Analysis
-
max time kernel
75s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
10/10/2024, 15:33
Static task
static1
Behavioral task
behavioral1
Sample
309c04b39ed205165b419f5db59ef55b_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
309c04b39ed205165b419f5db59ef55b_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
309c04b39ed205165b419f5db59ef55b_JaffaCakes118.html
-
Size
7KB
-
MD5
309c04b39ed205165b419f5db59ef55b
-
SHA1
f355bbbe5d7c0b75a309e5cabc89429ae2168cfb
-
SHA256
43cf5ab138363cc882a768e0a1b8a8b6fb55f9d727b873503d2fe82b26dd0846
-
SHA512
1b1137531d1d7f14325a70b4a8212d3e6c40ce76e4fade9a9800d56fa9914422cad0097e8b69ede8bed2b430c4ce089f8156d0cc75cb6e33e71feaf2434f69b9
-
SSDEEP
48:ImMq1Up8vmbBsw2gAiEgVr+CflxYOZAyNGWBXtz44xt5YWDrWN8UtVKSeK5rSUP8:SIsdf9NBXYwoJ2ketwIL1dRzcRC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b131900000000020000000000106600000001000020000000725b6116a8520e2b5a9e8a0da918da2798d27559a6a5cf8931fa5f847b5f3681000000000e8000000002000020000000bcf51b68f109528154852ea460c5cb1884aed624f31edddafe7c063e9e2292d420000000abf8f45e2bb81de99351660c5ad19c03da3821accbee0b1de8aab10f5924e6a4400000000eaf4228a0e009f3da50462b6c4ca7df90cc53b2521ae1b078bab79033804fb1ced5632307540ff8f30e2491d07527005014ec47077071e4b611273fbdd39052 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0058e9e7291bdb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434736300" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{08CA0F61-871D-11EF-8121-F6D98E36DBEF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2396 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2396 iexplore.exe 2396 iexplore.exe 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2396 wrote to memory of 2176 2396 iexplore.exe 29 PID 2396 wrote to memory of 2176 2396 iexplore.exe 29 PID 2396 wrote to memory of 2176 2396 iexplore.exe 29 PID 2396 wrote to memory of 2176 2396 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\309c04b39ed205165b419f5db59ef55b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2396 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5782a7011d4fd6165c5faf857c06f5de1
SHA19798edcbc16de92c094d4e2d32c5e3f46dfd3d9c
SHA2567d6a52249db661c25c2c0685d22b5a796bdc90062aba5b7569a492b9e0c3d8bb
SHA512775bef91bb98eeeffa2dd62eb7c45151862d7d3bc70749411d15b6eb45d301bd80cd8f398cb5f4f8cd2f7fefaa13bc44698c21b58f60e3fc6a924476613eb597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6962516fe3d7f034bf7fd986cfe3a36
SHA1e01081d7c6ce3b3602bd0611994edfb43dd7c3f1
SHA256644f15d62fcdc46c21351d8b57b4ca56e2f1352f1486e609e472192985f2b0e9
SHA5128b948d452cc760820cd0284bb3d0fdb31df2aef0b12394d93732529ac9d446250641a01e692f26264b8852f260f9b28af40a3bcb6b23d2cf1b8afbb13d3d0e09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583fcd51ea68ad6a48cdb1fb79d230fc0
SHA1828bccf2a2cf0a4a6d54cbaf0738997d2aaf2c45
SHA2568c6a9c82f6e9533a6bdc008e89fc6b4d7796af682f4cf182c22478dfc664e0e2
SHA51256748d7a1e4a9115f0d6fa9aeb934e168933ae365e4af9a1ddc47a7989f07b7348c8a2ff0d7609b7095cb29529f95882a4b78e24cc29da9b460be8dd05df867d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53339ff024eb5a4d5fa167005c6bb9102
SHA1abb0b1a738f3fe652791e77e82761992b2efa06d
SHA2565b389588b17e71d9d67dfa4036717c77107498f4a6d6367abae5345b9b095baf
SHA5129c44483795a1e0cfe48201a235ff09eed91dcf2288441e69bb12c7c54254197a546452bc1c01df43c83deb19403d74e0a663f721ad93b92b71d0ee7936d56bbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58de81dc6e37e76cf9130d9ede232e506
SHA1b0ebe093d747bc8b63e221e97a9f6c7a6e92c278
SHA256ce35f1997cdb50760e9b171bd38b780990d3d2508b840039cf5b2eacbe4db4d4
SHA51200297faea4b24dfae83552f6ccadc2c2801e3338dc420933ff2c3f5d8a4c4bc19ee949c3968cb15fdab976a910eb291b0cce6571c90c54b6438a8caa4512b65f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fa5ed984ad84932e0709ddffc12315c
SHA17c6478bd890c0c8cd906a60e0a11b247b4267756
SHA2566d5722fb27926090aac49458bd5dffab038071be606c6fabb858336231074112
SHA51239b4094880d18e0e38d3817429ae2a71463147358f9c8bc4e495b7a54f463c5111d8e22ebd3529c35f5c4a3e391d8ffa0b7fbffaa8ed6748faf32dfce8521deb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d74581b1cc36b2400b6b45cca9eea48
SHA10c754983a0ae4ee864855811e98fe4585729f449
SHA2568d42f2ef1a26c4a8c060c9be2b24642dfda72d03c56aa421414dcd18eab2e71f
SHA51213707c4d408222182aaf4a67907a47880c23006f1052a2bb72f66884a4dbb78f7625a1da1ab293a6250e5f9b5867f06f364d00d5b5406e209cd1e41d2542867f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cda5ab596386753d771065c58011bf6
SHA144d86a7eeca67ba5fce2da080535b30cc963b24f
SHA2565941b82ea9acc97ec0bf67911790a0e85615cd24537fd15a0fe2385201f9c0c9
SHA5123cc70732fb92cf4c3db49c78b3b966b79e485237c4e14e4835389bd3b74b5d403142b682e7bc978d47dc6ba03bcf803714f6378db2e1fd6ddce9b7e0bbde942a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5824e4f763c2b9e6ab0aff507626a1f52
SHA19a14075c7dc5860c98c44217d7e467550683ff32
SHA256d4316b2b8e79830d7a5a2885eb111672d5fcc0df587068c92562d3acbe54d888
SHA5125fa34941194115d4427b3912043f810320bf87025987b4037a9e03037320e6bdf11d44765709925be85d2afebba934c59534f7ffa46fa2597f7d1223e09768a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d51bf08bc74f24ad644aaa69ea02d55
SHA19ea2dafef1bfd8597e38991864ed7e9104da660f
SHA256357e0980f22f5666cbaa243394d878c326b417a07c7e7ccbb1b8117914e0238d
SHA51241e18e4e9d166f0a66e9622e6274d47a4e21138786d61106c173b80cfafce8dd589b0bb303443bf4ff4cf7fbbea3bc42354da4dfd6cbb3cd92e9a5f2a2b22b92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0ef342efa077fe426b281f6e3673b0a
SHA1cdfa94d479d5e279e7c77bbcb5453441077d7b33
SHA2566d89735451ac1dec826c4cd3589878a3ec657ff0bc2d191ecce66f9d88aeb455
SHA512f42da5e6d9aa4c69046ce14e2cce9de3b2cc99cf172d4d605b913e0630d46270cb5cdea1c49053cb2cfd64e3f4e5eb78e94696d30d51af64ea1f9d29ca8fd0c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565cdf91cd614e7a196ebb8481148d22e
SHA1cc0dbf4240c6e7c7493ae96caaf41c65b7b2f48a
SHA256ba5f5b28f22e08eb7dd041b20a1ac69a6b7c71b0c560b21e62d44f5440ee5abc
SHA5127d460b447dd9cae9adf5157e2f550d6c16fbe9f56f21f27bbf9a1050092d9354273d922659674062a6f6cfca14fdc374c973285e475689ab8b0a6f1e1c995a97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be2d4ac9d555e606642e04700b7bd989
SHA12910a39a9f76270fe09a7df7c6243278fc3fefe3
SHA25675d0c1a0170e6791ccce794c0f6be505c9748e8b42208192d67b8d255de6a639
SHA51280f5891d8891e3b15c8349849b25c3fd3e59fe9a7ffcd93a7d409d593711162098f4681dc352053a47a4d91e75fa694ea40bed0e5d1a80254d2e6f02f2e5eb4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539bf61128d2839cc232087d8a3290d11
SHA167139ed43fbb2b3326df761cf180810c5422ec19
SHA2562297ce0797e61bbdc49c230d5fb4c29f6f1001aeab2e547142b5296e10990161
SHA51221848f95278d4c7a7ee397cc4477b6763b3a717c10639abe291b22ecc45b21748ad4d19820498b5fe6849d8d8dda6a5fb9085b2eb98291159b2d270ff53d5887
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec2e233137edba3ca7dec81a1cfaed9b
SHA1c00e01f039aeb8dd6ad17aeea1859f72c56aaa4b
SHA2567a2de30bd0afb9d133fd5d0fb81a0b495c9b4fabf4498722819ab6c709ed2456
SHA51243fe5e1df7445576877921116238da3c05c5af120e64572c78de7dd187c0bdf002fd21c80d0754b21142e976c4f85c290c54dda019321ea54823c3e9fa8d631a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de069bfe1be0e36697e0061227b88fe9
SHA16ecf7c8a108dc433463ccead68011c55d87cc397
SHA2560f6aa17080e77f6b8c0aac252279c95c658c88e5a1e2981c22b81ffd5487a5bf
SHA51279862966dfc4c1b7102333efaa2c3de69d450005fe555b40ad7fef7733a2f2f473ae124fc375b7168d4984253445fe2dee58ca9963b2d5c2ebca47f3099bbce4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b513d4217be99d9fd6719e055e078260
SHA196c8f259def6518c4d7cff75ab056cc290f14759
SHA25668645bda4c79ab0da26c16ba608cde2c45e4496a77a9019b995c879a7281bc7b
SHA512c57651a0d74f1ba27ea08baaf9f3320a88c4cb16564c749bd54992d0fb7fbb9337fe403e366d5c093e252713ac33c32038e64830a31bac145f1609768672fca9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f07481313f1f3359e4992bfb2fa80a5d
SHA17b1d917a976a4a5b4bb4a723ab648ca5af4158e6
SHA256abf32fb40b7d95f54fac7ad31c4e9af1871d5652290c21fea748f20eb77ec412
SHA512b326ffe3483a4e0cfd13b416af7eae9c8e526b2cb061f8c64f337107a21d9b6473230d03ae9dac8ddadf1f68773053449813f0ad76f1e7ee503669a60bb2a7c1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b