Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 14:50
Static task
static1
Behavioral task
behavioral1
Sample
f64007228d5708d8e886f7b180cfdc12_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f64007228d5708d8e886f7b180cfdc12_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f64007228d5708d8e886f7b180cfdc12_JaffaCakes118.html
-
Size
16KB
-
MD5
f64007228d5708d8e886f7b180cfdc12
-
SHA1
c42b9ea7d8a7ff07769901d83372663f040209ed
-
SHA256
cb72bbde38a3a6893ccee557855306552069ae12d167f4533e783d35e8c38817
-
SHA512
3f01a127ff99fcd772ef811090dfbb924dca1d5f65af4e76e1e7096a7222d00879fa1cd830e3a11616de4021262d6fd05dd7c59c26d4722217b0a41c12032b27
-
SSDEEP
192:CEGMgBEOks1QTxE6av//X7/piU3lHHk5mv5tf5Gp15JZ5S/5/N5Rsm55o5q6:CEPOkjHav/T/kUV0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000a7b3b6d8e9762be66d516cf9f5f14fe920ea2b9a2d996d5280a9537bc4e67297000000000e8000000002000020000000b7ba0910bc255d55c726c6bcffdc9c625aceeeeaab17dc047b418608ed5b960d2000000079157d8d42220edb7882403a7c7f9017fe75094aa01b90749739080a37c61f8e400000009728f6517ba292a209eafed1bc5b9a6fca926bc1baa79a9835760acf1e23f620f5c75fef028d195d5004964ac6ed841454901728257c576dd5505e679374b113 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433437727" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{93B61281-7B4D-11EF-87E3-523A95B0E536} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0af846c5a0fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1236 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1236 iexplore.exe 1236 iexplore.exe 2468 IEXPLORE.EXE 2468 IEXPLORE.EXE 2468 IEXPLORE.EXE 2468 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1236 wrote to memory of 2468 1236 iexplore.exe 30 PID 1236 wrote to memory of 2468 1236 iexplore.exe 30 PID 1236 wrote to memory of 2468 1236 iexplore.exe 30 PID 1236 wrote to memory of 2468 1236 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f64007228d5708d8e886f7b180cfdc12_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1236 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2468
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe269ceeda37da7384934a9765758570
SHA180e7d69bfc3b85fceec5779e97e89eb8e1ef9cd2
SHA2560f912866f706f3d7a435cf8861025fd7830d5b4cf116c9a89311457e10c4c892
SHA5122b6b01890676a8e7afb3d8d153ee854a13f04f946ab58565c428c68e6fb9cae9fb5c69cabc917eb760074410694f6f9db2c2ce489a9940e157c360b82f81fbb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59124f531c7b1c16f404fd3f5821c5131
SHA1ab9141ad8f8537ada58c89653ba5573549858dbe
SHA2569b02476de5930d8a71086dbac929b65da2d499af126390550f00adc6d3497a2f
SHA5128cad2733406a6174fa89059605d400ae2336a7bab64aba19a6a2bfd542b9c81e6ebe35b96c56a83195eb398ce655fc0f27973584050817efbcf9f3ddc508b5fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9bf22c41137418b716b640ae90fd620
SHA115b3f7dd962bf83ae1c22a6367fd24314f9d4830
SHA2562d51d995a0797ca7b6154fc3fa48c3f1d12e9292d945ec698f1f8887a1642f19
SHA512f6b93d03f85695671d44d4fc174c082a3cee2df1947d096a346fea2578a6c4d77270e953205be95933fb75fe09e1514a3687c4539c3e0610bbd68440b24bddac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cf2eacb9386dd87cf456e8cf20e6e89
SHA1cc1246cf8135c381cb358e7e04bce0ae7703cf0b
SHA256158da2c1d63660a358c99078423e0240f4349f0a3d635db8c942017b9dc262c7
SHA5125144af0b5b57f84617c9b3048ccc613d9c87ad442a02a7b078a8fa77c527dea624f64c0d0c3792f235bf03d4051b6fb66f03bbda18d89879a3929a592d30ae1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f04e177160f769031a1aee8d7606a8d
SHA1125c2af3ad18dae1ad4c385447828d47c3957789
SHA25627610652967a5f594f2ab0f04eb45c581414943c7bf93c2fd6e52417c3ccd15a
SHA51215e7eb44f31a0128c4308bcb25b16fe155ccffd575e92edb5f61077de972c8dbe6a0561240baaa4e7d7fdea643072cd92b59b23897ae401b19fdce8f8e1ea56c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56605d3104b01a52d8471e49d3a419f57
SHA18caec2906d896d60b54583611bb1d3063c6fe5d0
SHA256c5b59c296f7fc464b1c00c6c4f7e80e3dfb7092d8bfa21460e13e0a3e1513650
SHA512ad76d920191e40719a69cb0fa40f0b1fac40e6dd7a61cbb361feaf353438c96cd59412d5c9d46fed8d69f58ead4eace0219a7b9b253feebb374444dc24ede23a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5031ad58bf7f67f7e76d099a3359f9cc3
SHA19cd8ca8b8e676a59d0ed1b9cc6d529894fa0ddbc
SHA2560782c5ea310f141dfd006aa923240248b551c057c2c6d34cb1b1fe02ebf2a30f
SHA512c1cdf425042b812adca588f3e8155b55843879daacebab472d8d1ff7de4207f2bd8faceb0868779ac71b03f1ed6940c203bf468cb069f0ace802965413916c1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fa24327fc6509846faeb96dbd81b4f2
SHA13496571e0e7f69c0793dad354f6e8e6d492061e9
SHA25672862b2156307cab3ec570feb94bf9ce23f2280256662fda443d609d877860cd
SHA51287866c22d7436d895990894185f6750d68f9677b49e4215e1384c144556ed0aae50c96a75501a94b041336aafd4c7f44a92dc6542986bd581a17ed8cd76070fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551305bd1717dc6d9664684fc6fe791f5
SHA10127fe599383eb184ab6b21f380d819a1a41341a
SHA2567e170a4bdfacd535557016a91b4929774be84ce670ec533b3d88f68cec838c16
SHA5125408445c4b9c1edbbdb3618ba30643adabb435bbdbb8eeb4391c6bafb70ec17c5660aaef51f8f3e24fd4f52d7c2aa21738acfd6c958bec98feaa81af3fa020c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542e27811c3fd7b9f91f5527a581e8af4
SHA1ff2d22d9f233a39ffb0753b8f5fefa5b8e06d777
SHA256577ffe925e0bebf395b9c30534b2538ad49c8c275e5f934359c2f77e9d8ed925
SHA5123f4645f897a13bc44d9da4be4d6643ab6ca7331bc8545948018dfe9d8c21912750f637cd4d4405d31ef84e008d8f89fbc114d382579884a3a4a481ef98a7d467
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58941f45130511aca4550d02857848555
SHA1901ceccca74c1d74ddcb0391b7bbb48c775d955d
SHA25680c9e81f1a468f4fc0f83d4ed75176726fd9b38985802bf8a6d961c93bb7422d
SHA512e5919e32a098d0f71f65bb0666cae5b9766c05a433f5e5ed19489e5ab8420f5896e637ce06c013a82940045450e69a60e587c299d28d038248b1ff4efd7d2288
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50790806ea93fda36a905fbebd8d3b863
SHA161584ead1b4ceb8e766313892aac38a8860d99b4
SHA25607ca8a165b8162a49b2e4d820c0e683d627882db4fd843310abed34a53564f60
SHA512ab0df499048d60428eba904290c49b9a08a5c2042bae1b997cb642466165d4e4616fe576d6a0062cc650e1a3529e504d47df7ad5b24def10ef4d92e9ed4efbcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5815cc8d900c4b496abed81322c22dab8
SHA19f59ad8032ac46732a21c7324e159ec8c42b8fd1
SHA2564b8737fd2f07a7c9aec6bc88c5fdcda329c522f3b7c7a4ae46193c010f7e9d0f
SHA5125b42299fa0ea0f6a7b4c6c5745bb41ccd88e94995d3fabf52048e1da42b59ca63a82b57ba90428a80b29486b98d8c9595423f1d7b8500d5d8178e9ad07467648
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a9651df0bb2ada067599a42b70eda06
SHA193ac1854ee4834b4fb7a197494c2e4d2e0f6d09e
SHA25696544a2110ad7812e2e1b7bcaffe18b10b425ba8354823eddcd93d00ec8760ea
SHA512b75568035f61debfecf18aeb21b66a30816fb78fbe0dea468eb68fa6c1f8205f6cc5b8939382beda92c03e294c20eb309387ff9298fb4c1071a6d8aa24ddb374
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9004d5c48e9c65330003daf086116c7
SHA1efb230a470b00f1bae6327cb01e5da511f50bd92
SHA25642acc2b9c4c5fba3d1ca884d7695db1b5e575739df35f743f55c82758b2d7457
SHA51203c35d7f3efe076525f196642918453aa293fb36fe43cec592a06cb6eb0b59915b6c60fbad7c3345157be5722087e9fd911437ea28424a352c3dc6f36005e2e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dc1c112b095cbac53f3be59fc07a5e2
SHA13f8a05d1671f01a9a757eeb4c1a2b77f4fac6b1f
SHA2569b332628bc99f1237994f0cc74b6ff8f111534d0816e11f3341ea0e2de0d4aaa
SHA5124d96dc01749b0bfd10b0b1c22cdf2c152d8a974dea1a552b85110cd3c998090d38508d1c233e802203c37f6d83ef279a8957691923145d28f0477de3e38e339d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d7045ad947d5d5e53ead0f79b9dbf2f
SHA1bc69436290ab40bf77009d139a0f966d6e187921
SHA25671ae9d0043b2720c1cec0f3a81eb6ca8bb93d2f99e4acaad9e9dc661744e1bb2
SHA512112b18be06874665a2a5fbe294ce2431c5ae6f55320fb7c163056ddbab43abc19509d4ad74962ebb0d620bbf405762dda9339acc6b4b2e6dd8668c74706cb98b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae7616c843ea0f3bc45ddb0ec3aee50a
SHA15c0780934ad4e51c594af5cbf78a290fe1f44849
SHA2568f4bb87d7d485226122b483687a814d7800141daba152347c7123ccf3171ddda
SHA512f4a2016167e52874bf5a1743e0eb389db380a0ad46c5b92764a3637c09a61153216b61e94d75bf945e0c8181a267d6c50a14324a14a534691240b05e4fa418c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fad475243173209598a235edbf45ded8
SHA14cb24bcfff1c0b3ac3c8273ec966a66679a43930
SHA256fefe13bc1149bae8aa0d35c2490ec97a1cf5741ae0373b7fd3c86041aebc2fa0
SHA5129ebc7fad866c673fbcb4dc239e92a84cf7fb7f51d8123594154db6c0a59cc48a7d80405710415daf16964b73aa0fc6e7f9bf32e79fa81878e8988fb42509dd11
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b