Analysis
-
max time kernel
137s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-10-2024 18:28
Static task
static1
Behavioral task
behavioral1
Sample
43985204771a0cebabfa201b5ac6ec27_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
43985204771a0cebabfa201b5ac6ec27_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
43985204771a0cebabfa201b5ac6ec27_JaffaCakes118.html
-
Size
8KB
-
MD5
43985204771a0cebabfa201b5ac6ec27
-
SHA1
293e2f37c7ae2fb9c474e8610948f16edd40a4d5
-
SHA256
b7ec71e841665e179dd864ab14fb30e4602d3e37b98dd5df4e1b2781c85a27e0
-
SHA512
a7107ce71723bf76cd897d4f5e498269041a0ea3e10babbe7d58e554a2c4b9d50b8781324d88b811e932136752a9ad30172230af24062a4f489f12ee065a4545
-
SSDEEP
192:jmW9BjJDoYekFlHzgUGKL0WA61fNeZzgLgZlqztd4tO0fjz:jmW9BjJDoYe41EUGKL0WAMFeZELmsQtn
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00e2c1ef661edb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1996C641-8A5A-11EF-80CF-C28ADB222BBA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000cf549e509d005fa1f04d090fdf5bec9c48b79da9df2a88bfadaf6860e098e083000000000e8000000002000020000000ff4a4458af9f0ade2c239c803b1e371e71e8f7debda9efeaeb33ddb01165078320000000fccb379a5135eac1c4a611a50c95e4b747f360bae7128ec133915e85540cc2c340000000ad0529f32b2aa487700115b9ab057245f678e0ac556b4326108091d5c76a44a6b3e119459ecef7e23b9d4ebc27b452bd97c8820f9a8abca8c0249373eb364fd4 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435092372" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2316 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2316 iexplore.exe 2316 iexplore.exe 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2332 2316 iexplore.exe 31 PID 2316 wrote to memory of 2332 2316 iexplore.exe 31 PID 2316 wrote to memory of 2332 2316 iexplore.exe 31 PID 2316 wrote to memory of 2332 2316 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\43985204771a0cebabfa201b5ac6ec27_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2316 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ff68f4e7e84cf6fcbb21a768410bb54
SHA1c12ddf91d8e6cfc7fb015370d27eac259d579066
SHA256efd0d46981964f0bc0fa42a28663da954ec20ce64c82be638abb82f8de2df676
SHA512c0da28328334b564d722c3c8adfaca9b38f5c5d89226df900dc8d8b3179f9b2234c5f4da9fc8ca44be5f0f4d062647b0b1dcfd8e9d669636a02eadb38c9e490f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544ce29ed1d28cced50196ab3813ae8a6
SHA1279b9ac60ba2fa70cd2bf76144165c273afda3e8
SHA256e404f4fe6de3f332bcc6849cadd6d4ab690a887c1c907562f449df880757dd15
SHA512f81fb0a364a32be2e0a5842cca863d40953be9bf208a8c5a9ba3d4e5cb43e0641e997ed40db51adc772cf1218480517d741b11ab24bafd7583b2ed5d7fb57418
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac48ee1c922367c65e27c4b94552a94c
SHA1f10bba9af4f766b77818eb1c24b123f0fa30c697
SHA256e5ea2a5b8f42876938ca573b5e35ebe86eecc5e496c2c26184f3593b98a8d791
SHA512ddff0e73d9e33445aea8e44137e86b270133d39a5bbb217e908fdd2e4dbd91f5dfc504445cfb7b797370153db82154bb034a07cfe9b524e4d0f190b6fb939d94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5698bd9024c5857811c68a3beb77aa1eb
SHA10d3cedf96ecc41ad57bea2a9838c35c7b90a9e8c
SHA2569b75da47dbf5883235008a27f2fd398800bc473ce21caae3c09e3abead9860cf
SHA5125439744eb1a1c12d8f27874e9e664a27a7a8a389d43379aa1bc7a480a86e91cd3fd57c5b9d2318d095084595d7cd40464983a4bbe6285a5b492afcdf92b56642
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5576343de34dee1aa4916935c35bb0b23
SHA1ee8f9c0ed131f2ec63907aa833084f9d2246d3af
SHA256e22486b4f88e6e8721f350526bd5b94ecd7d9268ff591cb0be6186de28e4c6ef
SHA512ee428911635e54e3ab56db9e8959073a142f8efdf886fb4dbbdf4548aef4452bd9a449f8f5d412e154fb326f3603fe9ca961b28b78efa1d6f9f519c524f02562
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a53a4d27f45fdca1a5d1411701d8f4c5
SHA1c5dd4931a57f8baa9abbe6c32a9d25827394e9e3
SHA2561e61e0dea485d26cf4014d17fd2e3a04ebd502959b29950eccfc2ec4687e046f
SHA512dae13413ed858334ff9848dc5094092fed8fdf7139d5ebe59a09bd487ab8195b65664aff471698e92aa609883732dd64ca2d8066e0c4243d3e545819c04bd119
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f373993c73e6a6bf4dd88cb7221e0270
SHA124e3b9ce3242adfa2149d2ddb4e7d9f1c02424c1
SHA256569550c1e6d3e1cde5eabdaa48c0a77bd6362409f75cb6e119b7165b10b8033b
SHA512f15bb1e08ec04dfdc1d9fcece93fdfefdc830cd5c478f66a49ef7ee70eec348e83a52047d27b6245bbb9da756579be44e94d0db4ab4f5800973f435586a2f2de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5540021d88f6bd71fa95044ebea1c514e
SHA10d27e6b759333610238b547a5a1b39e0031b6176
SHA256ec31a03bdbecece738bbb71ede6310e4f69d532f4364900573bdfd8992080253
SHA51254e4ca25d8483bf59c980c1636aef2f47f3e080676b04ff1d1d33b23b0d73d10c52d4f2c05f3fe0a19726ac9b6960f6dea68e252f009bd7772591e1776d95b51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51056eac110bd73ae6f3b9939635a759f
SHA1d5b6afd7cfb16fb50538162a4cb7b04b2f4cce90
SHA256ac27bfd919f76cca72aab120efe2a6c0e580667fd25949fee7c87ecddbdd71e6
SHA51237506b0a48e2aaefb1593372bddc4f603dcfa066b80ec33aa2e1c4b365b3fbb4f476ef1eb5b9caf006d4c54b9b29b13712cbf1123526f95707760e85e938e7bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f59ceda156a8bf5da85f43fc12aecbc
SHA10ff86e4b5f4cd3df92c57bb9efcd725b003167a8
SHA2565cd3f719b86313657b2cd8fb89bbf58490d97ae582ae1435060944c07b732409
SHA512d513a8056d17290ef562a7af25c8ae621d0b9a7c50baabd9cb374b25d1f719528ba3e3490ac2dabca3f16d1075af2bdf5cdf2a376449444854aeabc00868c400
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cce13fdf0de9dbd224b63c192ef264b
SHA12f7e231af256a72e699e57de54e55619eac301b6
SHA256335a386fb31c2a7eb5bc5a978186af6a27145bd91469b93919eb2562c9c2f147
SHA512a661aa85de6f057805c5ddfd7267c6b649e700b9e0e2ed6e6dc5e7f81ac8975d45ecd2ddf0d5cd1587e1979587c75b000f735bfb06f087882f3fb8ee1bf8113d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d44b2b136b9c451156e70d2cba2375b
SHA173b7478d9f508fa3de2ea44359e426b35ede85bc
SHA256cc2f8ef2ab532650fe33f0a1e9b06a05bc3a4025afda4ce2be25f13f4b11086d
SHA5123b5478e6f3b670b8a785acdbb02feb46ec5d7057b324b1b90df2fb1aca1b5f36069d1de87d3f930d8feb80e0fd0a40db1f972f3e8600b652a60607fafb05701c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5515b7d6c3c96e42d8bcbb012d7a1b7f3
SHA15b3321354be15f2df0a952f861c23b8e4e56ded3
SHA256e5918a084fc5ffa90e2ee6223fc57a7028c46400dca90ec942d86a87bb21cfb2
SHA512df33a6be5229b45d04457d23f595d0f4b2559ed26b449fbf691947b4242edfc49797cec03ed72f490631263d00e3f064ddf02518ad2af9dad4050b1bfbe0918b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf19ff3fba0635a78bf398288247c313
SHA1fb48e69bd5f1b92dc7e3f74d3c0dd2d8965016da
SHA256881517834dba6d942bf922839d705921c987423b4f411c85a09aaafa0b12ff64
SHA512f17068143b166638a4bdc7a941d25b412e5fa836037e42bae35b4dde66a885e36c0c57443e382564a53a8ec28a66bde483102ff755606c63144d4b0e7b361299
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1f013381f8acd88cab71dbd5a340bca
SHA1267759af426ec190bc184daa264b61dd7c55f9eb
SHA2567a1d4c01a57f1b098383dbe6b31b7626654ab502f2e2921872a485efe9e6ff96
SHA51214ad2836891ec98b9a0ca37a8d82c942461390b8703dccf950aa6c1baba1b860bd9993354bc0aca673c1575d767949d13ae3b24ac523287876eb54d71ba014f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d4bb0c1d9a15b4ad87a7a87b97a285e
SHA1bd195a80437c6ce28176cb020584663978b9f35c
SHA256a8f8bafcd22797f431e583f1fae1487df02d466944425250940fa8fd778599e8
SHA512d668adbb7d0a37d5f060b4c833f21a59c73c4d032af9027c74fe8377754cf2854a1a5f3be0ff2fad249796218524c6a64d364f24749f1393f16ba939701b67e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb081cfddf4467f5e4da4f1182f24314
SHA10fc7dc5c6a354687c43eed7d9bc2743cc33562d1
SHA256a1ecf7d27eefa98acbe73e356d1aa80a92d568171cac2b8a97111712d3b5e229
SHA51217b27bc001922c9a9f31793c94d27f95b75b9f0e63fd990286f5f02cd16b0f59e0582f73bb16dde61d289c763027a6deb7b6487500c25936d093b0e391cb6408
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575d6fa54163e7bcfc6d4564767690283
SHA12a834ee8fdf57edb300d153c9952058554de98d1
SHA2566a1c47ab5c480c2a1924fac0aba0b4353151d35f0ec8ecdd8cb137169bc91efd
SHA512c0ed3586c96b0fca1d7956dc5991c934a64d7a61622f877482a1c25c840698421f98964f62e766743182e5d474f5b8ea368ba0407563139d7396c5d4325632d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea6df7b63dd7869c1818ad622f8e711c
SHA1dc1c78d7263f4dfaca99d58352710e9a8639a18a
SHA256fbad4289a3d9acc3fee9b70a1dfe7b97ee60ee0fdd15470712a1b5a1ea8eaa35
SHA51239963e32a285bb0c8d42abc9874f4ef9f16f2cd24fb4f1d19ee7296affa2079a99962c83f29554f39113625c0d1e8ba75c146efa21e54520f75d2074e930f1c5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b