Analysis
-
max time kernel
122s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 05:59
Static task
static1
Behavioral task
behavioral1
Sample
772df69344f9e788c52d1adecda8283b_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
772df69344f9e788c52d1adecda8283b_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
772df69344f9e788c52d1adecda8283b_JaffaCakes118.html
-
Size
71KB
-
MD5
772df69344f9e788c52d1adecda8283b
-
SHA1
370cdf58d7f46a493d80cf5064c13b208f621eba
-
SHA256
418ba4d08ca583387e821b03081ce94d906b1f5553d50966d09c33d6df76a151
-
SHA512
eac9e7b2a9fc59e342c3932e7c501a87a1fa8621b8a455642309b392b44b94eaef13e2d1a68bc1cdfc20aff79ecef3ab3b593fb2e9795067511b7cd735193d6c
-
SSDEEP
384:2u6+Kzjo0lNWsdgtqKq4g+oITHE7/Glu7EiWKi4dinaG8LahugmFK244aSExuV19:glSyBBGozrxwNuCUDi07SinL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428483195" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c92000000000200000000001066000000010000200000006e30df548c33ef999e21436209cc2442dd73e613f89bb2a0bb2466e06df0bafb000000000e800000000200002000000022d89c038e077a046df36d832e8e8cc0acd101a61875d0d2a4c09f61360f697520000000899d4a6dadc3a3d45a4df6a43128a20e7e00c22338e3621ba9e2244fdaee3f5740000000e446ed3130fa5ca21ba6d8b0db18729894c894fd51f3892f0c0978339e4aa4d3fb7491b60fe525641ade8c2b8c24ab90a66fb2dcb3851d1025e0ba33a0b31768 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4048f3e34ae2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E7EEA111-4E3D-11EF-B88D-EAA2AC88CDB5} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 1472 IEXPLORE.EXE 1472 IEXPLORE.EXE 1472 IEXPLORE.EXE 1472 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 1472 2240 iexplore.exe 30 PID 2240 wrote to memory of 1472 2240 iexplore.exe 30 PID 2240 wrote to memory of 1472 2240 iexplore.exe 30 PID 2240 wrote to memory of 1472 2240 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\772df69344f9e788c52d1adecda8283b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e32ae67f1fa443af603fa5e464eec18d
SHA1c2bd16d155b5f180ceee0bd0e4b8a24b9779ea14
SHA256e82c6bf9755cb5f8ba5e2424fc4562e70811b0a051d03d3ec7d0feb889dd7a78
SHA5121b8fa97ca2e163638da979bd1141163b7fd4ba340097ee4bf14ccadf5aa63235e425ec07c3a950f1d26b7727d93a27b5dbc5d5cd924f5bcb55c047db8b8f6782
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58017614f645a5fbf224158eb83583443
SHA1be3a3451fb670a099965285bfa8ddd90387b1da7
SHA256ff44903692546fd5424803eaf1f7204e4a0ecb95acdcbf058cf65d09c774a0bd
SHA512d33c6cc50159c0cc295189def114848969281a807a7564531dc6345709b6bb717bd8c22f7dbdd127a631b5585c0584b1949a5f0255173a03eda89793b20e7ca9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5078baf00238511ea1cd89482abc936e5
SHA1ab32229f5edbb5196302e6ade04f652e3de32bf9
SHA25642f12a5f2d1f0a06fa247ff5cdf6612bc466d0e5046c89aa6cca6493afa897c4
SHA512f2715f229b4c14bb8d138442bc27ed4d2719c7796403147054c323db59ce82f9e5bd0ad774b8a770107296ab71c47b5a1c8496b4d2cc57141fa2bd0f7309b3db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ac2cb47a27aa659d9c7d4403c6de84c
SHA15942d49d6a165aa18d49069f4d9a8c560bb1fe42
SHA256238305abc906316951746f70ffe88bdf0382dcf8a27c4e9e886974aec416f37d
SHA51266a0f3aab790b548f54f6c6a026585c315ff1e01e1e198162fabe81dd739406d11621382d8007a410e89e055092af7c1df29d57d8c1649dc5f00b71628f5d739
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af690132b844fedfe01628834688582b
SHA1470bbbdb1454e0a33f83599cf1b5b051fa156bd5
SHA256a228737f1be28b606802adbb4e0e3f1f17b3ee5fa524d078a316e97abe541958
SHA51293664159101bde68aa9a45b7ee7ec44201711ccc499d664326c492ae51bd2dbf960d9aab8d4dc50632714a92b5a0418d830bc38967887a0188c6b7ff3709b0c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e50b2944242fa1c57bd9b78f8be92cfd
SHA18e04d7e23e7e2aacac1965faad51e35e7ab13d73
SHA256e5e85c2215fba2ea1da64c4a702b2d2f1e1ecb027df619f3d4319e334466de5c
SHA512fc04ff205cf25d684c5bb2a6b8977bc72bd4bb7abeb14a7652a7bcf9d183ec8b4a0430b2edf92fa49be866a47d002dfa3f727d5703ad83306c143f0c8db6b078
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55db8bf2ce1e1c07d4057512cb4f395d4
SHA14c2b02cd9d2486ea94e334a345ca4e7024d0f662
SHA2561b7c2b5b53535ead594238a4b66cda41b7216e410d0f6c3ad63d65cff7a5cb72
SHA5126e1d30a667e71cad1995595c2aeaf7244bf5195988fa65e8841010d0af579c44b6a9ef36b039b8b2aa2ab3434cfe343861d9a5e5cd9f376c721468a5f21e61fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57763bfc45e4721a260e83265494c8ef7
SHA1e50e63e49e9f0ad3ee22e3a573263b1c70585a67
SHA25634176823529b74b2c9f81cf96952212c3b0fd573bc66cf3876b543158fa790b7
SHA512a0d8e8eed3d057a24b344eae0ecb333887e01a749d73ccea74b43ae635565f7f489f0e0e579c58b27bbf061ceea232dcce6be0b2b65438ba214ba8a3231290ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531fb75a93b3ca3b650a480300320c2f4
SHA1553390db242537fe909b75c64afedcfe53e568db
SHA2565bcc4acbfa924dd4daab922f5039f0413500cdc7a6e2946e1abca6f93e6f603f
SHA51240a5b356a083773a859f0d623c03469552d3eb0826d1bc0c3d0aa23a6e75f5903f607615dabb0b5b12447b3d51912987a472d5089418c86d78de970d0994fec9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a21d98d2c202329daa5b975b1832a566
SHA1ac85db1cc0f32c1fd27702b37d35657365991d7d
SHA256c242cf6e88005648132f5951b2089ef3004d3d3f44f0d424885e1846eb6c4ac6
SHA512ffc7e28b54ba35c735ae84be9f70071dfad7a82ada4adef7f9615d4571cc9edf41a9912a968e29015974613f677697fd00792b294dd5f92ffe53d8682e4ed04d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e60db7cee602ad818767d7c2d4aa202
SHA1b446443a22df45926973b453da1c1f07a3482772
SHA256edb2b03455de9efa2c261dfec3088f549a970467763664a20405d49c948bf23b
SHA512562bd4c31ac99ef8cef95389a1aef6bd3d91dcd5be9661f5b4f41dc471c871b3aae72653ffe55da323dc4cdea462fb3c0f140fa5e0ab7bac19606161a3275579
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546d4b4bd623e938514b49d9e8c5e2360
SHA10cca68016f6a06658ec75ae3ab348bb2dd3da731
SHA25612e0bbe306c27d9ec768662718b4e5f33c05801a7fc54680b493c0ac48b97441
SHA5121b2d78fcb9e857c1ff3003e415f6eb7e604b2787afbc2647096b7b252ee61e72af3d318666a7394dc31b4d45f5704be88578379312a12a29b5830913ed9110ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561775eef090e7ea91655072beb25356f
SHA13af4d308d00b2b7b362481d5aab475ab8b643143
SHA256f970cbd32dfa9f5892b9a8e856d72ea04e81bd47c4f104e9de395d7a535c42aa
SHA51273dc10cdd19862ea042876a504419919010d096ee5089b0039e6273c9387f1622b1564cf280ee8a7358dcfc55e482bc6cb335b16ddee52fc0cd9c4c98f210e5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c00d3f0c087a0c862a2a13f4991fb6a2
SHA1f06b518eb0dd90dc91bcd267e35d716dd729b2be
SHA256004e0e68a42bfd595083411646ff85d49fac7505b201ced358316953480d0117
SHA512fd09177c5dac7ccd0f2e60c3ea939d1e5330f55cf090d244836009a4ff9bfb1587102d134570f8ad26892619d4d7166a2ed6e39855ed6d78f3b761202e4798a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5660960241233dac1530549ba941ba776
SHA1220dedabd8dc1c414db9e8c9f9d11b85cf7b9d40
SHA256d16c19f763f6f517fdbed8363e2e937f6f04c2ddf451da6b63c9804c2353fb98
SHA512632b4deb12e4f9857427a290341b4f7087cd762fae418a3fd7cd29cb329a164d38b4f6690ed9f04050acf3f9df3d28a391fd952cf13358a8ee2aa3cf7fb0944d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52afcfdce4c1db87df7150828a60ec557
SHA14f6e26ad078cb484b8bc1bda56497788749f0ee6
SHA256b5446d4eef97c386668f59590cab36b1d5ab8853e50cdfee1c8e8c95414decf0
SHA5121c54837cc1650f4c5ce362320ea1371d4240235da189f1a9e36f5664775c4b1566e283f69a86cfb8632e5bcb20714eb0053fb8a653f0beeff60bbe8fdb9a6570
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9091671081e7ed79e0e538ab01a1b3d
SHA108574316ec542e75343af90cc200f9a3141017c5
SHA256208a9c5b647314e58c5841debfdfb57dc8a94e3512970cfcc99b7e7d972c2b3a
SHA51214375662ab22a2f9952bebe53cbf3599bce84d9d7733b19bbd15ad97b9fd4b8546622cd5fd8533c8a12d41063cfa866fbb3480e343337b4ebb90a197d7ef66eb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b