Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 18:28
Static task
static1
Behavioral task
behavioral1
Sample
972f171b666daa342d84731ebb123c55_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
972f171b666daa342d84731ebb123c55_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
972f171b666daa342d84731ebb123c55_JaffaCakes118.html
-
Size
10KB
-
MD5
972f171b666daa342d84731ebb123c55
-
SHA1
a6ff63c57d89ecbfab04e61a70369d27bcb47db5
-
SHA256
53812477d9ef1200f91e03638890a84699cf5e30b596497a7f0dbd63518557e5
-
SHA512
215f603d597a10014acca25f5a045e7704e6130a19aa1c2e9e4fb94e626ee04821fec399574d882883aa0dd8adeee71d1da8c2e9e42873866a398f0d1382239f
-
SSDEEP
96:uzVs+ux7GHLLY1k9o84d12ef7CSTU3wGT/klUpBJ7/qOUIootOlkqlVHcEZ7ru7f:csz7GHAYS/ugIv/qOUHlkqPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0758EEA1-5A6B-11EF-A4C8-72E661693B4A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429821988" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000007291497d5275256d919ea977504a2c64b0dda6037f3762fbcbd7ac9004037d21000000000e8000000002000020000000cc2df1d4dde17767944e138f84acaa6ff7bc25bb13a4e387684b81933cdd7c2420000000383f27b4faffdddff6d06df371037ec4658f12f5057b6a83328757ad32efd35840000000dccbeb0d2d6b58e21eb5057264d8848495568b2770e608d67b88d70952b434c6567c0cb577e486d8b94a6d2a24f99c78d8f2f44e1cd2926eaf61aaec8b008e44 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70fcf4dd77eeda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2584 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2584 iexplore.exe 2584 iexplore.exe 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2584 wrote to memory of 2424 2584 iexplore.exe 30 PID 2584 wrote to memory of 2424 2584 iexplore.exe 30 PID 2584 wrote to memory of 2424 2584 iexplore.exe 30 PID 2584 wrote to memory of 2424 2584 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\972f171b666daa342d84731ebb123c55_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2584 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b97f4a3b4c8dc3aa9d5d386aed172cc7
SHA16b6e5ef608e98d690fba6f2484f043811a94c2ac
SHA2562dc546d993739e455e92703bc18f2268549bc34223fe52aa6b69c92740e1d567
SHA51223d4786f725c3b53587fe47c09e6b0e8f3f4ab452c1cf474abd7239e1c10ad6f60883f61eae68a21d351303b275eb3a2809c9734f5a65e5ba34439538e9685db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d22f29a4823c578e6f5fe5e96b588147
SHA101b5635f22cb9c52555cc4c3a77a037ba8ae9f8f
SHA256b32b47b70d8b3a130648e46398bff9d1e3265b210d01657e6978242323760e23
SHA51281b8c60ba825627df6a09ea9c1c7898ea7186447f101d56d3b926e9e02da6b624d3686b874018645145575061a79ff56786e5f66cd89b109c1d16c79eb54b7f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4fa9c7ac08f0f27346eff1fc50a39f1
SHA140994b258c1a61288c42c08512d62fde17a4b7d7
SHA2561a4976e156277bf147239087950ffdb376762abc777fb7e2934a960d503affb1
SHA512365d47d12b3b71fdea222fed0a1d44bff9d28ff457a7e88eb921fbd3a574a965437ab2214d5fb9816c7139ab3929ae840692d3f249c609b74d45f6ee50809cb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512e0b454d26b77e775a233cad000837f
SHA16d00837e726648d4ad5055321cd4cf59364398f0
SHA256c5f7e87ed399191411a2e67d0251c405eea9a0061a5f0b0b54cc684ec9bc0751
SHA51274ab5fb883d8fe2bc471ec326a473f8bf403a0f5e0c4297a3d92bcd2ca5ff2472d237de3bf3778ef30f0da911e87d36d3625f5ccf9ffa4795dc916d3d845abb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5816eb402324632a67de26f77f3a2502f
SHA1ebecb79216cc53bb8f9137a5c88d1028edab2694
SHA2562b05f2cab343100ca26fb537f4b7237b906cc09e104cf2ba14056cf53cb77b96
SHA512283b6fc4e80f12196ba403ab55242c209891a61181906af98c4c4e5dacedb69eb27170f392731a4457b13c96d20833672f47f2a054a81f4726f0f29cbb1a1074
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dc1641d6dc76edae55698f9329046d1
SHA1c65d6368aa9f055173d71bcaccf7969fffd883b0
SHA256c1882803ecc13290198cad3a63aa1c227889f441f9d310eb704bf4e68c006224
SHA5124ddf15a90d710a7e2cb9f4e19bc33788fd83646ad6f673ab7d397019ba7d349b2b07d3197ca96eff4f9892fafa17802cc98f8973e388b7b8dd029b3593745bbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea6948fa976a7abc808c4af438bfbb44
SHA115ce795e59eadb02ee598d7b8124a54407fda5cf
SHA25628d765f23e7c6749163a4cbff8babbecab644ec446dadc43adb136ed9c38d66f
SHA512599a494158fb8b33040196c64bc6515a6dc52f5a728b05586fa3d2be56f52ebc3e6274e339807815b804c894622cbb01deb3e99c81ed6d13f6cfb1ff7e35f80a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525693117deb5691b6b0d9fdd63ef7156
SHA1e16edfdb3c793c4ea3936f8e8b6077159cb1863c
SHA2566078a0825d130765487901712b414e0fd72d71b20ac18cf9b6f29ce9c333ebcf
SHA51298dd161474471702e42e7a37ef78dbd71496330927b127dc883038a69f89b58987c8d54de5f85502ec1bd47955d56ea6c977d2b893520fcc457f1102266ba547
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faf535747a71002144db187f8bc7f8a4
SHA18d7eddb94088def350a523eaeeb6924315502ab2
SHA256a61ff8187af14169fa36c09d2ffe81e1dc743e2bde3b5d7591ab0dcf71662f1a
SHA5127348436cdd32e540d1a0ef66410b7184a498ff6baf955f42f3b24950e7fc428aa8d6cf8e3c4bcdc940d5bfa85c1da19aa8661b934eab44a88e42554b05e6aecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5700531e9263dd55d8de70d65baf9dd53
SHA152c009aec533e262f00fe135f399339bda5c0180
SHA2560749d49f1b9beed7fadd50313ce7f3453228b0ceb037548387155c5b64cdcfaa
SHA5121bb71622f879012e72c27329d6a56de752c44a8b94964dfc9262aeca36cf2833825fca9cec57e6499f23a047c61aaa1bba8917c43a32e609b310475098923330
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac0fb83e183638ee77eaf4d825f38dcf
SHA19c2cc076a191feea9bb5b9e3175dd1fc876a3391
SHA25678c37e323f749455784b1c1488e45982baf6dc857869206528a31b8a1caa8359
SHA512212a92c306298d21fb593fa45cd0d159f660fe22ac64e3e64fd3ac3343016a5d68f0c45bd690e4837a35734dbc1e4cab3bbe06b83b932d2ed9ed83fbf1f6a684
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c515901829ddb669a19601419ba03cd3
SHA1cc52a35f072f44a2d529891e7a16e907f6f37bdc
SHA2560d4cb172581231ed4b27d4fb481e88cb0840cdeb83c8ff59fc2170884af81c0b
SHA512267cb3432ebc97e02515c685a2d51dba695c21659a00c42f396153599457daf3a2e79d7051c5bcab35b0767b99a20f58d9d299b77b4f735a03c1e338f6a0e9dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fd5bab54c5fabee2ce8e4ea5f173001
SHA1a4e60a7127ba19d20ed0b0890a4d8f195547b957
SHA256dc7b69ff2f79e567b6b700830fc6dd3b623fb0a76a37fab22baf07e0610a8068
SHA5120a4284913be2cdf545a502b8ebecd88aafa5a6fbf3c89a96c75ef2e5f469d095eb4e6761f95cc160e27298c18dee6ef3c27d0331ddcd6d109cb5dd3d4f5707ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bc87167c2409aa34c296cf44912ffb4
SHA10c2f52dd416a3258a6fdf08a1d759d26f4640c9e
SHA256e35209f487ab8ae78e06ed97ae015f979c837a8427c173d8f68714f484e9b463
SHA512677a5bc5e680fea0d46af52f03191ffcfc7c523d7b41a4970846884c768a73baf68b988133f94079ad915a3bb814da8f59e45a94541c904b70801241ad6dc286
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5649b0b0e398f0ba12b5fafb2f6e576b2
SHA1b3476090f9ab17841b0d73abc26e53144c5f09a9
SHA256323c9dd7b59b833360df967a02569b495c7efabfad55cbc45da73addd9d5fc2f
SHA5124cc5bd1a09f2f321cfd643a195cbdfb0ec3717369d6829da7ee0911d42b13a298b038fb480722618b30c6b3d8433fc73488bce2ed1e666d46bfdd0300a17dc86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa8ec2d97f31a2be1802765e023cb00f
SHA14d358f76a04d26d6cadb2111f083943c6acd87ff
SHA256222035d0a6cf36ea99fcfcc8e391fb25dd76b9891e9d1fbfa5e0f60e9af205e1
SHA5120e581558ec9154cb4a533ad70084671a0e6e0020d418ee8b802e2f658b76694e46267660c46fbbbb0dd8b74c77240704ddaf69ed1204117bd62d40957ad6f16d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a740e5d777e0334f4d3c679e06e9904f
SHA1644e57eadb0a64ae345ae05a29fffb35520ee035
SHA256646deba79f97194df4a5cb7fb7d5ab0ebf0a254842be556085902a08d3b9d16c
SHA512f93afebef8f824cdd72f633c16113debf3f0336e6fb62d20f60de88904b527ba0eda1a7c855a3cc841772bb21d37bc062dc1bb79ad3f5975092b7ef93cc3e241
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f6581b2111661a4aa529dede75e568b
SHA1c5f7d9ce9e290af85c832e352526378204f95d8d
SHA2563833e9cc52e30f490ae659aa1fc695ad139cfee7d44611d4ca463e8a0c618eed
SHA512a4dcd55eea8d2644c0dc279de667e36248e3950427a5bf76abeb02f9a905dcb9ff8454c008bbc89c70717f3b4fdc85ce5c836df86eca1fdcfc0e716b5117afbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fbca4eba2116ef4f1878b1f3b702005
SHA111a2b7beb40b7191d2be51df74a361dbc6314c72
SHA25634c09e11a85e0a443becf06cf703c1c1bde25b66091ef4b870439522aad10c2e
SHA5127dc8e52d9bee119a1ea9d3b4bac17f2b5599ba4c4e9ab7c5e2f552dc66ba6945f600f5d726bcb8227bcb258e3336d5f19084be2b58bb9b0d73d89decc73f53c0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b