Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 20:42
Static task
static1
Behavioral task
behavioral1
Sample
75a44ca8f696067d1c93673dfb6547f9_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
75a44ca8f696067d1c93673dfb6547f9_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
75a44ca8f696067d1c93673dfb6547f9_JaffaCakes118.html
-
Size
10KB
-
MD5
75a44ca8f696067d1c93673dfb6547f9
-
SHA1
9fe5fd40cc25cc3fbbd74de729f943a7ee9f1e0c
-
SHA256
da403005bc701fdfc8f38d06f943ecd016471def6185a4d89f4d0fec1b22fb83
-
SHA512
17a1e668126f1522f2318b5aaa8ac94039c1c6d791ea50c2a2b8a229e9e525e392765ae228b342631539c61f8f5457f79f017605a9d2090f2df8b22a05f6dcc9
-
SSDEEP
192:FPDsZ4Du4sQaHKurm8dnimdTsK57k6Fh642idMjOhVFj1Cv:hteKurJhioHxh6IuOhbc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428231871" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000f158a7674837779a69af9a46a8b90acb171f670e109838d74543b48ed71e7ec6000000000e8000000002000020000000454cfcd3109443475efd9beadde0df5acb5582f0c0939a14283b81c272e5d599200000000087d3389b7a95521982079399cf6c8d9852dadcb092f7572eb42864e4a9be5a4000000096ea4e12c242ef9846cd988ff3718bb7096678e0e6a74e598e72ff6d3d5c6e551a34a812543e437075cab4d9419dd585c5a62b2a160fe6d6b72be11b5fa2a583 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00ec1aae01e0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000601b4ab0353f5115e4dd890b918baebfd10e969f81a9f75f37338247c56ff5e4000000000e8000000002000020000000f4d62f3da6ae0152edcc760378ecf816ee1ac814305279a519bcc1c0687747f490000000b2d1ae24d2bc346124df9abea5f352ea460734a1138f5c0ebb5449d11351d3618573ff7e70a3a2577e6de0199dca389a72574142f1719b1a7ea55d440ee13bf7bacc4aa6ac47513646bd3125dc2d17734b9cce18c23a5d5b5c3d62705247e314e845156b2a284a1b817543ba11e9faffc39de8ff76c3a0bc5ca8c5c16f453a86f57cd37c159f7dee213148f3819bca6e40000000a50ea01a385f7f29257f5eb42fb04f4d7fb2f643bba1713dc06bd6c0486c1b4b0e33fe1f08ea7e75e9f396455cac1816565374711358aa36ba112f56ee3a60bc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BFCA2C41-4BF4-11EF-ADD5-E21FB89EE600} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2700 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2700 iexplore.exe 2700 iexplore.exe 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2816 2700 iexplore.exe 30 PID 2700 wrote to memory of 2816 2700 iexplore.exe 30 PID 2700 wrote to memory of 2816 2700 iexplore.exe 30 PID 2700 wrote to memory of 2816 2700 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\75a44ca8f696067d1c93673dfb6547f9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2700 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5897c64e4a0700b2d30f0f41192f99397
SHA12ee17714e42db18fab728d10882afa5f1b7ce199
SHA256a013182fb231ad10ddcd868aac1ccbc796588e9bb8ed504b9195d80b232cd541
SHA512f11184f396f2d75a35d3b7f86304e83e0ea286187c64aa698ff6f611384d2387faa03fc6e29c659fa02c1a50dfa25804d278b97f7d7d5bbcceba65f289e1e226
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551c6d8cdd00783718366c6139844301b
SHA1f214214f18cea7b86db0811d8394332acd503b35
SHA256d29535d97971847945dcc8ec63529de2f4ad664537f63141cde68f37c5dc1845
SHA5120939bb7b8fe99d4395f089bb0c68b9d4e824a24b6768f30cf3914042945a1801b38bbca7b08f54ddd0fb0a6620562c9d2a66635f3d80425f905555e9f4f48cd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5469f13552ac7e09c108f8a44c13e7183
SHA17047fb6fdfab84c096ccd59a0b0d2f83bf8b58c6
SHA25616c3b50417446429de1948d613ff1f2078c08947f4694694f87a16c53172e434
SHA5125686d76a23df58a2d4c09000c409974b388a69b91d273871c9c19d782f30df9923dcc32f3e57e9cbc6a41cf268497de16cfa5260bb2973600f8b7eb9e24474a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f317d94da64846d208a6e2fabe358a9d
SHA149fca169cf912e5b6d50bc44d50023a499a9b60e
SHA2566ad76b98bd60bf4e1b333338b9460179dc57f9053764566fc5ae7ee6ce8ce250
SHA5125887fcfbc51c0efc69007b9f3876c0d2933a48a2a5b615f2461a01ccd445b4cefb583d0cc95c07d9831a3be143f084f5210e53dacbd757580a708c17ca8e9934
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8ebeca3e2e54100680f1a5281bbf5b5
SHA19df04ed5e9548428f1e8a09e5ee3b03b2ee04286
SHA256402ffbf5c8c51f397a0622e1ccdaaba987b70c861cb8f806998b79ff23328459
SHA5122346516a883f70eb3a9292f510c224664214c7d5b93fb7cef4de8722f728f09aa33d0c29213f937394fce5ff70c34a5b87345b2c7d96dfd3bfd156db5b2f36c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51197ce4499e221f6ac00206df66aab02
SHA1db63b4fc7957db6c233448fd6b60ed35b2e6a81f
SHA2568ee8f1071c6b8b35438eba6770490f02317db662ab2ac28455cd667d8ca1ec2c
SHA51224983cdb3b1802ccbf7b36d6cf5f75667d48bb74a675fc5e1a6b6a42818f45ef19ffe179fd8381d2de1c3ef0168d9565872f48471c0f78238921e86a9bb43922
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5803ae2c0bd096466e3b83c43b8f647ce
SHA172dca3397c0fecb93bcd3810c1a5767563acc797
SHA256cbaf89bc9e8b29cfe050760eea36ff07b72190e412dbe0088dd7edb446370821
SHA51284557dc4592ead585292540c5a763ee2d73f05f19a17dd90f01ba9296498d0e67cdfbe885d93591569a15265fc42e9888c15603b583cdaad865c5e319a9ef7e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536777d8369e9655c9c4342d1c21716a8
SHA1984ad29e32fd0e7fae09493d0ec105a1b2984c02
SHA256f659eb2fc844869909da40a1e6e69002198b0ebdf386b206282bf95500b83079
SHA512c7e010509139ca2404ea250b736c4ec94db63302e87395ead1819fab9b6fdbc5a26f5e2ce1b834d5100026102fbe23b8d488e20038c685bb7e05b6393191f6c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9a2c2ced6ff807c213ef336c14975e5
SHA17c3de85948514149c0858c14d4515fefeb7e05e4
SHA2565e9799121a46a86c559228f86201557209a4e945177ed0c0759ed9fb113f146f
SHA51288b93de82b71e12fd9511dc73331da3c2f419bfc704d0407ebaa85271faa0234c9ff978e8ea0ca916561174b7e341dc665ad754899a3cb285061c72051f296f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589e1077539a43b4313d11c81b747a0e3
SHA1f220a3271c8942163d9e2fa4cc0bcabf4eb6fc40
SHA2566f2a39419d71ede68792bbdf30ed7f34e2e74b2b90f51a198927de27b0be5061
SHA51253a9a460eef1f8cd6182060a473a6cf4ed83e236a6c9a0559ff0810cf0e45c11e1764328216322cca8bd37fc992e634d7e797c4337540793ae38033f0226d6e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504ec1c711dd4709738cfbb5b7fe228e7
SHA1e524e9d576941a1ec8d8b8f6ddc540cdf9ea4195
SHA256ed98616e76bec5146b01b2e21eb79846af850ee91be5fcba2271ad9f1b61f962
SHA512e2859861b96397d9fcaa24fa40071516703bb4a12b475b1b12c7f826bd4b7295320d8c17c7da25cb32f0ad4da988cf5c03a77bbf42d42d5a801797df43c573d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580c72716385778a8269da0c80363e8a9
SHA17c35fed1bdb6e2fe64550d69a3b6cf2c93108a3c
SHA25648e2e0cc4f4cb40c83e6d39fc5bb35965875040d8ad50b0735912c0aea273700
SHA512f4a9d92afd4437eb8fd1bae70b86875bbdf1b4b8a5cd5569afdcd2ab9c7f7fa068f49862d6e417ad13df3edee643a48e1dda3021f452b2036bfbfcb4f6f8ae7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee48c50925df9459748fbce67d0c13ac
SHA1714160df842f166b317724fe1bd40c77b68f3e39
SHA25659ffc230090806b775052af65fd8591964bcfd3382aee9149ec275ff31e99deb
SHA512f0853e4c351f35ff00e9969ea297289bc92b2a4c53f4701d03665851136bdba4e48be340ec1c890d2685269a9859a9ebcae9434fbfb8a1f8f5da9a804cde347d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590124161d60ec0a6f3b4020b2a676cf5
SHA1281d764f554878e87affa5b14f0fa1aeb5b9f289
SHA2569a0f6d9cd98126b5f38053dbdea343d0f26c59c1c36354e0ca4e2dbca38f3278
SHA512440a48ada88220b4075befb5dc2dbf3431d94b71e006c78e4afa546f5d9d2ede1d15699b57dda06890703bfb41dfc56dc69d3ef882b5c404b930384777fe081e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56666befacac301d382e6275dc5e0f2f2
SHA16b4f3fcba7c74b1ecbdf280a2ab973c5c9b3f31b
SHA2562f081d56547a0396fb22a71d24c6aeeb3e301ad45890a9b976b50ee8d9503903
SHA5121b3de1aa4f435bd9fd296c7310cf5dd52eb437c17947d01962ec581260c32562375474fde532888be187689ea25fecc4bd5cf6dbe8006819567985b881a7acb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff9270884315ce2761a8b60011d67b90
SHA1d2f8bd0dbe35ddf900ea20a1d8779be4af76b3bf
SHA2563c5dd3b93ff10db939e7fa563276785d90f664234f37a6ec2a083a0897aafa12
SHA512f528e118dbdab083866f1055e231243604d65d18881dd51c03887659c425eab7ec3d9b7072cb72753bd77feec6993a1eb39b4240c847bbe9e765aac899efb4c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa1f06f98a84376839a18cfe3297501e
SHA18ec52f0e51bc9728634ce7c91a8a6fbb26424f91
SHA256b127dc508c681b98263d12dee78136671e2c83ea3755b036ff4187ea7a73116e
SHA512979431cccc448eba14d474930861c10079fcbaad30edd2a70d8105068c6eeb4556cbd9b52d69d7f2b1be7c701a9a56702aeb60cf8eefc50792be46fe20e132dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa6c24cc9303118060442f246d3f3fcc
SHA15ee3adba4520da0e6894b6777bd1103d9e3eccbf
SHA256c15b8723d89d5cd2cbd1a423fb457eb72090776804ac71ae370aea650687de92
SHA51215fe08fb592a6c2dc11e542f83694efec157f91abb2108cf6dc8a09ad01bf5f62475e3cc940332c345d9d2d61d7046ffc246b71f5861215087e428885a001c1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5045d834ff15acd038cfd128ebb0609
SHA1d16ac2f3b824795858cd0538a841cde8e2b09027
SHA256c0cef8d0261ad0dd87fa4fa615a0b57962e8b8548000988e756a1ac81601095f
SHA5120a4887993e73fab449a2a55f456d3467216b938713728899e98f7b1e3d16abe4bb0285f588fc82173b7119a166fe654470d11875b2ac8dd36be88062de85e408
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b