Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 21:37
Static task
static1
Behavioral task
behavioral1
Sample
4234093be024210b34511b9c5a1a7950_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
4234093be024210b34511b9c5a1a7950_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
4234093be024210b34511b9c5a1a7950_JaffaCakes118.html
-
Size
49KB
-
MD5
4234093be024210b34511b9c5a1a7950
-
SHA1
cf11db54ab3d8dae917652e5bb0514031b9960c9
-
SHA256
8da49714bda4397e83164fb52b4049573b023be5c87b19c949f1768f2bdf6206
-
SHA512
2951f42dc82b87cf442d78628cb073c34d9cb979d33b31d3f964e48aa0f65b996dd311ef07ea38212859f910895f0252b914e0fe045dfdcfd3c3dfb13634da32
-
SSDEEP
1536:XbfJNiwHwx8RCMxYEVnT9uR96D13d8uws29mBl73yTOcAaB2mVgspFKIsnA9WSSN:iwHwx8RCMxYEVnTHltKKIshSq1/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4BA9AA31-89AB-11EF-AC67-6252F262FB8A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b9600000000020000000000106600000001000020000000faadc6820ba828edff520afd54acabd2dbad46f5c88b0a8280f3f10bbfc1885c000000000e8000000002000020000000d195201913925600bc468351677b7c6f37ad75a074b681f4577d1bbb07373f4c200000004874878dbbba26a5fc8ef9633a98a249f4f773c3a76bbcada84c21aa281ffe67400000003c6fe67d2d052d0bbc19d25b8e10ffe3df2caa1d984cce275b81a5b8e85226131288bba22d8ffea4f26856a362756942e8be6826fb5ca8c2ced03d8ac70447b2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00798224b81ddb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435017295" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2400 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2400 iexplore.exe 2400 iexplore.exe 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2400 wrote to memory of 1964 2400 iexplore.exe 30 PID 2400 wrote to memory of 1964 2400 iexplore.exe 30 PID 2400 wrote to memory of 1964 2400 iexplore.exe 30 PID 2400 wrote to memory of 1964 2400 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4234093be024210b34511b9c5a1a7950_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2400 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506d461769914a435c4d53e8e85fc6e50
SHA11bf5265445995c327b774ee57a1c48273111835e
SHA2563243f0f058695f3b2fec73bcbf9fb2c78fa32481dae55303459f09734b66dbb9
SHA512ad225390b1f6652f2a2794efb6197b13aee34bc29a0ec4a9f09114edb9c76ee8d929a2eba419ebf510ef79e316471ded5cabdeb8b0da9d33d58509482da669b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee4f6462fc3f22777d8f3439087bdebc
SHA199c0f085062c9d4829da154d954750e88a2a39f8
SHA2567a80971378286ffb170b58b32d176c7dc3f2570b9bdf482609f0b9b62bec8022
SHA5123ff079847d1e9670dbd71cbc97071eebd378bbc8308df9689a87c14a3e8a3a8f6e3f667e2aa4e76395bc7bd0478bf404594c585e15984ab40a4bc0266f318515
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e724b679ee48bd7d2953f26481af2f8f
SHA1fb12fef34de00035cf900e808bb9d0c1c556ed38
SHA256a75bd83517baf30eb24a0caa83fd35f9dae5c6924f0bdce1c944956f0274cec2
SHA5121fea4be9c970c4cad4dde4e3bf441c53f3a37070b0fb4ec9067fa6447128002b4bb1d3725c6fec21aee5443758f8112ab56d225d9950c08ad71a73bd39774277
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ec45a8b40ee99cfe811b2bf84397907
SHA1612db9284b7d8694cae49d1a6416330e6c9058cf
SHA25659d1be087302eb1c19b40150e34ee01ffab616b466038430144fe6e9c601cd7a
SHA512e86f9d5ea06e0e5f53c0134836d39764f0de9d0f445406a78ad43c2e55f82784438bec21dd6c6c17d6bbb845fd99f542a31a7596152416df310d66d11741dc89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5765624961f013e72fd411dee8894dfe8
SHA1f5f865f922f354597fe3241a9ea0a1bd93cedbed
SHA2562a842b79aa8c3940cbece592cc6a427b21332209b72d090a7455f95eb32c1c82
SHA512f39799a2cacd9eaab7db7cfaad7ff79dc44f54de799fe069fd4be94a6ae8ef911ee51a351b2e53ffc64d25acf0bd023cdee4b4c1500f9cbb1e75d1061ea19b97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560506f0de6d972ef40a25ada209d637c
SHA1ff18880617b082ef99fdc670cba554c2780138c6
SHA256ffea99d87b7b664603a4e4b2b96f8729947967a8c2c08a449a2653390771055d
SHA512b7fdc80fb4f7a5363a6cf48fd8bd7e6355cc605f13d85d65c3d3d728fe2d44192b673d674cb655e52b94e71057c225bf591efe105602a6dc768f5d21b85c6661
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5130c2d7c3eef4a51139711b6bff6fefb
SHA12d32eca84b32929386d631434c5e14242fbb4752
SHA256f054f6a9c8c4706d51eea6745b2cdce1acfc957b4dd052470a91973b35c32d9d
SHA51265d25d54ae3dfd03533389a713370ea315eaa2c75c8112f804d08bc5267f0c90bed750d2f75d5f2fd3385eae5cb1cbea6c9d726ed032247cecea29b5a81d9394
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2ae67544a1b5ecd3114d4dc700866b1
SHA19c6b3d42b83207fcfcf43ff1a7d672ffde807c35
SHA2566997c0267f5f11b6e9e826411149545afea55bebf9129433ad5e147d36033375
SHA512d4d255deca51130fd3d0ef236ab30404cb2bc7840ae8fa3659b2debcdfddcddf83e49a98ba0faf11d2afccab76326ca776ed1f4f9a0cda01691becfcc811dc05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54465c48ff6649ea0fccd8bbf60bd114b
SHA19fd707535f545f4ff8f07eee9728c7b0f09b740d
SHA25644eff56ff7711a7a011a208f81bde8b532335b568a4109ac4927cf6e4c5162d1
SHA512edc2f6be66239a87d41d9ef77459262ba054fc9941dfa4d878f6b339a5e0f3db7016fd0e486ed0fc740414ca57f75717c94dcb2b2cfc4a14167a3484e6d15760
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553fe22673723b4d763240e8ce976344a
SHA1dce62273d6af7a972a3eff84c3c4fa1ccceb6478
SHA25652fef82d0af00dbaf815a08acd78a3ad05edfd94404dc5d200d8d8184262c39b
SHA512fe7503e1269a69683534a62b29c76b5c640ef3e9a1b7160e5c130a9484024f2229fbd64bcd69a6a93f56bc9438eda0ec7040f8e1ad72934f0ac7a00e7f3f6ad2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5830f5be6b0922fd2d13171c29a00c063
SHA1ecb2667f7b8e061a1fda53ba46c13a2711ea5a73
SHA25668621c64833dcbdaa986b5329e4bcaa1f3bf20f5ede0a1de61aff9c988a0cd84
SHA512ef67836365454847a6740c1a73d42c7b9b54ace0bee37e55d05206af2e906a25f9df5a4d046499108f7534ce6357752b852f974ff8d118512555c0e60b7e1eca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6c3398804cbb9b820cef0d1edb8d3d6
SHA10a2061947d8474b88cd03c27931373c56ca67ba6
SHA25659585d9f5146fabe890529819bb586e1ce959c75e3efb3f960280e83302b181b
SHA5123873962074468c9e46ace38475ac5ffa0786956f178c4526de60782079dd534e410e31647146f8f7409cabf6dfd1ccc6ec74c07e2c18121a4f3bcbea783ae0dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516d46307e1612f009d136b63cfe2dafa
SHA1bc573a271325862f8492eb70477624a47d102d7d
SHA25633e49f84bc79313a87efe072336aa822f41ca2ca7e083529bf2fb956ccb6b9c1
SHA5128fbc683ddce3442d342274d2c268cc341d1ee8efbd6b6ff5b2ae4940c2354c0e3f0ba3f16e88355629ae913eca565900e952caa12223899ddb24b2403b8f396b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562e09e68556fb57fa4391cdd866678e5
SHA1a57570e6c74e95fde7c75ac0e9791773a9f13c33
SHA256bca07bce13e372269b9a77546abbf92ba49b77694a980aeed2b7d7a50ee00d7e
SHA512f2154330bbcfd2bb2bcf3be5d19b77889353d1ca7cf004110192236442a5efc67a1cfab46d43a469ae8bb5addb57ab7832f18dfc5148962aa50cdc4c31568bb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574a271e44e3247791217aded32569bb0
SHA16ee4c2469801d6a9222e7bb98db7acae977921dc
SHA256ee49e6cfabdf16af6f870ac798b6459c38457745252bed04aaf0994673842790
SHA512b31ca27aaea4f1e6d645eafed0ab6d08399e7fe5002c3e525aedd26bf8d18c606e5153aef6593abbde35cf6cb17a8a7f2866e341ca5a14534c8b0d7ab1b1293b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569a28738011d1b46738158614d712b6c
SHA17c90a09956c085ab182abce18edc353204e1b3ce
SHA2568915e816dfc0176339499e1f5a5190c7076700542ca5102bb0c4c0e8b113597b
SHA51227de26a2e49ee56e2418c8b1f44310279fb7c750890fb6a21d78c16641652e4a70b8edccba50d6a585180c7545987a593472abb736327dd05ef57822e0d17132
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581cc6507e96b8a3f14134cc62a9bc625
SHA1cc7a40a19fee569dacd092d71b133e7e4a882a7f
SHA256621a718dee9d76d6043562b0284582f387d0cb92cdcbaf3ba8726ccf1d84fc6d
SHA51200b5b65dde113ab9f7ac3e5761d0c88668308b8698cb0ab2f391e188dc149991048ec8d66e29192a205bdb42ebf6f9b43fd08476335064b294f533be8ee29681
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549f4dece5bca542e38c9d53d0e050e7f
SHA1b9cd39659ae71cf8c84a68cf04ed8c1c41d34349
SHA2562adbf815abf7c1d47c6740c0a8907241b5f26b8ca6683a265c47da272e3748ef
SHA5127f7fe01f134c4bebe937c87bcab439cb350818e88426d7863a2cc704ba7336a8ec7049c475192da6b1862c12f75d0598755f255ab1d93a62a206f9b6f44e9b59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5276f1382cbfed84fac7e9d6bff1c7337
SHA1a1c471a6a89e4c50553b1e99ccbc1af1e532374e
SHA2560dcd902182bfa1681dbb2363da49426035bb853305661144b337a9051efe3359
SHA51278a0df4fce749a02a11177452bd71e64724a143a66259bda944c4458bc82a912b6a926015ae8a79ac6b7847d162100d05d8b4e91a922127744480d9efeaa13ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fee276d28a022a0e0b1ff8f7029b3d3
SHA176c6b1876e94b31f7ff57d6aad100511cd6c59fa
SHA256c0b9bb16ec8aed68d1abf5013664adfc1f9f87475fdb1fd0418e4fc0bff7be77
SHA512666918b2e71ea1164a05dde4fdb4fa3c2126d9bd8aa2d27071b8b6e0397599388508a35cf755712ef3a16c51140eedc73916c5531fbdc94b5dcbf56625dce1f5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b