Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 08:10
Static task
static1
Behavioral task
behavioral1
Sample
12875fa6d7b1b62160e2d52cf369bce2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
12875fa6d7b1b62160e2d52cf369bce2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
12875fa6d7b1b62160e2d52cf369bce2_JaffaCakes118.html
-
Size
53KB
-
MD5
12875fa6d7b1b62160e2d52cf369bce2
-
SHA1
0024fc188c908134a9bb85fe32ca89aa5f5c0c91
-
SHA256
ae06ff8dff920a08963d17260d9484a1a25c1ce817810e6ab9be923af3114089
-
SHA512
10f44469062f8dc3374e7c2bb21839dc8940f9cf161a3259e09fec35ee9b0fa71f94941f97ea03bb175d13b58a534bcb3c9f0fb88a56fcb284340f457d495d48
-
SSDEEP
1536:CkgUiIakTqGivi+PyU/runlYh63Nj+q5Vy0R0w2AzTICbbGoy/t9M/dNwIUTDmDq:CkgUiIakTqGivi+PyU/runlYh63Nj+qw
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{27FB8341-8228-11EF-9EA5-F2BBDB1F0DCB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 304243ff3416db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434191313" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000003f7d9657688cab0776239af955bd757b2be08b9b0880d2bd78f7e12436601a0000000000e8000000002000020000000cfe2f0f12b0e53639347c4734d5bfedae0f9d45b581eef74a64808233183f85920000000107e3941e0f4bbcc39a8f582f5559a9525ef30eab76ca31cd1b284c5a0f1499f40000000b60b6b3742fbd3f7689929613837fae5719f5fb4628b23e41490f8a8400d8e3321b541617df169df00a88524b37804a720698f4c04e250935bbe1be7a24bfe1c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2356 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2356 iexplore.exe 2356 iexplore.exe 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2504 2356 iexplore.exe 30 PID 2356 wrote to memory of 2504 2356 iexplore.exe 30 PID 2356 wrote to memory of 2504 2356 iexplore.exe 30 PID 2356 wrote to memory of 2504 2356 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\12875fa6d7b1b62160e2d52cf369bce2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2356 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d137df5108cfa9d9bbd83374b7b02699
SHA1c767c9561c3b8610bd98cfaa180b094f73041cf1
SHA256c4ef08b56b4ea38dee5cbe942d37670cc8d5a7f43876b739d601ab24a473104c
SHA512c8a0e348a55a42757e77e6bbcc94cceb11745138372b72fa4efce65e50c6afe3bed9cc158ebc7a4ea62d949fd19bb4e4f5865e4024589a38fc93149f15159f52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a758ffe27e7b7c919a218825698bd40
SHA1a64892046d969985019ca24def757d2484a73c15
SHA25698948127e850fe1b3279a28004cdad18edbc16e0021cf2c676bd95532fa8ffe5
SHA512f8ca85c6023e31b93eb5c01e69c09ef1aab60a0728cee577091e7b560778c9cc44894c79a80d90814708be3e09a5634ac2b9811c0728680003b379fbfdba6b17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51645f8434dd52a1c492a7c23df3bad8c
SHA1a6be4cecf0d37a92b12c00a54d6259f4b066650a
SHA25600f608974af513be69c60ed5024216159db543f7d59d4316785891e14661c44e
SHA51253c10942b575795e7e2b4126449ce67fc0f9378bbeb8e014591972235115737ad61dd64390b58c4a7ebeb4d897a5ca6ac79598ac99c0edc8bb1bdc7782cfadef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e7e03ae356066cee2785e829bf89f37
SHA17537910be5062b5c13f7c9b87ccc8d78ce49c526
SHA2563f05deaa5ea30aa3a711667ab87e6bc4d031a20623fef392d3ea6b4d13f40d19
SHA512b3114384b148c9b21b27a04531c62a1fabaa508b6e5d6b715fad687326947a55a760be31765799af0ca0f4071d5fb4f36b6a4d6ecc3f931fd4a694d6906ab39e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6516de42bb7548f163e141a46d7cbc1
SHA17b4d01883b651c6c8084c5fb33c549469d7d9979
SHA25643f0d2927f683ee5fa969aded50080bef57eefe066aadb6806ac452d9abb533c
SHA5126a52b18540472951832378bedcdfd801fd259bd65d8f6edf4cc9d9e58277079f52faf4bb123ddfc428f7b2bc6015b661818a45e8d562d62d51405f9771f234e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e6f09063356e2ec6e0340c529cf9641
SHA15f2cfbfbca2a1a174a334989a65fa6b229d839d2
SHA256d3e0de320b35ff0654cd560605f364b276285db505344e91a24f4d02f8d1e97b
SHA512b9f9b675b918419f9848d3717c8ae07439d2dac03bfbfae6072cd8b1ab067d8ea5bdb814d80e9efffa30f327266402dacca32fb59e9d98089c198f8d9f45b3ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e2c61abe89a6da4892fe8ca0d0cd7c5
SHA1cc355809c42722670e052cb42d63b654f47d63c1
SHA256fa169cb672d527ab97a6fda84520ba5120fc9203843934f35246c243f2e68d61
SHA512ccc11c3ecdeddd466c1d727b43117d954a8262dcebcff5c14878a62ec47c804bf528731a2095d6a6c69e2d8f9ac169dd74dc7e4f34c5315f3d220624840941c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e75a2db0012bc86edbc837e235b656f7
SHA196db3dc788357ed81014b20a34c5db9ce7c2b254
SHA2562b34a7385d7bf8615cb8788f9fc6a42634148788761e7a85b0d6440eb89ba8dc
SHA5122cc8f2a3435df5ef980a457050c03477e8721c5ca470b1e1508e7d509c740910699a4c0b732c591fad367293e60dfaccf4be1575e5b23f35163ad1f00b8bc436
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0f3533a0357a48e469937fb34579589
SHA17b76d4c14fb9baadd5999a1e9ebfa676da0677c1
SHA256cc018fb05318f51845a56c8bd61ab755f997809f12befd34f39c8840dd65992d
SHA512cf97765548a7c7426febb4b65d12ab5b8089fc92f7061e2602d34a4579dbb51be7ed0b1919674e43127d9db9093e382b24aa6d5008f0285bb0e96f4480bde4ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51449b6641da838fdfbc906af91db0701
SHA1db647bb6f9e1bbb6ac2e58c2afb4c17db4f92de0
SHA256497c3c80ba2a53af984d0ec8f981f986b5e585f561a46aacd3a27fb12e6c362b
SHA5123a1d80df2ba182d0fc84648f0249d262a23b54f7b8cb30d23b3fb68562fb72fafcec9027da4afaa9efe14f0510e86d6d1015d4dd2eb484e9026c31dfb78400e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5128fc09cd2b655a53ec1afbd116ef2ea
SHA1e1ddc93ad880e37e25ea5763a818154c1a995379
SHA256636dc59510d6a49b1fbd24e318f24c6c350084630221987c47293792eab1f5a8
SHA5121b657db6a801cc5db1e2986eb60754b6be61c35dc4b24a2f791045ae9d493003a140881a797fde0e282d6eb1a762a659fbc7a86734a52a4f6e514a560c84db6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5288d4431f58da405ba57b263b459bf2a
SHA1dfca696a841243a9b223a99ced5e01119d22d2d2
SHA2568519805ba163128168c0723955c25db6226c6a06d73082d3708c243e5bcd0cbf
SHA5123559c86d8cf107ccf56fa29bb7e767acdc7ecc9de3dac350e6cd71cc3ec6fe476c77b5672c05a146768cd39163f6f9d2878bbf23db2f3c873d355832c67ff81b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaab74d21234a49df6b553989e8ccd69
SHA195058f752ded7b4e7836e0ae22a4cd48bbd9682b
SHA256973f6b52b334c1daa4ed460ae95d148ec2608b0b2f2849528983d5e0ecac983c
SHA512422b58a7c4fb22e06559027a03ee7c3ef3f87de7acda4b3929148bdd47915f45d6312315eedd2e3f0de3d0b814d20e3080b171fcd2773c3980011ac4379e71fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5348786099bdebee9e7afcdf151f2b8da
SHA1b0579db84ce69cf9bb296366c15684ac97aa9cb4
SHA2566e389ab6e3e7fcf7ef11d10ab8bbadf3cbb0b4f6957b1c10f204de00d08685e3
SHA512277de62974f42186c92feabee3801d2d9d67081acdf78db1c646cc43955d847ba8a9df85529cac55360ecfda03d478a9605dd8fa42d7c3c62a6737c0d54bbfc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef965a2faa5028d7825a844102f224b1
SHA1fc404674543c390aef502bdc435da634bd7e5045
SHA25676914a7d01ad3b6629f90b2b7fb46c76c1a6665c2853a22eb46d28c73a885752
SHA512e1ebc58543a63c9b970ea43812fd56b34c7c1c26631669bebc4081b7156eab2365f2ff543d5ca211eb87be3238ac80d4dbb32fbc6f25a9c766b9bea2e5a22c22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5082db54af90f3088c25d7a927c25d301
SHA1e2f7dd8e27159dc30aa3ee471f888419bb1b8f1c
SHA2562bb994acc2bdddebaa157166c824790daf51d4dc38a77063e977b1ed910bd5bf
SHA51210b93b0ddb310099aa1c09ce82a6122d832982bdd13539d3e6e2b146d8fabe87fb1d8fd2d31accf0f7df354f58cf00b4e6f7f3333780d3559546cc2d4c10de1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b58ce99bdabf50826025d38a65a15ba8
SHA1b4aa90976416761d85f30b3257965a51a7beb09f
SHA2561e6ec371d115d47fafb8342c3efda855eaefc7cfb5758df6fec0dc2354b7fba7
SHA512a3ea756b3721d25767506596c80dadbe81ddc34e8da1afbfc940239bc6ed56a49c9413c8948e74e439c464e48c59b40787101f16ec591333a539aefffc031928
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af8058e1faa8a73eeee564efe82cbd34
SHA1ea54e1e2c1a671e2626638c57f69279d4f93b76d
SHA2569e9a696071624ef7759a5250f8cbd4c0e0c7afca7385634fcbb0d7045672e6d0
SHA5128464b04ea099d13c47763fbe5028c699bca38bf02465233f9a5b1ec2ce158c1f416f8a32fd85f3027419e283fa6404202c56c5a17a1d07d690e36bfc2d86abb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56484af4c1865f55e00ef739e8ed6f910
SHA1e76625b03b093ce8e2148d72bf1fc08d7bb2f84c
SHA256d1edde9dc92c17937ac023346045331861c470737262ce9307cef839354d3d91
SHA5128a5eae42feb162104f903ecd3df5eb568bc0069211a229bdc2b2e219d5866f08a1fd1ce567e972d4f1b8d2b56173183e8fbb7c899d8e4b3dc87642f4f887f7b7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DJB1KT77\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b