Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 14:49
Static task
static1
Behavioral task
behavioral1
Sample
788b2748f40e076363bb547a6a555e0e_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
788b2748f40e076363bb547a6a555e0e_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
788b2748f40e076363bb547a6a555e0e_JaffaCakes118.html
-
Size
28KB
-
MD5
788b2748f40e076363bb547a6a555e0e
-
SHA1
426f8dcd25145f2cb6615d0646616a888665622d
-
SHA256
b34180e0bf63e5604f4ea4af2ea708f6948b95754addcbe1da2db0f6ef4c4a53
-
SHA512
c921b61866844c92a0f51c9bf77b74eaa2fd207baf4535bd0c993b82050392a480a0114e62634a375c8caa9d0b951f0cf8d46af0d411a7e2f0e6540659211995
-
SSDEEP
384:uT2D9mPBkNr1pEV5lIDb1oVQtIjeQfgFP944D8ubCHGZjyoQZ5JVXeRfTO+u1c:APCrM5lHVSieQEVh5CHGwoQZxafQ1c
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6447BF51-4E5F-11EF-AEC3-E6BB832D1259} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c9200000000020000000000106600000001000020000000722c53a61b9f61ad764ab355b535fce09dbe305771edfa30990c2a11d11996fa000000000e8000000002000020000000673e163de1e511ce69c13bfb42f14c374d972a0d0b3f17f3ea6b4b5475e0f07e20000000d3883ba8eaa4c43e2cebb67f4eed7f2b471ede7afce1184bbad6dca52faeae7340000000a87620537d7dd46dcb458c0f0ff6f34293dc782550e309954de63621e9f5987a017b161c3a945cdd53056058460c8dbcccd043c7050dcdd6c9744a073ef62f3c iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f04b683a6ce2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c9200000000020000000000106600000001000020000000cb5e54591e6e839dc60a40b5eca37e71fd050823df90af1e292c961917ca3666000000000e800000000200002000000092a5743ddba8dc06cc972dc8efb1b05941897968444aa52b6e92b8532009886190000000d373948420fd968c681389aaa4f78fc0a6d31e38949f4143c4dcd3b2d3a3e730c2b3c9a92f7c359154be8d662a69791a82d32da5fce942548eaa65123d954c753def0de96e1e3556ab551e114dff5f98012b719aa996149f3999e1428e76447e11f7e3ab0d3a51b9fc043079ae77e3b5663357020aa3bed9472fbd4043c25c96117e578392648a6c926b6255d78505fe4000000048a0c23460726998f74824b0f6102ab2521a85d932f5daf4f4206e19ced633dbabaf1371555dc7f97e1f985ac44bd27ac25651abcbf6163cf809728f87bf41e2 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428497575" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2716 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2716 iexplore.exe 2716 iexplore.exe 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2824 2716 iexplore.exe 30 PID 2716 wrote to memory of 2824 2716 iexplore.exe 30 PID 2716 wrote to memory of 2824 2716 iexplore.exe 30 PID 2716 wrote to memory of 2824 2716 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\788b2748f40e076363bb547a6a555e0e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2716 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5782dded4c9003efa829d86d23ad9b3da
SHA1684093153e8cefc0f5e5263246aeb48968215070
SHA2562d0820af661b38a1733ec3e5f3d8d9054ec617779ae2cd492c1a6bdc822b3544
SHA5120e8d259f2e9e928bb7c1d13fe0f8153ff8285216fae8007e3ca1d3eeb124b31e2e6ea27db4d7df8c5be5ffdb9ea59a62a43233ec645ddfd541cc01a360d34e02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5279e3eb03485637d45555894b48df4e5
SHA147f8a2c7b90d13bfb4089bf47ad49d76d2fc4529
SHA256887b479ad08dd1e00255a3324ce6647b24176b191ff9ea5e214b47d016be3a60
SHA51287ff5b48d3075038d45fbdfd0538965fb1b23b595dd39cfd165eec9fe60a47614c9c5a0802fdf77de6069dccaa5dc96326a8c3430aad9f93a74ec6e37046cfdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e69c10e00211c55bed51c92604b880b
SHA1c4aba533f1687066ca71aa249d933df9287a4b29
SHA25615018bb74b92fd83d45ab02e7d21a83d01c11934043782ed4ec432bc945855e7
SHA512a985d150137b25f145cf06984b41e6ee365a7219da44d29936196ff1c3585a0a3e04be27ff4c9acfd0d45ea9645546e402ff410ddba7609ae76f5b768c23674e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512be653fb2f7091161eae7545bfa4f44
SHA1fb27b57d1f72909503f6da8f5d882e8367e88c28
SHA256f02d97494ef03d213eaf012dbc1aff306929556680225bbf76fd70e994cf3b8a
SHA512341c82f26a7664e24f62f1e236ad1e6a6ec2f0369ef518af472ece020171fba39f5596b8d3de3edbf414e457b74969557e9243ee6702e68127d732e7452370c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e7b411cd60477cf3adf7dba5ceaa022
SHA12329114b3d1719184c80e039a2333783d5ae0206
SHA256425a5789b135d9ded551d6a2329b6271df6f445da60de58aba1368f134161385
SHA51295244c761ac9b857613c9dcb9acf64b4543b8756fd8a9dd4a2697dbe3745c2f889231bf13e4269cb32fcfecfcdac57a8851d894d2233a0091a442c9281e06a8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc69fdf085ec39dfb1fa4cfc750d2e75
SHA1626f31c9dcf09626327bccab81874ca186faa84e
SHA256afbd02d035b0c8fefb7ddb14ce613945939d39d42c2e9641002942823ba79c95
SHA512e5fcd601be6cd6b38face8a836ce698eabc03d9c5196f5aee4ad6f9b45302568d6a8df993fa0734b6b372a517a50d47c3a7d02ecfeec4eddae8e738b53af4c4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590bd585b41bc7f99d04549f5b42dc264
SHA1232bcc425ac3127e61f1a64087fe08726a06e516
SHA2563f75444dfd1b0addf54a0da0820d9114600d66bbde3562a7521ce2450222cd5c
SHA51201a5c24fb8df19728687e8c6d3882ceb0d788da87cbe401361e8ed13153c69ef8a5a8343afb112d40b7c69bfa30f8eb586b78390836299cbbd64ea3fa8cb0db5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5270aafb69a9b2428aa62d37a42c67a95
SHA1850df22c792a45306b8e5e43f5b636a6e95ac038
SHA256f80a6cfc92ae18dc9005923710263b3f657f085bb3744f97956e601f46705d23
SHA512579f4532e3755569560d726dd36f709581110458cba51821ee4fc41abc2f034590f816753f6f7db9df9ba6302a1efabaecea02922be23776f6f70958c7a23b4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be50931ddb5623210c5ee4f7f49e1532
SHA11810420e50b4215de770395ac50b8b2e6e227416
SHA2565c2d21c4d4eec897e861f2da6be5f3e115c9e5f0ca0d5ef6109e1d0b2d2744a9
SHA512279cf8946e0bc5189868e0cd263ecfed24e48dd5983991747383e6f73e76dff016c5ce481f67b8a85ed13621d8b9159c6236097b7da992a4d3bb29849e1b3cc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5862901571d9ebf90315abd1382fe649e
SHA15c37566bb46da6092dfb566d6b267c464858b07b
SHA2567c1f07ea4fbd26371022b66b97101556005887033ec3b49fe2301286bd7b580a
SHA512e7b50e5a8edce5c372ac62bcfa1c01215de02cff975d998cc96bd2aeb579adb6c489e6048c62251393c1047c0e763eeba215d7aec6775ed41c555a46a48495d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad50f44fbda0474fa40273dd9e8780b1
SHA10a7bf5250f50ee33ec7a7638d6fdefa7d6dd5f6b
SHA256672baf83ed68f46fad867e79108c9ec5d025d09aa65055b83a4e388a40e902d9
SHA512ba67787f9e39544cd801c74ce8991e436dbd5a88d76416a5681efaefb564ba01b74b3b1c556bd89a3c276ec2b26d2e25e548308da28b77e2ea1d92cf6ba0def2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532ea0ab48e749fcbe6401a24a2ce7f66
SHA1c55d1f32a12941940093fe5a091cb95639ec6e8e
SHA2563330a7dc280e530be72e7276f4de82c304970ffd3447dd8a08610b45d7d8e025
SHA5127146b3d196f96f2f4168c3653a296088c45fe19b28e5d72f7ecf25f809a025addba24f3e804c982ffc6557a498cbfd2da4ace5c845dc1bc873a5d5c56dbb4dd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b39207222e38b3c4e6f015ed6891f0d
SHA165a81fdf80f9acb8bc55a408745ec93118ef97fd
SHA25698a9043866610800f5056ada1295dd9f9cf87b635b4113b5710680f8c995cc73
SHA512493f32f377558dcb8ce35ca7be9cfb3be77a2365fc838a6a385c7b77679941726b673e94d76391214b4215183787f6d7c8a5466b12ecf9222606b837a8dbb568
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d6ec544c9be125e2bcabe1803408cfa
SHA138484db850ba748bd9608a7fd7c809a36e172c12
SHA256ccaaddfa01574d2ad016c4375f0fb6ba75213f1986ff7a781db528a326013049
SHA5128b9348890e17814ecc3ba6dedbdc99d3269f0ce8e5ea1a852133c12dcf1ca00eded0d82b31dd11672d934bf6ac89e2f051cfb98bc98fb0b911a0de24cde74dda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc842d73649474256fc0079d110045db
SHA1fff4ee579452e323cedee49a679c2a7b17c8a94f
SHA256f0fd51d53f4382a13168f8b20d5b38c2ef855316758343a7f5fb59a916ec19f8
SHA512a7da7c980fa955105c349ec4521f739239944a598f292effd4b3f9cd0c5f41e48fc05ade764b13e7c6e66f030c24d520413d246df37d97233a7b3b913fb460e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541f65762b44c9065efc29f57d70bee46
SHA1b9c75b30a554bbc98b52c429c2cd7ba81bff66cc
SHA256ebb4067fad05878f4d7cb31c5c079148b412dee4f1286ca2e1ff8028a6a382ba
SHA512671bf12c11214db6e2099ac923a8225ff3816942aa71397481e07d7c5a81c82ffdb02f9c35d22212c7c63e89c4e466b04b8ce9fa152c2335e758defc5409ff26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d45303406d7c533a0b50ac002b249f2f
SHA1608e5e88f16b19633190834a15bf3783635e2969
SHA256bee23ebe3819a1db5641d31ef9dbb3f50aeca134934abd6bfeb96e153ae4a920
SHA5121a23ec8c3175ed1237420b9d3145cc9e238fd1b998b2bf5756098296d602ab6aec14bd9e8f0297a318e725ae6c13a4db630e40b4ea0277ad255f14989ca0ead0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3d840d19b70e23dd3e18452f160abc8
SHA1bde97bee21a7526521b5c8fb9dc1999aaa72d352
SHA2562a4d9f80f60614067de7cfa407149c72aeeb4a33397cf43c8d91ed1865695da2
SHA51257e1777225735ae8b6f29a8eac9d5af25bd65bb158d50e2fe22b3bcdf53e666344ecbb285fb2f9ed3da18eb37b0482b4f7ee8843e2b25f89349d1b3026ea4dcd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b