Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 03:46
Static task
static1
Behavioral task
behavioral1
Sample
384b573b788d21487220400f752b2646_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
384b573b788d21487220400f752b2646_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
384b573b788d21487220400f752b2646_JaffaCakes118.html
-
Size
6KB
-
MD5
384b573b788d21487220400f752b2646
-
SHA1
c8ece0b495208aa4aed5f761ee3d93144b3a437a
-
SHA256
3a07367b222c9cf9e0164745ed3f61f3c26be71343ba22b192d260e4e506e2dd
-
SHA512
fbd6ca633526346252428eea329b120571598f4732bfab363b08631d2c31fe1752f73ee575d43d75246674e00a06b01f66f939693df2af82b40009948eb9bea5
-
SSDEEP
96:CtdCHNC10X9c4m0/eq09/jUrunf94/JewckLmtiSARvkM0N0wa:yd8Ncx0/eq09/juJewckLmt5gvPwa
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9401B2B1-884C-11EF-8250-E62D5E492327} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0efe073591cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434866663" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f5420000000002000000000010660000000100002000000079cae011a24b87f27f9702ba042f326ac6d372a8c7da0350f291b2ec8359b4af000000000e80000000020000200000005dcf7c46f1978f6041ee650912c251476a2e0c62878437aa282c7a826e5bb8002000000034195e6e7b6ed4f99c6e6f5c37878e7258acfb96732ed084e348bd36a47a8cb7400000008167522001f8462b02592f5b50266b85167d92e59973804ba229ceec0a2acec4e9d249feb9b5d03b5c35dd324007eea6144698cc143c00b9111a8cd78f66c7e6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2384 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2384 iexplore.exe 2384 iexplore.exe 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2376 2384 iexplore.exe 30 PID 2384 wrote to memory of 2376 2384 iexplore.exe 30 PID 2384 wrote to memory of 2376 2384 iexplore.exe 30 PID 2384 wrote to memory of 2376 2384 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\384b573b788d21487220400f752b2646_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2384 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5731cd5fcc5a783616ceadc4d5f7bbdbd
SHA1a6fbb7df5f167eb52cface9f0c6aa8329d0cd305
SHA256b76b1d4b3916284a6040f91618ccf1780e4f26a5b5e54152198c965761d83da5
SHA512a3fd05175c0b3835ad8530fde7f8c8ca81daaaf0e623dced2325af8a250624e9bf3e10181b67f4f5db9f1d322093b7a4ce9e9ab8df89528d0cdb770b7cfb9aba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d10acac9254dd20a5d485dcffb41bbf0
SHA1563bebf590b03f92448ba67c98a83143b36c2f13
SHA25627d8e9d7759876c0d9558b82c525c6fedebba6bfb0288589a20ad18d99f52859
SHA512a9aeb6c0097cf07b17950da613e6ab2d2828548279ca611c4fe40b75ca69bb3362a9cc04626b814a355dedfceebba4eadc351c615347eadc013142dc95ee3af4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5243740a0b62378a5b3962c2a6efdff4b
SHA126965806c8119a9b4437d3b9c5c6e685e459c70d
SHA256c135203404b0c4bbf017c44d6902c1614d482008f050bcdab7ae7149d701f184
SHA51274bb8b7375b196a94dea5a2b10a9bf6ce0b82a1b5ab88a5cb9b952882c1c30c8bdd414ce376af95683ea05be01303df88742ccaf3d52a50fedc2455aec1d6b9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c721f778ad6baad914822119ab28fd0
SHA1fd49e3239966457b3255fc4be2525962c3a16f01
SHA25641816af4e447b18c2a08ee57e8e5555a912507e6e6acdc2431fdf90271884e91
SHA512a274f8d03da77c4cce38e0d8009490a7015669204d99b97c826f4b80e93d5e88066db87b82c05ab4acbfd673eda8e2f7c5a1a1437cd03f4d944f4dd513a8ee92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5297503fa410a2ae0fe946f3059870118
SHA1d7c341bcafc664b4314305592cda09940fc2d885
SHA2564e775ed99118d6346158ec1139e24ee03043a10a7c501d1680e2de07889f75aa
SHA512c51e0a1d7e8996d845e57bc22e6b67ac3d4bb8cf684346cfa0b41b050499b9196caacaf109426706d2991ac81af7a539bad4f012e25533e2844fce2abd976452
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53beba01507d31f89c0714a512d8d0081
SHA1a7caf32b8d231eb8c3a47a4cd61688f922fb5fc4
SHA256514cfb794005642e6263db6593c7b5d4b1eb1a181c8528cb648895e8cb8ddcb2
SHA51280ef2e54a30afc37c440f267ecab4751334dfb60585085e7f509b508a85d89b7cc7f0e48f1e8ee27e43b434274fbf1e8365fa9427a17761da874b6484555adaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c18525532fd1d11d25a612a46df8a690
SHA193dd0ee93a6d8600649ca53af77bc427dd6b6e15
SHA256e206d9ee507bcfb713b3feef0d8674797891a241bc7d5bbfccc64e1632c25f12
SHA512f3be2bd1e23a1cabec1da6ca50f4f923dec10d85cc0b5d418e2588149590d0eb38fe1f46a2d94ae3af82b3f6d06c656a5b3c519e2da6484b7224dca472a8edac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51336c03232d937e180d7700ba890be61
SHA19179931e5b76d783aa05a398b44773f435cb3f42
SHA2560a0f3764feff64e5975341fe0596fbc9519c5954ded53ed3823f6a2f1c196cc8
SHA5122dfd452265982e30f132e2581e5a83ad1cb309b9ac03bb7911a9839e448bb436f219cf2ee094020d179bc1fd5de2f3535169f5628f978f5f05ebbaa02ad49b0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e751c35aaaf421d2286419058fe33a63
SHA1cf131ad0726c17e9c0281ad2418da0fc666de923
SHA2564eea453b38c530953bd9438eafdf149e5c37da126f86049a39cff2f59dc1d138
SHA512d0f56583d601139a230d4046486f3e285673209ba59efb8e1aee6947f8b510c394140df1ea7fe7b4174c3946fb78a92b5374a7c657c5f073fca4977cb4753b44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cab2d22aa305e690d975a3dc66214b0
SHA1d9e29ea26a375365c2f55b6e400f3b7e1af1a8d8
SHA2562477000896b97d462067286c84eaf12633a996fceb61c2a6b965e8772fe04047
SHA512093f6d00181ad5877a6cd1db1a7ef05c9b8a06cc3bf2a01fb3025296940e55e9a8ca83ded121ce24a96fdeb506ba4ce1729756efb6c48437a122adde35dc0ea7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d0b62d793f791f3eac4549a02daddf0
SHA102845a57c0e2a3bce22a0c9d66c126a519b925d2
SHA25664a09cd5c534b142213cc9285f087befbd925f9e2270dae68590f0f505560d8e
SHA5122adce3bced9fc33abbad9a0338cef607491041089dd12173a7edc2174aeb985c398e9e88251354c787437ad18a510a784e2ad41acb9885884f0df6c811742b27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d3fbc0e55204f89ba87b152645eaf71
SHA1ff2e175c25399d83f9645af3e905c22ba61c9782
SHA25682e20c17ec26cb79f86fb8e1acd810dbbf0df28446f1413cc68476b5a24ca49d
SHA51218da57c8bc6994746b213128badf6f1cfdd5473096262087961f6af00a543df320882b4393c7606116f4c34cf4e3e8414cffd17c95a2a5d918a3784f12e69dd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3ecc2d91e87c264fb7e4bd5a00ed9a8
SHA11d75ebb7932c4f3fd26c6b1918a639560000ab55
SHA256c3c8492e1305070ea7a1b2fe7f937c79e9bf6ae53de720e74a97a2d1579386d6
SHA51208416b6e052807275634da970b573b68f736ec5449385130b0fd17e202338361b258d492e4efa1b3569fbb2c1be26cce4030efbcf646fb50de453ecefaf16889
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5dfa21a683299560d100b6775f6b127
SHA12a6b590c2ebebe8ac6aa4b1aa81b496cda3b928c
SHA2562eb9543cecde9e6bfee7eede5eebde73a7efc5cbad25f5e5e0fa82b7f7ae8443
SHA512aa35808946147c74e3d83608b5ceda4e788d7e3989a92fcb6e78b8b4d3d81b4f737b8ca6affa18ce4fa20831b64f741e7eaafe8651e9b74eb6f1bd1eded159f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5754d896d7e7ca62803eb07cb69f08913
SHA145f2196e4128646fd323c1ec562f131b37bbb8f6
SHA256f30e8cd02ab03d36065f3284caffd7f1f7da28b04ce53bf1ef3e9dab16f65cd5
SHA512bbaae309f89622140007c7f37d620de9f32ac558b467e1096c588363601e55c421a4fca78f2962906f6c71063527ba4f92f6b2daeefa69f3cec1a90afc713366
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed5a04bd2373593e9e4e0ebcf2ab8a51
SHA174df0143dd8a06a8339092c01c1578ad8344c047
SHA256e05132c8482b69136b103b1096cf997ada117440ed5abf86df3e9c17e78d737d
SHA51296f831dbbafb577d8d321ef0d60449f9bbb4c0ce9ab847b35c21ec79955350ef101c0766f946d2e75416427e8261ccbf84f46417a51e3027e8ecb3f9300f7369
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57446fa063aa833323c66b217d9f697e1
SHA19d493bbe7ad5dafe7b8aa803f1d628d41d145d4a
SHA2561012000188c3713d89253929abb0cc26243e9a1a5e8c422db6d2b25b9c924383
SHA512af8d0f0735c0153eb7f05b9e9cd7c7f5defc1570c7f90e2d4c28ad3e5c0602159fed3c0beeb78086a04d605e4a21ad026b72c21b2d1d8418f8026588635d3efd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55400160a518a5822697a6491bbdc56cc
SHA12072a6630afc4858a05e15423a12db6e1a8f5001
SHA256bf6d365da3f7bce3368378bb789ad0dea7bbf7aebafbbfe1873aef5aebbd4017
SHA512ee98dd907f22eaab189eefb6fc549ad3e20b23d20945a599826d43447152f4205365dc5d9532d7c7af413275ffe89e2460b896ea6eaa633f0dd83a20152e712f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5d11e3cad150735c18af32e32aedfc5
SHA1341288c2be61d385668ee5bfe5f971dc79192b27
SHA2561580444e05cc7621aa8f26fc3647898862847f4b9a63daf80934c9daa697f615
SHA51296fe568530dd4282c381786d119a76fd565093fe665cf12a67456e4c70b753727cf044bed16cd47ef630a19a0a60adcfdb919bc8b881bda5599aa89a92a7c387
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bca1b221baa28e1b591ca8cbf5b6e0bb
SHA16ae5adbc2e822990f12a6e96e42217828d20ef5d
SHA256cc5d381d16a28f39086609e2a0c2a99ec91e1acca3d3ab60b71eb8651cde165b
SHA5129b85de59e78b7b901bce4a85b4a7f4d8f65dc5e8395f44f2f9e30b1d94961c6a7d4d013a322da874fe61ef3a136fca65c5caaa448780d632f21c45b022b16cba
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b