Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 03:23
Static task
static1
Behavioral task
behavioral1
Sample
76dfb20af2fed40db7ac3e882e86a595_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
76dfb20af2fed40db7ac3e882e86a595_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
76dfb20af2fed40db7ac3e882e86a595_JaffaCakes118.html
-
Size
12KB
-
MD5
76dfb20af2fed40db7ac3e882e86a595
-
SHA1
b337e8bf6bbaa489c08c08a839515ebed522be34
-
SHA256
59e6a4acc778f6ec672d293580c53e531bda2cc19ee597ae509495beed06e918
-
SHA512
86007e48fb0c84fa9aedd978ff3245a907d976803f698bdb07a60e3c1bcedfc12641a73a734369f7126e2cd55eb94f9b7d2e0ecd6ef72e88e7b746a5db3ac527
-
SSDEEP
192:HaU3bzY7FH1BtHEc6uW76m5G5OAxZ2nedjWAv:HaU3bzGH1bHxNjWAv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428480662" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{02B92D41-4E38-11EF-B6DB-72E825B5BD5B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000008ed973b676bcec2183b8e69377936688b56c08a9a09ba0ad61b999b618ce03bd000000000e8000000002000020000000f1eab87bac8b980b82864e90e938b8b1ff63a2ec69eaf4d1d1f112d39326719120000000557044a1bc3b6fce9602d124097c60180c51942bc6de81d5ede05ad4cb40dfdc4000000059e2952ac4201720b39e9b1489f078ae8301b927ebf8420112f787fb8de22a8ed1b51fbe4d79ea93db465d18f6b2a4f5daa2f879fe3e9101d6107976d2c3a085 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0007dddb44e2da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1288 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1288 iexplore.exe 1288 iexplore.exe 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1288 wrote to memory of 2132 1288 iexplore.exe 28 PID 1288 wrote to memory of 2132 1288 iexplore.exe 28 PID 1288 wrote to memory of 2132 1288 iexplore.exe 28 PID 1288 wrote to memory of 2132 1288 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\76dfb20af2fed40db7ac3e882e86a595_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1288 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d137daa7ca88210ee29b1049f879dce2
SHA12a46b3d9d1c9b3d7c294b1b3f64e3af0441f166e
SHA256d0d3a98a3f9509ab394fafa32cea40919150d8de80b5a676ae89e63553cf602a
SHA512e631de7f4707972fb48eee6f2fe17f9f0d2e39e5ef2a38a88c99c764af4dfb3a2dfd5ef1be9febb53e56d2e2937319152135045f483875bdcc9d1fbc9a1d12e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561726856a16faac4f39df7cfd4428331
SHA18ecd0c18283a5ec740dac5fdb04cc3e33f9ef6af
SHA25617f88ec728c59a388d898f4f6e0010b6fbf4354af80135770844e502b911a344
SHA512f7898456ec231077635ae897087c379dd90144821913a5687b8fe2ef2c004dcdfa0c43b24bfacde08677b395b69c31e4aa2e9592aa37d37a4229aa71248f4338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c66c4ebd998a609c4c7070c56d858887
SHA16fc626c205617c250220306649d376ebb86dca72
SHA25658d189ab77b3b06be2bc65e72045639fc8a95bc4bfd65a3e42583756dc61cb6e
SHA512dbea5c69e5f496cbd417aefc06c6e37c9e11844e1cafd175d73d6a8fa0e312807e4d2ed783d98d350c8de782ab066cc84209c16fe4cf1e05cd65f36f5e4be21f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ec3d991bf2838c716064446b5d8eeda
SHA198f81ac452508bd46beef089828013b2df1f0609
SHA2566ed89af2b29b7c85c74e75a63548681344e60cbf49df3b9e3e639065f4ac0202
SHA512586b6a4864243c06bbc8bca63b5cbb2b6b113e5516e522b5190b54caf79867f57925d8d5910b46b4d4496933d5df17ccf2d1f11a2649396199a4d8138f0b9716
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ef56e79d5a1892dce46e29b3e23371f
SHA181906cee9d7bd4f79aa3fcf21d45e691de0be69f
SHA256d327072137a83a57638802b630850f26a6d21a04c728852d46007087b155d7d8
SHA512ab1967972bad537b3807494d32a0b5e1311d3f311ffa53b88d306c879410016234c4e1d21e9f0a284ba90a40b7fd02e37807f2f65554b3a4cee60f9d42523607
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa6473983fe16ea70c40401eb2c02ffe
SHA109977dac8079c3f7ca5abdb809e9dffcd1d6c781
SHA2567b5392d687c77077ec84e991529cf35e5b2eed340c41bf934eaba5d1ad9f3a68
SHA5120f47cf0c6bdce60d88879eed10f6534cea1d081f67235bc020df7753e68ae627751e234c87f6164411c779f1770ef0c54af3c44f01706a2b14a8abd86cfa26b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5627abc8829ec23235111dfe632f01424
SHA1ab27dde4b09d6a32a73ca1a7017902e6e631f787
SHA256a261044d1c97c2fdd869b2ac947163d5924bd068aa3b7c296c9fc12eb5bfe1ef
SHA512d9d54aff64d3b5f0ec177f8a8b8eb9558c378d6f42279cd49e72866ac787008a7ef8d1410ddd166af2006afaa3938fdaf2d37d561f3316a2b8eabcf65bc98e8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9c37da9db1f4f810a58ced2566d476b
SHA1b4e51eca1de8131992c9e2bcc73e195d4533321b
SHA25617789b4378d3f3d1308bcd3ea7121a6688b405a81187d28487362bd5856cb73f
SHA512516d73335b43fd6bdf582aaa30ef5304e477dfc76141141b448f6763fbc56cc19551ece6ab6c03860a571427fb4088a3d642de07ae4edb86c76168b008de8ea1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b5a73f52f20ccf20ed7b03d864c4676
SHA14e775647a1fa1888feb7abd26d8a02832b0d3a1d
SHA25637c08ee1c9ae7c9572b5a303d18eb5dcc9ffb856fba53bb3d0275bb588fc0e43
SHA512b040cbe7a67910e5c06de59318e775b4fbf2da3e819e2017e05e135279dce70221799a9b5d66bafd179e008d07237d2167dc6fa463cf651a3ef0ecad31a22b0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb514d54b3d65e91e589c3be6003c244
SHA13b85631cab4b058a1d1cd6245e188bd6aec70f99
SHA25616be70b3645783f7520e3831a8bb91a71ec5da9136c7accfbca2cc3681ac2942
SHA51233a20b72bb8085377496e9daf1c6ee5da50b8b66ee7b516797324ddf193ef325dc1fd91536170823426d69bfe5dfe1698da07b29a3e4e6a54c6a06cb35f427ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfe8dd590aee8d3a4679e60ca30d0634
SHA1dcd8001f4832b74cdde0d2c52f31c008c5f53d4a
SHA2568ac086492b8cce0b45487b2737bab817c890da546ac47db77f97da8dc7070a90
SHA512bfc52e7b33968c0ebfac0f9beba03dfc57c65674233040de394f30187ea6db314f6a7731f95bc8e988a5f7a8ab31d1cd71ee2baf9590914f0734adcfdbb52456
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5317e54ce9084da8f80ab04d26b8e1749
SHA12bd412d9602d06b023dc4cb47a8dffffd2fb6f20
SHA256ab0bfede67a82729325454324d4b08b7593588b30adf4f1e2af39c95eef95381
SHA51204150da0cb02564ba448982775fddbe321a0f3e15351deabb84c36163d360c1e2ff1be1abb1bdd8917d926993ae4b8be653d64e57ab7915abc6437c2082655fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8fdd788c38d31165f4a12e78febaecd
SHA14bf73b5c4211d56db7d7bab2dbf6fd6c7f2cd1b4
SHA256bd95109c2efea365270fcc7b73841292db6648eb7ecde29b2ad912ecb40a700d
SHA51235b3496cbb7e1c3689f072615a360bdb6568c49b96cf8aa887a8b043cf669100378073cf571e0e330e746bef165de52b54ff401c9cd66602a571443442912ac3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563a49185347db794bea1c72ca01dcc46
SHA18dbad70f88e3c28517fb930187c3135e7b17b678
SHA2565c85c58af4bcdc19d8fdb39d2d00112ef28a330c8bc813961987dd1bd243d6a0
SHA512c30dce9eeeb27afaa2ff7c6cd264108fe2cf25d7dfbec8735be5425cb2d7a4d57e61867ea46cd43fc464fdd9c1c582753451d6474a60226660e31533bc7c208a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519379c5f8e9bebe42d5dd8813129f907
SHA17a2d25641bae1c03daeb4b7474eb75ac340726f5
SHA256372d1fe6b224bfb68eaef1d1146c3e9aee2b9e14bde6aac10330462fb51e300e
SHA51252a0dc23c0749656742a51bcfdba247174f172149717b4ca1a4141399e53b511869fc2aade3b0b14f79a8c4cf7b2b7807512fdd3fe041b356f6fa33290a8d4e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5270635cd6781b4710125cc9168356bcd
SHA13ead17c2a4bac9002b1d657a9689fe25f299d82e
SHA256f699925bf28240051169e69db33c7a2dd917f113fedcb09866bba70ae9cffa60
SHA5128ccd8743c87689b6431dbfb4f336a4cf193f3f3756f272f5fcc240623ac2a397908cedca4e69730ac3d55e00d4bec2ea8facfdf5eeebd75d29fbaf6af8a74447
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b0499c03f316341847c81ed8d51e88e
SHA12b4dca0531cb80de14b301850aed50406df4625c
SHA256161fc369584ee5b90df690daa6021db0bd1d9a5da905dd3bd501e565a138eaf4
SHA512a225b5c3a8ba30bc1c9864119c711c6d137666ec5b19ba314d564c6634bc7da757ff249e92bd664851399e1c6742a13d728c55f8942c624697ac9a1eb86da50f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e99aa1441a07360c9d89d3f48d7e44e
SHA19feacbb6db82f5bd2ca5bb71da1bb208fe9bd6e6
SHA256fe7bdbe73e6dbacc780e11504a8e317a7898c3062802e97175340642271adc8c
SHA5123ef04412d2448259aa5443559287263382ce9357775a7b08c303c14168cfc61314eb3c9e2680264e5072ae02aa799a5464f11284ac6163c2f0149808cf68f880
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5581846c79cdb23a3606750f4aecdfeec
SHA1a8ac7d3d9940e8d22d9e01eabe5a6ec6d846de12
SHA256ff63615edfca14e6fc5f0108ed3f9876b726bba6697b9761743cc2292d7f32e5
SHA51237e11a52c4c2681b22b742c3ac13eec7e68f3aee21a32d7234fdeddba9c39300d509d3b99baaf730d89f0deb361e2cfb31636e4d3456dd869ab2bd5bb6eed717
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b