Analysis
-
max time kernel
136s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 07:03
Static task
static1
Behavioral task
behavioral1
Sample
0015fea2258cb7bc890425f14a939dc3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0015fea2258cb7bc890425f14a939dc3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0015fea2258cb7bc890425f14a939dc3_JaffaCakes118.html
-
Size
139KB
-
MD5
0015fea2258cb7bc890425f14a939dc3
-
SHA1
ab9c560380c883d8a87ce7389c96c839d030dbcd
-
SHA256
166879e8414426452157678f47463ff090a4a5e63956ef388b2446e134b4fc22
-
SHA512
8a25f43e37531c1356020b5272b99c9afe9d9ea15af9a223eb7cf50f97aeecff26d36b690787a5ee7460d07004a812eca356812f7b28fbe082777259cdf1af7f
-
SSDEEP
1536:SYF9ALMqOL5EqiDC1LGoznj3wdHAlQPyLi+rffMxqNisaQx4V5roEIfGJZN8qbVC:SYFBwPyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433841687" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0e753320713db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1EA1D9B1-7EFA-11EF-A0E3-4E0B11BE40FD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000073c463f735a319c1740332d24b5ae2cbba03d407d31aa99d368b02631c804da7000000000e8000000002000020000000bfb337d685b68daf618a379d03c8a411eb0a0bd6cd9944059ae93134e52bac2a2000000040e5ca0974226e5f602936159e68d2834aa460a643c520a439c728d7ce7163cc400000009532a70b53bbe890ed297606c0028121a12e21e5446a25543770e33119013fa92b718b27bfe233291aacd0a761288d1a4f174c128cbac8dc7e5e8592d21f48e2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2692 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2692 iexplore.exe 2692 iexplore.exe 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2688 2692 iexplore.exe 30 PID 2692 wrote to memory of 2688 2692 iexplore.exe 30 PID 2692 wrote to memory of 2688 2692 iexplore.exe 30 PID 2692 wrote to memory of 2688 2692 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0015fea2258cb7bc890425f14a939dc3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2692 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae2e377043729c9b0a4f0c9b95833d78
SHA133eaa321f1943b57035db95630428b7edcc42b74
SHA256e6b60b6566d4e438a3efa101ce28efc31662675fad7f7b4a1d257dab90cd1ebc
SHA5129ff501fd72318e487ccee99e0646559dd76877964ad4b85f212b7447f21c5c299bfa45a3a6017461d644d8d23180a8c1bb52413b2dcd6fbcf1bc0347df11ce65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b703b5a170788f7ae68d71f6139c7877
SHA1dcbfa4afcba180caefcacae0bb3b94656c19b1cc
SHA256c04269e7a79bd4e719dfe60a248a75b405a1d47b8b4304c96e3f46068852a5a4
SHA512153a5450a18ad0960504e6c1d9ce3a090b9f716a712ca8a1eae9a1ef9173edb9c33120a6aa5496fdc5ea1eb5aab370f4f8e85d3521efb0a1a0ae638103035288
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c47bdfe5bfe1dc310693185b6b1fbafd
SHA1c0d9f82134f069c3a972420d074249ea831b3200
SHA256722f3721773fcf3c636980a108f208e49b7127845b35aea7fdb698edbc7adbcf
SHA512d87f491cb160829bd7a75d7103bd2178eb2e5f44906721d100f4bff3b1229cf02f5a63fd99718005b17af7da29ad61f96c8d0c541d213d3f77d922e987b97084
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcc66984e1be9507fbda16986d6860ab
SHA1924aaf718a17112df53d865f7dc20f873bf858b2
SHA2565787a3c97248448d7ef6639bac13d771736018c5c59cff0090b388aa4fb38f5b
SHA512125d929c6dbe25c69995e0594c584824876b397ef5a5f05bd376205addce2f151a259ef11d2c7a76ee78f2d4d0dc79705efd81a24c0ed65fc99e05afa52cc0a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5760f9abedeae75c70ea9c1459d8c1d05
SHA1b9f1672c629cd72842770b6c31a42a630ebb779a
SHA256ac78363734b8f5e44ff07e5c9fcfe7917ec69ab5886519f22e7e16ee0889d7d9
SHA512730fbcd16e9165b96900e50b30e5a24bb4f3965390d664ca5fdd5711856e02ca63f6075107d6fe9dbdde718e108b50708626a9c0aa9748d9273155287843c1ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5c9a5c92da7088c3aaa90922715a023
SHA12ec61f877d44f601dff0b750bfa16614328e37e3
SHA256256b02d269f6899db05cc936ac47c9a2a811590106408238da5b68ac3dae5b4a
SHA512dedbf43dc61a937a45775ef417d78bd8366f54ec857b824225c5b4f131d2f7f3d8f9d3ff4588d58ca155b7743fef7f7bf3e57b299e036fab77dc9739af05ce86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5115f6f34b7f67cab3abc8f1b0aa3b672
SHA10256ecd60678259e6b81cad167620ffcabfa61d6
SHA256379a1338c49c6a347bf93185c25e4866589597636388854fd9f72e1c6655f884
SHA512ae91298e760281d8c5ec013dc5fdcb38d981ad74244a25261b44a079e7a96c7712b597ddd38cb7d52c49c44972b7fb7ccd7e1497652f6554f8510a4315012d82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b0ffde3c942ff811af63b5b882fb2b1
SHA147d9890165843e514a9b3979f9204d6eec841d1c
SHA256805764a1586d1def0f8d7e93cced14c626bd7a7c13b4368a1bbb15abb19fc765
SHA51265d651ff593fc099b1bb3ec7cf7ddede6f8c77845fbb74a94437d2700c2b535e2beee1a2dad6bed49e2e8546cee441d4ed0d01c84ae130dccd8acea7bb2ac5bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a703fb6137bcbe1f5aa8a5f95275525f
SHA11442453561ef0c3df147cea37572a3e19be5eeab
SHA2569240d8c514a02e03de5d9f4e29bc4e22c57aaf47699966cd7f5a7b7fa1456c97
SHA51284421ff34bc38b40944323ffb5af6e3b68abe2407270fa20edf718ff6f154db6aec0203e3a5b0554e5513cf5aafd59f462b69d4df748c60c22434e971673a62d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae9d3a2bc7f1ef3648b06294d5e199a0
SHA10b07edde60308f2d56f5e62d6793a79fbbdc2610
SHA256a4c7ff2d7d3620042841156422c70fea3f74a75b26ee4a84a11fa4a5daf9ba52
SHA512c7d8162af4d12ca64cbf2355b01a515787f8833631e60c12fe25003b0468ea5cc6f305e5c637186549f8c2dda589e701e7ca0146c4116c2eb5994aae3aa4597e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7b5b67b7fa8f4babf1092171e5d2a6c
SHA15b5f31b98d04172328b4cf884d6bde4237cfd250
SHA25682461eafa42ec9872856819e59454b127ea7bc0db187ef4ed14e44a9e2e4d1b6
SHA512d78f4cb885257b541e2c9e71075bba26516792070eebaf970a216ace3fcd7c6bbbafee35dd1346dcef7c92dde99697a1030c60023cb0462e5e8cede43777f3b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595293234c22401c4b031f2e2f14034df
SHA16b86f2b00c9e356f3cee8897f3f50c52cd0c2a20
SHA25680631656926172ad7cadd373103fc91bd2b2d6b046bcb04b53b5a413492c74d6
SHA512f795fd3700cad0e8b060e9f8c86ec36f006b246f819f19e0ffb4627d133887b09c8afcec68f4ed574369a411ca36184df233b20440a50e7536ffd2e32f8de357
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ff0cfd16322166006d69baca16fcf85
SHA102365f225b5eacd387b159be2efa7153babe4a9f
SHA2565ea35cf3869c7aaeb7c742bbdbf6af3f9765f35192a91546af7a18969b4cb7dd
SHA512a5e738db55de25827f5efe1982e636870f7e820ffce626c2d460c2c537ae6b0c631f5c13b1ad2ff1667555d296333fed918c8cd329c0568e642c02224cda885e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d187fe925a215139cce25f29e4bf6969
SHA15ceaadd26690ef3b9a68fc6f6a79c71808d3427f
SHA256c1fe027de3c333d88ed55cd9278bf6351aa4f124b6e4f38fee39e22c71a0126b
SHA5126cd3c93c3efd76d8f8a42bbac55082578bde9bc2a2ec7991b70bc688d6094f725c2eda1ce894015344335043725b34046cd5f100a9185d795654a43a887c7c55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5750eed41eb1ae325382f3c12e89949fe
SHA1af5f8f1abda258f61bfe334cfe40673436730d23
SHA256ed20dc0bd58208a4cd75326204a829f776fc8bc344adc24010b411e788222836
SHA51262281c101825e8d1cc2a73f8a5a3801467e3a3bab81170825ff2a5337366bc1ad760e0e177aa981490ea6de39564789b6aefb7aa5655b9c1a13500e4c883af29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516f08fa1078d1f150155141c818b444f
SHA1dd1d04dfec72b818f7f3a0111c3cf59cbd38eb45
SHA2562cc5122970884f31abfd6aafe2b65f2959ae725d3901b514438cfac1ffc966e8
SHA512c4d2749c57b34bd271a3d5665fbed644dd8de4dcc020111ba24d39a417e10ef393903b92ebfb924710093b45f9a26f1f7040aa3e278c22a3e181bff2d96cef31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f2dce9f5e55dc66516bef067797ea49
SHA134bf5112d275cb70fc9066a1d4cf05be18f8efb6
SHA256c29494412db5d3b3ed32053a8c950f89fe71e2ff69bb5a73c260ebdafed0d17c
SHA512ef3f277eea637a5a95d9353cda5eec87c2c6012ef24304fe0081e686309510ed881e7433d71dd5e11eb888ece3f00a86140d4d872a3162485eed7950cec0f39e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a99cfc013025c1e3f4f47de0dd57db42
SHA1b900ad9844c63e1d11354925617d32f94346c9a2
SHA25680206af4bd6affc9705793015ac2bf0815a79b6beacf65e1caa6bb852ba81ed2
SHA5121f2fb32deb394236565e6f9a1c9df29fdaf7006a3a21fe0f810359b22ce3f829b985e715668371d42d8f7ba83b4e87c8ba1868b8c917cc1f622c7eabf2387fa8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b