Analysis
-
max time kernel
140s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 10:37
Static task
static1
Behavioral task
behavioral1
Sample
77e2d2b8646456548f3facbc132ddfce_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
77e2d2b8646456548f3facbc132ddfce_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
77e2d2b8646456548f3facbc132ddfce_JaffaCakes118.html
-
Size
37KB
-
MD5
77e2d2b8646456548f3facbc132ddfce
-
SHA1
8424492d606dd1a5a6024567e12d571ab7b29833
-
SHA256
810434babcb77b307b152bd1382a55dab4a8fa845bf6744debe7dc6683dfa722
-
SHA512
ee98fb617c1137e56150e9fb831702207a74445fd6f8f96fd266cf8b19d9bd300b0eb0ba9fe61efc7a35ac024862c281a12dbbcf5a02e21b302481113bc8285d
-
SSDEEP
384:SInJ8nmmsCyp4cARg+eTTip2yeHip2SXr9+isU8c:SchKeT96Ngc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000003c74b5df530383b2a964aef16f8dded31315ee3fc99b89fd6a50978bee7e4c17000000000e8000000002000020000000d7aacd23f2d32a3f81e68d0dbcac5840eaefca57c75a1146c6015407bd7afe9e20000000a87e220dc6fe5255c59fda8763b53736011079907cff544e0706350dcab12ca540000000942356d99c12ad5860b8c03a3442df6314c1cd19c88be57b4eacec97e36ee8ccdb09f1dea2441e1dbbdd7c5adae6ca66b5964cdf858522512b4221711d5eb07e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 202dbe745ce2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{86A93611-4E4F-11EF-9514-72D30ED4C808} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428490762" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3036 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3036 iexplore.exe 3036 iexplore.exe 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3036 wrote to memory of 2808 3036 iexplore.exe 30 PID 3036 wrote to memory of 2808 3036 iexplore.exe 30 PID 3036 wrote to memory of 2808 3036 iexplore.exe 30 PID 3036 wrote to memory of 2808 3036 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\77e2d2b8646456548f3facbc132ddfce_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3036 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5387a0332a53e3ec12864058bc6ec6704
SHA153b71df7b8e6f970c949c48c75501089356cec7f
SHA25672194e0e8555b32e6e489f7e19e3e8e2f4aa76d991ea5f12045bb60610f5986e
SHA512f6600d2c220143d638cb0ffeb9de5654d753b145b99985588b8961aae94b7b4a66112a6728d08ff27219d812d86c4e259a9a64f6d2ae991221b64be18d659f8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553e951b7986d30bcaf53f8149999c222
SHA1e38e638c4cf52636a21e4b8ed54fbbdaa341c222
SHA25615563d614a07eb2dea407d6441daaa745a0ada04e1f993c421d5ab2fc6df36e0
SHA512f3d50488beb0b9a5f30556033da65e99b879d618464e33824c37672f4affe484835d7bf3e61a50ca28a02fe9987590d0b4bc1c339062cea88432ec7b40e6667a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a849e82e1319bdbcb83e597081994bd
SHA17d206f5f161b28e7ca6a77f1e378b46da1cbb297
SHA2560a6b6e9a7c21cb04947fe179ea064f28befae2e354bea71840f4cdb282ffc0f2
SHA51224bbbcb2c699c2fe7f4e62e68a9cf2bd2e5defb177078abb60dc1408cb98562052fe1d87d4bb790a6f1f65e5a0b33266736b7ec9ffafee82330cb0ebed78a660
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f00b01d80ae0be3dead73f78ca6901e9
SHA1726c80dd6612a13649c6d014a5e9888ee0363090
SHA256af545db42e02f15464db4893cfcb97ddc7778160ee0c55d4d38949a74eb255fa
SHA512a6fbfe20709132fc53736f4ee9a399fadb31eaf8295c7b1162379620ad960c8d2b6a7314f0e0fca39b9b4abf50768f4c0d4004ff8d20efe9e0d1c90b8190d00d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55db5f98e94fc9ab31a4cb3a76411fbeb
SHA12ddd95de01868cbab82cd4dfca1b2c7c10a1c364
SHA25635da69c1986265698cec6180268f08e1a15fd81f821cb1fa558564db4282fd48
SHA512f965823260f3df45e45fb176461156239c4074bb4ca4d2939272fc09be0bb77e1860ab19c7e85f0577903ae1a40e60cf32ff26b7abbd1acae83bff5bd83011f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5752196e10458754dd78559bb54b977cc
SHA117ee5ca09cfb877b463f2e8cf662ca4c23593d72
SHA256b21ab1ef10484b9b6c149a5d7698d1de8c2bc65f2dfe3b847360bc5538eac791
SHA512b6ea3fb516d8d113b8b387a63996e6153d49b9921cb97a209dd43e33f3d65365aef41a6436716a572052064f82d6a51b9072e3e003cfcf3fde2cddd8fa45bcd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f37660f587ab986a934aeb5d68c717f
SHA1d21497c7fa526bbf164be910f6ff4ee352e772aa
SHA256a6b12e4bdd76a3eacb9f942ff689f276d60fb94d8ce3ede92c194ccd0d89ddff
SHA51223154fc65fa9f74e62d4bd48e17a2a49bba001edf950d2065ad800643b7a1f3cad798a0b98d4a14541d244a43dc87e27b2bb0ecf0f994ead22ff76958752b3ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1d7bd69e1877c60347127754198168e
SHA197396decf73b9a84f7218e8adbc91d0a806824b7
SHA256f31297ea77343c946608ac2bea7ae40f871b92c4384a63c7adfdac15ad33b0ec
SHA5121a7bf10809ccc6401c6dad80d18c6104f657a7e82388ef0fa9f903ddb9942db7ec019794a217ca3525ea89596d8c6cba52551b5120e35d528499de7e1cc7d086
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2b602802f806cad655fa8dcb5e91d3f
SHA12af37bfbe00610da46f3ecc1f1a27e8ef4b72440
SHA25609c52a5360595f2454b13f58094513fa1e3cc6fb63337606ce4c9af20754849b
SHA512fece685e44dda99f0c30f2d0f37672331ae943c5ecf52dc64ac4c8083f65b724ee7fbd19c3c9b742fdf40d7924104ccfbcf147652c87c3cdd27cd3acb17afc1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534d06bc4134a46aa0dff4dcafc3161bf
SHA1de9f4276e77176dcc928825be64bd1f6fb82125b
SHA256e10de43903c738481b8397cc0e3fe82276c01fd3bc0da644fa3efc7ccd41b3c0
SHA512f7904e27be62446be9361cda6232bcaddaf45e79fa5fd2d5e56a5614a37c73ef1fb6e3424842826514c142788ee674829926a123d500f3cbd4fadfe6110f516d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5918241d77473aaee72434e47a66d2586
SHA1d5f5bdacce1cf2d26b43ba1bd7b8923eba68c0cd
SHA256de3c6efa307ea7aa5de7727fd823cf2086c6fa38f295cf58faedbcfc324efe9f
SHA51209d1ed63607c83e0bb76b119822a5f2e6769928619536bf672974008f6148571f9a0398a308a810c037fbb10a5dbe196dc1bb3501d726a9e56f565ef90bfeb54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c34877e9bd134c5c3ad087e87a8153c
SHA19ea10bc3eb0274514a984ef810d41324b8f694d4
SHA2567cf663d747a60e906eb4e96e13a0764e3b268733a6feffeb7ab9570d7dc76fd5
SHA5128711648dc64232821219dd2123fec320c89167c2479f40498eadc3e272995bb00500e92d8ae7ddcc47664ec3ca7727f3a9cfd4976be639e80a9ae65a90297c00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0fe9a7057d8f5a0c8ecb522f2677115
SHA1ae472215a8191b23b6f0351d81a26b07d3feed0a
SHA2564a1793f54cb9a4798561f2dc74a20677933740a1d8aadb1c9d7961aacf519314
SHA5122edf696d35cc1501ac89ad885fe72b5df63ac1aefb473083485b24835ccbeb218f96f7bb9a5a17639af62a9aa565df3fcc76124aba182f65565adbbdbc7f4435
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cf80fdca62e73d4f107b4313b770ef2
SHA1bf9b45817585e884db546c7634dd4dbfa26b8006
SHA256ca253355901fa192da99b8bc8f000c52213aa4b33a70d7fe85a65cd6f86ed10f
SHA51225b209f82890026a14b2ed88cdfef141dd51c6c2a2b476ed5a9147b1c4e3b18d339a84f08943d7e27549681786492bffebb90856fd75fce480a53127401deeb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e7d4932e9919ec9f44302f279d855f5
SHA12f0bbc9401fe2e5c520b5925137537e6b102e052
SHA256e624719ff9d816786260221eeb25a662e0946d3ca9fc7f3da2524f2a8fc4436c
SHA512b4b0ebf6ae5a004b2bb79ef0e3e70bc1905965e28757deb8c7e74d440b4912388924e55a7bb2236598ac5c7f801d9a22e2142b8e7ef06b94008812f095c193b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af033a51255e463957f47208c57f4e00
SHA1745c703a10206ba7a22b47c412412fa5d016948c
SHA256f102ae0cf6cfc545a751b4295274913f5762353abb93a5307203f82381bd521f
SHA512d18fc394bdb502f48f69ae4be0ce5ede5e5bfc3aa121e8b4ce9873c4333f2bcd92819dc44d276555bd54f8e9adfd693babd693d0c7deb643002d147955147f57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5651a0b22c04d1d2985454cbc804e1b2b
SHA1bf7f6ff53084d193e7fa76968ab656fd5987356e
SHA25685b2d42c9ef304020bf2c741a28c71b0a80ba187a2dfbcc556a9f7c4d48f731b
SHA512f3165d36e4a714095ce3b8baf3b46a6d317759628f2690f51140ae63c3382dc43b806a3c07b9133168e54200f0d5e63f4e61c2026cc3dfcab3165190caf73f3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566ee9607205b956a9d42b6be04c676de
SHA15d559dc08e014c80c77b9c03ea01d85133227702
SHA2568d1384f1622c6f4ce7cb097eccffb06a6e3d023c72625988883fe3153fbb9cc0
SHA5129962f898a45826e260d47d6894298fdad75965d58259faecb6de0cd5576e17d2b4287f55f9119db9efdf2b69dca09a3b964289f1632bad0165919feb08af9793
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbaa881caa12c17bb9aa84814c9d1b6b
SHA13f73bfc9a69dd9f73028a1581daf04377a848445
SHA256da83b7053d18b2334fe259970a51dc4737c2ef33559f2e34042cfc4c5db875fd
SHA51233da474a1b79eb95e8ab86bbd761f6c40daad44cccb4699dbfa693d5b1549c937ee9f19eba38c0dd34936834326d551aa560f440576f397f62f7e38a77cf6b6f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b