Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 14:37
Static task
static1
Behavioral task
behavioral1
Sample
a709bb47b50360f5cf050ba2be6e8d88_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a709bb47b50360f5cf050ba2be6e8d88_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a709bb47b50360f5cf050ba2be6e8d88_JaffaCakes118.html
-
Size
6KB
-
MD5
a709bb47b50360f5cf050ba2be6e8d88
-
SHA1
84ef3fedfaa26a3df9d596a62cb72707cf3631e5
-
SHA256
d7e0e3d22105037f97ee955a3c7ea1d0479ce9ccff5b9d67c560de24febdcda8
-
SHA512
75558b85d7aef69e37ddc46148873e55ce55185257558bd89514816ad3003848d4ad8f612f382dd631f301fdca9114ae9edfbaf999c107e0e4c5565e3b13a85b
-
SSDEEP
96:uzVs+ux7LzLLY1k9o84d12ef7CSTUvZcEZ7ru7f:csz7LzAYS/qb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10d80a367cf1da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430153709" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000001e6fe3201a41e134855bd99ef2b6499f7f1f713fcbd9b8def799a7259a4b3246000000000e8000000002000020000000e03c7e5fac7f9690c6cd6edbbe3a2d1329c720a3946b5efe24ea5d3b9c3410cc200000004cb782af76dde26bb65b22d3bc38aa4adbe8d0c90fe653aa699a711ff6c2f2cb4000000084357439ce1f01c5c3dac1834e2e22f0ab0ca067fd683f2b16e89173ea2161fa84f056ed00ded5144f1af0cf33ce6c2f756c3df2b180feb22c6d5ef2c8e446f8 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{610C6CE1-5D6F-11EF-A429-7A64CBF9805C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1760 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1760 iexplore.exe 1760 iexplore.exe 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1760 wrote to memory of 1964 1760 iexplore.exe 30 PID 1760 wrote to memory of 1964 1760 iexplore.exe 30 PID 1760 wrote to memory of 1964 1760 iexplore.exe 30 PID 1760 wrote to memory of 1964 1760 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a709bb47b50360f5cf050ba2be6e8d88_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1760 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e40670dea944aaec1d851037f2dead1
SHA19537da2227edf748b25a550a50fbbcbefc1c4acf
SHA25655dda2c1108bae04f8a14d3951ec2d29dcede1b47bf8e5eba35d3b8549285276
SHA5122e0e3d4a67ad8bc5fa717ff193ee7539d7cc8b5810e903c137e814078d949a6f27d36ffc9beaea0f5f40c83b128d254b00c59890d64ed2fd391852139c6eeda5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d82529fb1b482c1353e0da89cacc973
SHA116724feaa2652fcaba33cb93514dc1afa5d4cfb3
SHA256668fb207465b8d07efc5fd1b14abb140ab1e858ec438bd61a94757400c5f92f6
SHA51273ed4a89bf6bb7dc047c240833488f777c91641f55541b7566a93836ff8081e6dd83c9b87f2f33ff1553ba7cb4d11d987f4a51d657cff34e3aa6395f18488e41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc3ee9cc9ef1c1c109a9ae4f0f50366a
SHA157d395804f14c35156f53ee118b7cb712824a1c5
SHA25624c9b71ee5372f08fb58439b534ee8363d839f2ac5c60c35b0f54758e56e7ac2
SHA5122cd195547710b6e1ce43367b2b40efcb3f6f5e642f107b77d0c29cba50cc55d5c45428e11610e730a82e25a9a7742948fb7ba6bda29392469f280f69d542af98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1b2fb110f1ec522615c0f9d65c4dd92
SHA1854bc415bb394ae8ffa274609adb5aec6488b529
SHA256594878dcc8aa96a7500b67338d2823b096ab0354df3cd45ceed418085051b5a4
SHA5128dddc5120cf7ccac85e8961ef35a0a6376cbfb3c1737f7cbb7aedd135e3a13e78a5265fd1ca0bae23e234849f4df937f9d2cbb94ada1ad5d9ccf6b8f9ff9eddd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583dd3e3d5343c1c9b274163c35876a5e
SHA1a98e230d58a4fe5b6aab1795fe0e07899651541b
SHA2568b7dd405582e748790aafc8db0189e586cb713ddc180fdaae01e7804be4a0ee0
SHA512c5b3da62338267a950f6165088243e43cd1474f9fb0885039c8a3a9a2e31d0857e9f1385629ed9724b778b26a8aa8062eb2cb6353038e74230f14e6d2cba466c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57832ad7c5df1f2831430b0b913ca3c4a
SHA1e7900d6ee23e3f873e5c2bcdb317656d2d2b0394
SHA25605727dde631eed0148e8351bf6a74409738caa68e328fe55a836723c3e16e63c
SHA512ef17f3c553cd55fa80435d6987841b12f3c8c47acd47f085f33a53fd6be5e2ea6bff01ef7030fd4715c854ff6dfc22709038915fce5afd88b74a4c25d578b3af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5064acb749f55d320e80e40905dd41a33
SHA14b4a975bccc719465b8f1804c736ce2b9f9200df
SHA2569cc0631fee2b73dbdab36857cb55e61dbb58198a5a2c8f953be234e2878d2efa
SHA5122399a82b37b9abe1d6673bda4687fe628b43a5281f1646e25cefda6ee6fe5472993359ad6405878442e8b38936abc31be85a56e596a1e4a147504211eec72f35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551cdb469a36260e22afb8ed7db1785fb
SHA191f516a06e5cfac8be00383867b34f50d8a7ff6d
SHA256eab414235d15600c97c63fd7c06301a7041a9d4548be51858aee900b70c045e4
SHA5122daf5e3c837992b339322e7b6ed347db822f4eed834ed918ce27cdb2548f624173949c690b11742ac714951225816f3469c409a461781b1d0a668d6d6c284ebb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b46a01406b5a8ae04b21adb716db72e
SHA150fc8d287fcf863368fe4e3d54395c7291aa14d6
SHA256129e3d4196bc9264077d922f5d0d14d6e5121b5d793e82db9859b27c06fe8e50
SHA51216dc1b71f85c6113b635fe6bcd3b6db423aeb716848a77248f8f6c321065f33cf0cf48c72e152fed4d3173004f3d408a5bf70a8076553e12e53ee3f980ac4a30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c9c2eba2cc16d4bc02720b18662e847
SHA19a9fb3fd82747b4b7d89ab52f49faa11d6588ec6
SHA256b009529c6a97d5b17829462c1d9cefdd36055660919ad1d4f427353da3304660
SHA5129fab0dd8849e331d0819c77a793d3f602580f2b216cc8ed93e1dd9c519d0bd2eb42f7fcce03f3eec8b855689227e8c8b8f72bc8c5e30e1811095c4405c55048e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59168950797a5dbe9c0b5923ca2577a37
SHA152069c9db1252abf57505f9b8934cb36114ce745
SHA2568362ff73ee263d2e96ebd8ebe0d51a9035a36f57147d372906793a12f5685444
SHA51203140a265c028b54e2c4d9ef81f3f15d02f701515333b8d3c05c185ad6c562ea5fb29a3b6b6484b6be1b813d4acf2ec2994c034bccec0da85bc40e2a9a31121f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54063da6633074c6bdf87be781503d634
SHA18079faee6f11cda6793885b88ad19c6d44d14fad
SHA256e6acf3fdb547f53f7dd16b7023de4a65bc309028a772aec897e28b149a963c81
SHA512b3d51e9d1bc87f0340ffef537b24fa8355e9308c6ccb835b7b5a6f550920a568ea9e256338b38415971aae2d64f2d910fb2e8d06765651ac4f78865b27f28ef4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d2ebaa519103e01f7ef4dbae5e621f0
SHA1d16617300c434e4bc26e3d9cefe24e6305a90e06
SHA256683bd893de65b35d1ccd48ea3e48b6a52047f7f5890015475a7019024ff4f5cc
SHA5128f93337483a6b7367944f4cf8d5397675c407c37fd2187bd099f971128f8a2793fd3f91442722a980ddaa4fa917774c9288114e747c7ac6acee86df6bca9158a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d37462b9ec0770d2dc3b3a91ca22b4c7
SHA168e57f3c2543354beceb3189c82956fd4c31a4fb
SHA25658ae9fac4fe82103a2d7cb1348851ee363cc89c3b95718746fbcb5f82f8ebe53
SHA512aaf6d648fe13d9ab60344792ae449c7f6bfd2aaeff85f7022e3572d8c69f23038df25c1e91dd61c7e56150f13e5c876d5f4e1c0c742690d0eac4353ab074975a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530b0540446d4baf066ae55eb3d2cb05c
SHA13ead78c04d42176beb866c40c90a5a584e5998de
SHA256a97e09716e90e15ec0a2967da7e31cf8e0b7de9f846039b4051a0c6ec97e3fab
SHA51224116c3008e8b155cbc3ab5bd184935072496f20b6750bb22641edd66c5bd0f9c96b9dede7313bc3988030bb3ad1bc656c9c6aa82073058e65980aec7a5278e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518a06b29a44bc904fdd48b226b9274b2
SHA1a4ce41886b89b71e212f6a74d1cf61e1b6e348f1
SHA25656cc427f3a213f113e9fb47b21164998e23d447634dfba7f7cf9fd5b45fbbbf2
SHA5120940699e3416a6ba61c7050b733b004f3daee2a7f0af1b4a32f2928aa3abdae0cd5d04e45cf3027f1cf2f879cc3ff33330ec1ec6bbdd6ee9344049727257bdd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5c8feb33dd8553b41a70ef3b5bbceb3
SHA14fdf06253e80adf09abbc68d55cede9823507855
SHA25651eb24823d06aaa9b1152ce0b8b7417eaf432d3e04d009b1071153e057db25de
SHA512589c656286e44812ffe96ea8a4254855fea7967571a9de6e7698d7c684c9531f2eb06c5f07b23fe4c5d4915d5cd3c6cb4100df362209b8f3c6f522b5b229a953
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532f27b442a37decf91e17ecbcf70315d
SHA1408eaeb4d05cabb9c1872f6983b7d829dd54456c
SHA2560b460b185086f3c94eee5cbf28df47af31a78168009a9d1dcd5ab7863f73a532
SHA512fa82a54f575e861ef777dd290142d321b7fb8855ec088d21bfe5c9679c322f1269d7302c9fe575919c52df87f54b2780e4e839d51055a10407683f908201271d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de6ead921913d005bdbe69d2ad77c404
SHA1733f533a5c82dd54f969fc53ff984abdf3c870a9
SHA2567182f32e4564868429df832e814833dd050e7159fb6389e01b74052a95eb0e25
SHA512d13c0f03b1d8211961c263db29c759967cb39561cc7de908c75f94e81a0104119970958ad5ca371b72fb294d7e2705a2dab415f0fc4645ac1f3685aea2189284
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b