Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 11:47
Static task
static1
Behavioral task
behavioral1
Sample
781b835d7bf202823dfcd890b94d0c61_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
781b835d7bf202823dfcd890b94d0c61_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
781b835d7bf202823dfcd890b94d0c61_JaffaCakes118.html
-
Size
77KB
-
MD5
781b835d7bf202823dfcd890b94d0c61
-
SHA1
a4640a47fe8d6a6d589d27d7a5dd626905005b07
-
SHA256
5a59bc0e8c0a7cbf4da0ae5a490ef2e7be4fa317e8cec6fc5bc3ea2b70cdb121
-
SHA512
8523a2b30ddacac2da91fec968cc7246b7f2d5bb4ac5cfa446b58ab09fe0d7869326083c7b11487c338da4382ca9353446ab2fda721c6209b9a00d8356fc20b3
-
SSDEEP
768:Zcd9QZBC7mOdMIhpC5I9nC4ECDhOcyB+Pd:gQZBCCOdR0IxCkSB+Pd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000006f89e02f5beed1b31d6400d7b81b9b904be83ac78d0531919bfef93b5cafb87d000000000e800000000200002000000025a6a13082cf2d4fb0023080ab7a80237fdc5cc11a9835fbba5c789f2df5a03e20000000950ef0b425bdf2164121c4737c9a134badc6beb3b325dd58caf65fce7cc4dd35400000005fc4431445e3292f8014b278e0ff3042a9bcb0f8c703bc95d3529963524dbb910926dfc696b73b1c81ff9daecd7f37de05b5d82982c898de0ce88e284ca1dedc iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{202BC1E1-4E55-11EF-BD32-F6C828CC4EA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d00c39f661e2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428493168" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2324 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2324 iexplore.exe 2324 iexplore.exe 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2176 2324 iexplore.exe 30 PID 2324 wrote to memory of 2176 2324 iexplore.exe 30 PID 2324 wrote to memory of 2176 2324 iexplore.exe 30 PID 2324 wrote to memory of 2176 2324 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\781b835d7bf202823dfcd890b94d0c61_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2324 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509e8de61f01d9a3a79d2e352fb93aa5b
SHA199b26ec5bd59b48ef704123574e194262eb08477
SHA2568cce3bd991283ae2c332e388960a678865b419dd95274429afc25d2c05a951d5
SHA5125fee13ac0b93da7b1d813ba50157a443da8cb05199731bfce0371465160c4bf6a8dac9230178208c1ecaba62c18422a4b84360c3169f049b53b497697a4aabea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb6e633e902b369504f00531927b253f
SHA1600567b03ca16a7ccd5c4681caedc6f465663d32
SHA256f64dbf67b8463eae81afa3b5f68479c7ff7372fe52f699c56edb2854f9ab9fb8
SHA5129fcfe7729fb55567b9626be72d80325a94f13232fc5e88558c6da78e3710ab3a22fa4d56d799a99e3a74104112a7e7d1ac538f83ab16902949a985f3c3d4b1f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a944a9da03937674a8704f6d1d26a583
SHA1157421a3e8b7d186f33423ef670687cc9ac3bd7a
SHA2560a27b4ec2b5720725b08ae23156b59e579f5186aa1fca75d91a0c6bbc9269ac3
SHA51266f7b723a63bbee015156b2faba764029bf7daa7a2e1827e9af3cc5b08f65f72ad55dc32b09ca36da1a599ef34027c0d8921c9d4a900d29b6fd5a054079bd3cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5856218c3cfe01cd850182150fd952397
SHA1c293c2ed814b65534d56ca9e70d8eb2c556dd247
SHA256b0bbc9cb90cda449ab792ba4058b7a82ae773658c19bad5a886adc3c9b595a75
SHA512d6cf0ba0a012399ec13b97f4f91d1e6a9a6bc3a8f7159459c895286a2b178232b555e549f6cd21b0d30a2fca7da18cf24d3528385fa9dd16e97a20dc1f65c458
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e80506d9545d2b479bb8c0fbe127322
SHA18c40af57e0c353364dbaf1ce2f5888513e2feb8f
SHA2568baafdb85d777e65c4b57fb4ee39583996e267c123e94de7e83a712d78b891b6
SHA5129d369f22c9daf3edf1b4c991a0d0d68ca80e217d35be9f0f1479b9f746c220c847a42190ef58a50499937a46e8c4730195cca8ddb3be5d7091ade2ced4a2711e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb8d3d83b58b02a29c9721f1e6710309
SHA11d8cba5004fb93cc8ccdc18a0828778b0fa2da8e
SHA25655edee968569036a5d827adc734a336f8866d3dcb049748bf2eadea846efc90b
SHA512caf0b0ec4ad4a63a174dd3069b1b2b5c359b174ff840f7894ae008e8b0b850adaf81e09fd39fb6f9053d2cbce389c086109cb001f10445e6f636676aba420e0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6bcd50b920e8a48f9a5199e9a9a6c1e
SHA1ae95a81e6bbbd5abfbc32129040d6721b700eb23
SHA25631f168c3675e0f5d073c1f9f57b444bc8a6a6d9a11b04f8812a512f812c0858b
SHA51278c86be973922a2b37f93d6256477ccc50ff0a3b389270e8c808fe71669f6e1faf3764d6811e755d017d7424fba2912bd5b2d6f1cfaf2f1817c66503f6dd8cf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551ec6c778f2bf13dd5191fc210e63ff7
SHA1e1d9d4d95073f78369d15126c34667a3bb3dcdd1
SHA2562e4353f0e258f9d97bc0e555e4f238d6d1c8762fec1887dda04a96cc2af536e1
SHA5127a66e57d8ddb4a4fd002e50e5be22d5b18706414f8243996b081d9d4c5a64bc660b416832f8ac9226b6f7abff5b0e5a9cece8b4916fc8c415fa2c259b16eeca9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54006c4716c18a2d47d9fd10208c39008
SHA12c30c122dcea23796e965236b40e3512a0b14112
SHA2565e40d760e11732574e3fd8d15beec6513ea54dd761fee96d96007d4ccdb113a1
SHA5121a8e53109fc9345f0328ee3fc2c8c4694586757a53afcdf9a156bc8abd3ce52610265abc57e53e438ce56da982d84c098ddd194a8c1e347dd42cfa36f8972d38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fdc0bd07b4af059432244ac669c694c
SHA1a4b566532d2b3926192d948eec649dc286ca7ae1
SHA25688009483240fbe6c8c8ebc5f3f2a4733e586a937f5668107156aea9433b898bc
SHA5125413c4e1c910a13964923923b43a8c4162d4aa31a2a5fba88983d6e83699d0ecb72af530152dae6721bb45a59df418b9d72d41c6287d28f5bb20f7df711508c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d9d2eea03cbf41bd372ef9575cc2679
SHA1310c9a5c64012d015333bd9f557a4e57bb14e641
SHA2564581d4b8883aaa5085d752de62e79dd5c57c345e8aa0836961437fe8b52c2383
SHA512b26e0a39888e5e15aca5165924303924af4e3587f3ccf8bf62f28f2a89b453ef7054471b2c89c1e3bf0e7482344e2d6967e757157fcf38486ba7f8f2c99a0c9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abc3908fdfbc5217a5a3fb5a6ac5a2c3
SHA11a1d365e16ec87a990adbbc832656a130cacfbf8
SHA256f8f6421d7f9eaac0a4bed35c7c348d0719705abf80b69d08448ab3772a8a234c
SHA5127d1fb348e8fc29e97cc672aef47480cedcf3b091d203f69220d7c56f17f2b134710cefda8a8f7d5a7dc023250b29da3b58e3b6d816f8d54ad09457445be31a81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a80660faf4459ee1bef0ed2fd815792
SHA170c1400e07524ab4e678a2039dc97f112fc0f0e5
SHA256f7628cf65ee71ce4f56d22966f9d7619c72d7d38fd701ca0761f6ba59bf2146a
SHA51224702c275307d1e86e86d1d0fe141360251deb11a3aa5b11c25575d04f676a48743aed328d3ba02b1fde609ada031cdac54a55c9c090afe95c08484d39341c1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539ea97ef518f4b61865fe0b8972d7ad1
SHA119db8b3f795f2fbe4b7f10ccd85f85d042dfbf5b
SHA256376e837f51cadb134e7b84c500a127ba39bc6553ee97a44f2ecdef4e70e42274
SHA5127065a6c6902616d00a3530cd207bfc165f0bad8b86640637e94030a02c017668669ee728dedb9fab613d92c44cc82e4f39741b12ef85c3c1bfceb5a62a7e49bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d61ba9fafb5e2d13687661f7e90b1bb2
SHA1002e33f53e0c3fdb71e103b0c6eb6742dd524d24
SHA2561bf1621581f0b6bc8fe4cd029ce11a228d3176015cc13d7512f5f49897e88f41
SHA5126ec0ca055969880e5e28c324dc1c6a30aa793b40debd9ea914d641adbc2e753c1759fc5ff2ed3111e0a8bc5a0e93d3a96455a08b308f53a8b530dcd9ca200b23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d3fc554834d5c68ce4d3c7502dfc10a
SHA1158b749e6fe59d943a71ff438e22c2b291f2284d
SHA2561b836d716931e03f0971c88715cb3166aba36eddcf141ec7503d914d93bc2ef2
SHA51240385552759eb934de5fc7fc4cf5c77d722dc832e142784642f09cc5e415a645a9d7cdda2ec21dfc6f5949b7b85f3a9eb173e8a37db9120d0870b4cb4837e17c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ad26689de00a98a6be585310cc02697
SHA14301b72422377dce0cfd58af39d605ed4570eae5
SHA25690cc1fe7fdbf4597a7106187cc55789af55f2774265461b9c7eacb5ca2f2ca8a
SHA51245a8c9462466d07cefe7b1676486163c819d64fa978c52b99f175f78a21bed572ae1c40e4cff036f5d620ba878f13c9c29a7604fed453c383bcf8ebf55d1fab2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578d3ca59b44afb14cb25038fca0c6da3
SHA16b357a548ed7a82da1c356c1873feb1add9089f3
SHA256b08fa8f557af42d99b9e41aa54b1d1c97dce5cca8397887db9a12f22d65d56cb
SHA512028489e4046e2aa709e7fba4f2021ed21d352b0a35bf28c33a38483e7d4bbb0f92cf4190ab8c3de183a0ccd20fab5f33254ed2cb8e8d207cdbff7955c4265cd3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b