Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 09:28
Static task
static1
Behavioral task
behavioral1
Sample
b7201e2a03481408b890bf8113f2832d_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b7201e2a03481408b890bf8113f2832d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b7201e2a03481408b890bf8113f2832d_JaffaCakes118.html
-
Size
4KB
-
MD5
b7201e2a03481408b890bf8113f2832d
-
SHA1
3fb9e72c992483be313e3c81335949352311d40f
-
SHA256
12487855de0ac4c1f64ff6da5326622dfa858150fd00f139a3b4b99b9c74ee97
-
SHA512
70d18c9f513ab2df9470eb609c3353392f666f3cf28d077f97cd0066cd948de2b602c7025a0ec9ee7b962c9c952336ea15eca0a3b8db6997f07ff03420129ec8
-
SSDEEP
96:7gKvnlFkeCx+clBD/Z31HwZYFr+hX6WuaHUI0VdCA:vteeCx+clBD/Z3RwZYsBDnHlu
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80c13ce075f4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430480801" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F27CC841-6068-11EF-ADD5-E21FB89EE600} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000635dd306419eb37259093a93fa0ccda8b530ca27151958201db56dfcf052c11c000000000e80000000020000200000008ae663230f8448bbb8632eb69c18509c4d132667335c1836bd348aebc4cb06c720000000bba17385d511670cdb9023e88fe37f50728606d120697ac12a33c35b87e0a0ea40000000dad2be12c0e457b1aa0bee2f7fd60f8fcf22da72a881012682144669299fae463b63422a0e6ea5e480f5d0eb432b9cdb27ddfe666f6df2ffe4fca9d9cf3d4219 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2140 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2140 iexplore.exe 2140 iexplore.exe 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2820 2140 iexplore.exe 30 PID 2140 wrote to memory of 2820 2140 iexplore.exe 30 PID 2140 wrote to memory of 2820 2140 iexplore.exe 30 PID 2140 wrote to memory of 2820 2140 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b7201e2a03481408b890bf8113f2832d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2140 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555067d99b8c0fd2aefb9c6e80f12ac90
SHA14b1bc1bebf7ea419d4aab6fae64495f9da068c10
SHA2563939f55747b16ddd0167ffe5d656096e1320c4230868ef6a3f85d71f11a71432
SHA512a330b1131b2fa332f1cb78377a2248344e560dfe932a9dce611b2a5a744bf0315ec4b6c9c7fd3fc6803cfbee1f876628ebaa8997bbb930c67718235155859a2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d01757f7fc42fa23ba9b7b0c297209d
SHA127854b83e2a4c308536f5184a88e32784c5ae4ea
SHA25608b9bb25d7e920c1c2df0c0dbcb99b64efa120a3d352b3df0c0730f01813179c
SHA5124491cfaaf65cb1b92150c582a8addc53bfd8157a194ce75efa8e4a09c65e2d5ff06531f119baf43f16d2b083a0f62f01eedc36dba666882480270d40b34be89e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f0bbb45094057d8acc6041d92629089
SHA19a5cd6901a20f70355a88bee59bba7c378a6db3a
SHA256c9d3203100c003a0f6b60cbc4dce93c673eff76e2b849277f83c7027182cafd5
SHA5124fd8e1dbeaa688b47640f2033cf04390f8ad3228f323f9465fd1cf0a4dad76bc0c9f27ae7118432cbeed6d291f9c96d15a0cb7066eaf4ac3fcbadffca1bd9c84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554ed35df891dc2983919f266be302710
SHA1d4fff46c3ad3d11d9d936de9249e41a5f651783e
SHA256260d1323bcf2674b738e9a1a691850f57d84ff523cb3828f6902511e8c7d74f2
SHA51207985c88a385b61c3e36ff12b78f751dd818d8ee7aba42fc59a364231bcf381f51e50bf697e9b024bf6afbfd4b224e82613f843707cec22fd7194ec5d905d037
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8d8293171e7079652e68142809238fc
SHA14e7285711948225ad70615b0fd10412b89740c2d
SHA2566c7b795c84492ed21ec910f639234c0b8c4cfac426ed872b8aafa9d0890476f0
SHA51252de7015bcbb1ac67a1840f018991251d2026e785321760d6346f5265fe7bc1c4022735c908013a56ae8140339d77c4b27a3d42a349c77e3e26a10332eeb7aba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b29c50e7e6e4a5457fba93a89ddd607
SHA1b517c8249c4154659f2ebb1f0c444aab95409f47
SHA2569b0a2e53bf36c8a72d521fa5f30293adb4fe3e87fe797d4cb268c7860da9d7eb
SHA5129b06f703814e55c51385679db6b9a9c9f852a0a69f67d40bac7275ec5059b5f545acba82ec54397e5d06eea51d4abd59631ea87e38a13cad25aa90e23eaf475d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ce9fff32f62a6403b2022392f8b726e
SHA124277a6dbd0b0132f61a6b23fb923889452cd679
SHA2569cb3e805a2e2c25215bcff03e7f535398c1f4e988d8db5d79f71441028752202
SHA512e431a31d45f6d611ae370242e33f5568bab294a45c9aaac2309f93b6e3998d1225d1078176c45fc100355e754b8f946f8ad9fef87257bee3a25daacc6ad99d81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ae177e26e542fc09f6ce7675ee008ec
SHA1838a2c4cc2cf3859a8713372303c0b1e2b35a350
SHA25669d26eecf86409d963705c1e0812eba05e1ef560232c26451b88c929452e1984
SHA512fca63b4f6e8109f88c6b4d2ad680c512d7a1b96120ad4e898351294804f56694e7775ff17f68a840fa925d89ac540bb611f8d5ef1b74fe1ccc488c2c6a560a8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eadea64d38b0a6cb9f262ade08eba988
SHA1f3fceb5dc90d604f23e766350b60e1bb68d46c07
SHA256adedcd74fa1e5590d84a6e8a792661344b560516349a35f0b1139e4fc6c2be8d
SHA5124302869b58e8b553111c83347d9bb7bc8915347569c4a65d812889f359504ebe2fac7778b54d7c2b71eee7b038c0fe25f426ef1cfe5fb677349579e4b84e743e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589e3dca50a2d3f511527c77f7722640b
SHA1e998bec9bf5d5d79aa567a10ff6d7f3871c92768
SHA256da3bdb3c235696b46705fe6c76c4cc06deead003f5d94818d2583f6cb1422991
SHA512449bcb56429c7a7dc91cc8e555b7e60ff7c774339692a6ab38edde951a8333e1f6d463e6a843bdd2fd9ae48dfed38d00b5f5b596ce8578e4c48899b87271f7dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a99c8779457345500bc8d49513d25d17
SHA1be749a819aee87fc5062e735a868f6e5e5e865d0
SHA2560825df3278a653aaa69b2bf402d895dc08a1b152eafde9f98434caf90b7d437f
SHA512c1a57c17636fe88fabc4139abe2823c2704fe70320e41203f94b2c8df4dfee6f2bfc3120ca466783050fdf93df0133bd0f3a7f31b859a3eba36df909c35977fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fed493ee9ddc9e263406d5a3a8efc45
SHA1f3b05d8636a3c5c60c75b3bddb50391481cb50a9
SHA2563ee3ea3f59e85341fa4feb4f6c1a2b1d7ea6664a7bb96430d1c3a01b6094281a
SHA512467a90a0f32d60692216218f485681f0d199857257937147bee8266ff50dc084ebdede3ca85ba32f217f1be3f1ecb4176c20294d7ef24dcfc6c9f47601453576
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582d081caca2b355f4425934d8c4c8b78
SHA18fc2353f905c0edec523995eab1d4e34aea337f7
SHA256d5353d181b163feb3e4f2b98e7b9b425b534bba26c4b68c8b2463f95c3abb9ac
SHA51280395a0bb7a2f17f0b296bdeef3deac24280bc413a75d6498afbda2b2dc2175a64eea6219b437b3003825e74696360e82dd42c5579d37a8743ae10bd7551bb4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581ca67e137a827795ea8903756ac8091
SHA1a0ff9b7bd10c45ee6a79f4338f9165dde68e0ec1
SHA2563c7206fdf31e06075b346248c15a235e4620e6b7fe630e947c309ad9198c9b04
SHA5121392d2d1ca8e4d2deeb521ad88fc4eaed4d3512a5b58acca9a4e72b51443a220735afb158b26608c1217b0de5981d3eae842ef65f751323ea1ab23c65f43f8de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff7160c23acf09560cf3ce63693a1c2a
SHA1e5545ba9c133b9e77d2667fc6aa9ac69ffb2ec2e
SHA256cfad2cd90f3e2fe7e928ec0222004feb003caa74a08cdd47f0d61ae3258eff86
SHA512fdc33a5bfe95b88a03aa4d2be66acf84a49e7bdf687ebabc49065215fc032315dcaeb6fa0365361d725ffb7d3f73c162507aef0f08ab8b82b227c8cbe7b6986e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fd74f4e3313fdf36348cffd1261d253
SHA14070507af82902e770d79278f333a83af2475f98
SHA256e218636e2ee6989f425328c13901fa98a7fcf5f79e61327046a80696e53d6a91
SHA5126e86e031a032b7ebb8af5210b9f1eaa00b8cf3b910bbcd17900f88cfe9ec3598f96c6d942a9b65308234c48740353bb2617737c78ba5b0b2e5895ca41a1aed4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9c624cf667b03f7a3e97d393e973e08
SHA111375a98d04001f12d332e0f739c5c877a6e61b7
SHA256253110db31c4eec5c28c8e19017b6a567ba7829f71f0dd1a51d4cb8be6ece82d
SHA512424cb0da5a420dbaca43a6aa9426a0828612bb921d7af236c015a8b5445641303be5393e632c7f2d7c6e3a9c15510fe5dab28ac5f63bfc7bddf4b9a47c50fccb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a94ebd855e2db43365f471203107951
SHA134e1687610e7037e4c96934d19355c0b3cf735b4
SHA25687cbaf509e4e4488e9372d09f5415a9a0ca6453175841c7e107b28806bf76d77
SHA512f18973973dcaeabec019eba02314577f784412e5d0cadabbc3309b0929d5d153d65a2354b6d27ae929c384f219cae815d96ab9f92ebb2f18fabdb689b6ce87a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5038edb8e43ce8484fb8d43df7c6d4ac3
SHA1224064a788376ecae13284f41facb290088e894d
SHA256d8c1f93d123c6c332b3ae015365d42908ebfa0c5c51e4de836d70a525eb74f5c
SHA512d813565dee6f3c8b10795e6c986287524455d6c1e93c78a439d65fdff6b45fa12227afa16a0e6f840d56cc20f619b68bf06fdd6cb562d5c0e7604e4541e0e196
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b