Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 02:55
Static task
static1
Behavioral task
behavioral1
Sample
381dac1bc0ef1611594a895301f88bc2_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
381dac1bc0ef1611594a895301f88bc2_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
381dac1bc0ef1611594a895301f88bc2_JaffaCakes118.html
-
Size
7KB
-
MD5
381dac1bc0ef1611594a895301f88bc2
-
SHA1
045300fbd917838fc764f95765a571829ef43a75
-
SHA256
afe03f96734722e1b12f6934d2681958320699d0f57a160295f06d5dc45a15d9
-
SHA512
f98d5c845a142921056af80539256b9e0f3b486f937a1c39c31f5f68af0ce81136fa179e2a563eb6b7d1b0aeb3e875f22ca2f24edd4b3767f0ffe97023514923
-
SSDEEP
192:8KEqm5wrz8fhi8xNfiUi7xulXzTa0/HP5q:8KErO/ahiEfm7iq0pq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b9688801bdc3d547a17857542c5e4827000000000200000000001066000000010000200000009f020a07102087684d90d9823508dbb6919207d5a53129c091ca5b09309707cc000000000e800000000200002000000038d63f1a35f14375386f95952a73846ff2dfdf5b6ba67052b80e0e0c64d2b23120000000bb80894fba6ee1b0bb205cf044844a4d29002b691fc572efda40d102c133e22a40000000a109735b448fa77c2c853596c2592c0849fdeae7fdb70fcc3be395655fcb18f588b6a1a54b7d3e7599328bbbd1123b03498a2445db89e4e86dd00f4931782459 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434863570" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0ce6135521cdb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{60F8DD51-8845-11EF-988C-4E66A3E0FBF8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2740 iexplore.exe 2740 iexplore.exe 1876 IEXPLORE.EXE 1876 IEXPLORE.EXE 1876 IEXPLORE.EXE 1876 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2740 wrote to memory of 1876 2740 iexplore.exe 30 PID 2740 wrote to memory of 1876 2740 iexplore.exe 30 PID 2740 wrote to memory of 1876 2740 iexplore.exe 30 PID 2740 wrote to memory of 1876 2740 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\381dac1bc0ef1611594a895301f88bc2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2740 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5621e6f8b9adecb22929820d10a663acc
SHA19540946f0edcf88bf7983e27d62d0562c90b0edf
SHA256ba7816fc8133fd9e634933271bad8ee2d94343e5a3352968e3d93a516a34168c
SHA51237155ba28a45c970b45b03737a60f86c5dc2b24392561911d1fa9ee5f13c8c33fdbddad280a83761d516645aaddfb57fe080b977c263f954ec3cc039eed514dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52eae34589965937aae8c39ff73bcfa06
SHA10b1f57289afc0ac1125a0302b56d227c34c8af31
SHA2567f1e80fdbf99f92c5336d76617c42ab933c109ba33140bd2bf5ece17cb10816f
SHA51227cf7b178c601359bcd494c50d29ac2970c3ff847fd280474fdfd24ac8d188599007d85b99b7973d6b182bba698b726ff664e78c516eb56297f234b526d70fa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565ed9057d9b8b86021020231b81cefaf
SHA1d463859fb64784f01a2a65722c9f774959616571
SHA256740eecdeb641ae9e45f1a2c0325e1d2e6adb4fb3a8847583dba5f05b472918e5
SHA5129e3c3ae27655dddce3a2e6ae2212e570343a2ccbffbddecc0eee61862865d19caa31b389ff5e4e40e555d7cc09a735e185684a5877e976a125e49a9adeeaccae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588d6796380d0a775c428effa45426b9c
SHA173ec79d9bca48357435efe0fd56e35d2fcb014cc
SHA2564969d80ef8aa55f0f38fc52bf2a6e2cb452bbd2ca4aa599d90cfebbb88a7628b
SHA512cc7ae88ccf16047e1a937fa292832557fbdece2465cb832f2f3fc558664a6921e63c4d8dea1f3060188f44710196c912a2c7cbdbd624e03050794416d46ee0f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6345c3c8c9ce7961b710d81ec0ce9a6
SHA170af90e85fd9c448bedb48d9226344e1bc2d9c77
SHA256dc95c7747eb701b8080932d615dab40c27b4a1a4f216dbced0f8bdcee580d289
SHA512c65ebfea1842b37fd019bb0c6d64ff74e06f3ee8817ab504b1a9f461e0923403b3e2cd38d6a429567f309b8e1c724a86fe298802c1769f7e86e9f7da89da364d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545546d4c639dcf7cd39cb6fef8fcfbec
SHA1fa7a8f9d3ef9733bf719325ae6d451821c14dfbc
SHA25671251ff11087f735ae88859700732e3a561a8515174870ccb27496ddcff45327
SHA512c948d9acbb0c3120dd3e145d1ef4ee5821bea68d8753bf24bccb1cc6a5f4edfb5cba90d2687f0a3bebbfca39944723fff4066224888ff4690720484cdbf489b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563c00f774f8b621e8d5676310cc587ae
SHA150917952204303a750244275cd9bc966afccf512
SHA2562e860e82e76a46847dd770e4d6fc1bf84dfd7995c501f743767492f1f2a2d66d
SHA51224564963acf22bc418363c0e084890a06927d5a2104bc35445fd48d471b731c8d8becb534649d16a2721f27ee8b532a58065f9ec11ef71ae0240b253b427484f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5ffb259e0d0142eff4a5ff7771068de
SHA15a0cc32ce36e128ad7d91810dbe517f07413a2a9
SHA2567032764f9003361e84e5f6fce26e89af4c84cb9133888ff82121d749b8b1d389
SHA51267561103cff0cd36baeede4504d610076145d9eda36b010e030ba7143d29481c64911e6bb90455298bb98086e20a6d7d770894e1468f30ff617b712145dbd8b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533c8a670672142628fad272c8edfb588
SHA1d5eb4fc49f519c3f80be6cca455fbfaa28353a41
SHA256bc33b251e0035d9c75a7d5475fef4b4930e16ab0e14f6be28e27a67495af4c5b
SHA51238aaed78bb5bb23419a9435a4a836b074f8f003b441621fe13f1bc2761aec02fbe1d5f056f1c87e75043c155703ca2364062d7db0586f4a98832f2e8f75ea407
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2c18894bb648f10b87bca5f9af95c0b
SHA111585a5362477601261dab68f71d29affbb42eb9
SHA256312cd636571b5aab5a700e2727786d9762b00317cd2fc8a577213943c8477ec8
SHA512f4d7a871d536a4260f0c51cf02ae42c5c4ed51e1a594174a418c5709c28da64e99f3282952da9c466a920337621a78db05a2f61c5d2048860f28aaf62deb6e2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551031026e196a663a1cf624373b33a27
SHA1b295e573e6f6c70c856caffed38ee6d19e63b8e2
SHA256e803b8594e27aa5d4241059fde6d8444bad71bad25a8d3851e79d9b4fce1a9c9
SHA512223bc9ac0b6358d3bcb371ac5a046e035224644d2db8f7981796b3ddc768f499fa3f8a2db7a136215c55bc16ab219a6a20ca22b4b9eb8587a320bd9a6c89530e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cad7bc55c4a7bc61f1fa0958c1902b6
SHA19740d2eb337869d47df1f1a39b3571a39f921244
SHA25669d3dca0da41104c33ec2b7b6c4a21fbf107d72b76cffea2094db1eab2117658
SHA512bd3cf3f0d5459175062474c8e83b90c90015249f72b3082a5acafc8be568f1baaeb0ac48dbd41d271f7915ea50d85205a1900927c76ceb9acdf912de1ad0c42b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fb145511317adca63db22a7f94ac7d2
SHA148516ab26bf737d332dc40c9186828773352dd97
SHA256167db7e34f8ba3d0c5d54272c6528050b6d0d4b07ed274000a6bf0c48f4f4ea7
SHA512e536889df1c4951d92bf826fe3cf26a078e3583fd8ac7cdd81dbfd1beb44f5227c0ab5b65774d4fa6f9d77ea0f74e654e6b8c1f8890ef1ac899cb28edf45f62d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d93c0d6bb98f17ec3cb55c739a8b9630
SHA1aa67e79f553b9d263ad31622a4c60a136c9d5100
SHA256a2bacfb9c0a70f3307a5647f2d1d1f0cea8423ace588edc5976c3d115fd15764
SHA512eecd3965144aa907e2b835864105c51450d577e6419ca20ba2341795c0db917c8166b4dbc7e5bc866eb9ed42f08750aa0e7678047162e60ba516303edeb1db50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52306767645d03bb46ea981417f3569a6
SHA110c5effb23a64395f9e2c8d5d41809c148a3ce56
SHA25648652228903d36d1c67abbeb7795b8d29f382af6587049c18157a1cf4a42081e
SHA512fd07588e2dde31d283d59a3b9f3f3cb45be048411d155cfe5926cf7bba3b4f1676664ea01c506540d9539621eee846b770398cf2853d8b48435f2c7b27975414
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5249d7e5599d4e665a5603bf1b00176e8
SHA1d7f332562c8423e3b94b74e9e79237066df48f0e
SHA256da3a15757ef75c0ef2eb2661cecfcea7a4ddd6a5d63a17e25f7f9eeee7e80f38
SHA512809dfc20f8b8e015274f4bd6a6a80b030cbbe46f3d436386c679007ac093110fee1da85d97cfad8ae468b6af33eb2b6e989889dcb36567d55d54b74b5d347466
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b0e2e3f36d44c43512323dbec765b21
SHA15754f1396bee33b1ad5661bec39bcffe03d96b26
SHA25677beac9ad80dba1f548c3d2736aeeac350420122cb7527e018962f62752bf1fd
SHA512419a9681110f08d34a0cb992a4008fafda8f0c9c68a5885da2ce8a020eec30e760cb227c63162ba6172660420e684f2a28fe00fb07a8e421b69e1493203fe157
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9ade6dd6d768174cb070036ef31321a
SHA1f4fd5a37158c7fd92693f1ed67ddd7c47e6ae263
SHA25639c33438a880a780e5e57ef22de24b312d85e9f196aabacb0ac03363414d0dc5
SHA5127057c361e56ff345f5679f20d9d4cf197a7d4fd5bb66f8dc4a0172559af03e7f8ced5b3870b04f8b3e08e3e7587ce7a053d30f506efb859a1b821849e79e6e7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54429a4e25b090d609c415143ac10744e
SHA143acf0126eb7056e81dc79afcf216d27509f4cb4
SHA2569510f7da1f7c62dd82edb098142e88ca8cabad80c35c02b59a1619d784525910
SHA5121a6259cf8c207dd9d1da5b40bdfc1f1c2c74c2fd496e66bc9d668bf75d13a6ab852f56a9eb388e0b92f9316ee82bbce7556aba1e8c9f2872179402294fe97015
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b