Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 03:19
Static task
static1
Behavioral task
behavioral1
Sample
15f548441c222fac6f1d367cde02bc67_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
15f548441c222fac6f1d367cde02bc67_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
15f548441c222fac6f1d367cde02bc67_JaffaCakes118.html
-
Size
109KB
-
MD5
15f548441c222fac6f1d367cde02bc67
-
SHA1
226c0071e42bb3425e25ca676921cd2bddd768d5
-
SHA256
70307a39b7b0032971eae9d693ae13a23d8381946079c0e2ce3778a5655ad47f
-
SHA512
473a8c8ff3dc3d35757d0ac1521922fb749dbdd7a0e89ce68d0bce16eb26f8b0b317bff8d601dd82ed565dd7aa7a3ba5fd7aca851237aeccc1bc163715b2c019
-
SSDEEP
1536:ysNL6B/VDpzBhVkGOGCSkqsnV4VVpzBEGOGPrJuIGAZ3wSp:9WB/VdNhVkNFSbsnV4VLNENKrlGAZgSp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000c379bbcb8c68058d1d7bb74a4db1251d288716f6d8b7d78563d1f11c2133bf1e000000000e80000000020000200000009f30043a338958cf22a8332c1a8ee5c35b63fda062882dc4218ab42527d380bc2000000068769dc218c2b1062a442535764d607d930bc2f641f5409e3b4fe9cd6df220ac400000007ab1c26db66b4dc7f497058a241f0acd88e43b531b7bd9eb62b239325510139d52d278c2cb5196b5449d86bc6a38036994d0efb09c2308f341c4268efad45e43 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A4DB9211-82C8-11EF-8252-C28ADB222BBA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434260241" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0dbc47dd516db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2416 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2416 iexplore.exe 2416 iexplore.exe 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2332 2416 iexplore.exe 30 PID 2416 wrote to memory of 2332 2416 iexplore.exe 30 PID 2416 wrote to memory of 2332 2416 iexplore.exe 30 PID 2416 wrote to memory of 2332 2416 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\15f548441c222fac6f1d367cde02bc67_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2416 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cecaf1d6b9db236af87818526ab9ae71
SHA1e7fc0bac8bb456472457a0fbc44678b01e43ab60
SHA256d3fed7a51d579d61040ddc56bef93fef990a1c8dd45b75422d6ed8492699e5c1
SHA512a6b88549b4bffc23f7b167d1df73b3c5a11b2354907f94c5981875971d41ceed3466582eccf8d8916a840826d409affa594c4e0334e4292eae2914367b123072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d5f9558da35f9255a202dd3db59aaa6
SHA1d62d5961dcf8ed9ceabc424e60dee5c9e830cb05
SHA2562106c40b2cb09f8e7ed7dcf67ccc50020a7370b5ff9cff4d9a61034ba7fccac5
SHA512184f26830c6979a03d847972a19c649a4304243f93b3e6ed09e3f277cfd6dd5c24aab0e2a8c754d55b4591f0ea88cc243a0dcd9e9b5da826525447757a03d448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd5e6cf222ed25169126cd05337597bf
SHA1e1c58b5b972883143262298b147599da45d5085e
SHA256712ab33a5c285c2bcc54937e0a2cd2705ccf87a0cabf5ad260c299c12a561cb1
SHA5129176edc0ba031c01d032e8262729847bc1c8cb36745adb54773f376a6e26ad4c88cc2ce2e07dd6350e6201447bb6ade14d8eee869eb16c0b20905cb8c49b15c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55889ea0d764c37382632d839919a8c7b
SHA1dcdaac6e356ab01ee37aedb62e1ee1324a546246
SHA256d3da17681c7d3a07237ed6368f5b1818b6068d4df0d2f2e07d411673efd3af65
SHA5120b15b80908c85dc508e43920f383acf404a7f343c6d2a1a7d67b0ee7acb76ec53547865793fbc9d965c6763bb8cd8560631d07a36f1b115104153a978c8e469a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f79fe0fc5b8fbf69b77c60d51012ab1d
SHA19a6bc4e0bb982787e2b7768f82bfac03ed7b870e
SHA256b62631bbcc86eb087b11e9a2fa2787f21b492a95c1efc90abbd047739645fbfd
SHA512fbfb027dc802d0112eea6edb2b6fe6d6947db198b9761629c53e09485956e39d32c8fca67d7a8a2ae6f50e12e3c0c64f5f96a2d73a6cb54ec82d6ba2fc856867
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5175623569aa32e75003f148cecccf669
SHA166ebe7a6167edfa3d11ce5d0ea01059bef8ceadd
SHA2562f89f5ce56689ab31dba2583760dcc32b70aff87f2b4c7ec171305add49d402f
SHA5128c7f9e8bf2b8a5de85d392ab1a920a934d6289184090f4dc74559af142b8beb492e92b94ecfa989bedee3b441597da7c4c8aba032bd62825e8ebd48e86d2bd4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e428a5775411c693ee443c1e4ab98c8
SHA18aea17efefde043e869eb9e8131f537226abd5a0
SHA2562b37151d08111f9acce3d794c018bfb1b434f873de27692a7183aacf368e539f
SHA5125b2b7c51047521046ae8d8ce611c8bbc9e32ed9419adbe7b4d605ac604e3c389f9c03cc2b45f7f66d2134417995904b3084aa86a4c59c15b8b152ee68b27a5f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d79316f6b05c0c8a1dfcb18e2c3784c
SHA1e563a8044f26ef2756bc5022c609d0d18648e822
SHA25641e954afccf1fbff862e7c7c3eadf2ad4661a21da23f63524bc67e78166626a5
SHA512468916caf946acbd022c5c1ff774e9d614a555ab34cf358532885d41d19097d5bd9dccb8a439d0b1113f7bfc16be1031e59568454c30e02f375ec99fdc6c9180
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f824bdb9b08470af155db6d09de501a6
SHA14d8bf5d6272ecf48020455436728138790fa8b87
SHA2569d5440e467af5b445596f36832783d4f0c58a0535c500dc4f6e1c4c38c556b58
SHA5124367b514c2e6b88c921f0883733921fc3daccb37e16deaa2212eddef96751bbfbf37b8b81403d901b4b6a2dc366667d4769f36553aa79b0ae5f03b5b9f082690
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567a0420f4b86a33ddd1f7b145782aec0
SHA10939edd084691b97fbcc8a1052c4be7cbe854ccd
SHA2569270a92f17285bb92b16eff5069c09e799fd92d31509eeed3623a416cf3db121
SHA512e1c5230ee449e7e18d0e3b0524e04fc959ffadd8fe5d744e3f791b92e9a8c7aa1a6685ba5e822ef2cf0833881e2da69ea7879454ace45566ca023130b2a31d6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bc61a696684e366dffeab79fb03bd77
SHA19c5caf15cb9bffa0edc4174a9788a4152ef5bbb9
SHA256e486410e950cdf7b37ff7dd33c4a92bdf82b2265a2f65531da47e096c82a1b08
SHA512aba8e2aea352c03f3c6181ac5944db65cba2e8743a8decba62db28783382b2ebed2a19c975d557d86615a93c95050ebc0f624153dc4b124715f6d48745c3b0af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5213806e96e40a7baae2351d90501d701
SHA1782044dac4d8e464f9c646eb69f03aa1c7405fee
SHA2566cd2e789518ff8d0bbd8b430c0608cea4ee02634c32e3638c5845d17bf9cb0a3
SHA512dd236236158942d5d7973c8b0baa80d846e4cb7e2e494a278e4248c5bab3f2df882cd524b6a23a30941c10ad220c94e2237d11c23b05e5d4b9415531e0060040
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51291d9eacb227e24a871416bcd151481
SHA170843608266184d01b683d83431c21c23c579c5b
SHA2561362617949d113cb484755e6865571405dd5762799b503755ee05f3dce9df517
SHA51297e8b218cfb3c6762eb1c9122b7861ff40d8132bc0ab0f006301bb6fa6f5b72ac7a012a4d6f2cbb071f31184584f81e4502a961306fdabbc49850ddd7ff8ca06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588392840aa7bfc90e665f154f96588bb
SHA106eb505bf4f741370156d803b21de096718c51f1
SHA2562d89d4e5c168ece2a4f0d13118519ea8e606ec4ca6b655c352cd789fe4414daf
SHA5128e9ab275192514fb999c3c16b64eba096d727c5e07122ad39254ce2c597f88f1f91f3992f28b55b5a69232a0ff685d83660f187fe547e5b700378dfdcd5cffdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c0387092f695288d61a36c41fe89f29
SHA1fffcfe763a3c8bf7ff947e7a0e6bda7a63c9b3d1
SHA256ea2696f7fb1016cd8c07bd49d4d33cec143817e8e99676453d77ce663b2a2605
SHA5121fa8cd799a495c02ee379eb8921769650bf3e84b221e637d4386454090d27b4d2be1b2b3792e656112918f922621d4490e285bbae7123665a3a6c1f0feabc3cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f12eb798611bb8ee56c9d7b31f816755
SHA124f1ebd642011169c3a493c13c7e54e6de565e16
SHA256547d3f001ebc015aba471db10b2776ac54f96047e24edc06c016fcfd47504956
SHA5121e61a9d19dd087844db12fa27d1863ae702f80fed838a5b77cfca4bae38d07f32ee3e48494ec25a0d425d765e3c3c623012f1339a301d6daa826a29b2ea14093
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538e4e3a47255f998a92b58cffd535818
SHA1918894945ab58352e59be8b6e615721acc28b7aa
SHA25663db6f3c34a4abb77db2965fc953e98bfe63d512ab55f2db1162478663eaf62c
SHA51253997139493128f1c610050c291c6615cac8b0f1dd9327ef78f0f7712c793571d67f5c46cc3b59da689573854bda9d0ab3177e6c9ef52eab24b7dfd408302760
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526b46f4e162ffc7aba44d5b81062edc7
SHA12aae7077c92e867c0d4f6f9c2ff4d63cbe56bc7d
SHA256623fa115bf7073994ae3abe8557f6893a4e24a19a83cd284106f6576185f21b3
SHA51215bfd30023b7a3a3d5debb05a08cb1ae17907dd8861f648b74c75eade3a7b05b4278658f1c0b24c97ab38caef4f62ae21119f73695735098bd86d6a4b00c2422
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cd9c0b5c92125a711c0338b85207f05
SHA1130801f1d660856e4dc1bcd87d65ab43af3d5b1a
SHA256041f52e85a7569f3484adeab31edfa58725a254ab66ff5fecdc7e4976a5be04c
SHA5121c4965cb5b5edffa911e258754fec51ffe7ef307e047c64167f67eaa53be33695ee877f34e36c88aa54d53ef68442b1e93b397a1eecd30cac5da7baa78c4a923
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b