Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 09:30
Static task
static1
Behavioral task
behavioral1
Sample
a640621337f76d9b7ff1245cdcbce50d_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a640621337f76d9b7ff1245cdcbce50d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a640621337f76d9b7ff1245cdcbce50d_JaffaCakes118.html
-
Size
22KB
-
MD5
a640621337f76d9b7ff1245cdcbce50d
-
SHA1
ba4f598fb39ee49614dc791c5824fdcd07b0bbe9
-
SHA256
b3daf8eb69d6d1f727894101b84c654f266c7a58ab813321612fe56e79e00e1a
-
SHA512
a81fdd1a744974106e60bd1ccedce80b24cba6889af4d85d7b5878b9f51d7fd71eed236fd94cb5c1b82f13c8f157485133ffe1cf9525ffc05ec84bb0760f88cf
-
SSDEEP
192:g83GVwYzel5iYzel5+eWnLzyw+U6lt9Xrn4babDgdvJfHVp0Td4/zJ/ZOGXpsEB0:GDiN59CfDgdvJdtZZOmpTvuZYaGR4/n3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf710000000002000000000010660000000100002000000040d25e5279667776298e6f7de11cc3ad9702aea14327db2265550b0f1f697041000000000e80000000020000200000009eb3e8d4a6888562ce27eade17e594c23b65ed43323bf6beb80a251389f235ef20000000f1c35ea60124a20506d39322375628c03ed2772a19f158e40ae0f6df6f02386540000000fea69c0a7a53a1af933811dcef649fa216e29c017a41355207a11a3363c1d5a55b6371d4e04fe3f2f6c07b1b09daad9042aa028b4f6f42fafa2b8065145c4dd0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{75888031-5D44-11EF-8CC6-7ED57E6FAC85} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430135276" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 000ba84b51f1da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1712 iexplore.exe 1712 iexplore.exe 1916 IEXPLORE.EXE 1916 IEXPLORE.EXE 1916 IEXPLORE.EXE 1916 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 1916 1712 iexplore.exe 30 PID 1712 wrote to memory of 1916 1712 iexplore.exe 30 PID 1712 wrote to memory of 1916 1712 iexplore.exe 30 PID 1712 wrote to memory of 1916 1712 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a640621337f76d9b7ff1245cdcbce50d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1712 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d60bd3d028bf7af9ed29db3e3ebf9733
SHA1d453acdc9e9e47fe48d66dde80e16b49220fb8cc
SHA256483d88ff329ee7dc99c61c6e38715c82dfc417918efaf7807fc97cfc8befe9e5
SHA5122a63989b4bf473a4c315a1d86f4ff75a7b7081d929c94730af3d0e2ad264866649cdce4d16527073edc94c0860251e6c2214c92b3a885beb7fa462a1ed3d9f94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5315ccf85910c79ee82f4143716cfc74a
SHA11ccc7497a58379743c5f5adc16b04ae36084bae3
SHA256f04d6820a4ae80d77ed786ed23aeb1fd54f6a8ccdd565e436522445d12d63ee7
SHA51254b76d2ff8744cec5124611aa032b8e63f83cc32960dffe9724d91447dacf5e1d94135cbba4fcfdd009a957b84229c604cd5b58242bc35cd372f9bd9080a001c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583db6e5bec9f1a13182d52c35063f4b5
SHA158a7228a2b188c9cbc6589cdea00661977e2aec6
SHA256be3e1d19077db73488677142fe6d1fab19a16a1d50b7c6295dd85109f08c7adb
SHA512c46d41c817857bc5f411fd0f307b29e7b1dc07c3e5aa2fa1b42e7f7e54b14fb0266e7c3a05d9667436f39979253f2f4c3394745fee74800ca5f0513305f1be3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a3221b297c07ed7116763e860b45c49
SHA1e6f624358fbca4ba629fb6a91d13cc967682c08f
SHA25635b1b401cf6742e825b75e0bd59a2882b309d692e70eb6a69826e3196f50b06f
SHA512d0102a1c2987362fc61778c0dd9c514e44e6ad60c53f946911617bb9d536328befb46230d85253b1e0cbf28fad88c767d92325d75c6e9b4450bb008f99ebb6f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c39a61f3c36492c0c3399f8681912fe6
SHA127e41b93034d1510cab9d66ddd4951567389ff31
SHA256e0b8276eb8fc7666e5b134a3721fdc2a3420343daa652e60f87dbb2286ac9a0d
SHA5128634366e78e48fc7156df9f6779d87010ec4c08383ccdf5bc5370c6dfcab329282852b42ee8a20b6a6a5e2d8bad77b4c2e48d440d7a7225f21bee3668499ed66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b958d6ab1e255f557beedfad59ad2f7f
SHA1c06c9fd7e6335673043922ed29824cc57b066a75
SHA2561cbd7328b30ab68c7aec8e6da2979b656108008f9de3a8e3f1b74d8f32d4d667
SHA5121f7b11ceeb84db15a70e2a5edd88c6d61afd2a7d28c6e3522eac82025c646681d27f28ae9ebae687f030bd593bb0737a2eb81ad144cbbf027e8943123580af0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bd41a52e4cb4dfb81fa1d79e39b2d45
SHA18971e171d5a14d9890dc77ff1ee802c40bb42fc5
SHA256abf575facfff0b1cbdd146f19d458354255818d49366d1c35d5fab7983c8d98b
SHA51294b7e816512c9eeb39f5058bc0dc26bb85c81da441ac0452e0d561034eb620dbecc7e4975487dd401728179e817919ce50acef8fbb6d2648dc6a0f5e6a0f4e7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542b6c899350980aa0f52b16702992d1f
SHA1de1b91a2be26ed80ee2bd7b35798380b1ff05817
SHA256da3c3e02a16d9194e73aba0ac429b909a1b021d01a4c89b9b48d4aecf5b71da7
SHA51232a26a9e88f048679334884c2923be529e8a631ed0209fb96afe518caf67fa6d3e6cfaeb63543beb4f39f1a6ae571b1060ed569ff4269761f78b2f02e4fce511
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ea752d0f8f54d763eb5220e3b4f5b40
SHA1b2665c694ff1fb060141690ab5111c75be1712c8
SHA256f4eefb312bc0c709f55e6d7fc5bb9b594bd53cfd350e1003601bd986780eb0dc
SHA512adcfaaec531f318791c1bf778b0a9fe5d5c3eafe1253183a84312c150033a11d165b7a4925b01e803f8f3b2c3f500e723ab02cb851cc8d7d89ac3d54870be415
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50153037e8e020e4e2a53a1129d1649b4
SHA18804b2f75c1ce0d7f947ad8d5ebf5baab55e2405
SHA2563bc959a18dd08fef72ab57c78abe018475e47f06a7a5c31e37f5424570baa054
SHA51230240dce06f66a7a0eea67fc0539cf05d166b0d8e1df2f4c639c01d3d3c6244ee3ba85889f09ea51b99072aa08844b909fad14e94003d29547124f01ec162dc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520e43b9631d5dc85724c5fe45493b6fb
SHA1871049686546a2ff2cbe77b0c2bb62bcba3cef7c
SHA2565d0c79162e7f012754c772bc84642de82155d10f7fac7bc216cfd1d6bd918ec6
SHA51216183187f1634030a53808267ae661751c89e8846f9ea9e5d624d38b709ff944ee9fa6c37f109d2b0f98cd7c0e94354d25a0e8132d69fbc50fde5dd0cc556d93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7318caf7d753f55f080b12068913449
SHA151ed5213cf66bc8e28af5db55c140174b9fa5864
SHA256a457584bcde096c77fcca0d801d39d83ab4f0b52bed3d38b12fa3a9a4f71754d
SHA512dac0f5ea0c2b69e4e6c7914accf8e6bfc65b72ec194ff3026bfe8c07529bb335c04d3b869c77d11a5d3ec3cd8ba6a5fadc95dbdb6f007ba0ad1826710acb1fce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594aa3caf07835985e702a8ee70b3fde9
SHA16dca78027f12d49c74eff1c6f24db788f680bd35
SHA25691f9b478fa55d1379f7a569bc035044a31f69f80bea9f904876f7431c3c6c54c
SHA512ff1dd82e1a4ce26d5a5125d72bb36bafc47f631bbc4947b98ccdd6cb7191f627063a37d8c6ef117267798612c704e3aa05450caf10540908e768bea5067fb9d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdd854373a17c54edea035ed6891b818
SHA1ad9d95206afb81fe2c63bdb56e2409f7b50cc4e9
SHA256eaf46d938fc9b09ad08f2b84b256b51b9ca1f1fbff9cff6e9a1c5156e06800d1
SHA512855bca751d4ea14bd13dfbb71a545ad32a726be547ae586c1e2342a10fe80a5d059f5761a6656d610937368ae597d640896dd5311d474b3d0294e5c8cd4c4857
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ad7250d6627ed61dc9c065b7319a280
SHA13a68cb22aa2873bc829f02417586d5bd47a415b0
SHA256d633059fba81dd06c8e28b72a458fc92b03f0dc102d4e37b32257e8c6dd74b89
SHA512f6d2e7d43b5484e0f6110c91b3bf40337bf23634c2afb0d0831614618912c4b2aaad02d87364a110aac6e3e7e444cfb3fb925a4af157c6d9c015116b7674b5e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5ab92837f9298b98c7165cd8e60f0c5
SHA1ff6046e179c9a313ad5fef5e4fc98e36fe57b104
SHA2569298d1ab76559bb978c08f36c5caffb9009d6fe378335d766ceb12eb8d2f3b9c
SHA512dd2f90adb1fa742f512470cabe954b232cf874b7e71cc71af6bb598f788f4d7c091a398d99506ccc227bcc5f5c6525c238b32363c69f278e8681410df2ab1877
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515c5e67895a5ebcfb2bee3d2c26b95df
SHA1424f5ed546de735e472b09c312ab1da0540c4237
SHA256ddefe3c73b7a69335c64c3eb9fe14d9c9fa377965c9e12c1fbbcbdc740d5df05
SHA512d981b7e92a630aa6ddfce7b098342a11cd52b7dacf752bfcbecb71ba84020bf80995ee4e1133136747b492853058b26791986086303025709d2f46ba503b64f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e0f778d4c8c2c8d6ed0972d86933b98
SHA1bd3bea4feb4ccde6adef8f71401e4e8a8d1d201c
SHA256dfcd69519b1169f72de585dc66fb676be1ddd8e6ab4218f3fb8b5b2011fe7d59
SHA512f6a7fe5d471323e5b79ff9d89fb0036e3382b28877ba543ddcbd77020b01c113b3fbe4eb179b38890ccf0717898b922cc2e870cb45ae5d43ea14556b9b8c27a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd9ec3537d7550c2bca66069553fbc65
SHA141c25c66f1700bc43ded737b68eaab1ae4eb83c6
SHA256be732a98a66ef56a798ea53b2cc43fae6f77f3be5a7fa41df8e6721addc685b6
SHA51297e26b3a9548c698d294a46c0503eac285494845b8734c2f101a7397e06ed9b48eb3e98631c794521fe89c69c14fb165462757f8957b60e76164a56efc5b6b7b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b