Analysis
-
max time kernel
135s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 19:08
Static task
static1
Behavioral task
behavioral1
Sample
4193e6f45cfdd11a40fbdfcdbe077716_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
4193e6f45cfdd11a40fbdfcdbe077716_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
4193e6f45cfdd11a40fbdfcdbe077716_JaffaCakes118.html
-
Size
2KB
-
MD5
4193e6f45cfdd11a40fbdfcdbe077716
-
SHA1
3c895501937dfd4fd7d77e9f812c744a3821ace0
-
SHA256
243131fef74bebf0d068821fc6773e058da533b64a62055a94bc7e7840273da0
-
SHA512
eddc022c4bab8388cb75facabc498d4452cbbcd6afecc0e612b6a11c9102a7f85fba8e3d90f847fe18f3226728ec5251adcd5e15ecb1e36f97966ed377ad7f7f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c03e3f65a31ddb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8D7CC9C1-8996-11EF-A88A-DE8CFA0D7791} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b131900000000020000000000106600000001000020000000fa9122fc8e65f0530ce35cae84d50a67b0bca59b6a25e626340d88fd1bf42c82000000000e8000000002000020000000df835c31297f5a007b6720ffd8e687c67eab0a179c9dd16e19eab377282af2cd20000000e41575cd5da1cca66f0168752af06246dcf324bb8773a2fc77fe92a65453ab834000000040e43715d13828278f5f53f8e8db1726daa1a1efd5cf4eace3d5545756037c4091395426984d884573b510becafca8e4dba7fce70d07f0846c16eb6084d70a44 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435008387" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2496 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2496 iexplore.exe 2496 iexplore.exe 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2784 2496 iexplore.exe 30 PID 2496 wrote to memory of 2784 2496 iexplore.exe 30 PID 2496 wrote to memory of 2784 2496 iexplore.exe 30 PID 2496 wrote to memory of 2784 2496 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4193e6f45cfdd11a40fbdfcdbe077716_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2496 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a404b38f19fdc036e6d68836a8c07773
SHA1bde648cc932532199734e13e7fc945337c8df77e
SHA256d127b360d6b394e148f0c80bff612535d263660d1519d0ae0a2ef780685ce100
SHA512c0287ba5d0b8d99be058dfebafb532601f93bdc7e0a7970e3cbdfcb0d72e6eb4b5dcfee8b98f114d15b89f764c9906dfba91e01aa1578e9fb163effcb86d8fed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7f96f97d7d65ec39b548e8a65f22460
SHA170f91f1bdf72f954dba0231e8cea2425a988c45c
SHA256acc06796fddf3e589de6fff4b8108f3caae0db280eb072747e6b6bc494a40cf6
SHA5122f5abff8568d51dc0aba2d4198798f388d07f667292dbbbb071cbc7808b06b061006f291fa03f136203e21956be4aad311c39b3e4f09ce76932eb4ae935169f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbc618fe02bdf7f1ba11f3e0c1dc3857
SHA1343ea3b69415a5fa510bd3185f62eb16e2fa7836
SHA2564506102080c9b174fff7399ad48d8027b62693a0aa2a51f283e29afb8bb2c5f6
SHA5121e66328e76ea518ffa826eddaa6532753b10347a65ed27589005c8ec73f77769052b73272819103d6790521c0dae5b2e291c4f239e34dc376acaece5e38f2be6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b180dfdca56f9733f51e31ad893878e
SHA18f77fb18099596e09ced172927c8f0d1922afca5
SHA256d959b1b4691ed20375d1e832305cd849924d692f8a5c4a66145ecd1d39379e66
SHA512b0b6e9858725a8501da55bea4fe10e9a60f1d2babf1278a426679d44c34e460fb62f6fbcbf367621a308aa4aaa245054f0f6af03fb8293b3c8a1a576db04e35f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5245eb44c8388741dd9fc64255f5d0616
SHA143bf6c7e13b7a51d3b62ad4443f24817d9ab8ffa
SHA25678976450f0094d8b8647f817b3cdda129da6ff5cf284fac4ebef209df87ec3e2
SHA5129f5b1ba5782b3e791324312b6f0a5e6215b3ac5fec3e1f1b898cdbba1f9322e782a546107118572073f39542c99604d78cf032a4eba5130304a291d1a0d531aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579e78812daf9a42e544b2108d087dd14
SHA198ebd96ed072ab785293719316251978904725fc
SHA25693976343940779fcaa68e9b9cf1ae5d8aa23d8911cb8b5fe74505934835c6778
SHA5128e09f44427568f57befc39263a127cc16901e26f599c58f672cee7323f23f46329d54c826dc0acb46b8c623c080b1f262db1d1239d72050a17bc6a12a046be40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5112308d568a6482f8e06611e221cc945
SHA18d10f4a6c1ba55ae626c3bd48a3373a8e3c344ab
SHA256817013d8112de896d7e12d328e8d912798d5b43694f350da15c57b971c91cd41
SHA512fdf485754c92dae4cf11d20d7f9c9907e59a0190cd2ce8203f77f18419ea56354d892be46776a3aff41cce5560e03aa4b1f948f73cb6ed20adede43a45b9cb56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521389ff532bac9d3e9eccadec43cd874
SHA19bf3c4b22945e4a7d3d0992f32bc1e106cbc13aa
SHA25601e92441c163b980280b9ee5b636135cdcbf0e713c1bc5fecf1e7773d6d80485
SHA51220244b0b4dc1c34c5095d77d877867ac22c41481dd19feb4ab7ea4fcc137b25eee05851372ce55288ddc1d269f9ab817d741b0e9f41e6a5ab7218cdc3b4f5416
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b82cea8cbfec9dfcd739207a7e4c79dd
SHA1fba82eb76c06c7eafdde0c6879fda01169383db1
SHA2568732ee778116a909bca1035a30e277b06c161ff6068fff4a852f8e06dde5d626
SHA512889f4a7928999279c748d7506f88fe820b42dcf920f80422cac537cef4c2313f591da31596717c15f5de00434202c971beb482f3d25f26b77495406eba8b0e7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4acef8a310cec28a2c63fc071bd8160
SHA16aab39203a5dd862e99693ce3fe4367a6876b08c
SHA256af6b34f1b0d9cdda2637bb7355fb29a066fe8f94de02b8c67d56472e47d722d5
SHA512f4ea66f8240ad5ff51833480382603a725aa6b591ce60f1ff336b7b5f9561e74958bb66eccc92d6abbde178cf2eec227b60e77d326ec4c7e09e4f80ff7e2158c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545b9de1341e5b4052b4577db05416ab4
SHA1437786d7eda0ff99de84a3c1d27e2bd8361f1b56
SHA2565a2503e249d7a4494d7bc896a7e5addb30c95f6e2ee463a8220cbaa82a4cb556
SHA512d6b6c835f696a85af31fed2ab401df9e911d82ddac5b119d6ed71c48e2595893366297f7c7b4cba1a4a3673866342af7825726edbc9b402a68262dfb14b13f92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c38bba9e79ab9a289714f39f67c92af
SHA1b1c44b5cf6b308b1f666cd471a76e1ed679e3633
SHA25667da9c4344415313e16a53306661f05ee2abdb87aff34c1a9c37df266ad98d28
SHA5126ec01fcaa7f17fb1543f4ed050e65ba748649386e6721e18cf8455ae5ce01dfcf4c89e028dcdc1e65061d6c36fbcb4bca4b2ed30e016a2bda0807d846e41f1c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6899eca69229453abb8da7d34aac40f
SHA1d115d1d71b4ada61924dc86819b9b20a0bdae8f3
SHA256893aa41dd03706ebcca0ac933f632cbac02d27657d8f0fa6eaffd5277fcda64b
SHA512450e3dd0f2e74aad6e76e85c513d3757b77fd437d3c546de0b607a0fe764340edd3be024707b8a6d1fa2ceef3a739625c684f46d491a104bd7585a9a9ae5ea09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582ddd8a30a44acbadbd0088df384ea5d
SHA1ae1973396f010ca7a8ce3b5ff034afbffba29b08
SHA2561633688f8460b357fbe04193cc960608f9589f5fd94f47fcecfed848e767c014
SHA512a7b99b9ca68291f1165587b149942ba3112cdcb74510eb198350babc288ac461313265a027bc3ac8df50fdff3193f1fc5b0823272e3c31c4b0934f0b2884407c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea89f334ebeca273ddb9ef40d9b6f462
SHA169885069d861661c989c0cf34a2650eb2cedb099
SHA2565d07c3488e609b3812cead9ae06209641f37cba290da721e551c69b4eb13eb23
SHA512b22d66a6065e78489e8f1ff963ec9fdad4cb3879fc6bbecd393f0e575f17d78382cdc20249b09d35d8d7b4367e5a63cdce7dcc65f5fd752cf5252be908f043e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3d5f12d47eba34e700e0b456c8c7fe9
SHA1e2909f94de4e2da8d4c05d65fe9e00ff45d1ce3a
SHA256d09474d1497d03a0e20afc95e207ff5cc8f68fc600f1a21f3f310f02f2b8ce32
SHA51270c6a71e3404390d1ac4dc29c433e8dca1b458948bb1c5d5ee3caf5b615687e597b4da6cb7a0e11c6fd5a7ba2124bf829f77d7d811fc0aed145c9e8e51726bc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5121965fff7c95ecdada1ebe50b523f6d
SHA1093a669efff5b3dab0836663da5e9ab7b8e2cc63
SHA2560887331f2be42a0d32e81d61a291d595ef35f371414577ee3448b62f527e4c47
SHA5126f9f3d2cbe82c63b351c038db85b1216745d7c5340fec020496ee93a71da1b240dd32e05468266402fa7bf1eb7aa0b7af6b456de1b3eb4a92d50611c35996e41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c07665146ffee78a13d69d6445771546
SHA1d33447adbe0efffe1fd15919e1371f08cbc53333
SHA25629b739ca3bed32c827a8ee32446f0929bd174f39a3b9172ff743c2ab626a4a44
SHA51213d8f90818dce202cb77d0d2162b895a9f0fe3482b456dd0b5805b1175d35783d4976b78233eb7501e912c7b56b1b2a6cc743c998d8135efa1c07159958cb083
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a540da87ce9225b8e77b6924a53706e
SHA1b89d2b6a5f41cdc0de87e4fc2e509027bea41672
SHA256432bb936656def21ffef82371bf33cd42fbd09a883c827cac3628ac5c589c723
SHA5128e76215e5f8bf19512a7a1346c52a04d6a94502713b5fe3efa2a51a53ec7cf2bf67bdf1a0a051b0fb009238d097acc91773a9bcb13189b69025e84c5c1bc82a5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b