Analysis
-
max time kernel
139s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 02:31
Static task
static1
Behavioral task
behavioral1
Sample
df542981ad8fcf4dbe027aba699ae33e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df542981ad8fcf4dbe027aba699ae33e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
df542981ad8fcf4dbe027aba699ae33e_JaffaCakes118.html
-
Size
19KB
-
MD5
df542981ad8fcf4dbe027aba699ae33e
-
SHA1
145b482ccf24111d12dbf944270dcb6b1e93fd93
-
SHA256
9235df3f0740cdceee2778165ad9d7c11bd3c78c88ca75b3cb6459f4043d8040
-
SHA512
adcc8a7a18dfd6345a323906b55c11076301e036ef355cad1734afab0b9267bf77bf2b3277773ba6448314085963d221718de6afc98cf06306cbaea19bbe8585
-
SSDEEP
384:4+QfPFd9QZBC7mOdMI0tKfpC5IgSnbmFe7Acd46YxLAPd:Zcd9QZBC7mOdMIlpC5I9nC4fPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432442955" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000555cf4296902fca6d2cb6626b63c3cddd9d3473200f3ef7020a95b71de2b79f1000000000e8000000002000020000000fe63a3dd7c85f62215e53b500f52201e6c532bc1007fd93c7399f7b28b4220b020000000209a15251adadfa4998d58087825ddf0e6e98b612cc744b3cb8a38504678f2bd40000000d5e78667119dce29bd429d16de4152abc7c6ebe8ee1cec6c551ebeef00357edeb0f177fd5538fd34be9a31567080818f600daae7aaf49a32b53b6d8ed1eecbcf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{720E4FE1-7241-11EF-A02E-FA59FB4FA467} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 308516494e06db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2512 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2512 iexplore.exe 2512 iexplore.exe 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2992 2512 iexplore.exe 30 PID 2512 wrote to memory of 2992 2512 iexplore.exe 30 PID 2512 wrote to memory of 2992 2512 iexplore.exe 30 PID 2512 wrote to memory of 2992 2512 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\df542981ad8fcf4dbe027aba699ae33e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2512 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaa3376311ce0b2c81405d44febee2ef
SHA153159c28c1a4fb5eaf07cf2a9c80119bebc09771
SHA256494cdf81792c504deffc615f7c8eab76e16bdcffed3cb615e50209658ebdb6ae
SHA512e88dc3d88fa4485c687b4c406940be977758aa31624366f285fb30c3056d5c0ed98f4db7e9ea4004094085c88b0a2d549e9b8649d481f3edf1bf724d3977e8dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e55932302eb438a3bfd02b2a44e487b7
SHA155c1a30bc80526091363f0262af02f2dfe4bea20
SHA256a72d44e747dbdb04e4d1292c53952cbdb86e0d9ae3986555ae7399e4ed7fd6ec
SHA512f560e89edc04fa632e548091149f5f8edc69ce1e08bf8c827b33aaec43e4a2a057adfc3b688a18e1c3897896ed8febb184f5e70b00235714db425760a1bb662a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cb4eddea1cdf9bc2189616842717a5a
SHA1447ecd0140296d078bc4d9f3fb508d3805d01212
SHA25694c24d2fee4d08c073833987a4283a2dd6647cb4408d543e62615d94e3879095
SHA512b3904a6ffc3bae05f3a0345ca967aa18369eb187830c19c7e2daa4d08ffd1e3cc6fb26fda50593bec8f8aee09f3d67aac551e9d0d39dda37831c07baa7bc2dfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a644faf37b8facb422ffdc3ac582a014
SHA117414fff51f5046d4cd107a4c3c28303e2e2f163
SHA256497bb7a120e0f32e88021672279f6e0ae3d94c02908a4e29a0fe6fedd692ca55
SHA512cb3075067d5285c6348cf57cca70aff1c4e463e404ffbd567785c8cd0785ab14ae5841fe45019ee715be5e4f7427126b63b4624c946aedf66f8c8995bb26b5af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50410631686aef58da432c9ccf3a9a2dd
SHA16a07763d36e155f9f254d39a0d111330d569b3eb
SHA256dc05f702f368eb09d8a9ad76e6409170cc878a9ebeb5f228cea5beb7d81aff45
SHA512f8f337c261c3d0d6dc374bd7c53b011cd3760741a53d24252e39c0dbf1d1d21f7c40257c3a5438c03628d17e9ef7f6158ee6bc74d36f6f7a5ee0a12374739c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ba1ba606834f8bfeceaeafe34751906
SHA12a0b7b52278538f750959122f00659fdb9ede274
SHA2566a7c022a33ae6ac2526af272bc597ae4e1bfadcffb424e8606d20315985f10cc
SHA51239fcca88c0bc2d815e51861c85ca3f9f149440ae4d0845a41c40e8786d04c9bbb574d7714a18296bebc06061edae53c7e32e99ab3c091c0ea46595c46ad8ea1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf7ae360742ad6065ab0241698f81cb8
SHA1eceab7695ec6d76ae25301b7a048d0ffefbd3b40
SHA256476bf3437319d46065909881aa6a72f1a72efc609caf459dcabcd39f9e6f5cfc
SHA512e00645dfac973451758afc61ee9688cd69a4db2b51e28f5ff5b68c5f9954f479d1033ca0011088bfbeba5dcd3aaff245f7f8c76e43426d45c3a1eb6c2b904ff2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5e73cb7e0efd2b4af532dffecacb0c2
SHA1dcfa294b3f08e8cbfd25fed722a20168821d3b7f
SHA2564d53fc16d98aaa6daab2d73f9d1e396c632517a1706f1b344d111492eb4b7e02
SHA512a58f387358e3a2b49ad3d7e01872a31bf9e9f86d7a85ed4cbecf80e45f72b4f91fec5b47039213cafd365ff916c83eab407526f17152e473f62d6b742b3fbc11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569258ff363cc02d51236a93ce864f466
SHA1a54f9b005ddd1e612b849a3e92db363b48f013db
SHA256bf30ead646b9fdfea196a505babedc97afd171bd24b62154d5ad8376e8441310
SHA512fdd5c90eb0a4010029f097e2b8ae990e04b048bcf5bf0b7323b259a011c61858d7a054e49048d025eb9cf124d016c396e73099cd6d35c97ccec8ae7b8dd1e682
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57217b5763ebbcf9cb2dfea9e55c3f829
SHA1973a4c3fc7270871d6a5e2eefe8ba3ef9f0be389
SHA256bc937c96c355ca17f87b00bd0ed948cebbd3a83097b4cb60f4fdd26e555bc0c9
SHA51266afcccab4e70295f39826a180b4472f7e3a9e696b6e24943cf2984d141020ef901fe7c7eb15fd9f15252f5ad870ff66eefe6897860d5f008cd8b40fc650c783
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bafda43831d6d451a1ce5a9bf1341172
SHA15cd74a3767614080ff6d96b3419ce43800dc31af
SHA256ec81586fde7195ea5814565b602b8083ad0e2db51a3b57c2b805259c220b5107
SHA512c94c6445d70e646bfa64089dd707ec719eebe19e5809ec691bd4017e95b079da062e6b3bdc9d5beaf432098f56912bdb12754dc44aa45e76f675bde4120b38a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e517f1b11d533bd0763137a86e6e280
SHA17c88193ab224068d7b548512016e79d8bf672f69
SHA256b4b05aded57245081eae08e05e41d742b3f12b62779ccd29b181deb2cf726620
SHA5127fe1011ee9318a2d994165ec774d5f9b4072bcf0973d23e6024bc4b148bd1fbcaee29dcea925021737d68fc9e7842e70e945d98649fdd338ba81b0b32a151e9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c0dcf7a870e07abfd3c02bec863812d
SHA192462be9c1a724a856e85d2369df03f5df8ce2ad
SHA256044750a0c35dad1b53af027340b92e696a10a612ad617f4bb566232e2cbc8605
SHA5124c2dd4bc8c4a68d829e8270fa43ee74245cf4e14e13a18ca2e758e82409737622cfdfb6973e7447fe5321460de272348b81b3559d4af5fa3e49b243f5040acdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4639dd9929de51c2d7c4b6da19220b9
SHA17450e3abeebe02a801dffde25979fb93e415f5a7
SHA2560fa99831d14a42639c594eb88034e798437831458b325abc24fd5dc816b2bcf4
SHA512b0242c61ea819838b03131b6eff69283b5a2f948840020e04d0cf2f5127680e4d6f50fa12e2f789ec1d9d5c898b8ff2a3a22ab27aa9511efa1f11428dd434cb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a324b538eadec0e329ce6d8e25902ba9
SHA10291b7248c008221834fbcdddebcbad443a07423
SHA25601bf74c29f4c3061feada5d4eb0c4cf73dfd057c0d6f274ecdc370b4c99baff4
SHA5123e5a51c9580e670398da5518c4ad30637a5deb9847d785c300aeaa07f7f9d9be9f801d891eab21619b2ee8d83c823177e38546ad59ec8603ef8bec0aa485187f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ff97737f5dce86263e36d11804f21e6
SHA122b7214a41f158529071fe081a49412854edd223
SHA2561719bb82707ee6b1058877ab03e15986f781e6d2296fd83dc8856a6600ad1ca5
SHA512b13a97812c502153f7480fe723d69f7078211609951a45b865709af32cede92f53c7a3348ffc24d98aa87a32a2a60c1424b7781964ee59253fe31be7a1494ab5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6426fc2f46a64a751c15e8d824673f6
SHA1b9c53953aaa55234c7b74a21eb19639363ad4a45
SHA2562430fed272ffb2e6531e0a309cfe8268c7ff82a74d8ca6b95b8d7c4f10a9a1e4
SHA512072ed52633c43e28d42972694476e5254b3a2533f5ca77e6d9c7829d91fe044005adc1025f1680f5b5c11ab7fa03685ffbbe4c4fc69c2ce06194b22c9d7b9d96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adf34c2201f92b2d86ac027387b91729
SHA11f481ad0aa86420210b6499b69a84e9d48d66c93
SHA256ca48a54fcdc0e9ad9a9c843fb8183682fbd00ff6c239f56163c46d0cd7acba54
SHA51250f57c62269f65ee28a21696cc9794f1c090cb64c2dd8d6a3785f41271b99735006cde9b482049ee45a47cbb55f1a8ab00d8f76348c77411b7b39e90f1c890f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593341c7031ae8a777d5a7f6948a4351b
SHA13424800a3d1fb11780e588e8be731790cd2d2634
SHA256bea3b19db8f68b0486ed380538aa0a3131e159db26097d7f5702f7e180d53c7b
SHA512c30ee14d576d30566fd7f792137e0885d737d303b188bb8ff82dd2bcf3630349b0cae0a1b118822543f4b88d815e0ecced8dcfbd99f636c02b754a70d77872cf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b