Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 21:23
Static task
static1
Behavioral task
behavioral1
Sample
4224e8b235a4aa1d580e2746932d1646_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4224e8b235a4aa1d580e2746932d1646_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
4224e8b235a4aa1d580e2746932d1646_JaffaCakes118.html
-
Size
14KB
-
MD5
4224e8b235a4aa1d580e2746932d1646
-
SHA1
5cb91d7fcd373ed4d54ed917f63019884d64d74e
-
SHA256
21d07887ae3b45585344942a7ca24102bfb5d02a06ef6a20d1f8b0dd6b4a6df1
-
SHA512
3d15eb6f0a8b2d3c56565845f360832aa459321691fea3206886d29d5a3522617ac2fa7101d9fa1565936a68c4465c0db79378f9ab34f36cab0da1659ca0118b
-
SSDEEP
384:5gJ6tTwR9UdAfou865bVY/bX1LKXERP6p99sRkk8Tv7:CJ6tTwR96Yx1VY/bX1LKXERyv9sRkk8X
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d08a3e42b61ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435016492" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6D9A2681-89A9-11EF-B2D5-C6DA928D33CD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000091d1186ffa9d57715044ddd8dafbb8cb12e08ebaeba270a4176b4c638ea5267d000000000e8000000002000020000000887654f2fea99e2577e9d1071167030afb4b950a514f627bbb6fb1adc6ac9fa920000000fe61fa03c0aa6fb53c25d11c50c9aacbfa3f96bd1fe7ba8f8ee1b2ead753d0f14000000058200b415b61dbe126e29261cdc10edb548a753a614b6aa92223f14804d781246b20f77ed38b7519b0c92fac3f60610fbf544f4e05dacaf705dc4336aa80afef iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2652 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2652 iexplore.exe 2652 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2700 2652 iexplore.exe 30 PID 2652 wrote to memory of 2700 2652 iexplore.exe 30 PID 2652 wrote to memory of 2700 2652 iexplore.exe 30 PID 2652 wrote to memory of 2700 2652 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4224e8b235a4aa1d580e2746932d1646_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2652 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564171d018e133822c5356254366dd967
SHA1253574fd7ddf231d45bf7b401fb26f555c8ee658
SHA2566687a68bb9b6a834840fc043d52fbcdbcc38ccdbdba2123006ce1018393324a0
SHA51249289153205d08097faf18af0acf2f272b206e821ac3004f4c776fd615d0d9f35e3328ee2b0bd97a59780456e93783a72db82bffbe34c6df9350af140e2ad950
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527b5c3783384f4d399cc97ec1104a82e
SHA14446c8826a0284bd9e1a71175bdf92338da8aa9b
SHA256d13e44b3430c88b845c13c8a7f0a4378504447c48f428e3d4cb19a0e2d3f8161
SHA51251fc40d3b96cb00b150648d368e1d7d3bde6be5c7039a8201d69efdc899a479d6959fd5c424deaed8eefa5db5bd20b7826ed3598a719cff5ba555c6ed4d504a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d35d7c6012317af098dc086c71b5ce40
SHA1f9931079e6c4fc0e867e71eca189dfc005d0f63a
SHA256d540b390aabda46dedacff3768c313bf77a3ccaa5f7c9acee7e0a43ea8e0288f
SHA51297c7d154e22fbcecbf58a327706cae6895e47d526bfc88543fa41134246bb24125822b86e54e6707c2b1215fe6f331376074ad1f6ce01791e3e1529fb45bf4de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fd0a232ace4941d91d4eb87de05993f
SHA1549ff6e2e7603c8b44a0c86fe8ddd7929c9e6008
SHA256c2282da22f0f1422428071937cf2b3e439757caee00c3da148e6b847393c5fde
SHA512e35e1e74010f1d61da79c0ef818082f949fbd8222bf86828335a82050fccc91e2fb5a597c2c38638176eb44dcfbfc680553943a194d15a62f3ed6fe9ad0da5ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7079904c51dc28747e1b72bd5f790ea
SHA1bd39e98c0be987e07ea6f30ce8c9d71f653196fb
SHA25600479ea882607256bcab00e454ff44ccaac4a6d718477ee0c2f47c5647237247
SHA512f592f7a9040bf87e68119bc87bea0420525f5d5b31ea92e023d5d5ed877294012a05f1d100900992c713cae8ae5d367abd08398641ba0856d0f5c0c6f5ff92fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef929b4f2a285855f3b1955d16deb869
SHA133bfa22594b7841a5a39d77ec5135eb88f503dac
SHA256bde59225842424e07f5454e2258c1c9380df90160e6a94e0303222a764647c3e
SHA512ebce9522756f4ad51bf086b92d42271eef863cf1f090787ef929b91af6cc1d4755c2e6c50699da86829128008237d39eac9856be0d9d7c5c38c0ae83c5addb56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fed3950324521775229a9fbc03931895
SHA1e7c513a039efd2b089909e65e48bb8146ab4352b
SHA25640b8d48bae6c9b41d568597d717a4e7507af8f380699c8600190b2078f4ea660
SHA5128e775270e4b79bb8183c1b78b017056dc5c01375754f9e88c43b7fe0b4a999cb861c2dad7db4939105b0269431f22b21796001651d929a2a7276ecfb93ca9f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c36d2c69a97f59708173e79fc5b8427
SHA1958fa219cb328f2c15610ae0d7c50b44533d6e9c
SHA2566219e957af95c35cade1aa0676913d72ead24baae7259324d6223dd9178f1408
SHA512b45c957879b259d77e3c64ba2385f049c000894c4d183cc77226d745719adfeed6f41b521872601a1c21123faedb19b3b368fd5343a11974ff66124b76eed747
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf5d75c95f70ef313efc30bc283a362d
SHA12fe17308a1320181de58ca66e32960f2801d80de
SHA256689eecb184cd592be59e1a2927a0ddae91527ac340d8743524d69d9c4c5bdec4
SHA51233a0c5fb225518a4cca2dd1c1a0c5b999514b61bed208df938012ad787c1f80350ece881361515691f22c79e1567e9cf4fb3a16b33b2c9c4e328ecdb2cd73807
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579c17c462773c133a1f4e517148359a8
SHA181e20792e7818fce251636daff82b344f167382e
SHA25614a93c4b1b29f413ae924c785a4afe41785609c93ddb24223043d68e5c904f8f
SHA512744ef1322541ceda364e799ae4de929446ae8115afb90d5d37ada557d4b7d25d8843ad347421261ab68dd4c11321b13ea307d56a3d7f4a4d7984c167f0459d31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf329ab52d665b6f89ea9482bbae332e
SHA1ab3a877047f26c7679d14d885dcd5e52cfcc88b1
SHA25639411ee8fdbe5bf690ea498ca1f45f43c5cdc845dde13f0409b3a16bf884be2b
SHA512e56474dc37fe6a20018f70e8f7e789e59859269863e51f9a340ad829c67adfd061577df391fda9ce552a8e71b6d6b8f6094db446f6d9320a45fc46d5f7e430fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cad0f9d868bc4c215a4654437e9ecbef
SHA14ae1b06949b06052226278ea65b2f519c4951911
SHA256d8679a35e70feab77bac433abcfb16aba1b71243517f2441c9432fcf107a3ba9
SHA512d2079862d7ae2cb9459d32d6fa7da364e5c5a4944a478f2c2c7222e40efab2960961515f783d8d17abdb5e61dfcfaac4fc8b0c0e495d4c48f4973b464d69b6db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ded1a3833a93aeb49a119b79e943f9dd
SHA120396361389fdcfb5e82bc33d6727cc52fdc49f4
SHA25623836f49f8f67029d2ca0aa5ff05c21189e870d52af6d122e898bdeedff1b9d9
SHA5126028864ea458696463ed6912e588c003e8fd9a3ff30a1730872245d185ec109d597ad915238f53dc7329a76635b9abcd0d060ea198e4400035476806355a6ca0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555c672619b70139397ecb2eefe6bbbac
SHA10f1514eec5e261681c36dbb9ee21447f908a963a
SHA2567992ea0e830654701109a40f819ebea5961b052bae50320bdf926d157b304ad4
SHA51207b5ddeaaa314a274737633972b0bc0cda9caac9f6126498c54233eb10c83446633b379afbf615c96e9db8d457f5c797505af57fcd6def2578637daa284f049c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cae2cea6f148426e29b5960497c8e02
SHA1114eac34e4f7304ab0f83be4b0d796dafd6cbc8f
SHA2565c43092757212fc2f9889920295ca1feebd3160f00487735905ab8c57cbb3eed
SHA512ec150d3bb71ceeca596345959e2d6ba83f66533edb67acea2b68c771378298d54728f028c577af46741b5453df194ce92b026827c2dea237059212418491845c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b09b07d043d027ea0e725a4116d6290e
SHA15dfa3ff44e4310141c9e8cda0d3bc48a383ed238
SHA256b4242848ad293318173b959baeeb4a684b0e54f6f5049efa7d0b0f3e1d195636
SHA512ef4f7237bae55bc96cae3cad4622ac2278677ce299dd56d4b2f9934f3bfb00899409eb259331c7d3a1cf64a721cecd7b30bd6bcd48529318c97d47031504d4a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566db209e887fe091f765d58ec75877c0
SHA168f6128f189aaaf94329af1a4b4c764b6a52dc40
SHA256b52fff5915f8e2fdf9201cf0fa99eec2ccef4e9ce21029e99865fb0491c686c6
SHA512b49c94a12352e0baae15f8382c45a0559fdac99dd385c4282bbae753cbe3f96e67bdb233d6a35fa93ca590dc0c848fcc0f57211b018ac272333439cc0358d370
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0dc468f13de1c1fc1f41b237b558e98
SHA19272c1a5ba6c362f9df8c02647ce195a640ad2dd
SHA2566dc30b94346a281a1b3209fb946b81df2c9d425b921a8dd73b64c503fd50c731
SHA512d762957d7d420420ce465392d6345c611dc71e98cdc5afdcf293036baef5128367a76c0713ea171d3f01fe3d8c8cfcf77e526993206c2102b61a72d45998866e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8ef0ed1fe805082fe81574a325fccad
SHA1c41381e5151fa80cc346c0d770d8af0f18b81c13
SHA256dc6fc7f5d72948d32a3bf6097daae7cc0dac1c40d92a978ef00a459543955ffe
SHA5129ae72bf1d3d2ad94940de38ba2bbf7dd0274c90ff325a13791b241e0f1fab1c0bcb106ff78ad4245d75f77b8c2599825cdf65be751972da1f8f86642db832339
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b