Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 16:09
Static task
static1
Behavioral task
behavioral1
Sample
4306b10b1542570470f9bc72b34e7a0c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4306b10b1542570470f9bc72b34e7a0c_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
4306b10b1542570470f9bc72b34e7a0c_JaffaCakes118.html
-
Size
6KB
-
MD5
4306b10b1542570470f9bc72b34e7a0c
-
SHA1
507c856a83a11f5a2a63093e0432589d5f127525
-
SHA256
b3363630743c792b80957aecec0146ec2e027bfd3b51876958948b1f17a9eef6
-
SHA512
eb12073ae67d5d3db8d63d95ed399fbf2ee556236534b07384e780bb536e0fa47f8be0171de98c9d1dc497a3b58aabfd8d6d4fa9018d6ba3480b5b3376964bf9
-
SSDEEP
96:uzVs+ux79vLLY1k9o84d12ef7CSTUpoY/6/NcEZ7ru7f:csz79vAYS/24Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A76AC981-8A46-11EF-A207-6A2ECC9B5790} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fa66414396d6264a80436f3e923ff7b7000000000200000000001066000000010000200000006f7954cf95d7b9d13104c813af4db2f3483531de449d7fd3c9a6eb1c5c95d4be000000000e8000000002000020000000f6aac6508873449b2b299789025a2c47d4a231b29fd7ed6b800ceb9705e2f28c20000000414ed5228d934c6f830bca851ba37df59b11f27319d101479064edb70c25583840000000092f60bac52f11412d29de434e63073e28f9590a24725c19b33c844b56062f4a1f6beb2f2b0f60fef46d9a957f12d1784c06cbfbc4dcd748ce4e7300794272e7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435084021" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 601a9696531edb01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2384 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2384 iexplore.exe 2384 iexplore.exe 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2536 2384 iexplore.exe 30 PID 2384 wrote to memory of 2536 2384 iexplore.exe 30 PID 2384 wrote to memory of 2536 2384 iexplore.exe 30 PID 2384 wrote to memory of 2536 2384 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4306b10b1542570470f9bc72b34e7a0c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2384 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513b900561dca145469b0b5fde4b0970a
SHA153b8e87810922fdae8877f1947450d14d3b95ec3
SHA256c6836dde180b133f4d92b116841c894e4b571f6aca0e385b95d5cb910a37f831
SHA512806135b70c6fa15624a9bcb0d49557d9aef8fb59db533c191c07c99ff54b9ed1766f13e962743f7512874f7c672054e4d59398cd02e12b697e1856f0513952da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56eaba06f73d2ac41cb18f2eaa181139b
SHA1bcd336f03ec310c3581ad4ca1e454ce3c0fad5c9
SHA25665d6c06bf1e3c3dab174c596e2250b9c26de20e2ce297df52bb0731859b4f1c2
SHA512654b63e8b8b39a9cdfe2602b2f8a7917daaf6ffe37843cd7915133b5df6a68302c9b42ab2a027114170f480f338209f1d07939779cddc0d5b1c9b8ff0b18cb62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bb1d078a61854a5d328b7ae74f8ae2d
SHA18d3a8cccda014fea91293c82da041985d4b1bd07
SHA256cacaae08486cfb672352c66af5c3b80c2230a7351fa0993d61884db279e37314
SHA512b78b0ac1cd55a60f57c35e69dba9b2fa53f65f66c77474464458c4fb575f96bfc6ec400ff180552774fc8bb8f12a7fde2d0ff298c706638fcc08d54bb9a67e41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581908fd001bbfd7dc95584641d5c0f13
SHA121a1e1c9503ebbaa45e670a74ab6e082b15a06c8
SHA256756f8f6f5866fef759f954f92328f92f52497d3b5f81ca38ec2998a1fd43165b
SHA5120451a48a6e83caa15e79c5d7dc5f5cbdc66fe42004ed7ed2dc4e4b9cb38dd387270cc2408e665de39b841d94423c4130328ee1823f4d2420390162dffc196fbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb5c56a2df6774e0e9343646651426df
SHA109c99fb37c715c9a9f28858fccd837d3ad660d69
SHA256367458662f4f749a2f070f289e926d07e7d7fcd2d849cb510fed30e406b6e71a
SHA5126bbfb67d1585e1985bc9016463e94388f5922c3205fcadf0b23ffe3ec9d3dc3cbc29c75d95e65e527defac958d77a889582482956691c8ae719c9634b315fe96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1f3b268e0be2d1603933cefc2a38cd4
SHA1a4c24b9d4a1d2ea475ceb7a30b4d8c3252022596
SHA256f2d6daf91e5a2cd7170fb23678d112144423acda3641023828177c58b046243b
SHA51291d404c26274c57b0a9291a9308c28ba7c34e5577403c2d80b4f70655ba23a15e9b6ac8f66f602cf11eff67ba5350bf854626a60e6d5151b5ff442f1aad3b630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c91afe7dc87a1322da80336572f7987
SHA1a1951b07c7a42e58ea1b9108b4b32552f3a63128
SHA256fd4246b50b798668620fb8e943882a7fc6dfdbf43a5140eee3946230d044e625
SHA512f3d7cdbee23198226eeeed52d46a3389482b9d62a796edcf80daf3524f3131bec23cd2d404cd9a66d404daa3e9b2c9ae662bc99c643734d21a896b1db74b9134
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6c7c6e7915a3a2dfbbaebe2907f38f3
SHA1f1604cc9b048abe70d0de7141c09d5faae00c669
SHA2568c8a80384611e68fd43d8ce417449f2b1c36e2abc5d4646dc1f727cc5becc827
SHA512f04578eb454628116d03175a75f20bcecf8ac46a733757ed1616cc73b36d3b376c50f85e355bb8c4f21a9c3ac52e9b4ce57bfef9362df803427b4ff53b6d7db9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dba5264c338f66adf12007cd75a63a1
SHA1192be1153942a8be26974e696fc26a87d70b1245
SHA256c5eea72f4fc8c593af4f3e8aa7d8b4c8b5c5dc261f9bcef42c0fc1d6123ec0a1
SHA5121e9d8c801ebdd1b768451bd55449219b3de9e5455eade20562532ddccb93bb3558662a663ac6d7276e4cf6eaeabfe82a94b0314a42c3694dc161ffbdbc9ce9e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d559ef2e9dcb8bcd5fa1675acf7f358f
SHA1b1a43841e384e10c5491571d6d455a94706bbd0f
SHA2560d119fdad60a92e61bcbbea6676cbced2ee13119ef4414d69927dc10ddbe92c9
SHA5128f20dbdf1a52055ac21da5070fecb791d090c9f3c3bf37cff5740e78c3883b28d5aa078f554a659275f1eec30ca8ae1a81dec841b4d79a724691d02af09af46e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f177535412be89b587257cd864cfa4bc
SHA1d88df3d82eaafbb8df6575fb23ee315e2f11bb05
SHA256a91faef7da5c9c04f6e2b11cd0f656851dc13b5527e8d63a305c40016fd3cbb4
SHA51249af256b95257a8ccbf0a42951d13e34aefe4f96ae761d0c7ef85b973b234efba5556e74cc028585c7e9f86722015b67f3446bb41686d5b7cb6eba6892be1477
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e587af7b8a84a1f22ea80186af8cbf74
SHA1d6361bef1128fd2003ec9fe53d95972e60d1ccb0
SHA2567fccb8b9fef96cf1a0aa31d8de02cf16ca256cdf71ba8b0490586188a37f0c9a
SHA512787862462036a7e272054f05f07c0c723bf2c9e63ae94cf1b3d7a6413ce0e180ec8dbb6be97438bd74475690d41cf2fc606dc21ceef01400cc3fbe8885ce1744
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52afd98194bc7825f57b7413ddcbad892
SHA16669339ba801a92a8b2866183643be0dbf30368f
SHA2569d579b9013b2259858f60359adca27c5e4ab7f067d8a8e85923192ef4b0b5e25
SHA51256085dc54f6f3a4106bc480aca6f95a34fb0f52d999fc5442dc577e94beb32856ba76cdce13655df30b6c1428edd280c7c978e73dce66203f2194512b65ed72f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59de38b01c6c409251792137b2abce93f
SHA17d23ff8ff2e860face17d9d0a09d2df570713be3
SHA256ebe0bdd87a25207f1bbdc39e586b42676fb024db11fc570893a6de1d7788a408
SHA512ae392ea9d62044fcce2a1994dead870d04cba868cf321dad5f8bff88d0dcd01e2fa6b9281d4b9038fd3d37cc3e05b03431cfc4eb8c83c3c4f5d21c2529d6dd0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50758eeaf28c91dba191a9236e16434e6
SHA1a7d69cdf56ae3672e6bddde98838b19646d548ca
SHA25691654e71d62e83fadce64997e5410b73bc6fb4cdb87ee7caf71392e374a3654c
SHA512be01ecb6d796d7264531587f8ddb3dca929c48b9506ef8ec365563d21bcc471f99cf50954f38d3ab46457ceb01ec4d2182b030d084885dd189fb6af1796bd25e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5beeba8bb051570c8d6fdad38a7cd97c7
SHA12c9baf1ca3cc19fb5131bcd1559932addd228757
SHA256632f78fe55ded0195ea3119c303f82f56962a954f390db65697a97205c73fa37
SHA512cd443990d6874d2f81d9ce747bb3502e037892001455c36f61254d00d37a6c79e9b72ed277f993c97162d4a642ccfb31f824aa1cd15376a9940eb437ba8cd044
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a3b68111f462b66940a12cbcda417ca
SHA1fef799c6932847e03e08ae6b164af002f5093101
SHA256b0626642c133a69d06bb744c1d91e60ab4c0cdad70608bfacc7c462b7773104a
SHA512aa4f45fd023334aaec71cb212828294dbcc8d33a0f3367a10424c3b58085ff292674606080cfe246707317ca9c7ce572c9e86d203dd7f3957adae08a6f19ce05
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b