Analysis
-
max time kernel
135s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 20:33
Static task
static1
Behavioral task
behavioral1
Sample
41f1c5a822e817948f8163b65401860c_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
41f1c5a822e817948f8163b65401860c_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
41f1c5a822e817948f8163b65401860c_JaffaCakes118.html
-
Size
12KB
-
MD5
41f1c5a822e817948f8163b65401860c
-
SHA1
87b7496f0c309c91b931d0bced9014d12215772b
-
SHA256
45a432a154c841712380515b9f1c962b27a1bbfce3212dc3b2c9e1217a719152
-
SHA512
4fb426e8bf7ebc3c3924f1c91474d4c0a463b0f93efa8154cd03a7cfeee011af7ee7b4bd4c1024e2fb5d230ba562325909d9ff8afa80646e202f13f69def945a
-
SSDEEP
384:Sa0RPylwDwch3TJXsBvssBHGMtk0+0yMs162dr8YOwb:SHP683TJXsBvssBmMa0+0yMe622A
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{79DE45E1-89A2-11EF-B232-FE373C151053} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b1319000000000200000000001066000000010000200000007b73c05aaa47785102a5dc4405cc28e87b0b761c1b80c15470b9267c20642e88000000000e8000000002000020000000a991618e72d0dc6114ae73eefff9810aafdb438ed9eb943c3b90da85af2f4b59200000004d10a28acac6443d940a8d1981815f1648cb9554d65232869e31e7c98e37be9c40000000d57a6f1439ce1b62b39a69b0740c45ac2af01f6385d0009de50746fe767e313bf1e363dc0666ad7b5a7ed066b93863e4977ba0f0f8f57fc0429ebbb48beaeecc iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435013507" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6049e152af1ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1656 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1656 iexplore.exe 1656 iexplore.exe 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2924 1656 iexplore.exe 29 PID 1656 wrote to memory of 2924 1656 iexplore.exe 29 PID 1656 wrote to memory of 2924 1656 iexplore.exe 29 PID 1656 wrote to memory of 2924 1656 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\41f1c5a822e817948f8163b65401860c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1656 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5749366c95891c092cf4bbba786d2b6bb
SHA1d5e4a64fe2ecbba4827be562414f5c1dd0f12063
SHA256ddf756501137319b5ed7d1e917b9647947f8319d4115ca448ad06668dff5af7f
SHA5120c538abef4654318ec58819eb98476540eaeb191352759493364b3444ba32112b7da78d0ed1d06fedb47a80aa2a32997300669fa1b159313f8175b27ee260d89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb18b5d2bcd8cc7ffcbb3444a41ff0cc
SHA1006b8f8f5ee4f8112d675fba0f959b3756366e66
SHA2564664d4069122cf080de544beb83456e8a40c7e03deab56b24cfc6e3642266a5b
SHA5125258ed9924462ba47991aa8b8077611e07d3a871b9f6ff2e2e9d1499944b0d366a5c7da2c82352e8c21ce09e60a5b2a02fa9e96410505917e1ab1eeccee736fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fc0d4aa5c2198874861a23a902e1953
SHA144fe62e12797ee710a8b8f5b189188547093e62c
SHA256a92d27c274213a76ace76d7538819d9b7858002bba1f7103539338292ae0fe36
SHA512f1f779d9564f771ad72ebc17c09d99faf6ed914561ee65e3391c6681dd9b8ffabd726996c6fa3a249484058727470547fa4897f2da4c8f79e132d4513f11c646
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524fdb76f02f8666f91cd25b140025f6a
SHA13eb4407bddde69ded10cc9866910e384a430cea9
SHA25670455cc2e5bc4956cdd49fd10131743f6d3984671139c7a80b7d6a797f186b69
SHA51225babd8013d9a996ee1adadac433a375fce0e826a8f33b11bcbe0a2ce0b31604e21c10feef70764eeef593a86a30ce6f2b164a22fb9fc3d9f49ef3ec37223df3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2fdc205c93f2b47e7ec260df85189c3
SHA195e60bc539dc5c74fae1a572083495973cf84742
SHA2568e5c99008b83ae1423487325ce1c0c76f7e551568be5cbaa2ee9a941e3cf46dc
SHA512218fafe4fb807b9345edc0df630750016cccaa7d969b172476bfcd2373db9037de2f8ac0c9cbd4352bb19c2b0ab8a1837ee200f3f311769e0ed570984835fc7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553708880cab6d00120dff35d8b0380ca
SHA10ee19c377a6fdad1423c3f158e31c51ab36ae468
SHA2569db156eb08b84c0f5613f988ed36c877783593fe7ac1836062a23ac7bd028e57
SHA5126debb8f515f1087e8cb39e96c09eb64da48f4e1b0fc335cef499e53ad196c95e444d9da1e558cac3f71ac36112075a90411cd6ea927a874b02bf6f1a161e5403
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f69376b6fb6c5434458df70f773947b6
SHA1714c587f5c08215c9ff5aac25becae4587519584
SHA256ffc0eac437a474bfe79ad410e3e1415076c58cd09d3717d20a570a6d93e35ee0
SHA512e0bac69ce50c25f4b2198a820bcc410efca48874e6c517b0260a5ee827f505e2c514ad937ae87bb5f99f68dfac7aaf5a073f78b9cb2db01930b78ddcc3cd7799
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2135e416f3efcc3a28c3cebe663c84f
SHA17a30a44399642e89d14767ffbc20957f21f17dac
SHA256e3805197a7a1e956bae4c5d6bec8de4102fea0047e2deef2472771d76fd432f1
SHA512e9a6576f4334ba391aa74a282341810171ee7461e4ddb9f839643431be7d604fdf0ee0ac089acbaabd6b9ec2ce310c78ce5884793805fb1c5b4a62dc8f33a536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e94c58a42470c7869ae8e5cd9dfdcb02
SHA15a3eb87a461f5fb68bb413b8c145c03b65c37eb6
SHA25671edf91b9a8455bdf410398ef647b24a0f9bb224a40b95e3afc2eef328a000fa
SHA5120a8d8be45a8c4ef1421eac540cf2fc9f05fc9cbff7067a2c51fdc74932c7b635eda7a281bccb81302057ba37caa339f4698ce24f086ae2640989d9a1d77f7e97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7beeeb96752f13f8775b7278cc55ab6
SHA1e9098c0b6d1c04c5f4dc4c59c8ab1554d589e0d9
SHA25695abe0c51b94aed9bea19dd01c5d0e0bf4e6323e2abf7b2c0972440c3b437b48
SHA5120b08784ae0e57878fe09e7694489788e334c72e4f8274773a5243ca5d2d48c2e532ca86e5f96138765b1f2e46b73d9ea531608e091acd24c413516f634b652fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2633c28015eab8fe3acccd3ed04afe9
SHA163dd0dc5d923a0ac7df8713c2a85e5da8c5c67fc
SHA256a1af36c61668013946ff195b8d911a88381bf91e6405e85e3978d358a00ec40e
SHA512f6c56eda94c722c44360d991739817bcc567c4f66538b9f1e38d4daef59906e156c99b485fc1c4cd9a2b0bde5d259dd534497f82b80dd7de2092a4925bcfdab2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd92fdd949c491091acd534df4a75512
SHA1c226218f49ccc821f33743ca60d03b67660cb96f
SHA256786a81a40d40143dcd2e028892f05f0ebc4701d7c3aecbc7751921f325445c2a
SHA512f1da1de92a3252cbbf7484c8752f1f9ccc0a99656f320d5c6adb08ac91c65bca7676f47a2895f96581b950fd43e0eb2ff3517e7fe322b2ff03059cedfb6c8ee2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc162ea8c1962a309356e773328d987d
SHA1a81d3d94737b28028f06af06d24bd2197e1bd303
SHA256ac27f3d12805cf917e0b06c60268f914a30773dd12ba572b1528fabce1b7263f
SHA512c0d726e7987642fb21ae8c52e31d813b1db9661865067678dde7e1449cec8eaf94be47c4eca9f3d2bf1e063ba8399fc3d01572b2378146a819ad8ddb3fcf33d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522db4894aab46b6d85bfdc243dc724d9
SHA1544ae97ad6454eba3430683c776aa1fd9cf6695a
SHA256fe5746041d521b5b0553de4cf70ac010d67e7bf1228bc5336e7d494e84dc4db3
SHA512168d31407b848662393f8a44e415040ee09a5f34fee783d8d3c21d078f1a2d5cbaa68325dd65c62bf3dca9df85d1f826c9fa18f1db5a7f92ac8d4c9fa40720be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57109c5ff155a143facacce844033ab43
SHA105e138f6870eb2b65596ed44cebd0771fc300c35
SHA2568bda48186bbb14c768466128e0112dda6aa2889d954d6de19dfb5538fcec1fcf
SHA5125db76336333976e071735f8539d42f6b80ea8c12e9097227919e892529ca50e3fa314680855e34702be120c050dfccdf3bc5de46be1d8ff48e15a0010025446d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fc1c42015703cbd9097123febb6ada9
SHA1e01c80bfb09e9ae31a63fc226e0f32a640661581
SHA256f90894339dfc6838b44df8bb94dea65c12f29b9690bafe69e618f682030f81d4
SHA5124d2c356267418ceb3aff5991a30e235749dfa5a7c23ae908b62bff11d7084484c4e2fd97f4ae28ed310fb25252ca5f7714dc4ce241d9939f9f5809153849a6b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59383ba858bf02d6915546613ec1fa70c
SHA18e84c46e6448caad0682e4f73adde9f7aedbae5d
SHA25668dafc0d2b4586ad32b6ad94b3793841c81aadaa760fc2035a090fea4507855e
SHA5121aae137ae984fa59003abf42542bf1c00c191ee56543a0cc15718e7118b3092275f2a5bbbfe357fcefb35af68e6cf2227b4af955c7d930ce747aadb019b4c956
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b3adc48665a87653aa6c4b86da68e07
SHA1fc28994ff26f027766b841ac1a24054b383812d9
SHA256c4a3fe40a746ac01917fd736d17b10869d68786af0dbefbfc341584ca848f709
SHA512a42f27723401ee00077278c959de1afb28a8045769987208584dd24f0999863a9355f234995e7d0ff8c669867ca777a74bcf81246026c8e4816e7a7e2b218bb7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b