Analysis
-
max time kernel
140s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 05:13
Static task
static1
Behavioral task
behavioral1
Sample
388e3dc51bb49f012bee552ada6526fd_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
388e3dc51bb49f012bee552ada6526fd_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
388e3dc51bb49f012bee552ada6526fd_JaffaCakes118.html
-
Size
139KB
-
MD5
388e3dc51bb49f012bee552ada6526fd
-
SHA1
f199eeab2109d9e3a7b9f994e492b1718939ed30
-
SHA256
af2dd6c5b5f4d9f44f9775e5e3fbae9dba0432aa6d17f52d95364a43facb2b13
-
SHA512
fa1b6f596b686e0e978eaa78afa89e1cffea8dba51c5209b19b291b0e508697aedde888a1b69a7dfca60313b0c50325b94c93380b692bde6acf50b8005741168
-
SSDEEP
1536:SENZKFCokPjPLy5lxSTyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXu:SEpy8TyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10445bd3651cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BD194C11-8858-11EF-BBA4-FA59FB4FA467} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434871888" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000a3b4ab732509723217d3f584981d45afaa5efcb5d74c787f56457d2be694352c000000000e80000000020000200000004bb9c2eea6fc5cae1a0a5d469530d4ca5c4fb79fef41dda8c5f067ab2a5b02ab200000006d3eff15efac0afd0a32532e0e3b19981c557c7425b638e71270b1d716443a3e4000000019cf896b5898565c02d250c5aead8b8799b5fead57e481a617aae40f585ade1b409d04896c179df47a393d6a24178455d75e29c7d7dd26d68efbd43b0f848d5e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2188 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2188 iexplore.exe 2188 iexplore.exe 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2784 2188 iexplore.exe 30 PID 2188 wrote to memory of 2784 2188 iexplore.exe 30 PID 2188 wrote to memory of 2784 2188 iexplore.exe 30 PID 2188 wrote to memory of 2784 2188 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\388e3dc51bb49f012bee552ada6526fd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561767b071099f95ac0995d10c3a7ea0a
SHA1f37b8f105a7d63e73c3956c997d8553388b0757f
SHA2568cb7c4c0d41e800e80512c33882a417712cd45d7d66b49e0d53bfeb8153df9f9
SHA512c376c09a6eb5fbb8ffb0278375a8f38f7f00204d88dd30424ccad23bfbe197d4d73e512e8ea1d5678821a555c859195b6a8db14e6c41c03c8f8c20748d1876fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cee6eaaf586f3e98a77fc28b7945f8d
SHA1ad60c2eaebc2a1e7293c412c624f673028d35ee5
SHA256b5973ed03d6810519fdac7070439940a54d440201e4412226a1fb7f1372169af
SHA512315dc87e379cab3d2f93ebc1cdba41c5754f33a6bd198301df7c2b79021c3372282a26fefeaa8107ec13559aeb9b253c91c05b28b7a4337b0b3295cd6a3473fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c2c39a2fdd1207408077320ac602f49
SHA1e00195d3f5bd474c13e6ed030c69a21f95f96f5a
SHA25688746239a0c78994fbfa70c60ffb398ecd6184bdd3bfc26d5fd3b3f649565240
SHA512ae20800ec3e74f5097549a84453daa30fc70513959e0da5c78e44bb0131a2e13b5aa95851d8e59bf85ce1a51b2ebd6b5ccf259c2d19b681f0f3d7cb82d6e0b13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59486e9e3ee0719bd2f602b0e6ff86077
SHA17b59388b43422d62b934d19ed8cdbcc65eb53417
SHA256ddd9faa5f9d0ee878dcd4a5d5d559ec4694bcfa92330d700d6ae240588f4c098
SHA5123ea7a4a4f5a9624d13dd561f9a5791f1db081bc65b02f3bfac51e5c5fa50fbfde5cd169b9a10181bff3038a75626e6b6cd0214cddd12a425836f154fe1de50ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e70896286c9f0d2360d5fc55ada163e5
SHA180ce89bf95fc140040260bbfbc2090796afde475
SHA256c3e6ff2a784c6ce9ba7dd573b0a9b7027974ddabe13bab2dbd92aa1a03b9d0f6
SHA512d58d9b08b2745ec6ab2d802f77f4edd090d047cdf6898050638720e5d7070f3193a0d5ac0b039db45088eb6b3e9802e2568ee6b221dd2575087d8533cfc3d657
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a784c0d819d93831fdcf2b60504e3e49
SHA1c0853771bb0adb382c13bb299747b9af649eff54
SHA256cbe5f2b4408cd63a86b8f1d6767396d4dc495de6e532800166110da2a742cd2a
SHA512ecb29ac5d36278fb7dbeedb42fbe8915ee6c4e69cb191b58e34364067e946a6c6cbeda6ca86e6844fb490e281ea5178bf02a900ee021a20ca0536cf7920144c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecbcf593edbab92281a0c9d2056925b5
SHA163c19872b4767e37d2ecab76db7bcffa8a2a5aa4
SHA256ec143a607ec11f099ea8d4e1409000e44838a99a24b825573770b2695a0a0155
SHA5127975ce354f4ceacf53e7c8f3d35a17ee7ac17ec8ba389b526b54ce22f087ff3cc3a28964534953907f48e56fac6506549ee3a502e8f2350a37d9a10b64cca06c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2eede58637e36ceafc3b32749525ea9
SHA14454bc326d6fee393c01ee7529c0386a2c4d8aed
SHA2567b727b83652511d7f61c4b9fb2875c3e45a763cee6bec6fd8b45df9803693294
SHA512d1ed7104ebb14935eae2dbe6589903445d1fedcc3197c4ca1fc4bcc35f937aa118c9c80c315051757cb9bbfbc79b39302bef09f669dde8ec665b356f88c33be4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f371bfa358a900031f4ab758e1b340e2
SHA10ed4454d0b105f5701a7b225fd98721bcb807215
SHA25697d31c74bc6aac3ada0aae1c808b7a7074e8de69448d1d2b8f2f65eeb39382cc
SHA51293c6eead4be403083e0fbf2bf3858e6af32bfcc542b6b2f2ee24242c158a9a87bf05d0d85111c4ae27d1eb0e0dd57b83ad93d0e993424ce73d7b26dddfbff2e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2cea5483a152315761a69f52f768e9c
SHA16fb18155f6ea49e8476431a7458a58414dbadc57
SHA25640aea17712d37cabf0da8104a9337fab76e3c68c7ac552f793e9923312b80fc5
SHA51296ae25168c99c4492baca8fde446cffd3dbd743f37d534ac3b935d55a9090107dfa64cac2510c20850bf14f4eedcec303252937c1d614614a72b7097379a8b20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538ee9c03289138c307acd978df24c544
SHA14876816f1822629869d016e220060c99b8aa3401
SHA256ca4db12eaa2a51bfc6eb0e4f1b7140a232da44ca4a9e41b79176a47a63aeaa69
SHA512a4d810aab51533f9c7ebb11fc8f02e12dba22a1a7a1cf6479ca82e5c6315157aac416006c29282df23c3ba76ca18faf595099bd41efc346c667f2216109aaf39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574a98e1a2cc5065ed555733006587493
SHA194ac96d795dd0df655c6498433f8848e6a62f335
SHA2565bbdef65c88a5c04166c171457b5775b9c6181f6b6398523694e339f9ec402cf
SHA51297e7a039ebabc95c11137f3d1ed9e1aa6f9724dd94f754b1638a6adbcb17af5532e617d1e943afc707775cbcd93708d7238ab564cada06a86e0fe90713e9b7ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d95c4a529166caaed11c9a4b948e306
SHA1197aea7d41b578b326ad538f56d7e5405e0cdb70
SHA2566d20987bc854ee5f3407c881f2b05d2a927e82ec4e3598f283000185de8a48b8
SHA512e5d5495013472749c2bae6bef558ebe80077c96dec4d8da6580d48ab69f0cefabb5c81ace89e5f441881d6564ae09e852731b587ef51d267bfe61f0236a984ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dd206ef4f6a79a7b18e4eb37a2c8a8e
SHA13777863de4d1011ada59999aba7edd996f9b7023
SHA2563f2ccb61aa946d218db15d1a0f8f2bfb534f16f35336c704c580676e577a087c
SHA5122150d0b1f7c1fff136c903c166b1702317141e8f7d3157714d628ffc93401df0403b5dfaa825e04a3a4fd7d553f9c7dedd621f29e0b29eba93b6fd55af1b0a05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532fcbc79ea0c66952c8a94d376d1beaa
SHA1e6cf355d08c610cc4ade70a438282b5a086b7bcc
SHA2568a0ee17d91ddb924959f9d0887dd499eba8bd67f490f4de9ca662933a60c15ee
SHA512b03441835dd23ace21eb98a8c6db63d2a0e91a8c44d8194fed24210fa6e7d6faf17d7c36809f8499c7c4eacd51862bcf6f780cf1d932711fb6410427ee5a460a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e3752985e58045fdbbdd4c3ec4b58a2
SHA106691d4e181566bfd23ab4b74386312d58e5435e
SHA2566ac819568d06b9710f0efd8b29a5d16eb6c9903b598ac0901d0ab8006e5be7e1
SHA512545ecd6a44b38b1c4dcb2a92a4e3391a95959e09104dda150e7e2a7c022d034891ff027cddd65eeb8a48d66a24bac197b76edf0d075b5d529d74dc56c970e398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55be80efab3be0ed2b3027cc02beea045
SHA119c3b40c7d35d27436b057ecf56dc53c49e9a3e6
SHA256115b28d2d65980da24d0ca2ccb997b1a05797ebe472f017dec79b54dcefbb48e
SHA51262636db6b67ccbc9663cbfa5ee08fd5f5c2e5f9a3bf01b5ab549e632db61d43931c6b3d9a02327323aa3f9457db410dea5a3ced9d7f0488a4413c43115277d71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f1c8ea44dcdd615d469b78fe13ebc70
SHA1c17b343cef49c92de9152de664e70b9dc9a72692
SHA2563dad9539a021c9fec137da7832f8f37a12d6b18ade14b8078cece557bbe6d466
SHA512c898b97dd04956c953b8a5f2a3be40b12bcae3c8b2ba108bc6d01e643c92a688952596c91fc91d96f782e89e893ae88e2c05dd67df8ce61dbd6a724cc42e1bfe
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b