Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 08:39
Static task
static1
Behavioral task
behavioral1
Sample
de1292136c63d882645f57e0a172b801_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de1292136c63d882645f57e0a172b801_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
de1292136c63d882645f57e0a172b801_JaffaCakes118.html
-
Size
57KB
-
MD5
de1292136c63d882645f57e0a172b801
-
SHA1
613bde08376c211dd317c059113ad3798764958f
-
SHA256
407efc9a9c7b331255e68c418c24b7db9d5ba02e0db3e315892ef5bfc290397d
-
SHA512
1e082a9360596c38817886bd1b0d91f090671e242f521bfecde84ead13b9f48e029c08816b03f597544745c8638693f6c9fa899e604f3133ad6a42f17142cbb5
-
SSDEEP
1536:gQZBCCOd60IxCuYeMoCE9TTq2gTqpTa5IrmvDkMbmdOdEIRWa2PJqsKxL9/iPR5D:gk2U0IxFMoCE9TTq2gTqpTa5IrmvDkMa
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432378659" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000deec989d5167faf683ef1bd6701b27cdedb33105d31163d69cf801f9f5c7b3b3000000000e80000000020000200000008d678c506ce1789661399c1ace4aee0d6b7b13a3c191d22be41da8a22e38d6ee20000000dd8860e9a1a6bedf2b5759f48d2141a1d9dcc3d1ad48e7244eb867b7f98019394000000048facf492b9e026d53a669e5c476c51f05eabc8c1ecf00b072e451f1bbbd54b141acc6771e81bd82f10bbb81ca465857555315067de5243a842a3623e530f9b7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BE01D481-71AB-11EF-B2BA-D686196AC2C0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40783a95b805db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1192 iexplore.exe 1192 iexplore.exe 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1192 wrote to memory of 2408 1192 iexplore.exe 30 PID 1192 wrote to memory of 2408 1192 iexplore.exe 30 PID 1192 wrote to memory of 2408 1192 iexplore.exe 30 PID 1192 wrote to memory of 2408 1192 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\de1292136c63d882645f57e0a172b801_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1192 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56908120961e189c6de81ed44a6b7be0c
SHA13793ef979353188836f03621c0c7cc980ab4478e
SHA256b6210709dff484d8c73280e86b74220101b6c22ba05c40f66f879dd1410261ba
SHA5122734d6b0b5d5cad5a00b8c16356b121cf53f1ff00a443ebe3a5f2f11dd44ecb3a6c074844b05c7bc1d005245d85f61b84c605c7149b6b9d0495c10285c1d8237
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5446c9e3f93f3e2c2c1ea3ad14ac6128a
SHA1e4b21659e788b44bc8f61e4298cdb54a748fa5ea
SHA256569acf5a380e066fd533255f00715549a85ca4c2eb0d4b1b480a22ebd38af0a7
SHA512a7c92bb8e673ec76a54c53d7dae870cbb3688ea5f0b927af6fd0fe9bbf3dd7c4601f4bb916268b193ddb8b5ca1d93c38e0f71755cfe359b1bdcb465c353891b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5088281cd9d9ce68d91861b1df9bf30ad
SHA13024e54ad5fbbc9f7e9d4866f7a7dd1b1710bb8c
SHA256695e6878654b7846c41b145ac8dd5f3df60fdc3848fe2321c7e371654435c923
SHA51270f39d812d5379bb86eec2bb49a11134d234cba387d97d2b2606998b8ad1fb3438cd915b5d9c8fe22f813f547427bc41bf0b2ab6c21243132ac4b1d6434cd1c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cddcf37e95ac198d4278b21059c9fb7
SHA12f7ad358ec7b8327689530986770a4398f735421
SHA25676afca3f52ae1a8888c800742fc622fc6622552e9b8820b6038b28ca0100bdf3
SHA512f7df0fa3cac63b6ad0dabdc03f94e523cf99eae8dcee545a57c0712d2578e4621c4e90a67da3600c76cd3a8b4afd897b0a679b450a3367b3e49a085b90e49e8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5552d587534bcf575ecd46ff20b32db22
SHA1a8a59ccc3a5b20d5d0f2eba37214fba4e7778b8c
SHA2563793a6af21ea298afeb5a74a1875e7aa449f9fc2f53b658bb7742e7e3eaf0423
SHA5127a84338778af6c01da571763f0171f649a971db08a6dd256f97e6e3d01dfb91e206e5434e4e368caef6192811dae8174f9c1cdbbdb1ef0e2a3336af6934b0687
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c3e03c15082ce5637d3edf99eb3f8d4
SHA175accdbd89b9c4f6f78305117f90783039de08eb
SHA256d9530726df4aa91c3acf6349cf6f8aeebf8a9a7aecf8347edb87b99af45fab5d
SHA512a96d91228fdbc687c563be018328e6a35aa3915e2b9362cc96328bf5d1fc83916230f0f226726c299739e0d697abc73218c4b59d2aec37a09782f6ed88921c90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f45a62aec2c9fce195bedb946f19d1d6
SHA1321ff86b973153f449656b1fe87ea2d95cff6ed4
SHA256e491676110bd0d03ced07a4123074be4f76f4f4db61c7864069357fc06659aff
SHA512bbbb5e213f9d369ce82436cfc1a4f7be46fea02bfbe34d08079002d5e79f0bbd7008f1fbe0631e7727fdac124c3e9afbcff00e08ea5975c5f65bdd54ced087cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501d46012b6dd76b6cc8edf6b832e23c2
SHA15a629a09519898212a9b673badd9fcfe825b5a0b
SHA2566cafead7ae567cdbb8e7f24370de20c85f002daaa543847ee5601de645734ea6
SHA51277ea1fb85c9caa8da3dd1c4c08aca52f163ab52d6a042acad543ceae12ac051ddc763562c939a7f5a817ef789d052a6adba16024ff410f96d5c3875f4cced23a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d869b4dedbfcc43514917904b39a9950
SHA1dd656c748ffd8c0dacc43ee9621e9631faf6edb3
SHA256f7558ba7c85e3a241f008cba0587b8e6215d683231db39dc45acd73022aed2a7
SHA51230905fc725b39c2dd7594806fe4b06ea455dfbc0a6bacf9fe8f707bc79b1b554650e1dbd54716fc616b52051ca97fea3b418db7d5ddf1e7e4d790423dd8d92a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576a79df73591c8ffda80b2b009fe7690
SHA1a597630b8fa3adb66a654b7429f73760e4b907a4
SHA2565d33e14180082b8fa40644e1cd5778b9a5a72ca6f0aaed3b07fabc0a5a05b2e4
SHA5123a543173aa553ead42925ce012d8ffe4e9f7308f69a9f79251e93976c49a30f3c20b64e79d3452bb0919d2a2ce4f9619bc4d0b99cc06d90866e90abce7a1d558
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc0aee3a280477e4d0ba33be3839f95c
SHA11d78ecc76119fecf865f8806f25b43aec4479ca5
SHA25618295a7df3606553887234a1d7a75abffe63fd1fbcf39c89323e153feca03e9b
SHA512816a143d96a83dbee9a50c0641e27ef041156123c45afbb17a45d42f6c5f7609a260f7ddba1e7d09df03fe646b969dc300171b3c762fdf615c5a80785ef5d82d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9359cf4a3cf69200d7eb6c13ecb1f80
SHA159b1a0a108579d97573ec8e234601c357f26125b
SHA2568fa53a0a40d8962745a472718245a10017418f5d3d310e082ceef85c354d136a
SHA51256552704a62ddc78e9f8d60c9788137b71898c2b9b3b864fe9f4cdfb2f29400b4b179ba0c17428d4655664100594f051a433fd6220f8a64b5abd3d09cdf970c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553012b4666834a9987329187f0a7325f
SHA1fbc1ab6cf81456991c4ff2ef82662685de6b1778
SHA2562368b7051b43bb6aefcb83c7c97639236503614fc0e4e9367389050cf35b922e
SHA512feed8d56d33b2b6bb36da26cb79d2206b5519cc0499e907851708704852122f26bdc97f0e9160ae255e5ed7f6ffcb0f7d652fe172cc65930bc5b34007bdbc4c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad7c8b1b17fc4321e9b90dc2768f0455
SHA1021b6392571b7644714ab86beee1c8790ffc0d9a
SHA2568737f2e51c01dba1e14a904a0046e0a0cb9d318e93db721a20be3287f2ed3d67
SHA512b2f3d3c2c246395b592e68e0f029dc5bd11e1cd1662e75a2856f4d966c7270e2fb4cd58686d95f736484695c7ba46f56c0fa9b659902e860700ce54d0e1e49e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e9ccdd8c9517b01786b481e96e731a6
SHA12f884db7df8363885f96ef8a4b519d9ee0ab5728
SHA25664f4368af8d7e0b10690c36284ff5d3b689312058cfccbc6b58594b1825b5b80
SHA512130e37c69c52f261e4891f8fd27cd8523d713e972ef3a1d0a5cc4ddd725e0cc7b7f897715213015538055977eab0ae71aa96a9c15f9da55887dd351c24efd5c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d492417a19d794605fd7b8baa181586f
SHA192a3aefadfdc88b7c1a7e54167d7e60ad80c25c8
SHA256047420aeaa401410d51e4bad39b4f6ba45ec6766a73069604a41f66530aa7cfe
SHA512a3be60b20f712740239ee4d2c4c010565d2f3dcc6f693186b2ec44a9a3e7703e623ec90bc80d7851450a8db46f18566d95fd63c0579dc281377c740b61db51f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f33245a94541c96ad0192ca6ad2b0945
SHA14fcd833ed6def393dd969e723cef5322b74cf414
SHA256ce4dd252aeb4665ef8794d80bac587434e40438eaeb78a180b9398344a47cb1d
SHA512a3f3af0af4bb4d0c1adf121202a9a39bc12639c184d5ecb7bafb2dcb53c824cfc630b7d4426d4d21d5ebd1cf7893e2c625c28a361cbab795501e61701931456a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5676518c530e268b8500431650d35fbe0
SHA1f22ef088a7be84de280473d7d2a26d1c4e3261f0
SHA2564fb3787ee11dae19368c7ff618fa614948a9674d2e6c5d9c2991c0112a38f52f
SHA512f18bbb20c2ef73c9e00b8dff71b8678b4074a05b1682e577d21024f074d999cd180df7c9216ae6a67a9a4664cf3cba2cd938c9df05194983997b9a68562c11af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f966dbb52a7e15a1c41a37af8df657d2
SHA10815f355ff27ff61e4f391b6c5935dc99a238e37
SHA256fc1f0611622978fe7ff5663b7873a971025fb6ce921c7913f72021ab112e332e
SHA51299e3e02c486bc017b2bf29912ea99b4c67ef2593866df26ea14b74f3fe49d43aa1aa3138f8427b34e17b0f747025a487c5a46c5763f24037bda6bbf84e1043db
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b