Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
10-10-2024 14:27
Static task
static1
Behavioral task
behavioral1
Sample
30573a37497251d021fafb8a0beb01cc_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
30573a37497251d021fafb8a0beb01cc_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
30573a37497251d021fafb8a0beb01cc_JaffaCakes118.html
-
Size
62KB
-
MD5
30573a37497251d021fafb8a0beb01cc
-
SHA1
2a0c5176b86dd4190f5e24ab90f28a54f9d07290
-
SHA256
7d0668e4c7f8656452e895ba7f811f62004934af61dd2ad4e1daff1e0e409419
-
SHA512
f804d804f23f4a31fdf93fb02c47095b4cc599e238bae3f24198a01aea72b4a80a8abe712544915430e4ded8550196c74bfe02c73a158e9caaeb39b5d2943082
-
SSDEEP
1536:jYQBszVr+n3SElwJwTccJ7V/KRW1Olv0ZQ5C:I+3WwTzLmv0Zp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70730ca2201bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434732324" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b13190000000002000000000010660000000100002000000045d48693b73145e459a8359d1e6f1288ef18dffbb66f37a9d75f6b8ab8ffcd95000000000e80000000020000200000005f9a6644ad2899ce54ce735428da89bf7fb0b041b689d9176941ffd3368047b520000000931c1628dc7f942951a4b0fe8d0b3e9c1cfe8ec56811329a73b9e72b10e58b614000000078fd7a94f0593b1aaec38c3397f215ef22440854aa3719133a9d6f947f10390e5b9c742d0b4114bce2d2e570ca1b37d33432a9a2ba34d876850de6e3b4e58783 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CA633B61-8713-11EF-AEBA-4E1013F8E3B1} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1976 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1976 iexplore.exe 1976 iexplore.exe 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2420 1976 iexplore.exe 30 PID 1976 wrote to memory of 2420 1976 iexplore.exe 30 PID 1976 wrote to memory of 2420 1976 iexplore.exe 30 PID 1976 wrote to memory of 2420 1976 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\30573a37497251d021fafb8a0beb01cc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1976 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2420
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d99613c51c9564b3c695da956c56001
SHA16eadd1a8d338022a0989e2d11eff00221d1b576c
SHA256aca0be2028b7c7728936cca75690023b47209730b326e4a91aea374693f14189
SHA5128af3702a5d5ceac2b301c09dbee073de571e37ca7de84a00e154e0251c2976461ad24ee804fe4d542065e8d11d9ecd18259e2ce85a204a1197ed8347ee3c0c82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f09d3503d8687efb270d0ec9558e4d00
SHA1463b9fa43918463f5e138bfd90a790a0a592d4af
SHA25637b2f808a1fc3c2269ba452bf6dc3c673ddea46b73286ea97144c856696536cc
SHA512ad851d42e39939e13a49a0f84fae6b7768bfed4ef2f2d2ce016d3500f639ce2452121ecdccbc63c1820b9866f224ad34f859b6e76af837dd89b03f452b98db56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5807567c7aa51ac4e9f46abb6d11ee2c7
SHA17504f270d7406e9de11b8f65ec1c1c19c3fbb1fc
SHA256d391dcf3caae6e5eb08597568df79cba9e20a9f7ed01b34a5a5766b6d9bf2968
SHA512b06d96cb3492071b37488e5a2c0a78b072bda667af1066e35d3d1069404bd1ec1b65b8fe4624d83d07c3c512a84eaacc0e8da3a2cc9f2b0671273a15366b1cbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58da697c7dd5d82011170541221a3fed5
SHA17531f994fc2ea06d4fc464eba5fe0e135645fb64
SHA2565f79b2f915506f588e4d29a523ec7e98ccf4a73c9e86134f5fea6732973a65b7
SHA5123ceb1a7e5b4662e44dd68d7509432ed5c5f8c0b5e8c06093be1a2ba9efebe644207094b4cb1c12d3531d58b1da1dea8ba3d3139dedfa7a4ab665f0331ddbee60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4870cdbeb496978b06cc2b88307c84d
SHA149947854ba9220a1214706e5597da2fb08da36ac
SHA25653d826e6c86d7e8530e08c9c4d80dfc06e4602e60389a107477ab972d32795aa
SHA51273adf232444c15deb2552294eb970970c8a79e70e0df154c46739e50a681f9c02955e28819f2096246e0f1b816dcafe1b7ec17a7da9852c3ca38782a4a7d48ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560514099255c8224768ff59fcacb6a4a
SHA1d6889268f44a3253399752d661ca959df8710232
SHA256233c5274c58b6c30b95ec48a74b56a7dc66424a4b3988a8960f590b77bbd8cca
SHA512e2449498a10ffeeaa7b5625bdc3bed98ee43997b07733f0889d5915cc4d3a6b2964bda1130ac78854505f537447dec0ce66f3a11a986a82ec7bece4b9c29ffce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efc0b1052a2f2f29969b6e6943bd0e45
SHA1e41d10f2b17ad3066ac17066ed3f2aac9d98818b
SHA256a1698d706f25a53038c8fd2e05e114a8f58f3f1e717543fcbdb0322f00923cc1
SHA51207527cb8196cbe372ec71e22021646fe82c65b164fa598e0331a36d78cdaf753eb190c901962ec4baa77a8058b58b05bb419ee31ad3076418079c95bee848363
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50293932f9171efcd9fe889199101efcb
SHA1ac4738143f8abc793a279ab7fb18222da34064af
SHA2560e7c99597660a14bb033d63d2c55e6f894b615c18662ab8659688976dde5a09e
SHA5121f7698189ca7b1c02f7e23e6adaf897c1e84cf1b91b29413f627876beef889569d9f0fba7477f984e00dc6c861f8e5d5117ab791b02969e679d6071372e36bbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e13f3a4761ce1882bf49b9163ab2f3a
SHA1f6378a2a889b940396d330aac02b9ab5ba56a02d
SHA25630a729fe9f7ce9953977903659db61e50955d3202a3e302d544311567a02422e
SHA512ea2a75d0d85b4c475f7f392f954b6cd41b9a4c892999f296493d060f633e857d4bf92757614401919d81227b1f4884f2543abecb763f822437ab4b02f2b891b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edcb8aa7e813c69c7ee1a226a4c64b7d
SHA16234de8de69c1a9d0a75cdd05855e67c890bb367
SHA25651483bf429d13c2544cec0c590e372b4e9277f21384ccd7b40774939dca67f9d
SHA512bcf851e992fccd6a46890f8486db199b9c77d54b421653284e67b56a32058eaa13e5ad46b1193e61f194f8e9fbbd91fcba1499324c4fe5603b6efeadd01595e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b41cbde4ede5ba69c3bd336196cdf6c
SHA19aa35a9a826b324c9f90a200b0c2f0f38ddb9db3
SHA256d6a2ea536354aed74cf818008f5ec826821bf72cea542e6455ebd055c8ba454d
SHA5121775d1a756bb14d7f317fa35cca41d37efa540c0337d971a87271a381bb40c6a2459857d35a00a0b42d33feef14319fdca6a4f19acd5782f81ebdfe058a388a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd33ba77004cee16a717dfa9e7bddac8
SHA1c9c488d59e07aeedbf8182d7cd34fd8a1635d5a1
SHA2567413206c67e06b0a48e7efd23d2f02143f00ad74f789456f1aae43be5579d5ba
SHA51245321927f5c3aa25f3b7b8dd2de3b9d384803ba41ecefcbb3dcd88240b6150c244d33a6aa2447ed957cf6b74b01558c920aa6fc09084261b8299edb4d491fcad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f90f23a7b6e95cc6788bca404b9540a
SHA117f7bf8b0a5b6eedd890c546d1d8a2daf04a2d3d
SHA25664b64b7c3c117c98ad7237153175435b75ec547940c165c6b6a5a74607f9f857
SHA512718b54fd0d9338d1c51a0bc5fd3278ffaedc5eff9dfe42a175b6897466dbe863f01044508631c3c486a433a25fa16ac34402695a802427a8edba37c6fc523816
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593c55b00687b782e1a3dbb5a7bef1df5
SHA1d492b26615e45c64bd9e4a6e12833f392d0f2071
SHA2568e518a6ed799c51ac8122a04e80d5c5dc64029e26cb959a0d1c6261f5387416c
SHA5125db1bc8b3e1e83bc28960fabf404911580965a902b4cfb139950c89f15b6c441b8534be991f5b0b444e34c08c2853e95b183a3709a752c8295680efb05aa03a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c325dce8f00acb604a0cf8d70335a88
SHA1ddf5d0e2214b5bb3bd0051d8a088b32e11fc82f7
SHA2560e08cdc14379506a9999122ecab5bab180092ba7739530f37ebc4140fde09356
SHA5128c6ce8feb1987c5bc8c06a6440f64442419dd7b0df048b8002edd7976fcfcbef1dd6b3d3ec33a2cbe3e6801709445bc62ff166dad46cf6e958f8e51e8ecf0e7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5039d80078a47ea5c6efc2e10a4de521b
SHA1764df3545c59c09546d1f3cc5962a9c2b80eabca
SHA2565271a364f3ad8ca77ca331818cf1b98e5d9235f5e595414fb6305631a8fc661e
SHA512db3f692cacc1ea5e1826738eafaba0c02a81a50d563eba6083f830f6f138c7c75134fbe6e61a2ff596743453ed1f05d21d223dbd22ead2fab138a104a5835ad9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5299cfb950f7dd15d47fb6f829fa1adac
SHA18d792169c5e8e526b0b9e172aa18cc9ce1840700
SHA256ea5e7a9396b6ab8cb3b5fd88d715e49c7eed9a77a64cbfa0897e2756fb8c3932
SHA512fe265aa01a3b0e7ce29b8ca271290ba6f38dbc42d33d93913839185bee38780ee47c1b89be22f312c6a1e47dc56ce4bd4dcc20016e1ae8b884ea459324eaa62b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5168fef6af939a248fb312e272cc4cac9
SHA1e1da9c7f858decc899df217966bc7991f3584562
SHA2561eb602d88c016c09363b8d9511bc6b14da68c1794377681c0ed548ca8111d321
SHA512d6d93e6222815c78fb3ae511d25db0c55ba4fa9fadb294f39bbde7471aff929473c228763c2ea275b94f8959e53fc421016d79a1338a4497691f2585a93b720a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a89a52b2b268321012c9e15cd4ec52c
SHA10718cc2492b9a5594cadd21f6c0f832deae31b1b
SHA2566f955d4cbd499febad7231902e957a03a32d5918d3ccb26d5214bb6b1bb8b0be
SHA51250b8188528cc1d45742526b31f268cebb8bc127e02b67e2d19686f60584f708745d7de829ed9b70e57b670b4a3e5abb11300b947b58f1a3bd860ae474768831e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b