Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 19:13
Static task
static1
Behavioral task
behavioral1
Sample
43c4ee38b50c6ca7e9fb2e9162e8daa5_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
43c4ee38b50c6ca7e9fb2e9162e8daa5_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
43c4ee38b50c6ca7e9fb2e9162e8daa5_JaffaCakes118.html
-
Size
1KB
-
MD5
43c4ee38b50c6ca7e9fb2e9162e8daa5
-
SHA1
9208df7ae8fec0a497bf340303edefb7cf3b3c46
-
SHA256
b876712b630088b42e8060a0d19173bade938e9fb4937f8502085f6c853b82d9
-
SHA512
17d43536538d991be50f420c8d8e01b84f8f941ea93382bd7d6c2bf8b83aa346716b2d34ef59ccc8efcd6a39fe88140d1052621bf7077bae6f744d17fd0b709b
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000004af87ef9c7ebfb5dcf311597293388e335544eb92fd908f9d1a57b42a593d4d8000000000e8000000002000020000000dff2d7611f731d21584ce75c8b8d530c157e07ce99116fec313f7c2d177a2838200000009a93bdcf80b23f9f93e555a975a6c0d04c5d265b1b1f49fe7b2102380cddd16f40000000032a737df8b1e2e766c077416fcf5a357db5c908554f136ca549afb4dfa5d696960ab666016c2dbd846e69298c50d2ba780c0274800c79db6ec79228ab8826f5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435095102" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70cfb1376d1edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{74D39EB1-8A60-11EF-B945-527E38F5B48B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000fdcf2d961c447561d7569b910cf6b2f46519acfc5e152efd7c4295c51c6a7e5f000000000e8000000002000020000000b8f38fd630b032a7f72daecef0ab9195f6fe5549f2df900cbf63eaa355cbc90490000000e401dbc941550cb0745f590a95e0f3b9e70caa593e835bb617c48043213cd06216e0392e3ee67484af13612cef1f1557db178ec7144187d00d02e33647b657084a935226acb6cc5c609b5fd4c06e4ef3c5aef5dd54f9a56dcd792c20258267584f481f0a7112910e413fa3e7ab0e80a0bee46b27570f250bfe04cae6cde37d01d8d6370c69460cda9121692a14568c9b400000008bf2184f5a338bb26e73336aeace83d0521a005e3b9d2dfd5ccb0f2a93ac4c3e6ef1390986b7be66bff352c59464019a967d6c18fca35caf933d18d9add662c9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2644 iexplore.exe 2644 iexplore.exe 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2816 2644 iexplore.exe 30 PID 2644 wrote to memory of 2816 2644 iexplore.exe 30 PID 2644 wrote to memory of 2816 2644 iexplore.exe 30 PID 2644 wrote to memory of 2816 2644 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\43c4ee38b50c6ca7e9fb2e9162e8daa5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2644 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5900d755e29c3373692f13c9ea6b2e81c
SHA1a087dfe817286c879762640a320ea8fbbc87a9a8
SHA25643ad305006b3626dc198b7685c98c92e1bc826b6885944d7398dc5be45e6ecfc
SHA512b0f46de424d12bb9cf322c61131f5e1c6960e5d22231d2d30bf0acedaac0bbbef006ae93a90b9b5bce384b7db13d3a4e6ba50f0105751a7a0dcae1d7cacde87c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564115c1e035d4f1c93931848efec6e8a
SHA1622af8ed04019f4c3634a6af87b20460a3eea52e
SHA25606538a7add05b1acd1828e6a672f7786bce088b0632f4ea078396af09afee664
SHA5122c2838a1183f768ecac6051f01beb0887385d5ef023a2467a98d389687232d2dc81e309a67c835b321a42e5647b007e00e06d29da187764111799634b2eed3f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561887592099363391ad881c7b500b046
SHA13b0ccda179739f64f75e494bfc33db7bdc3f749d
SHA256d288c2aa75f9109ed29286629d6dd6045f36f993614b7478af78ca56f16ce43a
SHA51200324f8a0103b7443fe0e66ff02f01666524461c7a852c295baf5c920562274a86120ef960680c964de814b05d25739b030db2c3b83e1140ed3654d98e188582
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5242b8ebb3fa625761ef464b02546fb71
SHA1c9ba5ffe98cecccac3e29da8a883ee2091738dad
SHA256ec45601c42dd5c8a4b292420ddc66a2949c36e6e68dea3d81d225f0a603fcc5f
SHA512db1456ef5eacbc4c7ebc1c843d2404ab4b475112dba6dd63578af13ba742775bb8bbebf3a4599db227c8dbdddc7eff369f068f3b8d247d756ebab45213121e77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b83701d59aff811613b42a0394fd3c94
SHA1f42cc0caa1a8c569be73af709d5fd01c0d4e005e
SHA256095d07e169b300bc5b03c9423c04c18ba3a2dfbe4c4059400a85dcca3457f636
SHA5121b6b9a39658bb5891f9848815e29cd34d50c5fee216c6ee26ad7d4190b5b43c9f44740e819a33b36d90b1faa60e18229ac57dcdd8d757e7682d705de78c035b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558fbd8d1dc10910d5cf5a936350b875f
SHA1f540f3d83155fd9b927a5cfb15f62e5d965b27a2
SHA2569335e56cf7e79e85721fef51ea1e1acacb1f3958a03da9d21313aa333b7113eb
SHA51256956a93d767472d048567db05113609dd8b66eafd5df74eb6256b6b2ffcdaa1dabc7cbd89a43ad6270e5d5746a36be0bc16907acef24e568eda31ae5483460a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5557cddc36c2b830ccd5d7e2bf057d4
SHA194d47c9d7ec260abf0e7fcbd1403bbf6ee4f5a3f
SHA2568218b7b660a79ab1fd0d02e77ab18f3955dc23a15ff5c4a26b6a1cb8f5409554
SHA5128cea2a06d634505fea592314e4c5844188f805d042498dc39d9657ff2cafef1ea67656e91d4869d757398e66bf735321df49f087e06883167ba182e521f47a76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5396207295267b67ffdbd1dc0244c9b33
SHA1a97f389f1d648a407cfa0445a321dc5a76b0ef81
SHA256811a1ca8c9ff45f71cb83fc94b45ddced9d1a7e173dcaf7c4979bf9af7ceebdf
SHA5125322d8f1037ecc572009cac1d8e09900bbcbae1d6e88fbd162fe1add96343e495903801e8cff068e12089aa7d8b3118f86e9009d2de8bc3a62346bc9229d411d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5474ab3e1ac4410e230024df7c6b4c233
SHA108397063da5ac27b965fae6e0d985630783014b1
SHA256dfff8d6a05d6577f8aa7a490fc9ebd23880250a8f74351f89267da161671c877
SHA5127d095efc7bd9d992732677504c209c016d23c8f06fe4f078b3710c1d3db3bec83298ee6de2fbfdffceb85fe9dbe4503a4ae6292276f9b34348e5fa1e6a3c0450
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579f6c94fa7c6e7f22221e4283bf00074
SHA11266865cba3b590dc040902adc64e50914e7be11
SHA2566b3863c26d21f33d7e10c55f85e946ca18eefe8c9dbe2edeaeff5f0964a94319
SHA5122266ca27873436160c0f65648d978cea78aebc410fbf870c219e4c7a31163fd3d27381537859aa9b72de7eb1e028d4601a3f9bebeaa0c5d723c0699c22b5837b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcba3f679702262e70c79f1604561f19
SHA1ed946fca2e1e5814707bab797aac97d487912062
SHA256f4d66abbf1103323b529c5775561a512ace754d49c2d174b58de2cc533a39297
SHA512549ca7fa26e6805350bb6f84beaf46c7d02a8bc91c72dd667a93ee52a8dc743eafcd9b490362b0dd344ec5bec50bc4d3b39e15fea9b2094354aa4a815c326414
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54689ae9b81c727c605480130b97f7109
SHA16c8c7f628546935129b69166a8aabdc4e266ed75
SHA2567f1cd675df22b4dea9ed4ad8dd6155fc308594184c8994e9e9cd8a0c556b8368
SHA512a891afd9ce6b2d274fcd0d5c83a4899367c37487422c9fceca1a9c66e241babfecaf3581e9679fc1a936fd21cb0c8c3aeb1dbd0918bc85f602483762f585faee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4c15817a747c53b48dd9881493f28e5
SHA1dfcc708ed70102b55e013c80aa63e8f49892c0a2
SHA2563184c7328ec9dd9f41f6dbdf3aefe44dae51cf2471e1e88365dde07391405853
SHA512dd851c56f3fc55c8f2ecdbb87066eaae7af39f86cf7ef10b6577ee46ed49dd21f306d2261541c90e240571870715c3d185746a6305a5dd57255872e8495f1220
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f016dace6c55c0752ed8e47ef03da36f
SHA14bb51ecd45dff7e5de412cda2d4cd139a7868f18
SHA2568b1dd1a35d55777fc3e3a1fff8998d4ec5fbccb1477f98a178c8e095ab3aac56
SHA51208ab42b7a1692ac10739303b3eff3b203bc9c9f7a9821e62504459b52e3d01a024fef470ce934d5882528661c7aefd28899b457c7c62dcce578bbaacc57fc30f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be43c67457f3b42f7e08d9e6057cbf5c
SHA163b46e8fa80a3e59eb50faa80bdfe1c6a1c937ed
SHA2568f03c94db7c04aea6bf3fa29cca445e7cde700c2cc66428b57aa14ace4a48957
SHA512edef5a56e95a5ecaa4118e300da04da4dbb5721d9e9e5df7587eec336f5a2c9f4ab188f4ea2cab790bf9e038cd5d1497c09777e50e145d3365041f56846a2b4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b98c913e1bb9a802f1e08a901f2394a
SHA13deccaade09a210a8ce13c225e933e9a301d1e2d
SHA256d694c91e3af8e79bb3809d970a7319420594c9f854be3b9f2c028f480c5ffeab
SHA51267a59895e230dea1d962fadc28ea6ad67f1f3f6e72e9d4ffb7cff5ea34226867bcc9ded3119bdff6b1d96712350aa26e096fd891b39137496bc026a22ccb4214
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5707252e3d157f6874298c69355fe0a69
SHA1ed35aefc9ecf6dcbe2902614d1d4bc637fc31326
SHA2560373fc66c67188260e3fadf26f76309f3f092b114fa1b4ec7cc70dfb603b8f34
SHA51231f819a44ac28be41440617124e73f78094b532c025b60e173054d7e13e5e21777b1ecc3da764e4d4eeb68c7b3aa07ec4bc6173e25aa44adbd56846a1f6a1fc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56180d37036a60f6a43f6502e92254cae
SHA1b7b79b5862e54b8369c3e791e44d515780eac7fb
SHA25615ad78526a368b9ebb48228eaafa913a5c24991b18987a4851b30763b174f000
SHA512956abd73d12935bcea7bc30bfbf3e99580225760cf8f975737ac847b9c22b1bc15520ac7f3118ca6a4ee208d4bf4f7c3ece3d28e553ede20efc6bfd6c6292c38
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b