Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 17:08
Static task
static1
Behavioral task
behavioral1
Sample
78e67a6d5fe8c5658175888eca89bf68_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
78e67a6d5fe8c5658175888eca89bf68_JaffaCakes118.html
Resource
win10v2004-20240729-en
General
-
Target
78e67a6d5fe8c5658175888eca89bf68_JaffaCakes118.html
-
Size
51KB
-
MD5
78e67a6d5fe8c5658175888eca89bf68
-
SHA1
04b6e5b888152fd7e626076f063907bb82c49869
-
SHA256
6dedff6d24e214406708386d6d8405e3c3eb2cf10688113ee271dc6a0928eb81
-
SHA512
8550862c5c3a65f5b8842ff21588dc3096183f3f080ea50b1b23374abb8fca3b3a7a60cc97bed746a90611475a483f71437e82fb9ec254904c88dcd49a668e28
-
SSDEEP
768:STk41lr3GGER0Sea6wXR/QXnEZwHrlHp2V8+Bo8cPSfg34h36gRvhDQZVqPAkyhg:JtHM+TfCpmc09D49H8MpdM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb90000000002000000000010660000000100002000000051915741a0682334312cadffb7cc1961e7f82757f6bbdeb9b29a093faff66adf000000000e80000000020000200000001d6f8d20d3da42cca58346669f7bac81108ad373e33f052f3f243d2227083efa20000000f48880653a6a5630605493135696d7da3a214b563f47b4a0d9761f086f595d104000000022ef0c2333e499372e751fef793be42359edf065ef06649cbcf15ae1a5ea084090f45730a3f12abc105973f835113a9043b0ecd390e95a057e82deea56745094 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70c24fd075e2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FA2F5511-4E68-11EF-A4C8-72E661693B4A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428501693" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2888 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2888 iexplore.exe 2888 iexplore.exe 1644 IEXPLORE.EXE 1644 IEXPLORE.EXE 1644 IEXPLORE.EXE 1644 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2888 wrote to memory of 1644 2888 iexplore.exe 30 PID 2888 wrote to memory of 1644 2888 iexplore.exe 30 PID 2888 wrote to memory of 1644 2888 iexplore.exe 30 PID 2888 wrote to memory of 1644 2888 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\78e67a6d5fe8c5658175888eca89bf68_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2888 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561569f805222393834150d6ad36739fd
SHA10627c06d83c43bea8d5d1e9db2f17667a94ccf12
SHA256c5e88f887b2aa9bae7652ef46228d5232fe7041ad5fc7a25c75ba20a2ad8e121
SHA512652a19101bf630cbeee5085c5597bcfac0e6030fbc522792c868a3f877179e84fbf7dd68da55816d78467754fbcace52acafc1ba6053102dc3078d447c8b6f31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc446de4f8e67e69e447c5d9ebe9ae19
SHA1108a8d0551788a258fa4a97af1b86dd53809abb2
SHA25623551d8b6cf4d20b43f45a363904aef7250a36e519e5741e69a75c47cac97227
SHA5126ec1157fd01865bbf635bd023c72882a4aaf4e5755ddd155358e57b30b633344a9a1d14a670fccfb92d669845b7cdc931ad2f9221d878c2f9249df71dca95a0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab4ba822cd815287dc05ffb80856de95
SHA19071afa7521355810b4746874165925743098533
SHA2565a1ad0e34c952b63742733353408e35e768945c5bb099f7c852f28419276bb4d
SHA5128d900290f15f304908532999dc53f65f6a4eaea961702e3e6b2d7209886481fd9414129eb02d21c837088a1718e57f26d4d3cc4a16dea869eb688b2baabc1668
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bdd7a0463e526737dceb640c1240c34
SHA1d4b4abd9c827408b5f3a6f024a840a2ab9e92349
SHA256382b5d508001f6ad889ac5297213baf56954c924051e52342558c25c471cd6a8
SHA512a4b0222b679d00a8ce2292631f2c1814a9c08d96e8ad95bf86d45f81941a33dc8d3173b373b0e7b65d91bfc63d4bab81f2ba34a46e9864f0b7ef356d01f5768a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf92778639614b8fd8fe9fc0bfb12008
SHA19bc9e469703950ca1332cba0926c84c8085852e5
SHA2562346996aa54ac3362a40f90633fd8b140ec02c01c60165738beb8ec41028e768
SHA512f5e9a28b1d4ef8a3c4e866c392a7364cd6e180be82a809b5a48c9fad4c27d3ec6272860b1504367733e651ec8625e5aed2a58914cd13d73f711c55f952462cf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529575c9b0eb62b2d795daa67ebe02eac
SHA16c341cef8a697253c023bfc9e0654f0542e63217
SHA256165bba8d9c8f973730309e5c9ca5ea3247c7055364fbddfbc2e9d82be9c79860
SHA512e4d46f672dab0ea2409a9bd266a63cff39b8dbb00d0a37d4606990054bf72acbcfb6feeb799d7134bb6446e5fbf648f9e2eb783baa5a90bf28a18d3ad852e39b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f20a79c3c017ecb14bfd0c64bf3ef06f
SHA16a8cc2b6fcd3bb3cabc06f8df87f1e2535b20d99
SHA256dec4f2ac763081408a80fd130d01848ea8783b4985b4dd6a41531e42c3270819
SHA51291090c1c3b7627350c0433956b3b67e36dd35fb68d07c1786f3d667c047711dfbeac4e320dd06aa7d77094ab37eda4fb6fb61374f8ae30e6ad6756a15ca90eb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b003a3fb55f4e2d53b0414011ea2ea9
SHA1a8a33e674f6cdac45610951b793eb84faffb57aa
SHA2565f4dc164c21494567757d76bcdd9e07c931cbfe167a5982d8a73744e992835de
SHA5120b2874d6d4b5a51aa520f72343a5a22ea21ad14f8e7b901127ea602621ca6b92b527c5662c43cb16de80c488c34126e04baec8873ac656a46820fc5853a1d6cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5005e0989324db2d482c3b7901036fc2f
SHA157b9337771d122ee5e944ceb28b83249cdd5b4e3
SHA256cbddad891f55b49a06d27797458b82f3da19d7ffe688abcb7ca47f75413ec705
SHA5123b9189039ac140468a04926e9569b0b03c22d75ab42f761665b019738be6bce65f4d2d6ee601cd745eeaf6304c4691c11f38f1775ec02a7fc68a4089e401bea3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5340e103d7d131ba45e3037c1c498341c
SHA1e013df610b6815fe5c38af55fdb23a9a395f8f72
SHA256b9a996f0dae9e1032464a418ad6ce1c2e4d306ea6dff415b0ba3cd946832302f
SHA5124170c87735cc5c33b3a56eea7862157c8338b0b2ac95eb67c1a135678042f763ed9157f1cebcf03eec593a3c7bfb3edc9eb95eb0eb2599958d95416e408b4591
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52525802758e76ba948276db9e470a323
SHA184d41013974a4fe3f8f7b8a6d4f799fa5b7faeca
SHA256267030c5b5cd9baf716bead6340d30528426acbac1fb54a53379a1c4fd2b83f3
SHA512558f1e622a3f2ed1f983a3be93f83311e056a33d485bfb8c21fe0632de2f7b3e069ef1dc3dfce808ac908e816d5282758884a83452c3275d5de2955d160ff2b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a552cf447fb33a13c4624238f521446
SHA1f078b9d00d2301b483f71b31e1cc6ed968d5ecbc
SHA256fc26791088c9d2624827dd27245b05639cb7b7979a877336f76d38648ba697ca
SHA51294a55b22bdf372182c1f809979be015d64176a8da05820036f880f1cb5d66994067bb4adbd7bc2d14ecc4c5d974341e8d5d4a185f17f250e31ffca134183c8eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5bc30c3ba7d44397b91c158750b0d9e
SHA1bd29ed8f265f1797f6df1c6ab9faec6f4097a7b3
SHA256d51586717bacd5ce00ef1983b131906b7390ab4e599e97b67fb12502157ea549
SHA5122d9ff4497a7630cb89a1575df3c9fc1b548bbe2ccfe5c139a364e429237bda1e39c2702d18cdc21fd16b311fb010e39eb576d9e3d99c2097fd5ce16a9bacbaae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb1eb3c0af893ca2762944cd68a090da
SHA1d1d36139830a6348ff102640f6b212d0130ce5c5
SHA25656732e74cadde07d6868fd1df427cd06b2dbb4fb5b3e87215f69d5890156efa4
SHA5127a883d40106de26474e4f8686724f5cda9ce556c46d8eae0eaecc3572bd4937e4a40fbf04ae391a09513868246f34927c3efa30d8b7c28ba8c453a150b0fbeb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5329e9c81fe3cf00b87fc39d30d688e93
SHA18fb6c414e8acf33e19585bc665fdb7d34c1ad791
SHA2565c2d1b9301dbcedbff8e95ff5c7944da0e6ec3f6dd15e09c4fb63a155cfa3946
SHA512fecc28b4ea88356f4ca204fc4e34ce81a9f214b4a7985795c418aadac6d3203d4c5e8b21c1c7c8913fdf5e0e983e2364abd851f4658876688acf4b3dc777e066
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51524f5fe3c14bc2d334055bf4ae516ad
SHA1e96a7d930de7b45f2d17d068a80a65c67656c0bb
SHA25624a45fe55b6dce566823e3722a975ed88de5c5e4a68ed968a1916a318090c8c0
SHA5121a2f335f247f60248b069e6c70bc68103ad27ed386e9f8b360f3753e08d2851c3c446dce58946139e0e237644cc4eaadfa04707c202a26d1797836887afa8963
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502b3bd6406a112272400b59a79285571
SHA1f4837bc94563fc8c6808471aae1295a0ea0904f7
SHA25684f43d3d6204aab865be63c49775a8a4f8322ec5aee2e27b216816b61e05b2b4
SHA5122ea1d66b4bb0a0b4e24371237c3c960259e7492978234aa832727487ee1d03c24524082e2c870ce9892b483c8c3228f2b3422cc5bb278bf36cb377b5d718594a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d81bb45962a70cc709eee8b4f8ad2d64
SHA19e9b6cd9e41e5c2a0a46aab765914f374c181f04
SHA256bb3bf9f2c1c654bee4a916eee7e85a11cb71139f61466b0c1b1a34273de67287
SHA512a88d6c8378cf86d3d5cb5667d807702ee71234eb373efd426ab3de3d3d69118cdc61a2ef8e8aa541e4948fc6f4fa6926ce2077f1e44a53e499aefecd05b2ff96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5030e8d16037f483b2f7ce821fd0e3ec5
SHA1c2dc3e269d9c2ba131f3558599e447be0ad7c7d5
SHA2568a5bbb460ce370279993f47d236febcc9d0bf83191d969584c85a5c59085d757
SHA5122550cf10a0547f8f76218d8ac66209a9c478ded77ac1068dcefeac095f4d9f386b74c1769c86d47fc9f6c97677327b53db3265901994ec6a34214604fe3d9d82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1fc9b36673efe68fa2f4ccc59c60673
SHA156b8a04731662ab5aad50991ed761ccef9fb4be5
SHA256fafe9ac7c9b0733e4297fb4bccca61d5f82670017036a080c29b7535ccf759f6
SHA5124efe516f4b85641dd1f2ffc44e31619483757c0808b1bb3ebd40d1ffcba392527ff500c3d8edc39e5b2c52f8403bd63ec73c9b4ec0e9ce5f2ea0bcc8a89a113d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b