Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 10:52
Static task
static1
Behavioral task
behavioral1
Sample
be7059b2620c613753952c11d116d768_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
be7059b2620c613753952c11d116d768_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
be7059b2620c613753952c11d116d768_JaffaCakes118.html
-
Size
32KB
-
MD5
be7059b2620c613753952c11d116d768
-
SHA1
df40cbe74c181c2d4a96d93722b1babc298eb5b0
-
SHA256
096dfbb193a273f1ce1c1a40161ab8f99e1fba8e792328b33ea5a501dceec7ea
-
SHA512
552929f56ebfa8221fad7f46d3cfdf98ae55415dc3c32c12a9fd7fdcd3190294aaf48f4dfdddd7df82f0c66e02192058b075129bdb0efd2a37cd135040a04825
-
SSDEEP
768:CjR8ZKycCHuqkqlgB5BZU6O0T29bUZQZ1hdiGPp:Cd8MFlmlgBLZJ5qUZoZPp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000007611fdb559d8310e0447ecd34d87b98fdb5b1392d630cd50a062757f76986692000000000e80000000020000200000004205b85aad978ef3c19688e92e78f1aa226867d2940959326c6648c746d0c88220000000be56806a9de5e2efe0b0bc2bf126326be685701ce59fd41e14127d27b1bafb2740000000f8240014e2747e7696b70ecc12f77f13d435fe3cffd99d56a720d5403d444c8c1f5e52b5b312bfa28db151fd5640cc932df4a9896c338c08c7b2e63cecaabe74 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430658610" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0b302c913f6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F184E131-6206-11EF-9E5F-7A7F57CBBBB1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2772 2240 iexplore.exe 30 PID 2240 wrote to memory of 2772 2240 iexplore.exe 30 PID 2240 wrote to memory of 2772 2240 iexplore.exe 30 PID 2240 wrote to memory of 2772 2240 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\be7059b2620c613753952c11d116d768_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ca7db657d5f8db679d5fb7f694f3d3f
SHA166715835de65f54a164886b7b0eab9a1bb3fa258
SHA25657a1e9e80bca2c99087ab787e7c0b40b2f3ebf9649330fff4ac7889d44432097
SHA5123fbd830401a491202b9b77f6c59961575899b4078525897ba665d745ca09da18551368d9421baa8e070c7632824f8ba0e791353d26bad16f8ee2a6fbab32882c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df387c674045ae4b27d96d7816e5399b
SHA122c98e18f2f129a505d77247a135009d99c4a23b
SHA2565a716f1e0aee6d9a74220a35bd187a9dc3a87d95b60cfe5b916e6cfe3ecb3d4b
SHA5124112e0273580f03ccdd520077e05c516a1f993958e3f80d7b6c3ff59a8238ef4471c08e65fdf3ea488cbbbca504a6bd3bb86263a5dc8f6d1416399a564516847
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2f3867247e3f3034b761b0c7705b031
SHA1540c793e73296a3b551daecfe2878a0d670084f8
SHA256b727cfdab86b23690db73f82517933bc5877b718105ffaaef358a8c0b55c9ae5
SHA512ed016e9148dfb7ce1eec845bb0850d7c69ec3e8678aed1688a4a9da7c4406562f3a92c49be67eed6f2f7d919084f19d634ec4b673ef4ff442105e81abb71e79d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abed6317b98bdf5dbe1b57fd4318be26
SHA1f1468af817ea91a4801e52eb2e455cc34623155f
SHA2564731b90bc1dab1a8f035d65c9ce5e776f91d43637110b060b90703c54f97b8ec
SHA512f6f45eb55d9da4dfb3ff1aab1f4330e1a077413a9ee3d1566c0baf5c2d731d5fe2a0e75ef6840cdcb74f1a8df0d1af14eabb4cae0f1d9172e8faacf29f70a245
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e901a1af629ffb63a04b1fd7cd6b2aa
SHA175ac0b0acdc8aff9879e320ac25f9f0a15badad4
SHA2562a2dba0cb1a23a31ed35a85b2e5f03128263f63c989e1f1f696428250bdea688
SHA5128b5a1fdca0e55051756c7827527b4a2335adb24142bc098d6ac302dce6c4071daf1ab9e2fd4d47a4d5964dfc89f3ad15a6205f97335ec7051f4f7bebc3a5752b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a15fd7422745cd7973023a5f0229512
SHA13c27e8c7627c9162580400190a22a264d0c94909
SHA2565366d044887e84be7ba48b7a967b2048bf48a0ee965a0e80eca56fdcebe4ef69
SHA512e2cebbe6f1234d5e36d6a0adb4bcd8179a48c6e69e37e5444a364ef5f6c4ab6eb5ddef5cbf8f63b37242fdf232e7675fa508318fddc09ae05349cc54c2e4affd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550a4e15cd4c63d12a5577a186eb42e84
SHA1ff8156edba9a92bccb8aecc6c77defee18619dc1
SHA2564260ce025bd1907c9fa6a5ac4e6a6cd94b68661e3c23c0f4181f923b107bb161
SHA512281176f6e3a1e7dc3e32a619a529e59622318ea41550a275a70723856585cd9557fdd116a0dccce835522d3010b6158118ce9fe07dfd3d1dd343bd67045f6865
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ae6f5afaa582debf2ad365daa604ca6
SHA10912aa1400ab0e92b2cd0ba7ef83ec2665cf7611
SHA25627cbee2a9c292cb0b4a0f19e013a9ec7bd7f31a453de03feb51ad6a63fb822b6
SHA51295a176b6877ee7c1712854567f4789b53e576d2216f7c96575f74ca673442fd02143e343a12be037b250239661cfcdc40cba098f294855e31b4968bb20e7224e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb898b5dc36dab23ecbd97974bb81d20
SHA122b327c415cea8dbd8dd7d64776adfdd08401499
SHA256c19656e08fbd0e6143e7885a489feaced8f0aa8080fb5a2cda04b62c81a84d4a
SHA51283e9220033fa84a553bf4fd0164590b34f95571cc85f0fc3c855979407a378ba131d6fc97c100c8e76290036c35580d918bde2901b8f930703b5f9138ba7235d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cfd6bfe0fafa11c33b773603635f05d
SHA1462d124179bce12a96370b74f2eee33d53826ebd
SHA256968846eb317223ee2d944f5f73b7e9ef64ee8ebbfbaffb0ca2bfa6e1ab588946
SHA5125cc42f465b80402581c415738bb6a123bac6309c6213ced66178b89dbee6e7c5cb6067caa8434430c08f23f1cdf4ad3da04fc9255ace7d5b34ae2ebd5a7f702e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c06dc839357a6df0a483cfc3492fd786
SHA181704197aa456690dc122338d879debbf93db7c8
SHA2563082251462e5943f78d9a11c08f3efdde2f627acf72706232daa667e56d73082
SHA512797fbbcaac91b15b4e37efb9810b538ada57a876ab912a3825484949dc2c0e9582c66c44390ab6830e209f1726bf7e8a707f3f1e230edbb9d9a90364c8539900
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2592acd41bf867c78c1aa5b1257fb48
SHA17af3a95bfe6926ee1cf11de705acb1196d28519a
SHA256e5b81b0d6eb496b44e55b1678cdb4b2b8c8a2a4dfd93f5ecff35cd6bef977b0d
SHA512af741525d0808934fcb35954ac0b4149ebf76eb4872bb0fd9c7a4aa95c179081c4a371ec6b7fa88faf1326d92e4026d48093523ed6a0bfdb3c174a5bb29c9c38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527f435e7fbba1075f525045bea7cf39f
SHA1f769c9c9b4e17ad857dd83e3f88e372d671d86ff
SHA25649080c9330895f7ae14d28f7318ad8b8672647519e9226810e1cecfb86f06e17
SHA512cd694a0ee3250cfa8d75db739226989895ad2171864c7c3d2ac6250b87703a7312889e772af9189283685c0c9867f88049d9fca1ff9d6ff055fb481749159df8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5510f41608eaf4fc8bdb9eebfa48d6056
SHA10fe0eb20ecbf4377088ae685ad1e17bb2dad12fd
SHA25611b5dce855173e3178b313982438b99f45e9177504b62b0992af0ee1ea8cc9e4
SHA5122d0016169712624c9da67f1a24cf367cb557600d72386649ef7a48ec7320fafa620a48f45cc0a931178ae17f81ff3a1a04f001faf466f5720317e79c7a0376e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e65a9053208e4b7db7e79db40e535598
SHA18d470d55a8ac4ef163002a52769d4a4034434004
SHA25630c1d824545bc9dc4e216c0ac2c5efa4f6891e29ed91264174b95984f0829b73
SHA512058cc0917413b3b08aa2d43c8715d498073b351c0a79c896f16260339b9f293ea8f0c737a290933250802402303bb01bc28584287328aa04eacd731bc0bae04e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e07847a8586f8be1b03d4913026fcdd4
SHA1264e7e8e4518ea229227f69455de8a44dd36ff4c
SHA25651027bbddc2fa04c9aba7c73870d34ae6826b31177dc297d02fb7e0c531cfcd1
SHA5124387b51e8494d10847ebb50d4fc38ebfc9727061cf22046a5d1c1ff5ad615f583da4fea15a7c5cc2f671f38e182e528f3c212a5a821cac2a4ccbbfe1d80dda59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bea44ac9b7f6195be69c08c45ab2f413
SHA15955ee72a875c75d1aaf905aa861a0f2389020dc
SHA2561864d7f322ac551aedc9da633dd6e49619652bb71ead3fb2818e7e5ff0b321f4
SHA51251f847ec1f98021befbb870b1048b5b9a5af94e2f93123be66f1aa3b22b7b402f5ebd1f05b34ff132bfa85ad04f16f7d677f703dcd2ee1479e059297f6fc4fff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3a5def84962cb80c4651849e3c79ad3
SHA1e12175c86595872bc7d6003501df6651f96e4b96
SHA256b50ffddeff468aef2f287e4ab6c33487dfd9592ad0b80c00c54f2ba5ffb3d66e
SHA512080bc3262aa4c0029fb69b3308dd8654a4aec0c0b60fe2d55d818f650a46445d7beb5c106b42d608241142397bf865870267914e2768e52ffea192d8efa43627
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b1cafea31f509ab86a332a488d998e1
SHA1e175b25ef6349f5e1d391c4ef53a56f644ed80e7
SHA256fbd273336498c511a8ff836778d6d0e685a7934f181d42b061543f56b8a17430
SHA512a75ee29ef5e6579299a716fa6e271683dbe1a5366e971fa85d890d288b53c06527c96c931808bc403950537fa7f0466f23695868281d13d6b38cf41e04c5175f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8bce2f6743c4d6642a9a393ba48971e
SHA19f9361d313ab7f979e35173b01eafe50242ac4bb
SHA256b571aa811649e0a0bc40122e8e90d4b168184a525dcdbbf00c228f4d752cedaf
SHA512172267735a6a49b7c1653bd66b058907b1bd73709e5b454d6983e57b1882b5cb53919d8431ea9b91e9bf976792af6f6d9971b89328993609719f9bbebcf8a5e4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b