Analysis
-
max time kernel
120s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 21:10
Static task
static1
Behavioral task
behavioral1
Sample
a42640815acb0b026472a9b1fe09506c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a42640815acb0b026472a9b1fe09506c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a42640815acb0b026472a9b1fe09506c_JaffaCakes118.html
-
Size
5KB
-
MD5
a42640815acb0b026472a9b1fe09506c
-
SHA1
bfc0944708e2e32cca405c935987e0e40354da3e
-
SHA256
c19da723ed7bd009b53cd277f2d9840bdb3ddadc4f50af85bfeb930b74e619a5
-
SHA512
c7f0a92a9f12672614ec671e9915e806ac248c2fb5748bf84434e12e45845e6a30c46099e7f8cd6a7d47078708591144ea944872a3f15faf6bde1aa8771c02fb
-
SSDEEP
96:1IPyCQ6oISUKzvehCZGaXbrI/zvXd6+ioAaKLah3xVFBcD:1Ie6XS47aXb4zea1q
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430090888" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0b753f2e9f0da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1C381521-5CDD-11EF-ABC7-72E825B5BD5B} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000fbfff900e519f11d9a5ef9f5677f389b63da7a40de8c505c8a159907abd33b95000000000e800000000200002000000014febf6377e8c2d04a6b7eb3bcb5c68e3ffa09b598f5f2027de47cb93cbca8e620000000ee15aa8435067afa52fe73cd80026e91ad46d8d8c16a5cf37f047adab06042be40000000a8fc02ca650bbdd6f610c21a8a90ea38aecbc79a5c4b1d9e3b7dd5d8b0086b69c026ceb742c1ffd814f513db9000042114ce53c669382d3aaaadb5aeacbde826 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1984 iexplore.exe 1984 iexplore.exe 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2396 1984 iexplore.exe 30 PID 1984 wrote to memory of 2396 1984 iexplore.exe 30 PID 1984 wrote to memory of 2396 1984 iexplore.exe 30 PID 1984 wrote to memory of 2396 1984 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a42640815acb0b026472a9b1fe09506c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522f407ef35b14115362783cb8e8771f6
SHA1eb862c56026a6df7014b0bf712d69d72c0f923ae
SHA2563e599027c29e01eb91861f248d8036f8ce6c3b757f1133c1b8b5a1883f082dd5
SHA5121df4ba92c151247a4a9bddc144e1ef0a7c1e6e167f1407770d8f759f48b80ccbfcc598d55eab094c4116da8fb14b589e3fd24a73d03c274a82bd2eb4b8e66c10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a16a293e8b925b00a60180e993e6cf0b
SHA1caf4c9793ea3693d4564e37ed7affed0c5a84385
SHA256ed3b614756e5bad64cedd3d45c69471052996d31d6a2a72097d2bd6f165bcce3
SHA5120a36aa928382201b8ef90c91f222396b79df83df8d30502b7d8d8cde2f88e26159bab973e4005774112ea81bcffd536eaacb24dce64bf0c1d38fed27455008bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e15e0b4107e67c808d918cbf9a71fde2
SHA1388db8ac40a81025b3ef7b24215de61248d8bfcd
SHA256d12aba6807b9cc10ff9ebf8b7ccd4a118a076ea8424b796579e6ad5da7f1e243
SHA512a9370cb0cfc7b250857f3eb508c5b9e62f5523553b26dfc60b192c068cb75a1a0d2d1ff0835b1d390b77400ea9eb6d63e2278e17e0f708216673cfca55389780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea8f80395ffd93c42913c10db6a763c4
SHA1bb137c8a379a6e3b5262ee933dba05f1651ef537
SHA2563d455773cb88bd16b15b942540c35095353484a4d7cd540ed6130c3bfd146a79
SHA5125275cb3f28c29f94900062f2234770299d6053a2a8696c2b4593a0099e9d8cb512bf53dc2cb0ad93699fb758e35c72612e787a8a0bdbcce7521113bebd607d23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58945aaf69dda9c34346a0d9cd6d21704
SHA17552b5e31ec2d8cb8b97e4140a13e13ed186f537
SHA2567ce68a310f4c496409a66f9b7a7d919fc306c536b8e0ed767c77e91b7c1a47fc
SHA51283f0f786c052536d46c66ded756c59d803f3705ec36ab9bf11edb2854240f222dc57bad8160641bf10739f82103940ec35b279a4d0fcc1f4018f0f35842856b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a73f323ee5a9c67f639c362627eadaae
SHA13dcd321dfd62a43e853c0a9cebb39438ac18389b
SHA256eba1a406a666130b020e0c61f8c284743132f156d249b2d451b66a8ee7c4f4ce
SHA512bf523aa8f12a13875c32441c476aa4f30a5f32c3e8f3c3b2d6dbfb72cb6058190c3bff1ca54071acbad0f135f2adea6d92bff81fd9c158ede5a79ee75ad02de1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfa69c4325464f20784ecf6c47634050
SHA16015e821b4cf9d1f0f302add644c6202abd3b5bf
SHA256e66a22130d1782b5de0691a396145915a2b4997529439e3b68dcd72f5b39265b
SHA512d371de853d6f7e2a783eb3368c42d9cce84698a6adda1f06d142bfb788005f1946a05ead6f3392314b5edfbcf9a39203417416b6b6f84748a29ffa7f8d1ee455
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56579dd686b093df7782d403cb4672760
SHA1c89d444458ae03bbcf2e3fdeab5ce812c01f944b
SHA25656620e89b5024ce264db4dab47d289ff0962a31e93adf609e0d54b9b70d2baaa
SHA512294fb081b49e0256f840da8942f9c61acf2338da82da3cb50cb43b9c40d05f092049de7597ea87e8948ba24d0066d4ca986c9b88617825f18d88e167eac55b25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5800d8ac78c00a87bf32b3d569f5e4d66
SHA14da4775464b949293b41e2837a680cc12eaeec19
SHA256a623f1773038dfcc302705d92d50484aa0a40d6ff5c4198fcb7bd8eb87f7b9cf
SHA51252f3133d8f6687217fa59f57e181d1df662f6cd2becd8e7136679d5743f59d388c2619bb898da9a5c590d57d22da917eefb12e3b36b78ad64c309c8da01c5a7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2e3869f02c806f2f89d71d528ea5969
SHA1320acf816de4417eba3867d9db965ae54a409cae
SHA2563aff74d37e84ecc5a42bd7e81e5b2c9eb88c01f2e7485cd38edc430d8e8027a6
SHA51255b128cd167404fcf56a4c5c44c6a28e8021118505441ff0a81b47a4393488573a52042f460e416778b73f12d0aa3dc4526c44c3e900bc75cbd486c855d82b14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ff77c19dac0426ccd92287ee1aad0d5
SHA17e197076154da2a2f49806fd8a54fc901cd17658
SHA256c23dff350fe22858331007fe407550c92070a96b5b752a7cc904681e2a37e3f3
SHA5128f55b9cfcbbf906d9d09aab8230c84e04691eea543facbaa8f71a92139a47d2a635b28401169f89796602a9d779082cdfef617c8614713a89bf440dc27bb2615
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cffdcb31bf0733ccc46d222413ffd68a
SHA1542b706e26052d564e5b948193b8f1e7f2cd6448
SHA25606f1ce1698c9dad8a6d517ce389dc7076cddbfad8050d17db8e595ac9502b326
SHA51294c1470fc9fdb2ba28e0897d5289f788840eef34d36c283b1e9757f2a3e3386f4c523984c84b234f9a5c6ec7d037de6e4cce4ef0ebc39a8039ea4aca56e63358
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b59da0993babfc817a51ad17e3260e0c
SHA17e1bda8e533ebed2381167ad5ac01b5e3a90b74f
SHA25613dfc8f7e28dcbece5ace86d003402d669236fad6b47d5a5d55bc30e1517ec2b
SHA512fe551fd42f4785c6fcf839b5d15d72051c6017883bfbca0c499c8af970f70d3e56fcb7b826572075a75ccad7818051c6f9fc9d427a57acdadaf08e52f69c4eb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b7d5ef1f857be872b836a939534fdf4
SHA10303002e86a2cd6953748e78d425a83bcb675104
SHA256b9427164ee083ebe7ceebca554844061ed37e914d3145c56923f0e7cef43c75b
SHA5121c1456965736484add7c720beb466ab885b3e7d2f8511587155a50e807ed1f67b8c47dd3d997a780dd77ae80cc23891ebf8162ddabed0f1ce3e5544d04b01055
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4871bf06006b4a0aaf91b45bf2373eb
SHA1d8435e8471964f38242aba3314560c94f8414259
SHA256cd57cd607e6d5b01a5b52e1018470b75b080e96b39e9c3157bfb84a2bab52d3f
SHA512f5957d2c612257cacb65a21a76f687eba3cc9c16bea6e28e7f193a00a71c6bb26d41cf73f7b25cf5f5eca489aa42236e0eab1d2c9af10e5e5dd06000b9baa114
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8c69bc21e2fd05939058d9bcd243dae
SHA1c0191e1ce0d6e78db0434f8643afbb6febaa6c85
SHA256c9293808e8721bec0ed97671eb723a17dbb898de4df13f42918c5402feaf1770
SHA51286a09dbc064d5961badbdcd20bf54087369a6cfe7c3b581a4ee23ca031f92aeee2de653f71992ab893905db836be6ba220a4487b982c4759a879dfa211b23d5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bf94f461a586e8692fd4ee72bb4aaa6
SHA132e70659565bd40237826a3b4a192671e2f0d425
SHA25689e5aecaf513f40a1445365246643bf96d3525be7772307a01e806fe349e9e24
SHA5129083f8aa8f8c1671ffcd4ce0f2e7d4faa5efbb5d25d8f07a2a0244463099d6e09882457e2c0dd26091bbc0f56dedc00814fed858635b54640200dbb50e0e6938
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553123f90c0f6783bed525d4fbdc6f3c2
SHA1e15b78f5b16ee800ae0ddcfbacce4fe32d3268d3
SHA25618685fae4bb0da8e0383f8b231c782544843edc45fbd2638cd4dd596faf4b115
SHA512884a847780447868a234e91c5951bc0d36ed31f7834e2d32092f17650cb1012eaaf62d22f384dd1bd67e54df975f06e7a61768fd41d99f08ea6963b069dccb16
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b