Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 18:08
Static task
static1
Behavioral task
behavioral1
Sample
41511d8f702f9ff9282114633a704d2b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
41511d8f702f9ff9282114633a704d2b_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
41511d8f702f9ff9282114633a704d2b_JaffaCakes118.html
-
Size
53KB
-
MD5
41511d8f702f9ff9282114633a704d2b
-
SHA1
5b7b2b9f312b6a8339371a6b98a651d7ff7e9b59
-
SHA256
a5c7883aec91fbf4d8ea7c7215cf8d6fa1124ed18d7b8e5a1ebbe719fe7ef847
-
SHA512
48f14f079c2f9b570c798e633a3a12722d3b734a7ea00d71e4ee9f70fff3a4a77079e9297a3a25a138a10c99d5ccf7315d67d4c11241a00d87a087aa4664a1f4
-
SSDEEP
1536:CkgUiIakTqGivi+PyU4runlYa63Nj+q5VyvR0w2AzTICbbSoD/t9M/dNwIUEDmDH:CkgUiIakTqGivi+PyU4runlYa63Nj+qA
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30917bfb9a1ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435004773" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{24853631-898E-11EF-A7E8-7ED3796B1EC0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d9070000000002000000000010660000000100002000000039dfe0cbd800710b01c6a9a8c719af4d23bb83cedb7fcffb4399b99806008ddf000000000e8000000002000020000000fff3781db486790b26023ff5af3997b05d8390fe8d3d2ed91b04e846f1a257d4200000002f9a9c84dadbc6d2d69c3322303fa624ab262addd0df42316e3980d9f3d81fee40000000281fdbab4ffa10665e884511180e58ee425b2f46b8fad667a5b4eb50580afee49db83cbddedd085fad7bddc888b8d096eb02fe26d95b9e7b14dfe1e97268d2ef iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2528 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2528 iexplore.exe 2528 iexplore.exe 1524 IEXPLORE.EXE 1524 IEXPLORE.EXE 1524 IEXPLORE.EXE 1524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2528 wrote to memory of 1524 2528 iexplore.exe 30 PID 2528 wrote to memory of 1524 2528 iexplore.exe 30 PID 2528 wrote to memory of 1524 2528 iexplore.exe 30 PID 2528 wrote to memory of 1524 2528 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\41511d8f702f9ff9282114633a704d2b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2528 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a682084c98308647b73fb8f1a9a379e7
SHA1c90cc1bc61b1bd98a7ce25f654828122c0b2a4e2
SHA256a33e0465851b6fcbcbac8a28013a5d4a1e961e480a5f1445d5b94d24e1f661ae
SHA51251b1338770ac9597a2eccfc2d99184cfed76aa79d47301449d1e1e51cbfbb50b87fcf355120a5b8524e207fa1b16914700d3adbc38f0f7d3788d36eaf1b8c1b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577cfbeeb6c34b7f59e531b25792edc46
SHA17893fc4dd53f7d6dbc8a65aff9528db5867041dd
SHA256b6acecadf5680d876932279fef61e7d1aefb5c3aca5a943b0d0c45075822ad8a
SHA51259412514912ab3aa649068bb7c40bb1952e5cf70a416ec4fed29d7b8cbcba1ebaa31a8593b4c9afefd550bf583a00135160e0134238534f4c6877d822d9bb638
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f1dad84826f71926b4d51b6363bb849
SHA179eb6c73706061a3379e618733cc1d0f23b5fd6b
SHA2564f95bad3b5f2a91cf954b22a50666b7483bd29c69874ab87a3215ca776cada61
SHA5120a6642f140b7789984332385f7706d737a24e51f6cbab9f3657f4796fa626ecdbb47ca81e4e1130b8619af6c8550645777109ebbb6b1e4fecc3acf3021cc3ce4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c4d8c3fdc687570bd23a29c11ab2263
SHA1b312245456da232989cffdfe114e5646c0cf3f7f
SHA2561420fbdc97394a944b0a40d84e058c9365f97ca307ef5e2db6ccf0675fdfdf79
SHA51246bf2932b83bd8aa44ff0e9b367be289afd805fa14698d1b7a38a3c8a4f5ac63e05da1c1245498e3576aea4252e970074bdd24c3ed04edec572c56ccfc6f2fc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c25d5676ce541d049fb0dc296cf7d79
SHA167da5f6ebe9890c20afa2ce0bdd586690278b008
SHA2563fbdb37109037eabf6a5a416aa821e0a29c49b53c315cd9f3177ac5e6ce6bdb2
SHA51294a3c2a1006aa13fc9f1d21a9cbb0097e0de9b78017913a5a74033607e09c46a328ac85be60b5ec0114a030038f4b05698eba6371419af3d248a9d8fc4a3ec3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572d47000114ed7562feef7ab9c2fe47e
SHA19c30ecdac5830be37cc1bd6eb9a9478c8c6c825b
SHA2568d33119c347b0b74aedb8cd0a4d699725328f818c64e71bf79795c554d56a944
SHA5121875ffe848fd41a3065869cf18c6a3e2e666fd91d5df765b5185ecf64c6b963b29e857419d27bba2e4d773d79086864887a486538b0f3152878daf9ba5ec7398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5883f9c50e499010f332efc1a4c60d731
SHA1e988b869f9809abb69a50b14855215774c4aab5d
SHA25638c961fa5e605e5f5b38421d6a90ca0efb892627c101998b88b71354e73a4198
SHA5128920220a37c4820a84b7f47062c7131f3da7c613ae2778f49befa5f9e3825f412bce0700a197a6038e10ff0b39008b7ad752bdb762ca0cb4ccd52ca416782168
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab6987ac0efd123882dac4afee703aa2
SHA1cd27351f78437f494032efcc91b0a25998edf602
SHA256441b8a6721da29e955c34a290a038a5fd603662f058f946760b3efdf7b6f86ea
SHA512408eab2fb403135678d3af7d4cebbdd7e1c3ae2d9944e92555ed19dd13d1eff57e3a2756e23e096baf2a9c0b35492e20b9e44bc52ce4929e618199d908897442
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534c3f117736dddf2eae2dc6767ed0744
SHA13ddb32fb29dc39ef424ef0f04c260e8609b7576b
SHA256eaab7a233d602d130d2cffe4292532d4068d682df01a320aaad37436d69c4cce
SHA512c16a5980945150a6dfeb5f741e3c0d4079bc5cb0589effc075d2057c609ee6819783ed15d8fe060ac11d76eb49a688f663367239d871fb05d49eb62ea75978e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531dbf604b0a5a6153f2c24783285f82e
SHA1e315819f58773e143f643613482009ebd3d31eda
SHA256a967f4c54a199ba8d193311186017f570db110f47a65d326cb00c63832b7d586
SHA512b77e1da306e9097314447feb6bf0d40d19786fc01ba35f226d4fe33972f05967a58736c26380fca76b84696f63b40d4033d682ea41c9e1882fd2ef9fa33b7da6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529d88fdc0e5357dd8aecb054739e1de4
SHA129f1406c481e6b3c0a97d36a346bce230233d9c2
SHA256e2c3e51c6495f9be6ce2aa25b4f1dc271675d7249f4df3f41d43c0fb21ffa7c3
SHA512acd362e3f23b27b189ae80712a7a5d7c96fcd2f7fda471f2757ba146c79de9b22f245981bfe6ac2ff72581d9ed9db8eaf149054803d650d6abc29b9269e113e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546927beb270ff515464ed758b62149c0
SHA14be3c5424ee1fa092f894fe18ebfe0ccd453b62c
SHA2563055584cd90db316d7dd74643e034b21840896513b37ef413b50207497c2fe8a
SHA5122107e4015a4b244ecf58e475616ff69a9927030e2affc17d50e5699292fd1d9a5b66b545826a6b23eed9812c42a0ae505d3442508194784f8335d947ea3f4d55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ed5a95d194f176a47a4b3d139a56ae0
SHA1465a8c708dc747b30015ec1802c24f4b252cdace
SHA2567912c10ce2751803c011c2a972fb301021c9e154dde1f408a481bc4e5c1efcf2
SHA5129de891c7a738f0079bd2aa8336d4a14c547c8976dc3518e1f91cf2255bd4b3bf784d9478429bffcb1e99f482600896390d00a8b5ae061a319388e7fb009f42a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f956faa7a30a278301339cd3ce18984
SHA1707f51e1db11d66806ad4a7cdc29332b7e4c6253
SHA256ea0871737f2ac765545cec3a3ea795736f2f0aa2c7ff10ce454f87d064a18824
SHA5123e4ac5186b18ee48c184ea5b97900d9390c24f22a0ca184229e2ede299c2cd6b32e31ec392a7935aaabd976bbff91c01d81d8cffa68a36f57e7493a86e07255c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf08b1332fedade9899e4db63a07fa76
SHA175475ff617ab5ab801d448832c3bd11f949ad0b2
SHA2563bd2a2ce57ecb34236e3075d4b430c9ed6cd52a49f34ef5f3c6d560ef715550a
SHA512ccb0f17a87a09ca029ad8f008a7cf34d3e4fb5498939dec93d25984d24e79d73f7fa2782b1e44b7772d9bd20dea45fbfcf876193c9bf1675fad5d4494e236912
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a81a9d128e88881f57952a954fa901d0
SHA1b1314d448f121db62c4850fb1f6178e88ef2a2d9
SHA256ac4ef5edc8e86333a2e00d759054fbc9feb85d4f618ae6ee42abff6706486b5a
SHA51281775220e44845851c36984fee11b09c8813e74897184a15fe3d98208e09f421ec49e3259987f0a30680f12ab156266c36c674f183c79130d41368b9c8675e46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511ac9ac6ec120e96a1ac35b734118c49
SHA182979c3bd84bf5e2177569b37b59d0a6c4ea57d7
SHA2565193e3066b600afe069a60ae0fce3767854e8ab6ce0f2e00febb0dd6a71e6028
SHA512ba3e002a4aab7ba345aa0525b308cc6052afc15147e1695d87603d7af03aea40ec8e8d486f6bc3afcc0c4f67ae549625e6802e086bffe5aee6f6079f05ea75b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5213455d4a36802bd3efe4d4ed5db3829
SHA1212f9a918dff8c345e14a7f394804206308fb36b
SHA2563fca6cf776fa62f48ac70346e52e89e9b4a2266dc628682800333a5c0733629e
SHA512c2790d6336ab846633aadd47eac6f9bb3f1aa77362b552df38d29796216b15c0faf136cd4126c203ed247231fd5cff8e629e12a62e2eb47a26f8e901ba69f4a9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q0WBLVJY\glossar-js[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b