Analysis
-
max time kernel
135s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 00:56
Static task
static1
Behavioral task
behavioral1
Sample
7673f26b16658dda58b34f12476fcba4_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7673f26b16658dda58b34f12476fcba4_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
7673f26b16658dda58b34f12476fcba4_JaffaCakes118.html
-
Size
1KB
-
MD5
7673f26b16658dda58b34f12476fcba4
-
SHA1
f6f0e59489c59d94e6e71042437c02f7b2784b3a
-
SHA256
3c0c9039b598a91a473fbd0301f9017229cdddabb6a235ff22a9ea5c0454a4e3
-
SHA512
4e6578afd676325194ff953e6493c37e539b52196f2b36345d1150c37178328805367ef39af34380f59f1725e439e49c042b55861ad1dd6aa017316b36bcdd84
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 402b2066cee0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8DDDFEF1-4CC1-11EF-A74E-76B5B9884319} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000006613a7ff8f196f6f99b61670392ce890cbac1d950bcca73e6b432984ca033eb9000000000e80000000020000200000003935f9bee0ff30af607a4ff32e60130515906d222666f67e3383eb2d20743e89200000003571c05be16b38d3b6afee07ff4d61d9931066ec9e4685603226c380765431b2400000007be59d7030d6b2afbed875fc25b8e605d81893af5121112bca069435ba0680a681a3da7d797be2b0c88822270773ccfb21902737b956ac4c6d0b1265ce0a70c2 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428319835" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2432 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2432 iexplore.exe 2432 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2832 2432 iexplore.exe 29 PID 2432 wrote to memory of 2832 2432 iexplore.exe 29 PID 2432 wrote to memory of 2832 2432 iexplore.exe 29 PID 2432 wrote to memory of 2832 2432 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7673f26b16658dda58b34f12476fcba4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2432 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5705c9cd2512b143179b08520fd16db80
SHA17bf593afed2feacd65a69986adf375d69a0d4d6c
SHA256f3f2b98ae1a81822b515b7037b5ead2010b9647fd6c333808f5af287196009ca
SHA512873a25c264bd11f1c71713095f2f7664a5ad93cc4d947aafe54f83baafac2bda3dab1c92033b3bbba20c52774b66f20aaa82a701357eb6bea0d50c874853b6e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d7e202e146bc6343003f8d26d5c97f8
SHA1aa6956d8535cbb7d8535a8b47935cefc0796ad4b
SHA25685b3195775a01e2959666360b1c4905af204e92c692edb1b4ea18adf357d4bc3
SHA512fe68bd0b0843fa1ed016e1c24124d6f0fb3bd039e21f979108f591702e00f1d6755a6025e6a60170bcae14a32221df7889de61bdc13a631947f9baeeb9a14218
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591ffa1ac906035f5985325604cf8cb72
SHA16166fddcdb5a65e1eee485bf3f0ba8c9a1c180fb
SHA256bafc20ca1be0137bddf3b392beaddd807dfb8d29a3dcbaea2d354b54efa98dc4
SHA512fff3bacf9b9d5b3e8f2958ad27f54342bc06a115108d878ce2887692f69c08ad2cf863e200424acde923f12dd2a32a1168774cbf9744b5246fe2037ab55f7ed6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9ffceba8ac32647ea723232ff239c03
SHA17c0c0a02bae28ed5a867959fffb0285facdf5338
SHA2569a2a90561f80122b2c9cab108cee9791d551703b54e92d6d92aac72a911116b8
SHA51244d9bc6f0b09c5d7e9488ef35ce7324c45a51a8b58d5be0ede26029bda7c2416409d7b78cf1a96ebb3224856974348b6cf18bb33ebb0686866638ee08c016bbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537eecd6419bb09a2b87b5b3b5d701aa6
SHA104a586c3227921196978a2144b8743df7d94aa92
SHA256ab551b26d5e2825b6219217d0ded1f6b18861954ff52d716e4928252b98ac52c
SHA512a8cf6311acd085b45e7ef85965822176020ad24578b05a91267b9eaad38658c7c1745268420cecef55c218bedb527107238965cfe9f067523b085dfed8eb7665
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0851c98791a4a102606f3afdd3f8269
SHA10fc40f721af5ccb74a6168055d58e5c6b0e01130
SHA256d8dd77e4965f76498b9fedbbba352982af34d205b2acebe9d38a0154f710e903
SHA51216f95ef1314b6b52ba3566fd8747727875c1286d8187f5ed899e9ef4e96a30dc72d2e1fdcbe386799c661df4a180207d5aec4a5742373d715782f4fc73b393ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549605279ef48045d45d68c7719b93edc
SHA12b0bb83bde93e4114656890984893a1c2650e69a
SHA25623f1b578178e19d2a3f87b71dca492f07c3bbc6914f5de78e1e83568e5819065
SHA512502c34acd36996a3ad1e5ec5b5dca157efdbc12516facd50f66215fec21cce07988b30165a1ce8991c862782c9601c3ee66facd3e029b1b74fae9e29a244e75c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed4bafafa2af1d4dddffb702efbdeaed
SHA1bda2d4a897cda94fd395ee9d01b82a3eda79ebdd
SHA256a8fa7fbbe442b740680b948b64e7e7e63abc43502c8847fbb8e2ac59b86d5c0c
SHA512d61d0f52f15578095945958e9cd59accdc1d961d8f86669393232a8167c242bc393a30c940468f10a5c268d8dd05e89e238f98d8520b90f04c1f478adbd81b55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532977c03828c19c72956aaca47a1b7e4
SHA14675465c60a879f4fac47f9e0682339372eacf38
SHA256d0be8366dff632afe8bc29b78fb1e8339268a6f2224b0c21c7843b00125ced1b
SHA5124f167dc3ae08bfb5ad8d1e41999925aea01be1910ea7e48fe7d45068ec441b1ac71e504f84592c63a2a0c2efaf8e7c8d5cf595bc4e906cab647314aa0fdd5c55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571aaafd559995bf416ab8a0fbcaa01bb
SHA10f62116afaf7a77edd197a7d1f3002558ebe7262
SHA256dc0981d6e3245041f36b4be3148bf363538e3a07dcddaa54ff170c2084408eac
SHA512a9fe6adab5c6fe0cb6a87b2d528f72ef77b92634a5efd42327c90cd79a8c441f3bb364c889a37c564a68bf1996980a2effa5e2fdc10f1a4851bd47522244479b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e09b9b124afb5f2b534be5a988b14c60
SHA1d7f5a2c620dec6c270550dfd222f68c33defbe9f
SHA256af3b60379e64fe667fa085e477da137627a1ba862c6d8eb7a837878d0bf841b6
SHA5125f0c6abb88f8d263749e81384906a69ce4cc2f37162fad04623047440142237ea5b33ac71df2ea3d0c4c38dbcf9396075c63c5bc7bdba1e64fb616a8637da24a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5177b2a8393e33b303d0a3cee50eeadc0
SHA14a02deb829816bb0d91fa4ff45178b4dd5b91c02
SHA2561b77a4667087bf33e5dce6d2185fce7f15c7a92d1fa43760d321c1551d22ad65
SHA5128b50dad3d38ecffc849c6a84c706caccfdf52f9c696429e26bb1e65fa786ca8c4372abaac61369c9689a09da70b4d4067a4f47873f84bfdb1977e5871f08783a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562007cbb8ddcba3d51184b6f0944a471
SHA1f665dd3a28ee573458a2379d383a45153cb32304
SHA2567797e0a3102791bbb928bbfcfb5f5a908f314d86d1ebb53197663d919936c5b6
SHA512d4f4b661869f147f35feca55e17a0f5c563d594fb513c7d7e3f61bbd0e8d263baf3effbc3fd09d50c94e3bb4044df358d330ef55eddd2fa19269bff2f555c3ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1a14c38a0f92b1ef069df3826c152e2
SHA1bb6dfcd7eee031c16720e4667dc6a5179011968e
SHA25613c7d648b635cac2a138d31bb30d14d6c40c409ef72bec915ea78791f7a49854
SHA512967114bf07170dc4aaca7077f2718fd898e42b30377ed968356161710cd648c781759496736be69043c7df1b0a09e4e8ed5533a64476d612578805c3c5805455
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6bd0d9167a42a5f7be6be9ba7d86a78
SHA1498cfd7eddee9f043a49c6014c7a404a2e6a374c
SHA25601d442ee9766658f68e6c6e6784fd66ce11808edf2227c3063109fe271cf9276
SHA5122338f0b1fc00fc7fc0d83881051f41b6f7745e0b42214cad260ebb87425dc2c2469cce0656bc2a5d9ed7ea863dcf1ca215c0cbdf86fdb2ef99ae39cb04be9c93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2acce5fc6580df54c15abf79b9c9cd4
SHA179f30c983a00eda39d8e6b2964faef3310c2f2e0
SHA256faa6163f1c2ef36bd4f8d137d2538356f03eee3cacaabc9f1a2a661c7b86a1cc
SHA51296135be9b426247b50da37147349869ba7b3ad9d3872915175db149de5f032895cf6fe07813babdafa5c35762916a7fe64dc0979e875aeff978a58d0b2efc29e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a6e3b2ca476f84f3e78cac143cb4e19
SHA1418018ec43b5b301b9d0999e88af5fcd3f2b7b9d
SHA256ca1851118bee1ad264566aa4e4452d5034f1a467d49947455b66c85b91cec932
SHA51250fbf83eae02c8ad1c04527d703af6d5f5a726d3657e0ffa07467ca872311d94e4bca8ddc5115e92573ef7d32e12112f2957ca0842df5e496932edf0272e2b46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae5dc6015197770af360cef97ad45c27
SHA175ef3a8c4573ddb7330353c72c441263f02c0036
SHA25600751d97f8c8d3da81cc115f8c62ad44e5f91f5faaea157dc36ea83e2b3ad763
SHA5126d6c03bb8848720cb1775e77bfac649af6e0c0ff204284f67731f367aba6ea6eecf556dbdd876e02acaff7e60158679552972c0a92fdc82950e1512bac54eb06
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b