Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 18:21
Static task
static1
Behavioral task
behavioral1
Sample
02b0414b5048c25e744c01312c78463a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
02b0414b5048c25e744c01312c78463a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
02b0414b5048c25e744c01312c78463a_JaffaCakes118.html
-
Size
9KB
-
MD5
02b0414b5048c25e744c01312c78463a
-
SHA1
8ff35c2a19cffe2b32a308878c86e47d325738de
-
SHA256
bbb821fed3bdf0d54643dac377dcbd736f3b621aa240fbd90e5d761af3f59b31
-
SHA512
e4e04a852e9a01aa2838066c2fa3f36b62dc5edb5f62cec697356cff0c5c684b89115eb583ad53fd6277de4fe66ba9370ac02a9f6c6d1c0ed0f01365a3df0de2
-
SSDEEP
96:uzVs+ux73PLLY1k9o84d12ef7CSTUcGT/kPsrpUlVHcEZ7ru7f:csz73PAYS/VAUPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E1BB0B21-7F58-11EF-94A4-62CAC36041A9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433882386" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000315245b623a778f09fbb4445e5ca0439157fe54c4e8b6c9f86dacd8b30f0c44f000000000e8000000002000020000000224cb4e156903b70dffe8a354e02d3e6d7158113ed094455fccaf2c1470d722120000000ebf5cceb04d939bdff5f90557d4d0fee252451e815d572f18f8e07a986a28e5e4000000077d80f78535853b57fb6db13801f8b47597c585656783ac87e1b0a9288dacb843f5d3165884bbe1ccaa170068283da9525b417bd86bf0457171bae77e672851a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 406641b86513db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1984 iexplore.exe 1984 iexplore.exe 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2528 1984 iexplore.exe 30 PID 1984 wrote to memory of 2528 1984 iexplore.exe 30 PID 1984 wrote to memory of 2528 1984 iexplore.exe 30 PID 1984 wrote to memory of 2528 1984 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\02b0414b5048c25e744c01312c78463a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f3f1a1f543726fe8fd2ec53cf9a87b6
SHA107f15cdcc554f3cd2c37bb33fa22cfcb98d0de29
SHA256ac9931732e08dc07e12f351530b6592cafa76431086973f9290bcaf383c36a20
SHA512f07718048044a38aa7a3c2fe287a435415c82c61ea21810576e8340ba77aebacdfe533f86e092373d14583e7c42da6f0677ec9bc43252cd8364f64861a560545
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526bac0a87f074cf8417bfa72d26e48d7
SHA1b2fd7dfdfd946e5c2f5dbbf08f7c5e8ebeda5121
SHA2561a4e49714a5369933a90b9f850abe3352054722566fe4aeca27121e8d0fe6fc3
SHA512a21ac41288b7f77676b430d8bb688eb4a3b2a1c1f69322ea2fb9b2ce57fa69a8d8d289c438d641a71ed1d96eba1da84ab6e0fcd8257f3c6898c346611e3bd40a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d58bfc4b57ab6c41122fbdeb94c080d4
SHA1d406d6af8340f402060e94865a93e1a81cf4de68
SHA25687d8eadd03eb535f12e46d1b8c3401bd748e138d3e23b18a162da15c38af2c43
SHA51270600e6986fec1c2e5739885e00251769a52870a2d520a720f96594c467f3439ac9850cb6dd07c8be52b65f026c92ed667ef93a7320013a0d2e1aa4a8b6c464f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac3c0f8110a1716b0031c85e1684b368
SHA1a93293c4aff5cd43c44ee57189c3b0347f69ff46
SHA2560cd402ea3d2603a094212fb3ffdb73d671f9ef881c135f38f3eea53c02f33efd
SHA5121b6e5ec8b83d9dbcfb57981dcc846f2f44294941ce11d6d0d6c1bf7e87a7b8fcf1b671432ec8b77585ddf73022f7f10c85fc0d0ff50f2af07282271d30c5d62a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2c7f7fa05d8ef859d80c48de151a6af
SHA190784c872c60205150d35fe8ef8063efca25233e
SHA25656883ab20b801f473d803f9a911344410919982dd87e2d56ca99db8062f7ecb1
SHA51262c95cc14af86347d1830d1fa51d7389ed5b528c6b87ec39264fded28d2b3b2fdc778fda8d282780c5ba273626cf57e45b7f0bd7f27a6f63bc819a7e77dcfc74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b65b0ec23a3cd2a0b3e9a0d17e20b24
SHA10dd52418fdd4a516ac660c4b0c134c0c3c1f3d24
SHA25698089d277be8a558c2ffb558534cff1c2eed838f1ffa1b23e9031face343bffe
SHA512a3244375bc608fbade2c55c2bddd2c10dd0da7c1108bc21399e4a63421d363d94f6b78e4715e793866c3807f9c156137a96ca5019d6012f175691108fd3e3640
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5032d7064f9f9da1ae0f17c95863c9d71
SHA16bf835afb9faedfc3e4a86aa197c93ebef45baee
SHA256e8aaa6be25f99abf9271ef7a4f471867a273b38bdcc9d9416176dc1ea4ea8e39
SHA512cb5d4f4aee3bee8a9f13a3f9430a115d3632190121fabc0edcf9b174aa8b7f8d35bc40a23a6eef21b1bfbad3eb3200924b03f6a14e6237bb5a0243db593cb056
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5844eda333b3be2ce48146fcedd537b46
SHA1926f97cb8ef1fcbd974f7870d841df6d6f3f3ad0
SHA2563350a6c5591548612fb54f944209a46f702e23b130dfec4fa946628392c37533
SHA5123ed959f7deb906ec17ac1faad3974d11bd74b6de943e2540d060b275a0d191b29b8a1e2f193308365948ab64be001b65ae679cd3e39b1877bf031a32a7e2e114
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a016f4d22a75418cba870edcf6002430
SHA18a1817822258265ac52b116091be0f606ef79996
SHA2567c5c489a5982da7c9da5d06751289381fb44ffd1885a09da96481d92bd404b2d
SHA512a2128299229f0881519434090806e87f7bfc326dabda12a4a68989392b7732e2bd084634defceef182a53c82f3e2a66b12085251aa97e4bdc2b985e8dd0afe74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58aa4d3dba21a04704cce7d18234cae49
SHA15ae575a0d24c41dc76548d31c7c714955d54da4b
SHA25664416c2bd2139e8c7998bb2df7e14205ac12a56260ad3616983cef42209c3abe
SHA5127aded4db77fdf6c853fdc92672596af3f5930ad57983048b8da60a0f6884302d06206cf6f82b65c4368fe544245a321a07f4fb13687644a7501adb271db49caa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3c03e56c90bfc20ace865114c428841
SHA15d42166c41d67ca859e12b3db7c9de9647e496fe
SHA256767db034c0611cf310dcd03c5336b0862e276650d792eb7ac57360fd1e277bfa
SHA51220430eac5474ae56dd54c55670ec634948dadcaebcd00947163e5ad59a1424aa20459e5838b50beb708fd75c67f9c13d64c038b3d0f25583a74e95dd28df2c1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c7f1586de4fecb0f649c1ac853b01ce
SHA1069a3e04c357f27ab62cfd5acb589562d939ff32
SHA2563ddf89bb937e7e1e87eb075213c7e90b4d982f07a52aa323b4e44b66ba04834e
SHA512c04257bb6970de5f82110de1589cde6d813afc25c4dc231c1eafe26fe670cd9934ba49861664a96988737c384b752e80d472bc19e96c9d8f91c3f1c5122ddf1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd0f568a93e41b2ef24702ab4d274f8f
SHA1b195fff4c517e1eece0760fde6769be8467ad93d
SHA256218096f60c15e9513477925a723692e20cde3907be6d31401f40f0e1cebe6434
SHA512c429b800bdce2401a26071e10c9c5c8d2ef163311900a0261fb308d448121d4c92864df8f4189be54b30659487e786d041cd22a9bacf2b6f5dd084884e60a11d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584a11bfaa34899151ce2f21607f4400f
SHA15f57032bba962d30933da0dae0419b030804dc30
SHA256e745e5e4b85e8d5bd754f498f36b38ade29d91eae5df19403121fd0c30ad87b4
SHA5120479bf977684a9df1a1cf75ea4875ae8346042b1f4476069cef0e3b3d103788f5e6ad5a69ac5ad963cabc8df36d6f2631e85bbb190f697d3064b016dac54d0ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c881a665d3c12c3e3503ef67c7422e36
SHA1ff78e63350a780dbbe6ed74b66d09e3b3cca3a68
SHA2569d41cdd656c9c3214aa25f464623d73049faca03bc99585eb060202b20fc5425
SHA512884d41cacbcf5eb47b5858f0b1ecb33540755256b6e3d016b70f6dd9ec6546476a7ae645a587d1e8e78c587f4e398c3644471997acb0f374f153b75e1e38e432
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2294a126b222da5497dd5b4596cc7aa
SHA193df521e0abcf3c415949c0e32275fba77db32f7
SHA25673df93e0dd370c020ac67880cf8fe4ad5f0c7fb7a159a3a811bd33270efba9f9
SHA51228adfb172eae02f1ce224925de91637c211402b6f23b37850264e52c27438fc80f8f8d288acb706b436a94bfef31fe768d535f8d2b10368d740795a74a879183
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59081114589d5427f9acea85d1f000c4f
SHA144e4a2ea41f170a1259daffe15ae18bbeb96129b
SHA256d7d158ab8b0e8df11e3730b694d934cbb10448b7735518e28f337d401d495f7c
SHA5124e730fd2bfbc4c4f4015b831fd6b48766c57e23990eab580800eb4068a33c25d6464d036baf92b5c97c4e18dcbb02e7775d9610b37617aaed089ca48a5a1031d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cef19d2508aa4cd2b02c54c70beb195a
SHA1cd2630de52731b2a8e73ed50eb9b180b76bb174b
SHA256889cbcb5c879c8d02292995bd492219ac845f186f8c3b1c40521e4626e879fc2
SHA51264006789187ba9beb6aac29b4dcba1e29fa62ead9f65962d4198ab72d24a361f09cf24015b2bdfbf2e610c1fde75c7fbafe85321bdd5a5354daafb9b7c6de2d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a013245591cb8a5537aa317882b619ff
SHA134d0a530a2542abffe9f6dfbb3303689661de9ec
SHA25645dd45922aefb851abfe4f858ef8919febfa905d761827b719f92cc47169aec5
SHA51260ad0ebfacf21fecf39813ea818b0ed182c5dcefaacf79bf9ae51863046087f956446445882d70f8c423feafde9da1bfad43915c422d685e6a6b68fee63abc4b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b