Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 06:03
Static task
static1
Behavioral task
behavioral1
Sample
77305041670674b822737f664a7fde2b_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
77305041670674b822737f664a7fde2b_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
77305041670674b822737f664a7fde2b_JaffaCakes118.html
-
Size
21KB
-
MD5
77305041670674b822737f664a7fde2b
-
SHA1
1cdaddd2e7e9d78c49203ae2b8e78e856c40f9db
-
SHA256
cb8fb56c98ddaec83c4361bcfdd032fdd43376e8b64628b49c532c953e49bef2
-
SHA512
ab7e7770aeb216c0b340fb19c10db2367c86b5da173cab9618db40ac1fe53143b832fe3ebe862a33b74400aaf4c359561ce50a4ea4d21b459dc49f0528a2f751
-
SSDEEP
384:wiXilXByVtF1xihxihxihxiYxibxilqqkkkp:wiXi2VMqqkkkp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{57B13481-4E3F-11EF-9E0F-4E18907FF899} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428483811" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0589b304ce2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000331ae2404b260277ecab9401b91aa7270042d72012a5fd48dd75091b7c549209000000000e8000000002000020000000ec02dfea48b35b6cbd58ccd0e6f8af0d276800e2b9338cbddf8117d34f4df41f20000000f0d1e6f9eb6eacc772d2bd5d605cb5e8b3f51b0f3cc07998e900526784e66b5f4000000085a67a672105592729c2934afadbdc33cb016f0db404ad92f6a4df19bc2ac96839b4e959f2111e97b6e1cc89ac41d460a63a337800307461cb945f2d71eb599e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2520 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2520 iexplore.exe 2520 iexplore.exe 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2520 wrote to memory of 3068 2520 iexplore.exe 30 PID 2520 wrote to memory of 3068 2520 iexplore.exe 30 PID 2520 wrote to memory of 3068 2520 iexplore.exe 30 PID 2520 wrote to memory of 3068 2520 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\77305041670674b822737f664a7fde2b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2520 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5737140a2c049c2114d3ae9a887117345
SHA1179d4d4d4bd6acff7471dd4c6d6c819606bedee3
SHA256c5bca8cc46cd156f3f5474b57ee6c5e6b34503402fa3a2e8966c07f4cb31aa5c
SHA512b4a99815c750c56a3d0be4fa962900a021adf0c62a42f64fc0188005c43887315c7be95c1cb0b6d817e70679dc1601a19d65882a25c31396bdec38ff5794a56a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56576f483a890c42a46faa3df55480fac
SHA11d7249aaf75bfbf065edfd98f8faf6f9c6658fa2
SHA256b8e537e2b072945f71b3936909ff85d56a5771e0ee1fe96b390ce338135c033e
SHA5128f54f3922d10862388aeab26dba633d7b8d30eee0ec81ee6fff109db207b74bfdae7080ea729b78e7f393640a46cfd801ab4ff49c4608acc31ba33fdc982f47f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5334e34fcca3236aae3c0825db1376440
SHA10ffc32d333de270769ed914facd2fb0cad5c1d4d
SHA256a53a461802480522c8c46cc0116cbd7dfa07268e7bb8877b4fe3ac3f527d59bf
SHA5128e3fbfb226adf7419063db417cbbc68303c6146297c24967b03628530582e6684dec58dc39714d741af6829ac98033cd4a859aa89aa5d44aee5e251d5517eac9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51428ba6d91b4c8178a13be6efa691221
SHA12e2b5120badb4ad758f4db4df215ce7ccddb2391
SHA2567d8f59226d9c8d6d91fa16b24e988e4376d31976396c582c05f9df77f6c19347
SHA5127a695a60449b448f00907cd72113c72bcf2f1b6b625dd42e1a089a86a9e99f31d5e21b3b3a0c2b3c1a1afb5fa6a773147a5d4dc2bed060d7927cfc32c9a435b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5227623e8a1212a4de635b263cbd454e6
SHA1dd7898700ccb869c1896fc4bd26def3082fe2ef3
SHA256c319c33f16d32e9bd90bf744e16c9cd8d891bf3a2a8bd9877e7d6ed75d78619b
SHA512fa16bc7bfd9c326e7b40b794bbc1bcc345db4da7ba737324b3d5e5ea217b1306cfdea804660d96f69152aa78b6455625d9c296ad3d2f6c602f2ad5f3c006036a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c77c5a84ed2f49610c4fcfe17e39eb9
SHA1f6733d781a6119695dc4ea9caa8db4c15266d8de
SHA256d0c210f742bf33c4b455c0eb02388f966fcfe2f68c94859bcb8fb7cbbf92b18f
SHA5128521ca104d84c7ab357cfacc238bcfc5d671708ca98b525b9c428eed22d44e8894f1eaa1be59e7367ddab6af0bb5caaad23ab33ff8a0f2e26b7f9b267fbaa40a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fc8d2af0717663322ae6d4e03754412
SHA1d949184433f4de1b802aa5f68663c3de31857185
SHA2569b44b1393aac993cb69ad2116b452bbfaabb2aef8a5feaf884289a8747924b24
SHA51261cb5c2915d1ab175c1ee8ff20c574f145acefc89ca23fd68069806d2c47bc76d1ab6c74a5d04e85be4c8a4705dd25a1e23cffaf4017d4868b6b4904df5bad09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57debc81a68263a913be9003caa9d740a
SHA114fb3bbdcdf772b0b382301617d2d1767c0a21cb
SHA2561fc3f5cb1deb2b74f51c5490ce92b6f3a47ac26b97fb0a3c1cc280a199629cbe
SHA5123dd493bc8dca3714f55a929739c3bd25b30c5542576f1d572d8c2c11657ea9bab5bc35cd47f1cde4aba8a6a1745b48fb24a3687f0b54acdc46b5bf201b5510ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582afab0d52f479bfdd159823c05c11f1
SHA115daabe028fbf8eff57bf30ba1178bc0a1c242d4
SHA25644be3a04ff6b51f719fae537778805ace142310973607b14bf17351310863ec3
SHA51237077b1a5cab94d250e4b2ad2669a81d2553dd18d471b0286dafa02c1c0e0aba89174c55b5a92a44d0b42ebd8e0dccc76cc16b9c2e58f9bf0bcd8a941e5e6d25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff4aeeaa5885a71b9e143fc17df9c995
SHA12f16fa3492342df4911906850e7accda54c63f83
SHA256e5d626f874c06cb39d2719fda4d54e9b8de09919eadfce5d1df74185aa985c05
SHA51248cc088a29b2deca8c29c0d2cc236e03f4c844f72193a9e04bf3c15f0a0b1b90d259abf081286e07b508d6e78e080f07944780a0f0169761e9f232beb20f43d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56eb3311e33dca00fb9e8dd5a32a899cf
SHA140bb3e332098252b7d09b296c68e0a5519e3fc1c
SHA2561850067e0725bf254782667ee0085a2b95125b4d21b0dfa2907cfb7f9121bcba
SHA512344499c5754e9c9f35c459b36409b3312427bd84856da5ec39c614157b1a6eb29c9d1f32e5f9cdd505c650013f2b81293e3663dfa2ab4d678b9ae8003ada038c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc7d63964de229a0b6b47a9c9f967a15
SHA12fabc48a2d195d571f58f365b86f3475027f1770
SHA256609d6f66c968a7c8d14a7307d557727f41cee78f972881edaacc7ff865293dac
SHA5124156075eab59e3a441d3ea327ccd1fb82b6b7d1ab6312dea12b849d86b70c2d00fa9282cb41f1a511c46c8af2d0b3ddd620ec10a3bf8bdbbf2bac3980eebc5b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5476b917a976266216fb8ad388b8cd92e
SHA1aeb71c9057b263af968084b6831fdccccbbeeca6
SHA256412160bee8bc2abca58a4d2c3ff59966dace2612db67445e97ec0476a3a88899
SHA5128a9fc6a3831a2f8232a2835cafdfde71a0f329b8b5d456a8d7bf727c5cb7a04cff26ee66727e5481a1ccdf99ac8edb6e9afcbd534f8c4ed593fe856b1c7eebcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bf8f957efd802a4cdb2e2d70596ee8b
SHA1dd8bbede47010e6268611c9d7dc2727bbb7ad136
SHA2563b83bb509ae391537e1e62a57c6a5e490487051d6af998fe91a2b61ced833754
SHA5122328291f146a3189beafaaa20c5ec50d6791ae1ffb414c766ca8509bd0511153aa3250a81889a5f1dc342d2c155b2758dfcf51eb8f7d92c1baa81524d4b8b094
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54192ca18cfa1d88f0a6447124999d8b4
SHA16ed8e5b86f986c7c003c92e1b7cc074a611258a0
SHA25625f259202a83309c14c8b5e93ec4e9a70a8f7ab7a1106b48b8b5333ad0bd2b40
SHA512c5d3e98e9ef1da0edf4dff87d99620eb8a4e109891971d20686b736ed060dcc5e3ec6e61b3b41d2e4033304fa8447a87cbddbd13d439f452d64ae2b8a4629029
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfed34dc25d778fbb6310103fa5e5415
SHA107d4487561695db5da65394e9d575c5e390888dd
SHA256825abaf55dc0ce252856b125be17f4aea6c788704fbb8d7a1c418a514d5bbb7a
SHA512ee273e1b7fa7e546d6601e0d33ad934c502acab3e6cd382cee3c6f3f89349e5239f1b2abaa24d530c45546299a702b7eb2c1054800093a265da679679b476b4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5348a7812e5b0512f006e50980fa944a9
SHA1469280c7c34bf5e74b4de556437ecee9cd23ba5b
SHA256f92db3aa822c2270a15fcfcd745dfa4973562f7038ae8ac2e4117d656979191e
SHA512ead37ce5790be39f691181cf30eec537e59caf0bce7b7b946b627c247b0bf0d97436f06c53a37c5eb493362826dea5dff5b5cd325bdb398c6ac0e61927d52454
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1a104eefecbbf00d5215986edf5c396
SHA1613ee732c2ee9e3845053fde73dae22d16887aac
SHA2568ae6f82de4e2c8556f27870be1060b08bb64d685e641c35749ad3e8945600661
SHA51216ed384e969f9a1aa7ae8e6ca0d01eeeb3f82f9288d3775fe19e14b9a3859589817e6d1555d1a87a81156d073cc945fe2eea94a7af193fa11a0a1d5b2eb7647c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4RXRX1VH\errorPageStrings[1]
Filesize2KB
MD5e3e4a98353f119b80b323302f26b78fa
SHA120ee35a370cdd3a8a7d04b506410300fd0a6a864
SHA2569466d620dc57835a2475f8f71e304f54aee7160e134ba160baae0f19e5e71e66
SHA512d8e4d73c76804a5abebd5dbc3a86dcdb6e73107b873175a8de67332c113fb7c4899890bf7972e467866fa4cd100a7e2a10a770e5a9c41cbf23b54351b771dcee
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\J7FHNNOW\httpErrorPagesScripts[1]
Filesize8KB
MD53f57b781cb3ef114dd0b665151571b7b
SHA1ce6a63f996df3a1cccb81720e21204b825e0238c
SHA25646e019fa34465f4ed096a9665d1827b54553931ad82e98be01edb1ddbc94d3ad
SHA5128cbf4ef582332ae7ea605f910ad6f8a4bc28513482409fa84f08943a72cac2cf0fa32b6af4c20c697e1fac2c5ba16b5a64a23af0c11eefbf69625b8f9f90c8fa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b