Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 20:40
Static task
static1
Behavioral task
behavioral1
Sample
032f85481efa5199e6d6c3229be24c0c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
032f85481efa5199e6d6c3229be24c0c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
032f85481efa5199e6d6c3229be24c0c_JaffaCakes118.html
-
Size
14KB
-
MD5
032f85481efa5199e6d6c3229be24c0c
-
SHA1
bfdb906b678bc2ed6e0e3aaadf49656d54d7a6c1
-
SHA256
b426b4476ca5983dfe1965d3abbdfc60d43e498d73585ea64a227411d5ada6b4
-
SHA512
fd4e11a866694c94d86933a289c0eb85195af51a1ca92dbf1e449fd9308c30e1899122470ba189e9a26280d81e32ec6e70709afea1545b01d7355255bebea646
-
SSDEEP
192:2cQkozROI50n7NlWtOgaONij363CM1LiqB4KcxasOIOswi0HTlUgg/jCa9KVtt9+:2tlynZUU4ij4R1OqBtrtlUci
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000caf680dfc86cf1ebae1ec56262f1d5270a25e11aaaba040a4a8143c4fbd365b1000000000e8000000002000020000000e2fb9c9d09ba07d5a0058b582e2a13ed485bccf416e40d09dea26d6630fe296f20000000b9fa7310c5e1606ca7bc863961a26651da826e3eebd2522bf788ae2a34723c79400000007d752ab9d8be3375126ccdff928e1b61411968d1f087bac77ebff1e31f1aee4386e9c4aecf876c9ad8ad1d049bfd19311ae3b7990220169f3ad2a4dd2ba3b6e6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10520c197913db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433890706" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{403EB671-7F6C-11EF-8BBB-46D787DB8171} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3024 iexplore.exe 3024 iexplore.exe 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2452 3024 iexplore.exe 31 PID 3024 wrote to memory of 2452 3024 iexplore.exe 31 PID 3024 wrote to memory of 2452 3024 iexplore.exe 31 PID 3024 wrote to memory of 2452 3024 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\032f85481efa5199e6d6c3229be24c0c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8cf6d93039c239d812206fdec701137
SHA1690bf1d7c18348249b1f21e6591df08e0d8dba60
SHA25668ae6795c67aa1ce0fc7eeb7b7f6db920201294e88175479d2f8f51582a7e7bf
SHA512b17a2731d4b6e286961640a1d1f82fe99f738195dd604100acd4e837d80b8a8e7e8a40e8bf396102ebd25b528dc01cf3919f5820d9b718464e6fcdb927d832b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507e1e08cadfcf5172391132fc3472f91
SHA10d17d2adede3648dfe5825a70a2c9473483199fc
SHA2565401e45a8f6adcadec6d7f030dca85a10615b9dff746bead036d18fe278b5d82
SHA512c598b5053a84d96974f2a3503d2b493bf76b167b27ef497c90d9ba19d15bb5e386a0848bfe0c7b8e24dc610be0b8e01b797febb56dceb907a1aaf1bbf34046e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56889aa1667c25a0e30daefc3b11fa5e4
SHA105f71e41eeb868687347f38dc8f61bc5ef3e3f96
SHA256f1e675d22ed67d218401f33153e2174424c27b040b28576387e670fdf8c2eb49
SHA5120098c4a2bd2c23b8c66d6243a5b00ec4f8a27039dd2f0f726765762f5a279650c2633b3428059e5fb58db958ecca810cf55ab971e887e93437794016f53337dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5679d46be19395360087aeb786fd00a43
SHA19b7de41768ea8a99fbf641bf3d9276867fc14384
SHA2569752baff5604777edbbfe5a3827014dcd3f99cdfff2e8512ae750af7a2d1553e
SHA51223beedd1b807733342a49b38e5ad2455460f7d952d65f4e58e91a3b4d33a914a5774383a034147369d7fcee3ef821afb37a569c8997a7294900eaf69744a2c0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fa3ab1da844c5fb17737bf1930520ed
SHA153c44f0e80b6a00305a287a11bed1ae967971932
SHA25635109beea17cbb40727c6f199345aa8a8c8be42e967258b2a4758c49de217a04
SHA512788d69b17673ca8a2e49d7dfdc679be8274c4c67ffe77ab26f164ca30dbfdcde07e609cad5b74acdc0e44fe58422455e9fd2217076a4c5f0b8beea54292ef7df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9914e2e69c1491c3c4b84385fad3841
SHA18e039394ae530ec1068405cbbfa793b86cd9ad5e
SHA2561ecb65a516e6c5920fe27b89ddbabd4e6eb8481c0b29ede58be1b6d68ea4348f
SHA512d18c4f9188e05a03cefbe4bd72792e7a1b4f2a346a72853a4c227d4ced8d8c05b0451c7cab290cd93b5b7be3737196fdf9e5d96145041366f6de0367c4e3cd66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fa35cfab17e180e4ef4811df4cf7669
SHA1565363bd4e6f377469ff4fd6bb7e6f8137cfff74
SHA2569055513a694e2d57d231331a41cc1ae69d46d6f2206676c70a169a968c6fe735
SHA512da5dbdf14a799e80b36021339ce4e6fcbc1600f8b9748d740f5e0727e1630e695e924b46ac516cce6866a218ae2deac849acdd536a5ff08b5bc1f83b3ed6ea1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0c00eeb0093f1fab5d2ddbc0d240a85
SHA161c85bca726a80e0f50c58ddaa81b7bdf3f82d34
SHA2562a6a0795d644ad58b3544afb8cd25a76e512a76846d56d9bd9470a6ff57de5d1
SHA51222a89b84eb4dd42cbaebe8d2b88b328597014310c128056b4898137615575887f17ed1dab3d00e89f27e221dd32ab70ec2df50e7e94f38af3149304610829df0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541b80d77389ebc0f9ce2c067aabc5bd3
SHA1d20503516c9182e5f7dcf952d7c4495eddc32460
SHA256b27d7a799b5d28d2b550f4557c7c1d9d83eae83bdcb0abba1e3c97747a25f120
SHA5124413d362f02b924e05697d35851515480d96a479c67985a6eceebd043610d7a9a2c4e0c19264b119eb7d24f9a9ca481e7b275a40600ce96b6c57c3fdd3c7c912
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a88b6ee3baba2ecb1291abc2df78c446
SHA129b0f7f06664dc2ad744f2fb931082025b3ba4b3
SHA2565e99e4ebb87272906b2a1e1706176b6c041b93eb286c22362c91ee9c9e04edd6
SHA512c55bda4bce1f704ad6f90999184cac0b5d89544747a84021f9a5bc2919c89bab593318c683e997de509893d1dd296ab8ef053e931f9dafc159fb6ec71e0648a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac786968e53b3e8cdf652564be8a0847
SHA12757dbf80d040a3a828ce72b565d4564fe4bd636
SHA256e4301531b8decb8dc14265a238069972f8ab02beef764267e5f65d3ec37aa4cd
SHA51257b2ba51cc135159b7a626173f30eb282c93f1766d2017e044df666fe2893148e02778a467e2b7a4afaef0272459b20e5454749e68c741ee0feaac339e95d12c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eea3f7fcb0159327b468c8f051c61ff9
SHA1c1c8722f07d2c30f74937ebfe5d58b9e7922d9b0
SHA256ed80a9469cc63978a58865fc04553ed6438c39d8112c98ba8f60f88d33b91a43
SHA51260fe70425a35ecfe51a5e28a6e4421988aecd33a4d4a8fac81bbdf670a13e40d979afab8f2b602b5613e333361712012e972f45bb61c11b5dfe1a9fb065e5dc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5703dd1b4d567f8038ff02e1d0097c4c0
SHA1ca329fd3222ea217e6e2526f02164ec35de7ee89
SHA2568b34c426b6133a442b02ebabc3e7e99023cc39dfedb1867d8a4eaa8d1cbee787
SHA5128d76ea1c10bca3313a347c3f1f0b88970285875bdfb0694623d571c943253892340e9d90029bcc27ca744a9b54205bca67050d2c5a122515297c4cf96c4cda01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51adc02793304e4fb9f2cf1e67d11d846
SHA15c424707f2f355a14bc0f5668df5482e407ce392
SHA25630eb7ca2ba9ae9078565423d2962bb595cefb5aeb520dd05a18b42a823dcd3cc
SHA5122bea943126d4a407e0e642158aa56956b59d9284d18f0f322b5a6fc57d54f039c1afec7e24545e9256a5446d5c7d204fadff248fd0f53afa668560c9899bd768
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507f7f7983286b7541af785deede57fc5
SHA18962898f64785efda757f29ec8ddeb6866c5f939
SHA25688f89f39026016ac4076dc2e7b424c4209bde174a753976936672aafa05dd1d4
SHA512ebc5be82ab0554403b6984a969bdcbdb0454c899297fbf6fb1f3d1f0881d0ad6315503ea921c32bd51a5e03bebbc68bb69439cdf43b59754fd025d170b1ab9a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6c8a2f0d79dcddcfd8942061997b5fc
SHA15f4cba3d5d0f4308a23461dd6ed9e518178c8c2b
SHA2563f8282bf23a3cfdc4558db0ce9d6e3ada9b608559ff72efeda7a0e8e6b4b2e21
SHA512de3b253a2de8b835be5d59230e5c4f65e6b1bb9bc3dffec9d2d8c8ac1f0583fb90ddfa6ce7fd6a63e701860d7415aef904f744739cede8dc3745f878723241c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa79d4c7adc31cce5ab51393e092b220
SHA17d19193c84e84a54e6aeb4adb2ff55af94f8f9de
SHA256c33aa66f85bc6719e477bc5dd95d7c86e18289b12df71b440de5254e8996bbcc
SHA512b3f7407847d68218c7bb190aeb486cd4eb6d8b86c535509c50a1aa03444005a0b8025b6ec9224ce0a3b5d0062663e4549338a4df7d8f6a46cba2d781406c1007
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e01bceec3a1282e3e8867c0ceb42071
SHA113432512c6e8be262f34f79769c277db475bc3c0
SHA256c7abeac36d99979a28cfe7c3c2da448bec6a710c7aba4b92306de1c5141bdfea
SHA512ae120c94491bebfdbf1fa5e90ec66965d5d07dcdb261d70839e06a27857abdfcad910d52bce7150006c979bceaaf25df04154b507d788c767b2ab03ee4f15274
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b283a4bf26b8fef9854a47650744ca96
SHA1e792d8a8c854730498374529e6435ec82977bd44
SHA2569ec10a1478d7848e73780e5d31794cc9b84f35a37c3ad0aa4f524a218f2acd5c
SHA512a5a23c75145593ee4df296f37dc9b250b097f9cdfe05dcedab1e70159afbfbcd8ae6b45c90ca47ad83a49bdc012d6aeaf4eb34fd32f5e440aecb8a074cb5bb7a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b