Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 23:07
Static task
static1
Behavioral task
behavioral1
Sample
0391ecf983998f43a924016d3ef74451_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0391ecf983998f43a924016d3ef74451_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0391ecf983998f43a924016d3ef74451_JaffaCakes118.html
-
Size
82KB
-
MD5
0391ecf983998f43a924016d3ef74451
-
SHA1
a84b6f1cdbe7fa246f017756e01a3381c6166700
-
SHA256
9b876d357ddcb08b438795f8b58588c1f5ee4152aea810f31d1ab15da07722cc
-
SHA512
6fab64791f5729983f5a89798e66c7aa0de01b9a7d2f487e15faf483355b93f08dd037c0e176bb6406b06c1c0bc2afe90e33c64999293651d8fd200e56565f1b
-
SSDEEP
1536:F7yu/yM4RUURwP8FYQk6kFob0GtEspq/+mtLioAxf7N7350SWMuwK0HsHFR2u7zQ:Fyu/yMmUXP8FYQk6kFob0GtEspq/+mtE
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000306c82f122f605fe1f47b1fdf9d351641f3ac002056969ead98114dbd9f9c133000000000e80000000020000200000006704fb4fc40e1dc09ae7aa3ae6ae21457fde30f20f69593ae4ff442dcc15a01d20000000933e19d3eca9b253b96d6656323b7aa8a6472e49c41e2192e2820a1078c39a0c400000005e437c5569485d774538b0ba7ee70726bf574df46facf2a1c6c0da35a664f6de981067ab8b205fe6a139bc5d511f689eb8442a952757d446b4a0d9f2d751771b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C2D4BCB1-7F80-11EF-80CF-C28ADB222BBA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0112acb8d13db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433899515" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2180 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2180 iexplore.exe 2180 iexplore.exe 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2332 2180 iexplore.exe 31 PID 2180 wrote to memory of 2332 2180 iexplore.exe 31 PID 2180 wrote to memory of 2332 2180 iexplore.exe 31 PID 2180 wrote to memory of 2332 2180 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0391ecf983998f43a924016d3ef74451_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54525a04fd5c1496865e90ad0435a9eb3
SHA168bde27cf82480644c232955868ae2ee21e2f9c1
SHA256851139a34ee031bdf18034d607fc6223e01f6ee605cebd861eafdfbf22586428
SHA512c71fd3bd8c0dc446e22927759f6c6b47c66d7a2decf93093dc73d2d9a399ae8424d02c179e6d99bb89059e62b13ee65c3c8daff8455f87f159efaa36ac21bdd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a5d3cc4628ce28ee430d621085087d7
SHA18156c7c92aabc3a3604f9d6adcea228fcd9b1f42
SHA2563f0db5b92b4a7fb6aed63921d8aa91ab3f36b74492134115d93e55b4fb7a52cc
SHA512c8b1a0b6b22c212d4084bedde9b4cea36012ef09c319c408f4cc84cb2bce309d9733a94700cc72ee1421db5f430f55c76ab81f830c886478582898fb7984b804
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1f5e83f14f84dfeedb3fc250c9275b6
SHA1385cfe272582043d86c23ab64105293d6c5bb58e
SHA256d02298e88044ec3699de4a3462e19e70e0733f6a6d2a77e443809f0124aecf19
SHA51243063b3d2ef0a5d932b4119540e0066ca2a7fcd03628fdee4fb430b8f89cd2f11e3bd62915775c7659951d27f0ffd2c90289e40dd7a05a8fea6019e000eb592b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543b321f183a923aa3740287fd41b5c88
SHA1bf8c24384e886345d40381c8e692123ab710d330
SHA2569f8342d5b63c3cf22d14c51f928c4c75dd30efe97b512edc21f4ea2ba39271bb
SHA512d136ea92559f513dda99affdd76e1c28cbf7a9d8b7c4374f51f98fd278fcdf434110d04a9fb3f8f5f458350e9bb30b9e1aa1f512ddab0cdeaec0d6545e7a8476
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bb8378a08755239c05b2134012e22b5
SHA13397616474568f31a821e09c6bec2d09c08f7dda
SHA25631d9c75a2bbc2760a4b67b0d2d25fb096aec2f2c93423b918f9ca4503941079b
SHA5129919815986dfcaeb6ea447a56eced9b7fc074e92d719fb3bec53e9b7d82363e242ae15e0c6cb2b9053c3978d738256af3494a60223ddbd8a11b778dda8b64756
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1b4df48dd695d61c2f102f6b76c37c5
SHA1c403421ae0b8766333fb45b4a7be0a617324b8b8
SHA256794650bbc0b603ec8b311ec735c9a6a89d618f632534d0481dee2636a00ad347
SHA512bdd5b33ff7efd1c46d21670eba5023f62a1f66a12f6c9cabb2e614ea2fa4199a896c2bbd941c322f2ca7e463b61207769d18079cd4611c7b4612c44ccff1c8b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad18345084c3d42dcae925629b3554a5
SHA19f7e17acd95bc645197594c394cbef2d7b7627c3
SHA256374d7eac6e7538d869ca555d49c2d194469f45dc8a322389b5786cbe04ef727d
SHA512ceff02e331f1fb7ef9f7b0a73380ee3c8abb5a3f7946383cb2e812fb404a26788cc6f4cfbf3d2670889914fa41f5c6d4a01175712064a397fffde157e3601ab2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cd630b2d35e10fadcd03261531ae170
SHA136b07d123fc8fbca9d9d9b88449d180263d9a588
SHA2560022df628e992dee55ba5f348c200321fadebfd28ef7308698f9310e6ed74846
SHA5120a7c3e4fcae5cecd4b7e0e2fe74a857c5a30fcc461b93594cc254d7db6c2d060bb1b1ff6c692c2e0397326e2b14231378c8ac9b0c20ef469527ba2f0a558f4ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ddc03af737996ea8d26feb3ebfe51b1
SHA19cf6f78488db1cb07c1e193ffaa1c7625e37421d
SHA256abf7e049ea88617ae15d44fb46ecfc520835fb0b9b32e933c7550c9661337c8c
SHA512c902d2efd5625f29dea6533c958aaf946dba26af3d5e17ac45b8a2df9224e29cd79c43920f5493413d4c917d85de3842eec0c525c3b4e3ad06b409d739c33f48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7f7f000ec506d68b5c6e03ab75a10cd
SHA1eefd70a5b712c144482f022da02533ac11cd8032
SHA2563a128a03f588d0b1c6b7a58501445c1a2343855c64b1eef25087b8850d6d87b8
SHA512dd57d8fb41e90daf7a6eb3088b757e5084d74b8814aca5a4421a4d40faf661e9319fc85c324d8fb7b850ab8e52a1fd6b3a60e3716baa6a5b2dc8d1c3c0402810
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52da1eab59a1feeda26f825fd5c0e3a41
SHA17f2f6643f6186a1281371d48222b9d891c6998ae
SHA25680af8c6547c60fd7f5136aff392a0e3f256103b1fa4843119253adb8e09944a4
SHA512ada9476f6225f848b819cb7c66a1e89859f9753978b48e97e7d792766cdb432cf069b9601bae7477a5cf3a21d4423f1e19595296e652feb2aa93de7c6058eecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52afd0c219cb4925eba9cd8c6936cf056
SHA113d78deade584b52afcd3c3ffb27d322116561db
SHA256715c36113e9dbec714fba612f771383f1be85994332ae3737de0a6a1c7ffc22a
SHA512775614789193dc8b48533077f0d4d173c8dfd39e2d8f6c788a4ee58ad52aab6fa9e40b6ffbe040b302e12b6cd8bb647fcfb8270a2eaff2ea14febe5e6e66b3e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4d5fe4fbdc11673274d2f0babc682a4
SHA1d206359719aa6bbaeb410c322e8d18a30f30cb29
SHA256fe55bb6f172727c9342e64e52fbca5b25c987acc5970d4519ed9ffdd67516ac1
SHA5120b5bbe3c26d5a1d182453552fa08825fde7b048ec90f8be669a681913a477f6255ddaa078b4ce10a0b24c76943f8ccb385d70e21348e116a3c569d6d7441845d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d57e534a2f82644409b5109316ceb408
SHA1d8a6288320b21f65e92c90aeff4130aadfdbff3f
SHA2564b5deaee93d606009d4fe2bbfcc219c39b2e34e2be49a8f8b78c25afc4a447dd
SHA5126b575ff1dba798c0f1de919916adee28325cc6bd6001b6863786f6c099986b5a56813f499dfeb8b6379880a9e692f86856d3b6ede6a13c3f344c24f757df6e72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ef10c5d7f4287612e4067ee387e0d20
SHA16ce7297d5b50a289e5a63df7c1e0f9adcde48c50
SHA256f85fcc21f845de67aa4432292e34da564e953d482ecd001155db9f0603b764ef
SHA5124c943fed0f3b9eef39bf5079c8e9631968bfa71ee920ed9233eb27aa1a4f27a8b29757d8601c6d80394f066c682495c72f9cc7e2c1857c6133d05a86a173f8ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56df468adf306996ab01b4f3e0aa25a1c
SHA1d06af0f2469d45f07f6e34bfc92119bb9a5247cd
SHA256f40a01b0feb7ddbea81d2925d5675fffb22532d1f3d388719e3fd001777f57e1
SHA512df854476a06fbce103fabc5194cd83b6426c118be7c437b15d224a4cad4d746433df389eb03a802efd75bb7e3469d9b5642ff1e923ed94130e718d0fe03a6fdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d36b7e95ab0d37a2d0316e6a88b54c2
SHA16d8da43dd55acc3464d10fc067a2c5602798ed42
SHA256d8f4ab905f135bde9aedb5fd91807bc8fa730c8b5e7eab2738d02bfe354dfcaf
SHA51247b0a01118ad59956177cf26abaf0eef1beca9148ace4acc45ae31c0386a439e156f394765b9bba839996d5599a8e606de93afaeb7ae9a2aecaf1d80e1e97f15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525cba29fa6c866c8c3b2901e083296ff
SHA1ec1d26b6b9fa0e8016532e85a64254ca8ca1b98c
SHA2560d1afa82c9e430bde4990cc61202e26b8a35071f9336a00abb0e5a932d88a97d
SHA51238ee964dc8410d51ff55e7eb811496987db86eeafe065fa87aa07e7b1c24c80c9d17b07b8cd7364f792c5fab9852f6120baf7e43ae1dd34326a7cf9d09623e75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bf804b710aa56b0ee3a3d6df7b71331
SHA10d5f188cf4c814be54c2cc646ad952315269dde3
SHA256a03482a1965f60d9db5b2f0ada5fa00a48e4cbb512d913099f35718a71958554
SHA512423254977bb9e781668b40a7357bae81bd17667fba3cc6002b24466c7408ca8cba61e62c507b311addbc9845b4d49cc6668630d774672caa067eb857828ea1c3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b