Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 16:15
Static task
static1
Behavioral task
behavioral1
Sample
40d55f62804ad5dacee2c4f707102721_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
40d55f62804ad5dacee2c4f707102721_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
40d55f62804ad5dacee2c4f707102721_JaffaCakes118.html
-
Size
1KB
-
MD5
40d55f62804ad5dacee2c4f707102721
-
SHA1
4b8bf40864fdf8322803cea07f9e12386044fa7d
-
SHA256
6cb71f531355af6b649c1c838701bb32380ba32328c18c2e831b0759b88f9f99
-
SHA512
36d1e0c66d4d1c73db36bf28ed429125766acaec30dc7dbf3c34bd937b3814486fa06bf712544ded2067aedfce15e9d0e61c8e36aca590ef624d6e8bf5626e06
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5F8132D1-897E-11EF-B8EC-E699F793024F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd30000000002000000000010660000000100002000000002431be1585592bb2fcb1e5fa7ce672d6e2ec8efee55067784b0890590e4b7cb000000000e8000000002000020000000eee1dfe7e4f7b43ea031403add64db1bad720b8550ae82aeebe764f6dd6cdf282000000022360798eed70b33b33648843ca3b20b888d18a15fefa934401eb09bdf85bcfc4000000087f63d8d1d98c4092f8097b2a32d3b60e2b3cb2a159b8c9184f67ba23f485709c40ebb1eda4f7c4355dde7d12dc54c35e0064c55aa5a758c04d08ff4fb8e042f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434998000" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a01b44348b1ddb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2628 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2628 iexplore.exe 2628 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2628 wrote to memory of 2700 2628 iexplore.exe 31 PID 2628 wrote to memory of 2700 2628 iexplore.exe 31 PID 2628 wrote to memory of 2700 2628 iexplore.exe 31 PID 2628 wrote to memory of 2700 2628 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\40d55f62804ad5dacee2c4f707102721_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2628 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf19ae0ef5eb3ecd6f233fc30f7defec
SHA1c216100b64bf63d9aea8efa9628b8ddd88de3590
SHA2567e6b6b96518622cbc2e25869efc976299841dace3e635bd9763fb41359c5c428
SHA51216c361d122c07faf4ccb8925645afa1d2a0643d518d34cf9735c7a7cf640863e9931008d5cfd8371cd802a88c0aec89247b7a46132f82fbb315eed22ddce2b4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da22db671b508c6ab6151f4ea125a78b
SHA15465d59b9ade0a2195d9e8d694d9910613fe2165
SHA256cd0cb623ec755d4a449a7f8fd45b170fb0b0e3962334205e4a8ccefafe235886
SHA5128c8f815fa6713ecbcc33fc237a0e183f0f6d8c33cadeb0adc4219dcf7f5c193e53ddaaa9b6ff93d056407dfbcec1466c2480b8499ee6ece2fa209f44285f1095
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d38791a44fc882e53c2669362e0efdf0
SHA1dd35f4d48d36d84e756d1f8eb037a0bc4b629448
SHA25669dc0335bdf0607266c8ae35604b5d14a0eb2b354c71fe2868be1ef32e441fb9
SHA512731ddbcebb166d56fc63f5d46e7676a81d78b18dee393d4e3c023b84b55c8b3ae2db5df092485b1269a1ecb06d7b8e80583a915a3cdcedb68c9ce981101f1d92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570635ea5dcedec33e8e43491055418fd
SHA1147878663ed3ca802df3325034abe6e4e01fdefc
SHA2561dbe88f08cbbab80ff1b82c52005569e6ed1a514f0a88b9622502edc20a6af33
SHA512c8251ebc047243eaf1d02d1e171ae3673a64f042a62388a0b9a41b8b59b5bba3c9d9e756b7c61921555853569cb1476a544f893f3a3439e1ec72e564c035676a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506c8a0ac83283468ed6f631c2b466c40
SHA16c6aa5467c40e7eac615e2ed16ade1a3c79d8faf
SHA256994fcaf7c2c371223071b8ab9c51e17a78cf0c7f635a5ebd1384edaeada6124b
SHA512fb61220e9e3d7ba2fda933bb8fc6db1648853370d1bb0b3c81fb9543116cbbb0dec3b2a1ccb22f92e67d5d3c9d6c400a6c660a92fa2f0df15da3d60820fa8dcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d615ae8ab2bec257de02fbb45fb52719
SHA11f05df09a252d6a42914f960db72207cb6ff128f
SHA25610e6bdcd715aad09b6e8d81d251eac99a88ddaa7fc4f2df5edaa2572eb56b0e2
SHA512e6a4da917cee34b48fbb6f3f8a76e4f2bfcb2573d7467eee19ee39d6dd8d61bab3079bc5f0208b97165e58df1f8858a0f22cdbf8af66d1e57d2310c5ece912ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5967cbdfc627e3e6ed4bfcb99cf97b4cd
SHA1ee4219233d8e0f9adf08e9358303e8b0460c2b36
SHA25617324b34b7d0036fe11f0c2a4d05e0236e68492e262abfb9b9f71e5f5af289ae
SHA5127e4c40ca8e6b5962b71811f9f4f87a517b3d406de69996d7c068ffbf41c37f2a7a8ba549fb96ec448765d06232d7d40ad57bcc5dd75f57866daacdfce73003af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4256801e2650f56527ea29bfda27410
SHA1a692891a04ef7a6e78b07c875ee7ad8056a934f2
SHA256918499150cc3fb80313180886becdea35e9aeeb001e050b0ed072d2e7efe9733
SHA51298cf35ae6a72bf286fc72e1ee204dec395c49d30778e82021265b7a21cbafc95fc76c389fd3a5719042a1e8f5a642bb679d505030cc0679f40550f9783f1f3e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557d03f9258a606c0209977f0933df33b
SHA1a89f1f927580cfa02d329607e4dac75a79c64724
SHA2563dba6ad32e032fde2032afb6a6faafe273e5d769cc403ca88a81ce0375bb4db1
SHA5120671ad67a68af244022a417ecc1eadb02d0be46326e6bafc64760e30c48c136ea68bd86c4a70611e6eccf28d8c7aa47e9781fe41cb587efea5df15958a2fedf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530e097bc867504b45cfc94e396392854
SHA1473267025f0e94670de59e3946b57eec9b513d92
SHA256945ed5857e3a3cfb31640c938176696177650c649f2889dafb96fca3ef98386e
SHA512ec4712caa6d35bd435d8f0dd77261161d371f279ba5eba7944b2cfd102e702ed79bdb2595a00406778b0c9342c311376c665a317e794caf7d0f21b7d330d01bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551b2878048487dc585f9da8aef4d57bb
SHA15df6af0df8375643a58f20c334d35e427b7cbbb4
SHA25603ad2216ace1123acf3f2f3ba84e97250a9c92c6cd9cf6d95dee8603685fdb4a
SHA51209074905f3e5ca8bbdb65ead3d1c18c4248542ca0cab347175b50bde4ed6d1859f41122cf3197b37cf1c9c7a19fec28a4f2689ee5e1c36660cbce3fad44aeda1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533e9f8542cbf0172440dc6ca1409da60
SHA1d1fecb9288fa3dd9fbb8827b56d5023ce4d0df49
SHA2569fb8d17b4bb08bde6ca19c63aefd9dc3f1fe828886c1102e8bea5a142b240ac5
SHA512b70a5653efe9b1ddcfd158cc01e4cebc930348f129ac7d8808c87da956fb03bf69970f514a7e60c5ba3ca39e9974226bc0b266914285a284d8e17d57045d3c2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556ac28303cf8e86c3d903df8560a5d28
SHA1e6d34eee08948650f0985ba3f3ca9a7cbfa851d2
SHA2566f4b7358b03297301c3afd981cdb65974083ba1b3696e1a239258200811821a4
SHA51270b72744fd88edf7259feff363e0f1969997526e14f7c8b27d5cb0492909e4d94ba9ec9de451069282a5a2d4a0be5ff8b5842960cff322d8f091c25328d6acc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548bc93a1a3084e09a307b0b455a8b5a3
SHA144f94bcd0e9e077c182ee88615496bd27d92c059
SHA25603fc7c3f6671e8c56da8da1397b49dfc64c1806570b357d895d0fa0d81034418
SHA5122dc875f388f8bb4e2bcc8d28454ef67ab8c24ac29eece8f1582707304b24056b420790861d9c4158d102e5546974134c030daeeb1d76e0a943480786a1b9198c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2f86f24a180478cef1ed40e00bff785
SHA1e48813511f8df4d1a64cf3d1764b1a02bea7a6b1
SHA256785df3a8b5c93cfd62b73d5971807ad6cebe915fb41518714f4ba315df51de19
SHA512aa8af5754dcb09252f9b32404f09a25af49bf599d28bc340a2c6ec685acff460b1a4a8697ef3009a1509c3d848628699db9b947062e7407493d966eea0834f39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bfae4e08fe5bffe009b7cbd737ee3a1
SHA106b88213e1a8d3e7cb14083d90977ee477927e19
SHA256ce40b897b7e5dd5140bc57c27885d234d87699e11b42bcd7dbcfcae90269248d
SHA5127c4916c31d30977d09514bf0f4ff4e18702518bfdb114cfdb532e096780a9f2250e5d9ae634ca33ec3c813e2b827dbb7e7eae2027c2a8ed6c3c1071347aceac7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce8d1b9bb66b3e1960511a2db7d5316e
SHA162c34fca920b79d6f2942280535f2cdd4d74adf6
SHA2569cf7167301b02c688262ae48189b7d7ae4fad9426c94462e75000499c51d5621
SHA512a9d30ad9631069392b51a69438967746170662e57230dc457ea9fd194a0bf3b46f2b4039e9f69617609dc772c831ea8abe72df109c502f76b437c4c37d58dee5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2d8731e62375dc72d4daf1df5e19c72
SHA1f55b0c948cb8b3fc57d58497051230500debf2e4
SHA2569287c36c81a27b9e42c720f0bd6c13f70c0246c050835c77721d783581a5cc21
SHA512d52da26ec23c81de6b12f4e39140e08d567c4085c6b7efa26f1de9d98fc0b793fbfc975a9235705d61800fb15a5be3d95e0abd462ade62556849def0ff43a2b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cd9da888dd5ce308f6bfe5a4571a964
SHA14d5f48bee0586af32f20584fd033f0b0211110e7
SHA25693d22037cf7447889d9c877819a1d5d6b8a69e0519b401e46918c3393f501e72
SHA512472aae29407c13f14f8279c36931d4353ca9268a946e534fc0055391d4d6dce45a351c3497294393a3ca59c5d878e5858c082889e757760aaa287d2276c5b800
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a72e7df490d18a8ac7f927197636ae2
SHA119914b3cb7768a3f1110196e69bc5a1e2e96b729
SHA256816433c31bbd440f4e70807a7d2246404b0042340296dd2853b93d1f631ddb0a
SHA51216bf684f3f46181420aa1744babb8be21ccc4616e6bd5f5e5fb72b35ac8eea77ec58abb63d959720dd03098335d7c607482c3750767dff6adc8d7b4879d47067
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b