Analysis
-
max time kernel
138s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 13:54
Static task
static1
Behavioral task
behavioral1
Sample
78657bab7f5a4d3b98a378bc5e42d4ed_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
78657bab7f5a4d3b98a378bc5e42d4ed_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
78657bab7f5a4d3b98a378bc5e42d4ed_JaffaCakes118.html
-
Size
15KB
-
MD5
78657bab7f5a4d3b98a378bc5e42d4ed
-
SHA1
da1e9bc4ae72bfb788df80977834cce7c4857231
-
SHA256
c9ebddac75b24db17726b24c535d3a591573ed676ffd6d8bded27028ea0d4dc2
-
SHA512
a2ce7d6f0ff93b98b09caca7e2c9e4b3c7ca0028c56990ddaf01d9bb0383fed04559b129eadcaff4e3c21758b60707f8606f99d2885756ae7cf8be39f3e53889
-
SSDEEP
384:OLBWOL2F4nerHG7z1yscuZd8hpYln3TDn97:O1WOLverHG7XN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428496476" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D53F7C01-4E5C-11EF-AD9E-EE33E2B06AA8} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000511595f01db454b01ee6633705827ba56ae7bfe07445733f7e53ac2a078b02ef000000000e80000000020000200000001743a5a55fec641de37b8aeebe533a0b32b107d4425ff66c6643b00fcdd0693520000000c01ad0bd4b41d3d1bca3eecb5fab424501dadf7e10d344a08cf53cebba48250140000000d099ed017d869ee79eb9236c4167a85fd20dcb3efc3b403000d56b35bdc72f5b49271ca771999b7ab2702162b1232e1c46f56736fa8a4d7039f72b1d89ad7a5b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 702a159b69e2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1544 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1544 iexplore.exe 1544 iexplore.exe 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1544 wrote to memory of 2804 1544 iexplore.exe 30 PID 1544 wrote to memory of 2804 1544 iexplore.exe 30 PID 1544 wrote to memory of 2804 1544 iexplore.exe 30 PID 1544 wrote to memory of 2804 1544 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\78657bab7f5a4d3b98a378bc5e42d4ed_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1544 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5874d9a0585c1444e1411dd2c8355c3c1
SHA14a86c7e43590cef1645bef3b50c46028e4cd660b
SHA2568162714db1842f380f0f09aef36779e5aa6c3659a8edcde17410c2d0f2694777
SHA51245504a84cb76127d6992e3f38cb83d10c294d64ee96554af18745ec53d31a653ba451909512ea183bf98887e93e8ea8bdf512521db1d7754c6d562dd710dd154
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562255af548f3aa8c64218181f515029e
SHA15e5a077de114969590d79b0ba3ef82dc73c54304
SHA2567e787facb9fd2cbf18c88ef20cc43de3ef60b5128140a60ff05db4203d46e570
SHA51218c957dd7a8f758da8ab54595be5dc38e24e336f5c8cbd57cb590fc0dcaeec4b5e5d02c4659ad92f338031da4e5aa6551e221b2fc75604d549e7aa3a2d014edf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc7d87dc482974af8f70a05490577888
SHA10804a987befe2caff4d858ad21e4111fd75e0fac
SHA25680b3216a7550958f73887f8fc8f4b2fb2547711c5262c810d9e271056921bcf8
SHA51235af61e81a7e3aa368c76f30194687e699600a13dee8a959c0dbb9bffa68aebe188af0d26ae2f54db13b5fd5ebd21e3f040da521923f4cfd665ccb3cff533bca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce87969f3f41f41730418dc48dfa4b31
SHA16e03db12b5c9ba0bf5d154bfc31733875e57e31b
SHA256dbf6ed051abebade61738ba0286a55dd1ac9db939e131c1ac122dbc3862d3dfd
SHA5121dca34c69c0980bc00194a418e78675828f6eb411714fe92bea15014d90baf3f783701724863b96bd6d8ef27beabd2d066100df0a33d3b13c67c3aaee3651977
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb2334b3b56dae2de926c9e266e4220e
SHA1b775f12b0530fbe2adc60746b0d3843a72d49dee
SHA2564c32f5328fc8a82320cce03650c544c747b7f732cf2cdebb0f3e4d41175e040c
SHA5126ce9cb9c6201bd32ca92addb775270e1af8640d052d8bc37e6126adc00e68922fbcfd687e8f0a7dff3fec509de86513155d019ae161737bc197c9d876003a765
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e84d9b5068b3f0178c4b938bee92245
SHA16c692197a5bd825be09f22400deaef1c61653e89
SHA256e62f5c0d5478cf64b6613dbcbb54af46c43473b791de843b3c06c5d6f0a8de47
SHA5121ab541ad043946977fa884fb0605b68e57c26e3eeeddbfc8d4021ca726367ffc7cec2a8cdfa06935623a54b23d5c3bce4990dcc0578b0dbcabff7c74d0a1f991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e549f8647270c7c71cecd06e7d726b2
SHA1028bf12c794acb0d31b64611380efedca5660def
SHA256e2f820c078427cac2034d31a5d8ff1c1ecd8f476426303b026e0067505c93e6f
SHA5128fe80489c38f4cb660d647564ab41d8bcf7bf0434788e2d7ed12c6211f73ea5cfab4ada758a7996b8daca1478ece10626b5c5e474b0750e5567a231b9094e262
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed7683f62551dc132a106ff5805d17f8
SHA15a0d9dd39dbff4ec5f0d540cf3fe0eebfaafe65f
SHA256584f8b295fdbce835a35dbd0fdfc5e9897bc94daa6f427157709dad45e3fecf7
SHA5122966ed3860d32833b79ac2688acb506a237b33284d30c533bb08671b85c17d0f928c7abc4509654b0a5db8314a2f1034c463bdc3485df045789523d532246705
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dc78681b3c30d92aba6a85edd265a38
SHA121cfcffcceac748369cd74f1d6df280c33dd54d7
SHA256bfd946cc9c181ed489ad79a8dea0744d272366d4c280764d8ababc9b1e9f0278
SHA51292ddb966cef44f3a451405161a16840b34170a77b60716a5d0247348b7228e98a54d5bef861318e605a0bbd3a2bf44e9d0818049109d509e4ed93b5e31a2fa2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1a0f14bfb63b1e56664d8b4fcf011f4
SHA1030dfe808b147771287646e00c1b7b56fd767838
SHA256fb5c9538fd0870f50961d844fa97069932b2fd78b970799e41d129ec10bba416
SHA5127ab1acc6fce47b99c90885278e01f3a285a0f96e6d41b904a6b6ef646ba75e98b27363d1dbdad0ef678838ce8d9811d9d42b0edc4a0c7ba806b58995c121099a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d852701c32a7efa35913352f314d96d0
SHA11f2b7670da91eb2bbbd0be24c869a7cadf4b7d77
SHA25667d5802bcbbea5e59ab8361be8b29f6ba41cfea7dee9bafc7f0b0af946261658
SHA51279e0d9555063e68fdf955692b9e6621b620a53c80a29525196b2d83734cd09c55922212cba4fdc65f4c10fe048c92dfc19861c0a0be42428cb42f4f112e865ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f128a9e0f6bb41dcd149750d8ceed7c1
SHA1be21216cffa555c640bbcd4e5875cccc63b59662
SHA256a2e7f4ba7bae3b6b36b8b2a2c75015b15c13f827662786cb9faf27c0f393972e
SHA5123a9a5933a1cfe30a859d8afef40dea49938cc96beaec2383f211297d109a836d52cd86c56bb1a49b157acf6184ca96869628762508294a3b5f0eca4af9e6ff90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552d2f7fdd99d4ab1ef155eb57bde9562
SHA18e88391aa73266f2d274092a4464a5b79259420e
SHA256b7b877ae4460c5eb4aac9e52064b3ba640b31c9943727114d01d672abb011b67
SHA51260952db5bf26b39967dd83f0d7761d893150a4533de34a2aa8d9c2f8e6ff44ee6599e048d406779f696cab88ebd9c3211ae4891cb30380005934fd38ab6cd3ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581954aed670d8cabed8f9fbec007dfc0
SHA10d864cf7a9a409907f99292fd79b3d0df2c489ca
SHA256e8ab3a6f387df7083c38b42ec08fa7932b25632bcf6f2a40a388cc3edee06792
SHA51299c4cbf4d5ca4ed5d8fca138329bac6cf97fb3478198e57a7c62e32dc17d7c0ee4adc08a1841a1e09d2608b2aa27bd7f556bf4dc0b1c83be6a63a6d3de6f9d37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee16367ae86f8101ba57d228c56199e7
SHA14accdb6d68361878fc6e17f74f7b1fa7697d39f2
SHA2562c7af15a47b4b95d4a3a72f4f5cbf5c4646e6e1e41036d7c20983f2aa6bbf306
SHA512d13598eef1abd4b2215751b1618da1900e5698f3dc109d0d8ffd9fb3780ab5788e9a47863ecf171dccee8ce37d7b9044d7b60705bc78446f15a1d7af0dc9b9c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55de20c6028646ac0720cad55bd63fc43
SHA11753a250e0cec64b886856ed1374dd20b6fca5ab
SHA2563ad1877bc1a4ad87ebedfc6e2ddedef09b9e09dc6b0b97c53220253b2d363f1a
SHA5125430c322427349ae4162a041879a3391c3f63783a474356c8ffa1b9b3eef6009944741421a02f09e0ec78129bf2c4510a5dedac54fcaba86631bb317e920eb85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510e48e1e35ebd51c7156832dd1b3f43d
SHA17322db9cbb69003c06d5e9f93835a2c7ac8c7a9b
SHA256ccf1db90ae9c739d8041365ff602b4a3f3163d2f9d4ef093ae5c0b750a51ce21
SHA51296d6f9382f26b9b813537b06ec6cfde4f1efb4956d7274b58b28d82d5336936852bfe39e9273e271aa56d7f77d0ebc4219fb26d9f468519afbb7e262e0b152ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f26309939ebb3daaa11a421cfa78a862
SHA1314908ac166d77c6f8a18228f6b56af7c90b5ac1
SHA2563224e4e8c900f9abd9a841fc821aabf28b2c01094872b2055e9c778ba12342f0
SHA5128940a0dc293eaefbe66c5936d30330461cb615294f18251ea64f588891e4655a5e0054998587347ac2759725e2bc849241999ab44211dd106c298ad8a01666c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2348afddd73b4988aaee827612b420b
SHA1880f1a0904d996cf6fce5b2240c27e33a28a5f47
SHA2567b895ea750bccde734d742faf0fd0c9faa67b88c5d5929d6b2019894c43c748f
SHA512b78b4d7e5563b5ec1d426f6eceedd76cba137fea4398375b344b1931aac230d94fb50d50ed4048b2a30a092e625ebcf4c6f3aca1e32527b0e8a2bc4a288c21f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ae455d6a9a60a29d29202c1941e3213
SHA1929b5432a04506970cbd23c1bfb8446004e29cc9
SHA256c6aa33ff11c66447e9a581a97444e9d91368ce97fee118f2a19f41d39f8eaa55
SHA5122400714255500d531ae27921ba8d03137edfc1c6270f0bb074c810d960487327f429e4791e6fa84fcbc15ca7c0b155949f3ad02fd3f9fd1fccab9424c580d029
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b