Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 11:58
Static task
static1
Behavioral task
behavioral1
Sample
96032010a135040485002cd33492ba3d_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
96032010a135040485002cd33492ba3d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
96032010a135040485002cd33492ba3d_JaffaCakes118.html
-
Size
6KB
-
MD5
96032010a135040485002cd33492ba3d
-
SHA1
91c8428ccc4ec9a4b686d2399080068d92768535
-
SHA256
964a0cf4148e3f2f464f59828c9bc10ce39f7e9447fa777686adb99ac6a8c25f
-
SHA512
5f3250eb16db621c16f8175f0b2bf322637f0f2420023ab355764e380c9338c378a76a7d601a07482043571486b98b862b6249b5bd91112471d175739d93297e
-
SSDEEP
96:uzVs+ux7Wg0LLY1k9o84d12ef7CSTU7R/6/NcEZ7ru7f:csz7Wg0AYS/O4Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00b6907a41eeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429798590" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f0000000002000000000010660000000100002000000030f50dd40e520a3ba3cc449514956c487c0b40baef6b2a428a5e6807e7eecde5000000000e80000000020000200000004035fd9800679717a26b75cb93eaa112635c2255d0021bb6877400273c2f20802000000034b14456b62e27841e60057cabd0675cc25bde58d2168acc79f971d2fd4d022f400000007ca90d0c2da5f5cf9577449c09366b002efbb1ac0953ab5d7de890df64239e8bde1be8a73c1c6670f26da85456074a78c3cec869871f9905bdf60aa51867f813 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8D095121-5A34-11EF-937B-6ED41388558A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2228 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2228 iexplore.exe 2228 iexplore.exe 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2772 2228 iexplore.exe 30 PID 2228 wrote to memory of 2772 2228 iexplore.exe 30 PID 2228 wrote to memory of 2772 2228 iexplore.exe 30 PID 2228 wrote to memory of 2772 2228 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\96032010a135040485002cd33492ba3d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2228 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55baaf1cabbfc568897b183da69924046
SHA1a456fae108d89d4a7d8cd2faacab3d0ee468a816
SHA25651182241d9ada436e02322a303e45f0e3f17798b763189ac04398e0b5a124ab0
SHA5125eddcd44ab10ad7aa56683a480c2166c412bf867ae88e9ad1b7090de422aa67db2d7f5a66424c5641702c9ec09e0793046d2c15c0d14c2affbd867f70eb13474
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b92b06b3d72061af421ccc6bbda35bc0
SHA1018f69dc0081e27f9fbed6aaac24b71bf153c6e7
SHA2564448b8d75e7d6f260f756b1abf570e544224a8d94a6244108aab9202a5500e78
SHA51260cfc41a6dd5ad5f71de04790446122049a5e039de0226da332ec9b04dd80031d914ea7197d2ea7cec5b98e7ba86eeab5dff24d665dbe559dc156aa8665ed704
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5203968962b24892ae530168efe85a5e3
SHA1d4f686686cccc03b4e5477ecff3576ae39f7dee3
SHA2562f08ce38caacda51d6d90e69de0b1afc20b9086a3f6590a43cad0c7a693337b7
SHA512c5bffb9e64dfb88d28c23a7ed2136ee8bdb376bee3966cfed4c79479482190deedc1af5dce93dfdd7ac383b3cc25cae42a414fb55de719298172bcfa3c15b117
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f5eaeb23c9f5d41cea3b890bd82bfb7
SHA15f3ab896cd91c7266680361946cd8cec0c73df54
SHA256b176645c088799bf625268f65d55d5c65aac7082b8d4c2a25fa2d894ff1a1386
SHA512e672dcb1dc7f67102853a654da9ce8086c6790d8690a39e69142ff18d8730acce3bfe315b29f15f108da44b395d1b9c98b559f5659824f91bec0aeb80d80626b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535c5015a12ee442e77704657cf8edecf
SHA12545852c6d441603077ed3cb7e5ee2d99463273e
SHA256777bfa1657060573b8d51568bc5795b4b7181b1b057c22618b85805a93d91711
SHA51209bb53087408744a97b72b49b659c7df8ca8b1012e25cf832f93f3e0398511d9a555ed04273aacbe2347f63a4061a236a3a1c4d76583b8541fe8b9c04cbd8007
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a96da482422f29dcf70d1ff49d9b15e3
SHA1d2ee84da1a25f01a254499e8616e39f353616602
SHA256d99938b27aa49d67ecf35475cfb31e86dbbe9379bfcd7bff1fb3963b0add90f4
SHA5125260698ac95a04331fc95b1e021fee2983b7f3ad0ca57bc0418888e72337abd42f31b4eedcc7ed70a0ef0094d4f743030a0f051f719f1f5ee79ea23b18d81705
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54463eafa6b8fdcdc80c0832918937587
SHA1d6dcfc60a9075c118679365e1980d7f2a0e2f935
SHA256985f8e6320ef756abe7b8989c9e2a03ca603e72cf4a88e101010fd25870c4c6c
SHA5127e1fefd4370b53752583e7af0170154b06b8a3ee5008bfd9c99c860d8473265d8a232e428e536713c437fd5aea6865654a7bd6402c3a5220ad4d32a37eaf54c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f150cd1442681952098632e130875817
SHA14898e4f7ce5de161e7b061374993f614762e07c5
SHA256e4f871f31e810dee80661a6a21443b895062c0ff5f83239d9c8e962f08428b08
SHA51233558c83929cdab00d501ba821ff92e338eca8624be39355e9750bfe484f25c3d7f9d11e70cd378789dcf0b738fbe6692a96412cedcb2f9cb75b0ef36fa24cf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9893d42741f8593798d90a7b699ae12
SHA1daa55e62a4dd3f272b932da3aa244006cc64c245
SHA256ea8870f5724670dacefc2530fb01cf8ae372e7da9f6acaf1588db2c6a0af62b1
SHA512f3ad1c6031c8549ea474dfba3081f15af25d6ec776b9c0725030a8c80f14e173eb9e51704bcd12b452aca5e5e4ee6a9943a03d57b13a1fd330ce2de239e64dda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571b7226ee41edfdf148dd359ceaf0843
SHA1edbbe5ec6bf6b31ac4ec4545f610b56457a81c61
SHA2561a138ab3cfcf77cf7382adfc3406a4477ba24d86d145e6ae12fee80cf8ddfcee
SHA51207c12ca7df1f6cbfc9054afb90f63b277e8c07891d8cc0069eb70ef8595e60b907d4489c0514831574e2e4d1d4c39f6859371485e9002b0ad23ea164bf94fa2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef3ae0bb5fb696910b9fd570f68e8605
SHA1d28d6320d31d5a443695c47b86dd24283b885a9c
SHA256d9af6ac839f814dbeb0f19e98be1111a4ccda966d94645b97bc259fc474e8579
SHA512a9d37fa5f2e1a6cb49ce90fef46f85e10eaf2cc7976563b1da406180afbebe7ff5da62d63fcff0acea3bd6a51ed46383c518608f9a6b49b3cab0acba6f23aea1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b54511da0a1851759a229409dc7a5197
SHA1269f52876ba8da0f430367087e8267f1e972d30f
SHA256282daa00d44dd12aa7b684bf2d6e1f06cf31185584b416f068e24b9c88e49a67
SHA512ae7d6a1c75ad644aa65827c85554470c01084f06880624eda49dedb610f0e4a0bcdf7701c847db714a287605846461ca8d76d6a32922e4eb7298b7d9bb725aac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5567f88845c499d7547f1cbf19e561f1d
SHA1441d8f2e86579fc7730398327859a141f0531e6c
SHA256be54a5fd7e759822f5a97e1bf4d2d989e7ae9771bc1bcc28b9af4a759e502cdb
SHA51254839bf7551f337738c589c03194c586966585ee828e0c3c3069ecedc11e51e4c60ea7e74de396fb8ef3d5bd8440fd3427619f35f5b39fa56a835ac7ecdb1b73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588610de19bd835382b0b174732ef6c59
SHA10684c56e55fb2173643b5fc86e4f46f3d3f720ef
SHA2562066b655adad34d6a9a028886e75a484df578b9626b9c3b52ae2d464716d8931
SHA512b78f41f802d55f7b437a0a3c8ee492cbfc93b8622ae87435408ac49085eefaf733138420def48a45206d67d401cf2ea18bca28673f0c14728b36a7189038f590
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4fcd5c316ec0d9ddcfc5a15345ffb37
SHA12e0233c7d4cdeb6d75dc9df13b84ad8bcf5581c1
SHA2562678c8ac5c56ea31d1efde6a8d29431d195319c3eb4795b24411e0e99c4d3b6a
SHA51252e914351023ce77676996a6e1f8810a141b083e30e0398179e9e1627be83586e5bab59bbb1be87ee1c0fd1b808df9aec546a7f2b10f37ecda0cf1cc901fac2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfbe770bdd70f9e8c575e00c29021e84
SHA1d1e2a019d28939260c6dccdaf956044731d392ac
SHA256177463d8a858cc29fefff13329cd96a13ec3aa140b6cb8cc3554750f65189800
SHA5121afaa7cbcb3e09928119a60cea381e47aa43f5874d78e9935cbf49190cac30d567c1342b66d2c25f51298ec718331e11c298032e772f5b725763423ba3b52435
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512e98269fd26b6c02dd6fa3e4eb16afc
SHA16e861ebf061fbeea8d443e4fd8c5399e902e42cc
SHA25681e9e9ed2f91f5b5d338064b493f56b4ca9315d7fcbfa82959bbe390ae01c664
SHA512342a06e692a27ca12dd495f8c4f9de6d6942658a845f8121b57e5f85236e12f0303f490dfe2c0e9100778a280a9df2e3b7364d67b46d3bb5b78516ae04f35ef5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501bedfbcd8463faae2939ae56961df81
SHA13ae69ca32eb8035a9537917986562d36f023bafb
SHA256ab9dc784497516a14f73b8fee9b19c74c68f4ecd1c9245cf5abc2fd4fdbd8f8a
SHA512ed2475462c2dfc9a0eb62731673cf976d4211a8eb72af8dec6ffd6f177aae82af03719c8b6a1d0040178ea507e3839572a6b3b05affaca498e001d4169aafdee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50574045202410b8a6167be9099dbcc87
SHA194cfcbd702b11109027afd817880212994bda9b4
SHA2569eb155eed6111817b7ae79c7f000810787973be545d26e5b11506561c49c9a77
SHA512a377ef8f2af64b8c53c2388336c442eccbaeb4093f02b43909f9e0d8c835d98f6ad8f46605ae6b710baff8559e6a01336bd7fa21f7b259f9d66dbefe54848785
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b