Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 19:56
Static task
static1
Behavioral task
behavioral1
Sample
ec16639ae6b0a8f33078353c345aa191_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ec16639ae6b0a8f33078353c345aa191_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ec16639ae6b0a8f33078353c345aa191_JaffaCakes118.html
-
Size
94KB
-
MD5
ec16639ae6b0a8f33078353c345aa191
-
SHA1
595c85fe44362ab317295d40a69bdf0aa3f642ff
-
SHA256
af06ba7142a7514f11a240c28450cf48abe61b393369c4f657794eddf5768409
-
SHA512
c7e1a6b752e9be37bbb961880f8659f336d5b391dc073b214ec1a6257ecedb03ea38d9b888378cb4edb75ed94202ce8cadbf8c5a463bdee60d1ef68c17ff5857
-
SSDEEP
1536:WMLiNV/1bGe1ZN7LiAcfT68fNRhFLRC2CZklybKBdkrY8mgHC+qpEyW:WAiyTpBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{55D6A231-76C1-11EF-8D81-C28ADB222BBA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000002fb20f4aef829a1b97e07be4fa479c6538908e7d9ae1a08295273577a4d4cb04000000000e8000000002000020000000848702016ae9a05e6161d0464e3b8c9e52c6bb52cfef5c0fc994e598de37260e200000007d2b7b5d560e37c264fbbee3b145b580dc3d310f5440e0348ace5404a6940e6240000000a5c4a6c8a3b0830644c3294448c51ca06b29893ed486c1ee346f5dd725d95b3071fe042979cb7b23548c80d49354890a17f461d0ccb5598f351b13359c82bb11 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432937688" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8082fb2dce0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2264 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2264 iexplore.exe 2264 iexplore.exe 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2816 2264 iexplore.exe 30 PID 2264 wrote to memory of 2816 2264 iexplore.exe 30 PID 2264 wrote to memory of 2816 2264 iexplore.exe 30 PID 2264 wrote to memory of 2816 2264 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ec16639ae6b0a8f33078353c345aa191_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2264 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568f569fdcfdd3e1754c6bdaf7941bf45
SHA140b3bacb11893e26f8d1388e2269c127d0a91b03
SHA2567bdcdcde4d9c116c135e040a3fb5daf7b073f0d50a85391c3679158d134124b0
SHA512fa4bb5b2eb5cd38aa17482272583a3111c544362c5e0c031a06fe99850e8c8323570c9462518ea21591c36ac4aa0bb1d8491ce556eba51a4a80acd626e70c00b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8ee407edc1d94605bc6949f1256a44c
SHA1eabfc64d4060bcf3ceec1772f35105990b8382b7
SHA256540de5f21648e836106d1b2dd8c5b53ba15b64aa2faf9556d096b669166170ca
SHA512fb06a8c9a7a438f88666b8e324e055d5d5d4faef72167cc145d14a94a5517cb64f79c0ebd14756caa7a9c92a5069c0f7824dfc18100c04b8c4b8d903bdd43a7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5296a5fc628793aae92ebabc7184c0d
SHA1358684cd3274ff7b013257d23643397ab77871f7
SHA256724a422ba38c7769f48f23f7ab368138aac207f7fef6749e857e4fcab1b35a1c
SHA512b03545355e98692c77cb7294c9c8ce4b668cac855110dd15ecbef08fdeb3396ea8119f8fdb5410f271620537a797213513d73e43f5b8e4265597973fb93ffb7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5726525657aa074975273a3d56e221100
SHA102d5b128e88f960b86971261aa44484e0d57a647
SHA25642b99d905a576466c83e4121f3d09fa6553889e31ff7af06b0165fe3d49dd910
SHA5127423ffac6f4de42b93e269e10fc6d57ac0747a6597742427b1964a2b10a7e734fe91a458af60fd6e4fa80dbb6a0c2cd07774436f7ffc5a3b01ec69a7dae3b220
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556115477e9003ec0391b5265625e3da5
SHA1d65d158d6232ee1ea48f1639114bfb298f00f091
SHA2568728940499d71076a9b351a83a53f30104338de7964dc03c9d97e1d1a6c5b95b
SHA512bb322c33834bb98e3f291f8ea13d4e88b3039e723e87bcc885fff2c5b2f53f5ec77541d1f0e7b1efce5a99a07729ea96ee340b956440017a075a08dbac7236a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d1f4426efadd31533edd4da8541d9b8
SHA1fa7c790abc8340b0251df7cc476c2b99666b2694
SHA2567ac3de7f5a976f314e60bfec3d65bc9cd408e020d9712f613fbf1099889984d1
SHA512b4af72f298764cf5fe793bef7529450974dc51de69b9be617879978968b86f1b9a96a0e7f2d265c766065fbcf8bc0973c7746a8180efe4726aad783c30b5e8e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d53cd93060461936235ae30ad463e885
SHA13210269156d4dec63c48f86fec825bbfb70b9b3a
SHA25618a46e4e29f7a2abaaf9cfd793409cd99764a07f0cacf0810c8ca525279869d8
SHA512f2c200c6126c621a6a800b66b995409ccc494306dce776e292b2d171919568418c352a9b4e7e38dfa699193f777c073779a06885d0903c97b295598531ae8a7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dc7594a8fd055ca55c5a5005a01e870
SHA1c4b6e1e8ed8030d8a5b008048f0938cc34b9e47b
SHA256ce9395ae6c29e9822e08076d1c7093d3c7f29db7cc4354815481caa7873f6dc5
SHA5129b76f0b86a73332eca64f0ecde9eb819c560f72ae33ca76287c67b5669a069990930cb1cfd462d646139ae0edce9c5ecc8ac7482f4f501c0d3c19123cf8539ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514d0248912ec1acd8d53ee9daaff5a09
SHA1889a03a4ba42e8cc9b868fa5d3360c0ee9dc6aad
SHA256972d348e3d10b303fc69b644748aef10e3e5138c439b4167ccbcc662fffc6c1e
SHA512b2572fb382f0cf46433eb5e60d53aa50919b8835e518e0bd02ed1d04ed629de19ff69c6f7d3437298e77305813673210decddc192f83ad57f9450fcb46439d85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab421d87fc4d462de8ad0fa4535c7cd4
SHA1cf564e14fd37a5a34da8cdcce8407bb54addf6c8
SHA256ecae99d1107ddba01e962ef3c76adef9d790e188341d31e6146ab90c36152590
SHA5123fd2d6bb1f671ee81a13262946357658cdd7ae817a0266045aebd5bddc7989e6e212481bb894ace6fd4c083a08370ff176ec8c8f83d9dc1ad53d86350958bf41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533605fb92e43258f4d0e294e4b8fb30b
SHA18331a05e9890e3ba1c3a59eff88fceb23de6c1a3
SHA256fba731e3fe2cda6d846c1e3fdca56cdb39dd1dbf5427c012152e81690e4fc71e
SHA512803a7aa78631fff05f4826036cba477d0ac090eacc0b25853f98812c50b53e7edf8f28934f19f390c36da8f15b2b9f75739eebe79785055eda08f7911738d065
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5389a1370f99e1cc8be0af631ee6908ca
SHA1332d9e08d5904f4f54c3796c753656e4c1473254
SHA2560ddab4cb757c1215f277fb5dca51733575a1368a796208528be8099334c729be
SHA51296dd823f37be76515b2f42499df480b48ae8fe7792a4858fd23e161cc54ec83e5977de09079769178a5d9e49bd10ab6f47b0d9bd6c88dec00038f0611b866834
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570dac09bba755d3f836e59c1aed4071e
SHA1023275a61261691b6c9e341da4f65b3d28639069
SHA256b0df4f72dea2bb48079db4cebc3f6bdd5e4ca53aba46cbf133628972e796f944
SHA512ba534c892c26120c830eb36613975abf786bcb62cc923cecf32cfc676e72091e55c610648f5c3d198af9f8072c5be3be8454b834b87e11e9b61d12a5b9633c3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b5e21625ae1361fcb1632a2777cbe72
SHA1dd1bcbadb5560b1c457db707f5ef4946aca71430
SHA256369f6fe04b4e5d6bab70a4b5523e247edfdc6b849c3c121a6c1b5d1e64e3d381
SHA512eefd44b294c583e8b109605f21425b70a21ea503de9538d860ef9b51fcd6a1083601aa32ad5da28ae2bf36f0a0aab5729f313f8b1f41115093f914fde3cd9971
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0fb3a3dcf66388db286effcb9dcd09b
SHA1fc35f45b7a6098d147b890f18503ab3e3962a286
SHA2565a8950a56f0076bc3d9d870c2b291a371363189c8d6fbe49ff40f16fc81f534c
SHA512673b9615155c7b8c7b7950af1b334c8640a9c4b142efb1b10899f8a70a94ceeeef79da819d2d2d9c9c7a243909d27f25e355cc3a47116cba3850780b9a171a1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59be83b85fbcaab1bf7a769f6c4d9ac7d
SHA120e25df00d4badaee95ca5fea341f3b7ec3e0cc1
SHA256944e67f4071dd4b675726dda525a060a2fde4aca78a6cce5987cb32c47d52541
SHA51294be0fbc8eba7ad63c8b275dfb1875fff31798d0f04961107fabeaaf970fa2760695407ecd5ec2a8677d0b821facba433d6f52baee454322d7f598ca735af004
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553f1f71fa6571a9ca831b84363965c9c
SHA10a57b8437ec895074800941528cbdcc7427917be
SHA2562f67bb74675bd7cfb9af0d3b9169526bfa17ed31d3401e8f73939f8fb053e0ab
SHA5126697d32a61035814914fc801ef4dee551c29f97c47da7f9fd8b2dd8a666322737cdc85ac9feb6589c814bc0cef5007fdea0076ad7db069cf4f93a7458fd95624
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54857f4bf0143fb3f397b53bf4b27d3c4
SHA17e8eddd75b6d181d26be07e29a23461040d9abcb
SHA256ae17ec76f91b872a4bf3cacfc922e29b60f29a7439ddf8271c7922f31e17616d
SHA512eff82fa6c26be62aea825f0474fd6cde344b9246cea18368166cc7db6bc0b2d6a7c87605caf0a0700587849cda55b138f684f58bc0a517a057049ad1380e2109
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bccc9048e0100baee58aa34351805f6e
SHA15b0a562309792c309bdec34dcf0340f64d18b6d3
SHA2564b5a7e848744c98185123ba36f5c4fd1a51114c56005eea13343637f14f2c778
SHA51275599e29df2d14cea94ac8dc4ef7040039a0e349e0ef367875ed1d9a717496c58037693b69cc55e85f3c5631d8d5acae338e24b3069dc81b316d75b1e1267dc7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WCATT3E5\style[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b