Analysis
-
max time kernel
136s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 22:38
Static task
static1
Behavioral task
behavioral1
Sample
152c57d7d4bfed82d5df03b43a0c9847_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
152c57d7d4bfed82d5df03b43a0c9847_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
152c57d7d4bfed82d5df03b43a0c9847_JaffaCakes118.html
-
Size
16KB
-
MD5
152c57d7d4bfed82d5df03b43a0c9847
-
SHA1
947924c5fef0656b15966fde95705349eaa44eb3
-
SHA256
2eee6127c7da9ec88bcbd5f8d32eba6a7cfb7d3503baf254b2a53fc205238bde
-
SHA512
add98214273f5ac8f2bd01998434237b65107218f6c308a1f8cfe4dcd23ffe34972924b628ee18a77a9ea9b47dcd84a74b3cd9dac76de2ca52426f561396a650
-
SSDEEP
192:geY9iy2PfqtQz4DJyjXIRKDvo/nymbO8bYZ1cOKUPjyDnI:geY9iy2PfeDUFIeZBPjyDnI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{68C77B81-82A1-11EF-943D-F245C6AC432F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60ad6b5dae16db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434243393" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000884c002ade335d54dd138001a053b1445c08c002d8c4555d1412c0dcc3f2a3e0000000000e8000000002000020000000ea60c3b4e1f01b3ed20a2b96cea511bd6e1966b92f9eb4e0a709ae1a1f68f2ae20000000c47340ff59b5adeb842e68fa2d96411b34d3bbfdeecfb423637fa1d548016ae14000000017449649b9fabaa7f5beeade0f975db4f8a661f021aaae0248aae9ef712d773904ffad936ff9170c3e5c6501ce972ae6da362738d8889c50498a313737255d66 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2712 iexplore.exe 2712 iexplore.exe 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2948 2712 iexplore.exe 30 PID 2712 wrote to memory of 2948 2712 iexplore.exe 30 PID 2712 wrote to memory of 2948 2712 iexplore.exe 30 PID 2712 wrote to memory of 2948 2712 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\152c57d7d4bfed82d5df03b43a0c9847_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2712 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504eaefa7be014131d0b0827d88f25862
SHA1e8fd697801f03f9ec65546241d6599e29123d827
SHA256a05c20d26b06f023e666423aaaf6a95f26425c09dbe844c22efd851136866c88
SHA5123658d6968a14fcf147fda5ecc4e19cc847231e19ac8a0a3b35354c1e28141e7e4eadd4763a856280233a95a1b4f4db3f7e6a7fe1268ad070539e6c010981e731
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fbc4629fe218624d2f1c9f93eb7c0e6
SHA160c651ae7a5075edadbf21132d71540f2a31f354
SHA2563a3a8bc1936728618f44a8f1e4f763fdd95d18b0e3cfa8f31cbec107f52666fd
SHA5125dc16ad55635b98359141dfa59e8933a1a0e257d890d543d606a5c0a5395ae7a6cbb3ddec03f1acb1020feb8c3c75e7dd0727a72af99718f413135ebc45e9834
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500e6e02a637150388c97fb66752a68cf
SHA15dd0a5445c900750658a21d704ecd08f89eb01d1
SHA2565709cbb85558ec6daf597c7b3b2f1a55b25a43e242300956cb641e6b2e946602
SHA51227eef0432b02b8f601039585321de15c7c08c4726a0e703e4522f058d5c499d5eeb9e1d7abf77e6ae15d8122e9299a6ee31ab2242436ed3473c80d8dab23d786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8a6b2fea338e22f4728efea6785a945
SHA1fdd90e3d7c32e7994d7275163970f61a332cc186
SHA2567f225fb3e2666c2efa9019d3609153e71f03faca8348f02f861c62e56dfdaca1
SHA5123971e156b39b18d586ad38a1f4736cc4a42ab0d97bf8f6d126ce37c0814d145f2e67297af5aac24f87d3a9ba4e01676dfd52890ec0bfc743fbdee0b83d9c317f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d67040a2cad894763f556efbd764aa30
SHA1a16da3c49a4d6b3797e5f3d1500f2a7e4c7b2280
SHA256d65278816d7bdbcff77e68805954d6b0616676fbd59fadcb5e5ea0360ac4345c
SHA5123e6716a9932dc551849a61d38da980109aca15b2392d091b0ef1d35015c9e5298e3ed48a56f6851f9b28455a96457a199281f775e2ca26660ad3c0147bfad511
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a60a479b159ecbf0a60e3ec9332d36a9
SHA1c90e5dd5ffc984c3d881cb53eabc98834e8ce438
SHA256bc2dc2473c7e60ceb3e76b9dda9e901d2624c4172524140e093b929d8021b60d
SHA512001a7053c14a098840347c020588b2028cb93971618e298d849884ecd57dc959214f91e5f16ba15e54d258ed92803056fedaf86dab70efab0a7e87248e8941e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc212afb881aeee6240bc9421c2d58ca
SHA198606328602007aa95f8bf59f5c4110efc313878
SHA25610b0479ab86d4b6d6fca099aaca5906ff858ff5f2277281d3ec6d98b4e1df4cc
SHA512dc63e9f2cef39c6694defae848e3d098aa593ad4c7359d4c9acafe6b212054ec04d004fa569b773ee8d9a8191950788bf48a4872906fa6613fece2917ec31853
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575dce46fb243f85584a6946f7955af1d
SHA1e478ca2cdca6646b3a5b467cf4e9e20954916cf1
SHA2563c0f4fcb73175167e2f8997e1156859b026a1e7f4bc78efe056f1a17eb67e1e2
SHA5121c9b1486d847e9932b60c0926337a473685754b644a8bf0b4f3b3ced36108c96cb38747e41bfc86533a1de6ecae966a745766f501d1bb2dbb3a7dfaacdb0c259
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a802257367546ea024af1837b1f065a
SHA15bdc1d126f034202f2c6eb659e4f38b38ce4a15b
SHA256efd959364e0ca9ae9e2280e4d80cdee3cb8be9838fd20b371b909fe04dad422c
SHA512dcbe37f9a3e78358a19ae51f54d112e010d9b61b246c7228fdfdbdb894ba7a00cd06cfd354b4e561b28fb57152bcf0e78d2e63d968cace986309f2b107c52c2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ac2332739a1b9385c0768ba282bc738
SHA16b0b637f8b67c72392dfd6bb9ac10a332016c48b
SHA256dd604a92c49918ec10d9427a26e2dbb4731260492645c6d9d5bfa74d6d2230c1
SHA512b5f5d608dab25ac4b6ece5e5d678743e1b8d2da23193a6c1a60ee6148622e987bdd2850a8d01ef6d45c1125c318b387be82e6280a9bebc90da3cc7a6b242368e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7e68177e9554ff75e64c0fdf098150c
SHA1b7ae3e6aea0d38e8e6684ba32205c36325e26a15
SHA2565f0258bea9af0cfb0cf4bbc18810308051731098e54de02320fbf0c511fbf0b5
SHA5129049b0712babcada9667bb4163a8803d368b3ccb7a15160fcf3389f71c86204c8625f57f97c93ead8e97a2c99af0cbee1dc03f268548ed78061681de6e5c87db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4e9612c681022039113ac46462beaf1
SHA17a6b88157c1846b99d04a3c8fb10ca02dc084071
SHA256cc35e761cc355942d69f6a17afaf1e05aac6765bda20a40a81e2fe879aa3e7c5
SHA512d2d5257fff4e97a50cc5fa120efc74e81c133600f4ddde25ddb7945470e71a659b797b473a2a1aab5216b9a221af8fc3d79b5cec4efbc8bb2a078e8ef88dfc76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556fbf41e56c938ee24670e6f45808e56
SHA1c1921cfb190f695b1af7459c4aeb90f3b2f254a9
SHA2564474c2e174521c515c4f7fc92a52d7a52d61a023b6cbac14b151b6e9414c7635
SHA51226bc88639b84bebce14e2590217135fe15afd336890d6c0f4f829052b6d3ad48d3e28670dc73f73a7a5a166265cdbcfbebb0bc51e2e04e0b28d729eefa73c8b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5244ad22b2a6742928b787f5709fc8f3c
SHA14ba1d22586a9baccc206c05375bfa89f47079605
SHA2562bb6cffb4e2a8b1911713cff71f9d4c2408601aa9f0390a0cff5d23aca5a3379
SHA512d72f9a035533f3a94385dc947e305063646b3e1b65805de1ab69646e8153db84f0da726f8062fcfa176ff69c2e3df4f88296b150f406ebddb15af610562df016
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f6bb75ba9b792f02536cb44b63056d2
SHA1cc09453d690ef98af34711831a958bc74f34e61a
SHA2563c0ef0a0bde4355624c466f6f0536a6ee7ecbea8b9eb87b12ecf12816bb99981
SHA5123e17f2f481baa6790822d2ef19cb2593ff3687ba4105143199f6bfd11b7cda8137f7e69a02a428f1be993419880a71cbf9bd9ff6876622c246983b12f2dfa8d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdae8110535e529c223d7fb735d65509
SHA15b899ebbe60a718d1c27b84033e53b20d2594c53
SHA2561ff9bc659b9120580c8f399dd4bd09154bc95b898d4264cb6bf1bd291717362c
SHA512ec67f0df1c056e63089a292dc7e7b339f84ef4039631264ea13d28a0c20071a9515c9efa5b30cef0a7f948a9a3476429e4dbb6d9f7c492c14fc0a5df1ac0b879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529c2e6d08d8f39a3f286fe1f1c8fd895
SHA117d671abfed7f9c366f04a7a847e5f8061bfc5c6
SHA2565dbe0ea4ca7bf737ef2fd259fbbe9e55013226561afae11c5b117653168ba954
SHA5121af8332baa68d79c8543fa167d304b0699202efc906ea9d63a3e827921a5db38fae916a2c3e0bd2efdf56b2270ac2370bee510f6e7a8d6ffbf2084eba373eb5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fca32bda17d9d5c4b8ed65753a3e325a
SHA15a8fda7542b779ad9c5aa9c20823f94bb7405b60
SHA256ff0530fe32c8eac9488e2d6f5afafab9fd845902eabfd14608d191a6ec48701c
SHA51282ac4edb92fa7def4c215d4cdadcd57aaf02396e9af62eaadfeb32e6b4740baff50dd70bb3a4e0581d77f09e65b6a138be2b86b10c2ee0fa97d61d5bb892eb34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595429d81cadf26b2eb2d800de638b147
SHA16aebe106d42a0c554fe9724a051ddfd09a7865e4
SHA2569abc9b44a0a815be70e45a41bf3cb5de7ef737cf1b108798711df960201bf32e
SHA512f5145c1c3bd5b1dd80479cde880be2cf664f7c974a5692a4f12b42962a843cfe61fee68bb54dd5c8d8c9bc0ec0d4b1be821a6611e0033339f547eeb770facaea
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b