Analysis
-
max time kernel
135s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 11:35
Static task
static1
Behavioral task
behavioral1
Sample
7811d5ea842325f00214dd3d4229a131_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7811d5ea842325f00214dd3d4229a131_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
7811d5ea842325f00214dd3d4229a131_JaffaCakes118.html
-
Size
11KB
-
MD5
7811d5ea842325f00214dd3d4229a131
-
SHA1
9429463ea007129c8275950d8f0c16114d5ec3cb
-
SHA256
58ad470c3de6b0229e91642b9de89dbe7de372dce6edbc5c68573283e1f5e824
-
SHA512
cac5c6d9a6311d670b7f1e62718dda2437746c5d9fcc2ac0b61d3ae4ea15532488fbd9a919073d36f0f2cf7d474f70439473e4aa0f56c79501bdb358ebd1d668
-
SSDEEP
192:2ValIsr0r57MJxeT8T/w1wvqa1JauBuLbdU8d:salIcIQJxL/ggJaguLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5092950361e2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000f7b9a5634fdd2c1f96496c2ba74d8e67d7d19a6bea50f356877bacda6bb71ec1000000000e8000000002000020000000741017af5dd4b0ac0043a24bb8f19cbaf0537ddcd390654c153cd30b1db0dc5220000000b71e6b048c5fd1d5bdb4ae49e0ed37da834c3cff797692a9e2c27944bfc47fd9400000002ac574b8c4e5dc38c9ea04a3439614e14b3b819b96b2078a58ee88e84f73659a3646b1e02f678f0cba2cb8a40eafec8cd41ee89972bf612625cec07d4d467f38 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{12466F41-4E54-11EF-ABF5-46A49AEEEEC8} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428492716" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2756 iexplore.exe 2756 iexplore.exe 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2168 2756 iexplore.exe 30 PID 2756 wrote to memory of 2168 2756 iexplore.exe 30 PID 2756 wrote to memory of 2168 2756 iexplore.exe 30 PID 2756 wrote to memory of 2168 2756 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7811d5ea842325f00214dd3d4229a131_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2756 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD573bdaec195165eb43d3de02a6cf4645c
SHA1ea8064db45c0879bc539e0fc5e2d89be587e908b
SHA25648a431545088473e14f652fa98341893f92aa16fa9cb3872d60c706c8d7d2be2
SHA512753d96b00d447fc14d96e3b92da94288333b02ec8bca8e453f8831e15e8b0b7bc9a6debbde1ca41ac55c27a0903151ae3726e0e7f6c66e34380dd9714143091e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58d3d644bfa8a2835f1b508a9f263f731
SHA1e9d91bb06f73766e98c8a1174f5b46366d749a09
SHA256dc44bcdd6acaf0493c828d42cc7567b96c8683eb4169171adfd492f12582ad40
SHA512087b952e41b9a9cd8ee34854bccb34a6d2c9deb16cdc576e62bf0bb9172ee74bcb8091ae134c1dc757a59ae1c76044b6f47c8425ac3626d8bc14dffdedc4d76f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c80cb6f7fd8baf28021033cee836a2e6
SHA1db224aa983ce7b2765c7881a78b47926831a3123
SHA2564802810067f9069a1eba60014024570bfa44be6fa290204ff80d7139da55ddea
SHA512492fd8d8c8331386ca36194d4f35f39f0aefa776e6dee6f8ecf04c7cf72de838e9800efc8bb81b2c085f9c478ce6d0f8abc558e4642c9fbe523cb84f642d5ae7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cf8ddc08da5313c60f434d958d302e72
SHA1786de7a5927044df359d837e7276097074bb9757
SHA256be8e517a8ceafacad3c57e17d697ed060499320a6b1813e5dd9d06736b203577
SHA512188f54fa0df2618775446cc25d1368f06df7b7d60bafeb2bba96f82f17f76f4120f7354c3c1e02d9e6eaaaa6cbef23b4d5a030e945f119b4e256d8a1cc015ea8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a3e3725cd0a088a00b131c50fe112fca
SHA1780436ef551b6954762117ee243d9ea649cc36a6
SHA2565f65a3a11c7588213185c1af0fbf320233d95d84f7c7af31297457b8a993a5c8
SHA5129253707e3a9c1128c0757e7117fb476d33b2ab368a6c1293816918d857333bef4220df1b1e624ea26ad06d19e7fc131bfed06aeffe77ab379501078d22ff0c3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5307eb74dd5ae5419ab2095927f708f6c
SHA123e91be7b489abacbfa04f404a38b6a4a2f4bfa0
SHA256621fecdc6725f5297ec06eb31a5127c115b3dbe71d2aed5404e488f04968f95a
SHA512512fb64633947857318d3989afefc57c4610c643571108bd4d911cfd479c9663a64cc6bfafe39726eec7197e1a38dc07da3732c32f75b9b71cb2d536646358bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD512da18ac267ec5417aae5aee9ad1d82b
SHA18ec0e06cff3446867f1d3e0218fb39abd1ce3fc5
SHA256ade1b5d7c0d71f056e25b4d307c17fb90e816a8c4745eb62dce098b5adcdd692
SHA5121de89879c4c5d43d97ea7f1dcc2b0310fc00c4debf12d05f1b7f7f916a015b523e897087d387af13c5043b87271ea3bab03c7d796176fe6bcc22ce67167b86c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5090e27fac894e241697f53b3f4579937
SHA1a5fa1f2f32b12c08ce85ca5be5eb25a4edc8d582
SHA2561ccb7ef688d6678e4a502907e28e0142ae05a2ddddc46e6b72bd6be19c4b8df7
SHA512184354f384df8d47c8c7029cbb3ff3e49819f3b0a714105106b001ba4fde16a1312626397ee607cdc72ed354bc50dea293eaddfe9e377cea1dcbd55388aa31ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58bcc9022ed738426a8f4428e1fd2e9a3
SHA1f89ca1491f36be11a87c6fdcdb44d277601f7253
SHA2565031599fd8e75e84813ab9189f7c451fc834d5f3c7e6c4d592b1393cab89bac6
SHA512bd95f2792cdccf259b502130c0b4070525a80d75ee9f7d836412f42b28ba789f4440ee8fbec619565678531bbbbd2a2a3d97c1a6fb5a7200356f9b7556a3c9dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d2f8783f2bb80549906365eaa7e0c82f
SHA1c77c75bc1c0a14ae5f6e6c79f8ce5bbce3795e79
SHA2562706e00c6f2cfa760e41fc4cba1e277e62268a891152441a39083e59f76dc482
SHA512c820f53953ff80438340865d114196dfa5bbebc223613e9df87cecc782d7581870bda2eb498e0057adb9ddb4b26b283b256aade1351c24968fac291363c9b021
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD577120fbddff1214a55b79cae06d3579e
SHA18850d74e4dadc0d621ff8f7fc990f9e9c34b29c6
SHA2562c4f73cd185556785a1a6262c68a9322749dbb2e40412f26d5385ae2db6bb403
SHA5124b07f01613b60a3a881a3dd3cc3b46bbe4a456cee5b7d63725ef9b1729155cf6af679b01aec0f40b891c0ff6e4359aca5e3aeed1ddd669b750d1ffdbdd8e3456
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5eead2cf1d83f842e97b7ca6cc6dd866c
SHA1d45d7395ccf70c3f554e087a4f275738b60b2801
SHA2560aa9d1997201042b08417cddd083a219d2e0c3e4a910345679ba6149dbad293c
SHA5120f77669f8dd43be50dc1dc05eb145bcc3674be56a9cd002863b8bd9dde5dee719524b424ee8d50fcb487c3c904e978078af4554e4693f077b1bc3a2284fc0d50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f599a21359aa781bf2c603eb6b29eb30
SHA1803b304fc7732ea5d82ec7eaf984d10bc728af32
SHA256ac6fe87cc6809bccfe9b9d635916bc267fe8300acaa66b9a1736cd5c15d519ab
SHA5125e7abe1f4a98d3bbcce94fe4f242972eddb95de06e7442e649e3a0c7e19af4f8fc63808fa8ea672fc905e1b5ec5c141980baf78d447ae600e0c441d709db2068
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ec9a7cf82909faba76f42216bd9b4f12
SHA1e12dc0de4607395b09fd93af408ea0e418f6c3f9
SHA2563af9b485cf07d9dc2bd5d99faf04f8cb1bac0545853b5f8758de49f52f75e922
SHA512e25110cc6b93518dd019cbbeb035c41d89df5e97af7c7d2ec4e2418d1dd25639ba2177f6862cea69dae817a1aba41bd21e75d4b6477e798d3226349bcb4cd1a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50dfac76da473bc00aa8ffdf1e15559a0
SHA16061f8e11aac32b23db3146871ac58e6e9fa0415
SHA256902c7c337ea24eddde4184d8f0ce1df33e42f6a66d47072f35cc4dabdf2a01ca
SHA5129717351e038183db7544f4214d15bcbf53baf59ebd52344c5cae0843054eb4bbe20b03de423f898c22e827c3d3ef699cd96f3f3412b8b4867396e3951049952a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56a5aaffb07bed87ec1dcb1c6974ce1d6
SHA19d00cf8b53ab5463120163c026f87dff453e0091
SHA2562f2014c3288ef8a4ab604216401499f7b9bc10be5fc7edda9373639011529864
SHA5129e2b6f25f6aac3d89d10ffafaa5e9fcdb3da0e2bc4a11925afeb5a37ea12d58992aae66116b2b72d0baf60bbc12c01cee701c0cd81c803baa4798886302c0583
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dc4c8e8e74efeae3e39e149135b73621
SHA1b690f669a331916b36f5c9607cbd54965b03d4be
SHA256b5b9968421d1ae7d1eadce6bfa349d92159736df90dae6bcf9c056b3c34dd663
SHA512a64bf5a59b23061767d84edfd629761d80bd4dd22f5001a1be8ce4d6b11b6220509e18c57568e8ef35a534c4697309ba889cc441326e093c1718f533a594f939
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD540bd94235c11d2f1dd6b72427dea1aa5
SHA1597d94be895e7cb5568e7883d3e9bf58543f7c02
SHA2561720b1ff7ebc0ce2e2f72c6f7853c37e036f101323e5182c107656965ef8ed68
SHA51276db916600fdb6eb8afcc34c10483a627011df41e439df2d321c8904c95e7b9bb89f68b801f61a249588ecb53c6b2c3399f841c66727fa5b06cdd2932424fd4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5eff45c7eb110f820440332eac16132c7
SHA11ecf2b3bede98a895a39f911a1c773bc435521fc
SHA256a410586a6a88cc8920076d8adafa90c8c32ebb2523310f0cefa4b56382d8088d
SHA5124389116e141589bd16fa92ede4ea0f26b755d59a091e094d16617c5f7018079ca11d4edce4d27aa30f523050751a31b58f6873320904859a5f7c3edb12de3939
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b