Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 16:16
Static task
static1
Behavioral task
behavioral1
Sample
f6637cc45268e6f06f144d2d07911cb1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6637cc45268e6f06f144d2d07911cb1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f6637cc45268e6f06f144d2d07911cb1_JaffaCakes118.html
-
Size
460KB
-
MD5
f6637cc45268e6f06f144d2d07911cb1
-
SHA1
3ee069a60d932042901b2b50d4003de1fadaeebe
-
SHA256
45fc6208c9f5548763628458cdb1bc41d706e5cf37e83f96ae86ae5a59981e21
-
SHA512
3c1dac1fb3293e6d19952020ff11ce38129927845a9bca78cfdc011feffc9eadd8bae0c1573f019367377f582c936281d952ef4932821be8737b9a136c2bddf1
-
SSDEEP
6144:S0sMYod+X3oI+YksMYod+X3oI+Y4sMYod+X3oI+YLsMYod+X3oI+YQ:z5d+X3g5d+X3s5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433442832" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7721C3B1-7B59-11EF-BBA4-FA59FB4FA467} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d08eb34f660fdb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000000c2f4b51192acd878073792285f318ca89eaf300385a0bd85fd3a030907937cf000000000e800000000200002000000041541841fc3cef403d47d0bdbd622816423b4388ec00f28dc1bffc21823a4325200000007293278bc50ab1a9ce5718b8be0a027d805e2f89b26b6dba12f540c2035f4a4b40000000acdad196036b37ac26603ed02ec0a3004635c4496a73068d108b892b775945aa2513302eaa024bc07a32758e353cee911f21874a51cd07801dfc456382599779 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2188 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2188 iexplore.exe 2188 iexplore.exe 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2784 2188 iexplore.exe 30 PID 2188 wrote to memory of 2784 2188 iexplore.exe 30 PID 2188 wrote to memory of 2784 2188 iexplore.exe 30 PID 2188 wrote to memory of 2784 2188 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f6637cc45268e6f06f144d2d07911cb1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b39bd9e08b7268af979278f00576624
SHA1374c3696fb8d057107e967d553cec9b10432c95b
SHA25624bc2d5b989ef684f0be8653e31b672d26a30085c4f2ebd09b0bc7dfe5cae962
SHA512a6c10678af680b90dab06fee684f8127c2b2b73f19acb751f08fe54eb224a29ca7fbfad7aeec91814197d173be4a29550f6017d2643ae545011c38169afc69dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b69ee461ee00734d43989d851daed65
SHA1067c068671a5314ab08b5ad6c4ee8017401b08ce
SHA2566f29dc24a269d5e56ed43705c06d4f2923ef5448afd5f658776a526647cbcd49
SHA51225e7987a4be2029de8811fbcb1673ba914f673004da43917a1d3eaea58bc2e379f33d93426fce76b1bb7089c0ce2827e54908498ab1e99af76675039ca1e01fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538a1f9e4d2e23a251b44a5bb01740964
SHA1fd1ccb19edec32eac55af7f69f68484ef91f375e
SHA25695baa07cc61a5bbd1f2191ffc774e865415d4eabc425662aac466b402fa4d962
SHA512f277d4d03d75027f3e73bf9806b21e291fabe81acb873a4727a5051b07037ddd106713357b07bd5b1fb5d65d21b00d0ef6baf5d37a76e4b412de85919daf9ab8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5991e5196e751ca531b59a65635062164
SHA199ed18e609e7fe93a29ab3d39e780847bed2cdb6
SHA256b5ca6bb5e580b3251cc15b6cde1adea3730ab7b196f40d392778d5a536342f93
SHA512ab76f8de511429df987482341e0c23af4d75e9cd3d49a34b939dc51c9d03408df5fa31c08485fdb48976f2babff5a2676cac0058e919529785c3e859c6315938
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5c7cd36d8808081e26dfa4393a0dd06
SHA1675c35fdee53058f725d56e49dc59bf25513ff58
SHA2569e03a3eb1a45f59af54d8fdfc382e80be82f51aecce9ec7e2389e6b561f06318
SHA5127ded4c06b87963ddbda4b548bb01c7a1e64482d3b47146163a5425a702fef0796735703904e47d0491b6b4e7ba05ca8cdfa043e0622e44e165c7d76570b98595
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da496ce5ff007537c1a641cb68ea1160
SHA1d68f13b6368ed484f5c468d9863f47468540867a
SHA256e3ec69835c6fce3e0bd53badf5e22cc239bda4c216147fb2b070a0f8d0b977fd
SHA51248157d041778a17e313ac04386731403b61c3b2366b1695a37488df00e339d821928dc3919d6e25493b3b36b84b967b2448b8069cffd17d59a8b0ec25c40935c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f261e3b81b36d0fbf8da5524d600ea6
SHA13bfb56b222c2829337ca1ba66e62473f636f6a7e
SHA2567906adaadcb47b1f4359b1423685983806de05dc59332ee39444abc60cf71a94
SHA5123ec8941a50a196b04f05922f05c1cbc37b4fdac08065bc52c602517060b68190ffec53f935e5dca7d3eb5ac7f4ab7ac283da9d2c4995e63499fb4f405b2ae31d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2216b79c22c28068d0ea6cf7c5127de
SHA10fa7dfc7e8082eb3baee4a5004af45b6c02a62f5
SHA256e5a3483e5a2d420af4e8950bfbb9f04f78ba11e06b49d60da2226b9bd016bd05
SHA512730f1e9482a00d501994fcc53c70cd71d75894f06fa3c4ff3139bc7aafda0dffd58bfb7645ef2c4864b18c5d27d069e3b55eb238c415591f84b2580138e0ec95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5707799fe1e171e6dbbc34ae98a7168e6
SHA17e22d95e70656bb23bdb770d2ee7de5d85050da8
SHA256d44f72cbb1b6625789d7a45362ed6bff9ba109393a1509950a34cd636ed77603
SHA512b168bceaf65b96d7c53531ea8735915bc5acaa2310927b43f2d2b8f8d6117b1fd183018a1009e4def9745939b2bf438e3bdb4f19393d2121cf522b203c897e59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be9a44e37bbc2618d143f749c5d7a665
SHA165ab0269592fcf59b3ca632659981268e343fd69
SHA256f6ab975799a92d3efb81a9cccd09968cf5fe2ec6779ae2d75df4f281d9aadcdb
SHA512ec7abaf82861fac3170f756ff8913dced312a4740b7ce03a20bf8048ef4fc73f64d64259274198f869255fc50c6f4bf2d6d9ed8296fc9d31f665a726d63f24b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593ff6c7665e3ed9c1ac7fecacace6e7f
SHA14b80ae0f7fd94c6f0d45ef4992e024480b1cd789
SHA2561c330aaad41c5fa4a1ec4f5eaa6242409a25168fcb7abf8d91944aea70472a16
SHA5125272d652a6d4ca459837ce67c10f2d9160d440417657a6bc027803ecf53ff5bfb8ef1b56ea32b283106d3e1e2e6ccd055141c67fc206bc999d5933840e1bbd85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53be3b72ea318e40fd5bd0d7ea65cfd52
SHA10be0de17ebdb8c34fa50f0749f33e1b93057e00f
SHA256799d03e3d74f3ac95f75cf510d31b72e4cd267ac146d0a6fce748b613fb84577
SHA512cbf7e548d799e74fceca693d94d89ca85cb832843e3708a728447542cef2dcb36a0e8b52855a64b44e9d05517e201c58f8159d2c410f671e4853f51ad99f6b6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d6a4b2c0ff8f33d3b832bfcefebb41c
SHA1c2fcda159bdaaea80bfae397be84b571ccaa699b
SHA25642ce9cbebc8a4137991e615ad42232ad0eef5dac1dda7662ad983390b31ae4a3
SHA512beaf7ef5984fe8fb9fa8d1e26d8b87a57490736bb7209982dd5cb277f90af4e1156b2679001e556ef9af3f0deb9f882170fb850e3c0bc31b7d8856aa49df49a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f6f69a27edc73d9e259749ffabf1ac5
SHA16ba3eff65955a48fe80c84235bd030ed373b2ec9
SHA256b7ad7260626938f8f21164bc9aa46a86f575e791258dfd972f00f40c56c5a05e
SHA512c88e50d312300c8c85ac4fd038318711672e86ff574543bba9a09618a4e323ab089e949667cf2b424df055e531b8090946a53b3356c250182944b04a5040a2e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1b08ecc63d2cd98a9718a59227c542f
SHA1366b1434eb36189f88e649aa928a021d3f676a30
SHA256b34a34d475373eafb3b5f5f90d5cde95ae39e747881b7973b1b0a67db240b2b3
SHA5125144c8b539e660d7425751187f1c3597f6d4ff2735383651794f9a73ce5f8602dbd13ad5d39a35401c857a091c22e7e7968b39efec693cf29cca49cb91059bf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3146e8b67d8b96a00fbfff4f6906a34
SHA11b619e9175777be4471b9b01a670a01ae79fd725
SHA256e7146b7e9a533bdc85052923fc1ddedd4789bd049aee2497c583c3b9cb77806c
SHA512bb4bb7d281cf8bbdc707dbefd2bcbae08beb1c70ed0d7866fa5e313eff2aa3638242eba4e04d53035fd0cbcfac22a82484bdee6f8cba62852e8aee66affd5ae8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa306bd59e167a4b6fc2f7a8dda30c68
SHA1e12b056b517e4a15b47d71046cf7a3ff9dae7949
SHA2566125369594568ccaf84e02982314d5f3743c528da04327f4ce4f2ca1ed79d37d
SHA5127bb9dc599ca7989773a577948f2d4594d38528af4eac1e601a2c98234f4bec71d1debd11474016d43257657a5c7e3a66b671f65d2ee640cded1248360d262ae8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1d77caa320d9d14fb3afad5f3cdb36c
SHA1108b393374e7d92ec389c9b0675518f6fe94c5a3
SHA256d4dd216e3d084ada75c41e7cc98c68db71f215c4ee38ba90533c45a2984b7210
SHA5125c6758ad887bfa588cf6bb0678a1606e059f723ed28d64ce98c9d73b94d5f6e0eaf00bb41904b3ea2d7eab161259f9eb6490aa46a175d5d3997965c625698a6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585e71c469aaacf254a4cd9ea4eb093e9
SHA1f087a76c3e7ca286903c71f77cdf9822365dad8b
SHA2561b8b56cd4b63f1657a37447f11d91dc0b40f468ad59aff26748a5d00b3ef7cb9
SHA5122dad06e65204edc5df2a1d98e792f964a0293e3d86901c13e5f90dda052cf33717715db4e57eb49dcd2084ef63a52f9d94417dbf327e9e62f963b28c93e263c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8909a00abf7045999ae8afc15d1a920
SHA1f7105614d1c2171bd780e974658d985bf7519c91
SHA256ae2a151f3d274550463305c5d8c1e646066c298a67aeca070a988a9f0eb6d157
SHA512203e1d3a69612938106e6b87827c8e591d3bd21fc29500e776ce4c97be3992959ae7130e9f80454590c01940794a9a07d082a3e30f7ffb3671ed09e787df36a5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b