Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 23:31
Static task
static1
Behavioral task
behavioral1
Sample
44b7b49e70fffec899fa24e94ce8e3ee_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
44b7b49e70fffec899fa24e94ce8e3ee_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
44b7b49e70fffec899fa24e94ce8e3ee_JaffaCakes118.html
-
Size
11KB
-
MD5
44b7b49e70fffec899fa24e94ce8e3ee
-
SHA1
25143e20c69c4f39a61feff4ff79ec6747764222
-
SHA256
6a9d391a665765d055b55ec2b85e6190614a995626ab51d422f5bf4e912b2877
-
SHA512
283a9d63c5585e383759f5ef72bbbe3f336aab5e7497910544aefb3f822d8acf3e541cb44753ec45788415daa71f805452dafa7e66f43b5aac3738eb54ca759d
-
SSDEEP
96:uzVs+ux72ELLY1k9o84d12ef7CSTUHGT/kZ6pzeekwgKLR/ZGYhLd7Z3hlVHcEZe:csz72EAYS/imSnKLRRGYhLdXPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435110548" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6ABAEC71-8A84-11EF-A817-DAEE53C76889} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000039e53fa615b1f14dbc1cd903a7d15fd20000000002000000000010660000000100002000000063afa1f51483fbc495e89906401f00e16d165a95af145aafbe89341d181a4f03000000000e800000000200002000000063bf9930d0e478b80b96deaa7be45a8d609a47ad6889f87ffaef5987877a509a200000006777b97d8ee4f1d92b0a8ab1661a2811cb3fd723b4f183dea268c565df31c251400000004a4cc3cb1f9d044dc0a812c4665be120971de0c5bf29f522e7e87b9b6ff57ea3b17c676e563045a72553042ec038d4bc103334d198a55f930e4c1a4600e7addf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3010c13f911edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2972 iexplore.exe 2972 iexplore.exe 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2340 2972 iexplore.exe 29 PID 2972 wrote to memory of 2340 2972 iexplore.exe 29 PID 2972 wrote to memory of 2340 2972 iexplore.exe 29 PID 2972 wrote to memory of 2340 2972 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\44b7b49e70fffec899fa24e94ce8e3ee_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2972 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d404e686907daeb2bdbd97b8c34cdb1
SHA158e7705f65bfb51f3d96975c286e73b39e471b4e
SHA256b5099cc36eb2798a92ae1167a5a1a8c853287117efa77a3bf4486c81aafc04af
SHA5129b4ae899fe270e23fccb9dced8e0b003c35b78b0c2036ebbb5fa46d6db6fc6a811044e16c6397d183d57ecb1b7843a79de862c1eaaf3f053fda1a3b34dde37fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a66d40834123e55d371993d08f69e40
SHA1266256a6d41f61700b6aec193d9cfe5ef4301920
SHA256cfd68c7bcd2dff6c68f8d188d95a361a89458722b67ca9faa849ac3c9deca239
SHA51207a610b5fb1b5082536f48603f1535418128060ab839d00742a652a775fbe3487ddf25bbdc16db3231bf4abdb67f59f3023ceca5231acd9a1845c8292946d832
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516b79cf5d9a825dc844a133f9d6af2c1
SHA12f59631e3a96c67a62af712514b4ba8d2f7ade55
SHA2561028c994fdeaa16b8d4889f35397d70b596ce2cbdeed3e2d70b965f676724cb2
SHA512d8dd33c1994ab1f5ec857e145198e864e1a5fae5aef07dd215a386a6d49bb75aacbf36b9f7c4050b50aeb29782833e92348d4a0a375d6a81d727411e0cd74293
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4108de14eb8a795f21a58b3bdc585f1
SHA13badf77d29352579ad8c09388be36d4792ef7703
SHA25643e55c5e7ed5c179f210d3fb6baec02b6e615726d358d99ea48de3ff81de2ff6
SHA5128aba59cfe2bee5ef9c578970e1ca2f575f4be76d745e088cd11be8d903679e5476eb1f29c51574d928e2a11a5f2ab8f613d4a3b32f5f3fa7696f6b07f9a5c71e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5befc3b62645042c24f0555bbf8638f98
SHA1bd840b64ab5ceb28715d856207be95796d60c4b8
SHA2566ac030005cee1ea5918e7ff81c1fbd662db3f267b106a0336c59ceaf70d53eef
SHA5125b362a6923b561e0df7bace3e348fe5089afae092b10a80f8b2ed8822c97ff14f464138db374e1340ae50a7c6d5a86c2efe7f1dcbd0032c54436422a620c3827
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caaafb8023cd9639c58ca3469f4a39cb
SHA16138b93fed252a546d6671172892afd3ee87ec0a
SHA2563c3775d03d70493971702c0e8d2405afb582498d47e96032edb03b147267afb8
SHA51286dbae2bd5c664cf9111c008615458cdd2635f239d7b1f6cfdece473b0ea9ad906e8a58b6ea8490a440f460c52b8449e4d279831580f96928a12a10438b700b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5088b6ad9dcdf4c7e2d77b26ed041b658
SHA15a023261331ae559ca8802a3a85bd173dceb20a4
SHA2562a6b1859432fab0fa3497fffb6be8bd7fc0ba5f0f7f86f4b186df2e147e6a4a8
SHA512e1d7833cfffa7727fca33281cd811aa45cb19f9e77896b627c5672bb9ef8b51ef6105b1804583df9f8ffd22947c0645780cc9347220736ff97e88d3a44e08422
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dfc43c9b7dacd1875fca90009107ffb
SHA1b0b19df9dc9a9f6e542b88a4ac448ed62e5cb9e9
SHA2566f7147b8b13a0c130ccfc02ded36dbb13e2de976549b2f0d06dbc5ab640c0f6c
SHA512f2b9d10d0e4895666a78ee19cf5571cae87fbdc3281b8711ced42654de938089ca932f810ca25d3bd80c669bc4b41cba5058b72a098eb975e6a95633cc0b3dbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5873ae0c6ec17c5523dca28d11c4ff2b2
SHA1b14d319ef29d32d41b7989c7a855d7d42c22badc
SHA2568bf87bc4abd10d2740229292d9c867d67f8ed433fa6408ad1c800c54f3487ad5
SHA512f0495b0ce0e3705d3068a03bea3f27a43712a67ea103eb78b4a9b225c7258489ef3bd1d85831d62b58d5e70235fa4d54104d967f986c48052db006d2645d2476
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0f277c3da4dbdc6232cd12a6cbc0760
SHA11d8e38be8ae3c7d20e20c4103ad9385ac54ac08d
SHA256ee1ff4b6d9e9007fbf93d465fcab0b3c9145f3540f50a6e30af20eb12e95c603
SHA512d3bbb6a50f61e544bde80802b27f35ce30a5ec84c43c62a3d2a4d01a0c533afedfd3259820b22b8f0c8110d038ccf19219865cab2b82e3056a94b50223262154
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517a34cf15a2e0b1f25fa29486e5347ae
SHA182aa3c9d7249f04cd708fc392fccfeaf2ac8ceb6
SHA2569667cd46bcd0e0afe995f4f2d051f3a30c20e519c6daf8c717cc16b3793b4020
SHA5121cb4f0dbb73e68c965e3010c93dc346d81144f4ac74f0aaedd54b582d799c2c73131571605a237f1358ba549cdc5863ea02c9e2740d9e383e88167ab419fc58a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0a9aaff5127a769376afec153c1fe05
SHA1e009f5bb27794d8c850e15ebb9569293a750152b
SHA256eb8345570fd0d3027db1d6493683725fc41b522909ed5ca08e264e8f28b4aab9
SHA5124485953e3bd7adcb413dc1ccb07e527dc33bc8bba46c05b0b17ad848d9fd44a9243a375d5e7adc243ac0aeabb9d426f21d6baa5e13f73a23af067f7ea50fd313
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a7dfccc66db58e0db19d0ae47ccf123
SHA18bc7119abff3f7109d5f610942afb595eb1388e4
SHA256d5e2c0f7ddff237738754c7ebe179eaa417e2bc8fc05a2466b62172dd4809285
SHA512cb0295017cdf56208c89f4208f8ae12593e4f6c1789e4a7273e29a55328bc175715615468f0bc73aa4012a9eee1d291fae648d09e1f011899684037f407804a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5856e755b65f3cf3a678112e55e4a55a1
SHA19ab315e3b8fb763f20477452d2acd9bd13d5a917
SHA2564c759ec8774694ce22dec8db8a0a22685c7735f20933f193bb06cf8e8ec17d65
SHA512bf76603e63d9cbe29e7c834c9ac7852428709ed2c1c69eba21a5c15edeb381377020eb2d9741c4d27b98a9ebca3f58dbf07c2d92d28645ff45fdacb6c4508728
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebd8564f5df18565cbb8386a24d54482
SHA12c0c0a6d6cdb44bb9073f84d0c6405e63d740dcc
SHA25670e53edac72f6237fdb532e198535d822ecf22ced51d4b7a5283afdb2cf893a2
SHA512a92fe30bd5411ea015324a9ef18de005309c13aa5aecbfd084e30cf8ab5a6e792d81ac62b558ffc857d3f12bcc51bd584ef731dc387585633f5e328b376432e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59153a5590c11f8f683e8afc4bda5bb40
SHA1d2ee923b51897d3ed248eb243db797eaee3ccf23
SHA256c0f489bac97e88fb5a73055d0e6e7632b9dfe2131637108df0a9c79d55cb37f5
SHA512cb9e3be22872ebe10f5bc266bb3fa80639a3b3451419303c029fa96f17b3fcbb80c45e11f06855570a7706ac50eca2cf23224d60d7961b7f87266d15ca84dce1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e81c583f2442141c03f9ae6c6c482f0a
SHA1588524df15b03df1ee5f089d6a1bedd6b17ac5ce
SHA256650239e3bb4e2ee28de03d06c7783d6e91f893584f2125e381e358fca92e8a15
SHA5123197bf4500361910d1293720115e48a3b8efbfc904a54c3fad861ad2e7b2adbad92d419e900da1b7016d402a23a897ac9bc16c2ccdd44756b3bd603e898d0506
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb43aef825737ed72b641a33dd6c6101
SHA126fa166bae175f64f3aa205f2fbd7c23ee2562c6
SHA2565a2c46f5e7c55603ea361e6e3995e241554805860de1b188f0a0469f161f660c
SHA51294a736e2c7b3c38603cc6d4307a167944a36ae2452eeeec3fbf3687e5b81be54167a1da2d411588a36167f7e0929579e589f1738b88ac8bb7003c32d69fbed76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54940c0296370d002d9d145988034d198
SHA1ed2c1b3db541d817ab0a37e212e18a3816fb5d77
SHA256ad4b7a4527680f98efadb5117a0eeeff31c0f5f391d9ff860f06d39f922d7500
SHA512643f8c18905c3e419319079cbe9c8c767dcc4664427384f638a828594dbfd7cbb07970679cf937d479486e8458a4e0f4677ccb39e81517ebda194a9584c33342
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b