Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 14:09
Static task
static1
Behavioral task
behavioral1
Sample
eff6651f33a8514470041cb64c360f78_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eff6651f33a8514470041cb64c360f78_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eff6651f33a8514470041cb64c360f78_JaffaCakes118.html
-
Size
52KB
-
MD5
eff6651f33a8514470041cb64c360f78
-
SHA1
0eeebd810839a14e020fa9e14f764696c924f59e
-
SHA256
5281945e7c23aee0a2d038a2e3c8f8e82578cc601fb505f0caa2691dd2fb84f8
-
SHA512
4d4ecd39091c8a3ac3a0280027749832350aaca4947dda242c6fd2ed0074a8754b4551bda783012d96f1ede01584cf762c20a8c3854f38e93b7ffb10815f15c1
-
SSDEEP
1536:Sa8Y6KJhu0WaYuSEYuSeYaYCS9zBCD4h3r:Sa8whu0I6Er
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90f95b01300cdb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1F1BC9B1-7823-11EF-B4D5-7E918DD97D05} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000a2f5938d54721e4e1cffe02fadbb457aac783b4b09d0873385349fce30eb2635000000000e8000000002000020000000b41c0023c2fa57cd04348150f569051f6cf4930262c42f5af321f652cd0c7e552000000029c661ae9999b61628378a63c5192db2e5deb1109f2310264387b89d8a7cc1d940000000a95604b1bc3ee2b22ed39e4fc775b1d65a08d6d86c99ea5f20441c9ed7467345972cf8fe361b3c5411147730dc1c1be9c412d1a5109487df856feaaedff0355a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433089639" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2528 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2528 iexplore.exe 2528 iexplore.exe 1440 IEXPLORE.EXE 1440 IEXPLORE.EXE 1440 IEXPLORE.EXE 1440 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2528 wrote to memory of 1440 2528 iexplore.exe 31 PID 2528 wrote to memory of 1440 2528 iexplore.exe 31 PID 2528 wrote to memory of 1440 2528 iexplore.exe 31 PID 2528 wrote to memory of 1440 2528 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eff6651f33a8514470041cb64c360f78_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2528 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ce1ab78030af09ffade80a04d9a140d
SHA1dc78f245f648e7ee9018f6527083ac34e2279635
SHA25611414f401cdde17c1494fba8bd1989c66f6fe84c317ea2734f3ba04e91c60754
SHA512fb935724f9eda755e3169175cc9d444d4a942693dc6da3ae163ede05e8a7788b21f77ab8f62ff9fd65f7ab2c48fcdc86933138256a48ffe2d91a472bf744b46d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587e78a62e195d7c64ea627da507e54af
SHA1984398c465bcd47c41ab043d465ac620c4263729
SHA25610705bf70215f004d5d3d3c655ab8a9d1628cfa51d68df5f397c40a118db1b0c
SHA512ed88c00985c7381f5cd71fa5040abac231775a6ded193d65512a2c6f4dea933bfbdda2aabd4618b994cf649e194d0555b4a4966f95743f1810a560a3b089ec6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7fd1e2b00a3d871c04921cd0968b552
SHA184b966277ab1a8b70f298e1a61fad80e31fbf67f
SHA256f24d7e8bd150b9a114fb3ec2a65b6ab71c28b8d0c40b99318b32407beeba78b1
SHA512f63eae575bd8de7201bf4a2e33d4530b57d6007afdfd73753d53e4fe3ee21153d7673d70d59e9bb33ce27b8b796b6602a35432040940754f39dd990d997e209b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd297e077cad21e5185f6973acef0499
SHA119dcbc3f99ad10a05657d5f44301088910dd2a8d
SHA256fe75e4bf19b734bdb92412eab9bf22c3e2367b2074918f3fa20ccb2754b45dcc
SHA512b44b2e04f4e7ef53aa1a647637d2ff1a33ea4ef27a00b96bd91ea58d078891ced1c96605baf10cd5052188e760472e42a2a27f543629c6fa0dff1a78e92a3c5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da0c98e080be01d205466eb71338b141
SHA1533d68b0e1397f1441be2d1d0f1d870d46a6aa48
SHA256ac97b2f2c58c3b36d283ad96f4b9307880a7d55351adc12e187b027e7857cc1b
SHA51269751b08f08226ea55c1e5cd1eedaa74dbf16a905f2ef5b67f1febe62077b676162c20936e299b9a3791927aa6ad467b3f09bdbe01c5d4e31b6e1bc93075eac4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a838abe55186fe12033e08d10bac2ff3
SHA1c69a75d7d6efe9ca2f1616d0105c342619143290
SHA25615b01197f3f875ed41b2cbe0633d1d4b57519672af1a97fbc9a8525aaff3e826
SHA5127ba1379fdc5e937456e1f1b4254dc973290b56b43293199647a2077a018162f24e8a4064a33de96845559ae9246cf62f7c0c3e7dc07dd394a0f50113b9969752
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c561b50acfe451ff97c1333ceecaa201
SHA17cb31758e72b233c7b41d8924c44ca0023424db4
SHA25635ff5dd84e11935ebbf00021bff3d84aa4c39619e80845a3ef8731a03ba8200b
SHA51259a33f19f4dda3a8232d87ca0282196b9feeacd35a9046d681514d6297f4153dff7afffd511e6ec40a5e99fd88aebf6d245f74fda0e00c79f64880b3b16a4922
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab0c418cc5aa7080cc59cbe4623f4496
SHA195a007d6bb1075e1c04034ac868ebdddea8eb3ca
SHA2566820643bf7cb424e2811988d59b4479b11702d6a1c6182f24ef35afa990776df
SHA512e06557be9ac86f1edef8b4a8813b9cbbcc91dd902b7cf65ce6c9f723f69c95d15124875428db80f001eddce82f74f0e7e32ba46b9a571fee544aadc049579f20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b97ce2893d482ece27c9a168087134a6
SHA1a097966727cd58c74fd8e38faa4fb4406926aa48
SHA2562dc58e66f0b934154c085effb596ae9e235b3fcfc2c5663c673e7b3fa26eec17
SHA51235c4d333102d1b5da578704e5848a670d0f08e40ba1479ddd59cc1f7398406e88a43111b0a62015bea74091d10905e97c9dbc1304642044b04ecd794c9f85bfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5668287e894448a2e812c0e486d8eb33a
SHA1867229f816b37798573c09b597307e0b47e90cb6
SHA256d9ff8bd5aef4549ed5c92acdabd621f15c40d9b92eb7b440e0278866bdb8c180
SHA512f40250b7231562f24fe3b6bf42a5c8b0cb91e1511635df23aa9f1c05ab63f8d0323375796ef716727325b52ff0bb0881a9360ef33197343afa6ccaf23bbca180
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5a067bfb93b07c053e0696dedea23cc
SHA1ccbf2dc0fb4c35f66a6dcf09fdfb716820d1b1a8
SHA256a41060587cee16e3275d3e0a1f74a64c01b5f76981aaa8c6e579bdc1b85223f7
SHA51210ee8062aa6475d65a768eefb0617c0f41cc73060f749018aa3f9335344db9f5aaa529ef75c2b14d163a4dc6be58e8ad17315fb925bd8ba6c03f9d9557bdac2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dca380a2dc8e1b5f2103ff5dc5a01ea
SHA107a6e05276f159a13b0a08966dcb7cea4955b672
SHA25682d23d3248cecb826b6acdd35d87f63d0035c247ff5e186417786770ed7e0fa0
SHA512de37ba0a92f3534964d24796300e0da26d8dbe291c2bac11f8d8b38322e2eac4f7f9fa361775e16a65e58144b89c0e7c3a5b7cdd009442f82d459f0bd6fd690e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528e0fb1b7492048481227e0914b74697
SHA165e63462e91ea8c3e58aeb6cf5bbfc0f68640d74
SHA256cfe96441bd6bacb83f015675381139b3a2bf8a56c751b8fadd7b8addccd29a2d
SHA512ae4d96afebcf111dbe98fe49ecb2d3cd2a8d8e109e92908dcb57372eabb2111f9d42bf6f734b4d25b0a079408fda34e54834c7d3213444671cd2101a2c4ccf3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f79270d2072899bf54c2eb7abb90431
SHA1be61778b1f595fe2f236688a45ca528523058439
SHA2565df6aeac30293afd81da952eaebaf1b18b66228aea6f3f28bfff5fe23755d2f7
SHA5123bf471fb8c6681f56d7eb32b75d6f189a5ed7966b8e350acdf70be51bc69c79766677a4dfe49b8edffc90b39ef4fb13b252024ec78f299c91d40df72d5e56ba8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5535cab80d26e95d7f0f7dc7efdfbb914
SHA1ea6b6e227690a3a247231df5f56e050abefb23c4
SHA256423b7128c782215f5a4ce1d71667e642926a2c74503bc6ada43c18b57e16fb34
SHA51244e47c3e8f12dc060a0247f76c2e1680ed1bcb9fa451023f54f07fcfa814796c9c5f34da844e1f3595cd240f18495b509504042d34621d0127749f962a975e66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54534510faac22b86273da2e02a5af064
SHA1c2a6eba249c4317972139a39fa8a825a04f34046
SHA2569d87e9be0035a3e5aff6d5b653edf30415d62c64f9beca8580175e4cea9dbccf
SHA5124f380f3ab8996955646a7078a496ac5764472b6b196039c0fdd62c4aeb28a00bc4ad173da988840a2cc2ab2d3249ad9667c82b35a24931eb6cb1b95e6bb8a91f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dec3eb1c3cd10690b8b1b2e11409046b
SHA1699286d87055ccac0fb34c3285703ef8cf871e5b
SHA2564acc7118eb8412400eb73c346ae77a28a347b071d027fefe1104b64270938bd2
SHA51228eac6a7e2c5d39214b4299485cb34011823428c3f2b1990fcfb2f1ba92a4dc42857d1d1c56fa5399caeade7c733c6c70c2ab751193e41c60a547b9e6d3ad83b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51851cf8a0cc0b4c0c2e82a6c9993bdcd
SHA121f96de0986876b9ca31e42873fb0fb263d6ff19
SHA2567c47d0081e036aee10654da1c089b239e5f4aad3346bf1e3ae3ba15a82e2ab89
SHA5123671c778d909c459bcf92b8837b3008d00d6461ed645c0ed9dccf25f6eee43eb146cac075f92195404b2fd2c5646b023b80f684ee8a11df52e036c7602757d2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526b4f420e12c795c8365fb0cd1395762
SHA17f222b922875f47cc4aee58698c9dff29e4d1c50
SHA256a5f8d3720b852060c7a2331cdaa6175236c46fdfff9fb78548f36ec9dc0414f6
SHA51292b644aa8511f62f14c8d55ae2b8f6e36f3abe6f20fa8871018e8f585938193029735e8e4376274a56017c593ea7f6eaec5cca445ff37b90be4cb242a0303d6f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b