Analysis
-
max time kernel
133s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 05:55
Static task
static1
Behavioral task
behavioral1
Sample
ef2f64f62bd1430e119d36a7717124e2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef2f64f62bd1430e119d36a7717124e2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ef2f64f62bd1430e119d36a7717124e2_JaffaCakes118.html
-
Size
14KB
-
MD5
ef2f64f62bd1430e119d36a7717124e2
-
SHA1
0b5344deed9247d91d466d67b8f4c1ee2484b34a
-
SHA256
b99e2fa861b85420a6ba073caf7547309c82658a192fac931de92062bb9903e0
-
SHA512
69ca6441eb75b8d0962a252739bceceba7c67ea232f911d0e950c6a4d58296261faf039a5e8dc659b450f13a4d17d6d7a38fd718d6d6d24ac67a889f874cff74
-
SSDEEP
192:wRRzDyQ9AmJTqYWnc6+wfIx+j4pbnEgPZYaZbMXNs5YywUY:wRRzDyDc6o9PZYa6XRyu
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433060025" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60dd3905eb0bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2C68FDD1-77DE-11EF-81B8-46BBF83CD43C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000008615361fed48f563cc4afd7329ee0faad3ec1986b825f0b5c29542b8ca9f81f8000000000e80000000020000200000008b239f2728d5be6266529b28510ac1991d6b248a06710480e414168496dde99d2000000008619bd4788c1b136112321f68861fc56d72931be1306bec881d2cc2b344040b4000000067325cd3fbbbf8c26626bb583cab1b2b8f5c63a383dcf69159a5c91c03d61246051bceac573ddb15a015aadce210846b6728e85e61dd46e381a9a69463ea0849 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2700 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2700 iexplore.exe 2700 iexplore.exe 1128 IEXPLORE.EXE 1128 IEXPLORE.EXE 1128 IEXPLORE.EXE 1128 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2700 wrote to memory of 1128 2700 iexplore.exe 30 PID 2700 wrote to memory of 1128 2700 iexplore.exe 30 PID 2700 wrote to memory of 1128 2700 iexplore.exe 30 PID 2700 wrote to memory of 1128 2700 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ef2f64f62bd1430e119d36a7717124e2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2700 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e4348334bce9b391457c1c4bdc3695f
SHA1f5606996c60d89f8ae6d2362d11b308931bf99e6
SHA256e6f7995e3d0b1fabe95a2d7eab8a326943be622a5f909dced8e9c08a091540bc
SHA5123e15eb4ae83173d7d352a8b296f4b8a08709e3f5b58b2439dd909da4410f57d91e897207505ebc03a43c92bdab25b22e6ec43635d241ca96e282a7c8803b22c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dae597ba9b8fa0311c5ee9821523055a
SHA15a7c6e01e77dc06ec5b446f14ddb17e253bb9b48
SHA25698af77e699e66f86e24e7e4939117f4fafdfc5fb8414c2da36ebf08cd8faebbf
SHA512a89010c7c57dff9138c044431db506e77bc479b25ae838f4de3ab74c6d90126b6049e5e1ce3406d028979bb937021b9d19b43794cedbe181397c2dbc705164ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a43f13ec6246bb889a04c10a420dab0b
SHA198c8ecb36983e6df6124d6a656b7abbc95fc7d16
SHA256be9487947123b454b90056fbbeab5b5e7e5b5f10da96b3f2fc79d544e91cd384
SHA512300efbc6f4fb29adc778d563c37ba479db67443afe2d04eedc93c9c2743641356b352829595bca76cb719438ad26f9d4a14bc70d5a34db144c748fbb10a48771
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594aa363c11aaf9d04a28cc8c5c15661f
SHA10631b4e57d595db9976250ee4018c37bf564099b
SHA256c291f2bd47b77a81768f3ee716aabbe7c5ed95ce800b4de761d0b04894ef0a59
SHA512eef67a98943827b14b4a522a0106554d39e081ce0dab0c74d83c86fe69f86ea1e1933948c0826a7fdeeba0733b977fc37fcf06e325804a87c507bc250794c1c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e7a0bd3215235f216b49dab12380a31
SHA18cd96fb096968244d87c0d6e70e9eadff5396d51
SHA256a0b45998f739b7ed1e7be0bd89a27c6ceed010196a9d76e3b46a951f0cb0d0a4
SHA5120dc4cb6787944fc94b88f4eb1f81ccab292fc90f354fb90ff5a7bba99519fe6331c990dbf131882b50398661d2c0649c70bb22e1f027d6eaa260a3ce23200f11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523bd01009319fd964e1ace77cd052e13
SHA154d2c5ed81f10dc72695a14f8a0cfa97a50a5f7f
SHA2567d48f466e77ffbcbc5f430e6fa95bee112d03b4d1e38f1a132fd06d0002294e6
SHA51208659a52227d90fea386102a57a195e76cba56b0eeca55bf19fdf8e94785ac383c6b91b134b0b29bd6c5db6c6319fbe93be76e28eb578cd7b3139eb8d6e52eff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaaae8d386fd08ca6e0e3da1ed7fc6ed
SHA126398554c80c0e58c7350a8be20f593cf23f21d5
SHA25687d8507f63cf6cfe9aba24cf112ac3f79ba15e649b8f141f5319c15ef56bd505
SHA5129d67772b9516723cc92606f970368f2c0c40f3d3bc5e61e89d6e66dac2ffeb113bf7543e558828ab2a279e4468d22a6efe79b39ca81931bf61ed7ce420b141bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea1cf5d76cfeaf0afd174273f4ee0ae3
SHA10d35660f31f2e4aa6af868539cd2e984777d8019
SHA256a7eb6c0da41e1ada4cdeec1a02ac0174d5a041d3a2856b6b9e31ac932e984164
SHA51208d8f93c160f0e64039c8fe8b4f6281edd229b50f8b72d8be6c249da2bb2db8bb58da95e40288bf5668e469d25802fc9b14d379b1a1a536bc3486f478d2ab464
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f2101c214a0b7738b2c775de7a66abf
SHA192bb2771d801cbc095f2024a18acf461541a695e
SHA2560300496fb4cbda596ec1d33928822301537ea2d539e700a0dd6d61120d30d15f
SHA5126e0e84b2a4287c664124e21814aabfff80d9baf239069aaa0e05b62cdbb8acae464d42ddce6a17760e76a0dba26bd3a05de3c126a814546db00d13db2a2ae8b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b92321cba2599d6aba72f70e94e2681
SHA162091ccd9a97c3be3d2b07ada2230e89e7b4ad9b
SHA2564d29fd39d3b0de4124e0def9b16e157276d1f8e8a2cf96af87ddd73e3f424247
SHA51283569ac17b21cea48a7e9924b8f368c90795fb42d614da7f8d2149bcc0e235d2556122811c047f4027be6f05232a7b192978158ab2981670c6e18ebb6cc00ede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567f80503b44c9ecebf51113b60d251f7
SHA1374d07a476f1ae5ec9dea184671a08e412ea77ac
SHA2567a52a7c943c1a3ee68a511a5b45ef6e4cf9e2b57f118089647d64e5fae66a538
SHA5120585a41d38e535789fcfbbf339b7e4615b9b280d6e4d3ec556efbdb9de26827ba5adf7916b8c29bbffc77836944415f8c16703fb09a080f0f98dcd55d0014203
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505941df5ffae1db0bf95325a12f3c6f3
SHA1af3f2d85684c43c044960fa4c962802f745de963
SHA25673ac295638d6e280e8b550a40f1ca6641b62f51cd4d1c11cf1a78dc6fc1d8b8f
SHA512421877506c0b49e34205f36eb27961480d6968e4478491c1f3affe998685c55b551af54bd69e0e8e09b2cab1e86b465689cb16c11ddf0bc4a31bf5e3165caefd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dce23e4c356cb838a7cde83afffd353
SHA150f51a5a2cc5e2e1cefac90122d35f9370fad6a2
SHA256d28b2d0a6c853d3067272c7ae210f991cb8580ff58d53d847fe6d4ba1a8fc97f
SHA512fb13349bec0f6ecb3f3e52c5281dd1ab977a974c6f6d4781cec8a7dc1a93cd70adc89fd54b66cd960186adadfdc009991f3955bf408630b34d4128f4b89171f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5db1ded472f06d94735bbab3f617f88
SHA1c123f690423de6f8c18c60ceaf2265cffa08fd91
SHA2560935a743871309e205f1e9e99fe6e52a165c36e15abd852a0636db5ee8194db3
SHA512b691640a34708eeb840ad682a5b56bc14ff91a4d35709a1133c20008438d8e0d83917c88b6ccfd6bd1b66a0ae294169e8632ff6baa8aaa62f163f8e24afcf951
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dbd112b27ae70db73c7881443e686c2
SHA14cec145f93b54d648025f6ecb0dbb78ba64d2d7c
SHA256a9a7310ac04d7ee0dc7e89adcf44665d70869b8bac9e06e4016f9a57f8bfd928
SHA5125d1ba48c9edaf91d26a6084ddb0d125d535982c7be8cd0e8ec495dc76f475603ffabf06528bff1cbf4ee9b255b6795caed30540784eddb940e08fef31531f468
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51170134e0a644a6d9ce5f55e57cc9786
SHA1e65555674ef9d5b9614aff6acaa841b892a0c9a9
SHA256a9af2d1283eff7694bb85635438daad9c75b88e0ddeb3a8c030f859f7fa0ed17
SHA512db22b13aad3230a8547dc0d382ca5ac7648eb03f20ae4450bca1e2aea2cf27a94b647d452a0f7b0e19d1b49b3e92fadd90b6a0bb84781684514fa785c302ee92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cd63f7ae48d2b437f70c47552358b03
SHA15d5ff7161b08d34938a9b8ec858af077f4680fd5
SHA256c2b4ed674c0fd968d58e9b7ae287dc6ca3416d9452c1c02aa03f45997752cb1a
SHA512788a3166b9f658f51588caa29d3ccc9d1c89d55e45dd56fd540a2e254c9f8ea3fad6a5e21e6b8199b733dff8e9e2b2d0c02d5f9dbcb76ac7faa6b919a4e71892
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58791a4b3b5ffb3a59a1106477c5039cc
SHA1adef16f1adbb685eb277505811859587d6dcdf57
SHA25624c0e2534e45e333964d13158278b4603f0114c9718d431b5985b2b09f991db2
SHA5122754b757908b52b5376763ce74c52633b39926a60689c67588a52b3d8b1014ed918a8910dfd889354629b99b80266657065a43583b3dc20d2b2694219529dcd3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b