Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 06:40
Static task
static1
Behavioral task
behavioral1
Sample
773e2de2eddaedc9810999d58c40a686_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
773e2de2eddaedc9810999d58c40a686_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
773e2de2eddaedc9810999d58c40a686_JaffaCakes118.html
-
Size
6KB
-
MD5
773e2de2eddaedc9810999d58c40a686
-
SHA1
9dbfd1f7efa1018f233f6f79d4741704f03e8fc3
-
SHA256
efa99e9d80cd1bba9f13c0e89ccfa209545ed4d21bbb74399042ce7bddfa2503
-
SHA512
51aa97ed54e239eb5620de4a9072bffa460829b85939de0afc34dfc4aca019fb05091d00088e8b892ddf867845978d9b312b111a6d72ed96d03ec887f2e6a5fb
-
SSDEEP
96:uzVs+ux7OFLLY1k9o84d12ef7CSTU3wbca1sLiVcYR16cEZ7ru7f:csz7OFAYS/uu3R4b76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0b3a85d4ce2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428483890" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{86D83831-4E3F-11EF-B692-6A8D92A4B8D0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000006d5e59a4a33942808e3322b4139753076561ec0dfe6a48d67c0ef970288e7ba2000000000e8000000002000020000000a9e2330d708ebe25308f4ca9c435cbdd200fdb58e612ea85046fb51d7829ab212000000046d59aea1f512a0706624e00d7336ca5138c6e41bedaacd0d270793f0c5cbf78400000006930915771c8cbebf0141002c2b91be71df9eaf06f28a4fbb7f6a9d20c21a7fa77b7d5f3e8c362ac0c7c00f894726090c1c8101de0af357a05ad836a1da189d6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2476 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2476 iexplore.exe 2476 iexplore.exe 1728 IEXPLORE.EXE 1728 IEXPLORE.EXE 1728 IEXPLORE.EXE 1728 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2476 wrote to memory of 1728 2476 iexplore.exe 30 PID 2476 wrote to memory of 1728 2476 iexplore.exe 30 PID 2476 wrote to memory of 1728 2476 iexplore.exe 30 PID 2476 wrote to memory of 1728 2476 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\773e2de2eddaedc9810999d58c40a686_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2476 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5320af08fc3c97a4288d112e978559f40
SHA105d2d021f170e0edf58019b069c3565ffb2f51c6
SHA2567d7fc9e1ee3a476cb483ed09e156cb7cd83aa0b355ab855659407cf6e30f6032
SHA512dbfd6f812c1022513a6acc1145e368417d7ce91e3e318360667d13df070ac8605ce8322db4c826375ea41c5f8d6dc7088fd7385e49b3a9f33d3e1107c95be9f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5576163d7466b45458e8b61143ca6ee27
SHA19400f548e6f5fb1809f222ff3255bed608045e6b
SHA2569e4fff299c25633f50b2e1d3fb4c4984f45f16b4d004544a27a835d511d1d0cf
SHA5127581ca39cbc35b629ae1ba75eacc144e56506249a0100ea71ff1f6b79790a73f6c2639b042d8b8bd1bcd68553c87146ad518e78e86e9095b3e8904d9956c56f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5064f26f7589111c06a7883041dd11928
SHA15a74f94cc0f8804447d31b038f2074bb5b4a161b
SHA256bf940f1e1ccf75d64fb0191f7add1c7bb60ea9e533875070793870b327e781e0
SHA5128664fb7fa71f88d578e94ada90b5999069e27ec4719b366355d2a0816f6265d0ee6293cb6bb409969538354402c93eb74d6d8efd9394735169087770987a0714
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9c975599837e9b83c0b4373df346027
SHA1539306955a9732eeacd056fb030c511af6702a1d
SHA2562abe7d1f19fb6fc5d613b1c19c5e00d829dcf5debde7793361c6f3bdf88607f2
SHA5121dff67618168247857ddcda2fda0c4e0929ad503a4305cd9becc205587765490911086dea90862be2e8d6df32509986377c358f56bf3a03851beb42dd4084d1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b78b7aea1cab0bdc0707cdd9d4d4b3fc
SHA17877752a6937f0331ccc82c36f242c95a528543b
SHA2562ffdb366f20940a8aa6d202d6d5680f30b8dc8567afec4a9a04ba445607a2921
SHA51244e9db37c895e98396f27e50764616067de6eedbb8c0d5c645eae7cd8ecd58953025840c456f97ca76568888d3397775ea2df0681497a6433c56153924b5b3e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ed9c33e649c9f82f222298fa00b4614
SHA16a82b020691e48e0162c4afc6e1c2a420efaa604
SHA256a33da4f5f18ee08197a6161cc9e39fe04191de8f1d1251f998e3f0a16b8de3e8
SHA512af76b178585a911eb575d29fc7d15c26cbbfd1d023ea74be4440ce1caa6b5b5d76fff502cea8b99c6eb7dbeaa2577dcde76c865106acd3012fda40bb5daf4222
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f3b8c4f816c62340ab14a3c9826a9c3
SHA163217e6325d2a343afd477e9e556dde1fd1184a8
SHA25662facc92d47e3230478393ad98b014781c81cc181427577c941f8474a6bf101a
SHA51238bafe4bc31a01cdf0715af34a25253403c37b72cca356ba47c588db9b7bc6efaf79ae1c58e635ab8651db8f9f005aff792f80bf02bd82928d337312784b3c33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c97f00af5a34e5796800fd3368ff6349
SHA1ebb28f9305266f5f217fc3f838fcbb389343e456
SHA2567ed91524c01ffb3222d73048633361fa764a8128a22789fd2ac7982b01b31807
SHA5129699a4d98a22c19e8ac820339a2c6ff61c283bc81d3dabd8736e1796faef69e708b3bf6e273d138bf3e3cc0eefaff7f06747cb88db42b5f2156a5e0cac49a063
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51aa6cc766604bca81de3d1bb9c0793e6
SHA1e2c226c0aa79df871bf0a288a9ebf14afb2b7708
SHA256e11fa23c3cc428eb77c00fc6e55752c412453ab20f60455b58118fd59a47224a
SHA51280711af5cd24eb07b7c9fd2667ce45e47eaa023e6204380879b610e4a34746bf768ee239d3514792525064073b6b7002579d4edd71165f45cb117f9ddd0fee2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b95732bf175f656bc33f8928ba295582
SHA1c12c06953322e74b7b964b253f21b1989ac4c445
SHA256d44684cae16433ce265e9825ab1ba0ba6610355c528bfc001204edd8a62a2341
SHA512ea67ea4fb2c848de4d578ddad70158142973e8a11bbe103753024a1c1f503f478d08f47b84ea580a61bd1f109422a8b4de2c33a1d5d6c1ef4ed1a7ed44f0356c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e59d9f28775a239f76741365f501290a
SHA155ef3bec541c358bb068b1f05432f6263768bcd5
SHA256cbc01f00e0e5f46d77f0893c705c570b8d2d0496defe01542320e81c28d5ebd8
SHA51201af5387679818614ba427de14032dfb51c4e4f0a86b6117712ac197dca3fe67357f909dd06d819b8decc33cf1d379bc1c3bea5de4684f9a4e9bd2d095c19508
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52789e45ed1592fc372fe2e4ca6ef808b
SHA12939921b3285de4f0ebce9a1499cbaef966c6388
SHA25601c8b7e9e8b3338e727c0d64b706364a717444522d28d150c10b1f3e7d85d6de
SHA5123a5cdb37ee3adb9a2c8754e8503159d7b2b05e05edf2968632344d6901cfea7103a0e365584664af9b0c42cda48419b24afcc843dd2cdde4e2faf47e1a123b5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c6fcf419641e3b86da7b9c96a3a94ae
SHA1e6b3da9a210e9f148bac8adc77b5b0c324dac9a5
SHA2569beffe96d718985c215eb213ce038be61c3861e5e4d4549ae5fc80b173b6fb50
SHA5129a8c55297ee69a97bfd165f91c1b96e843d3d9eab76c5a6ff00eb8789c49cc5ade01e47f4911477f8b408cd3e48f406d5fddec7577b5b2e456905cbdffcc1123
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502a00487f6d2c861726c68c736317739
SHA18f3d6534b670a10401d2edf56a6d0bd1d7ba1fb7
SHA256a5888d464f9664a94cfebefefddade3607480bb02f31a2ab612307c4f577cd14
SHA512580c3b3119e1a06c020507a9e97e6852d8e73ce006c13f091666931e578c66f79b89d49779d8f86ec260d3571767660ed0f34b912c1a1e0dc4013475894a4b33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55aea5d37ba0b10e1d93577cbda12262c
SHA13980f35c2a6bc0fbf84d5cda6966c4e5ed639b08
SHA25655180b084ed1278fdde2b96780115b094f21ac791b2abda4de3f7b52c9428c7a
SHA5129dcd6cd159ae338fe9115c0f9f9011bfb5443fa3edbf87bd418023a04dd5f1d77a28466ae1319e0099228f7defec036f96ee64af813ee4a3a0fa51833a0c90e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b378dfe6702b3a309a2c70a5e44ca388
SHA13c8df84d669d1a0cb69899ac0703343ec1c4d33c
SHA256b182d7a19e129cefbd50c69112ad8ecbaad8348dd17f02c59c4c783fe8897034
SHA51219cb917f86e121955fa773c11d4e4f4af8632667ab57676a54d99f81003c83057fe3c0e3ccd725fa41e3b1a1d37cfcf37b558953f4ce953cbc5b8c7409d9ee54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5677033c15adc72a211eec9c9f69194b4
SHA1104759a35677b4201a33370bd3539424b508a3a9
SHA2568d0110ca97452c2c6c88efc2f89102e0cb4aa4b0b44623fa98ecf8ff3bb6dcf7
SHA512537a1a3a792cebebbf91c03c1e78251ff6ead10921f1897d1f04e826329a86096f9bf4445b969d299ab7a27c717b8dba6f083c52f9886b5972cc9b70daa8e77e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503d28be9f62952591393597cff81f26c
SHA140fa15c5d0b2cfe085dfc239247a7977d38df889
SHA256fe18c0587d7101c84f00c5a298731a131bd082968cd88b45ca7b129416480ade
SHA512745906c1c2231a409c15db9658d55bacc25f67b544809de0c7c2596a315d314e9b7b245ec83315fbed0fcc62104b52ee0c9de9724166c46e29347d1e68d8b969
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508a9afb3880643e8f050087e66bbbbda
SHA102575b29beb9122332fca04804d95994f4b717fb
SHA2563a3a07eafe8e7bdb1709a69a13e3843afd7f03bf0e8486e222af938f9fd7075e
SHA5121bdcf758920d466a776cd20b35cbc17f3c11e06a23e9000d8ebab87614134d8f14dcf34f032ce4dc1496b5852c114ba0be77a7a709ab3e9f3c5c4687434848f8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b