Analysis
-
max time kernel
80s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 23:26
Static task
static1
Behavioral task
behavioral1
Sample
039c17551b897898aca6edace50c2605_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
039c17551b897898aca6edace50c2605_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
039c17551b897898aca6edace50c2605_JaffaCakes118.html
-
Size
11KB
-
MD5
039c17551b897898aca6edace50c2605
-
SHA1
1dd2b668c1b69ceef7088537358381da72762dbe
-
SHA256
7cc569d220856670d36911661f307549b3e536dfae601c733176ee41ff73e1df
-
SHA512
27225acf00e996133e4bc6ac03a815c9ee8afa81ce255c70c604429ef4e3aecd7da2e9c6cde3397aebc3b116cf84dd2e65ac9ed206c6005507a25ac44ebd73ee
-
SSDEEP
96:uzVs+ux7t2LLY1k9o84d12ef7CSTUcGT/kG5pJ47XTu8BdF1lxw7XLjlVHcEZ7r+:csz7t2AYS/VSJuXTBPyXLjPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7ED183B1-7F83-11EF-B6CD-7E918DD97D05} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433900690" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000001bd88168793db80d3cd86d6187ab036b365f483faca1fb95ec66fa7e6b19baf9000000000e800000000200002000000062e7e794b45828f81e5f43e47fe477a929f1ef678ad24af0bf5258d520eb9f7f20000000ce910516ae079dc8aff8efd509c4a24032e25574e01a3c168ba8c7151c48ee7640000000819ddcbdb337dc43140bbae4845483fe6a1ed9d702db21f3f2ee99335fe90770d964ae132adee8a7553e8a99c6cadf0813ae127c7b64fdd64090dfa8c3c3c350 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20a772549013db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2216 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2216 iexplore.exe 2216 iexplore.exe 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2808 2216 iexplore.exe 30 PID 2216 wrote to memory of 2808 2216 iexplore.exe 30 PID 2216 wrote to memory of 2808 2216 iexplore.exe 30 PID 2216 wrote to memory of 2808 2216 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\039c17551b897898aca6edace50c2605_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2216 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c80e9b0b96c3929f507edd291d91480d
SHA1bfcc968e6ab59311bb7a3b469ab0c6a3853ced16
SHA256a48dbb87a413a45219ef16040011b0dc00148c189ae9d412a43f066199d817b9
SHA5123eb962ee85a5747e750caca6c020ce90d388fddc7db446df9451fbc100b0a266d007631ebd48d87eabb07416127ad06197ab89f4914e01e6b299cef09d99df5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5975cec0f1308916575f7a242c9d82abc
SHA16457f940bbfe9aa0e6aa2d5c985d2b4ffff4f2fc
SHA2563626832d4ab6d19a5e9d5b17bd48a25b892e89b170868a17832b907a41445136
SHA5129f112436bbbe870a38eebf81409fc8faaf000efe90c6a23f87f3c230ae5e96a0360add95929c5f2ec2088b1326430809ab392a94cd1f482416cc3a0458bb89d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e85d5b0ca300080da3e0a6a81637dd5c
SHA1a5968dbedd8d99509b7013915b72c03a7e7725c1
SHA256ffb4fd9e0be209f3a7406e213eef8fed3de76f226cad480247b233c8c8da4923
SHA5125fd4263a1f0070c12b0f4845b19905842331ca10af92d99bc9f73664f27c75b1cdb0886e1363c700d41b9feb5112a607e33ea66e51953f68cd575b1d7221b986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525a57bd29b230376ef20469fe45b979b
SHA19cb9e716599b3afc86e36d089b613cc33f70b9cf
SHA25651183f69dfc75ebd78daa0c0512978cf137f7ae56503553e7fba0ed1aed04260
SHA512f7b9b0902275fb15189e8dc0577be6b2fcabc5e55de5be1c5541efec54cab20d2cddd9b060e1c73fe17526fc3bcf572b56645d56d4cb69f1d0ad56aab70069e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab9af9850e0c6f2be4c2f18e5a03069a
SHA1d779df75ba0dbcd201791642ff6a94269c0046c2
SHA25680a4be4930ed009048e0265e52fbe492501284b07b342b0e5ec06d6debb19140
SHA51251edbce5364107b92b3ed1d23c0509f7538f717040acfd4b4c20f9e1fd79495dc52d218359a706d1f83448a16c442577816707058fad9ea0c56d99d7e135b1b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7c143ee36883945c0572b9e8e1d3084
SHA1cf90f0d305c30ce5ff40bd02ceef8cae8f6022a2
SHA256c3313b6c57d7dfd22c2e87dfa151057bcce9532c9f63113a13847395640c9050
SHA512ad3195f97c851cdb6b2503dae534bbe436c48ea0d1a9452761a7d35f76b1c535790014498531d5d5e559244cd34f1b3a4ceafb170868d9d1b9c0de12305686b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d22a90dd8702c8a82b24818bca0b63f9
SHA14caf44434ba14111710df5cf234aff62ce86219d
SHA25644aa3143d31103e530dd75f67406afcfd0db37ec9499a9356818fc1582e5eba3
SHA512c6012adb6998ad122a5d3dd03441f359784e348b576051d730365eaef550dedb2d885bf641a40c79a14ad09a701c48ced29a510b408ac636e2ff0605b638f4db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592e657123da5881ca01d513da23c9d42
SHA1b8444e48691f0ca1fa3c00338ce5c895388ef606
SHA256c6d2673ad768b0adbd0096578b0803e6b25939574cfa8c94be6f32628a709d2a
SHA51275f2b5cdf4e69c10fa2cbb214695e1b9c8d422eee5dc46f673fe21f593419a09d45edb445a2cf6e85ebba015426211554cbb14b0cc627687afe6423b93262f1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551d948fd12718822b40ec3edac319d3d
SHA11f16911cb6336086c8a870f936c64cd7105f56c5
SHA2563495894c1ca300746e0619e0f7558261c927c554692267773a841e22f71b02cb
SHA512b375b9b0a7c3d716f32130d27d10e12337e54c6818e0d5ef50cd4062d1ee51e5008748a9e24fd740a958c09f65cf2927f4c03ac3a2780b244621f2b5ff4383a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d326304bed0a0a46c3dfbda9fcb7a3f
SHA18eaf5b391bdde0e0add2528a17c8ae1bacfff430
SHA256fe0570951f6d44a77edd2b02c1ede515cbb517adfe77a237e4921a65af0edb78
SHA512e8e42b3732e322a52667e54335dc369402ee559d560f1c56f4e17b7f25fe3e36d9fdf20ba59fdbac5ec0b6fd308479483d26e08d06bb98b949d310556b1401b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51864f65dcf7e1011e3fb26ebdbd767b3
SHA13c4fcae56355d59077eec531207b8c0cf8ce10cb
SHA256fcdedc4b872bc9d2f293a0b901ca82bbce8dd912871dc3fda1ef1d339493b6d0
SHA5126228416a79378f90c2f2ab98fa51f61e273f13606313161b4ee0b4c3460e5a77d5e578f63418d019df7b10c3f6ade09e2e78c654b52f4443b87c6b6bbd45cd91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502a7f8ab1a7318a36f22dd69d48fb767
SHA1833363f567e99b0ae5eb4d16d4f6e13aa134f291
SHA25649f7d216f881d5218bebf7d35cb6405f870531aef4e8a41c4a81e6f459cc1bac
SHA512badee0899e8543a4623516c065d5567a16dff46810133308913cb8ef2ee44d5d181c4ce86e324f2c269e0d5f0af82191848d2f5647c6b59ad7d782c66d5d0e52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa55e2568cea5ce9e14b05b2280bee07
SHA13c7f16b074252381e4a4f80eee80d8a76503434a
SHA256c9a0d809ba86ca24a929777368234184c2452ebb7e84facd75b5b1484f948019
SHA5122ff97051ab00065340f5f1814d3d8c8e16f1bc0f616aa3577c3d6d512ec1ceb9d88bd5c3a28c576af66005a8981b3958a09cb013a600cae916d411df72f3084d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e30db08586d2f11b0fd9f8c03ce6ee2
SHA1e7708ffb015a426d2e9f0d8c65f4ce240f6f4eaa
SHA256b2de54fac3e6a0d9b332f47c246c01e74b2e25b06ebd9703ad775bd6ad9e14ee
SHA5127ebd2b44e3373a3ea140737eaa4b2b91b827380b6ee074d2565e3f55a3d71b204ff32811755e00b23ad8ef3f85bd69ceff00c3626790c92d4280e24a0756ee98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56eb41f591501c81db3a9eba9e6328c2b
SHA17ca77c638ca21f9bb955be3be19ea7a92c67e6b2
SHA256f8eca332d00a6cbe3dfd2723cfe8146a5fee5b6183adb43da62e83112f5368b3
SHA512935a6220cc20e417514a55c2039c6aafebe1e836d8fdf2031d3e68b7c2637e1a8c055af768e745814e883226449896b1f8fd4b7d7cc8203072583c4893fcf54a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd34bc0e3774d63e0962f25b4f797b40
SHA1fa5193c7603265a55180f8fb1f0cb0b4c19c94ac
SHA256ce016f3fba8c718f10308aaffe30c1226cf0f542070c8730a4e902fa178d5554
SHA5124b120def521458f5bc83d3dfbd6e47840cce68aa090b563af3dcb3c9a59b0d5378daf421fc02ee02448ce3b57f467645316cbd9ecf8d1821b7ef6a82b1980773
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dd721df46ab2dad53e6caf2b73c0006
SHA1fd986709c070e7b1d84294b0a455ca5f0ab3c98b
SHA25645e49d34452b613b365b68c26c4caca80035596500a65358046556a601e21376
SHA512178dc2d5cdc6a36cc236051fae9b2c22ad54a15adbaf4e021f018cd796165635b46af7ac4fca483197442dfaeedf853acc662bbb4689d55f07e84bbc7a9834c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5339e9cccda9279d140a20baf28fe4e0c
SHA14484a280050baff5db1cde5cebe3bdaac9df311c
SHA2564461d188beb88a079b9b0f5059f593994c892a742760eb2401181f45ec2f6ba8
SHA5122d7a96d9a59907aab02649004f033be73a4263ef968d11be7aa88787a0717b18d81302653c81440e4936f2b5df7327e580bfe9694a54fe5612679b639a049a6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0d1aa467a121938fc0e319dfd2a1c4f
SHA19a64374b987da94ac3b429988c55a4b288f4e12b
SHA25678d680af27402e9701290866cfb25c922d468bd89626a4255ad97a5e38753fb9
SHA512c9b947665a79dd686e9f2464a5ae822362a6ec4248b0e4bb268b58b7bcd93000fb5fd2e2d67e0804622dbfa0b5d53efd76316b74ed708ebfdf1190f8054949a8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b