Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 04:25
Static task
static1
Behavioral task
behavioral1
Sample
045c754806c944351b07b07f45e413b8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
045c754806c944351b07b07f45e413b8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
045c754806c944351b07b07f45e413b8_JaffaCakes118.html
-
Size
6KB
-
MD5
045c754806c944351b07b07f45e413b8
-
SHA1
71855d85d6ad38c628c5732843353ce57d6ff89f
-
SHA256
a100e1e17e9abe9281e4329897531b9a690c3637075d644012b90901cec7149d
-
SHA512
2402b2c0745c3e56c9facf2ff7d7bfd768d5ee3e47d9de83929edf759d335229f212c2c0560acd344bd84240fec0d510fb4da1a02992269d7fc71a6ad57102e3
-
SSDEEP
192:Zy/O8yw4RlDEvHLgszgA0KydXDChxiqEuf:8/O8yXRiLgszgA0K9iqEuf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 207e68feb913db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{283E4CC1-7FAD-11EF-A8AB-EA7747D117E6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433918583" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f5420000000002000000000010660000000100002000000052b5a81b8d5503ac7a76f745659f52734c6df265ebd84e8fa14bda50e39579f8000000000e8000000002000020000000ae6123c6f9df48022043ea4f8107246c14a6cce1e78fef77d88fa5bbd681739820000000ea659fac7f0248210b459a3a9e4ea7d87d396b33970e749d643d0bd7d9a8ecff400000009cfc5c44d4292829e9115335dcd54e030bb56222cf47d7a8d0ad28e721037a95ff1d774d55fe267f2bd0b18c9ca0fca7fa9e99899c0707d91d67ceda6dd0df46 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1480 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1480 iexplore.exe 1480 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1480 wrote to memory of 2092 1480 iexplore.exe 30 PID 1480 wrote to memory of 2092 1480 iexplore.exe 30 PID 1480 wrote to memory of 2092 1480 iexplore.exe 30 PID 1480 wrote to memory of 2092 1480 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\045c754806c944351b07b07f45e413b8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1480 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a5981c7c37796aad179513ccd87f496
SHA129b7a3e17ef702f58b1314dba8925976d8394c10
SHA256658a26d619867b35cb83ba08a87a99976cc355c785ac8224caed93fbe66412e5
SHA512472ce0fc9f3107688d9fe17c0cd604596c64656965fbd91278443c970aeb14375592eb5927240bdac40c90b5771aa7b5353e1dde2bf2700cc9cdb6f2c4a438d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8919c1071040a74af32bb0e3f2ca1a0
SHA19a97c2a6dd0f58805d0a50f0021548069a33d9e7
SHA256d884ef5d4cbc588a576066c1cadb418661a9b0c4aa51e02972fb738a52f85e36
SHA512c892c4a49698ef41f2fa964ea1c981bff9891959d8333ffb7485a9fbd6817b39068aa3fec5756ce20d64179e59911e7be9d7ca44cb9a5400e6338ed5857cc0b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f4ec3e79b76022bae319b29f33e3247
SHA17a310b507db9b0fd4a023113a22dada51dcf125a
SHA25669c3a308b0b947fa6834d71be5f75bf433bc709b039d8f55e4eed92a2a88f69b
SHA512991cb8f5bf50c3164a38b1278532a2bda6af46de080b96c244cafe85c2cbbfdc60dd37dfdddaad6e085ca4a33313bc0cfe203bc523e13f0d7603fe5d43f979b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53051fa121319e6222aa351a450db4510
SHA18452ba91faaeb1ce2d1c26a6d9dc29325a6acd37
SHA25652741e70d89940fa78081b4f0caf35ec73bce0b210a25a6e4b377163b1374675
SHA5124969a78efcd1b68c945a2fd78702ee49ea0ad844a333a5662c9dd2a50bbe58d871b4b2525f69fbae2db12312b20f5c0a601853b61682106f118d33cda08a86fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5080557cd31ee44e24f153248120d5e81
SHA13593e74e1e94e42497e732cc5074ec83b6487d54
SHA256751a4d4ce4ed7a4eb53086d2ee15476dbac7e608af6517a23c5f0817b8c919d1
SHA51285b856b3a29b060c3519a0f3af369c99458eff8f9c1a57e5afc520576c8e192ec50d657513a7fc87912a2cd1daa0187bb9d9c151313fc2549db64cd26de181ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cdd5d19f4fbdf1212ad54e39990c746
SHA16a16d692f8c213fb527ca70719527bba1687da08
SHA256cbeb4daecd41951674245177d03271229d50cc78ee5a05583166166dd7fb07d7
SHA512a2ecba40d04ef268a9e1fb5a8ed90bf52151235e11f27dabb38b1493a7ab74b7249bb65fdceedcdd8521b7d3d20ca9eaeec3b394addb0faf991b2163a4d3f947
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537740c48c312c64c2c3f197ec1929cb0
SHA1a7f17bdccc7d3dd599bf62aca302c254b14d5049
SHA256bea3072078ec850b0b874d20ecc0d3e3d5ebbe9ccfa81b7f796cad0c99d16ca2
SHA51260364b2dcd1fb7bdbf74b6a7ae219652a2a3cbb614d7851b8edf1f24acdbd176c74b2a661eed72b98e3b774a81a2e306bf9a2a7640bb64a569e940b3df25e82f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510eb6bcf49f695757ac3f504bee96053
SHA114763d3e7633f16eab1453428c08fe4367262950
SHA2561bd54b2d7c645891affe7df81d925b869df5fc4c55a8af2502114da2b91b49e4
SHA51203150657ea7a54ef8aaf5ca785558aca77e7dc5873bddf379999b0a9c8418c81894109c3404aa0fa858c2cbce24c40d6990570cb524a82cd0f33a371e976cff9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58582ba29228f9945e262fa0b1075569d
SHA1ed37687579efc6dcfaf3e159569926ecadabebfb
SHA2563f4a764d56c4f81b5a5aca554eb5a151ee8216a71750946d7526923646385910
SHA512949b80c4a2ccedf9a339b1dc0713df8aaf5da29798d92ae4b6a0b52346664d6ccb79b2ad7ffcd84dac404456c6b796468b9ba299e2f82ac071bfc02c2c52609b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a84882debfb65acb07acf657020438a
SHA1d1d00602dee6443dbb00280e6950a0300c84f1ae
SHA2562be55ddf7b4bf0d56262e9f2357da083ab8815fdb08a75a8b6b4c6319801d16b
SHA512a9245b63df7ddde27d5dd3eb5d68a6007b51996db046a637e1e1b07f6521c6b15449c58b0811e7154b20b8e7b1911179fb7ecd87d7848540bf0e4d6a438fda29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513b8a10ef094869cba744f9c52d2c94d
SHA1cdd8261e97b7b49e0767ce0c853f3d787638ef9b
SHA256f6b1bb5bc2cc7948f1168f42004116e73d9e230beb2eb3c9fb6f7692e6e4f2d2
SHA512ebab8597a35c53cdfdc48bc930add25582080ecf9d1d008089cf284750de18053c8967aec2e9216b4e41df0749878584f8a53956622bad620e25f81344b0b4ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546c93e8b6ac23bf4179301c3e6d468db
SHA145bdb8d452c3a221766e3bd5fd31d456ee9dbe20
SHA25609a6965ba1c14f23662f792070eeae4819c96cc94b808a0f44d78c85b0cd563d
SHA512d5b1587cab76f1b693dc6b90550778c2e4ba79c4183e0c500097673b3df486452741ea98d2f11af204f74d2f4f6a5f23d2a7ffc3614d7ca17536a02a067da3e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8b784b5b61cdca612b5bded127e243b
SHA112ef8a054aa227500d884547cbedcba51869af04
SHA256026fb8bae9abd10c3c0e417bbfba5624671f155c1cfb46576a7c5cc508c6d45a
SHA512d5dcc6b7d27ffe03222f483a35adf68e7857c4643432bfcebb4f2fad0c5461c87b706b7d445ca261e8651d8577e3442c5ceed4daaf15852396a8fd1cabecbe93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d7f7ab1a9c50ae771d71c00f0eb224e
SHA1ccb84b1bf62bc18f878b740cb5e49ef2451262d9
SHA256f084747fe273bc45a4b108abff2e53b40eae380af96dffa7bc4b7a18ed2fa8ca
SHA512c523674f72bd2f4683891d9ecd2b542bb6de08629cfb301aa6dce413f64632a7cd0401309509e9762ff4ad3b14ba6f1d909ff5ff0b30bec45123f2e447357129
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df2440cc816e5bd39dab52eb93bd14ab
SHA10ac16ece816cbdf28d052435c8caa81a8a87ec87
SHA25686508fc0ab21df9658e4bccf597359054587dd87c8e9e7d6a872db8898ab477d
SHA512996823df52af6ddb7b412daf5876fd4afcaf213d99eb7554a5565bfae885aeed033781ec00efbbec00c58beb86694894562cf6bee15d2ec0e3ef9ec88b400de6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562eb3661b8138a4c3712b27bcac17a4f
SHA1530f4066ace2c98917ab3fc7ac9af5b4b69c9195
SHA256bde88f3206b94f348d7e3d9c36c92d5dd5c6f1f476f8aab673d1020b58ad9f30
SHA51297be95d80f21fc69fbd1a591693fe0eacc10934226a69b429d8d020c6849cba6695c9a4bc3f3a10e0bcb47a1a4c6fa07264926de5d9b1d4cfc5f115b35705c7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b86588992a7a69a813a6641199df795
SHA19522859c127a6d22666aa0f4094d47178e8962d5
SHA25630c969c11c33c3801fc4ca80977066ada1f6d3402d90c7c76a38fe42bfbec8fb
SHA51283101e75252d47a4b4537d995ecb7cc06563a613c2cf4b0496fa1db06ef8816ae7a5fd7c0cd4881787548e03a1ec392a6752d1405460f7c6df25a9eb227e195e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596590d937840cc7a109cc597c96ef739
SHA1f58786a269ce7c3237596838fbed0424473c0ced
SHA2568b0b67e8e1a6a756d871c4d44dbfaa7b5095c0ebeeb11f610b3a7dee41d37063
SHA512e9e3a595ebea25b58062ca5e35d6aafd5d7e2f94773bd34353fd8ac0213a179c4b623088ef4ea79171173d8a01e8d7bf848d0146d6d03c53a326ec36a7340417
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545403e2fada54e6752016d613ba93609
SHA1a17d4895eb65726f5c5d6c4cac4170b743b9ef75
SHA256f779bbeb5f40c6ef0d19df75c1e35cc52b9da06d31aeea7206eed63e83d5df9a
SHA512927811c8ebf3c39cac073c34425091a9cb43efb357503924ea466bfeb405d8c565ba18a9b535ff591c24ad97b5372bb829979b5f77fda844a5a8d84791d7ce7e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b