Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 19:09
Static task
static1
Behavioral task
behavioral1
Sample
02dc9affc1b304fabb26114638626b02_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
02dc9affc1b304fabb26114638626b02_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
02dc9affc1b304fabb26114638626b02_JaffaCakes118.html
-
Size
9KB
-
MD5
02dc9affc1b304fabb26114638626b02
-
SHA1
6f9fb1dbdc2e37723552237b52de563e8e6ea4b8
-
SHA256
be3f3a67d9bcff8d6b404d558a643a34a69803b44c1f5eb07a7ff2cb07c65428
-
SHA512
852cbce14f5a7197f7684121b358d913a7b8c3d9c7068c97823d4ea446f827dba812aa4c0b7abbc3317aadd13dac6cd8a5f9152d8de62dcd18e4ce877984e441
-
SSDEEP
192:MjifUbVM+BZGS/eqUbp6rw6XYBDSmK6/VA6:7UJM8krPbp6rw6XYBDNKui6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{74574DD1-7F5F-11EF-8967-F2DF7204BD4F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0ee7e4a6c13db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000793cbda036b7226bad1ff43491564c7d7695c54563f25be03a1b07f018076842000000000e80000000020000200000009dd761d20e175bb6c8310ad94020702373bc6f806c6795907ae48dbac8d16a7c20000000cb7e6952ec2de9224871fcf23b92291ea00601812d612fe9a19fd9c4333e974e400000003ce0c1536284043199c80d8acf742876b5d506f3b9f4f19000a5b2eac05210a78d82ab3e8aef790a3801a473a1e0e6145238bdcee0b8a509beb0a23f60b165b2 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433885209" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 2280 IEXPLORE.EXE 2280 IEXPLORE.EXE 2280 IEXPLORE.EXE 2280 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2280 2420 iexplore.exe 30 PID 2420 wrote to memory of 2280 2420 iexplore.exe 30 PID 2420 wrote to memory of 2280 2420 iexplore.exe 30 PID 2420 wrote to memory of 2280 2420 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\02dc9affc1b304fabb26114638626b02_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56659cb8b95c9514b2ba5940eb942b289
SHA17d559f4cf0f8eb74d6ac7a65631ca422f5c9898e
SHA2564cd76d6a74ef05e8f001b9bf281d0cc0d0602e281d8fde7db0cf1fe26b363ac6
SHA512b9a9184b800ea95a74b0c7b4aab39f6594a3b6726f27fbe5d2da48a3880121d96f9ee41d8e5ed6a51897d7e87bcbe2383dc82465d6df4d7fdaddf29c6749f990
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d85e67556842d0c815674ae55fa87827
SHA1f7c835934d3bca6625559b3c9ca20ee032fe0f94
SHA2565972234d98955ea8ae5159d5d1436c36387df69af67bf0441c697a97cbfe37b0
SHA512b0e690c11cad7081967926500d3d0050f1f1a0b08e6c6758561ba9a19c134b8a1d33d03b48c53c4b225b7987a7a0ed0ab6850d94af59672c8cd0049e76c31085
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a67d963dff11c39c30910f2070271d8
SHA163381cce243ba16e6ada046eeea35a2beaef7238
SHA256e01519494564581e8469e794b296d40ae85d6c3a8fe02c9c6c481fb957265d3c
SHA512789fa3b175f358d178c4f2aee49bbc61a5a993ef5bfeeb7ae291fada37aff97682ca25165d249b45b23cf6c6fb3dab74c3c6dd551297a4d4aab10e708a2b3a72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba9d347aa77b7d4d9cdcd2ef09e19904
SHA1753461ba54529e86139022ea06428c9cb7776c00
SHA25692b62ec085aebe6a0a525c82ec628dd1e65f1841ef92299a2ff3453eaddd07c9
SHA5126476e80847c29aef5df4880f1f9e737e9c88929cabdd90b8e182357f167826277d86c0e815304fa5452382d7e3f4bf3ed6283795bfa4e49bb0c131cb0c719ed6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d49e878c5585b2c0b2abf6556d93c0f6
SHA179b619bd509c8e70d8ad64524c207c9eba040caf
SHA2569e42e5f09f6a16d51202c915274d143d91aa77cd444a733f1fb75a128e7d69e4
SHA5121f406efd2a0389f92369fcf8a7157538a4da25ac22d99c5b5dc33099a499f0f993740d672f2cb0703e020614aa0298377c5539ca69c1d4a270fc7cc9b36b3ff8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5449fd05489bb3b650e154ed98e62fa2f
SHA19421f7b696b72380725798b952968703410e1d05
SHA2561ac99254e438cfadf963ca277762488c3fd1d238901421dceb220ff92c99463b
SHA512529141e416541b3f3e1e70cf917efeb636443b3e1a576b69ec9f91874240b97f8f32b16c61ef90239f71fa8f616c67bd9b9e0dcd87b6af407a345042a041ed46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ae8f94dcb301cf04dd40f197aa45601
SHA14d97fcb6231f03f3293c3023c030769f0a97bf86
SHA25693ff2432de265fb51239ad1816d614737f66a5a6449a86b66794e0d3cc63608b
SHA512705198f5e1ab5192c91dc5f2463afd04f2ac23299d19a945162bb02c73ca4d7517dbf7ed97695555abe87ead3ba2ee64b575a25f6b73dc9ebd180fd014c0fa0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5285d501efdfe6acabbd1e58d5c3255c1
SHA15121c4dac1104b7751afd10b4c20e0ed59a32911
SHA256568b5c051f776168624fcb198fddde0906879296b36e5ec8a8decffed2ecf087
SHA51262d9b994a1327818ba7c9b0ec152072985b693c25d003b12102ad81c44e3a28c6b942e022f981d1162d2a0ae0521ae345084c889b9a31d32ad89040d6f2cba08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cfce7d367994ec4b8abe96b65bbd28b
SHA1efb059bdeb09eb12f839c97e461d779f012c8d11
SHA2568e198513f2ff4de90e9ecc3ef05699b88139df4c760dc759e96aa2eeb36af579
SHA512d3296d7578ad431375aa8413178a17e1807c7c3bf0bdbb3f9dd77c3313c2442e7d79e31c2ea6340d86c9feb3af2c651520ea1eaaf14aabc60576810cc52f9a21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b8632d2916959ca126b49a64d8ebfa0
SHA19b132d086dadc3b070afc1e589ca3c231a77e991
SHA2563d0fa85f377c0e2507b1bbe35445e79cf270c2dfa15b5569e3a7d28f523ec9c2
SHA512491caa48a423fcc867176647b3ab6a920853f6f7cc06108354a0776acae890ba5e75eb50e940a85a028c87415b9707e527c864f5362bdebe9566d647a6ac08ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e1699d476f14bb0edf9a3ad4a35d043
SHA1d7ecca15bd556cd3ba77bb20b927a8c13698f0b2
SHA25665133528fcc5f20acbc9df8c90ff8cb3522a4dc5f2c0c9e92a3e178b9098caaf
SHA5124f98dc9ae2f062b0aefca7979785f3711922824a92b5e91d717a51d7017a90399cfeb375a941b092ebd7f0014605e1ec8e6d1bc51e3c0d3febf1b06f4301491e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed51f6e29446eae6aefa07aaea8d2f94
SHA17fac225e8ede1ff59cf24bacf9dff1255575c135
SHA25642dd02bc3630999cc80882cda5f61018ea08f5bd157c0995e69b36b4532069be
SHA51207c62fa0664ecd0ae4643e670c3a8522a7da61132d4d127268c199a57976f3b6e40709c4b99ae44daf020ef4d40b2cdb7f638ffe77b09da37bf86d102db6c4a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd1bf80cfaf4bad3fd7335e4f4d7872b
SHA1da52a3073b1d0d0be20c7072c2f81217aa5f3539
SHA256dba37153f4f36652369fdd480f456580046e425ceb86f6f8177f5ad43d2fa278
SHA512c3a71add3a3b6b0a503c201cf4a474302b5f6f7f97ebb5facc7c812813f01d39b888f7894504325a33f3b3791553a9dbfdc8130540da5eb269926caaacac7f09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50823e87b5e4779ad8086a6f5cd6c9d49
SHA1abbe72dfa0e8d5559bedd9517a3d23c91e4aada0
SHA256260ae6034630ac1fac63e546db71d9213fa1c61efcb16c13c4569f5d6d4cb35f
SHA5121398fb8e8cb8f85aeb1cf8eaf1399954d8dc6cc276804f6a5dd653982a18e66bf710cab85eb7bd984b900f3f9def3708fcf26a52468088af8e452575796b874f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598110497f1aba5139fbb09732d6300c5
SHA1151375f848dae957cb9abfced4f30fd2e4fb9433
SHA25628833f9306d74a07f5f90d1bf275ecaa8fa50cbbc12c850198f282efb7e7b7a4
SHA5123fd50f5e4eee3e0de48702e03f4a8424a77a7cdf5eb88c1eaa87a87f11d51f775e69239b6b25772bbbf60fbae38f675be81dc19fb874228723551b40619015f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592ecddfcd3cee8ea1fcd83fbc98afb36
SHA174ae1ab8d120831e12a19c34ee171285cc5056e2
SHA2564f80b665a7fd05d1a20133747115ca83ce6c9e0d46020b8a0b4a4a5119aa3d59
SHA512c6f0fb4e3a1ab330e9ee2baca3b37ac8d7b2861605d8c1cdcb6ddaf098a636d72215c78f0676f983e8256276ff4852f0b141239eb1bf09e199badf022bba57f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50efa121201dc9f60e2708db80b738cb6
SHA154ec1be3c01567994a0f283f3c97311de3fa4af5
SHA256fb721f3f799ef36a1edc2821445fc3c4d74bcdcc2ba8766e43b143eeba079aa8
SHA5126c8272d07b65555f7c97f934a3ea8543e4dabbc263ee002d522540272688f6e2b0264f1b7374afe4b0b74af68a2f27bfc834095ffa977a010d76757b6f7edfd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6133074054c852b7235aaed57b1b489
SHA190a5c7d775c69c74fc6bc2417fb78146a2d3746e
SHA25621bbdee7900b3d882d22d8838c8ae348e64baf72983c96958e10981e91942c77
SHA512cf40d52e43969504bd9718f0f2faf23ef50d2c5015a39fba23a0d447f237de189a10515af55e6fc23eae12e51bb510024ab17f3a961cd803b4662382faf60016
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5330f186bc7cb1086f4b28f6f9d5b0d24
SHA12e1a502b854bbb9a113075c250e94631a1cdbf97
SHA256c4852636d900b0635a9d25712b407d66e1d682379d7b3151b156459559f018ec
SHA512b9ad805739d0f78244ede4f6f3e4f1f6dc29d3ebdad31bbd46d5d4ba5a1104f1f368c5ce811e09468dd7e1630df23497698fd6a25b53db5e19c879978a7c82a5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b