Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 12:19
Static task
static1
Behavioral task
behavioral1
Sample
efc7140812d009aadee00de52a93ac03_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
efc7140812d009aadee00de52a93ac03_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
efc7140812d009aadee00de52a93ac03_JaffaCakes118.html
-
Size
22KB
-
MD5
efc7140812d009aadee00de52a93ac03
-
SHA1
95c17b36d6bec7f8858ec398c3635b1c1b9ab106
-
SHA256
0232e1f61fb38cb3390b6abc84bfc1f839529827688296c8fc0cc99b9c3ac04e
-
SHA512
f243c033e6df65706d7124c5c6b496d32e3e6a414403e1c0cf50b21c36c195bb4326da210be882d263f200c9637c69b14ef05c68cb50bf0a5dbf5be43da7175c
-
SSDEEP
192:uwT6b5nPhnQjxn5Q/mnQie1NnmtnQOkEnt2AnQTbnVnQmSax8GIYk5xHMBVqnYnj:HQ/Vxxs8Ow0XQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 206e2589200cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B2E6AB21-7813-11EF-8334-424588269AE0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433083015" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000026e46c3a4be60a5d5686c39887f495784ee1481b7ea03d293cca22a437623dbf000000000e80000000020000200000005040d7bebbe936e9544b8888896fa2e45ecf7af2708ae311a7d47b328c039219200000009c4010d8cdef77a32afca621d43bbdd6223a29e9ba61e7307651037d8d56ddb140000000a83a541c5124a04c392f19515b71bccfc1b30282949e046f52f3e35bce99681e235712618fba46a5da49dbec4cc47cca8f7dfe7c706ba24e08179b86a1d0c0a1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2976 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2976 iexplore.exe 2976 iexplore.exe 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2912 2976 iexplore.exe 30 PID 2976 wrote to memory of 2912 2976 iexplore.exe 30 PID 2976 wrote to memory of 2912 2976 iexplore.exe 30 PID 2976 wrote to memory of 2912 2976 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\efc7140812d009aadee00de52a93ac03_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2976 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c5cacaebe7077dafaf2462d319882c7
SHA1b0bb5ce3c63d955660ab6559a989d971fa129506
SHA2565382bf5ee007c5b720ff3526ff88c396cf2eac07533f44c80a4a25a6e272511d
SHA512b236517fc8ad7ce6533b2dfe3e864d08eaa96b1fd313dc2b9443108b15230101c0010f50f3e4368584e24c14d1f252675f8274b4b7139acb14a74d67b3994711
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c789d353007e6878fcf78c9dd7f853d2
SHA16781137c0a091a37823d4b36a4552ff546822a2b
SHA25694173d64a8ecadf5b4357a60daca4b126a30a90a56682c9623fd18d5ce0c871e
SHA512274706b655aacebd5cbb819ca53f93607cbc4239bd07196d3245fd0f1bfa28d1b77b05bd6bda9b737afe910fd9a0ac9141c6188cf8ef0bc54cbac5b152a086e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed7a2c487371b7005d371eebda916bc8
SHA1334df401c39025d9f4730cb6adb6dde65e5cabef
SHA25674c72f91bf03adf57a6c6160b00e25c6a5979a2bba97998d75c5b6f22a2ae402
SHA5128b5f6975e66f28443f264bff5f7eea4f104b1860fb8c7e87b7535d2347b6e31db3291f80e32adfbe3407945f8b57b69735af07bae31e8b5cc838619cbab4e814
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e7d7008deb654e4eb7ea712f3c5536b
SHA1b3b29a93417fa8cd3ebabb4721a55023e18c5fd3
SHA2566eedbf57431435fe5a23e329922ebf313ac5ed57571bb9c19925febdd8aac161
SHA512343c00807e672cee9474884d927e994bf6eb4f02fe53b65fccdb6489b8c727633b7486b37ddf52b7208c187038dd6a430479ce901bcdac24a0286aa713315522
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bcc15f780f13976676e675d24f7da4e
SHA1bb605b71f8ef53db86b2d30b2e42c4f56fbf4160
SHA256382553b006efc7632631bb40ba9e018bb8a5873d211e11937c1882f333e9e3ae
SHA512c428aa5e18aab93b37b2ed823b239a853401d0a215d24f1d203095006518dd69ad86c537597b98b5d8b1e46d1b84263f09b412f347c7c32117f5c8eb7dab8795
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549cad0e23fe7bc12899aede9f463cd7f
SHA1310d00b41e5d5092478a2baeb79ebd11aaa3feb1
SHA2562a869a5f52a4282c2c2ba3e7e035d597682f1ed766bd699788b2a737a6bd5d91
SHA512d97eed263ce69273f785ba6ea0908fffb389fc9e63dc1f4f7db8b1750458162bf6a179e04691141fb43382f453babc5aeb99ff54b8176d29a2fde46c52b1b6a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d564add305723997166e52157fe8cad
SHA19269f2e4e3e7d3d691ec02d9b60e96877afd5724
SHA256272c197ebbeea3091fd00b283b6580f148600a41f00c000f6e058eeced8a240d
SHA5128e1a7ced63336fb75e75fe437c040f1ae2c7ec5ca673c268005469a495e2a4464de5c98ff1254910db24e9889a771c8793799a0d87660886094e2166c741113d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee75eb7e5570d493c11f8f30cab6e683
SHA1a6d0d27cddeae7d4447f9e5cef320cf027b579c2
SHA256f5c4adaed31368eb13149f2d65bceff00fcba81f68f97d13e88cdf2022c701ca
SHA51280648de3f09cd4a6f46d937e400fac0cdb3d9c939a0e1a18f48cdbac3a56a4d2dfe22de1b8a6c6b78982ffe8605ce2d140ff0bb2a0968d182ef9ab98dcb75675
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52977ae16b6a6eba876688e1e661529fd
SHA19804ab7730730a6062b28e9f21a9ea9183fe9e89
SHA2562bf5e9c984898fc6054ebd66546e176feffaee56bd90cd6cd0d7dde43ea7a654
SHA512b9c330dea5a0141f06ef30ef8f5b697ebce8a499492b68739cb926282f0e2190fce77dcec54e258f96105300cc4ee311bf49d8832f3d6a07f1e543b1357e5724
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5491aedbed790cdaf2913cc53cd196029
SHA13842a41e805da028b51a180eb65a6009321cfbdd
SHA2565bdae98848f58d08a8ee1369156cfc5c2380c9786883fad531131e06e78f373a
SHA51280e354787183f2d27918b7d7169306c56e786135bc374d5fdbc51abf6aee986214f67e77f2a20e1a44d66fc284b6bcaed2d836fa9571c8cd48129e8872ac0d72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528cba009abee32e0f803b4dedc82497c
SHA131d33df812bf4d61a8a193b0b7f1e9bd6d954b3c
SHA256cb17813fabd007b5a97d23e5a6ea69f5c1f35f3a2c100eb408bad293518bb269
SHA5121b9ae376a935c382f8c9241f4272d5ac537a35261cab6866072c9daf6f834a5016a98855cce05c67a193059ff8db0ce67ba4f805ebf1aa7d247f6f73484bfe69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5450b06139de1ff43e1a3c3e7945ab468
SHA17000fc68e794b0397e5c9ecbb12d4ab9bb62fb6a
SHA256c85746ea40d9506e7c4c0236484ed81a8a2eaefe774f15c31f8c63660e33ad6c
SHA512c981001978efafdd9e3c88c31ffce1bdd9f8dc452aba06569d4d67b2aeed9eaf313472147cbb5b83e4c3cddb3255610527d2c32064d418558e066ac029efa05f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ed123328460e7905ee6c0cf4f34ffa0
SHA17b1ee8701e01907e58bf7042fc5d35923a1e8948
SHA2569b171c73eb65fb5ec144d4f5a7ffed69042ff578a906b2ae6d253f8cb6c64dbe
SHA512d0feb83fe12da92312b740b1bcd09175fde3fbb40a35f119a2bb599d0e968c1fbaee37af26dd73b8e8d0cbc9d8efaafdc0a0b4020351eba3ba22a3895646d612
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b61f866a829b4f49f1b1599dcd691f7d
SHA1fe14ba6ba53e83606658d1a45a056cb6c915ffd9
SHA256e028fc787bd1d8f180491cc09a56efcf7aa9f38bc7f799530300e33f1610be88
SHA51272c72fbe58a234b2f9bc3636e95625b056a91fd9685406c72e54520b8d6dc03967d63043ec11f18040535778eb0b3d4933579acbb85e7173aa3406f07cc09904
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5440d8d31f388d153cb7b7f58723ca3bc
SHA1a7994e50cd8c4011d734ad9ac9702033aeef789a
SHA25626371706b643f50644981b18d1620ff666fbf7e6eeb1df89c62f4439373abf2d
SHA512aa05b0bf5e864a81d77e24105933edb4859608b7314d2d147327400e11fcd3494dbb4097da75b2efd279c76928facebe0c05b48130de40763f5beb93832fb5e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598ef8fa57f21eb91a7c6b1ac0685ccf3
SHA1049b0a57faaa6ee541eb52894d48ec360864511d
SHA256bc90e99dda6f3e2bb246dae369b587869ba4ed2d9ba7e9ae4bca9094d512fa18
SHA512c55daad50343a2a1ea208912c12b760aafa5ae582f9304e37cc4df8f5c4de223958f631945009233da0b6d31a5b5396464c79db5f19d194e82c50e3970eb7de1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b