Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10/10/2024, 15:59
Static task
static1
Behavioral task
behavioral1
Sample
30b6cbec58a9b982680c2172b5a3287c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
30b6cbec58a9b982680c2172b5a3287c_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
30b6cbec58a9b982680c2172b5a3287c_JaffaCakes118.html
-
Size
16KB
-
MD5
30b6cbec58a9b982680c2172b5a3287c
-
SHA1
33d4d444db2a19b73b5d68964d96ff32e576d454
-
SHA256
a92eaa3c0edaabb87727e8374e2f9f968d594c62ef9907ce6a20bc83f6ece3e9
-
SHA512
a904f10664d4a7b1df09d3462e655c3df7f0636985f15ff88b9a50924227bcb5d4c4695ffa791067bdd1313ff6e873f568bedd245612a7c92767f88a6f9834f3
-
SSDEEP
192:JuU5tMEs3ZG6S7ns7g72w6Ug+zBv1c/S8nq+FesTYitC4k/jZenJ+5d+gMnTZ9rd:tDsMSoEE2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000003b25b2f79d45bdd03c2eab6b6ab1cfc876ab4a62a9cc4d48797fc927af21ab8c000000000e80000000020000200000006c467623098d5a6612d51cf610c448c92f62e56bd590db3447a3f2d8660714aa2000000029132364d710e07c96f160794d1cd160dd55b34da86ded3ca2846ea09663ccbb4000000093b1f1aa938a74e288539f05a12db482c5f65fa5c8ca5a3fda463a7782acd5fc52185305fee01f7cba37a97c941193607f64c7f6c265aafd29e11e5669a59bfc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434737837" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A24B93E1-8720-11EF-9CC3-FA59FB4FA467} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f057c6762d1bdb01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1328 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1328 iexplore.exe 1328 iexplore.exe 452 IEXPLORE.EXE 452 IEXPLORE.EXE 452 IEXPLORE.EXE 452 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1328 wrote to memory of 452 1328 iexplore.exe 30 PID 1328 wrote to memory of 452 1328 iexplore.exe 30 PID 1328 wrote to memory of 452 1328 iexplore.exe 30 PID 1328 wrote to memory of 452 1328 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\30b6cbec58a9b982680c2172b5a3287c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1328 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f560d7baf40d1570314fcd1ee8618b62
SHA1379c185c8b3c953ddfc76852a07a40ef5947b0c2
SHA2568aa322148d1c4a199db1ef949ba73b57e9bd2e2fca470b72a20d6494c8500c93
SHA512689a1a7e5e26a312b32905835f98743c07edffd5fc54e21534115f1dc7543f03f4a24a32d5687dd15eb2c442d3e510a1b9beb553e7de4b714cfef56e3ab2b24e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d05d6630e20e645d501f797620bd0e27
SHA180ff313bfe6d8fd1254d29281c028bea33f56e86
SHA256a374336ad91b711ba3e0c0c325bd4d7fae3f26e149e7b2b9a8dc48b1f2c7064e
SHA512f5613dbf821246084be3da5e5c57e32739233de12f6f1feb1e4c2403ee4d4e582f226726783680c515c2b38554b2ca17149fc2e6a25b79d94579bb457b6b0dd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e935d66732cfaa7b3e7364adc75216e0
SHA105c64138351c97155e26a4e7dc4d83a8f66faa91
SHA2563fe24986ecdd877006c2635b6cd949a3a6721f1541827c0113ae8719450bba60
SHA512741440d7c80d611cf64c874d08d3e27ebd9c7cbc752b27738468afd20e844fa99d668e1c2f1054749193c6742a2408352c72e6c48dc421bcaa2b9bc021409c73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e91751c516842036f0fccfff2bf8646
SHA1bb88b4af6526c0d5992616793b3ff46724be4653
SHA256da034974c59ee0996fe543c0516b98704ed961fd94c60d473165be8b7f6197ec
SHA51237261beb8bf87db0f7a69e1ba2899d983b4ca8e7a4de851e051f3724f1df972ddad886b1fd75666bef322b7117643632698d44cb2c97e266a233b9e108f2d846
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5958324677db62ff2b9fb40fc2ece8a65
SHA1370911fed45de09fdc8140d0d57ec27826b51bd1
SHA25682d892ef19d28cd5790e8fa4d32198ac16225fb489f0c78199e7f0fc862f074a
SHA512ce87eac4122d4330938f8c1f2f156473ce9611ff7a20c4c271bdb1785f92d6c02a1b0c104c0ffc41cb08ec836aa8edd9c006888537b6637b088e83a465d27ed6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5559a74a5602d8fb2b8eb7293bafaf258
SHA1a758d19b3355bed1246305fcd2925c3c2ca25305
SHA256ccdd4acb8c3e035f92fb3ae7bb5bef362c5890d9db32a401c4702fac81930e94
SHA512088ef75947299ed84048ef5a2d0163a975174aef0c7c6f3bffcb3525da5e463051bfebae165ff62a2395fd8608f7a8d375e16f533fbfc884afb499a37771184c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf9a30aec03ad450465b47a3b8b53c07
SHA179e9a648fff3400fdeece9619593f36ffaf10696
SHA25633e7199d47afc41b144c6d4d4263a519389a92594715cd4d9e205966fb8eb8d8
SHA51271f4594edfe26e5097cb7fbe514aa943aa2971de4428d57b79d037806c8e3c43cbca7c3874717db6317be47ec846931aff079d687511b600a4add294e3a7f8eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5331384d401848bb85596962d75930693
SHA13592e11865a753e2f932dfc38eb51748ffb82d24
SHA256b3f6fd2e8e08ebe329ded2253c6823ae6aeb8989b58072de0dd30cf4cd519d42
SHA5127e5f857fef8276c75154635126421caa18657244a9f489b37633323c8e0ef4e169e8e9835b60790c44341e39601d9ceddba6d0a79fcd3ceca59502a8623735e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2ff35db83eb379897201ff8260db6bd
SHA159128139aafba1cb7c4fcce67e65df9b52b88608
SHA25616000cf66bbaaa538b1cdd00e4685e01e1f73edc817bd57ddbcb6df7fc292df1
SHA51221e7900f9caf83b4764d9c13e8fab680841e75a9c1fa7c8c7b6ea999197dc49033faf191aa3aa9c05181143f032a2bed3558a0387b854c6f954cc59412540298
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc7f47a74c97d3e5ed7350f94de98e8f
SHA1aced4592c1a79a84e7e2f4b0d7a211479a63e188
SHA256da94eacdd23b180fd4bd7909ec0d7733415264f91baf28b4089dc572fc0eea6f
SHA512fdc0cf92e7af1f6583265a99fb220069094f2b292e5d90ae6cce6cb8bdcbbc6b65ab7b633a6e650c6022f070b9048080362774b29fef3d5590fc704e3f2ec973
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e25416080ba452396a56d8a702c2ec45
SHA1aeb98112a076c9224022b1fa120afd5b318479dd
SHA2563877577c22580e699f8b19659b340bb6e4548f2aec28746c8da90485bac8cb5f
SHA512306901be8927fa1532c9f4860aed347131b594a2c984e70537c1f1cd59ca0c35c71b6236cf38d24af14d444256e21e64701b880d8af1050dce3bcb9137f249ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebf68a9959945a45f82b3fa241f2839a
SHA1e494823a09de6b7a7c92ac084f3075c172e38318
SHA2560d4e74dadf192391eb1baa0fb6570c737282abf1d89419332ed38762fc2d5866
SHA512a499c8879f66f0e02210b80c719f4e71a3dabd5e10f917832c7f2eb938903ba2a7b2ff6db6d4d31fd09a57d679659767fcf75afd7a79429b7d2c418404d6e2ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5417d78e15a0ea657541c53e3cea5723c
SHA1a6a2c6327f9c31c1bf372fcce391070193d2d8fd
SHA256c78becea70243ffa9ce817390b05b6b4e419ecd31901fb2cb2ec5f4395682044
SHA5126f78faffe310d2eed096d68d73292472480254ed76518223e89dcf35e0c79c3d2883bf4d91a21b85677c503a808827fd1d0008b2776f3596a582d6c748eedf74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598ea345470d945ada8dc66dcae0b9be1
SHA15d3271304c5e05130ba6a8f6a8e96609498978aa
SHA2561e72488dfc900e991f89e91c9cedc02a7b7edefac697a297dbe57ff2d60a77e6
SHA512948242ca27584df2b77e0df394da3d77dd02fd0578dae7c11f513d9885cc82950955ae47241d6b8f1c031c99b59d171c7f33b478c5b339e938eee66c83aafa20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a75d7d687d135490f6594b2b315e02c
SHA174dc5ee2435cfdaff3ba88e44f5b4ef25994b6b6
SHA25619e95ebe4041fddec285db5df26a713a057d9a2e1e4a9345a1deb4285db73692
SHA512f7287d8e6cd0cf0efb20a5b673d11da2c6b228f1466bb31b226625e2c10e3e8b18759f8e664fc0e8e3291f8fb4b95da3d47cee06e03d9dc0ab2d12bdb4e5ca7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cb0a41a19a3f9c6da320ec0c184e76c
SHA10a90a2cc0ddd3f22858bb1dfcbaf4e8350fae2e2
SHA256f5f8d3981cb82828812b0f786ed31da75f961ecb12a7029c04c84ee45affd02b
SHA512b95bb55f925fd791c6fbdfb2e8477c5a230593baa02393846707b43cd389d49421fc435a1b61e806bdfb4ed4a3ab97872cfd5b6c48d75791d2951c3151aff4da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548c9b6eea51e8ef6ad8d3f943ca26c8f
SHA11f42879ff06e857e77d52f8319cedc61ac06270b
SHA256a2f677a0a86ef8ca4d1c7b202e312b96cea75b95c434f0dc2fbc6f6acb2d4b4f
SHA5125a758087d4166e82d37754945d48418848453d21c8b48775f66dc4245e1fdf0f34b69f7547d73b1e7d1f61d5b6982d898e347b154442c5294d4711978e5fdea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be90112c37e3fe0f80636b26f9e4acd0
SHA17d57c14f6eee9c294ce01801e878ddfb6e35597f
SHA2562156b5a14dcf708e258bb75d7c648264c2b6fb6c0ff3e1e471d8efe372099959
SHA512d06f163f54b6dc01b221d3aad87f4b8352edc578deeef3cda3a70997fd7cc078275fdeacf01989fdfd86f45cea20828d76860caeb5632f36a2dd8cd07ae8187a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d723ab413ffd20d4ded7fe1150d79e4b
SHA1cd2ed286cf04a8fb651ce5e713b393af197e8572
SHA256726cec7e8766d5f8ab6f8af706e34e0cbae3571b7f2868df80abf86cbdbd2e87
SHA512d9ac9fe7438b9c3a7902033d1805629b80501dd753e74a4a4d2bf23f1695d1cac1840bcf3771e76c9377a1bcabb5cb61b609986e92683aa298445acc1536ea1f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b