Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 17:25
Static task
static1
Behavioral task
behavioral1
Sample
4356556754b4c9fa2784c4a9ce23fbb1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4356556754b4c9fa2784c4a9ce23fbb1_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
4356556754b4c9fa2784c4a9ce23fbb1_JaffaCakes118.html
-
Size
10KB
-
MD5
4356556754b4c9fa2784c4a9ce23fbb1
-
SHA1
726eddbf8b3e182df87dcafe445c14a2c42bb2d1
-
SHA256
7d64bb2139230e07f7a77be88973ceca606f588a339a8f621b006bdaed42e555
-
SHA512
1467b0258fd9c05400c8ffbfcf67143d30d44306e3ac7757de77b848c0f15fe39098dd2d3a697b8611fed5b3910647eb852a27624178b5288cdb0c54498b0346
-
SSDEEP
96:uzVs+ux7vWLLY1k9o84d12ef7CSTUwGT/krypR5Yj1GMLUdhP0HmJBlVHcEZ7rur:csz7vWAYS/1MROjCtNBPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000c1f78bdcdf566ff6c14f95d1e6c3b9c8ebb9bde23f72ae787f93bf8b080114f0000000000e80000000020000200000008393cc85aa5edb720cc5fd38c34611e6dc518c95cc56a3f1dad0d72f88a28f4520000000a79dc8d16dcd6bad946f3a8762dd6bc0d1fe8c96c4c92f38f656b6ec6d910333400000005bb139c83cdf2679e62a35b286ca4572244288560d0c4688e4e30ec05b5273cdde20e7ded2d90f30726fa1d9b56bd2805ba48373ee4e82caca29c61bec4b93df iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000489a4f267d638826b2a5f7ce3f5527e1b2748a5afca79767375782e812070445000000000e8000000002000020000000d7c84a7505014d940ff99257e503ae1b278c5ace19f141e2bb10f5f6f56eb5b590000000541e8e4edecb0177b0d6c1d5539ffc9ec49388390b0974a62dfcf4d692f12d1d8f2a1a097185b23dcda75065b37085b7886c9e6c424abbe9b5b93b2a5092c8df3b56df6c047b54f48abf7e99d1e0d4cc51eb4c74fd9d87ed08c275ac279dd639397e3c2eda5191dd3d7d6dc4b3ea6cd42985b4176fe102af3dd47317a9b77a24d3751a19ccb0487cffa5c5dc06a2afe8400000004040ecd040824f1fb4d6897ff0652caae95f4f9e63e924c29f8234a6097e76fa8b24b8a2dbfb1a8fab8fbd7ef114061647ace900245359676fb9de2e9caa0233 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435088601" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 506eda265e1edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{51E09ED1-8A51-11EF-991F-EE9D5ADBD8E3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2680 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2680 iexplore.exe 2680 iexplore.exe 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2680 wrote to memory of 2856 2680 iexplore.exe 30 PID 2680 wrote to memory of 2856 2680 iexplore.exe 30 PID 2680 wrote to memory of 2856 2680 iexplore.exe 30 PID 2680 wrote to memory of 2856 2680 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4356556754b4c9fa2784c4a9ce23fbb1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2680 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d43c33555c895d79e0cf6bc055b92be2
SHA155f1f611d5a322be63258a26443f2999ed7b0715
SHA256e16c80994e1079fdd1f94fe79a8d9a9baef00979f427c511d87663558d6cf805
SHA512bd743be89e5eabc8883d026e6e1f09b46022ab7f9eaf8d75fde4b4b780e4143d1eaa520520c2fdc4651b6e0029216c73f77e4339f061f1df385bba95da681e41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53466278ed8701c294cfbecf3370b51f3
SHA1f93160da7c87cbf3c8f1466d231714a837ffea65
SHA256975a97d236a4b1215f9ee7b0283e8da7507c28221634d30dcf8d6613eb34dadd
SHA512dc0405d6e52614c748c876b965a63ecfe6f118a24abf8a5df93b93c17d9b32ee7a81a3cefe4f456e8ef4a077cc41c10d7e941a86d8497cf2ed5363417cf2d777
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57191e535f006fb8767205b91475651a9
SHA1f87a311aa8a7433eff47d004ddf67de35db038c5
SHA256ddee54d82b5cad34f10e433a0cc8f2c2ca991aebaf33728d6f1eab5db7f1aa7d
SHA512c6254f1d2c5109b1cd16cbf51057c3efdf58210c8c5798adcb43ed988293366f816ac538e75cb5ef99196c980d1776b3f609a0cfce92095e4dca33ddca2c53d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5121494b17a945c5e382b04f49a276bef
SHA1b6c892201121b2fc34a37162c3371fac9e04c38f
SHA256fcee4654548bf0e42a14e42497d78da702fd0f8939fbf18e5beffc81508e38ef
SHA5127bfedde44ef80a98bf8accec811c510a208e48fcad54559ca4893f4c4341ba24ecdc22905978f8023286ba0a7a13a1cadd6447ead8c5f41f671a656431520980
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8e416b5f2b89f213c2e8550a4c38ba5
SHA1cabc038d27dc5bbeba7c9253bf280f8d8d338fd2
SHA2566a7bdc772b856ebdbc3fc1eb4ff3d0e457cbf8e334a63ec46381a3e0e3f406d7
SHA512063405cefe6e3fe8cf0eed2eac79013e20bb6c20d1586150db41ea291ba6dde10363376f341a70a378c3e342e0ba8b16f05f69c19dbac8a884b82a4f089cf204
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ff5702aad7365ec20839ee42a3c5809
SHA1d314d552078ed9a846c160aaef4ec3f2b6552bbf
SHA2562e9060859a36432666adc1ca4ade53af6953721a07fe1a70e256e1922f2e1334
SHA51294945b884cf9ee1323af1d9b0de0a7729be138e5fd4d741ff3dfd5e83936ecbfe1ed5e0b5ce56c3d5d7cd63d2288d742644fb2e9e670f11844d16a1272c729d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b122906a03f1189ee834095659640f18
SHA1736932a0041c9945e2b3524db7a72430b6a04152
SHA256bb89b47aa6bdf59df35ddbd1fd50a33c3e7b04bff7d5b8d28295b774421ca0be
SHA5126755b86b5dc524797f3dd6068cd1cd6febd51797fb2549d15f737affe672fe4471af8411cd25e837e0979c921e7dd5c34057a4291914d178b1d6c9e85c8cf570
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5188991dc175dd72327a4baf2fa560f77
SHA190c9f2b2a8e9a5b6e7c7b7b68414bfdfdf2ea259
SHA2562b11c9c4d27270e08a05693b5855b4a2a1fdff7d84c63c2157ec3a3438905c62
SHA512ad037aa8a88baea91f4ea343a80df7d2b8ffda800a2aec3058116cfdd5cbd9a5c1e20f1b94079fe26fc835bbc8b42ad69dc0510df82213731b26db2c4c0966c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599f01d43f1f11c1745e8b609e2d2f891
SHA192d1f14711ef8ae6d7e7be97ec9786e67a19a9a0
SHA2568e80870ffe8fec1d28113adee62e127dbd4a0824dcf9b85cbe692f19ed7e4ed1
SHA512b0c63eeed39dd80148799ad961af6ff2910217a49c6282ff2530b7191aa7170e997898f86cafe9fc674757bef00401a194e6977fb864429d5092a0e9b8434306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56274f1e8e7e10f8195067752a708e8f4
SHA144cd5c8b71dcf6a1dff54f839f312ebc3d4598ee
SHA2567190595e91b4db07a8150dd331c0c2aae349bd891583e7d7efdbb263e924415f
SHA5122ea2d65b0bca37c5ba6cb5e77d85ba12ffc1541c5a7e598d3967d8ccde92b67d879f8ff30150f262ce2ea3a27fac66dfb93254f81328b9a6547a0a1df3372828
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cedc0c05bc44ffb4e588bc3d9b56085
SHA1d3cf829ca408307af42c709777dd8742b97746da
SHA2566c26e04cc001a8eddff70171bc7ba5c6c1d8666523a9d4d14d29cbfdd583b7de
SHA51232fded4c818311ec1482883c7cf06ae425b72bb6b9c3b7440dc50c8b9ea78484e11d71aa6d6d879e5653cfd794b7e67268b77dc2dbcc037ee3340140a7818819
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542057893e5fbe367fd8e621c7f06713a
SHA109fc3dd99ba31d5f4e3bd66403485940cdf377bc
SHA256cae7819db2d99abe868f1dc09abe4f5aaf61bc71563700eae6982af2b2a12565
SHA512042c835e2fcb2cffe72ae5e32fdbe1c8d095082ec3c9fa87377c901bafabaed20333a1dc834ba956e72406bc1ed9b320f68860dc12d26b0ecb7a598623be92fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cebdcc4d9bb97a04579e9d0a68d6d20
SHA1b9f5bea3a32ddf4cc40566f4c1c3a2794accb39e
SHA2563c474fb41f98a9a7ecb779ac9d739f13b454ae8f1121d120c35c930732732f47
SHA5129bc6f6ca4da002430115888ac06a7133ff2444ac3ec16feb5c89525a683ad2d4d7decbaef7a03b76a579948d6b9d50be663939d6b7f089efdea7e1b0d9650865
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510cb7c67495c419ed067cc19a9826dba
SHA1cd60fcdca5d369b23df88656f97b8fc8cf2bd419
SHA2562319a60e6b2ab6276bef124b82f4c921c7c10c761e982bd34d242207facc041f
SHA512bec42b9a176b7965bdfedc23e33cf7638378e0048af4b019028229586e2373f7a4cc425b1a083fc3b2c3db7bfc5e6620dbe29d43e9c170353ba674131737c2d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae45e1c4646fe3a879d8548ea7b6d563
SHA1a23c8d9c24e98946989d7cb4660b009f0349e133
SHA256ffdb87075c26b0157c4d35b6e131e652993954e4c29e1368e2a57deafc428cd4
SHA5122a8c29b05eec744d5e28787858856e2a30cd2a92e78e08b1c3c0b2059118ee822276679001a3d1d766103e512b3706a28b7c9b6b54274c31212bb49f93662eb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540507c500f2ee716589be4439b49ab13
SHA159bec3e11faad4be23c649ba6866725a4ba259cf
SHA256b226baf951fc1f66fd183c8b2afffd1e1063e4921c6e438afa16d3c27257326d
SHA5120622e295d11cad4ae8a52a6ff277e3dac7f290bc0976f385a696f76c8b69686343871097d22480c909a78d8f74b717372e7e9f86f1bf68846ba50bf829cdd93f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5159b298603dcd9faa9aec72d63675eae
SHA15093dfef94539dc9eea5834c856bf250ff19fb34
SHA256727f8a76a6d32fdc045dc29e7867a4f8843a3d0e4f9120dcc53cd69093f03ec6
SHA51281fe0a21a6fabecb100166d95a25f9eedf46f3912b957439ce93c1ab7e51bc82477b89332e37fa3fcd75588f0ab2e2d015c02991455eb05e737a4ca298efcd13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f1d37d2ecb138358c1a0c259d425494
SHA10df1fa53033d0e4b246e129730e7e017176228cd
SHA256593390ad27bd0969de65f33ca10391619aea53a4b301971a584102af0b7ae74e
SHA512be8068171c94b3d79d27ba2cddaedeeb4592010adcd7992fe026398a3f2e5f8976527127d97364dd2783ee4bb6beaf81a9f6664e85c0d38c90100a676ebd43f7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b