Analysis
-
max time kernel
136s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 15:29
Static task
static1
Behavioral task
behavioral1
Sample
42dd1b6cd7c33f4c811c926367626726_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
42dd1b6cd7c33f4c811c926367626726_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
42dd1b6cd7c33f4c811c926367626726_JaffaCakes118.html
-
Size
35KB
-
MD5
42dd1b6cd7c33f4c811c926367626726
-
SHA1
6706fae533856dcf0d3831bc75973f6bd4ff71e8
-
SHA256
e4e0eccadc996e3a9519270112bba3e2975085d1b541287b5304361377916a8e
-
SHA512
05be0ad56af6f6ea899543b1de7e7abc9db94bb51a6a6d14e48ba98b132ce6b2ebea3df09e229df9774db235de6c1c5ecd450ebae70bb7515ab5c1784bcfadab
-
SSDEEP
768:zwx/MDTHoy88hARCZPXpE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6T5Sd6zBy6OxJy6J:Q/PbJxNVOu6St/+8SK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000004698692c9c13a5e480524826dbb7083b285e67dd771c2c8e5c77fe0000ff0cc7000000000e8000000002000020000000161fa0de8fe645edd7f756210f4acfa14e7cbc1878d770cb2ce29e183b9cb244200000005239356fc1212e600049350010864ad7b7a74ba26c6adebd68908832382a87f04000000076db4636271e820ccf9f1870ec0b6feadc4d4cf4954df77a91122c70b506f1edc0d2109619e3d8428e26a8d6b0a2f311f1b4325a1b84c327a21c95f88b45fb2d iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{90775631-8A41-11EF-AB7C-F2BBDB1F0DCB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0b99d6c4e1edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435081838" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2444 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2444 iexplore.exe 2444 iexplore.exe 1124 IEXPLORE.EXE 1124 IEXPLORE.EXE 1124 IEXPLORE.EXE 1124 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2444 wrote to memory of 1124 2444 iexplore.exe 30 PID 2444 wrote to memory of 1124 2444 iexplore.exe 30 PID 2444 wrote to memory of 1124 2444 iexplore.exe 30 PID 2444 wrote to memory of 1124 2444 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\42dd1b6cd7c33f4c811c926367626726_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2444 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5900d2a6bca3afc7eb7392ef27f27a5d3
SHA1dcf30773af430a4fc569d79c6b08da6fa850cd92
SHA256448ee45af818c8daea5bb20595daa213b09ae1fc65b6d3f016b6a1deed43dab1
SHA5121e80f670a2bf94a27b3108b84be47184fbc4cd1e2a29f4ae4ff5397b192b3baaecfd81545486c0e7fe9cfe34425fba622987094934d41e1e6e03ab3055d5d8c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539219f5800e2c84ee1299174589a4e12
SHA1d1f6c4ea23b7e5e704e36defb604356b1082a272
SHA256977b72face72488c2c1973deee203e1cb1b52d0eb8ee1e7b19e7155f441b9c60
SHA5129c8cf498b936cc93aeb75758718ccef21ba95abb029f9c619d3b16fc253a5b1011ea8a33595bd15c495b45d765b4439fdf800e04ad78cb70f04d6a3f1bc48f5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b699b22fa7f9fcd65a1771dd3fb375cd
SHA1cc500e72be4312f35c2f881dcff36f94650ac2f4
SHA2563097f51e0665153576f07ade521912128d347b7d3a66bd1a678cebad53bdee91
SHA512bf90f705443ccb3383e2505d4d8a8d94145edc73be6b53c1c221a51b438d29e636f67eb26d515f4273b9f30ecc9e3ce114bd1c29a4b9bedc2bd98555f6308837
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589407bcc1bd8f5b230a8c6f72c431312
SHA1d5452aaac903b8d74670592be75d7085a413695e
SHA2564f6895a95920b25cc4b1eef367cb2dd7e72f8ca62ba364de94008e948be22fed
SHA51280a3809e107edb7999cad42d4f9264565ef82cb90b058a9ef0ca8ec924122c3a3d912d3ded9423637da9ddd0620c2442f736075e08d20964845423700d328fd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550c437ca2f60e4311b53afeac32d780b
SHA1639e8598c77b6422b01d8305a88c7fabdafe3e57
SHA256837e2f29b3ad8f5c318359e88cf58a2bf424cc34f24e999c98fe800e5b7ff428
SHA5122fdecceabf2ed4a6fbf41ce4afcc12c9640e1eb2e3fc614882793a0645a9acaa64bb55154bfaec42d3adecc06ddffb49acfa778a5dea1e9132beca0c5f84e89f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e88f22e4ad02c8154ef47c701496c94f
SHA1f275b3674a966f7234e31e81274d12d3fc2da3a8
SHA256a06d639fae9b19ea5bca020fbc6fd6cf2dd0059c6abf936ffb4bb7e400336993
SHA5128ddd16a20f8510a9cf86dad9017f35b5486d74de7505a8a237ac70e4222ba3d08a21debda9c583a3bf82878c3e923719e93f7ea51359c10d453aebe979bfe905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ea205e88c0684e572c38788d839155c
SHA1ae9e61e603abb9da5e83be9abe33e584ca92f212
SHA25641d123f4eacddecba96fa044b4e25a7765c0416e9343624a9dd3cd31c2a8c988
SHA512333b3bf8b06c433734564783ac8d8d46e33ebead43dc0148764ddb42dae70c75830de58dd2bd0ed600fda91484fd5a410304b4458dbbf07c6e162099beab76a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af23ee202c0eb43c6d8ba58021d33df8
SHA1b5dd6232ba5b1ac0ed1d2cc5ac54c64e9a1bda85
SHA25672451089c51ad1019585e1d2592cb215fa396397fcd56109e1c9123636372287
SHA512210bf6c9bf852fa91f29bc75a5d8432f313479b39ed99673ffe447f178dfa41978ee3d83a6a4d9e14da7cbe3b2caec3505d5504ef6a503f4cd619d7cdc02b73f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD56c92d80ac1aef8d308aedc7d90d1600a
SHA1fbce8a843701f59287d162dff9949265dfbd9c20
SHA256477ca021b02fbaf2f16d6faec8f0a17a3d1652687c258661268fefd1049f8817
SHA512451b084d62baf7b64084561c3a28a1c5ddb2a40f3c3c7a494da1e8dff67040ccd91c9aa075b234bedb2b7b643bafb009ab8d8eb9e64ddeacd401592ce0e68529
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b