Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 08:28
Static task
static1
Behavioral task
behavioral1
Sample
de0e461a3832a04de22d07eab57a78ab_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de0e461a3832a04de22d07eab57a78ab_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
de0e461a3832a04de22d07eab57a78ab_JaffaCakes118.html
-
Size
30KB
-
MD5
de0e461a3832a04de22d07eab57a78ab
-
SHA1
541c6eea0e3c3b0c84ba7b47f6784bad8782f112
-
SHA256
971df466a2d5c593af5b45de53106e42dde053f976649f001ff13abf770ed86b
-
SHA512
03e035e72020df06ac30734cd3c9d4f443b074593bae7298851e5efc27e7f68bfa0ddde34f9c4f19d908dba224bf48a0dfe17b9f2408b40a3d70bea4d7a45a67
-
SSDEEP
384:6u6ZKUo0lAt3gMKv8qibITH4yHSBHN0XWhBc78RS8xkJWKNCtuytaGoNhChs5D0N:AlN7+PztxL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000000828878a17cd51259f83af38ecd25c6186ee8e7b3a992a0fed46eb6738e3dcea000000000e80000000020000200000004764594a2526e0f5d6bd8e813829e8ad1a779ff2b5b78a4d281a1a0eb5080122200000005dd4a9202b337538dbc09a9744856d1175ab1090029e5f79b695b04dea4b4ca8400000002b87216a2b7ca4f3688c21398788257ceb5528c327e8803ea7450b8839702959fe8cfab82afab12e125801d83f13ed5d961121e22788d2ea947ee479a64bddd3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3C084281-71AA-11EF-8FDB-C28ADB222BBA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8014f752b705db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432378012" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000eb5ecbad4fedf01113f102a18c1d45fb2c6af86b5f44962a29ffbe3b03fc860e000000000e800000000200002000000048005867cd38c3c02c5894381947bc363e336894c4816f3af7f3594c68c5717990000000ed8071201e7637eb4ef9c7482094c1429585389bbcb3d4ed0d02903c297eb7a71db36867d9be59e01452c4a3a1bf9c61fdaeba139ac097927c46c6ad3374758ffc01ef96ac2c548467c6297c36fd7b806c390e4bd70038c83722381e44667a9de2507337f17d75846c9725ff786aa3c090d0f334df0a3836cfdd1a4f1bc2fee0eb350018f0bba469a42b69c13f6fef434000000073440348d0978810ef4b46de90042b6df41116f6da4d1ba5383c38ddad50ef6c1b541380686e59594ec1a477b29e58042079712ba34956dd5176029dce33b804 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2468 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2468 iexplore.exe 2468 iexplore.exe 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2064 2468 iexplore.exe 29 PID 2468 wrote to memory of 2064 2468 iexplore.exe 29 PID 2468 wrote to memory of 2064 2468 iexplore.exe 29 PID 2468 wrote to memory of 2064 2468 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\de0e461a3832a04de22d07eab57a78ab_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2468 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abb759556dd1b6e38b86552d363cc49d
SHA1e3a4d1bbfe94f7051ca5d42fb0958645af00013a
SHA256098b592eda49b10705d3adb9430b5b4aef3ef8ac34f6876c4e7c0a677754b76a
SHA5129cf296f5b58b50f0e43fead23a1ce7342e1780daeb65373963c44dac9507ecefc570f883948228cbf0508f156b7550c42ce85bac2ad0f710e9a8625b7b716df2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d266ce362abd88e6d2db8c36c853cd31
SHA18240e01344abf82fc393ec868fa4da7a1261f2df
SHA25684d325937ff92e685aa1352b8973c8493a56fe9239aedf5e39c0af25724dd327
SHA512d611686984aed2a2abb39c8e44912a7d5bdfce782d75986c2b265d1a834a181d6b15a7bd0cee62309314ea1bcc313a418d0dfd9bf318b395f3a49cef1101980a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b57a2578de485f7db9ebd1520213d60
SHA198ad663bc1d6799d0e88880b632fd9f88a3c7087
SHA25671c5008fb629bd3a6f77c42a67f038e60234ef5bf7958c6b04cee30b8c7651f0
SHA51208bf3b6b07f06a5e44285ac0bb874b4ae41941c5d22dc71d62aa98870d3c94286b2404ccfcf3e0355b1a54faaecd3668ff364b130711df019bfeb2a36d9770fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544f89904f6430b8127b3de6d2c35e51d
SHA1b7fefb96c260208ba50e138690ad9cf299c2b333
SHA25672a41c13a8ba3e4affdc8eb569769355f2852f936fc3b12c9cfc4faa121c7b26
SHA512bf553f071eb95c15147ea7be3f67a9c1c1aa5be44f345c6a40a02dc5b0db9c10caabec8d84f8b69335a2008466d775b753630378452c97d1f5787d839842fd26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548056fae66120b97f7a8c043fb873d6a
SHA159b97a5f99a42ea960b90950a242f75ac5d403b2
SHA2560e866a5c3abea4e264c97b1e46e819c1cb2a47d6041ea1d4d004e3a6dbd1cdf0
SHA5124a6c11b5da969e8a088236f2132a35d71f05858edd3e1c5e58990c44ed5b2698d03e12974fb50010ec9163ef45de2d6020ab82488847f6ea58fcf46fd59125c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc881acf6f386793d5f292618ba389fd
SHA121599b634bbcc352b920ac55bb96327d1e3f81b5
SHA256035234e63c83bdba412acf800bc58bafbe585e62d431fd55a5a61d637b29ba41
SHA51236826bd79e2172b745442281bc3f0b615efc995c52b1a0687bcb206424c01925b88f8edbdce4040b83c656bba3e58dc33254457d3d5755cb6a439c632ecb56b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582863ab5c60c4217452a7ac8f86eefa2
SHA1699de29339049e1dfdd3a602f8107e659be75386
SHA256925ff4e96266f6a6e3e6f2272bd9d0b47210e51e352dca74d79015f567d6f60b
SHA5129728fb5d19e4c8ce4f9bae15691bdfae3769aac8903137da24a27f230c0dd90df561f0f0b0a05588f580da85599e2235ced4806161f342068c0b108f4b59b151
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ef7cf3b702cdd25c63be42fc4eca5e0
SHA18e09b62227fc0a0b16bbec85d06ad5668d9fb4fb
SHA256c31d3464b07e8de76173eae5cd0a4961eb0be5e7916b1389349f90779e11fd78
SHA512c89534870c9b6461949b715a0a8f908da5a05b157ef660aeeb8dd882c5cd9d8101b7877d0cdcf5cf9050e6c43aff4792a449136aa771c7eef813d33a78ff77fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51252e90642d6a570dac129cfbd97eb58
SHA1c071def2b5dba6a8d0ee0c5ebea3c915ce41c20e
SHA256e86ab80024a524721a44236f321c4128e9844026856329c054528b1db4d04f55
SHA5121a8ab2bbcc232db50c91303364f195bf60b255951775240cf54508ecfdea7424a691697fea7392ad67ab7c593240c053de1b5df5e8b91479a66958e0e00c01c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e60fc115df7fa887d05b25a43d0ee748
SHA1e35c95478f445ffb71eae81427ee4ce6479c914f
SHA256e8f6ed26f0df9078db26d888016206d9549ca61fe5e42e4ec84e99c1257aa2aa
SHA5123e89c51f8d6186deb700ed67a8321e9fe6ca66fb83833775aa165a1250f1dcb10d425bb9ebede3f5ed6b251349c484056282dfeebeab436859f40f14c1a2b7b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53697e120e6f341453bdd1f75ea939a90
SHA1b1dad6a7c21178705313b5a2650884f48aba002c
SHA256bef52d834e60f053e1f99f200c9e54a6504aeb6c9eb4770534837a80157feab1
SHA512e357dd4ae9f7994b1e90072d798f442b9dfc204a2430ca65648eb362e19a159450ca243d08f75bc664e5c400039a655eba0c9cfa24f71bab834f57714d9e851f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fceaa455e1529d2b12c303a4bca8d13
SHA17499dce7dd4e57c2c55380abb44e02a790a5af12
SHA256dc2df7d674aeef5f170f71d36e149c53b16834913cebc2b2f70460d05f98ed2e
SHA512a5d628b7b36852a4a4d52d23dd1dcb4313429b29bd94f2c1c6697cc6329169cc388983cb902ec2b1e52829cdabd0b0f05fddd7342e70f2ad98efdaa603f047e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52738e860b9459d26eb5e4d788b624827
SHA1c59630b3acf48a0562c64060c696df5da45ea46d
SHA256fe86da1270cf85f7954bd6ffea573ed3b291f63a2ef98af7e6aafffd8d76d8dd
SHA5121819ef25edda01db7c87ca9f52fe064d8dcfde9735c6993e3d714e8a26cc5b807401d297b5473b0631abba741de5a3856f889ea9d725942a61ebe0c89e4a442f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52670ee29b78869c5e2ca9029f6135cb4
SHA1aee14cd39b0eee76c60c19f0f9c853d77d194073
SHA256c66ea1c24c8b2053d719316dfdc9c3c4ca6a846118e1a113f4b911098319de33
SHA51295fb3e3e52dd53ebca23b3fb3ebc7f16794753bde54247ed7a4e5957649560e3e53e6e84503a5913391568f7790063eec7daab0eb92fae9ab47f5999f7827376
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd85cc40743bf76bac2f152f930ed99d
SHA18b450633603c7e14c59015f04ba15a1f103cf67f
SHA256dde95860196aa950442f1f7a838b226f16763b4995daf90e11ea63c4966f09b8
SHA51224018596c5e3e26f13baf476b359f154bfa8e3e163eed8967e649cd35831118fa100751634ea7777330aacfb9aa3e651bd98b78a0cc5df70f33fa97097ca4521
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d163fe16bf3b09774de9e17a58148bb8
SHA1d70da36842ae27fab0e8c2bd4806488711ce9d72
SHA256e24af2843e15a3bcc02fdbedfa1a7b7f5950881a3ada36cdba5baaac161ea543
SHA5129b2309d5a6886aa024afb92e2f703b37d987655ec4e01410a70161e531cd9b6b29c4882c6456e0721521f4b1ed2ef5199730f6340e9840eba7cb2a3a024ebdba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5545b7d7e191bb93bfbb3b7692ab3b11b
SHA15c3f52c8528c28be0bb17f4ea58b6abd2aceaf22
SHA256ff6b254d1f3666bf53b0a83f27faaacab158bb3d82841da901a5af50f63bb18b
SHA512e06934132c53c68e3ea34570cab68936532f04466958df57c5244d2c221feff7c9147a0527971c5f1a51067eb11072294b2848be5963e39b15b164fad5d0bf6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a023f05acd5b7334141f168cc08269c
SHA136c0ec6a409fc82a881f5c4e806d1ec7719becaa
SHA25688ebe5a22027b0453b83db9326141dd755292fd414257e8fd731ef089d647ab8
SHA5121302ba182850d288fe35c6075bba50eb4fda4601ba9443fc65cd2287d932ee654048af83a736e6267e936695a1dfdfd9afeb9a0eb11ae5a204169a3b3ae66346
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b