Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 10:20
Static task
static1
Behavioral task
behavioral1
Sample
77d5110a70f3fc76e9723ce3d9e995dd_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
77d5110a70f3fc76e9723ce3d9e995dd_JaffaCakes118.html
Resource
win10v2004-20240729-en
General
-
Target
77d5110a70f3fc76e9723ce3d9e995dd_JaffaCakes118.html
-
Size
3KB
-
MD5
77d5110a70f3fc76e9723ce3d9e995dd
-
SHA1
87deb6a3e3596111e411011f3adad60d1894129a
-
SHA256
9e7a17ee6c3b0cc25afad2f0521c14a0fcee6082521be1d8ebb630e584e2ac39
-
SHA512
18d1aa3f51f0b62ec54837262fe86805c0813c582b5235f665eb4dd40842a42f856a1ffd7426b7d3220fffa26d7ce98631837a240923ce96edb2a57b73fa3674
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{416D52D1-4E4E-11EF-9257-F6C828CC4EA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428490216" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000008b91bac13c59e0a49a4c83990c2c7b37738cfbfdbf5ab7200e1a260a6921e3f0000000000e800000000200002000000073e4bf0962484b6912cee31b44260f7e6d544668da2e16a97e9db4b5c70845ad20000000b3b873984e59a1b41c88c6480dc38c5953602f851d6039d6b6944eb17d65b4de40000000d793f9dc978689efb8bca69145a92ae43daa9cb1b4859c81146e669a2a1aae420a360617de6ee42c95587453f55a154b477e220f2bcd79526cfbb74184a956df iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b06e1d045be2da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1600 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1600 iexplore.exe 1600 iexplore.exe 1564 IEXPLORE.EXE 1564 IEXPLORE.EXE 1564 IEXPLORE.EXE 1564 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1600 wrote to memory of 1564 1600 iexplore.exe 30 PID 1600 wrote to memory of 1564 1600 iexplore.exe 30 PID 1600 wrote to memory of 1564 1600 iexplore.exe 30 PID 1600 wrote to memory of 1564 1600 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\77d5110a70f3fc76e9723ce3d9e995dd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1600 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1508c0eecc1fe22dbc2bdffa2649daa
SHA1574ebf65e5e543d23af25132ef8591016dee9de8
SHA256752f8982bfcb8d07be02ec64b675baf23b71e31314b941b90c057f72c885dfb1
SHA512366e923d35d762d56106584bcb0127cd1124065153da83bea4426a283b196a9275c83a453d29893b8488e28e5b48178acbad8e5f013e79e2f1938a086e5c3ff0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5188cbf8fed017fd42a39249a2b75b3c6
SHA141d0bc530531a76a91ac8ad9a6137ee0d3699d6f
SHA25622f25ac6479b642742dd3ceab74c492fc6c4caa6efaf75cc12c95d9662ce93d3
SHA5129a4e241fb02902b6fa6f20e7b41f7b25e0463640b39caa6e532501e4677ccb56eb51b851a313bc649e8e2438dd1aeb6f3e6c80d2b34e79240b0e1286215f9cac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555a963748c7d1c095006ffaa8b9825a0
SHA19c7a8a325a82a2ff236e72bb8b7bc547fa357b85
SHA256a22ca94a8f4f93120b46cb1a684f04181d474b436d79f98ca4b6aa90bfee2451
SHA5124a5f5a6fc80053bc458313c6b5e46000e0964bf18ff0a3f689f63bd7d312640dc6206de5712595b7859aa820bb6943c822f61c60f13039c29be91484a37f1e9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d448ca18fca790f473de4b348a2adab7
SHA1b0d975b47bfff9c4b0bae3172c16c8c4b0070727
SHA256f7258f85d55bd687312997b64e4340b2ff55e7a003f796948eb134e0bc7d928e
SHA51287255d8c85506fec331872620e1e719a3ba5a0baa21cf364b4f827a3c01fd033b4b687f21b6e9afc8ba4e7402c5aa1889bb36fee9d3205208c1706ea1c69ad3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1d225df917d8cd504b2aa99a3334232
SHA100f150220d54909c92be7eea9723d9a29b1ad174
SHA256ea1f9a6edbbb6b3bc95dd0671240dcbbcff74300d41868d4239e8fe93273b767
SHA51234b0cd498077efbbc42403adf2e82d340b678c3d96df077e677b0102ea89d2ea9888255a6b78aada5c5ce30503a35ce6b99c9322bb81ace17f83484d95a91079
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5509bc06c784c250d9006e47994f1e4c8
SHA19685aed14a3707157e3d7c5c26824bf2f94a46bc
SHA256f20be71c3b02e7fcb1b126af167589c21dc3ded8e8f243632a48ab377c7556fa
SHA51207447d2623a2134a4a7b2613effcbf949106927385eaad9699890fec552e0880429a3293b69be8f7c81ab6c82d0a0b9cf81ea0d4deefb960b64878ce87295289
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d9eccba0ffc1fda0fd1ade76b29802f
SHA13280a7d7f1ec5ee6a30b3aafda1f6691e0c7394f
SHA2562c605c04b15cab5096a41cfd6a1443c2848d5b1b6cf925e96840b8ff8988cbe1
SHA5123178e49c76d0eed1bb7bf3f233283e86540ceeb8ea92c0a9628e155b87322c47988f20927eb68a84a619577e1e66f9425fa42835bef26c33c43fbeeafe4486df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5009c3f8fe4c07fd1875523b97c4dcbe3
SHA15ff9c1df1c7a61552d5da8f557ed5ab3d37e0519
SHA25634d5c24e1b0174c0ef6de02864e06d512bb182475f0a1f81a00dadec26c30bc8
SHA5120e8d653abc261a6b815d477170fa4227e47d035f50d125bcd8e483a753f835c538acc204e9c040bedd409eb689a5e2c1a0ade9adeac030210fe70ddfc229ddc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b548ecec83ed755729178c25025e8c97
SHA13099f76afa187eb3152763777b07afc1eb787d26
SHA25668e9ab8dc20578086049c40b8c7c1168d23bbbe026f6a6b231fa3398c2099eee
SHA512c75889f4f553eafab8495e6963ec8c1d4aebc98c704eb6da1aac5c7336ad366a019cde85a0e2b4582752491392c00650bdf0362a9543971b1569eb7c24192a2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8ac15814694024acff0c94da8685b92
SHA14bf4a7828f3b831a1654d819e22a04ce6bf72a64
SHA25610a34c24663d8a04c77952ddde0809e2dc06f8ec4b62c2aa704a740d130e231d
SHA51260d06a3acf8528082ede6dd63eef7bf0cc8c534a8fd52c6a0bc7f3bcf39269316e1ad38e76e158f1eb03cd57e0a94c2bdc67b179462d892f3837468cf9c081b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3c65f177fd6d4343a15392262dd172f
SHA126b579e35371be076a3d9dd9d709223c99ed272c
SHA2568cc73302792d359e42e9d4e3f0da917fca97d44e839cb10d42737d3b7757533f
SHA512f7c78a526668b1bb717a5b2522f29a7bd1c9704baead3c2d845fd4fca29065e276b88dc93a158bf549e961ea65a198929fa8a137f44782b473430d3945b5ef58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c020a4b1b7b5d0f6f5c04d4c5cd9ff78
SHA1fc168de3ec32bce5acbac2905c374234ab579e87
SHA256c6a28ac3e9a41e0fa65ea10821029796287de93530fb45766fd2e68c0ddb4557
SHA5127dfbbca329f175371fdbd1605e4d7dd73e63edc6fb2f83deabf9ba0c89f474cd5618c8a849aa5778010bb6d1a15580aff506b4e192c9c4cf614b01394c6672c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b493018921d87ba8e76c06799299028
SHA1b0a4512c10d9ec3609d2485c8f423daf70dc6c02
SHA256d90d6d7a150d47ee275afc5672cc5cd48016cec4fc9fb17c87cd9ef701db8ae5
SHA512e3bd9de4ad6658e9ef1c772d1fe30997de3b46cd12cdfdb8999630b864acd14734f7deb8a224dd3ea3e75668d658a2aa42babb87a9560c8f2e6e30c8bd70e0a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556595f68fed4cc15cd90fffcd7e366d9
SHA13c047a895d6dc9b16ef4a3e1b224bc67e3eb4fc5
SHA256bc6e08177cf27d2bbf62031168621728bd42a77f7f00563831c6cd8dc0368147
SHA5122601d97b6d606e9b4dcc604a92ca401117ff9fc0b3ee5a4ef99832b48166e25d987ffef091552132f46ad9e53454d786c450e239fa6f2c14577929e4397fa93f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb3d46fbef5299b613e93b50148d2ef5
SHA1ce9e17faaca50cd4fc8422d00eb33f97f80a8bd2
SHA2567c4e913339429e71ddb144f73313a25b4f23166ffe90860567ee97c69e7a5300
SHA51233418f0396ad5013c3bbccfd38fa439006a7dfb253090834b681239f6e71aceb9d8c7d3ec0b1d05e855ace77666661f45048039b58dc551679c559aa0f54374e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541cb5f301d32b65ef8a06bb553c45312
SHA1161f34c493d3836f30d0bb12036f3eb8b17f7a5f
SHA2565f0d5662f1c91b769a4259e77b75ab7decd4e7a61a875cb5ca5e867fcfc13735
SHA5126214a4ef4ebd67c0f7564f9dfe9906ae72df1f9dd1a9a9d7d1be5ab5b3629eac6f0e88154c263e2f23d163b90bf597e6d2779e0afda26852fb4b6bcba87047e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569339e6d3b33051a8370d2ba60ff5a5a
SHA16b4e67c56d5cd9065f0461ecace6908857875c08
SHA256c480b5cf0b2f06b48cf268707e71ec7f6d508a58c07ebb0ae077b7ef7b4053be
SHA512b075d719f9a1a1ef38e840f59d54709b9f6bb5330a6a79767d243f24abcaff039039738c1760100040abe653c8694b3221870fed7db78f31b67469112ae1f38e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ab3702fcc69d645049656ab5b4a694d
SHA11755545c75313ff5ab7e86e2f337c348620095fd
SHA256d763f9ccb19d25937c773126bb060439e07f400761a18ff6dd87138c24b0e866
SHA512cefe30bdacc9bca186505e99ad74f060c3ae63ac5ec9cee6d4f131bcad4f1ca3f472593800d46055db4ce95d0788cb5173d07de46b24bd09061cdfcd8994ae3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5760f64016480763227325da1a5be75e2
SHA1e0e0d0888a9186634965973eea9d157db1444c01
SHA25694d5ca4890aa9eaae77b053e6390cf642654cb7dac9d921dbde7cd8413a3271d
SHA51213515ac8ff9d09f7c6992e4f1b7187571fc220f68ac6559e389a3205e1e5804ad986aea31a7b655a845e7d405fc772d12ccf9cc3c51e5c889126e5a086be514b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b