Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 07:25
Static task
static1
Behavioral task
behavioral1
Sample
dc10d86a9d5b5e9568daead099078dab_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dc10d86a9d5b5e9568daead099078dab_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dc10d86a9d5b5e9568daead099078dab_JaffaCakes118.html
-
Size
983B
-
MD5
dc10d86a9d5b5e9568daead099078dab
-
SHA1
f52d1add2f3150d4c256b017c12f1ced4cabc3aa
-
SHA256
f57afbd0c25054517ddcb9cac83a87da491390385c68ab0555b682af590e6d3b
-
SHA512
d84606c307cb0f43c294a923b3a342310a844cac75e07f0d94f1e3a305eb1788350fc1d43484a11de1e02696b1c1d49bf1ab11db8374e2db69e7ab017d100f16
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432287769" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7037c6f3e404db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1F50DA31-70D8-11EF-93A0-E2BC28E7E786} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000004e6622437bdfc2b8006bc7ae4c334abc8a215128a61db36aedf88d044850626c000000000e8000000002000020000000a020e32355af0d9bd2642e1c90a7c260ae59c5cbd991f2ad9eff3e3dc6c5a462200000006152a28c039ea02415b36638cc8d3e9a18bba8e70a348692d823df1fad13c5a1400000004497f515570abea746517c69ccf74f31ba334395eb3e74a4adc8f1668d889eb1d808956f0611a430d9db28e959a4bb40f285f80006208753b35e8e8c14896131 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3020 iexplore.exe 3020 iexplore.exe 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2296 3020 iexplore.exe 31 PID 3020 wrote to memory of 2296 3020 iexplore.exe 31 PID 3020 wrote to memory of 2296 3020 iexplore.exe 31 PID 3020 wrote to memory of 2296 3020 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dc10d86a9d5b5e9568daead099078dab_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3020 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f10fd6b3f47f371a9903dc7b01731196
SHA124781478e34373429b9deef3f0d91d9fd56c57da
SHA2565625d8968986746e3985ab732b41ada48cfeaf5f10d97e9956ab26151052825b
SHA5129d365e3c178f51a9db3ea31ec6867a31a39f4abd984d5d8724e96680833b64d8e0dbd53791fc56905f2e4af4d824f123d8474445a622ea807b14ccfd64894403
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be35719e085f8ca1283224ae34b12961
SHA16ab02fb33d24c11487f827c054749e6541736597
SHA2561c04e1a14f4b93025506f060d1dbae40a90bc21a4a5eb5afd9bbbcb118cd3d36
SHA5123e593e77727513133af5e6e568bf3a2857fe54c6bfa46a9fdea63f4aa54bddd6871a704513883900e409cdae29e5dbdd5d036b87f4197d07fd7b56aae6568810
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5eb84618a78ceb90eb69ff5ddc7e071
SHA13007380df426be62275b8d82b49e31ee5c6be487
SHA25657eb898beb5794e848911bcf114d8e88f5b96796f315f3dfee96f319d30c46e4
SHA512522594000e1c7e54541f5a0c7219d6792a46eca38e638219815363fc82ddf753936d447b223a07e4e4aa310045b8950fa8c84f0ac70048cd868f03ea94ab44ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5901be47c033033536ddbf44141bd51e5
SHA13ed06a4350db8d6c6b3685ac250b7f69aa4adc65
SHA256b69fb7de1dea767b440107e7021d454df72c12379dcd231c997adba49b3ca3b5
SHA512a40b2ac63df9efaee3aa4aef9091644cde2773bfde788bc1fa571d1bee7a58dc474ef4556173ddd8e934b8c3d13149dad70e18e956f30aa06f4e4faa7d5f049c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5530eb7c21667dd8f51d13eb52f2ce231
SHA19ffa134cd7456554f6021972cb2f22360acf32bf
SHA256b86a20da5688aff660d5ab40eb3e25b15cd983820e0a7bd5bc0c6c220ac0a2d0
SHA512d5e22f48b35cfd6c74207f82540844b8d443b909dd9b98fc6728b2d87e5c558009e4d8a2b638ce2bc0cae997c8834be1e4343c7bdd5c40c1895b9fc6098bffc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f9961a9d075a8f282e86d3e8912c726
SHA131619dfb5fead12c5ae040bcac87e8b91e3682a1
SHA256dbec4d81f3f8117501de982a59ecd4f9caf88e82926ed529b6f47bd0f973c8c0
SHA51252a40014d83e81cdf0cffc3e81179022cd493ab749d04b36e183e77ae3644c833465bd146417cdac2118d6f5d9f745e097b10d23186e5060ea11aa0df794d99e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b33ac190b4aece0dd1b8270e1a9f91b
SHA11a07a763fc7912c8c8ab839bfeba5ecebcd8a5de
SHA2568f288d0eb938330629ada338fdcce7e7bb267cad4adcbd7a99a188474cbe357c
SHA51209974186ca35d40ae26ee9f2fb166689b81c91203918a81c613d7b345f53d264c5de45d4c1dd56875856671946f59c5863744980a4e5b95e414f8547453f0c77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558c95effb2607380ed19c2391dd85c2e
SHA163679ec431f54e8f3de6dfa2950507b7259eda00
SHA25638494c0df90a29dd5abde1a968e1f0e450989e7ab6979478ce12621768a6fced
SHA51246e8bdb055f1fec45f2b30b35b7ce0a5ff70364840b8a3a8830d190449517f98e8d4360f7f62355d81963ec242535182a1603048c93a538c7f67f7210b44be03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d5835e0b73f61e9098b6ebbcbee410f
SHA18e9ded3cfed1fc3f6669cf55dac6c8c7852f363e
SHA2569bbc000b0b261ca042171d5c90a54414169203ebe24be1405046af7573c9858f
SHA5129dec11025b284e045ceb0da4f9e5f40c064ac21b88fea86b991f8bb1860e0111c89f53403d0474136f590d0065e91a91cc097c71966a1f0e9c71dd2fb98a2ca2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a4c5dde135b96549eedeeeefee197ae
SHA1760c256db47ee454268cd58216decbf6bb73ef46
SHA256829c9c280b3e76cebf542aa14942861e4dca16d3f15ad2c1c3c04dec6ce7915f
SHA512e474b5dc887a1f44ab024835865e022534874449399188e95d6a89646cb1a21926904d96c7a13064dd2aa6656ed7f7262666f713a5d7e88f1c07e4de2e4fced6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb0833c1d003021e5cef5bf0499e9703
SHA13962b3470a7a1eadad99b84cdc86dea75f4e31d9
SHA2561fc1610d0bba4d15e4726ebd5130c058dd59fb0a7c196d5f20477bfd29038650
SHA5122be96aee3136ff4cf3189fdd8f7d1bbf926bdce8b24657585ec2518b15a299d260f1f76142a4997de11b6d946f78a94cd76dbf31334f7fe57f9f96f49f50d4fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d0e1cb7727281850cc8aa7a2d32f27a
SHA118f93eedab50d6dd6f3a94500f5f020dc2f600ef
SHA256af3b481d39cb0303597d743831922c778d8da919303cae9d2f2b549bb36cb953
SHA51214d9d9d3159baa74740e63dc1b229097baad5821b0cf70e259e89214f526eb8a6d4714b19bead9d3b46c5093c17d43be2bd854d32a013835a0daf5c87e3fe04c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5413c244e9a501375b90fb0c7acddea2d
SHA1116a3b5116e3aa2bb55ba2f51c28a84193179ea9
SHA2568776e2ef8621f84b4cc7f7b887e3e5f8464850c6bbff30cc140736244fb9a512
SHA5125573e2679cb3a180c77d3677e145e8b659c111bf5111b982ec4af56c9d4443da9d3d2087abd5dcfa1d039960431432aff8b1ebf6c3e6709c67a81b481be1629d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f0362e276d7d9f603ba4b6cb6c6b9ed
SHA101682decde6f3e3de2e3fb75b9693b22a7a2722d
SHA2564786b2ae02f971684fd7a4744effb086cf8115bdfb2e84d7ab359af470fc48b2
SHA512d0121199da7e5f45e20a8337ced949dce409415e2bc225f61a7e55977ddcfdd9ebf704344f4e03547de6acdb4c3268f54e16be09a6e0b2842a1c5fea74533f16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4c90f6f8e03423694e877ba64b07a52
SHA19d6b79b0e2bc660fc229d06bf2f02faf2f1e6be6
SHA2567daa5c6db59a77764eb62613cfeae08064a7d411e3ea3721f6f72273574006c4
SHA51269605ccc047a813a62c8fdf6b8db5ac1f6428f3c8829c5706abec3e3738e9237f826b76b166ab90846ba7b3335062c55a5498fc68ba7f5a2aca6ce447f6ca989
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f330a429a1552379567f7b5fe5637124
SHA124e22f99f0abe442bf89b3815b097d5dafb72fae
SHA256b14021d82bbbad655266d1b0982609d565f87b7f0fd8490cb7a3919a46c40a9f
SHA5125d9f73baedd0c466e9e85cce6822e6b12be8c70c11288a8668042923b1a8a3efb53b347610002b1d3023db921fa8169dc36ef48222a98690087d11db7bf20939
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7a32783d22d53aa462d111c88dd4ee5
SHA1041f11c36c176babe590df88e21596735462186c
SHA25619d0dc243ca66ad45f5d642f1ddbf7623e6088e5f4184ba401815577d4a6f1b4
SHA512d81b8ae3f4438f506a711f8502223a53bc93b83b997275e3151ba25eb954df57fc2e00fc4b4abcbc720a8622d9fe0f19ee665b7031450322a23ef8feb5cb02b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561aa9cc03577f1fceaa267688ee57f2f
SHA1ecbe27cd08a0a43f3c2221e3e6ad038d803b028c
SHA256abf42ea1bbf3bbe9a6fb26cf98388875c5a62fb6ab572f05201239fd1f452c98
SHA51289ac4c4eee0c180de8bf7223c37ab9d171d34c6d6494e66901b7ed0f94536d568d948ad34c473f9a5ee096b122aab624f87c43abb973552526435dd08d820f6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571abbd4683e6a55af3ba0187ddbe93a9
SHA176c47fb661afbbde5b659033b26c785fd53c1f1a
SHA256bc2335353ab293ad9bc49a033750ebc84f56c5deb0c888fd9af6f82ed0e34a7c
SHA512a7565f17f023c31047c3d87e0dc6db132bd99502b182afff18ccf37cfacc3ac93881cb7112bf8d8601ad49ac990740c89a5a13d105fbaa375e2c47772d350006
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b