Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 06:16
Static task
static1
Behavioral task
behavioral1
Sample
773704e4e8187b0ec2095536858ba621_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
773704e4e8187b0ec2095536858ba621_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
773704e4e8187b0ec2095536858ba621_JaffaCakes118.html
-
Size
22KB
-
MD5
773704e4e8187b0ec2095536858ba621
-
SHA1
dc77fa55e6c711d8102d5160b4a31bf895c026ef
-
SHA256
29c8ba90b075d71b8c1e8ebddca07e3d6f8791a1137e1c22e019a0222678700c
-
SHA512
28ecc467505411b92341c0770c40125a1f484642a64562bf134da8aac9c9bfa65707ca0736be7175a070f10e9ed2b51fd6c46160dbd285dd4db45f714e5a4a7e
-
SSDEEP
384:S2XZXwX9uOJPZKh58+J4JBJtgEVkYe3L6uHlK+aXQyhysFPHR:rXZ5OJPZKDijkT3eMaXfo45
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000f2fea364d5f7364c9b5c8181930c34d6e5ecbb84fca73324e8ff17420c5e6f18000000000e8000000002000020000000dc2a81aa100e3f009a34c07d2cdf976345fafb14ee57f8805e86a27712b07ec0200000003a20bd2300149582c43b48a85a5227c4addda9b2888d9459ceb1f92b57ea339240000000b9d7b7d390316bb29959eaa0af1d73200c014c25e8216bb6efddd7a24ea888b85dd8600ba3b492155207b4709fb266c735892ff26d8002aef7f8142c24fbadf8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428483982" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BDA07B21-4E3F-11EF-84F4-428107983482} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00f328924ce2da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2372 iexplore.exe 2372 iexplore.exe 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2684 2372 iexplore.exe 30 PID 2372 wrote to memory of 2684 2372 iexplore.exe 30 PID 2372 wrote to memory of 2684 2372 iexplore.exe 30 PID 2372 wrote to memory of 2684 2372 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\773704e4e8187b0ec2095536858ba621_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58175ad8566b27c5597c1650d94aa4d0e
SHA1b062672ddc3d7fe51589af291619039cab7b878c
SHA256cd76fa029f51281ee5c6f0da2829b53cdf3918c162686dc594cd0bc51b7c9881
SHA51242ecbe49b99e7271f36c17f5f2ace718b6a82b3c06cf3b0544bfe7e0c606490cd4d76207754fb9fb1fb2088ca8e8064ce902dce9ae382942b28451e0288ab2db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51940ee1670d29069ca7a87d61588d53d
SHA13a8823591374e7e1e7ef4c9fbc291d544ca8c03f
SHA256115e3fb7610f928938158872f918b6daf28dcc36b30435c6beed2bf36c488910
SHA512efe1218960efd8c8dfddefaf5fae3bcb842ce3ee5f4892ccc25c5baa02ccad8197439142434f51d9a597d97251a37f935ca8caf09fb6c2b3ccbeef891054b377
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535036f9969cba784b97668f71a28b356
SHA1c888355c1708d0282bf3937df2d23d0caca900d8
SHA256a0852f72778a5f1c52b9b7341e43cb3ff306c1603bb572e04f0e1705d4458a14
SHA51285ca9c7dd00df84e7d986c3d1db6b1b432e5028a3b63d27d8644d6972e4b74a47fcb6f4165f62733c20d4a3563e161d1546d4b86a5174d82d494f20ed1fdc766
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f69908624c584cd3e761b8dce811b2f
SHA1bf2ff291ab22a62693dea4c317668806123536c3
SHA25685fe9859bfbcf8fc5aeac6ed2a009fcb43b02aefc1d46cd8c0af9446d7d82b5d
SHA512a4bf68f92d6a554d5581c624a0144952415544a9c7aa97fec369c33139263c05432ec5ccb8d42d2da396c4f12213c889bb802d7bb86b274c1e34d5a1a24d867b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548156edf9d43e955220abde606a2a030
SHA160fa19d404edb598801042e14d741d695a97e1aa
SHA256d73d0e469f07a55aa4ee243c6e6ad8f9968cf3811bfbce040aed17745bcc1bcc
SHA51223c49661c00ed18df4f67f6398bcbdc297212de451648f2fa788e11c7886b826bbd23e5bcca71f8d85786a6c31fb52ef6fac9aca993ba58a9da50d3787b8a0ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa63c62b8c4a263aceb8035413ca0133
SHA13daf157b15ebea810b8d2bc8aad33841098a0f4e
SHA25639af7f442b597d8bbc7c47f30f8f0711ce0f2359c9d70065999fc30a7a4debec
SHA512e91c3633615141ce715d6934e5897be52ec69468fcd33c75d0db4210ca4597001af6216f9b9826fe952edfae3f96516b7eeb9a0d563c40018b0af338a55ea507
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcc6c3c082ed205399fb0cb104778f7b
SHA1095c35c49d860268ededf6b7018e77cd46d71027
SHA2560ad05be3e5403d931d27921e1cd576b9cc69a4237c0ac520b1a0cfc8de70b98d
SHA5120e62d7dd7e262c7f54a69b08ce0fcd35115ae1fd3a60984abd2e0f0f614a670a67a23d575427ca27d6fc139352017e2acf34f557aa883bb945efb11897bf6e36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3aa2f13f188ab392d92ddd54cd629d1
SHA1fe12b967e9de55bcac88a0a84a89881ad57ec17e
SHA256fb11600f4e86cb00bb820a165f8148a2dd998169583c6d6a909aeecd8c64a046
SHA5125265f40cdeafc99c92dab19778505daf2176a987f8b040f61949748cdbf74f1ed452bb74c615006092f22e557a7c5f091c5ee21ba85311fce4dff8b6f185daa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519b8aae649c4d7806884fd6845eae2c5
SHA140ac3f44ef3e79c26d0f10f807c4c390107f9e67
SHA256f0469ca4d73ba786465997a2e529f8370967630c1719f7acb238544c7108870c
SHA51203d05d1d3f49eebb184de2cd48fa3ef29dffafcfcfcbdc65dfdfc75bcd7ea8be79aac307f138be7c5b53412d2bd3f7ccc2976205a794bb3c3f935b7787c4dfe6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57099741a7442e9c1f752d167df368e85
SHA15f60bf5db618b5274502e5de369da1507197c328
SHA25673416ded16e8de7cbf401e2b5ac011438e5dc01d1c813ce1229609fdb772ac42
SHA512dab99ef39020635adbff55f278d11862ff1e2bd26b71704b1c404f49814995db2095054890ec2483493e29012e8f269b4cf9af846eab04835e62f5e248750472
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afc498bc11738a1303412a405c7880e1
SHA13c2940c8acd5e8afc7c4a11db128f777a9cdf399
SHA2568e36eefbe1550a8540590f684ed6de30f09c22a9800762739bb9b0f10079f313
SHA512896a1f5652ddf5306084b3f21be0af2c76be1e3ae9f1f1cfcae5621f62cd9e70385fc281c8756d354fa3c5b9e3c9b628d7086fa14749dfebec4761c990604814
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5489344ce8ab0fba80e777a0db9c9615d
SHA164ae6cd1df66e2007859a440aa1e34e16fba6495
SHA256b6ef7072b0bd343434505d2992262d5376fc6db7ba143eb755960feb697f126f
SHA5127f193663ab07f885714b9e437fcf85e36912d918fe32807233f212332ec0b20adc001fdc1f49e334e841acea7ecb81ad3f48e35db33d476618a508d380a268a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abef4edc817c1f9b9ae7bbed01923965
SHA18b7095694d40d33cf5a25ac989044388fff7b925
SHA256b4a624ae5d9d2a791c1a94e13cca604f80507d43365f5a26e3b1f788d0329692
SHA5121c97e872131e4689096521c75237a80e2fc8258662f4fb1661bcf5c55d8de060499cb94e7dbc1ea619c218dcf5c96a76e9572df9e785933074cb8ac047d9ba6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a4fa0ac0bcdae74147bfeb9eeca342b
SHA1a86b1b705a596c4bb4d86b983c8302f796710060
SHA256ab54d09690e38f69529431103f57983f2f65b1843d3c55b1a0bfba0959d04ed2
SHA5128a13e140a38d6c194936c10df58ffefce1463f6b9944dfcb5d8585c24f9fd4d39298da636c3283921c8dda55169de7872000bc662b8c5e27bfbad3914514d194
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de7aca5207fd1f12940703ea19f02d62
SHA171a98f2b07ddddad0d2b0cfc9ee7eadf1013ecf6
SHA256e3f88d62cab1462ddc049bdbd2326e61c626bff263ca6bb6405b806fe4596cd6
SHA512a53979ccb238d9c92d64db5407523a0bdecdfd4c5701c866c83fcb003e29041e5de3c05f51c697bd1c7b909b37a5f0ef404f17bbf9757fbf6ac31adf45827352
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5578c7c630972094548430dd73022838e
SHA1f734907c16dd8bde691a2e7111bd93e3a7bd15be
SHA2564f5d2952dae7adee7e30b438fafee014d055270838404f295348380a12788707
SHA5122b6e2dde568e4cef086b44285b40fa740c70b1415be9a21f6557d7b45979293a8773222f6ae325a7f0127ac156509b7daa5cf90a530afabbfc2e9113e46330a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dae6ec6b9307635f2cbc863063509e1
SHA1b17755eed8b7cae498e09a9987c161adb7ccb44c
SHA256da180f545770887d1fd2732aa77134c9848329502b4e5c7acb28efcd13761f7b
SHA51274a3f39b1dff0df34daa08912423e8404641fea6e3a33d8521ced986f308d9fb894c4232f2ea116a3bdecfe28c3c8c5e9dc31d48debee0d1bd67205028f7ebed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59347265453cae2852570089b85309d06
SHA192a9dd10b43d22f070014b1712ac2614cfe5a072
SHA25609cc2911509b5eb1e52ed31597dd02dc2045d0cec6c5d472baa3efd9026c2ddd
SHA512f959c16497a57622cf4da5f15a088d3cf1f0d1823f559ed182709610bf1b6c89ab149f02f35bcabe82e6f9f52227233099481a6af6d0e204c21e98e98f8cec8a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b