Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 11:22
Static task
static1
Behavioral task
behavioral1
Sample
780778591e8e5655dc382c36c6615978_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
780778591e8e5655dc382c36c6615978_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
780778591e8e5655dc382c36c6615978_JaffaCakes118.html
-
Size
106B
-
MD5
780778591e8e5655dc382c36c6615978
-
SHA1
c2f4d6451962772345141015c9305db7ea1df338
-
SHA256
354b3761139491cea1f1ebb60983f9aa140938e69d6fd03be7c1ec441b3b45f9
-
SHA512
723120b47ee02dd0431c6c0afb9a95cfb3124602c5aa1a8eafe6ee66b99d800b48532fdb94cb8b5bb4417503db50d3ccff7b221e3e99afbadc3c51bbbf1acb89
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d9909000000000200000000001066000000010000200000002ecbad8a0ec790ca313876c3bd9af05621d9a3225e95bce7b18292125c9c6da7000000000e8000000002000020000000a834bd016ad49a3477d3906a084148403fb2ab43b9db4918b1abf88a870738b320000000f6528f14b5c3d6941ce146854221c19fbf9e111effa99bca4a12ab868fadf5e440000000b5e4222fcc2dda79f244bc34cbbeea70f61ccc67d26f4f44d925c5d03149b3228996b01934f4ef52a4b07e5943f0bb9f2f5fcfd30228373adf3ccf9925cbb4cb iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0cc7d3760e2da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6316BF71-4E53-11EF-BF21-724B7A5D7CD6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428492419" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2416 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2416 iexplore.exe 2416 iexplore.exe 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2324 2416 iexplore.exe 30 PID 2416 wrote to memory of 2324 2416 iexplore.exe 30 PID 2416 wrote to memory of 2324 2416 iexplore.exe 30 PID 2416 wrote to memory of 2324 2416 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\780778591e8e5655dc382c36c6615978_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2416 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5640aded2021385c50a96ed1567aa38
SHA15bf8e2ce6e6602b251b83294bfe4038338a0520b
SHA25682cde680eafc0e68cd8f37112a3e43fbfce8bb2eb20f6317d72e3fa615086865
SHA51248fe336f3ed98129d8e7513722e537535c8176fe09f0aa6b83807eeeec21635db50d693f76eb803cbd6cc79129cb08b3b382637687feae18c75badbb9d1f7624
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500f8eb4126606a0c4066bc029a569acd
SHA14b294d598db135c6f01cd57bcc5289385dca5179
SHA25634ef0cac1f77c66a4c99c868743e7dce3c5cb8abdf2e562673ccda5b942d902d
SHA51231c3e7b45af265ea820fe33910380edb1f888c8a60fa16f766d7827b5379c3c994a3cfa6389a1ddaabcab26f2ba2692ec49f8c5c7f1257491197c262711ab715
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521f3c00c57caf11f062cd70232874b2a
SHA1f1bf99ee5f4d03c6a49129d0c94f5974a4a03a63
SHA2560c374d37abaed0c485924bdbe5d3b3c2a2166bad31507db4836f75cdafa974ea
SHA51256fcb77946622442fce34e3c67b3484a964db3e7e7c53b3fa5a157b3cd7598fb1ab84b491f13800be1fb82f951dfada5360c7a13dcd46edd32f87fdfdf9bbe05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50479e5b61c5b17dd1fc4f7652b8bf09b
SHA19a9072816e83e6190a1ca447ca7dbd67e04af10a
SHA256870c9aa8e4f64593a8422f1d7ae8baca1f37e7e63ee71392d6b23afa724c7d53
SHA51297387e20218ac5ce16d77c7364a34d1c1074ae7a8e1a134937254a886326c54639534a8a9877aa69e316e67a5f6c6727ded443f2f3d8772a2e0ce59c96f804ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589de1906a9fc30cd291fd384d36809b9
SHA1fbf0dd45cdd2447c96a7da602ef59b06988bcdf9
SHA256ed3cbc76e3f0e2dc0c44f77cac1733e8f6edd66c8ecca21aef9cc6eb1f5e1ca8
SHA512addfc5e6371621e687a6e076d8b6a1b09e4a3c96eb1182b3475e8cefcb35ece982003146541362105094f260c09af8a050ba73ee17209f7a3f0f09ac2f79a30b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ea2002e9c86f48982c1e5ced8684314
SHA1c6ac73c436f832c0e3455fa51b0fca2e346b51ab
SHA2563074532f69424c7ed007e56919e93055cc5fcc40c3fc32bdda4779d71cd93327
SHA51273efd91c9e8917fb7edc7f469f0c8bad85910a15bd706842c85b54cdaadec30390a5e2ec565da3a675042c1dcb342ad6999a5d39155eab04c6ced2c17b0a56ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585bb9308506e89bff6945e327e2b1994
SHA18c6bf54cfc70e020cfe895f5eee838f8b90bf46b
SHA256b440d6f790f94748487f075d7b8708a4150afc122bcaa36021aa0dc7a51a3931
SHA51216a182afb3c6793b6e23a2fb0100d756938e0cb583ad26ebe5ade282759e3954ceba4c5a2d17fdaccfa85f3852b3b539b54e66106d3f341667d6621cd4beb170
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590f3608d0a7c025ceec0bf00d27cd79f
SHA1f70707c6497d27b56360aa770c54545544e48579
SHA2564d636becb5ae133bdc7a893b0e223d620232b3b8b7af0bfd6a26fc502ed19193
SHA51250814c58260b05833bbe4749542e5ce21207f3fb398039103b277e573428289aa6be008ba20f131985d370e395bcc9bd5aeb0db9d477727a3bd8729c823b5424
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa05714aeb9af834b845fa4bfa616a6e
SHA19aded9a5dc6e6a655e5e7aaf73cd95514ed7bf65
SHA256e907bd9fe1507a3aeb6d272d72e2abe456e11bb1c536b1156ac878dd32abd92c
SHA512ef1ad889a89694aa39467e7323c9fccce3d8802dd75ef3b13e3c8db64d0298e4b42d461c50ab2423cbb95d9e94683e591dc21b1aa8a963a1b453213db27bba1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5314ca8d1382dfc23220521d50bdad298
SHA1186e0ec76111e70c254f328b58c50cf1f6aa8f0e
SHA256679a6785cce49b841910c85c97b49d7290860e08f2ce7608d697681b563bf244
SHA512c6d7dd9c785d744266b44d68e71992971d9e751dc4eb3b9db3118ca3efc2152655f80412e36c8019d60a21b2ae41d0b16bc3d4edfa0e61a40efd519a9323dd71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6ad702d127f7a202a2be4826e9e73d1
SHA13e3eae6dd91dc96425c8e218e2102d3b7b816b18
SHA256a79d311bf2392a0ac2724f85609184097796a80055ce0a667fb9ec00591ce1a1
SHA512e382175b8bc91eefb9deb304981f1157e0fa945e3b530e4f3761e90a6ab8c06b2d19b2a2c2fc560683663f574a8c56affe048e4c276ab373eaf750a9c9b00fd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5734955973160b39fdbc0b178885e48ec
SHA1e912f6e3ad675df6ee498a55d2bd925eae0b6328
SHA256028a6aa4cb47e10f72a71a1f971797c80b6406d5524ed7b8208cd46a8a4c584a
SHA512cb456d922cccc95b36a8e9e2f3a682c9a37c5e2eea8e596a637ede8720192f927c950eccb229387240389a3932991a3025fa615e7d82ba075f8a4254e648ba94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b88b4dd91d02badf518a343f67ac6f3e
SHA1ace21ddf9a48245b3239fa9ec9b974dc95ec63d8
SHA256ad50cbc8a4151e47d5baacf55c176174204bcad46cafecc099ef5a010015ff4e
SHA51221f8ed9cc8c4e6d172a06be63e55b4c25f8fbda0c97e08cef191e07dea0a2e865bebf730c554f730c8fb2833e95ab2e11ffc15991c0b801ba5489baa2a13a2a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547b65f33510e3bd9a1ce18baf720ffb3
SHA1861ae82d35b31e70f17b78b2bbce6d9ccc66a097
SHA256f79e71caa3cfe697d2b46eaddfbf082d00558d75e40556b361059d861b962bdf
SHA5126f8ef64e24fd0cd06a10e7cf3cc6e34fab3e950bbbdfbaec9af0dfa7a7f94e915c52d79f2c177002cbabe61ecd0052696cfddad55588fba59beb758c1c99f5a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea6ba873798d07b05827bf37916ab3f4
SHA16568050c6514e7d69eb12fa2514cf0ec2287f042
SHA25682db3e1161cc8033570acdde70b5b9707a8f8a966351a541bd384ff738c2dff8
SHA512a28b350860c40f8af97836dccdb5913b876f7044b4d32a25a827f5ec3ba8ec06e85a39b6aafb8b5d32b25310a966c115c7cc8b35d97dcda41edb92d40bdab29b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ade39a53087d6e4fb859687d440b02f
SHA191f426954c87996aaacb6dc79f64ce7ddf9f3f6b
SHA25647a82ffdd235277669beaedcbbd0f6f54b4cb6d00bbcb87248bad7e9a9570005
SHA512a8ccc4aaac7f06059e2e3b9ebd0a69c27627027dc8cf9872a372536695a5b95469141b04a9fbcdf123ee4d247e0e17dc3d016c8c3840ab4b0f9b241f81e7666e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5debe88ea5e30310c8ffe8f4d82e6fd42
SHA165b2717e25ebc3be2ff42b44beed277d5c259071
SHA2562b6df63c8e90574c64ac8f8dce0bb7c2d1316f872813ff75e884711150c92199
SHA51237546df1ac463b146d75bb8375659b8b78b135a628324136452b10260c238669194f3bcb48742f6a4759ee497b1c2c5325ed277d6d1129df5a107174645c8c30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5541bed7e28db1838b7215de63fae7e31
SHA1eaa3f984cada5c13f05a2732de64b24c30b042f9
SHA2561798743477863397c830e6755ad28844607591fc358ddfc989fea7a7811f8e26
SHA5129cb6ace68c55060fa32bf44d69e909285bd6d889f27b92658fec75a071e2801f065c3a46eceb1170d2f296018555bd9377f4fa98e84dcfe08324575121ae85c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b00718e5a75fbe517d0040ae74d34416
SHA13843b99de93c4cbc2e00f6007f053dee761ab775
SHA256257be07cf12ea44a3f46ce4f0ca2e86519918083881ce4a9b60091e4e1972cc3
SHA512498768d457d4fbefc96ca6f38b35a246de331c4e987d96d7d84f0786d73f91d31997acddbf4c61447b6f50a0b96918192463d3b81ba4566cb36c452a8738591d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b