Analysis
-
max time kernel
121s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
14-10-2024 17:59
Static task
static1
Behavioral task
behavioral1
Sample
43790abc307ba76cc0ad258196767c2e_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
43790abc307ba76cc0ad258196767c2e_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
43790abc307ba76cc0ad258196767c2e_JaffaCakes118.html
-
Size
43KB
-
MD5
43790abc307ba76cc0ad258196767c2e
-
SHA1
80ea7604d066f1cd3590487c498b08d6a6712e45
-
SHA256
1d95a0a5b3065dd590a2eba216ccd2f9284e2eaf718e858c39634fdb037fa033
-
SHA512
9e38a01e12f7000abc8b5eee5d518792cbb525fe610fecd5bae19ac1172cff117d5712dde704680131452145a4cb8b05eba74d37f6b59060c37e70df6ccfe812
-
SSDEEP
384:Z8lvqxp+gI4+V0O422Uk0zlcuMIQrP8kd+IefFxeg13nGmUWNUgBJ3L+lSJ4Q22C:ZqvqLLT07N1AlSJ4nC5U
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0C06E631-8A56-11EF-BD8C-6252F262FB8A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50c33bf3621edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b131900000000020000000000106600000001000020000000f9acb6f0986c5f76f26850f26ba02d1f3a77f2c1a84edce717a6e0b926bf5f62000000000e8000000002000020000000d238f337877f97dac4e088e1a3c3463ef8b51431536d2712e2d32fd90b509e0f2000000055c47703c30b4a36332099650ec14b1e23c029802eca916947f1f00461e863d04000000092eb3bd114e5155c1ea7d8a77b2f0310fb9482e9161fa43ce1d4869a1655dff547133c966abc3cff84b9b0dbe548d2be7a97e1a29ebb5af3adb65c1eea9e55c8 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435090636" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3032 iexplore.exe 3032 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2832 3032 iexplore.exe 30 PID 3032 wrote to memory of 2832 3032 iexplore.exe 30 PID 3032 wrote to memory of 2832 3032 iexplore.exe 30 PID 3032 wrote to memory of 2832 3032 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\43790abc307ba76cc0ad258196767c2e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ad2102e0e9d59fe94716ff2e479da64
SHA1869402d3559680ac8bd2fc644f18188be88e3755
SHA256fa29c73d0f1d7f40f8a1a27a6f09b3819635c5951cb3d9ed6b0449abe494ca9e
SHA512868405ec80bcfd2b4e522c5dc4d549c4419e898cbcef5888ec6b4e9d74b0444f3f593744f5790a2ff0785146288e7481b15ce6e925628fa1a1e8b4c4d4bb1282
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528b72979256f013378630ee53eff4c69
SHA15bfe089375ae2a15448d9ba08c46d7a8f2313381
SHA256ecda413ca3ac7ff668d93270257d10ea83dd4296b382652abc44a3dbf0bb9154
SHA512a5a94ae6e09a6ce91852331602ed0dcc42622b89a586c425852a25efdcc1ff232c7c3376f43b16742e4ee02655a998721890cea20218b8005a006e2e4f2b232a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530162a7ab7409ff19c83cffb15e447d6
SHA100130350937c4a42dcec8a1a5b5ba54bf8d895b1
SHA256c815f0353f036e593e9d70dd834e8f79225dde4043d7c7ec70be03789729e9e3
SHA51258f2d5e92d34ca012949ca60c061e81f069f2ed4c7f4b1db56ed25250aa6dc19a270b6df5256e02f53ddf3819ffcd9ced4f6d91808664bf8f0ae16dcf7af10d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fda16c24b918040dab00ea193904bf7
SHA1e96558a49b4940facda3121786c40a01e79f689c
SHA2564ca3dc47da15585a2a4bb5ec8ecde2ec4089879bbbc6c0d99111821b66405654
SHA512c1d4887f136295c1b4bc4a6ee0cb7a552a85f31b9ebb5cab1003aeb93e8a782a360b4a6cd524edae15d4987ccc862047b3035acdefc90d86808b99130b2fe7ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ade67b08d4510c34c307dbdf2391a40
SHA1fe838d264406a62a88e165c8cc958e8aa593651a
SHA2568beed6b2c7d864db99a71fe9bd7e3872f778d23dfde68f54424ef924066a5a84
SHA51286ced1874a4a08babcd1db274fcac3a835f831bbf996c927cd375d887bf09e0df96d36abde304d9b7ac58b30e413f7f62a8137caa86aff7271a718a0ecdc2f90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595377807503b05ce22b7fd08d0ef6280
SHA1b1b3f6284f608dcf03592542c9cfad688ca477c4
SHA2560274f4662627cf67f83f5547e1f36335bf1877a9c3f1d53b75530680b751023e
SHA512e87e4755eecba86a92b7bd3414da9e517df3f0d571e3d2f1a031f36c6485dda1dd9f64173d534ab1a2b369b67e2befd4ee63d68c027181638b9f4946c17398c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580a0493a46dc73f78bbbea481e344d70
SHA1405030b43a1ca86afe180e535f7be7e3c074176f
SHA2568fc9965d95b3d3308a8baf7177a961cee104db03c5cc580ceec957117c79c24f
SHA51225fbf4c013b959508c2174f762cc36710563c9a9db5b988ee9aba8036c24ba25d1d625e70ec2d6704e046d2d679c3d131ce687a892c64dfa11aa575e55b84836
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593e5e2f52339d4e7b44db051ce1794b6
SHA1a6a8237e372ef95350d44cd5746d78f45ba4d0ae
SHA2563001c64ffa2c8bcbec51b3e6ecd598af01dc2d8301acd1847d4f538f49b6827c
SHA512d0bfe036402fa1846c58ae0f1a6ad625b69dc452744a10574403031adb0771032cc7ff8d17ae77e08ce2bd2f3d45cf49333f600c92c0232a1696238dbb897d59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a555ed9a620e2ef466e6d6da4779f40
SHA13a54638168a888e531577eaf77de982c3df35095
SHA25649dddef1749f2f39dac0beaf44eef692d4d8bfc59ff98ba03c6a077abbe136b0
SHA51231d6ba2c0e5b6a2b6df972d9a070cfbe98d52888f58b2bd3eae1eb244749b1ff5ba67cdea4de1a6ee88c9a66a6dcd9f53e8d90e418aed2c925540797a7fb6180
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5141b749a6593164d67baa358973b322c
SHA13892fe3beab8ecf08c660e5937bab98fa2d9d75d
SHA25670a54955758e7b45c3f71cf8d56a1d07fc466156ea69bc40f0382fced376e96c
SHA51211642e81af94f675bb83e3f67304e6c8d5e4ca508d90a1906305482078df59711d128893e429bf0609fba969ea7a68fbdf979204ab0b23bd6fef81b25339a907
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce772bbac01b623ba8a15cd05544255a
SHA1ab4e0638283e0028e2d464726128938fbdefc65c
SHA25647dc5101bfe0a1c520dac279d6fe74e4411e6b060c6c6eb05fdfcbdca4b27dd9
SHA51295a5e80eeb00e179cbc605840dcf9d646116dcc1bcc925cb2b843e3886aa0f018677943956eed4fe2b1c0ab903cc4248ee368d179b2c0fbafc80eb38719d87f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571a5f2a4cf54848464b5a2a603850a57
SHA11402f6c3f25db8d0f1e96e38ed129ea41e4754fd
SHA2569fd32090c6a660700dac61afb2ad3e727a53945f3bb1e6a98b79ceef665278e1
SHA5120302b8655eeef4f45448c6ed9ceee343363d5c18f525f2a31e85e23e2e7edaeba39657575f66e0a1e727e550df5020d9ddccffb978c7288d830111577625adc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ea8da89bc046c17e116d455da30d7b8
SHA18bedace3b80bd3b7db93eee896a8d3bf05b8eefd
SHA2560833e9d210a95e6dcc484a455e1bbc684910e8341866197093a8293f9d14ed3c
SHA512fd39e8e452589aa4efbc5f50824e59388bd372dd0a2c698955728d0e47f794e10d7053fd29572d29b48e6ee3d069d4dc90f58cb6b60aa3849471d5840e227329
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c97e94116a47d275e29fa7795528df9a
SHA15f0599e1ebcfed8b41e378f714ff3fe441f7856d
SHA2560a8e3bd380e375abd07356519e64306611db2238aba82086b282b101a45ee3a7
SHA5120e958cdc8a64d831ad86b4b0967859342b6959b2a92b39b737ee068f46798f1e0648d961fe283836332787654dd8f6050f99ce6ba84b1d640dcd492cfa1b43e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567b343d61838e6250bbc145210d3bd13
SHA1533d7802de6dd1d43aa288f8affaa311b9e4798a
SHA2560fbc538f6d00117568119805a2c1ff04cf530fa041db40bfd241a9c9da00626c
SHA512931eb1390a0da8561cfe6e4f2cf79275525d5d72edbdcd4e533752bc682ec0fb3c0bdd22ca11893cd8039dea16ccbc91733e5e4d9ee77c3fd7ac2698e1c5171f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b152b0c4b99aaaf403c95d8ce6a8a26d
SHA1afb89473ac8b8f1ec998619550307cf75656eddd
SHA256657e6f4d49d86d0c73f729eded4176d1a2583d210f3c70a7007679131747c6df
SHA5123d4e930f2fd94106685f2b3eb668f593cce0011cbc805b80be7e6cae97ebd32dcccf09e949d8a1e2da1fb11cca63c41b620b068becea1b9ec790149c9c980454
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1e406af92f147a7fdd9928245a4a084
SHA12d0055342f2fd483d2449be48b04016388a03d46
SHA2565e5557bc5a2e0905faa3e70f5610fe7bea7db86e296f54e59b23efc38d39bae8
SHA512935d6ff8fa3ce4986b62c0e679a0f08248b7aea73120cd650af8171fd1ea72f2a9b7fd2f62b8217d5b58b60f2aafe48b761e2beb1da7e62beefef64087ef491d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baa131bb9146427be099c587f7aae75c
SHA1de7e08908286aead259cd188adaf2317426c45db
SHA25605a1bc9449ef224e9b6699e3a4c3ca4dfe11e9a4698c4ab8db2bdf3551c4d8d8
SHA5129cd1ff791b5bae421496e3e8ba5301de136b00f68059fc9ebb9dfd0795dc90b94caaac2a9895c0b7f32854cc542749a6f51f89895d8b393a502a8222d1350a72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5659b7eab722a3e77ba1216462899c781
SHA14117dd701ed13c07c3db32cec16a2a7789d8fc95
SHA256af4731531c97564ab79fb1dc4c63e4ecc805bb4ba545f2bc982a721415887f5d
SHA512a14d327de2bbdf3ec36275f542e8128a54d93bad5991ec36dd7aa48c2a585c1e80e2a5e06ec5caf459a8ee98abb386596fc41495e216386249e8c661a5903a37
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b