e33f01a20924
SHA15857d60e3b1897c9a87d713e485c938ef18782b4
SHA256242f7a2bb0fe587bcf160c10940eff577bd81b8bf51f17268dde870ab7d85f85
SHA512906fafe69fa31092d310beea1619e78ad8a979fdbe33de80e709f831e8d221b3562002e30b7b5db1f52a2d35e6c1331927dd9369235f4d372233c271c8219c80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56939386dae5b1d650aa5e634050d775f
SHA1f73ee554badd90447afe15109d1a32ce2f333d04
SHA25620562edce072f716f284e6ae2f596910a0931602a7b0d0ed0f38bf0dc11994fc
SHA512c86b08a15527a9469c8909fdea36309fca588741fc19adc094a3c9f7f1a2ce84b6a6c0876d89e67fe82a4b11a045e575c7aa9822db66719293936ff70cd54a64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a80abd6eb219759ef16451d3d72d2db0
SHA154953db7a54b14b45964e22a8d59bfb131f7cef1
SHA2563f6eea0786b6a63de4d38b5f2f024450e48f5d301cdfba2e45863282052cae35
SHA5122c651a71ebf530716304248886ee98f09ff35902c71a55abf12a5a1f5ee8f2a99b525ef9e58d3fefed5cafacd5436c29cc0c3dd19c9309b83889696a4fb941b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e351d6442424627ddcb4450b97d488b
SHA132f1a9456ac0bc90ec15da4e5d4f41a5ff5458de
SHA256658a31bcc4b13c32d907e16ea12f93d75aacbef12c45009adc9ee68aca12b584
SHA512ada3bd4c0ffb9dd578393c4faede0893cbcbb5374cd4b6ff99b4b2cd8d779e3acfdb308399b042410008569d6baa658aabeb04e4fc9076694ef1dcf81ce525f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4bd67a499ced187de7a932d4c7551fb
SHA17a866c9005033d91a0e72be65fbaf1d7317c406c
SHA2568b2567d402055d5864b6cd9c6ba92a62c22f0a7ad9d21cb65750e60e2d3b76d3
SHA51211201fdb0a9be38881d0a8f2b11daef2e694bf98e17ef6bd1887e7be14374fa7711fed965eb6219a5aa8f41ed3863207d17e93c7003e0fd48256186a399c2a2a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b