Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 23:10
Static task
static1
Behavioral task
behavioral1
Sample
f70a8172040c41c98aed6903cf800a55_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f70a8172040c41c98aed6903cf800a55_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f70a8172040c41c98aed6903cf800a55_JaffaCakes118.html
-
Size
27KB
-
MD5
f70a8172040c41c98aed6903cf800a55
-
SHA1
115756bfc07230ce20af6defdb0b89b0ba7c5189
-
SHA256
051a7a132c1e2fc20b76e05a0fc2fbd1b2dfaf9d20b0bb90f6ba2f0a391ba91a
-
SHA512
427a70f85db700169c3f74651784a2bb843d99e19a42817e08acbbfaaf573a389978e074544733fca1e41d14662c7deb873da53bff7e50a734c2f2177fe044a0
-
SSDEEP
768:IEr/T2AEFWJ7p3BNGQNJHTvNgbzzns9c2:Zr/T2fFWJ7p3BvNgbzzns9c2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 201fa43aa00fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433467710" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{62FFE851-7B93-11EF-A1FD-CAD9DE6C860B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000009cde3e1832dd5319406c84883117bf4c85acc7d9f3275f771000038084fcd0a6000000000e800000000200002000000048c08e66822bec5801a5ddad9dac58d110b8668b28a92de1bfafa745afa1ccaa200000008404c53b2fbba633dbd93cbc1a8b73754ec1ef6d5cd434396de12da60847037240000000a46ccffe18b93c1f3800ff451cfc88b6f4bbde38f2849abf1e2a7e4d3615b723f508082037753c8b8117228eef9dee02dc9d0bfbcccef09d16e9a3599caaab0f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1740 iexplore.exe 1740 iexplore.exe 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1740 wrote to memory of 1704 1740 iexplore.exe 31 PID 1740 wrote to memory of 1704 1740 iexplore.exe 31 PID 1740 wrote to memory of 1704 1740 iexplore.exe 31 PID 1740 wrote to memory of 1704 1740 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f70a8172040c41c98aed6903cf800a55_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1740 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f5c0ba5b150578069d282f4ba11c995
SHA190b0425ab6db20697374f169d2ce22e33684cd92
SHA2560b5a4104206fac10125ff14c631c77d966a63a38aff757b5e6733be6e67f3e0a
SHA512819eee080228b59b146a0b1eab70f630a5263c5f5169140b6c6bcff7f8496e22778d75977348f31ee5aef91a807c6ac81af5b4abf776b75fb758a20cebef097d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501fd8bb26262e6defb73d7e7e2af7acc
SHA1fddedd186e5f4927fd451bc041a2387a7f4afc74
SHA256b4b0d65457b77d57d38193166c9bd3ce6b5e9ac2577dd2875c54dba3fd024728
SHA51283bf1623de1dab044586230f03f7988f9110a67880753b1c8f47a67580b813bf2b3983a398a1f1a6c66c32731820ae7a925ba47ebb2268d6acf8d08eeb8cda1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e1d4cf5e7982b0edd70ba1e5b933313
SHA167da6f618cde364a1c4ad618f826e448b59b2cbe
SHA256982ebd75d2977f3ff1847740687aba743cfcd53a2a2d6a78898d9ca1a64c8ff7
SHA512407ff120a65441822bd517e1b835b577eda182fc90570dea4ea6d8af66548b06b1d82a9407d52ae65fc62893d92078727707aeb96b53a027f75b9f74ae4539c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fdfc9adfe03ac18c1d0ece5fc2770c7
SHA164f5da7e4410d47c734f646e14a5a27b00a45677
SHA256d713fd007b9763904ee4c2395c5b187ad1cca60c48db159cd77f472ead45f5f7
SHA5125e84532bf31aaaa0b3d999ca08a075d7d2332de5dfc4f83ee3cb347f88ba8a5d12235be97d412066c146cffc653594e385180cba099e9d2e170dbece3f8262c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51742308eb4e59ad0d07e4eec17e79e77
SHA17a8036566d9847bd085ef18f138de3bc5a26ff36
SHA25697ebff59badaf21ea5381e85181602185b210349e527deafc0b4341aea6b475c
SHA51226e31c99dcb1b9ae2eeacf871d58f99e46f0f7edefd054760025b0f95db2db52c15720b57b77318362e94bffd5eea901ae0d3e55f32c2d7b59ec56de0645312f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afeba51dbd005e6638788b239d356053
SHA10c9be71a2326c537f5cbb1962030522574bc6454
SHA25691329861d8d8b7db95a4e075cdd60d8e4d035a35bbd816a9bfc6a03615959d36
SHA51251a0265e57703670a6698ce6cecf0275d7ecd3d95bef52d3e413733e75daa87ad0f40d3dda8a67750173686316c0b5c1210c9ffe7b8c1f7474ec261bb4f802ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557df7b42b6c5edd7d9c19c6832041483
SHA195b00446728a16a0659b8174edf617a16e357d6d
SHA25619f633dd536a4880c8e39d78c988a2abf620d434e82856f7969c314dc12244cb
SHA5127c7102edf2a6263bb670f01d101b453829bbbd4a5db36adbcfcc9c73dfa99437b9cae3532dadafeefe3233e2a266ad3d26f010cb8a233bbfa362800686ba1b1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52efb68e91b2337d2a503f15287ed70aa
SHA1cc7d48b05ba017f934430704d6297ec9116be748
SHA25603832ba4520875bce7bd3585ce0114a07b739ab231cca02acf7e8c3c575b2b8f
SHA5129aee19ea79b0f1202805a0460f8acb99e7926338f3dbdfa81668d6af4938cfd028a08c5a54a4f68f3838f775cb4d47f71999a5f8f698b16d16ce99b280d908ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5346ba11d65d644f472aa2d340d663575
SHA1cf316333f84c2a524e19715f2ef97e4cbddb3555
SHA2568f345e60353f1a4316231f5a3a90c0778ef7285f6c00833398413b01de3402d5
SHA512db153583ef235cb4e20748952fadff8da610467d26a1ca121aaf022ea293a580e43a910fe9a0942f0fef140dc363222de28c10ddd9611703fee5b17b6854a206
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e56d0cb98c35301cd596ed9364f13aba
SHA15db2a5e3fbc2f0c0b32b07ba8ed57f0ab7923876
SHA25686e05bb48692969eec098d1f8160b0f19f8b5999faa311ea3daf243948d18725
SHA512b20530b3448b7855268c67ff7b9f54e84425120ebd1a4c4022f5e2db245d5330ed21808d491ce28e8153f5637674ec2571fcc6f9e6bce96fd036067a99d929b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506567e445a60d57a39ebe10430bf4b11
SHA1e3040ec871ebf7e92617271e3eb88a1984dc33ca
SHA256ceaab3969286944511fcc709c1495f7b5200673b754b384c058ab213459d40e6
SHA512e2a4b60aa814690ea3c0218697c698380fa3214ed9875762ce54c99c38516d9084f972e1e3a3595bef1424e0e79eb34de8c0ae85d0d951530c7d61432faed6ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577a55c1ab38ef68daf62d53daf56e152
SHA19ca9c714a9f414b70f60b3245429a1fecebbbb2e
SHA256012aacb27ee272916458de8ed7a4d891760d3d32039347374d01651f9f332fcb
SHA512d690224df264b7251086fe07717fa425a9de8eebc552d5edc520906517c1decf745641bbc2d7f07a79f20899c370bc11b90c082087821d706bfcfd51b176545a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a71dc9a817f71c5f3e71c8338206f525
SHA1e3c88a8b28cdd640a704cb73115033faeaa897a9
SHA2563a3b2546550f7a0eb92b28bb29305f2a03b281e4a8684165e62da03d1a921cdd
SHA5122defb89318a6bd7e16e8487f99492b448000b2a86530ad3fa38f7526327f0720f3a55b0d5e097250109e74888e25c90d5d2d22d33a707e49a2a681579ca2ecba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50109d731aaed3e5344a95637a5bef889
SHA11ea2b09f56ae74d1e45052455854ab2ed9a3037f
SHA256ddf0f831177acec3d75232e8d67c7b8063af637ae214b3ee3fd7750e06b50100
SHA512e38a21a250718a41ed87669ae60a402a4ac89d3470307a7d6ec75d6fd4396d2ea6357d703381a08adcc012c5e9b5153226bbf95ff450630d74a2a581f895a9a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0599f14fc2ba723ef9dc72d191fd3df
SHA1b0e4bdda65f1219e09bdb0ffeab45b04bd06c11d
SHA256654fa104e2232b6fc2e81855c2f651c7088a812d250f7eb362ab3aaa9c7e1c1c
SHA512cd56db271c5e1f5ca77f0e03e170a85952ae96cd7997cf979221ca577388f6f63d978ad23fdae0a3530515ef0ba6013941472d01f2b6ba15ac095c44af98fa6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a220f02a5d3bf3f4bd034a27aeb0ff42
SHA1463eb3be39d2344cb8857a21cb8646bff9f54e79
SHA2560bce2f979de88feea9ee2b3a284dfea71e5a01b1caf27e1202411715f8a5a75e
SHA5127b84f190fd24349bd8d15ef899d1eb76ab548f4f345a0e4edeca4765d5f1027166a0c8d18aa1261f01d0c306cb29982112b92b1bef1e8340a341eaa03582a43f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574fbaa8d1c74d65c365c9063ded08fa4
SHA1ed946e36c69ae380613cde5b9ccf8e9fb2dab919
SHA2564447755d9ad49a4ecca8d86a66a29600e143ddd03269c048cab44ed97ddb8586
SHA5126402a57908937d66d7dd1329ba6768936916593891fa020170d8aa7846dbfe947e421b8def8e048b7951e6c20a8cc44ff33fdee57dff0d1a37100ee00c416c93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560a6ec43951a07faebb02bdc32fe6687
SHA1f9e362a5635c6b9df44e98220bcea63f4fac11f1
SHA256931edcc38520bbc571997ba665dfcc917a5bc467b138eb5bdc328fd140ac7e0e
SHA512c7152349db2bbd32986263e98f4f5bbfe087bd8c7040e4a0912f7346888c3958371289662dc40926c87a42ac652689e47e88b942ecdf5b56c60fef9185bcc519
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b10f7aed9c1c306ab611e571d3233428
SHA19ef386a900d8e07491db561ffa9988892debf896
SHA256ce45f829a101cbe534e239e3333747ee2d0263ef13375238f985a36a1ee08a20
SHA5122afd99bcf83e053850646f4f752ff9e166b2570c99adb61fc33557df9bf39fee2adb5789123a196b209c5eb85bdfc70834d95958c6b22e8a08c4d9d0b182b06e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\40WV1DY9\show[1].js
Filesize686B
MD566356b4b9464e02a05c7f92c682cce02
SHA1fe2db8c863bdb4b14b4561063d390f84ab780245
SHA256cb651d49727b72f43b47bd846a04861548f42f2e8ad59c7535c5e1ba326d3d6c
SHA512cfce631a94bcc0559ce391a4ea66b04b0452b16db149d4738ee5e35f2a668b77744846d043b29a5b0ffe47a610699537c70f4cfcb5b7fbbf2dc2148adfad24e5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b