Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 20:22
Static task
static1
Behavioral task
behavioral1
Sample
03200a086d50466354c24548be3d2592_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
03200a086d50466354c24548be3d2592_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
03200a086d50466354c24548be3d2592_JaffaCakes118.html
-
Size
2KB
-
MD5
03200a086d50466354c24548be3d2592
-
SHA1
399592cfb91118b7cdb7122f96a060e2076e9bc3
-
SHA256
d1b864f6622c28c3dae10c56b8b6e8708cf158b6051bb5658ed1eef10e8b87d9
-
SHA512
d6980ea57c27a2c160d4ac39d507edc32918fa0cfa470d066bc196e7fa30ad2cfb0ece36c3c85ab964e121392f035be455ece69b85697f419a14bf2b46883433
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000af2741e4c8e999e54a10b23010143009ccc4fb70def690557cb1710619ef29a2000000000e80000000020000200000005901e3b202ad77daa9abdfcf705bcb853b64a5f107c3024aec6608fcdff07f9b20000000c7175bf4eb804f62d3cda54e0efa87763ca5dcc5b6465fc3ee72798c4a96794b400000005f91e048000956fdf89bd1e07c42a20422dfd4cb9ed362d9b41bf10d5025654aaa8e4e9c8fbbaf05574665e58b537de11d06c808c328d5e53ba70c4c762d4704 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433889605" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B0966A61-7F69-11EF-88C4-7A9F8CACAEA3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 009f24857613db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2480 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2480 iexplore.exe 2480 iexplore.exe 1368 IEXPLORE.EXE 1368 IEXPLORE.EXE 1368 IEXPLORE.EXE 1368 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2480 wrote to memory of 1368 2480 iexplore.exe 31 PID 2480 wrote to memory of 1368 2480 iexplore.exe 31 PID 2480 wrote to memory of 1368 2480 iexplore.exe 31 PID 2480 wrote to memory of 1368 2480 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\03200a086d50466354c24548be3d2592_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2480 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f245ab5bc572b6f76c5f08b12b7d6a0e
SHA1537b1f78acb5a6c09ee49848a2910134c03c6057
SHA2566e35f80dcebfe01483bc6f90fb827a91bfa9b6e6af9b8a23d92c9f45548bcc13
SHA5127be8a7abc0cccd90684a242bc80492bbe07fbe09c6a13cfed2e0a90befd9317644ae62bfd7bec15c882e87845d55eeda523c78be8ff49e4d1aa6f7ed4cc022f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5989f895293a3c2cdc1ae27aa2339cc69
SHA1d4636985f27b179b20382db0953c0703edc3f32c
SHA256b417517505d5d72d5696cc1b10daa59c77e27dc5bd5b0d0e569ca901f60f3cc0
SHA5126a762f80b72b52d5c44cd3fba887da34dbf1bd7b54468235f842abe03d7d4c175143c353385a269d879f173404ba04212d6fc6345ffe9295dfc7ea9d2d7f9283
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d234a329831c6f1970c5ddc1a46c22b9
SHA13ca1f38decc498fed44887caaaa8f7712ab33cbd
SHA256e7338ab01c58f4e30224a2ddf50c0cc41b7e1aa3c06c16628f9b23622c3038d8
SHA512d84d5a195c8e766b9aed52d3132590c444febb8262ff733f0a0b402bb13c51c155196479b7363aea60a0082a9bb4f6a7904ae48acde5fef9436cfb10e6d845cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c951accdf84dd17fe2196130342cd64
SHA127812a4e0d81467d67e3133e769e7c67e7d072aa
SHA25601ca2cdbf9dba7c2ed369ed7260ce13a8d8a85cb0ed3b7bb49573c9c3bdab419
SHA5123d53c476b3155ffab8fcc18b1f8d2ac1e7fe19acc6bf1688078d5143d50185e6b3aa56c011b658fd7cb12cd808f16f35e4679ac6ee7289dc53e5bcfcc563432d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cd4bfdcf4b3de596d4574960b86efb4
SHA1dde1367bd1402f6cd53661ab36038f6a627e8335
SHA256ec0bf4bda1193ab8ef4ff5160c0b3042b6260b63e6bb93968296a0dce6a845cf
SHA512ca13aa5e7a9d8da0723e010e459ee6b98b63442fdcf95a188823889441baaed60f4744fad852dc8afcfef84b2641059292f9e1fb0dfa06d18546c36620e706d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ee143602dd0cf3e30fb2deed860c49c
SHA14b7ce4a9d9bcf2062baa164822d8e253b79ce46e
SHA256c139061e94715f3d8d9fc80aefc8680665cbef045d181affa3faa6e52cdc08ab
SHA512f0d3aaddf496feeebf69af8f4f90932fb23cb1bfab884e0fa35fca8a4836610d9bf5d5b9f60680f43ed35d092795c24c077549651e17472b95a8450e603dc5b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54063274fe1c8352576e882ee289eafc6
SHA1b93e5591b46188e163afe6441ccf6726389a0879
SHA256994721b5e34f0f125ad75b115374796bcff63db99fa933df40000a47b148ca6f
SHA512e79adb5c12f8c1d62bdb5bfc55dc43220951179ac609993d12f5aaaa555371dd10792936c4346133c25c4fadd96af6a1c77f238a25bac548c354227d6fb3625f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55640868922c34a181d96d357fbfd4622
SHA1a47b4c22ae50491864cc7e3bc637e7d976a73095
SHA256f809b5f63670612677143e5ce2f4fcf533b2b15d3937a540fb3e9b214d5747ed
SHA51292aff0159e44c7454b91b8458bafbe3cf42dfb3de8015db5b7e207b11924c3e63e3dbd190cf66fadc8eb06c437fa0249b37dfa74b1721cfdc5cf596373951aa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574379891e4a6e82618a6139067a72dfe
SHA1f88e44b2194116a2a645c7dfdcb4523fc0c8d92a
SHA256e6ea745fe6f76dcb5e524a08ea2869be437171e16fc5e1cea8b8f71c04aca993
SHA5127395100fe7b1a50127dd38a31c31008f706e5e84d81b7b6c470a7e855abdb23e717389222608b0e7104928530244944bdad5693358a9671bd8b2ac2dc1a2e89b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b36cfb5a58cd33a78f726f180e8d4b7
SHA1be7c720b2b985647668159f04d44b3d7f87dab92
SHA2566c5231694dd109d5a1b131f0297796e21422750c7c80591211700efd9b0e8197
SHA512960b27f80913e989100ce1e1f42d632059a53dc9f0844ef5798bad5982049457a049a0c6d9c4c13bb11458b9f8ebb60a2411932beea304b29aca6d87680a9022
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50999af4c60787cc66adb9e5fd5b1faa1
SHA12b18fa309e3dec83a9e69552f4f37a0ac01a0a76
SHA256711e5ccfa9785ffcc8063b263e1701ddb1712da8d679a8fd7e3828cf0193e73f
SHA51231bb3be7ee848ad998e303756a33e41db9562c793df21440375bd49287b48d101bc3edd0e21399414d647492d879f103bade980dd9e0e91f6178d29ff677a832
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5187aecfb1366a2f80b21535fac53d2b4
SHA162d922a9a9138c7939b5a9fb3b046d4f57222c80
SHA2564710f912260210874365d1cfc2ebbef5d72e720aa7270d601f7d6eaad9a7efab
SHA512eca216ee78c481ca224cd6e8fc149a569842347f74f12b363676584fa880e06f4cab956541ab6d5f0e2415e38863426f0b618f60aa0bddf9c5b599f2505af48a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed25b2539eead5c56502ca0acbeae729
SHA1e56e2a8b7279bf483db9efd88e825a276b74383b
SHA25673be83bbd26fdca4c9d902c1c64a4b4b037383add6fee5c76e464e67665ea144
SHA5128b4624b22eb2e782f098e9a2d66f6f9761aa71d8eb96e0647b236dd28f4978a17c951ebcdf229d73dfe823b44b3e54034556109134249eb26ab2686077c84695
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb8b67aed6bfe199c726eb66f249b036
SHA1c1b1b3d530b3a641afe29383bc8aad9c71fe0ae2
SHA256e4699ae45954d0341b68c58edff16fafa6743edb02dcb74ac5053ea68e07f426
SHA512db2d5576caab0d4eda7c4221368a1a1d1d6907a33826357839af2aa97c9f6c9f30bfe75406efb83b705fdf06a62265a2f067d357ac331316fa6bbee85cb13e78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579ca19fcf62eac38fe209ed8b13d197e
SHA15983ce0ea963281389811d41faa50a08abaec142
SHA2565f76cc39e75fb5a2000c59ea44a787a2e5840f438c3072ca87f7b0b6e75a0a61
SHA51285bea064706dd066a507ff15fa4e8a96b2c068840ab9abe3cc303317e974e0efbb60f9fa54375335ec64519ca690e6bfb05ee5abbb7e8747535e1eea71d6c915
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b192d888a0f37b79decf03c232135440
SHA1c1758c16a1a568fbc807aa8224c27a536b32a0f6
SHA2568336bfc98b1034a9ed2656aa2112cb446aa6d8b783fc149c966c9975af3a4f2e
SHA512e0c1e66e50215f73422616999c398a3f1cee22596f28ab90096af725f94345c01f13fcdce5f87f0a028f6370f425d0fbf9feb845b455a0dda0524d92b7532673
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51810d95d7ae313f61ae75d382fb415d2
SHA1fb59abc4e5b1b763a6554b0c4e7e12e67ea132a5
SHA256bce13938fcb4d63a6337161eaa816d1b455eff7b9c7690623e681bb46d6665ef
SHA512a92ed751ba431fdd5ed0aa748cae78325a1c9474b62fe28f38c3535c81d90385b440033fa88ce4b751bcbcaab1f3bcf661bb4dd549e1da3b134ed1d59a346f6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d03322f5b661989632f9b5241a1d54a
SHA1711c2b7679ab59f6109ea678a7b68e46fc83b64a
SHA2567e83c7db05d6e657557b76207318ad805822ef9dc4771ee9b4c949438c52d628
SHA512c727e786e9acae4e017e8001655d0fa00c81a4aca4060d8abd6bddcfa20e8b5e0801fd3aef4e6242f92709869c7e28b6cccee0733b15674472c23aca3a07ba73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53beff3a96115a30a7cb124c39ac4503b
SHA10138d033ea143571198412b02e2d5edb43fc1bf8
SHA2566452126f41f88aa56b355a0c3d82f2d5a7e1cd004bb67cdaef5e7e94bae97dc9
SHA5121001ad41e2bf25b49cbf457a598fd811b658de26fa2f426003e2c8d77578e309690d7f5e87215727da5f60bd001b9a8c03a15b8cadbc0b5dd8bad07fc9f5e599
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b