Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 06:35
Static task
static1
Behavioral task
behavioral1
Sample
a187ae3d055a73259262e60a7d3ac625_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a187ae3d055a73259262e60a7d3ac625_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a187ae3d055a73259262e60a7d3ac625_JaffaCakes118.html
-
Size
6KB
-
MD5
a187ae3d055a73259262e60a7d3ac625
-
SHA1
3f324a1428609a7614656fcd6c7bed4fb5d8ac2c
-
SHA256
59759017ff70e63cdbb52a73490e6593a00e3a4c36c65c259bf35987f2278e12
-
SHA512
7b37bf79da81ed481a1cae87ac50ea64f5994a12ecbc8aae2b2d042bd4209f0746e5bd0e15b540302e4ba3a55dc4eb3a35ba0220baebae79576f14bcd82f240d
-
SSDEEP
96:uzVs+ux7wHLLY1k9o84d12ef7CSTURZcEZ7ru7f:csz7wHAYS/Mb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c92000000000200000000001066000000010000200000001b9d3b36245dd85b4fde284315bc78235f212d3f224116ffc4cb7d13de8cac7e000000000e8000000002000020000000ad7bc57324b03188318540273f756753be8331944aae64ff686c93bdabc147bb2000000072653a2d3a3cda610e474f6f8e5da22ce5ea3774584ed799daab137d7f52326b4000000091656339a65c565b6f927c4a2767af1b7352fdb21c4f2909e9f3f966007aba7e40351d4d45b1bb4aab00cf727c89cef57e6778b8df430cc938470d802a380fdd iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430038376" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0c02bae6ff0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D93803E1-5C62-11EF-9730-E6B33176B75A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1752 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1752 iexplore.exe 1752 iexplore.exe 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1752 wrote to memory of 2696 1752 iexplore.exe 30 PID 1752 wrote to memory of 2696 1752 iexplore.exe 30 PID 1752 wrote to memory of 2696 1752 iexplore.exe 30 PID 1752 wrote to memory of 2696 1752 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a187ae3d055a73259262e60a7d3ac625_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1752 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504cb56a7c0b422a33f01d4b6a6a52f3f
SHA1d81030ce8886dabb67f87103393304a088c4daea
SHA256a65565962dc455588f294a91b1f032275cfaf2bb7e85f9ecc99b3576a67a1da3
SHA5125c34b3a379df2637ab058e91f7bfa1173084133221feb3549d45858675c39460264b84ac7485dcf71433d484cbd4c48987b249e03f0d3b1126076b951ccfa066
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c829c25fe03ef2ee66d38122bbbf2a9f
SHA1b45211cceb0dbb3535ba7cce97d0ef6c5247d72b
SHA256ffc82707d0e687186d3954e7220cd2c68fcecb1e4209bb90f38213230ded066e
SHA5125dc30f6d7de9f67c63d1aa95393955d1af48983b781454a8cee0785eae52129fc5f7293dcf43c4b498cbbe83198dc6fa8c92686657e9526f453258bedbc9fb93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54777c536e56af58167ca3daab6f42d3f
SHA134daff2c8cb08cfe96c81ccaf496b23535b975c0
SHA256a0a6f4bb8e7a7dbdf3e4f2e0e63ff06daf9b329e2fce3f64e4f2a31b8950e651
SHA51205d10026da33bbb5d0fbcada524b32dacba4f7da795727459ab9172994fb609a4e029ea26c1a74b9072226dfad2f2efb3c6a1c593fed48151ce84f90f672a613
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5242d5fb8e815ae44059fd1dea6edbe6e
SHA181bd99c2d92c64b7df53febdb0bd4d9b72854f99
SHA256cc93aff86a1e171a85b9161cd08bfd1b42e89ab4fc9403ad161a19e6a3529e82
SHA512f25f9fdad7deb546c81007bd5e92adede79d2c83bc0b3cba7aab7aa4d09e89cf821a925c0435efe99b8748de9cbd8ab814dce98af2f71d8c85ca63424532d33a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e262672eaf7d3b25d4c57642b3b92f9
SHA1a546b10010a8b9c04352a9eb2bbdbe2b062634f0
SHA2567e3bf47de34275a1ca74151485cc3c58685ab22632ce4a518becf2e91b1ee935
SHA512779256d6e34833a441ad33336c327e4dbdc55a0647dfa4ce3ca62f99eca8d5f1105a336232c8e65564a8777296bfea98d32547903986af9323a5d53f415d9cd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a941d1c7aa5b32c9375116c7d9ac053
SHA10164df435d2ba5504bb2464497c46442aa0f4059
SHA256835dcf5604a7a0567c28e835cf04f4566c9cdfc33b3903e0accee6778eb31308
SHA5127f2ca9b108dcbe5b8078b842f8f8ceaf1806bd008fede8705ee109ce6affdc4af98613f6dc5eb35b37d186da2004cdee02815ab733521b1ecfb178a2c853f05b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fe2f134961c8ceba36f5fc4e3894a71
SHA17ff17a421e4cb514fb6b2f42fb7ae6579fb653e6
SHA25696e4da025d06360375a0442f517c12137251ece40e9ed9f4a7b807af532380b3
SHA512af73b20374bf92973aaf094dd10aaacf3931d33fd5a1304e7dc18cedfc35a81fa2723b87f39697a2cffaa3cdf191e36791b4b73e6c5249244d5f25fc56464aa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5914eb71c27060593ef3a62e3e1ff0375
SHA13a24c1b2a9625ce73af55f76b5249a6706089b68
SHA25698f1f0353cd73faf6b3d011dd44e619db7812f7b68db83829721bef57d8e5663
SHA5127b39d1d909ddf9d9b5fb811b8e9539855e24e2bc6cf879db7a9f693a789c485747859b2485d2de1b1b40ec031e0c3bebe9af0d07f55c4fc56e993534e4db4682
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6e35f3db40838e683ac4d63a5c524b3
SHA16117de580f8ee82a5008cc101e30fc783379c457
SHA2561ee7576fab72079519873ca1296038a47721309a2a96c839ad24b3d96e3c1a68
SHA51275ea3574655a546d2783496000bb0f2d1cd468cea6cdbada580997a68508c843c0282393716325ef5e9b8e08b7a65edbb024a57e111ddb6afe1b684191f234a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5977b546291f1fd1df2408abd8e141cfa
SHA12cccd1c0b8a9e354a6ec8984a5a0b9f8c5ea7011
SHA256f87a7b076182f7f81cfedd459c2d85a492c306de9ef8645de6dda8cc52e01484
SHA5129fe169e0a404bf8bd755f46a7e8d68fbaba4417e2ff180af2a976e826ec043f65e08b7582218c8d7e4c2e3b096549e909ae152c0a8394ef60b8875a1722ff6df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5f5c288193e1ed7afd95011260d0036
SHA1f0651a7c5a06812bdad3279b50ea99849dfe33b1
SHA2564554a40c298d9fe31c05281f947e6c7531f865a40bacf240596126a0a7470fbc
SHA51231b1a73f1b18c04934872e49df370e35513a6474b57947f177d20baca291cb49f905dd373774f6db0eae7cdc85996ce52d3af7628d33e4c7dc9a5a0a436e8e3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5851baf8d2a7495da6f1f6d608e09bb3c
SHA15b07956c4cac3d3003d3188bf10316aa9b5a55c0
SHA25620f73f89550b0ef9ea363aaf1bdb76b62a5e48370883a1d25424300f0142cb3e
SHA512aef4ae6c051b7b69854d4dd05828085782153eeaaa1b3f10882d2d671defa09229c931d5316caf794082a224eaa1f3910853dd8ab001f2995e4f83e3ee8d5ce2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54efd74d2fd3570efb52c481234e280e9
SHA1796cb391e6530ae1867caa997b9ad2a92d44f72a
SHA256afb1f0ff9924f04adbe130b13a297992096baa3fa5544470b31c657c9309bc28
SHA5129f6a5a05948ff2de52e447cab460ad63aa023b26ced59d0f87c06000c51a1a25ad24f15b51eab469ea2cc8c496068b07c1a662bbbf4c3b84c466fa38db57b4a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a92a4817b7b3c1ee3d84fe141d57db0
SHA1c85d0ed1613fe8d46c665fe8b1350b23026760e8
SHA25618350733b51c26be2ff246552bc3d46d50804fbc5b152c81fcdfa7c39b976ef3
SHA512659b2362c794347a9048f19929398bebc19610c1a02ef314c65322092cf42f179056c60a2a29152530815970dd5ce16c9789f6a1a71eaf27d89a8b74e497e3cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591f4b4b9846dfcde8185f907ad5c35ba
SHA184a7076dfeb750a0dcc6903cbc518faf069ba38d
SHA256e46a4c8a2951d6633f01c880afe7e488172fdfdc53b7d80045a89c6a92f7e9fd
SHA51269dace0445135157e63cab8062ecebbb84d9e5c32915185f56afbc05f284733414597f169578efb88e7125821b1784a780083ff0d794d25d6d5f65395328c526
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3ae8cf4fee7cabcbece5499e3b3b564
SHA1b072476d9c358d4aabf2d903827858074f159c27
SHA25681e0b5e08b9d6020046f805bda67b1ab961fc096589db030ea24f1a9ecaa71a4
SHA5126a3d54b4d67592c1690a194e0be8ecd89ea6407fb0c8980a39ec2f768a80e18cb3d5c40ee0aade3246340e5203804518cb6691a53cf60530ce9710d871a49bd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5889c682698f21281dc280a885ba28351
SHA1dfb7ccf086d773d3ba3bc7239bc3f30b88de7c96
SHA2562cb8fcfbe203304f60d70d1e78e66efc4aa3eaaf417f76acd1e6d42f627ff319
SHA51215d2c107cb12ab4a1ab94297498b7498e163f468370b5fac27cf63127c833b19c724014557b5a465abedfc3b06fe417ffb31b089dc72ab148541c6a5d080e43f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2d4659a5a9f7f587025f70fa29fb98e
SHA18d1f80813dbab9f43626156d54ff3e93e01e0a7d
SHA2562dc7f7904b41ad03c75eabc1855f52b589d27f5fa68b50ebad81f6140f2d5b86
SHA5124b58ceddb520d8c9ba7cdb6df9bb0b093fbeba5454e4784b0f79bd4baa5566369caab7bbf3b0b5c6e4ec728d03cec31ed1f1a70a98b1b349ae21affc9db2a4d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f63844d190df23de47ac64166b30dcdf
SHA113aeb81b49423500481ea4e42c9e5f1b36a244be
SHA256c639653aad9d1998f2578951a5cbb4c3ba47fba4b87704c9feabe88eda5c99e1
SHA512d33e76dd0deede69ca553c3655b17849bf93afe15dbe339588134586d4db23e8e8b9071321027c11805b6a646becd112f0a45028856b2182803ff9413a6d7815
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b