Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 11:00
Static task
static1
Behavioral task
behavioral1
Sample
b76164286e76edcc94d1857cdff3c964_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b76164286e76edcc94d1857cdff3c964_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b76164286e76edcc94d1857cdff3c964_JaffaCakes118.html
-
Size
53KB
-
MD5
b76164286e76edcc94d1857cdff3c964
-
SHA1
72afcb8796f5474d8edc14d397016260a252a6c3
-
SHA256
15e91d44b33b01f7946c989876f4748b54c559a051caf2ba38d195050bf0d51e
-
SHA512
e2747e608e2eac487737bca54f46e6621e5cc645592c245770861fc786ada8876e27c924bdcce2f32352f27b653f3271b9f8dabd0a08bea89257a833d273ac69
-
SSDEEP
1536:CkgUiIakTqGivi+PyUCrunlYD63Nj+q5Vy0R0w2AzTICbbgo4/t9M/dNwIUTDmDj:CkgUiIakTqGivi+PyUCrunlYD63Nj+qN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BDC26301-6075-11EF-8A22-66D8C57E4E43} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f0000000002000000000010660000000100002000000030a9f2f0d59b7ebcb20f5cce98146e81887defe297c4cec23484e085eec363f9000000000e80000000020000200000000f9a2c8c12b7afd4f0c006e9969036a5a386f1c328b71a59c767f567439ba9b320000000858d58567d1910fa8ac5349314437601324f902e3ee1ff05f5ba3434b196c0eb4000000032f75bf64320a148a5c07705508b575dad972b7f66dc549602acf5f16b023856ec758163e679236517d37cfc4573fa330d839b6e74fba60c5f4776c462911561 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 800eb09582f4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000fa230dbd036cf172b0c9b518909d16bf2e3abc43913d40c53ca334ee41010a6b000000000e800000000200002000000036c31c6cadb8441cc9b4a553a4f6c18dea97e5c84268e22e881f81ccda8cbb8a90000000bae8854ed1153dc2799193a529d355365bb5da5f23114851da26417bf0a2066c7f8eacb4799b8766a002f658d0fe8a9766c131d04c38678febf4390d9e67589138b152f659aa6202c346b53f132b23d7b7a8097e88d4b8ed27c6f301413f6f66bd615119645a14e203848a1215bb4fcad984431412ee87eeb5dc88dd1489ad8600912ab0bc97c8e1c350de454a973ed540000000387093771ae5be3688940f8e09f58f7c9c328cebde1c0a1180e6a511e47c3caa49326ab469dc22529e5f96997bf5b4740a5949f7d16d6ffe4175656f5e5d5197 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430486296" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2408 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2408 iexplore.exe 2408 iexplore.exe 1268 IEXPLORE.EXE 1268 IEXPLORE.EXE 1268 IEXPLORE.EXE 1268 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2408 wrote to memory of 1268 2408 iexplore.exe 30 PID 2408 wrote to memory of 1268 2408 iexplore.exe 30 PID 2408 wrote to memory of 1268 2408 iexplore.exe 30 PID 2408 wrote to memory of 1268 2408 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b76164286e76edcc94d1857cdff3c964_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2408 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5304f843ef0829938ebd7fb46c678b1fa
SHA1c5de5890a34f0d700780c433784fab16b743c787
SHA25667512173713dab3abeab90534784163c8d5df11ba73ad358cf6287edb871f7d9
SHA512859aa8044bc22fbf9d16592b14cc748a5ecf497e7196857b0015ecc678bf777962432a876e170b428285095c906a8353dedb4226b934e38bffb129a66992cfc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c8d1bff0f1b3a08701ab2d8143e36d4
SHA19e7115c185abf25e9ef62bc7493ffd2907c0e61a
SHA2562f17f5802ad2572ead7e7ff7f335436b15f0fc94c6f5947a61a6deaf6be93fa9
SHA512f0273a0b40e6a73c032d14ad6b8ec8c2a7606d89232b10e88389e616e812c0d1276bd73b82a926e87d39fd987ada76463552ad40295b7555b145996bf191273e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4e002efe6dacc569b2bbec68f3b2c09
SHA134daa3a7f951ad76b9607f21a2fdb83eb951e302
SHA2565bbf15183e6f5bc6179bbfc094f66ea159a949c214897e6ea99f2930795212df
SHA5120684516b689eab276afbaecf7deca9a742bd1a98b6c10aac43616a72b3f874c739ac1439402b1317028ed948988476f69780289477eb56f3f6b6a8302ae0b700
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504efdd573e200871067d3c61ee24e8bb
SHA1204bfe761a12902527fbdf6ab1da522abb0fe95e
SHA256e26405297c2c66a0772713d41192325185fa21d54263c329d7db6f896d27cde9
SHA512353c8d9836a61bc424c6e2086330477ee19277fd6fdbc865f7dd4ea48b13c6c8d7819a6df0e8a6d78d86458bea8bcd18824a627552793b587d46685e2873ff97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5822f0ee49654578db9a63e13ab936fac
SHA106a6adf327b484a807a76aea350ceb7e0e9067ea
SHA256f710c22b6f0327bd6332a5dd795616f88834a299f9ed9770260175edeeed945d
SHA5124733185e769cc4973fcd1063dcb4bcb0cc96fe46c65c8ef6a3a1c68dccb8f5f21f32616fd906732828911a678c00cf01d35cffde8b92d671bb403c403ba523e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d466642d8a121e310f225bcdcb3ce7e
SHA18ed98ef7727ab628c1de66efd81ee97e3ed01b77
SHA25690984649a84bb046368d290608aee8c68cf4190fd3649aedab0768ff835a2a89
SHA5121adf5cd64006afe8648e8e865e7c615c87d8fae2206613bb91744348f3ca4a53151064e750b1028e5ae67c851f6255248fec5692f0397234338aadbcc43bc826
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a58850687035a2dc8478299d0b538d02
SHA10a3e8a9b4d73cc49ab572fd6c334d61cd3cbf40c
SHA25665d7ff9116a745defd22fe43d7ac85d95002950066bd10f5d75886ba2049efce
SHA512e5639c92d553f3a2e58abb68e581834dd45abcc102c48b246d75ee2b2c70116ab7c2b79b2869af777dbd64c668047d4183f019cbb93ed4c321ab374b8c73dfb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55024e00694e5365e488b0d369de7cc88
SHA1e9112b71fd3ed6f08893b6028d691a3269e82ce3
SHA256f62681bbf7110dd53c2c6f5a1bded439b140e1390c1873a96db7082deec41f66
SHA512e861f6a78de43c8ca1fd909e2dc975cfafb65d8148726f22b54e00df16eca40cd4abcb6c67a7e28359a9aa058e89bb4c4ec5a92fb892e3e910fa296d85553da4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c47a2c62660d701569a495dba3cc2ced
SHA1d9a125102769f6205e68f621009087d8680dab4d
SHA256cef527efb7d4c1cee2f2a82abc303c7d96a1367cb3c989545cf542412b982c65
SHA5128050c2cb80e87176d05131fda0a6f0d5e4aa16bbea5f57f76d755db7d94903322e8d6cdeaa51794dd6853fd7388108819124badba468fc7d0062e3774a51be79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e08788d9b270d3a7287568b87808cd4
SHA14cf71650debe75c60f558d3de478db68404795cb
SHA25690d21439ac854cd04797e29e01e3bc557308ffe72e630248ef7e7e27c750e8ec
SHA5126c5cbdb981468c4f80200b90837c4d3fe45490d43039c83b650be5d9d206fae7d0162e657b3ea08e1a126f22e717500fa2453913f8f04c93597b58633095cf44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d7a888ae2a252e2e6735d63a1ad5ce5
SHA1b787bab1b61867b37a4febdf4a9d17904eb6ed52
SHA256e29f350553f5b00206975670ef1a8cec61f3793cfb1fd3128a2f2a78c9455c20
SHA5126341cacb2c0d2296be9ca076a293b55d599b491b26f30fc1d6592fa3913efa4205ad793c356dccaecf714e0eb83ba45a5e6c2fc02a36ab2053cf8ea1b74e90c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5168575586d5ab9a1ea19cb78aa8449cd
SHA1aa6a2119a246cae3e79ec67d2dd40b421fb955d5
SHA2561f94a6f205ba5b5be9bf9a469b3f92993cd474bcc33d5496875821c8b3305635
SHA512e11501ccf8ac78ac0437a8e938b9114fec65ccd5a68f03464eb0000d1ab4500176d911d579ea205c161906f83e50327ca00c67a76cf9f119b88534808e4994b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c5e0dfd031fba657bbb771b1cec86d2
SHA186962deb6cabf1ff54417c3ded98743553ac0c58
SHA256908f35bfbc1cf10241e3cddc0b1d79caa273c18e98558fe2251e0add7acb1810
SHA51277fb9ee41884b851586c857d414598917daebd2fa5c95fecc0e888441ed9ab8f2ef550870e280e2ff22990e18d38eaca68d7ec664ec876a7164bd0b74fe27dfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0fef94ecee5afce1c545058c1a668a7
SHA1d3bed27e53c3eeabf4ce2b0a5e763ee5b715dc30
SHA2560c40ebba4f6efd45048fb59b33fb089f07e5de4b6f4fb5193d128803ed745092
SHA512dde8c870b3eed5b77085f713357658129f6556a92496096b2e764c7228818a5eabd92d1597bf2fae9aaca05b1ffb5d56ab11bb0634e15a78bd052e23db39c3e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0d1943a8f6c8b81e708287c231f0a02
SHA1835ddd80d0d4874441c54cf6bf56307875dbd152
SHA2568dc8debdd13a20aabc1f40821e54528fda82a190e7b1df5035785cca4e101f4c
SHA512f10583a9ec96dac564cb8fa32845befb1bff48c60e4f0e2f038ea6c6981989400e33ceb5e8d8289f23d37ebfc4dd127bc3a0f56545e1f815f9743b2fd0514ca0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d5dd7c41ad47675a3996759b598c4c0
SHA16b9fcb49ef0829cfe92a2e290f9a56e28886163c
SHA256d0301f95549f847dbfd2ec87b340f23c39352141cc684027d8d708b08a8cc0d6
SHA5126e7fd0f347aa8ad2798ebf58673e22e8944bba96b57616d864ac5c7d3c032a74034cb795ed4f2f304fc44a51f835ecc5c6a340176831f450ca6542cc28d0ef12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7ae17342a654d57aab23e104db5f716
SHA1b7d0de4bd53493a4b74f5d9b973eab738db6ccf8
SHA25699b5aa8815415bade28d5aceabcc8574a0ffd58d852ae48ba5cf03988d4f2fc1
SHA5120bb2596d6f6d956ef34b1cacc0a1643feedaae105eb0796267a46f4cdb8633482a1835f8a85f6297fc77d4e7f601c71988cc58b8973ef77d8424aaa6d8973b8e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M7GT0RRO\sha1[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b