Analysis
-
max time kernel
70s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 18:49
Static task
static1
Behavioral task
behavioral1
Sample
deb0e126b9dbe121cdd55a1949ccbc80_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
deb0e126b9dbe121cdd55a1949ccbc80_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
deb0e126b9dbe121cdd55a1949ccbc80_JaffaCakes118.html
-
Size
2KB
-
MD5
deb0e126b9dbe121cdd55a1949ccbc80
-
SHA1
502fed40e02fe35534d2cbc8302fb12b62f29a6c
-
SHA256
a6e74fefe585f17194d0fa0d1b04af0ead1cedae4b188594c3192a87660d6cbf
-
SHA512
e617f1f2929c3e289f784b0aeacdf0ef5c67288e888aa4a412e7e710eb44b37165b913f0eb5f2065a07cfc0f8d70d9eb095233fb9adb6f322817addd83e34739
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000009bd85a592e4e9bbea487e5d6b13beb74028d9f336a6e0452e18f1855ab07d5c2000000000e8000000002000020000000eafbbc84b270b810ec074765939bc637c1cc51e392569873d28c6aa6e0b29b83200000003de8ceada7efc26bc200ec67b74babbfcfe36c04726c5c32faefa7517113941b40000000de686df892bf127d96b03b81dae8f38caa6f033666347ff5127cb551ad180ec4a5b56ddb2526269968612775818813ca661c414b3e440a884b1ac94c4c3711aa iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 200801cd0d06db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F7684921-7200-11EF-B0DA-FA59FB4FA467} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432415265" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2440 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2440 iexplore.exe 2440 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2748 2440 iexplore.exe 29 PID 2440 wrote to memory of 2748 2440 iexplore.exe 29 PID 2440 wrote to memory of 2748 2440 iexplore.exe 29 PID 2440 wrote to memory of 2748 2440 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\deb0e126b9dbe121cdd55a1949ccbc80_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2440 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534c83ee775665b0b759d5c60a0f264ef
SHA11c687f94b84090c02272e4e37592e25ac1b17b8c
SHA25604add218c958fa8b7c4751a736513a19aea07b9c20bdc34ed68b841c0e4e283c
SHA512758eaa53e444993d5ced642d2863ee6b8ffb3652f6a16cb23902371fabb6ab21162e4b20cf8909e9c5c1c6203204f303c5c7383e5fb7a96dc86e3f5913804cd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517bbe5f2f6bdecd1efe1b2870d8dc776
SHA1eba2717eb9dd4c8461bffa58a70155b4c5232e4a
SHA2561f27683cb6d5a5568bdb4fc2fe57da02fdd3a561af5200220eea221e712be1ff
SHA512c4f38451f4101f848da5d359f1d47dc31a7455aa6e38a89031f3be8fea692f434da79159ae16724b48d2780fdc5d27a3d934ee72c53664362729810008d84b5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5266d251570182629a5135e20eab2c6c3
SHA199fc4443275dff22d3c252473764316df28ad5a0
SHA2563bff0e44a4e4c304aa4617cc62dcd61b881e3f4d0ef65ccb8ae4f776a959629c
SHA5128c29f38d7eb7b4d0552de3d5158d5ffe10445762e9fa815645e800e79d6eacc5ff3aed60796c1b0a523bccf0f6a849a5a53c18212be5e1f4be1f26c62e154864
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d68bb82945f0c465ed6ac762251d8da7
SHA16311b91cad9bb0adbf14585bea9d4f3bcc09dbfc
SHA256d89ad6cfe3bdf924c55a754eef1c00671ec5a147dbf0d168ad52f516caa895be
SHA5124ae9c3b880db9080b06e5be353ec3a121758e2b4a3f5a8d781472819ce12727c4644cf8657879f92529e3b0b788f980320fe471fc1d67517eb40cfb393bac50f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a88ae2e4a2fd64c4062b5178f966e128
SHA11010198d9d517e9ab2ab3461bc1543132fe08c49
SHA256d867804b853fc76ee5a1c06b4094fe78bb42e6b374e90cba2a09786538aecf2d
SHA512496cd8ea400341b2fa8ba95939033578e9a17669fb225594cf4bfa0d22762df999dbc480f76052993445d057371f0388d5c3c2621f7556a6043519bc140353e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534114a9f9bd39016711e26afa050813f
SHA157d98582288853b63219c6f0e248a1547a3bd47f
SHA256300c070585015e7c79a060335a9f4013e78dae36dbe56a656603715dd69eabb6
SHA51234c02b2653e0ab71abe7588734ac84c10cc3a628f49071e1467a9df618e5864862c8e7b4124be943e222d94d5c87a5cfbfb9ee31a9b95ccffdd4c43d9670ac1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6223867d2b0330a8939221f28797f0e
SHA1669052fdfb6724070b3e8092a8813d1df128e14c
SHA25625f4808804476032ed300a815ed2dbd2c91a955dc0004a975461203ba54a32d6
SHA5122f715ffe2307d6fe947413673ad2df8134de84d184c8f869287d1c16fb9763ff7dc4186c61e0b11df600c0f80da27c27d15c3ac793a60120ba7445e6a5c2c9b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526ecbccf6aad14a0758b4ee9b45feab7
SHA18192c65e927e0c87f13c61c62491c91f7bdfc68a
SHA256f16423b760491976895e48605a37866407c89aa6e0131e1b0505a3f9a3ff5876
SHA5129648fce5f87b7bd240a7f4383a5ae5959c70aa54d8851f706853664d6eab45a77fbc5612269bcd6a82c80e7b8dc718b0864634829375fb2ab17f21b0b7191b0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52601a3dcb6674d7897d0219b4c0f3746
SHA16c852b6d8ffccee1c6953584ef37a5139d9ebe06
SHA2564423ac9d42376b192abc12e9ef8fd8813c1e9a75d2a82145405c7e5a9f316339
SHA512874326f93280d975f0f4a8cb68a6cb216500bcc723381caa11d81e0798dc67f583397cddf28d9d27819dba2c6cf1d6deb68c3723040036d8fb62b63bb0cf6355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5324c20ac06204064bdbb5d2f5c26b3
SHA178f505e8b0118c5e533a51d2d3f1bc1d60ff658c
SHA2564e5ded13a32ec388bdb8770e3e3f93db5c8c5738441f00e2b9246fbdcb821cc7
SHA51216f7e1b5371de598e00e243ca50f69f611200a5932b7d97a1dbf7230db07ebf25828b331ffdad97ec97e54094623855bbeacef498f1123b06ce1d14125eab7e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd4e2050cfd51f0857a585ede2dba2d4
SHA16b7491e0d20c87e7ec228c3facd95680a2e95b56
SHA256d9de4d843c8113876285172941a63168fde29d3f33ea137d7f8d679e37a91f1d
SHA512fb5e340b1844c45f5421ea25f2bbb0a9119b4891762f495d62eb65f436e447eb5d2f9b875420b3fb58ba7859806057d3e1eaf918a9f4ea59fb5f9c5b7fc970a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bab84e123435489b79cc6d79b15e317
SHA1ffb24825eb80521c0069234a2473aa65251f7846
SHA256e2bb740e1f87fd22980f4b4de56661e97b7a13daafa5c3f36fe6fc5d69db6b41
SHA512540594c7fd76e64f067bef284289e58db065fa1db9046134a75cba6589d807df1773f7076e7b4bba144198bfed31beb70f14acd32fb6503b3ef9615f9654e604
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbbbef377b434ea891d16cce7c5ab20b
SHA1d634f04772cdc6c1859ebf5c9c44f528a62536ce
SHA2564385d9c4525b2e2803b01382ce1eb8c3d9aff6c16949a4d71cf079ddf5107658
SHA512d2c4feaa99ce6b141bbfe82e1c483bdbcb2575b4a5c7634096929725a48b03fa19c7b0e2abae98e544e3228635f57abf8e98395eaf2a8fd5dd949d12e753fb2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fa2d39dcaedce09ac76ea6bb9481e0d
SHA15b48a9886c789285d5b0ebd0bdfdf921556dfeb9
SHA256c7ae18420d593ce94f83d49e053f3d87795be6733b4f4a1ad1f0788a38ff5655
SHA512c8c56fedbc7996f85165bbae0ac860d37f8bfa3e9c2a57aee76608f3887a281186b10ae2e29c709830e52c990b75f00dd6b1c8f7a1cf044e5b33c940b21f2732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ba7b39815f9b2ad5cb103099139602a
SHA137afc101df661c96fab2768bab4e2368227fbd10
SHA256058b76b775e10eb6a0ed7c75832cfcd01f29b9c644deffed2a228e23a5bb370b
SHA512c858e1c18db2f140549e06ba691bbca5dd464c386764b4ab5938d7b4e626b81444dde194ec1e49e10131cdb5f71744e2d5ea38f29b3a3034535ae11b9fc7847b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a05463796d2cc89ded399dac6536f1f6
SHA1d121ed31f4ef2868246f407c0740489ff0f178d6
SHA256e05a88d1a0dff2d8ef4a52e3020560cfa22368b19058efc3ab237b65e96661ba
SHA5121ae5300abd31795642d493f74c08be7fdde13e3f6a57f8d983681ac248c5f745ff7f7a62573fd9087cbf45e874cabb43083ae1a82c4c84044bd07a38b26930d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f6212f5426b5d052ca3fe63fe51d99c
SHA121887e2025e3dff4b6086ae3965fad6232ac092c
SHA256e4a012d93a6029fe0af4dbf736cb5a158a2fef2a0e8cdf0c6c918af1ca45ad86
SHA51217731d6e18fdd2dc05c4f319dd841409672bd47e6fc03a4e64305e90c36dbf36bd1de0164a8ca9b61c7052727dd56a93fdabc718973b3a8c907fd04fbafb8d21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c61e630350acd5cbb35859cf1d045f5
SHA1b471870a8f4fe140945dff997fa4fdeb388eae3e
SHA256d2be8676198c5c4c88b4f29a1e19edfa601d75bccebf7ace598c794634b5f408
SHA5124fafe52a8eb87c63f98b917a0d606514fdaf1b49e3fe9feb56dc0d8e937a117a0dee33749fbe52c2d1acdda686eea570e4d69e9f8a6b7721aa6be8766b24d671
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c6d9dafa3e8a772064e3bb28e2015cb
SHA14de4515554ea183fafff5a3cbf66f9d5998d79b9
SHA2569da2115e97aa3fc241c90d499471c43aca31b8ea9a7519dcbaab861051c203f4
SHA5126d725ddec0bba7d5f20a780b1d00c39c9248ecf8706c1dbdb244e7179d79aefef01962f72de0bb190830485d21bda2c6e1ecb6180f62f7448046a50ce36cd795
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b