Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 04:30
Static task
static1
Behavioral task
behavioral1
Sample
c249211b1d73dc0c800b27a9967573de_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c249211b1d73dc0c800b27a9967573de_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c249211b1d73dc0c800b27a9967573de_JaffaCakes118.html
-
Size
68KB
-
MD5
c249211b1d73dc0c800b27a9967573de
-
SHA1
d5c1582510dba3abc00430b192269ef01a90e2da
-
SHA256
2af9baf4d642d94e295021a4bfc01f6a5dd8946057855d9b9ea59f8a3f167c5c
-
SHA512
7dd3d16b2d26eee9a8d34e50573fd65fd76c09afb2d897cf68ee9ef419ee4810ac88df57226c16675eab8153a57e430c3b13ecc834ccc60e981f4751031f2895
-
SSDEEP
768:Ji+gcMiR3sI2PDDnX0g6lihL+pifqoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQFf:JMaALTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d9909000000000200000000001066000000010000200000000619f74290e0ee062ab5b48b10815e5016fb4aa070f21e2b14162d4dfa02d637000000000e8000000002000020000000ba28398783ec8d91cea083c06f99a37a994aba7b766359603e6d2b59c4f2b5b320000000ad6b7e049b446c9f4b8d64205597e1e8b446c8f03d7f2091d27d9257bf6e9564400000002eafc981f6907b8f373d24f415ff953ea362e786512028d01c15e193d02c16b1d8efe55276a2e4a47a5ed61387ed78e0412a4b0c970bca90bfa17a94f0877365 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E4320C21-6363-11EF-BBC5-7ED57E6FAC85} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430808483" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c03ac1b870f7da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2348 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2348 iexplore.exe 2348 iexplore.exe 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2768 2348 iexplore.exe 30 PID 2348 wrote to memory of 2768 2348 iexplore.exe 30 PID 2348 wrote to memory of 2768 2348 iexplore.exe 30 PID 2348 wrote to memory of 2768 2348 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c249211b1d73dc0c800b27a9967573de_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2348 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5887c70d37a0b836c897ba20feb01e7c8
SHA19899bec54c83cfd5958dc877e17dd51b55211868
SHA256a42141ff8a4e8ff649fc931558b1aae3fcf9d97650cb29a07d24c5e02f6d98e6
SHA51206d1354c25c8f9b83a52097df70fbd6eafeda911db72d3309720a65653604ad54c5b7c11e1d6fc68584fd54636d9d0bb26cacd7477505250bac0ba5591f49838
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1af8c3e4430c28a4c17eeb48134ae5b
SHA18a55cefc34ff6ea752f93281c7f24588543ff8ed
SHA256e1876699496802cf9db70bd09577a572e763cc3d50f08f1284ca7fbdc1b2f3ed
SHA5122d4c9bb94f4adcb831188f285a0113722288877fb0d9a81badf5899c390dac9924289da22e89b982119cce93df372e8484eab270eefbe1784c4e6ddb0d7c5a1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdd3e160aee98a907b4bacc58d01d81b
SHA101a288fb4b6cdb5ae74c4d7ba4e59d95bc465e4c
SHA256c47e96ac4838089419b2faba2f21f1b26ee832156814a3efad8cd5747ae456c3
SHA51222ab5ae8dcad6441640c7234f225e6cc0d5504ef315c2809ffd585ca50bca02d379b94e8a2b234d04df0256ebc88ce380edc08378c38f05f9842bbb547f62055
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccf991fd30f804139a0ccec2e1d60bdb
SHA1e814bf2012a073c3bac3eb468221bc5dcbe0a6ba
SHA256ddf34e86ca1ba69169dd972b1e1f0a5f911d1a1b65894e6b9f43ea301f5d4d4a
SHA512021cf26cd466ec77443d866f0f09470518d7e2a7042b1ca93ba4ef0b1b8d726d38739cf92dfe9c0642b4bf41b542ead5ae0b10b9f2d9a7a128c29fb0b19dfa73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5232890f6e1a54cfc27347902873beb25
SHA132c7dc0ca64d3af44515aa623f148f1f9703d5f5
SHA256846d645b8c096ad52ae4b97eee55a49cab80155acef4f6c960a9cbea8ce493c6
SHA512d4cd52da6a0463ca89186f6ced49a64be47577aa9508a444165be27201389848ef574da3e05438f2ab405048a258aa19bc17382be94dfcb05b2a280fa4601d39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58eeb0e7ad766b86e856d909d6f263f50
SHA1aef61e969bdd8afb4224d8b3c4f99ccb4f8d174c
SHA2566c91f2988f8924c63873c28cba5070b34d2c8a4068eb89979d8b961fdce12357
SHA5127d6bac3ac3c579000cfd0ab1710b570dceceb1eb9fb385fa346832f8bcebe33db56e55b6c1f1b90678c4ce029e88011974ca13fd984f03769f5cab01a899dce8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c2b9a405ee7fa40794cc8e0055272f3
SHA15cf3d6ec3f3482918a8f87d94a7cc61d7103820f
SHA2560efd5291cd19401c29312a848493272654c100827fda94b16b9fe77bc39b7a02
SHA512126b2894077fdf73cc046a012cfbc7821ccea730a4e83954b392e807e7333eaf3caf42360a1aec449bd35e89a9a0965a0b21e7dbb3f26b46f5aceb3ff2799166
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c205bce7c56adeba71a734518ce0220
SHA10118a0418a037190e1aaad6a06c0b679d86477e4
SHA256bee64593b06a07c21d534244f619595a9907ef62f186cb99583ba7263c22377b
SHA51279f765f606a7289c551a4aa01aca6fb5bee76f953a40da3cccb747439aa9f525bcef1be79dc09e8f8edc67f5ae6367d38b3cd9d3efa97236061fcd35209d6096
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfee185145602a27e84ac80605b34b4f
SHA111d11c16cae0ffa8dc01a6cc4c45dc5311a1239a
SHA2560148f5723f27574ee75a426d8c10fc8bca21be57375ad3610f8d3b2c376b2971
SHA51227edb84175350772e58601a1d9c3572c96e379316ba65d03f366fbb13f7e47723625b2347d7573e93fbfa984893d8b146595002a40ad21d3872443de8d992f99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce93c046bee2fb2890b554633f99f63c
SHA1d18f0dedf5411638ae5a925a92c338b58629914e
SHA2560c558b4479bc353a702f8eda48736bb061b97ef239c3021d299d680ab01b20e5
SHA512452996676c1f22656fcffe9d5833aa1d2b0a241b40996fa1ddab9ec0886d475905edf28bfa8d962ee6e15057b841ff7fdb4f5ae6382cdb1f08acd526e51a8548
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59969964d7a325ab3161c8c85ff7c94d1
SHA1e789dcd7ed9572bc125b4fd97fb0e24078d8bf5b
SHA256f864888295c88f00e513d3555a59b4101f81ee30bdaaf50343b034db363283d4
SHA5122b11f2d39e22abce807b9a1cdcc33776c6a4b5d1ac2561795fba9934112e89e5176144ae5a6bf281c29cea6c4b2cb88880155d2e6d82b575fbb80a3493cd1cc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5478ac08c2c1e3dfcf0e5160cc60a9824
SHA16fd19a5df775dec474cedc8c0215a23abb563707
SHA25602921375069e93ecbced8e05ce0b994e3d67ebbf1a6edc38fa009c3ff239e39b
SHA512573e5490f74cb2a5ff618b946647bbbf65b8e0c9a369441478dda6d4d88a12041498de4d6ebeb150afda165d0651e86207b2a6bf222e38dd0d59ecf1445a10c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56259803ceb0002feae638c929b35e5ca
SHA1fe6bdc58db29cf9b0921c0e5e864fea69155d158
SHA256b2b4c81d6f995b753c8df0265a7cb83c11663678b471d9d7d2d8fcd82e1b81af
SHA5125d0da6825a861130c1a68ee4ad7bf8ee92b072d220f33acadc5ef072c12397e917e398945db556df1b19ed58f7823b89ca26f6f0d2a7e73ccba4dd0f9caa1909
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd144ffd74242e0d14335ead63d8bb37
SHA13fff3fa929b34fd6f426a74d36170ab585a0d038
SHA256c450de6292fa3c950d4e41c6e053e972a4d7734651896fb3a10a5d09aca67605
SHA5125791bf06ff207ef223b5ca4f9e52ab662982a686a9c985839c967717316010b1d1403e61909f9efb749b1c4201ce7dc7dd99627601c9008e3f719c875adb2e13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5673659200df56d0e57d9bdffdb10fba6
SHA115495721d80248ea73711cb1642e58f2d619c233
SHA256d3dbf9571256a07c9753058f691433ee6366e7d3bb841d2ac85d392ed90967aa
SHA5124938367cb97689b3a44c928b6f2e892b2ea62e2088377b17e124411f9e96711567007f4db65487762e32f3764351de463fd2f08466cbd7cee06cb993c927bfdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e61d5f1ae69ccccf46ace13cdf64cb2e
SHA190b97252003d157b61300719fee51fa72c875b9f
SHA256d8d3336af650803374bd4460e8106a946abeaed3938b0be823d18bc274beffd9
SHA5128bba5dbcee8731b1f2017e34ac966ebe19350b5156d97330cbe0366b1fdccbcf95dad6d539460810595357ea8e087d2b77cc7602ab7561c33a71715c06681ae0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517c27e6226578f4fdbc94a5e3c2b2269
SHA1c04ca0cccf827b19d44177195c6e40ca9980d529
SHA2568827ba27698cdc055e264892a9a94d73fedb73c5c9222c2294dcd1bbca846998
SHA5126029e294f8ffb2c3935344901e784e1a0ee70fedad18550c2bdaf5b6095d2318d97339b922a37fe26568bc49992fa71ebf49692e30866364602e5ec0297bbb1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573230b5bf41fa1129147ba60e893cd71
SHA1ea527dd0978d339a550dc4e65394731e29b8a63d
SHA256195c048c7d05dcef25aa2b006c13633222f59c1315b6e4a474e807c2c18b44a4
SHA512d980ade937252b940c7fd3ec20a4432ff98761ed13588310bb8c9b7c03ec4f700d31a4e771a923a1a50172ea4f31a55359fe1b5ccbb4659b4537c8bf7c558a11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f14d3df844c014285bfe06b42589cf2
SHA13d5c56b707fd4acc68bffa8a496331b86430ce87
SHA256f4d421d51ad20031b054d83c24c267ac280c9526b2373e96d1e08e7e5aeff05e
SHA512f6eb8a9ed95836fc0850fb2e36b7f2ad1db8c3c17c416a99068c197d7400c8cac311f696810a1c3585b90deb823f5f735f0c62c80b1a3cc6e71deb166af9db13
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b