Analysis
-
max time kernel
148s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 10:17
Static task
static1
Behavioral task
behavioral1
Sample
00d1ce5ae5c0512df424000942b167e2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
00d1ce5ae5c0512df424000942b167e2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
00d1ce5ae5c0512df424000942b167e2_JaffaCakes118.html
-
Size
123KB
-
MD5
00d1ce5ae5c0512df424000942b167e2
-
SHA1
6bbd04140688b5b04c8d6e2a6996652011825496
-
SHA256
84bd5bf86c06a4fe54149187809b3c82b355e2fb2090d78a57ed5bd934c7d254
-
SHA512
a5d0ad25f3d7cbea7074b77e69f04486a4ed2d0557a457e2eb697b42f373cbf3aa4793a109f10451819a65f49153e47889c51468af1381e25fdbc9e6d38dd7e6
-
SSDEEP
1536:SITcGMsNSyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOZ:SITc1yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000083688a1aebc5c7fab909a228f8d95cca692d160adf3870752f7563fd5b0ca447000000000e8000000002000020000000ddef63584f3cde001aa33ade282cf9489206fcb8d33f769fbd29803cc72159c6200000004e15e16439ae752d712ef4e24c52023dcec8514ede25ecc308d777435957848f40000000eea66efb1eb132226e6e57ebf92a8f5352702ef01a3f446773c08c89caed9b27ebf8ac25b488e6064fba70c13d3bcd5217d0c4e6c3e196dea0d0179976386523 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3CC6B171-7F15-11EF-9D9F-E67A421F41DB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00f1d8462213db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433853334" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2524 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2524 iexplore.exe 2524 iexplore.exe 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2316 2524 iexplore.exe 30 PID 2524 wrote to memory of 2316 2524 iexplore.exe 30 PID 2524 wrote to memory of 2316 2524 iexplore.exe 30 PID 2524 wrote to memory of 2316 2524 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\00d1ce5ae5c0512df424000942b167e2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2524 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5537d3fb25cd65c02a0b69f60bc1e107b
SHA10818ebf0001d2c9ff5d2bb280fe24136980d54e2
SHA2567bc15f3f636ab3d1d3d90cba9ee314fb67cde45ff70ffbfc7bdc2a964229b03b
SHA51216f53b1627b034eeab5a1c9679aab8e1d92fbc81f80688ae015394ce4b078aecbabb775673d8af730ffd14f4f3983a34b526ffad179e1aed63e937649b0aa5b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5062ab33fd00984401fed23f6596a71f2
SHA1ff21aa8bdc681da4df9a5b380e2d9361d992eb79
SHA256adb4b927b641e8deb6e87577b0e4e850958cd6bc6d3bcc649abed60b0d8e30d4
SHA5122d24df65711daf6fec02113236b309e1424bdcd39890003f3084acdc808fc3df072f59790474fe35bdd2ad670919ffb886b9519ff570e5088afa4641d9554b03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5449ab3757b8266a748401b94f4ca593d
SHA1cdc49877854b369e1c88218c5d2bbc2a58ea63e3
SHA256a8b599fa3d6ada53d1d64db8107412fb816a13cf812e02e7da949f49cd4db476
SHA512b81fe2178f7331d51d1e27a50ddee988305cda9f683e1bd8c8facbd57609c03836b7e9964f7171e221dea05ea724927038e4c6cd2a14a0472622b1ace8139361
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f22e7b803cf90f847288a0061108a0f9
SHA1a4e86bed2018ba3f9561e94a30ce21febaaa7627
SHA25683f7ef31681dfcfd75bbd900f6cded7b9b215f5710d04c9e0728c5f40eff3ffa
SHA512d72830ec100cbf154b85f73f3346a4578d8b9b35d03b9ef221fcb2698c1006db65ff6879684720872a905f19b1a6d777d50c8ce29f78cb359a1c9035c9c63c03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53997847b85dffd18759df7323d9a0d5c
SHA175c677945b2b67034b4fbd04aba73ff16ca97a90
SHA2568cd42f70466a481da66d2cbeb4ad3654496a1937c0a1de659e8265a40d7f5bbc
SHA51212c9c3fa806f9bb1f446eff6a85105bfbd306b61ba635cfdcfaef19d4a87e70e9bd8dbd60f071cf401e05a1b53f5b73fdba76b338b8f91e6755541c21bb230c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50015ed2c15fc74994daf5cd3439ffe2e
SHA14085317fe6db0863aa2ccebd7dc630cbc3d73c68
SHA256b92e9afd6a1fa53c8d0c3e7ced8a833a1a7fd8bf2f1cf36d610b01e479896d87
SHA512614d51f6214ea5a0171a78297abf008b9322d9386206a27f2ad1c72f3712bd3decdf0b1cdedf9ecbecf91bbebf01ecee9866056996d9e1819504d64af54bd2d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554221dad2c0be1e9f4819f6c9d89e2a1
SHA1556f40b4e323d3429cb71f7755b6c0b5de81800a
SHA2569ac970b281c39657b49245dfc9434071cec97bc5cd4ee62641b6cccec8c6ae1b
SHA512d8bbe15a9fb42e6308df8ff269ceca27fdaaad2f67b9a37b084466413bfe9a4703d47e967bc32827eaf3d4e15dd15da3b8843c0701d90ea5acfee53799ca4997
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cac4bc2dde3548eab41abf0b6903fd4
SHA169d2fefd2a38aa88d0c03af6103f82dd9df6a6b8
SHA256e9f6ca537497821a1da492407dd44505e5cbd0520f6a68fedb7fc226b7c8cfa6
SHA51292e9864daf0ab9835e60ec88086d994603daa87c7f9ce5c9fdb15eb7e8c24f0f6d7e5bc519b3dd0388b1972cc41ec40d81eaa30fee365896d807f019346ee28a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5556d3373c413278a829123f522e0b6b4
SHA15f4f49b28de643844ce3eaf9a8d62d695541e32e
SHA2567df2b59b3d37ab3bbaa6824c17a2c48f7ede729f3f703ceb4bed465b04833b1d
SHA512fadf0ed58c6b893ff1229a5730dfac629c073f18365acfc992e043b760f7f95ddf46e9699860e7f1696b077643f5bf4b8fb462ebcb79d8161e27d3ead4eba012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5549fca31e49304a72f5d95d1be0c9057
SHA19f734d93cfd502e607af997af52e2776d36cddd6
SHA256fba34ca2993783823e83911e23b68abc6493b0c33b85e4b307a672230339c63c
SHA512310ff8380fd74bd7c7733adefc007ce32609c9b1e7a09654d14d810d598f49caeb5c4b0a545151e4d71674f8efa414c7331038d2327824688480057682582aa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7ac384b6fc6a4f53a925f28860527f1
SHA16c05155d755ac0a8e44bd4b53f46468c24a14bc3
SHA256f81091df468f11aa1e92c269a56507e95b77ffdd821afcf25c3fe740b89019df
SHA51278fd082a31f33ee0ac3ef3ff6069806cd39c493aae0cac437680458742bc9e4eb4815e63473d38d42cb36b1ef45617d3e098dd54aa845143a13a9e7a7e08949f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500b591592828bea14d463eff8dcbbd64
SHA1dd1b4ee1aa4397cfcebb9489ce7e983053dadbc6
SHA2561e50f6d104628cafaf4af73941ba2a6b482edaee12dd81fd7bc8ab28a80c6556
SHA5122d4771abba9d1fd0f817eb376bd26b5f94b61dfba13402a555cf6f546311daacc047dc819054df05d3e82b8902662f2f375f9029af1efbd2f5e800837a7300cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55250852b1f8cd1a6189ae3fa5a6c1e41
SHA1e056c0582a777bc3e5023620b35bfc93acf8f665
SHA256817416273db8f898e26253e952c3a8e23fa559325e4940faacd22a862f6f96ac
SHA51248c5bbd559299a739fea29ea09a3afc9093982516997cefcdcdcead1ba423df462a8963b9d5423d9ff4b93f79c61579f55b011fc13e0c09eccfc00f597210a99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eec4f6fcac4d052feae5b3ff0e7adf04
SHA1ca6837a6f649fed935752965f625d20c542438cb
SHA2562e93f0470c47bd517d53ba10f2d3e207a3595251f1605deb50874efc31f93d68
SHA512b13998c687972d2d0ac761b6e5368dad88130c7b671901b8fe6b665a36d87ee51afad62a6e06ab383c06669bb57226d87ff21ca3b4054fb178de4d018d980f9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578338bb1a95d58d3ff029ad590a2e2e8
SHA1b2e0f1c66a66f876c49094ff652c5b5a662acc73
SHA25600eeb3afe342f03bccd20a4ff9ece522633ba182e9e0e09d5d878ecfe02f13f6
SHA51247beed0a5d4f433f3a1771eaf72443b1be3a566648712795ee35085688b397c2a6bd1b2a54c2eded6910a0f11c9d9a3c45e13f354bcb04d3b03ab41b1a885fd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0aa49934f623fcf679f4839e119aad9
SHA14e3a5e38462fefe580203c725cf59860c7023b07
SHA256edb59f438cc8703bece06b207b3dd19a202fb62ef927196d0883b57fd7b357fd
SHA5123ccafbcb3ed5fdcff7b353765fc913399147f4095ca3f2edc16eaab4dc17ab4462319c03f818d18820ce2e9c944e46173ae096526a3605492976cc43d509419f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8f975e59c4bdc8325354d16e1b1bc8a
SHA132216b4d7c69283480aadd48dca003f94a6b8ebe
SHA25628ea9090cbe9055408422dda6f43b3d8a54af51eb3dcb50ea346f4104117c178
SHA5122953231ccdd3080e147c1a7920e2b39e4b9402cd0eab99a8b80eeff5e14322c4d3cd0e9e1f42d3600ebc9ad6e89e410b53b3d685f9a31930e3aa37a8b5cb875d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cad75d9a45ebde158cf60644a3b31019
SHA10b67694fb4595d18c84a40b2e6de217ecda429a9
SHA256fcfcecdad141c3e183ad1329364227a2942956a993d6f1aafca4c83d4d72b729
SHA512a95f1922d911ef97bf135fada7e514b6d4e31ef46b6033d3843a1fa114ee0799f0a6abc1921350598652d75c76a83b74708361ccf596bd651c66b7bd7798f331
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d20ce6ab9c54d5482afadc76ec31a11b
SHA1e57101618a7d43f51b391061d1fc8f5fb60994bc
SHA256daabfde2c4b19c8b1f8bcc5c79c76ae57d7bc8deb08dfa026aa4f998e9a47dc5
SHA512e5d9dd9cb4f15076ecf4e9947bc38f1eb9de0bdf1afc0d39f871261be3a959c439532b9097fa4578826a665eba4d4d8896574fd2ec47db10ae061d994f5cef16
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b