Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 15:07
Static task
static1
Behavioral task
behavioral1
Sample
408b4f43385fa2e61a04f64cb0f3a15f_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
408b4f43385fa2e61a04f64cb0f3a15f_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
408b4f43385fa2e61a04f64cb0f3a15f_JaffaCakes118.html
-
Size
76KB
-
MD5
408b4f43385fa2e61a04f64cb0f3a15f
-
SHA1
c1abc2daa996219ac34567a7185323a98de415e5
-
SHA256
9709a989cd4598177c21f7c3689e43c0c7ff3d6d8a74ea3fc898e1f8faf4bc7f
-
SHA512
a48e5e2c7def4c1d94534cb872507e336ae09ccf8aca5186f5d295e3278fb4ba8608332536e54d0aec85da1a1e8d09fb9551d0affce3066b7ff2f65fc2cc616c
-
SSDEEP
1536:/pX+d5de64NwiNnHN8eqV3CPJVQzRSJFdAhBe95Hdf5Hc5HQ5HX5He5HSA5H35Hd:6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b9600000000020000000000106600000001000020000000323ad457460592e8f3d2b6f2e3f295f6d976d3fac92eb998b2f823307066a2fb000000000e80000000020000200000007a303aee9d67ff7a2c160601e76b947699fa05ecb4ac9795aa8d5fdb9e8fb088200000004970be5739c458c273602a18c90e75a4f12baba2b88ca80403f6b88bd1f7f95a40000000b43198ecfca04fcbd5244f535dd4d8fde41e9e1df6a317ad2154886d07132da3316f8c0fc0399d14877f872ceea44e3b3fd45fd3324c89bf072bb7f18ce8af48 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434993922" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E03DD131-8974-11EF-810C-FA6F7B731809} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80a3fecf811ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2192 iexplore.exe 2192 iexplore.exe 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2284 2192 iexplore.exe 28 PID 2192 wrote to memory of 2284 2192 iexplore.exe 28 PID 2192 wrote to memory of 2284 2192 iexplore.exe 28 PID 2192 wrote to memory of 2284 2192 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\408b4f43385fa2e61a04f64cb0f3a15f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5163dfcd8c2c3bb8651b45de599c56349
SHA1a79a22421b089ab2cf2d33d2098364880634b671
SHA256ba0ee8d2abc4900cb9aed4bcda194d978fe884a7b2ba59b5f7fef15f6c77a769
SHA512d583073e2f5b62770cbf833a19902aea290ffb588f7b80182287d3bbec30cf9db2a30c9887ebe7cf5d4d21b1bc940a14764cb34485ce9044ad425dfaf1b628ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad5df71da53dcdf72ed545fc6e8f1df3
SHA1b8a9a6c11e4797f731d856717e1dfbbec420f060
SHA256183e34ebc5a79fbed7360b8d16a8ad0d3c5f130ac2d0ac3102bd0d502a089e25
SHA51221f183144b01f5314fc96849c82416c850757b7da533707a0f917dfe7f68e5ee0103a2661d2dcce0b309bdcbc7da8d3bc1a26413361cc254b0a406b94825dc0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c38e5eae0a80aecaf14c84855f6c5ea
SHA1584db3b175aab5144eeca7a846d01122c1f9ec4d
SHA2568f74033841121c55458d646f4d35a29bc8634a83c37b4bddf56bbc2ad3fe3cf2
SHA512ced40a4fc7277686b304e9676de32e4ebf745af1c22b6441b5b3b4401525200820cd6d860dc41a6ff85d32d4054f3558e14667db58274527818a33355287a53d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6959e0845f3d1cc5ec02b6a3eeb5ef4
SHA1aebcbf1e6d1220273e6e3bdcd57b95962a54d8d4
SHA25612ae0dc0cababe3a23c58928ef8d3f0c748d811c770455eb04bda78ffe37b212
SHA51273c0d4c2a923d782398e6460ae01ffff45b9a3464a6e7681aeb5fe2fe196b9e9324c0f0e9ccc6fe51d725af39abf132f40e7f48ff2e23f9d417afb0b9907a8da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b90fb4f9a747fc954086403c031a75ca
SHA191a3bcdfe259334539219a3c8534dfcbfa2dd921
SHA256ac390ceaf2140cbcc1b04894ac0d2f8a4195551fc8254471e3efc25ce49a90e0
SHA5122dd890dc34dc7b8027aacedde512409d8828a65062cda26a3ede41453fe2cb2d38003c7c303ea5955ae0dba6937b0b24f646a51d892a71f0468867d1da16f9c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e8a6570f1fa60d7c2e3d35c13587746
SHA1d9feaca31507e1ebfa4508bb5e0239377ed8e1f0
SHA256ec805cae54b319e83f3b238ef5dbb999e6a55b2d8eb224175a9598af77028240
SHA512d6a54272ad045f872ebd3885ce1b6a796b55f42046a61d3b195fdfab6c17683cbf9bca5411781e82b29bb686f98b85f2736055f3b4ad017594836d58f26b468c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f1467cd0931b0cb029587f211d60d23
SHA10a6695d6c1d7ebe49ceba49baeecd72bf1f574b4
SHA2562e7837ef99cd331cf2b042768e0723fabfd20771138766b899a149c69c65c782
SHA512b93d794e156111690f7734e6721937e18678d6bc0c2622b2772cea15f6404203e398e739d960c21794050d63f1718ea76fbfef362c513a10c97f76d4b7d16eae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5929c62dc2a207896d5989e84e068a3b7
SHA16511089f936d1289d228853af1fa954d21aeb4c7
SHA25641ac2c5270c582f9469fafa1cf31daaa83194b850cb47d1eab1a5543d94acac2
SHA512df085515788475ba34fd5fc33ccddf8e243aaaa941f671bfa4d07790e458562fa8302ea7c2a1a28134863c0f226e9e05e5780cd5c58f9d184fa88e58ce683a01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52265ef96219a2fc7c3d92663f840b16f
SHA15ac1e6efad4b885d4db0b8411c4cd4ed929742a7
SHA256d65c1f791485f9255aae811e9b3eac17e98db3e833f41aa033d755ea7619694b
SHA51280af114c0a9e6f65da9382d1f00e8b4f83ff6255b38b8ff4b29bc0ce64e13ac86d46a71c03380027faa7d6edd86c14d233b35aab2f509a325f4c29d7fe252bef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b8d3e428da03fc76947db150965cfca
SHA19ef7321b382ddb58aebc4940ebeb4366122de504
SHA25674a87c215db5c618ccbd23afe2368e9e194184bee526b1aeeeb46684a2ab7dd5
SHA5129323e16b95c983ff78421002842eda75384d5fa9fd16ced76a90532ce30c3a67de398e7533e710e4c4aee0549a5c9d69c3d0a74f68fd587bb45e24d727dd2d75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cba4d32fc6fa858e733cb93b81e45c1
SHA1393497951b4bbf7c1ee5e10c8cebc6223e674fd7
SHA256ad54462004f95d6905280628833c8d0f3ed56078899af188edde162e0d6e4e9e
SHA5123ff0fae8e297f34003eb5fa356c24b8ff204a2885b52de4345f3712d6e88ad2645ebf75b964fe96c9b3fb7216ee76059fda9f8ce14159c1c8d6cdf0f550ebcb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e2fbaacb59167c6736a6e3459cb7b62
SHA17c3cbecd17222a6229d09e7406f1cf3b7d62efda
SHA2564ab7d4299116c0d292c91fdbb4b4a8cab0826f793b4c2950daa51e93e01bec26
SHA512632fc23e0b8a613bf8b5d5423072fdac67f19373e5741eb1aefffa8dbc156adafd30cdb19d4620f13cc3df54d2f4c1bfbe4cd4b3c7132f4974e01d5e3fb2c58e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a8160264aeca31218766b92344edffb
SHA1d9b2fec1e7e57b14e2e031f0fb6c986d020f021a
SHA2569eac66de5f958edcd0c4cdd37d7d86a0e318a51d85b377de3da0a399c3024894
SHA512a23e945e21a1d3c7440a8e536efb597800c6759814e29eb44916bc93319fa99b4d53148559ed5c056cbf267ea88db0ab16709419b21de0aafd543a367420a38f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8cb3d7a49dc076edc55d27c1aa31aa9
SHA1d44af657788bad474635df4c9d57c3ae97e2c675
SHA256ed23649816246e6b944dd36f775d462365416bd55b2ffba010dd4e708e2e4d50
SHA5122c241feb947a9188b994c8b14f98b87cda7e8f8410a79efb0eb68188628304e00e91cfc49012ab596278d3188358bea6f9d683a19fdaf18f7ab7548b0d531a81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d80ec273a6eee61b87f2d63eb75c153a
SHA16723e06a77c2316e79c0dfbc1e26d21fceefc2dc
SHA256952ad174fa1cb97489b694e13b71f2ccb333f093d7fdb22c0fcd6cd137aeddda
SHA51201ba05457dcc93788835eb91152ba6aea1dd371345a6ae1d4844b562f8d4da323433ff46d1e8d8e20651d6441b738c901114e165799f325df8cb6103359adc9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd02808bed838fe09adb14384530f8ee
SHA11e3cc781e651242b6ef7bdd094b8644abab1d74a
SHA25672fa95337a827d0a454cac3a01f518a117ce30c8bc0e514e9d6bd5bfaca8317d
SHA512ed31747908378a59f4b56a12f3f342a8fded4eee25363026569d56a634999224af8db2d4102dffa6badcdc16b4eda2bff8b69c526b79578c50532a467104cbfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516aeace3112665c5ecc54ab568d29461
SHA1a7c0a3eaeac564f957eaa494d7dfd09d35e3e6ae
SHA256a9b9778ffe49c38a94440215590536a1edee06f1095d30dc04dbd97b9f27f2ae
SHA5126338b313321f1ad685b7d22619eb32d48ee6ff9f9c18220f9db7fe823c6253c114e438ca3fb619649e145cdf129ccc7bc7ab789f4b2f8c9c1c3ef13677472b11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8ac46630b1b019c578d0af8e83e9bc1
SHA1cbf6322867230652f88e9ca7e3ece506e95998a1
SHA256b2e450a6c8a73eb475ccda64833e556223e6c69f178a2c95f4512ea9f1808c9c
SHA512081abe9357925b724fcc5504e8b5532e0560501132e5a731f9ffde1416c2f6fef10f46615df425c4e7764c2a68aec2146cfd817fa0d0f4e0ad59591a6ba2b09b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb3c331de245232eee9088b5f2e0f8c8
SHA1d3ff40c0835d8c403dfeca2e093e5de0c07dedb7
SHA2560425831f0574180e7695afabb493427dab38da16288ed9ce46e86c3a43e72fc3
SHA51277e66e6bb5c59891178ab5bc14eb73720a70aed85a7c2aeea3e59c17b11d21a4a36b3afc1524a2bb083147b65fa2d08caaf4d7239e97cee7145db0d992d1ff76
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b