Analysis
-
max time kernel
140s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
14-10-2024 19:05
Static task
static1
Behavioral task
behavioral1
Sample
43bc60e43923bd024d4846da694f747f_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
43bc60e43923bd024d4846da694f747f_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
43bc60e43923bd024d4846da694f747f_JaffaCakes118.html
-
Size
81KB
-
MD5
43bc60e43923bd024d4846da694f747f
-
SHA1
2dc19ee1cbe826986c35e965c9b6af067c8cfd40
-
SHA256
27411c59d3f49b5d3a4a0c31b563260b0d852dfea6635418a33987c0ad045e9a
-
SHA512
d222dffdeb666b412a01a1de51fbb3cfc0ab2133c49b9b7005d48be26604a1186ca2f886fc924e610779e983d667feb76e65d9e2ebce91e0b208f1c039403654
-
SSDEEP
1536:I7yu/yM4RUU7wPBYQR6kFob0GtEspq/+mtLioAxf7N7350SWMuwK0HsHFR2u7zrl:iyu/yMmUbPBYQR6kFob0GtEspq/+mtLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f01001506c1edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{55628971-8A5F-11EF-8D08-FA6F7B731809} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435094622" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b1319000000000200000000001066000000010000200000003d4fc9257264db1015af20ef1bb39a7294eee98ac544f872ce4b7f59c7a6cd86000000000e800000000200002000000071aa20ac7d75b5e882dedc89cd34f065227f9e6f851ecc730a83a72f038abe2320000000f42ed11f9119cff5c061dbd41c9261f12efb17055951a7465d22ed00d133c92c40000000db5c5b9fcbb2c811a3b29c12db7b0d09d2189004ba41451d267cdf125c5e09338f9e9b52da1ea9a99c981b8a6c1d9acfc9d03be8918f15111b6d906b5a2ace4c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2100 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2100 iexplore.exe 2100 iexplore.exe 756 IEXPLORE.EXE 756 IEXPLORE.EXE 756 IEXPLORE.EXE 756 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2100 wrote to memory of 756 2100 iexplore.exe 30 PID 2100 wrote to memory of 756 2100 iexplore.exe 30 PID 2100 wrote to memory of 756 2100 iexplore.exe 30 PID 2100 wrote to memory of 756 2100 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\43bc60e43923bd024d4846da694f747f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2100 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571b0a25406e57adabd2809b61c67e877
SHA106ed8249f6e1b55cd427d6c64ae745c80a7370f8
SHA256b377a8125ab8c9909b8fa20612e17b13a30dd22c43069c1c0ecca993835cdd7e
SHA512a3b799ef62ec502152e72fc2f2e80242d7b6aa152e6586409d102a431a0eff7ef221b85a2c0e50835e4728fda916d8434a87c42f92c09c419df0b704d4404d83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4c7fb68a234b1447fe2e243e434f431
SHA105b09e9359448f9a349e8944f423236f9397a156
SHA256bcb10f40c19f45d81a2938761d490f5ef839efd4323a7a10050343305670765d
SHA5120d3ddf5e5ace42f5ae29e5beef6374c98bf11caf28aa7f878904a3564d23591d611650f63f2093d1d6fe0c1366be9042de3ee1f3576c78e449eaf8ed871018b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7fdf7e3b150bdb65ca88a73fb1b4797
SHA103f44346caf24febb038d1f8ea002f00fc116576
SHA256d071f7a66a66b1abf85446e16071c5d543dd940d41264472a2c865242275da32
SHA51259a39274726421ad2790fb9552c63f03c0f4ceef13254cd36ce338256bf7e63a3234c15e7dddb901c3bea6a00453b44dfd82907a04806ca0bceb76c52865571c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588e9063785ca4a5fbc3d88a9f5d3cad1
SHA17e4eaefaec669c80ce45671b10a4f64d123806e2
SHA2568cc9aee521ae2035e12233f7b19debc652d7b782cc3624a824e88c3d9fc3ff7f
SHA512792ee35b21c050b5d2269c5a60c6f0681334d513e69374caef01e88e72d6a99679a73bde8558b7f07f0f6aa8a51bc2281a58c7ce0db47c4936fb3c0387fc0210
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d696e20c58014846ad45bb0ea2d7dc86
SHA1253a9c97c0bdbc00652e75f6dd48cbc19b7b3c71
SHA2567d8e0a53a55c5574a6dfcf0ac2ebd515c4c54b52731fd946f9f1f2333647f480
SHA512c7b08f54a267b781356808cf53e1a17279a927b1758269d47e4b9bcc33ef121d58e667cfc55a1d7a891cce608635271ec33a094d8817a6b1b2e1d6dd11ab609c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef2226b24ba87bc3aae8fc15958ce2cc
SHA1e8d84e36327158820876b737a51e25e65ba19890
SHA256dda448a75083cde6d8df0ba301cadd88797549273f8f4a3518ea9ac1212360de
SHA5128ca309ec67dcd2b10a08423a2a95baf83ae6a7892b24bc1b88b4f982e30127e0ef09fcd8b871df9389d276f94cccc746520ebdcf344ff5e57ecf522374f73a0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a4564a7998377a25b0a58ca0478d7b9
SHA1c8bb4b4c29b0b7505b0bbff4ac80a29fce445aaa
SHA256234db07393c9d84e306be5d0f4c48ddc933be3456835b040c15afa013d275672
SHA5128a4f4f6ea23bd3a2337fe32d2696d3f67ba4a2a2a2a1cccbf9cc13144bce4d3d2ebf00fc1e3ce86d67d16719086dff5c2609b12c73278bbd24e62cdbf6bb9010
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515382e51aed27f047db07d69a5c36965
SHA1b80a61e7572df47434b2686e7c45c1fe6d1b92c7
SHA2564de21a6065297119fac7705800153f03259ad8a195a81db9341cbe9c828ad343
SHA512024cca8ac0d62cc87889de15febc0ec6472e9660a91acd3d18821bc8a3b99ce973f3f0df901915fe70bfad340f7532b0b33d5554c0b95c81c1dbed80a28251a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f740848156794883fa1f29b20df827c
SHA13bbece44a5beeddeb08e10c8f793fe8f6f700a1d
SHA256e7cfb7433cdcd06657ae1eb22af7989c55e000b5d6ff87f56631188dd28d45dc
SHA512c99ee2f1642dee3c3689622b8f6ca0e5d7f87909f89504334deef342cc3ec31d6b2d2abdb42f387f267e849099966c104279258f2303815fc7fdf90eb489216d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d06c98607532966b6d0d6106667083ce
SHA1c97f65a1c7adb6da2f5f3d593c45ea6bad1f2515
SHA25645be5ebf4437fbebce4aa2673d8f23513553759cf7f00dcd0aae946da019ac1a
SHA512573e5a7396bda92d0e9d44013e1c471b1ef385d4d1aa37f0abdae42af5efae78c3bf87b4f870fcc21cb16552bb368f1c04cbc0c7d2f41dbeb659823e1983e0e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d2488771eaec88c2413a1a8d96dfe6b
SHA1279f4b58c6a167b124eb1649afc4a7ea9a9c4aaf
SHA2568778fb39ef911387bca1b9adbe7d3d7ccff60bc047bf6ab4d23a29a7df95c430
SHA512a01485a602655d606094ac11fb1d6cefbba6ff47ef62b3f58699fa6617c21c3980f370690c87649aff0d657403d3eb424b8af3790675f4df90789a0c232135bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ac3b3ff401cca8f830b33bd89f312cc
SHA1eee078dbda7f1af3a7e3260c4945ce26bb1130d2
SHA256346399c83f32ebeec84f9850cf5b25c371231448bc15f6a1dbd2b6bd76fb1415
SHA51260dc3101a0b2900d87e940d9ba1463985340655839826b886aeb002b739882ff8991194ae8279fee8290ad23d0a2ade70bb664fd4afcd58a1d238fba06ebe5f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585e8338cc964af3df2ad0007b2907aad
SHA174f34b6dbca45edcc7ecf2dca50f780ca6b65dbf
SHA256d53c59c8cfc2b7c1370e6c57877e6a056047faa8ff34301eae1953612b266974
SHA512fffb6ea14c8d2f8e7f7db77e38e14ec65baa22187b3eadb6d08eff4fede39825b08eb674ec5f54c0b957f5404b8c475d545827df55a0ebb851a96ba7729c0c26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b31c5936e60bcaccb963b664aa6a9c5
SHA1d1bd0b0954764a2180e824af3eb33651e8b762a0
SHA2565517cb56fdcbc4ccc8bed95168bff56f2397e64522657730715c51ba6d7694d4
SHA5122cddc2635ae2f86edebc18c0559778eb1006ca1f0709b13d9acb625783457649c96106106dd4fd1bee835ce54a6cbe7c6c685ee215e0aff62f52bf985777a8a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b76b08058c87670d710c5203565fdc3
SHA13363d9e2777387c52914b3bc4b920fc57143303e
SHA2567e546f2a7d1901f40799d181e3fcde1e37fc86f6b04c7542acffca10791cd811
SHA5126d710d90c8a8b4d3bc3693d313faac83ca04068058737a283aa9c43f7aa664510321e6276cf3cc5086de98109994b04d07446a358fd05a26da7839e1353ba60a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595dbced27ed21557016da234f1e26da4
SHA1ba31538243c46f4cd738ddeb616801f543290955
SHA25600a56fbdf595fb5d0d82002c2c032088beb417a1d5afacb94a69925e8ac6550c
SHA5128b103092549cc55f6f23b04e37e7f6f2c9ed70d92ef6a6b13b45af3f5f038ab0f03009b782115d1835335e03fbb9d7afe8e4b75f4db6997ff2f815ea9d19e6f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505f0d31bbea2312f570a96c9593a3564
SHA1feb339ef31b31deba0107d04d065573daa1b1597
SHA256fcb7c642f17b635ca422e3f0fb86ea3f207b4c3d8930c1a64f17c1d60208d5b6
SHA512e854aeea66047d581dac539bda5e7aa7fc67d623c9b94e9fd453c4aa07cffc01aa117738cc8d07d7cbd1b7849960e6a3b8399e57b3d5b3f55499b51d548fbc06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5994fa95f72912596921f67ba25d10e88
SHA10e25acd8a1e4168759a6e8456281776636461100
SHA256f35dc1a14576d777dbcfd50d5270a391862e5f10c5f915c8e8871afc99731579
SHA5122fec48fbabbfdd3268a2f889ee0bb2c1829a7c5528995510c9e622fd45f3123a98f91b8f83a786db35d5a97fd499b6608a1f4c647c6a02dc6b4cd77d9675db48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5018f2c41b720d303644cc3c6fd3499c7
SHA12eb96d26a781f4cabb58f015b5c193da32e1a8f4
SHA25678fc3ae88b719f1dbfddc31c9c4fd6358aae5ab60d05727f0cc11853d4c913d0
SHA512a9c69b9944430a2688adcd9c2cc07d4e12654d04fa98e16070c8f84d3e6d85b81399cc5ca1bb435c179337af9c7964a17c7426f1fa8112f84fbb2c38c8001a52
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b