Analysis
-
max time kernel
122s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 14:56
Static task
static1
Behavioral task
behavioral1
Sample
42c4169c6cbb0de254798712f3f05237_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
42c4169c6cbb0de254798712f3f05237_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
42c4169c6cbb0de254798712f3f05237_JaffaCakes118.html
-
Size
7KB
-
MD5
42c4169c6cbb0de254798712f3f05237
-
SHA1
2204c13bec25ef166695fe9beef92b3584359db6
-
SHA256
7b3f3867ee1bf03cc9cd834854243e3a767eb366fcffe25d5ffc94f2d9d44743
-
SHA512
3c3fbf15a5eea7400589b5fb5b24b962418c6b7aa4f49d5fe668c05026d26fe8053e4baf0798ca0b9992fffc21d039d6ee41172c0168b4fbc304b554c440eb88
-
SSDEEP
96:uzVs+ux7hELLY1k9o84d12ef7CSTUFzfCwdxCDdCCpdACcdScEZ7ru7f:csz7hEAYS/pOQZ/jZaSb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00a45855491edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435079659" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7E3C42A1-8A3C-11EF-80AB-7A300BFEC721} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b1319000000000200000000001066000000010000200000005a4931526cfe4baba557d7b227021f8d2aff0486ce2aceb5905be2222176e285000000000e8000000002000020000000d0b60d0376a772b926f6b8fcf55f4cb9ed6cfe16426522e86ec51b35f533515420000000973ba28921ff402763408ce9de1f98c3d902c4c56861b565c7b821b6910f61bc40000000ae7c1527b65a077333afe2ffe918761bc8fc2bef70ea43392136abb2bf212f2b3e7f7251d416445ccbcfa2d4dfc788f1afe9b264784875c08b922b7a79aebd92 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1832 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1832 iexplore.exe 1832 iexplore.exe 2620 IEXPLORE.EXE 2620 IEXPLORE.EXE 2620 IEXPLORE.EXE 2620 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1832 wrote to memory of 2620 1832 iexplore.exe 30 PID 1832 wrote to memory of 2620 1832 iexplore.exe 30 PID 1832 wrote to memory of 2620 1832 iexplore.exe 30 PID 1832 wrote to memory of 2620 1832 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\42c4169c6cbb0de254798712f3f05237_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1832 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf26333e48e6b3420d80c757e137f589
SHA129004c148dd016a362b6ac11f5acffe0bf474742
SHA256f649a50b53940568fefbbed33f810e80436d40cadec3761ae9bc9f23438b14b4
SHA5129a5c7acb67c4b7d6100d3184219c52046a25e99cdd7d729175f6f9e87ee54096d6be0c24eeda358f5da47b84823f7dbd378384ea76c6499cc609836c185ec90c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564aa904f891202f07df7305e93c55e07
SHA1007cdf5cfa59dad1f88a7cbcafbf3c61d0043d5e
SHA256f13658d8b8b1799cae21335ef7d3e74c47600b92447596928a6e9b31abafba72
SHA512c126a41b5e0e9d36913fa5702176f0d5bf7e62501efe2ecbd7c14de7ffed6bb9de0a874d81d3bd6bf4cd72dfe4d2025741ac103dd81daac602f0ddfd8ef6545f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562f91805ea9bf38d530ba5e6457e6b9d
SHA1a294fc6b11318f8c9bbe277a891953c78c14c58b
SHA25635289e3aad6bf62076cac85bb6fa1e7249ec00c03618f382556c72fe863268a1
SHA512c0f8c30427bf755f4ab5a2680c2e65afda537e080cc6d65d8d86829ca4ce5cc27dffc9864d0380b6f20d41f58a3a56c0eed6d7ae483dee7d99c4772a0b9891e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56717ba74f5399f657dd83d8ccc096653
SHA16dfe92d2880bedaf93227d83a89c32a196ed09b0
SHA256d1e1375a2234da23e5b1d5adafd126e956fa609ab9d48cfbf97f971e5e4934c6
SHA512aa6d0fb083b2e701a79cbb5684f92aad08b2aeb9da5da0b78667fa0fa2b285a05489f522a8a879d5e7fb6ff094a7027a6c99d9e6e7616b0928ba6db9a365cc4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ad209ab3031227a618c2f0041e6c957
SHA1be66e92015b976275faea05ac8ec75a0023586d1
SHA256fbebb5b799ce4609c435804501766330bde97621eba34b2c7cd8f9e40f26fa6f
SHA5126fcadadc169643d94e6194c55e2c923b611b64d001ff44ffe9b3aa6314553c9c9e055f26a52730342dc09ffe5089e6113820568fb005266275bb0d7a61d1bb17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d89c5a11881a6af30d638967e4c18e24
SHA1587965809dbf40a070d0ee9386c17a08f5488b05
SHA2567a7400c057ac637595ecb57a9bc12015e3459c9c562cc4982bb65a787183bb88
SHA51295db9b9877368197cec6c61ebd94bfacfdecb4624dab125098c33e8161d77c163c7fa7885cc049dac2d2ed2f14ec96f878d87948443491469c2e1a7dc4093d8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c268855c16dcbbf353c5f590c7d711a0
SHA17736d6c3ce5e99b9781db152ebb63138c8d29f8d
SHA2564b341fcd67018cdb3819a1de427907213da65680e49bbee094e8cdc5c15c63a2
SHA51275dc1b6dac570d66047cc14baba32ae37a3edccce269360feb3d462101c2de4fb265a2498aa7a0f1fc4884b7147957f5066e70bd8a99aa4049e5e5f632bce9dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bfd0ea3da9dfb5582e27d27433b6a90
SHA15dea8e79f2ce42cee6283f5b48f06957129e88e9
SHA256680cf26726b51a9e41aec4bb9047cdbd86bcb95341cb508eaf38304ea5709a6d
SHA512caa2ecb9517c275c05473264939143d516a8b8174ab0e8c807cd798ed76786a3d6799c3b04257522c4980cd5c037f5aa05dd210eb0de790744f497cf8635a74b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577a2aa5ce6fa24e27cd1860321d2647c
SHA19e9e79867214ea43f11a65279bca6386012277c6
SHA2561e9094d79315ccf1a4c6657db52a0b5804202cf8c68222eb44bc768e439c3ac3
SHA512888c09875387bbd32a8632930824238aaca041e48aea3e46bfa5f4c2aaa1ff99e04837232041d309e09e3f326dad31151280db63da8eba1a78c0195f1d6c925c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f40cfb39e474e3614b918b5203dc4151
SHA1bcc4887e1c7eff08d8365c495ee6c3f6972b2c54
SHA256ffd0dfa24f8730180bd38d2fc5fc505bef90a531ad6c6f0847d9baf7929ce1cc
SHA5126753ebbd42fce14d7f4946fd8916aa424213d9770e86fa758025ece17abdc90d3b97dd1b13786e2e1727bb80e135ab909482e2c473d3d8e146ea3dc520630a9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8a425b518f6868a6c11e747e3c2b994
SHA12b23bacbf205323d68d6ef9915d08196f49d5ba0
SHA256975e4d75c5354f1e62ab18fc58e0fc6eb725f11e6b8dc790cb9c5a720b7f4bc6
SHA512b31ab730654a3d1074a6456375d13436fc82510a5b9e8883b52b14f821b360c50760b1560e3ef642fdf36bdeb0b01b8ab57492c71b222b787d28ef5246996080
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e44cd546921e956b97a55e4c5f36486
SHA14a89561aa05bde1626a9af4434956069cc6e7153
SHA2562ffd46f28b384401fd5ecd82bbb35ce5992cf22a7d466c1b7165de3376b1f259
SHA512c3fec163758603abb3b52ea123859bcc20b374e23d02d4d30298878fd0c8b7c181a05107478e72ad617bc68c163c9bb0757d0dd9296815a7e9a801f91f7b4baa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9d0dbaa086d8305f0e4fb52f7c0270f
SHA19d5b4582ea873e5323d3f494fec47c645c168c72
SHA2561caf7f123f894567d30419e80a288768b7dcc143d36ba8450c1123d966a7c69b
SHA512b99f6ff162f9e1a7134f3a750de554b5217d6b2197cf7e27e01bd3480c7ec38e8c9f4ce3d6c7b742ec2199045c7f2d15a4bf4a2e6cf7240cb0f0980c85b54d66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ebb93bca9928ecbe695055ec6b2e1b7
SHA13d89481ae6be90fd93efcf40b1a7a306ac405f1d
SHA2566189de735ec7c6787acf54378b4a080c477de43a7a27bb6abdd0587597f3ea93
SHA512891d1b43918da19cd60576c04237f8fabe53a9b124e83376ed39f615a9befad3ef5c55f020d90a7ee478477dcfaad2f059edd473f1029b20bab796bf95eb6d2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c0c9f175c34be91eca7902fd85c34a2
SHA11a66c24e0300b93c2b4f4de08da9e0e8288a3bb4
SHA256d1a57e75961a0d6cc2297e3ce266aef53068127c1f643e6fd2b52f32ca606a85
SHA512955385e3ba81c309a03bd7fcd09846d5423267785b894c3abac1693e191fa987834e88b6f9da4aa6b5347e312a66816e8bb45d2663f4a1b289c74fb8086d9b90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5700be3267501b78bbe0b615a788cb4c6
SHA1ee78376b518d060bf1579452e838ea4f3d6321dd
SHA25615753199422d91392ff46021961d6b0a8da165bff108b0fa35959228992d6f98
SHA5123c84e2e896cb8c26ccb1f272fdfd30207effb3de11c3d1a1b313d4871c74d4257edc88e446441420c112416e5b8de36ea677c9603e9a42298f087ff0def337c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52daf1880f5ab12e4e8c4c37f3e06d3ab
SHA1ccf2995d4d9c40229f121367c8d8f38b6257026a
SHA256795b6364b9ec54ce9be9190a22dff23f351026b3d43635af289c3f01cb5155b6
SHA51288bbf8dccc9799eb1b17ff0a60ba56b1a6e26d703aff02260ddfc8319d2ad6bbaddc95e69ed633342719dbb132aa7df67e25cba7708227db56b5f8eed8fb179e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0b20ed3c3a9e277e72f71b8da44c13d
SHA13e02bc6ea4fd24a0349c3bef5ce63cf5c4418666
SHA2569359935cd7e9d130af92d73bed92c49ed23d3258a2877e484da9ab8e07814e0d
SHA5129fd6136f30b3631f2ca976037aa6c97c984ff38c7e53cbeb2e3219b99f4efcb8cc4dbf74492b053ca836b0f77b7c253f65718d24b0a15f3697e30979395fe299
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533489debe2c620e2a47042ba40270b1c
SHA16ca79530e2bde3a4584e3529f8fc79e6fe796be0
SHA256acb6f98de18698015ed607856d7806382cac76e76429159978f1eba44b6b92ab
SHA512cfcbc160aaa3754ba90e3dac31fc2e16dbd979ef323dfbdad3b5a69227e51dbe21beb4cb8643b77bd47f324e1258c99ba406679ddd4d5cf4b5df146c5bc63f10
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b