Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 22:06
Static task
static1
Behavioral task
behavioral1
Sample
10ade003539a74850820c84f8bf66bc5_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
10ade003539a74850820c84f8bf66bc5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
10ade003539a74850820c84f8bf66bc5_JaffaCakes118.html
-
Size
138KB
-
MD5
10ade003539a74850820c84f8bf66bc5
-
SHA1
75c59ec7ddb73f8bd967eb5daa9d2bb35fc49867
-
SHA256
942765dbb1e6e0f0568ebe0df1b5cced2cb36a6d985dd3b0561c1b4a827f1dc9
-
SHA512
c37a80ea584494d40bbd27666f0e2e0ae2e29df99abcabf685483ebe4001282ad17f246aed1af7235237f3e95b5e25164431bcbbf62e2c4486bfdba5605b2a64
-
SSDEEP
1536:S1VORkJPWu4aFe/A+4CXlUWyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP06:S1U2WyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0ece8d9e015db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000047589953c9676c9fd4ebfd1623e6910dda6d5fca37ebeb11bdfc45299975f324000000000e80000000020000200000004f3196fed78828ac8496038fd5b963b4a455d539e2c3a4dd75fedf8dc16e52882000000014bc548e11f6c0c3f996f7edbd2ccd1b286f96eb071a970ebd02bd54bab8354440000000a9c74a6faeb4125fc36f83ba5df3880f751c9c37e9c60176c98fc50ac03397e3e54cf76e74580aaa45b1d816f3b296df47d9209eb2713a18c1dad7543bc09a82 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434155067" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C33AF431-81D3-11EF-A0D9-6E295C7D81A3} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2248 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2248 iexplore.exe 2248 iexplore.exe 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2764 2248 iexplore.exe 29 PID 2248 wrote to memory of 2764 2248 iexplore.exe 29 PID 2248 wrote to memory of 2764 2248 iexplore.exe 29 PID 2248 wrote to memory of 2764 2248 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\10ade003539a74850820c84f8bf66bc5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2248 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ae2e9a7b30b56389927d3bec446277e
SHA17914ff01fa0c59e36cf0ec06ed8b24787c25c783
SHA256d41e6b8a0c92df7c2b748db3b48ae7a025c6f403270f9118d4dd41d79a48516f
SHA512945b5308bc00a13d2dd958450042514d276689fe1a8a829c1852c31b403416a8b0f3f6bf25a695944de6bdc4880fb832703c55c3e5cc9cfeabec5ed682afdae0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e20c91ab8179bce05f421f90e0de38ff
SHA1e0cf7cd51f4aba38e28e8fd4667585353819d3c2
SHA256f6109e45cad59820041da063bc33b057e26b8a025bd9b4c0e65d361942932e82
SHA5129a7435867db437c879e7c765424b72c851f2dc40c171d55abb4480707d0124200a69bfdf13de2e7d65c0449cd5cebc760f6fa2d38a3faeb1e0f194afbade77c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afe403c8660b539ff1bbd70ff6ee722a
SHA128ce968dc5c44a25d252e08bef61a9cbf7e8b829
SHA2562776464ee63642832355957897f3ec4a66a74752c0e43e01a207b7343e082788
SHA512d3766ce39be0006b24fca701ac21420aea2e400a26dbd71808d3071e46565efb766d2cff1e0dfc16912798fbae3e519f23a3a0191af15dfda44ec46a68c134b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c95aabdb77a5e0e839469c3a919eb4b2
SHA1177d870d5bd821b73675bf3caa2d6b27eaaad7ee
SHA25680d9c84948ab3d7957034da9bd9f04e9a578cc6d1c15584f2ccc4e52f44a102a
SHA512bf2dc038cecf184e0cbea2d65e2a2a90a11272177c74ef0e96b977c4c6913b1ffa3809bcde481aabb397460f8d687ca7cfab463aa0035d98f42b8c9f66ee2394
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57733ccbbadcb42e52e89fcb4faf419ef
SHA1de95dc603bca5840f7842bafacece1e15405d175
SHA2568b055c845c90f7849d4f6d9ade8341c6feebdb3c6ba674e1b762da7227ae73a8
SHA51213d2523b8c5871a378132e42fade6c83e4d2c93d875606237cccb84fe0125506d26c19f24f70ecc55c1d3a3785edfab60dd44c6c113118dc130eda3437bd048e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b3884d7ce64bc2020d8416d7607493a
SHA15ace4cfaec150ff25b8ded1bf339bee521b61c8b
SHA25680ca458c98c5438e6533c9d0c7513443fdd48d97bdb868973d48e488eff4e8c9
SHA5124cd3e2ec605f4c84a947744606463d02580bb837b0762cb3e68ad6dc10c6f847befa45a839f054c666b42d9520e340dd138e2ab665a9f9133f1b74772224771b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5465441d96bb7c00f29b974588f83ed3e
SHA1ef136991c708478dbc50a4e6f4a619bab4867282
SHA25600a728e2af97ce27ebd571851297a211f31f6b21c593965e91bde0725bf08528
SHA512adc77594641f1b7c5375e522b3899da333ca83e2ced0607df6eecd914cf1369da58ac817e2bcaf6e4b8fb6e88fa84b9ea1bc4ffa5170de64bf0c9be3f693a33f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d01a5500b0fbe83f74e0281cee6cb2d3
SHA15f91d9aa474142b4e7fc66ae4828b68cf79a2c24
SHA25663df8bf1e93fb33be63b748c98c02c992bed110dbd76c78a3f50229d54d568f2
SHA5126c0b2cabe51c331a2c2be9b10d8875207456a3525cf5d8468a33361ea46ee530f91e2d0e9e3b252eba0b3ae38f9e9e52465b6d062be171f0a6a417d0e6d9e650
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50909501ecab2df1f5ca17df5139d8301
SHA16b3af49b44d3546b990f6f787a91dcea59194b19
SHA256cf28d6a37e9614cd90c503beba9b93e479039d51165b8326cece193c63522331
SHA512e5ea42be55741006087c3d1c504cc327285258ca388248976f2e63e8fe3318535aa6e04072ba0033727f407299a3b312fe14de131073aac01e4fdb4b210a88b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ba6575bdefa76e61f11e9cd6b58142d
SHA17c35b4c2bd3c83c126d419dd3586878af99fce00
SHA25698090d6b32b73be2270c905e80daca4835fbfe958e1df10cbc342a2c0a9370da
SHA5129cc5624c247aeac07949e4f3fd5fe15a01bf6bf906869565689d529f1a0d043cd3973656e98b0c47dff8b7cb0251309628da3d8db9f3abfd98d224f1b36fa072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d526bff38f6b0b2b760fd4213792b638
SHA1c1dfbb89025f842880990f0c43ff23c8526186f5
SHA2560c18876ca01e37ec19dbc2a6255ded2ae0eaff8325186a1ec4df064eab74cafa
SHA5129dd1b9a7fa0ddb48c9d5b47f343802f54f94c44d2224e744243b4c8435736d508e9106a75c3290983549c89def846edbfb308bd1ec0d8fecaf039f9361ea4d0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a7467abf1692bbbb87a1f3a602897eb
SHA10d82f73f506e4c2b6b91b467ba5699f25f97baee
SHA2568db5c9905b6aa56886d81755bca5c5cd0046f40fbce877f9582baab41d234262
SHA5123b204491c22635676b59ea929e7a2e2944bceeda20b0568cb15e4f7aeaf35df4b2ba7f7b09545385dd32b18073a08c556a64b2a84d44b0fda7aedd98c8521299
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505bcd38c8f14f959910fc1384bfd6ece
SHA106f504f9a13c0a78f2670d0617d6ec4682cae787
SHA256a8e5913c93fd0e5c3c7f7b121ce0c4d56eda4d0321d387f326235553746b1a0b
SHA51201eb15a61002912fcfbeec01129c341d341d7f51365a3818c2986e36af6f228c3fc0a04ed3b81f8b612a3b8a0cbf9d10253642b7549c1c317aa426eaf8a10d6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cf7c3d6d07234726d9ae04abe89bf10
SHA1d598e9044aac05de77cbe976a028ec7151f42474
SHA2564f3a6785bd923a090687ab2c1648933ecf52bdbb7dee9c827e0962a8fbad1061
SHA5126209fa5a849706e80f6bd26d24b9d4ab0eda54fcf123272314ed7bc7ce467fb743016ed78fe1475300f8d67558df094bd92eaaebdae54e7f81c3e5ee4deaa7e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d39fba869d3b3aa459830e82a7327e9
SHA1492df1afb4b924f1ac40ca6feaeee4e078ea0487
SHA256dcb89d9c290de752abeaaaa7c70f6cb9e8b0958e0ddb22741606416ea383c719
SHA512ab730d00167d52c17d9a3bcb5452e8b972f5950b08e30488d9601bb558f3f1fa449cbd074c3248595ea09aa3dce8554bc345344b7e9c674da7f548ece75062d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b095412c1cef697e1b561e76a13f12ff
SHA173bef4e21c81d4bdf0c426017bec01fa41f6398d
SHA256b9624084f6036ec35287a9d2b787c0c0b8d32a1759124a3da5d243586118023e
SHA51275b6e486f60f6614760083d7822ecfa182c5a12d7651451e69884303b7e23a9bf6d4acaba2c22e13bcff8b9d771d5374061daa2a45da640573e70f5bdc815135
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aca95857f956e2612ae5bbc290a01eb5
SHA11277f466d2e0673e5baef24acd49f102061eb241
SHA256df28bd45ac71e8d45875103dd5cd3cb77efcf021489dd36d2b8410b6be9756e5
SHA512772e6a9d10e7da198be8890e05af807f4e54bb26bec729e9aaa281405eeb51eca49c527db1c9211669b3449a08092b30e870e0db2b83668a13daf6a4433ed9a0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b