Analysis
-
max time kernel
139s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-10-2024 23:53
Static task
static1
Behavioral task
behavioral1
Sample
44cb96a263be4c4f1f66e505b1d76f10_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
44cb96a263be4c4f1f66e505b1d76f10_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
44cb96a263be4c4f1f66e505b1d76f10_JaffaCakes118.html
-
Size
151KB
-
MD5
44cb96a263be4c4f1f66e505b1d76f10
-
SHA1
81756259b342d9c4e647f9a45b2ad31576f9b950
-
SHA256
fc70452313a84e88536298c2a054322e37e4b0c37b7ef57bc406be38898f04cd
-
SHA512
f693790efd5e244d3cc562d86efeb85c3659b674458ad684ffe5cd1e4b61c9fc5d6def756ab43b88486e0d5170d2b38b7ace1ffdf7828b29f29eac4a99a2c51d
-
SSDEEP
3072:S4EyOXDjmPyfkMY+BES09JXAnyrZalI+YQ:S4kjdsMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7F4C17B1-8A87-11EF-9733-46BBF83CD43C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000009c1f739c28c35da0ea2b2053a706303fbbe41882bb8e8fed883a66ef7e74f52a000000000e8000000002000020000000e8f7632875ccfc5ea7e15d2852cad71caa7b34c3223faefe80f854e2f743251e200000005adf2e101d5036a3e293c0f745eae9fde16c406e6e331d0153d0195b634ed99640000000b36322a5928d25124963fdfc0ab4a35cb60f1c3eaea68f9cf432b24841c74dfc4daeb8e8b99234bd6f7862de5aeb007bb4f147ff5c3e1e4a7452b54159a9662a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435111871" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70c9d894941edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2368 iexplore.exe 2368 iexplore.exe 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2920 2368 iexplore.exe 30 PID 2368 wrote to memory of 2920 2368 iexplore.exe 30 PID 2368 wrote to memory of 2920 2368 iexplore.exe 30 PID 2368 wrote to memory of 2920 2368 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\44cb96a263be4c4f1f66e505b1d76f10_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567fc51ce5dea89f4b268fe5c8d1681bf
SHA12205204bc603561f2ed178d19424dacafade3e5c
SHA256f22421bdac2a580b12ed58961cba772ad9f4e1ef4482e7d736d99f93b7db5b4d
SHA5127cbcb5e60814621dc86addf1b4216bdbb4e17bdd4e20e9a996ff3be4c05e510b5d6129b29c354770a29c6c987f2007d4b4c53c9c5dd5c871aa090524511a1ab1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caa4d599bb328f0508083ddc50cc4dc3
SHA14b7e345b3338844580c150f99659fdc399ccc89a
SHA2565ea37de63f6ad250bc3806f987c0e394410c481d088815d63a3c6dc7676795cc
SHA512ccead9dcd661ede12937c448873ae4308a67b56e1e4d859137f8de74e8c19fa9cf8a7319434ee24f33bb002e0c8c0821ab9a11b23dfede41c8fbfc9eeeea374d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f8224152e480a03d3533a7578bd22e2
SHA1131bb222375efd54900b9013baf28f0251650f83
SHA25660f5b16c11618cf9620f47b6bbf6cc4a42c7139a0e2f849c50573212397314c8
SHA51264785d4d3209d881b282193fed8e5e6ee91897ef1cc449a791eaaca2cfdd7d365243393c1277d26943f54e5bdf771440a4ca6807b0aa357c85e8a2f1e3a401c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c874c99be13255b8feff5f846824aab0
SHA1cfc7af0684ef1f326f80bb3a72fdadf07bfd2be4
SHA256cef0ca1cca83645139e52e6dfd4e580c55bf559a31244d49ea9c9b9244cf8057
SHA51219c4f8a988469a00c33a4469d8c0818c65c500176b86d205f9676ac8555c8e326cdd02a006d21df187e837fa1f691d322f16df577519e284d928352a0feca21b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a96440cf57756c30e1ba2d65923ca65a
SHA1d8b8830812aada840d6595ade919f315cce7a874
SHA25665a79f12d1a9d4b514d498ab60dd3448d866285db959d05698b93b485e89e89e
SHA512dda376219dc844964f1b3330133386d7f91d2c0dfed78e91784326fd17179c84e41ea5d9f6e82dc741c1e2bb7e31a6979fe4a98187027cf77bb104d04bfe1dbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549310002191dca85cea65ef30d856660
SHA1607dd39109850b86e9b419f08ac157359eadb63d
SHA256dc74750bef8a9f6da8ef269147a908c767219cfdcd9d7869bf0f8a1fe6c57483
SHA512420964b1dc9fa4a995533658062a196aa506afa1ed7ef043c2e76bff1554344674ee309d19c2adc5a4733f5acab382813255944556baa346f0c740c2d6e4e2af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9bb73da6239f158a03483fe0019ea57
SHA1556dd85825eb5fb987cb15f7571bdc558a71bac6
SHA256352a253d9827bfe1b0979a386dab7948996f88690dfe92d12e80eb3a55ab6f23
SHA5124155eb5fb748ef87f00c8f4029db4d9e7a76335662067ae659e7eaab8d86ea8a4b9d4e413cadd8ef16e2d59a05fb4c6e0e723622af33849b56c443b60e37ee23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f27d01b9996611cdb63430ca1f98b76
SHA19d3149fb2b958982b6bdacae89f48029e5f4c1a2
SHA256deec7e4727f42c2eb5d07a93db932120eb5a70b99e1ff3cfde4d516a7d36fa5f
SHA512487c77c398e6ce0831d33f3814dc1c7361bc6395e62131ce2ea363d69b24ca6127f06989f73975ef79fa7ffe597035559822a35d0830ad06ed67fef311363bee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca629288d1c88fd9d0477151d9690371
SHA116894020b02a336d80e7b4554408091a8350fd12
SHA2564b5bf0f25af30e64492331fb1e07c4cc42572b0ffb6986a7f1569fe7d6f3e1d5
SHA512778eeb25ea84ea9855df2cb573bb3a431d4d90cf9dd1d556d26c1dfe1754aea547dd061db30d7392d147faf4b24be8cfac184cd1e4c4d40d00886776e3696909
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5348fc23849076f691292f4e8f768c538
SHA195b266f5b1674adb58168a15c2e6a5ab33478aa4
SHA256442a2110bc9f69925d2e2bc50d8de72002c7f2b60be2884ecd477928af1ae41b
SHA512addd31bf8801a272834fee22d9778375d80180d8f5f1740ac12b4336fa04fd2cfbca697223ed33fe8a62decd327dc8ad38946d5c18da305c17acc86aaff74d06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59af27e0101b8c63195ce5f4fc8ecb595
SHA1f3ed513277c3966cc6381b20e55464dec9179ecf
SHA2564391a88992eeae0ebef3f460fc8e673c3c31e4a481f6bef6bf6a47cf985d3117
SHA5127618cc402347970525a450a28d86690d9c046ed8a428fa70d7c1b61663971bad6609c804afb669f14fdb64ab3c0510bb6f03ea9f840ff68eb5c755962d66354d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbfd49f133d4eb5c7782fd69231f4f9d
SHA1de9a6cdfed4ec813f72a01c021f35539809ebce8
SHA2562531088b7286814d398e905d933775793e6eac427b46e7bb3892b3fff34d681b
SHA51279ede898f57fc42e0fee439da7bc9975e452239889ceb8186560c07bb1738aa5f4c63011e3e68f140a9a8ee5ddc84230b19471858c555015216b135fb788ebed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7c4812722d5b25be85385754e6f65a9
SHA1f0b7acde6c30e529990fb98515a1880c1319db93
SHA25678a1a452786cd39308212c6a922bcd5096e49c9dd4985b42c1e6dfc525e9d64f
SHA512660c1f02e7a2659516cd54a646d44cd80a73faaaf59262cfa136de24b2a55b12b0cdfecd913b62e273008199a370b16d0460dc705392fad57a7c94ea74566ba1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c70623e97bcb1f02a1437f4f6c0b4464
SHA197a33a0d7416a106caa4bba4fb78b118940d90b5
SHA256cd011c363d589d8249a1e963a462ce30f33211f0fde22ac322f1a157a2512c4d
SHA5123274ab2f72bc9cdfddb9423c6fd18ba7bc05770044af756618367500ebcf58aff768922292312e2cb1bb48f3461be11e52f9341a136dcdcc71b4848c652a2228
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5042dbfc68b02d776dc070bef7fbb5a83
SHA1f810f77f862d7e43481787c57535acd7fc21a695
SHA256824e422ffa556675f967578ffbd56ace4a1481310fbf429be7fe59034de6e00d
SHA51253b18b64445c9d0e5b616bc5f92436cb960cfcda7fcfc0c566f6e700c44e8c8580231b39ac651098fc231ebf9b53fe74ce096a422267e799c6e97bf145050c33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56705813f6a608b7d0cb2700774de778d
SHA1e77c85095655bd8bf72e2181079ac15eec034537
SHA256953fe68efc4fd657fd52acead563ca0ef86492b829cda6c1704e895896316675
SHA5121a5743b2b23519aea5ddc2024bff83263b92275e4a751d491a259d12775b72bdc8e777dc3eaf372f2f1e4a6232a9d7c490917d6b45d30caa2dd6c377bada6bac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4621024bb9ee934a29d5db9cd0ba087
SHA1fbbe75ac356832fc82e16dd53c3bcad71b2d2e9e
SHA256df8ce110cb6d57a1bc6bb3fcf30651e000f2ff6fa713ec13f64ec2b322901bc1
SHA512177523a1ad58e91495992e6d9013711e2510a70fece9f5d9febba088d0b450981b302c02a4a00821f8dfcea85d99c75d4e0ea8526170fd61363430a885c40c43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0455cfb1a211896b28956dd9c41ed58
SHA17ab8cb0eaaf2e9f749c1e580bbf2ca0529d5444b
SHA2562b69eeb562dcafafc3e255494d922c131c0786e87c63a1c9b6dcc3ccddd2c189
SHA512460ef0c3a3ed61bdf3480a2e4fdc1c8529d56aef566cc1a15c8aa3937b86e492730385931d8d132ca58828cfc5397747e13e7edacb422aa3e49abfec2c3ab28c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b