Analysis
-
max time kernel
135s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 19:50
Static task
static1
Behavioral task
behavioral1
Sample
757974b46aedfb24b895a52d7cac1065_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
757974b46aedfb24b895a52d7cac1065_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
757974b46aedfb24b895a52d7cac1065_JaffaCakes118.html
-
Size
6KB
-
MD5
757974b46aedfb24b895a52d7cac1065
-
SHA1
a42c7915ea5c1a444ce9c3f61f858f458d406b3c
-
SHA256
36c24e143e687781e7ba98f79ddd04f99f88ac2ce35817c2b1b626000a2f4585
-
SHA512
86f23fe0d4d2652f7221577f61e3aef0a123460dedc4edc750a278c32de4ce7d11bae73724a009236f7fe420978968c9e8f772af2b9fcf0a43ac28992665cdc8
-
SSDEEP
96:uzVs+ux7pYLLY1k9o84d12ef7CSTU/qTcEZ7ru7f:csz7pYAYS/bb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{78BDF7B1-4BEE-11EF-B3C2-F67F0CB12BFA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00c84a4efbdfda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000009ba7712620a4352f6b38fff804157cf1df5251d0da87cd772d7d20c1f6b56333000000000e8000000002000020000000035505af700e51c4029ef0ace03e312b6d0ec687e47da2a0aba1179a402c2cd3200000006c9696f7bd3a117eaf6b77fa6493feb926822ed6fbccc4ece968499ea0019849400000001cdb8a8c5bae7020f252860ca75d148f85a0672e4fd69aa159d6e2e3a7c64578b0365196b1d0b7709212637d8774c1f6a04c2789f2df344fd31321b01edd9444 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428229176" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2520 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2520 iexplore.exe 2520 iexplore.exe 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2964 2520 iexplore.exe 30 PID 2520 wrote to memory of 2964 2520 iexplore.exe 30 PID 2520 wrote to memory of 2964 2520 iexplore.exe 30 PID 2520 wrote to memory of 2964 2520 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\757974b46aedfb24b895a52d7cac1065_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2520 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594ce79f69a6a190fa403c6506f0a4dc6
SHA1652ffbe59f6478dbac7e0c2f92e0e8dceae61748
SHA2563914ad42461b97e3eb67298a38b33c51fabfe836cfc777ea216cbeec6f278826
SHA512765e49f1704d6d1a1dcad825c50008cfecf2a84c7e7bb61a2bdfa48b362e8a5e5ca10c9027e126865cce7701cb5fcbed734e78bc5ee2b0d962ad314525e32bd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54578edbd2efd46cab9739062e6e70b74
SHA190d6c3b19e97b1e5f40b5ddec6b0ee88e5a89446
SHA2564f0eb97182e38cf282848be6177f3c09548dbc1e4295015097816c47b33ba722
SHA512e958262ff93631d6efd0093ac8c47ac220a55ba44e3ec7ad1ee036ae8cc7a685296afae358b739341f6f021bb21ea234a350d62f9730e8069887ca03d364c68b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fa2b95f8c1b00a37de08f99a07acbb4
SHA11dd81494e15588c16adb75291e2a88a095910f3c
SHA256e916f4c7ccc1164bba15bafddd973cd8774b5c15fc209ab3cbebcc9cf494fc41
SHA51240c341cda3bb6688d9cea6604fefe195528835258bad1bab39ffa2d0e156b59323df593723166baca8ed3d7a425f34114c6eb54237ad02bc0bb09d06e2488e59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d514a0ce818b116ee3d2a820947bc8a0
SHA19e9c011f184c0700ad8189ac528d41c868282f72
SHA256d60cfb7532ad7a211a6de2bbad5b172b32864caab23b5d899d1ff104dbe2f32d
SHA512289745c70973b25d6a5d54bf3803fd8a7cff1f6d45cb6ce5a03fdaa5d7c9871814f4f69d5cae30a70c4e2e93322440b1fa032af231b9ec131e729d5f93a63609
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db511531c7645cc891db1a68527cf521
SHA15d4d47905d13fbcc3046e3e4d1f64b9ddff5ec64
SHA25681f96e6976750f3c1a9d675822423c50e901684df9e5f1be5118229d261772af
SHA5123a734ba4762031c8293a0d1cf74c7b1790ed06ae63947dd75df9dd7dd3137237b2053df0f1491e95358c4b9a472c48e6b104ca00cc6bc68d64c09da83c1912ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5b2d9ca8cffa7aa6cab928eb67037fa
SHA11d3d764a6aa64b76ef9d70d4863e557e08944fc5
SHA256ff4dd6244b1d38a4084420d32d6f045277d58e107f4197fe3f8a886385c91503
SHA512c3961641f1febd94d6b9c963ddeab6d3d0152216786651ee567b8f82879f64a2f55598cc186b2ab29edc2e7ff66138bc03f77f35fca62f63f30141d9e46d4c18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce1eb309bf4ac21d9e066fcfdcbb713a
SHA170e72917153350e26f33f31b4c3571319bd8613f
SHA25678947d4c82664b5a17f1aeae782a46d704d5ecec7897203bd6c8756a6df502c4
SHA512cca691da34a0020b2cee1cb95153352cc8d2264db3015529acce8754d3059c0b92e55d082c8e6c03439c82ddf50aa1d7bbc3ec37c9a28bc8d12f63a17a83eb84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfb79cad582d6169fc9cae6e64b49a08
SHA10433a5641a63e3ccc22535ea2ea0bb995b2e930f
SHA256e11d49c57895c89fe7257239f1b1e07c7b088ebed4ee2072ebc42656a227f6ae
SHA512edf16f2f0cab2dfefd67294f5446813a47149a0eab0dcd3c40aceee335c3b4c8f9641035650e3c88d80daba17f67f5e7ba739267c3017337adbab84e948d18a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550a3e9ec9e975d2b6565352f4ea652e8
SHA14a2025554fd9d8ed7a40599e6b2f628707ef03c6
SHA25675d6f3a9c6259e0fe3a20da1bc371ee2a251283c850680cb67f3e3445f95e931
SHA512469a359edff4bb86c45d53b7cac3901420065c32277cff46f554981b73a62988af033ef991c3e8b71c9e9c6daef4e746bf2c9e83657a71f136e5658620b1e2e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b06066bbfacb8bbe0741fa1c64ab822
SHA1619b2ddf8d9714c72e1589bc38e3ed20813e31f9
SHA2567dd637ae188b58761a54299a728f47813b0ad2b61cea8290b64e8645aa503c03
SHA512eb3f95919a49a680d5f6d0ea812b14085214f3e65dbfa0609e14f7e433784203c89e9653a7e9a906add6edc60b0c44f4a5ca1fee3ad531abfebfa00f4f15b374
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fd523a157e50b7ad3a1858095103777
SHA16658570b1f175438ce8a1fff4c01aaaeb56d812c
SHA25650ebcfc6c3b3c6daa7b6a2cabf99f6614d821112fabaf52176b0a2f7687180b6
SHA5122c251719166df7f7c6aca96a52c7da9bdf07b6c0262252028755961330550fc5b75901cf21b4fb89298a6c5f2c8f19b7bf8db1b5e8f6910d6dac794a84d03a25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586f07e6af4e0273c8d572b28ee640d60
SHA118d9abc6aa58face9ce62a40c255b4d4eb632bf0
SHA2565dddf1015e603056dfd02739e2dfb3566002cd3204547f6aeeec716ebdd0c5a8
SHA51260062a061eca8f8bd160fac2b752c62da0695a710b8c0f8a6aeba6da64ceb1e5e0a4e80d3ce001adff827cf772fd7b56853263509fad8725a3cdb7fb9098daac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f64e76f9a6621023bc3fab6b85acc035
SHA1220b5604b49b1228378d9978167d427cffc7262a
SHA25619216413390c484b90cb3abd837e75579bb9a255c4b72c7446b84b6f68728351
SHA512d425098d39a590ea67fbf2d6814dc70a19564c6fd3e8de608473ae0313373b32209f4d186ab920a466c0b2c4daadc6ae75ded8942b84ef1fb1cb487f389d14f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5deeffb3dcbd95ecddec0d787f66bf3d2
SHA181e9642c71b1e53ec3c65ad84fe35165e653e056
SHA256fb6820f4edf698fdfe74b56a04591acaaab13045268d6d0177e2523b79b82eb8
SHA512d01d76715f98052994a197bd9d20c91c990a417f00de9955707940561f7a9d3ec02cfe7cc351d2a7cff7302918b87fdf0efe345da37421790b5b6455d48174cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ac78c67f68caa6f4b460532edfc6bd4
SHA1f8f23a16cca3bc97c05e2062f4d5424ed47b7004
SHA256492d5151a55e3cf73eec79866ba28f0a0e8be7da739d2510f33bc15e1efb81ff
SHA512793ff609c7113e04c8ce6ee7d4bb54fcf66ae6c60fbd0deab3445473a25a711a4341fc920d82e4fe565819bdab44616154f6cb8a7071d9c264a50a09f25ac1fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4616fef9cc3ec64d1aa5b30f9fb3eb9
SHA1294002bda6f6a640faa5419b33e96025baa76f82
SHA2562e1dce9fbabffe28afdc4b52aebcc3f94aaf9fd7ac8d71b85600782b241fd619
SHA5122c07188130d0b1bb2ade16686808d2dd9d9f4c94fa27f12ca52f59eafe5e2f64ccb4728bc428f5db364eaa5821eac0ca2339d691561942cb0da52bfe37b287d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b6f69ff40d9efa79d0da03f71ad4495
SHA14860013c49a6b55c521a111359a0ad23aade2f46
SHA256b81e8206216fa7cc8362fa74a0f8fcaab76250b6db8c4707d6b0a9b250052b06
SHA512494a455b054d0169c9f37b5931049da18da6b09963b60290c88bb4fb007d43c0c445ab8677ea7d195b04510effd58f8b563583b475fcd364a4e597fa86d1f4f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57230b4ca4cb9c2b1af376cb2fc838425
SHA138771b67d231006288dc7230926fd66d162a4c74
SHA256ed08170be9becec7d9ad00530b04490fc36e60d0e8c84655f972fc6e6f14f68e
SHA512c0623618bfd9c9566bc3a017fe9f7f842b044b490e8efda609c31a3d084686be197970e7bfe200e3bc2c0a4364074b3b37651dd6bd3cde58a3f5c15d8ba64c06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599f6fe6de163b455c400a258fa3ef4fb
SHA1835eeeabf98bebb6d5f1106873a51fe1583ceb9e
SHA25625c49d4f7e36d6e296eb4e01e4adb396ee8d00f4f64284cf09da899b43b0ccae
SHA5125d525ad01650cc752c759e659f5cf9c2d83ea6fb6839dac261dfa021edc9584866a977d769878c65b2ff817c2fb1c352741fad59c1c52df5a8d6c54d380ede27
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b