Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 19:56
Static task
static1
Behavioral task
behavioral1
Sample
41c9a905a3bfccf5dccf406ece661e2f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
41c9a905a3bfccf5dccf406ece661e2f_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
41c9a905a3bfccf5dccf406ece661e2f_JaffaCakes118.html
-
Size
86KB
-
MD5
41c9a905a3bfccf5dccf406ece661e2f
-
SHA1
3e25db8784072c1dffb52b4e78d02c25828feb05
-
SHA256
7c4d00994c28696733b7db270ce7b94f2bc3b3dc6d996f013217ac62c39475e4
-
SHA512
c44305772ff035a9d6605cbbc2ec20abddbdd2db09b9a178012991517edde2c6fdcb4e80c27e4566e05fd2cef58b9fd5661681997e5431ef97069f3716e11f52
-
SSDEEP
1536:fNOrV46BCrUke+BBrKIOeWClLPccaw6E6ukJ+lHQLQBkrJgo6KaOPMTD19DfbAky:3RHueWQpI45Us5IHK6w4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000261f04113e555d50099ac31ed8284131e20d5409b6e49a2c93c054e47712bed7000000000e800000000200002000000058e77370d318ff6f2340c87d1a63102019ab356059e7b300cdcb6cb05214f85b200000005c66c3b52a0ea0b792c186d1c9e65c8759b8cb6f055e5ba2962dc1c6b877f52a40000000e6ff7ddf996b53f961dea16c397c88174c5ff77b73274d47cea1bf0862c399516c32eb6ec9c44cc66c149489cc58542e2334c779a369a8a6848793dce2c3857f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4505E621-899D-11EF-9C44-E61828AB23DD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3053441baa1ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435011271" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1260 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1260 iexplore.exe 1260 iexplore.exe 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1260 wrote to memory of 2128 1260 iexplore.exe 30 PID 1260 wrote to memory of 2128 1260 iexplore.exe 30 PID 1260 wrote to memory of 2128 1260 iexplore.exe 30 PID 1260 wrote to memory of 2128 1260 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\41c9a905a3bfccf5dccf406ece661e2f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1260 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c28d343f9e9df496720fe5cf97638e01
SHA18b3639f48d3bf3a6141e468b614762ca9ec5e058
SHA256afa59137e68c05c6403258d2e5db164fa3cad84d07218c7543224d5c63db6a69
SHA5129d63a759d984d1f1a9e55106b5b71cf1c7ccd1888257510fdca4b914de73c1b5ea0c89b1abf782937801fa71a32e16413ee675098de9cf7d93f8bb82a4244637
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ede6e1fa19df16e7399a2ff130ac41e8
SHA1546a0a6e861d7e14955b208e5bb78a02cc5c43b2
SHA25646a933a57349c140956f3660fd6e778acb2ca761e83cae3f045119ebb276a329
SHA512853aabd0835e7f0096fbdf59fae7a3fe15e4b194b7c83ae012a9631d1d622a52cbda1234a691182c493387038988601a316c313d48b2bdd635e8953078255175
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c390f0f391323998d81caea4cbc5c616
SHA174a45c9c2dcd2f6c32c581f5976dbdd70365eb5d
SHA25680bfedca5791b221e09837d3d8c40d69b26214a48d4ffe4b60b8edf71441c143
SHA512c6d437fbdf2dfde272dfdeac5a512710346f3075c08c3bf545e6eca565145e3670ee5bc038a18d3905a63d9831d94f5e09d444339f0c655b902264083f2a4726
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555ff7dd467f40760448036362f819edc
SHA1de4d464ef85939172b6a6377ac70739c6f2a5a76
SHA256457015d3d30e4a21e5d7ff2845b0b0e4942a42f112b45d10991b85bd175d4113
SHA5129208cef23ee77e7132dfdf4c138b44937688b447452c9bccf1e3c53722c267fa624bbc3820e6bc7985013cba9f6384f8f1bda44d700a244a937538788ecfdc55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599ec85fabefa40bb415ed4578967368a
SHA11a0d8f2e4336bc5574ad371e102c32a2462b4cba
SHA2563f60758353264bf7da5a375ab49efc7400a04915548c0fc8ae0ba4ec667435c9
SHA512f40d1d04264491079df62c1885ddc7ad5684826da10e71125a812b93ffa6b4d97f98b2e7724e68487a21c800fd1db1927ce59815d7ecc86a267ab9adc9ae955a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e99650e235288d884ba350099c074e3c
SHA1969f6d910311e13022d819e20b27fbb4c3fee67f
SHA256c79149637f581ebde4518ca9f9a745e946b1db88daa1918923367512e6433468
SHA5120a78139cb86c2dddc7e899ec55a68bd6fe7e7abd4d16e67765a07ea60598891119617142f5651dcd534cef970226be71528d1b84f115bc3ee1c83d6fc18c70f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c360f747519c32c6c0ff5dbf8e1fef12
SHA1d187ac1101a98ff48c001f91ee70d9f67c56ec0c
SHA256025619271d44b802f3568a928431c0dba70810b12b65650f94ffac8529f5779c
SHA51221ca372de03c187097141e63ccaba8385ae27980ed3b443af0e8a65ceb652576c2a59c1dc3919dce9eee5657eea492c1ecfee37393820d4c941739dcf989472d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559b81e914e1dee9818c60a51cec2a6e6
SHA125df03ca4af8cab60b619170abe33591e0f378fe
SHA256f0499d562b0c1a0c2dd9edb3a35d027adbce721332d3072c66024c9c839374fd
SHA512ef943664bc74a90e6b7ec6b547b52deac14f841c092a7cb60e9c904827fac46468dbcf54c9cf3046d4b89717f909ba2cc75c5beacfa992ac80efda1ba1ed049b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522ec953102a8cbd3bbf0b5a81a8950ea
SHA13444b6a1c3aedfbb394ee0451f62ea1bedbb6e17
SHA25622e1072888150f32b53c57eda235d0b6d958034009631675a736ae3f49419d29
SHA5122ad93c9f50e9aee5a5545e2d617360f008bd3217e0f252d23a1b90d9522aa10f112799d654b1440e085a913bc895db6ddab827c2b86fe1a65c1b88beb60e6abf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588825c4d56062bf8363a4d6ff174c324
SHA13e941c2ea3cb1a17839aba5fe6728ff1c8130676
SHA256e4dae6b25ca9a553575e89694a8a6afa803b6372462a6b915848ff42c11c5c2f
SHA512bbe9939419a3bfef2e47ce5b7de1d9ff730c71254056ac4bbd31dc12f39985f294431a02c9f3f20f07be33ab9c02606ed2557ce8cef1fe56dbce2a76f48cc4f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ce95f33f9f95bf6df77ff2482c0454c
SHA1e1b521a8b64a8d1942ac851a3f62029759d58235
SHA256edd934b406c6c6c36b1ee8d2e1efbfec958773e056f1f04646fd284898c11689
SHA51222212a5a1e1708d7b01c51ac728eb8cdc1b2789736c2f42256a533aa03ba0a08680503b723a5000192216fc192f9a4a74260491542cbb51e495edc5d4572890b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5838fd43dcf4bac7ac4ebcea1ec4958f8
SHA19d2ded40398077439dc2ea47eabed6e3d6dcc84a
SHA2560b2bf3c91996d07b5ccd7fc3ff665a99296be9302af2c37be8d04d621493af0c
SHA5126794663449c9f02acbfb946938daec48ece3dc6029f5fac4e4e16aab16515a4b3f450fdc55e0d028ce78aefa94c7211639c93f6d634198d5862f042de066d3bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5466d6525db8a51be9255259a5fd2d023
SHA10481d834a809a13f531719ab3c98bde8e2bdce9b
SHA2564b1371d3f0656211ab3d539bbdc71b763a64c10d37b52d4be44c83da1dc4fe6b
SHA5121c88a5a07255e8ef2cc673b4c0376e2c946cedd773866cf53ded6f68538aea6b1db4bb96c90931bf023e9544c4612df9d2de13fc1a71c2938d5b05f0ff07d902
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c195b9e65912eeb65340920da943f0b3
SHA17c9bfdf24165f5bb5fe0024f3871db02ea9d946f
SHA2564802c6ed183c77e1161c98181f9d713f530e5c505347ecfb08b14f490e97391f
SHA5127680f9eb97eb7f2220b97cce0ecb6c2592d48fa9d6c883d1a1d00b99633afe6dad441deae906365961505fea6604fa727a284654bc74e5e4c4b5b96f1d5ca299
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510b3427f2d2f7842c9e3a0774347c891
SHA1e1485bcc4397605e435d26b9fbe0247024e7bb0d
SHA25680f9f5f09b95a7a91c8791e656d0a3996d85c7aa7f8de642801de81094659450
SHA5128c627d87e9248f971921661fb7b11dbabebabfa71d5d1a291bfde7f50ccf69d22d649f0c699bda5bbcee34d4f70022ef5acb887ea5fa30ea6b7e6df0d0885a5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfd3c1f2011aacfa998321709ffd55b4
SHA1a14bbb7f6c9bbd883f83933a5010bfa1c24426e9
SHA2561a9250579a27b2279332b3f1f65cd45bdd64062035c90d01b54a1d13be7393fa
SHA512848dc2cd8127b981e3fe456de7727d3ec904ac03b9b00d93bd95b6eb96aa232ce49a3b1a62ef06a6f2a2ba420a7acabb65d3f084d2bc1237932d3c5ddf56dec2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a291723bc5efbebb2d3e1f741f20bcc8
SHA1fbc7dc28535f62b367dc97272325942be1e46afd
SHA25619eb9a26419f36464966968117658c3ab8dc40eff48c4f36f76d50d3ab207444
SHA512a4203262ffb61e39b0560904c300b0d204f1a7f966b2a6675fb6b4f65d8eb6d39d5395c275d6c92aa168b7ae235a7043bf9f312c4db1903d4cc2b3f027fea0da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e26111f511328ab43fdc1d8f20bc782f
SHA165bebee301ac4551484277335ad4a01427bbc238
SHA25624eaa61ea54ff0ec0152b0dbb7293b071c38d7b6c66f8f2d87a71d8b1c1adef1
SHA512501f2d53c1014001bdafd5a8d071b962bad39956226b3da0555d3bc13990736f9c8634d34eb639622d59f3af1691b39df1cbb394e17d8c0a0ecba9ec835e8574
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c50c4827d877bc185ed4202e1dcffc4
SHA16a103193d71b70eef5f649dff2c9a229587e295f
SHA256284c55d184c98745833fd3f6e3cff1df69dad44c5801449a2e7ef3ffb7ee569f
SHA512b7abd5c6e7381bc13e9f35b682ad5bfd597b771da7cf54814fdf0e8d9d1fd38e09b42279708922faa701d9878c762145760ce195823f8bb191040a29c843e869
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b