Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 19:04
Static task
static1
Behavioral task
behavioral1
Sample
974d8f206ec2eda99c9110520a636919_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
974d8f206ec2eda99c9110520a636919_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
974d8f206ec2eda99c9110520a636919_JaffaCakes118.html
-
Size
53KB
-
MD5
974d8f206ec2eda99c9110520a636919
-
SHA1
ae8a7100c140b41a1fd2dd458d78dc74fd9ea2c2
-
SHA256
5a9c93719c9704afd4ecda442def9bc8f3db421df0b6ef35e749cdb88ffec36e
-
SHA512
936a3b5c5d67d5b21ebc5a98763b246bde17ed2f88b7c41f53b83d4186eaa5c2f901fe6db6f74205c7302c699f96273ccc9259311b2b2a0f38f571658e9fb3c8
-
SSDEEP
1536:CkgUiIakTqGivi+PyU5runlYf63Nj+q5VyvR0w2AzTICbbDoc/t9M/dNwIUEDmDS:CkgUiIakTqGivi+PyU5runlYf63Nj+q5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429824145" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c000000000200000000001066000000010000200000004fa0e9a520938913d91b9e740832b32acba9ac952a0d657c333551e8afccb5ef000000000e8000000002000020000000e32aa810c67d159b2b7ba11524a1a06cd9f791faf12bfa272c62176c7f1b4d9b200000005ef84b0ebad72e2b31b89938ed5cf0f3f67ee4df263b44c895d250e12a20ce43400000001b8b9e2b23dc253f3744cecd02af200782a54252a1b08357e2cdeb5cb20de2b00f299aaba7c168c6c3781c1ff3c637227db2261675d476c723118cb4579d7e63 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0D045F11-5A70-11EF-8E00-526249468C57} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00a985e87ceeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 328 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 328 iexplore.exe 328 iexplore.exe 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 328 wrote to memory of 2392 328 iexplore.exe 30 PID 328 wrote to memory of 2392 328 iexplore.exe 30 PID 328 wrote to memory of 2392 328 iexplore.exe 30 PID 328 wrote to memory of 2392 328 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\974d8f206ec2eda99c9110520a636919_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:328 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD586c6462d78a8e2947516630424a7a6b6
SHA1e7a83d2a002de565e5e59b15bab9225bd036b03f
SHA2563298fd5e6ae84bdc0037231ff035c6c33cacdeef1edc2c886b885c3214ceae6d
SHA5129417406d0d6bf44bb4591224901be968c0dcc6cd84f007020fdc707b8df617f78ca0c0234866d3f2b12ec10db86a4994b3296def28c8b1036ff55108b6c8bf97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b503150fdafd552698f7c89eae6e4c82
SHA1d08209edb676416175bdec2365c2e14133d06dc9
SHA25603fa4db82dbae7141faa5f4fe49c369a3ea7116b5327cd8b5532552bf83b7411
SHA512ece3f554c7080c9080e94a78b98885203c07dc797db22aaf6a19ea95bdad948023b0fce605e6c70d38113a88dbc60ac76edc01593d0a14b8c2da05f3a03dd92b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b1eb733a73caf6754def9196ec243cec
SHA1b9f9109aaae509d35737a14d69a75dcf7b52d51e
SHA256b88c972a29ec736469456b155bb6cf45abd278b3164c6fc835ddceb63cef1534
SHA51219129d46b967f640a1b389c569dec789c922c25b7321c2d489cdfc58207004c83e03fb3b4c5c9d49fb9de1201e712a2651f2929bf8afcce8bd6cf42862646313
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c8b1f4fce4a7d735bb1a6e8e098f7987
SHA18cc6b75aa8b603f091d963a779f409fe7ff90b86
SHA256caf6f999075f3eb723c7d71b310d96ab2182ac716b1d1aaab6eb41f1af3e5240
SHA5128db521f0bb3873ef51a16c32a84f1b1adf48e772f6e7ad2649ce8966272b19218c0103560b26070e3c08102910832e06129a083058c3b17bcc467b02033b514e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5804817f30d284fa8eb499423f7a36058
SHA12ccc8516311ab5ba85c83c2ed714506e4cba9d35
SHA2561149fbb53d792bf4a4b6233a13b592b20cd27679d44671cc3c0e885edd19be23
SHA512d1492b212271e5c26d89ec10480ecba594a30563a079edc468e491f778b43ba1aea6d65f5c7140a7ecd30203e16e551a73d92a0146eb8149d3b36e379002c7fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f35174ac24d73223d208e8af788ed888
SHA104ed5a5b6b94b6e23f87547ddb62c7335007b1e3
SHA256841eb8b0849f1181e7e9d0bbf1a22ca114888fbf85509381e878538e09a98a62
SHA51266c625ea613098e4a23217d77431c42648f5e54a47a3c36a2187ff39858a7c140e6e02cc73d346fb8ea7f8436a24f43d7c9f0d9546a1b50e992c12a27afb7fe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cc6c47a0b78c44ef597b0650ad316b55
SHA13e11af4e4ffdc5f72000b1ae9322a2cba74df56c
SHA25696fb233f1dab31af8089e4531b3524e1cb396311089f58fc6f82e1ae0850c105
SHA512e920927721a39dd73fe83434e2ce171713b4e1fe21b58a94c9d8899c727967dc37a499e3a53603725193577b100cbbeb0ebd813c986e7f62eac6ed9584354b2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51300cb32b30046a4a2098eb818227977
SHA16906529bc39f6c51172e57e6c52133a415e82b87
SHA256f4b9c37716652d81e26d51e1325733c16cfdd4c6fb9d9cbbbd40c46985b4f771
SHA512fdc0036163b465a84bda0681ff3b5bfd5157a2715ee6d0212a7749df33e1ae1b55ac1fa791bb5a7ee65542ebb0b1df4a8d9280a26e4e2ac9801d2cb0868e5652
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD507c4139ab90a43cd4261ecc6ead3ad87
SHA1f1279a6447869e5b3e57ea9b68f183f348c3eb4f
SHA256087fd8d1d9ed443ed6be26b5d841a2db98a96a2552da840838e0f3f6287202a1
SHA512b0ed859175c4e63f074f1cd76b706c2f6af18be72253a710429e044d72087baad91fcc56e792d81f930d29588d9ac7f7ef74328bccbfc669b09a728b1306dbab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50e4925c6b3b7553ae6aa70aa048c8e5c
SHA1ac37f2df833f5550550b00363d0abfa13259e4b0
SHA25615856010e4c8a30a5d214ef93eafd7b3171f3863eefe5cdac84e1c4bcc3b5de4
SHA512451e317dde8693590816d9cdabb3d4eeb3a2897d940b504c6e852fd0dfa05c37136b1759792cac8029099a0282d0eff0e05efae0c684fe472c1fb77727b467af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD579cf0133f356d0de3d9e67e6a8643006
SHA1a99fdd567b34fc8c6bd8298cce80df2d4d9f4a25
SHA2569b3bbe1421b37c534a82e5c4cd2a727487a107d63a2a24e5f75f9d5b9d6e115f
SHA5124e681e2e8cd67def841ffc478c76f7434b06d3e50a65a59c2ef471cabe5a043d82e1f99d3911bbcafb7801e5bbd69a325b1f1c4eb948bbf296f9739d2ea5e9b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5acd073da8452e20198d13ae7cc131850
SHA10dd7e907bb2e9077519f0a19a35757be71ab88cb
SHA256cb57d14915237cf4adc678a1b07710547df2f1fe04db7b48f686d9ed57541788
SHA512b2b1f022c56bfb44e827a269bfe628e797cd3687e831719a6ad89dc1645c9600489e16aca94258c64ef3934f82b71bb552265fd49580051a373381b1f8e56fb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e7d01fd2fde63d8f17e3f398403fec5b
SHA10916f05c3dccafff86cfa89a37704b9e147a83b4
SHA25653895ca7028f72ec2e0319663bde9d1ff0c88cb5b4ed583438557cae3e501434
SHA5125b5335703289f98c2148a18790018b7b51bcd902013716a8ffc5c24da3cfdbe1bf4c4c29ac3952807c8a576da80bea43aadc0f098ce596d551cc187f76486434
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50d4839c1fde53055423434b5a975bcaf
SHA1b9d1002613d00ce534f55116ed64f6dd0263b53e
SHA2565e86fcb0d99587879b0719c509a586e2f9908e497606899f78876056e76e1272
SHA512c7f24c61d557f776d8275e003e5fc0cf07673f8919ca4b27adf45f7161082638cf2d9b97b5c1542cc7454ed38327a3a3413e725fea0a4384aae15ac3174066b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD598ed9532603be5aeeea0af17ff5b0342
SHA13bd2e1aab07a54ec7ed1a0fa4b1796df52ef3492
SHA256070159d77589c77db3ffdb4c7a239549e3400718b387931c8e982edcc933ae38
SHA512d7e06a0dafb919ab07170568bded3a4c3aa2e68933679d084311fc00e34982a054f4050b770d4ae06f3e42375cf57e1c5317b1402a4dd901e3074f5b5ad3f1c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a2e76abeab3ae1df03e2344db05f55c4
SHA18c5033fea9d5a90aa22992501d39c661970511f9
SHA25608cffc4b06995da57f4ab4235dc72825639bde86e28a19164499675cb44f4bdc
SHA51234603fee9a058d3383626f6666cc789ad04f68cbfd7bf6d3f45300e8c0e3f404e874dd445bfde13668e833eaa19c368eb0ffa3252e68d9d99dca867c01541f83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51fdeafaa7a383bd7484d9997cd053ee4
SHA18b4999ee7a283fe546298810fd0c7c2b99e05a7a
SHA256092c7e0af6341e757ce9ff3b877984c119e3d160192b45d7cc405dadd2153ee7
SHA512bae64da605775d0e4c279393ba39469f2c0fbb9de92f00a23cb54742c97eb845222c289d3777760d5e4a7fa1783fb0c15450dbb93bd9d94a7c09d8dd20787426
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55db6c21ac0e955eacc211a60464a3463
SHA1a6ac06ab2c3d4b002b91174b625f9aeff08321f2
SHA256794971ce1f5ec4e6c10b6d6653a6a88cf9150047729eb9a5d15336dfde8fb8ae
SHA512bd9a0eec2077ddfab46e70afd4da86fdc2f4211dc65f9582e6ebe768ed9c25295d4066be6bbd12ab0dc9f345d711a6419956f0f29132db7b7b0e0c1e9f9f28d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f1271bcd9d32b44a9b4f86406afe9a43
SHA1d55c765e5d1e57f80df0a147ec5304610935c6c5
SHA256cf4c91d72b9155986b908256fac9133db30b5831aaa1f40fa7d60977ba550859
SHA5126df761521e63f785beedee30ac3e64a5c2d0315730828d65ccb4b547090a424bf3266673e76451650e533541ea68fcf6b0f1918816b58385ae7185d155c5ea6b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2LF9I1AK\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b