Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 05:15
Static task
static1
Behavioral task
behavioral1
Sample
2b823a6cb460397fb138d128039ed24b_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2b823a6cb460397fb138d128039ed24b_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2b823a6cb460397fb138d128039ed24b_JaffaCakes118.html
-
Size
9KB
-
MD5
2b823a6cb460397fb138d128039ed24b
-
SHA1
045b6e1732604db20034d3d1956d2ea459c22d89
-
SHA256
b98fa9edd151381b7ae37aebdfdb95d6cca5003a26d7c5945c24a9b65a1950dd
-
SHA512
86b2c64070b431ce5b1a92c63f8b52af67a35d438f001de71ef5c8342ce536bdd2442655c5d27b312aeaffa1e0cc4bba9c5fe6c92f10cd8dead16949e0477c48
-
SSDEEP
96:uzVs+ux7BSLLY1k9o84d12ef7CSTU7GT/kPsi2pUlVHcEZ7ru7f:csz7BSAYS/CmUPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000ed879419284437e80e6b31a73bd0a5318548a46f9fe064c27ef318b83d82708d000000000e80000000020000200000006fca52f4a896b18ef7617a6cdde60f1a2c2ad0b943e1bc0e6d07f9394ac6967f200000004e1c06cb5ececd3c082b32cec1c5d5d93f5d190cbc9affdf4896e4ca4409e183400000004ab53e83ccf762e15052fd4e43b1b9a22600f3d2dfe5c5710ff4c79683182f90e6f8c81a72d98dfbfe78b767b6dd96fd7945956f3551b4ed0d2a41ba000e996d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f02bf8535f1adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434649295" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7B1B9461-8652-11EF-B856-666B6675A85F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1744 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1744 iexplore.exe 1744 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1744 wrote to memory of 3012 1744 iexplore.exe 29 PID 1744 wrote to memory of 3012 1744 iexplore.exe 29 PID 1744 wrote to memory of 3012 1744 iexplore.exe 29 PID 1744 wrote to memory of 3012 1744 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2b823a6cb460397fb138d128039ed24b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1744 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdf1a87d8ee2084fe9ea73247a992f7e
SHA1c4eaf8218f343507a678329e59e27cf1a95acaa5
SHA25664af72078afec70d2502736f92795e2132f930c84410c22919eac384053ad090
SHA5128d90876201e4ec9e2976b572f638ca8ddb4411481a42e32fdf76a258cf3099549da8fc097f67eca9d23aacc1063c07dbf99b432ab960e5869bfd2d5448c2a243
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584c115659ddfd8934fa962ad7358873b
SHA1ab17fa2d8870a6de5322cd099058628ea9d015e2
SHA25623762eb76ad5e6c1f43c20ff65df5cf22887a53cda201f7308e28654a973ad7d
SHA51277e8694c8b04c89dc427692fc35a66a31144f3060f208be2dbe4199e93f46cf408a2c2fca396d4fd1358776075e83279f89b937b3832ed4a43047cbb6d71aae5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c4263c0983fcef44c555d64c04eee18
SHA1e7077a3e2241670874b05993277d00ed98f36bd4
SHA256833ecfbbda622a715c62b3102dd1b5bcbee9e6f71cbd29dc0290a042bbdfd4f7
SHA512ae85cc030670c1f1f289b77b90a01180ef5bb8d60998306a5b9e38894d382de237a20471f47a536cb5be395422bf5dc41302626c6d9ccefe0d6f69aac86dd2eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577fe8310e72dfdb4250227725ddfee0c
SHA1db1177ad9bd694eb133f36f4d515f8d65de0071a
SHA2566ccc9fd7d25904479b409ab4510a76476b99d7668881a3be700d79b7b2072c17
SHA51206a5ed2f52f372bfc65c5964e3a04c42c2dd348460f65016151b69d33a858f5e9075ec4a52f25517fcbaf9b170932ff04200fd3b5613935ebc09b998ce838a12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d248723e44912cb11d3a94edbb787fe
SHA1df51bbbba98f75b2348327476fc969acb26ce8c4
SHA256ada6b0af4cb2aa146e31c6837459bdc14d37a85ae3ce47d9cc60bb13f292ff1d
SHA512c121fdc1821b3c96ae19e35f71b4e21bee62d3653e1b60c0b5a5556c8b34a49ab63668b52eee85e119fd2111a6a06856a288c2adbb05c334cf27345a56e6a359
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5936251ed5e5cca9f42b7772af5bf427c
SHA1fb113b53053554966de1164e1d17fd68782d5e27
SHA2561a908c1e3df5ab4fdd45db76b69e04f5181be4969cc7797de8478dccf8aaae77
SHA5125c0ab0afba29eab252021d620de9e7ac68884e1808d5f0e1680a6cdcc3407fc479c651664a728e071fbe88fae9e800c858bf2dd47db0236d9c9b9801bc770df0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8a704bc71e9fd8bd6c6c6a989303926
SHA1de5e655e51e2427d8a6faeedbada17f58bf106e3
SHA2565fd68224f4ced1674b4f772762092eb85e2eb84386800985119590dc18ca4f13
SHA512b5da7be48c00954c61135b305f6ce6dddd2cf40d9ba6e29cf93d800dfb501cca263e8130b40fa35b3bf411e1c28991eb8350b297a7ff72f8e598b1e227bf28a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5145dc32049ef7caae57e7e0b8d6c572d
SHA1dd6c3946c1846d7438e864447094136cdf76d01f
SHA2563bacce7069d5b799e55a1b446877e18761511a9ad29330c9d9506973db4188e0
SHA5126fe9c5ac3b9c9e9d1d83795321733162b4d92b1f164297f75c2317b1bd3aa011f826261745f13e40239bb3afb8769d96751cb002e098a0d5235c4598353fcbd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57086d9462ccc79c9ae14a94620b9c0ed
SHA1b4dc9b39f17036092a51dc144a8d99eb82f850a2
SHA25631982d3716d35b903cd7a51795112796c6c8ab6a197cbd7e206cfc6c2f28a9fb
SHA51266db2e659dede3549eea56c26f49e3f65fa135faf202803ec8bc5f10b89dbad2ba7cbac584c7a8c06b0f550efafc9f242dcb6448fc8cbd225c910caba2124662
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa5540be61f4e5ba3d710c6a5901a035
SHA192c4e7637c720317934eabab5f61d139e3fa35a5
SHA2566e31fae40d5d0d99654ae455cca3363eb756e75d9e46f2cf83299ac9bf4bea52
SHA512860bf2f231c096dbf6d9f05addbca3c04cad224f36d00cf549a7456ccf821e04cf06798e84271bf5b6def1e7ddd3090150cab14be7dd0e0ec4a4c581aa751306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5523ada5464a4ce5e3843ade44a81b19e
SHA1aaaedebb51061b449cf1e3541b66a021b133210c
SHA256b131bffc130084a298761e8c99ab53663f1851025aecc79feae33f7464eb134a
SHA5127e3a5785dbe621ab3727ce51b831e0465a589f20605108c6b20aef89decbf74ad5d25b47311d93082ea6106859c7eff9f1e55b9dbe347360f14b3064be1dd590
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5689db43d83c3de67c40752cd531f8b9b
SHA115c01d10da405ecb516da50884d84fa85fb9a64b
SHA256ce32c66b36b919112fb9cab54b10a5df46d3824f195beb7903cd8a10c2e9c1be
SHA512d99e266319359d201ae106924797a3ff763f57755fdf6ffc902611a4ae7d5e2dadfed5d5d92937f3ecc8b6111c5bf9892d74f2a7a16ef63bd142bc5dd70d2c1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8e24a8b439f6e0c7d6150b80c48b4b0
SHA15bf75bd5d473a474bae9cd99842b7540c451d408
SHA2569077a01e0241fb4b161690020bd5da033ed34112983bc3cfc2a45463940223e1
SHA512b13db29451e5e2aa0c84f5cc3914c2583c5bebe0aa3ae572c62385db4c5e4cad2084da0aa0fe0c131198c785b5d3e6872ff9d46088d0d96fa15df738d5347552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ce6301738927f84a469d818d530f29e
SHA1420beb23f7f827a33083a00852087f2a3e7c8166
SHA2563922eb759fb49128b40d874c80f6f73be36dba003a2d8581a90fbb852e7a64e4
SHA512f027cb4ea40a7d6a26a3f0dedfe2312a51ac05999005d3163a5364ba508e4a69d0b84aba622d7a7851a484e4ec949d713ece224cb1605645db7b914df3f03ec4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570cc1070dd10d91e16729a0adadccc36
SHA1b072248c216b79f7cd6e54cf0cb22025cf21980f
SHA256bd17b7e206bfdb1ecb8c9b2024cf2509716177e6645e517d80167490232ec4b7
SHA5122ba1981fe86863940f5c22047c3262f74ca3a48baba9f9f2ae776a1170834abb3ca92aced394f1a70fed498b5ffbfa6f2299cf94237aea35dd9d6cd5485ba721
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54643045dda43df1a980a9af8c96aeb02
SHA14321392a7e1661fab1447bc86e0c7ce79290e8fe
SHA256659b40e5247e27c5191cf2786932247de2a49cef0c0857be59f1d9b2530764dd
SHA512abded9732ecaccd9de6a7bb043211707904f60f7caf3047973189cee6dd35419a028d3c54b3e1d2be762f52fba257aeb43405c4ebb3de0c26cf91a12d65741f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548d59e17777116b3f53195112b2fd12b
SHA1db7cc899c1109767026d26ded3900f4df383eccc
SHA2561095d9bfe78783fad4a47b101a685d5838fc9834b91939c71a6bb8912d94c1a0
SHA512fab7816fc80ff53487e59767b653c0bc11de56a2e8d95cea357bbbc329fe811d93100bd38867be1dca417d4429b4b796f97f9f0f5d3dbf214e7f7502be718c0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c85f0aaf03a9d99d19a399ae9d28288f
SHA19580efc3e9171f50164712e13a3520ea1dddab32
SHA25624f21a3887a526413de0fc0001f26215761e63e3f0e36b51b2b828088619563b
SHA5127aa7fdbbaf864ae5a66372feaca67cb23971287efa477fc805ddb2325bf186a02f48145187b212484480ffcbceea72e31a48430daac6b022ca171ec7ce266adf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b