Analysis
-
max time kernel
145s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 20:18
Static task
static1
Behavioral task
behavioral1
Sample
4401f42b34cfa7ad6f2a929350f878af_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
4401f42b34cfa7ad6f2a929350f878af_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
4401f42b34cfa7ad6f2a929350f878af_JaffaCakes118.html
-
Size
139KB
-
MD5
4401f42b34cfa7ad6f2a929350f878af
-
SHA1
d25d622cc1b7332873693b09ef5e8d7bb14d3a18
-
SHA256
67532194784d04bac631682b8200251ecf7972966c2500c4c55b1602d1bfedbf
-
SHA512
722bc061689620dc2e047bcbffeaf958a4aa109b59a63b57ad498ba19aa2ea3cb2fc185f9d91a6715c2676545da59b8b49cebc8b78774d76a449b8f0458fac52
-
SSDEEP
1536:SBDf4vBBYlHuyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusG:SBspBWuyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6F36B471-8A69-11EF-AEBA-4E1013F8E3B1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435098961" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60762a88761edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b131900000000020000000000106600000001000020000000949713146e6a3e9b242b248cbe83a0749cad23dddfaf75dce162fc91e55db42d000000000e800000000200002000000062f290bc8ae078971db4c220f3bf11fb72f3ef1c987faf2f549b4a664c3b23b420000000b4b84b4695a2ad2ee63144873b1caf05468d3b7ecb1f47ebd3bf43fbda351c7c4000000007a56b1cd5992c841e2b19bc5f80c7b86120cf3404a79b0a15eba4507f5b246d6c48e1a1365f50655ede4038e9e2fd42d9adb631117c00138fe4366b243bad54 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3056 iexplore.exe 3056 iexplore.exe 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2244 3056 iexplore.exe 30 PID 3056 wrote to memory of 2244 3056 iexplore.exe 30 PID 3056 wrote to memory of 2244 3056 iexplore.exe 30 PID 3056 wrote to memory of 2244 3056 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4401f42b34cfa7ad6f2a929350f878af_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3056 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554e9de886c32aa7c90b3ae50b8a12a4f
SHA1754a212029f0a172f6043362a409b11a1575b956
SHA25683a00fe1986e4d35ca3599254394fb6fbcfa9f56104a424c7f57806128c9ee4b
SHA51248c7ffa553eb5ad0413207f2fb96c1f85cb4762af18ac2c8aedbe806a0d03224c64bf3ec0910d8d8341691d955a23633316f8d806918b05eaa30b7152e19ea32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549011fd50e6185d05a4f21a3f8f4cc4f
SHA1d32979d857c0656c839bfc0cd9c39cbc112e92a9
SHA256df8a8c2e80b7fc56853e3b840efc39a4fbef45cfff75cd260c97d1fb92b91ad1
SHA512f72f40f80d06308108953dcc4ba5379c3a19bc0f59a19884f5444c2fcc263bab0c9b271aea830905bb348ea13c579ded9e9d38da688294512f151eec959b2d81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5708b327bfaded0097d157e3056af2a73
SHA1e6efd022eccfa182aacb979d11e0512d39b4a86e
SHA256ad8a94d2e7040ff93afbccf2ba407ad8828c37d0988875d248f4ab48d69d8a59
SHA512944f27309a8059594995288b80d6f081aef18ae442a7976120d2ad85abb8ce28f0af6187796ed8b10f58e798e3242ec6723c016e1f7af8307b048c20c3cb0ae1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533528064356f89e65c6a57255ec63241
SHA146ebe119259788bec15b41b2adce789d7e870286
SHA2561caac48480c1cb1afc400b3083fa97e4a36f2d89403e2b3eb489889072c1d417
SHA5122139b127a410139e04c4cc71b1e6be402a9a0da79e76a4c436c4bd6ccf16d244ce0f6acbbcd27515bd9013b2e583fe3927fa29e8624035decd5fe1edf1fac3b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e05c0a4a591de13f3f13f00d8c2e3d9
SHA1a22999a240db7515ca26a2ffb50ab7862dff2684
SHA256d335e652bf4cb1ce2a2513dafb35862381d6567bd0bde622ae8f9d50ffe38540
SHA51272e918a361a2cdac025e6d62a758ea01ca053f2a526955c7924a362645a14b8b3ef2723dc227f26c56022b93ebbb5c2768c6c2a6e98571041782ba86c0ef7757
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0f54c04907614ba919f856829ea0ecf
SHA154d799fb28cc138204299c0440553e9d7d5b2add
SHA256f6b5ab80307d9e27cdc42cfc99897c1e6fe32d6281cfea834cc7d17ede83c36f
SHA5126221025787b35f78a985a17a9d21bd82bca0fe5cd270a49ef3970e1bf3b4abbf35265ad9a149a9a29559572c4e4999181f8f13d73e42ee7a471ae565b47af627
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545703f75b9ffddf4169af2c5c5673b0e
SHA1ff6a7f07801f2584319a2200f6917343abc44dd1
SHA2564bffb02ce632c52bfeff058dab439de7c92c92cf8365da9dce46d023712e40ff
SHA512045e4f548d53f168baf20984861333f1307fffe069e5d91bb1e0bda2bb8b2093eab167b32685fe6d183028c28f0c701f40cd99a4d08f2b3dd1e91945914f8b05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5926f641e80b56ed39d213713ae20b781
SHA16804ea917f5dc1571b636c848ff643b2eeda5461
SHA25696aa82f67a7bc8b0352af5da844b6ba3bfabea72974b17f038d636b8b46d7c24
SHA512859f120a9b108a43ce1a387bbf523f2902c0bbd194e2a645040be0cd1bf9690825565559195b6e08a0b2fc1e0e67a7c8d652cc27ac2776fb12ea6edfafe24701
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531fc175b86f2b5dea44ee8b32f202c43
SHA143274adbf7976465d78898a79f246b2a283a9345
SHA2568c42e2fa5118e40a5e5bc3ca9191af07d8f27aeda4bee99d42ce3bc093c26fd0
SHA51206ced7b51be2074b1f5589d11594bf5bd2f26fb54d56626533a2e21dff5f18043b5943e3050bfe13b174201b7801eb4f21da1985550afb1e7fb5fd995fe6ac6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564ad97dc0ce7041ce590a23fb186ca06
SHA15de70dc758e762a0b006412e1554a007f20e0e08
SHA256b867e2b01609a8ee8f11708f353b72075eada22825bcf6146168148a6e95ce09
SHA5129a20820bb174600b7e019de75d834c3256b01a3d99ce0416783aeed185612b5a04e9aa0c0d45364c319310c8effeba32d3be7a291d6a955d8dd4703bfb1a657d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0f2a131f0b5a06802a00107250e79e3
SHA1d2a0e4329e76b72885f64e76443002bd60dc409c
SHA256428d6cd66071be2b94443f46ad4861e4fb2d7b99ffe16fdfc22db59750539c37
SHA512c957404b0d1954804e60805bb342800032db7419e641af9460206ff98bdcc2e89a2186d2ab9c40431b6ca4aca1f0bd45e23416666617b1d36c99e37c3f1d73c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fef831d42062afbdbed3f10747870e81
SHA13369017252641795419737830ce673986a910f78
SHA256deb944303207b25ea055ca255b255d3f03a10462be590ecb5a50b59762421e03
SHA512f07ece5043f6d3a8df7edaa3b4274305913e750e345a30bd9e89f36fe26bba7952b08dd2539c2a851d4ba46cf5cc22313c0ee63119827fb4c39e61ccac619593
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522cf98e8497322c46f3a668ead46fe7f
SHA1192547ae53de946c53377856d4d5b9474a077212
SHA25618d6a83ffdd79c3420fb5ba329f3357cfa16266fb410898da8d9ca00072c974d
SHA512afec14cf4ccc8feb4ef039ff1c462bf97a5b2677279d576c051f34466b8634bca1ccd4f7d0f733a95faf11cae96f1c910c0f5f21d89494537499e41f5e061aab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3c44a5530857b00abb776ba9c7e9cf2
SHA17bfc5ce397e96dd1813491afb007a1503f9b167b
SHA256c18aad7e7368e5e72469a7c56cf1f26ea2975fdd77ec85378411569ced704b5f
SHA5120a971e10e4758e8782e0671478f5a07542da16b8044dbd9a8e68a3f7403172e94757e8fae96d6dae19e571d3ad4df82b6c64504408854e2d5a84a5cdbada7001
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c646948340d0b137df5abc13f86b147
SHA1baef158500f902469c559cade28846ea833dfef2
SHA256d96755acd168e0e7d64be3e07e9544f678fb7836278258a9f505db36e42c299b
SHA5121ec0d37e33cfd4ee7c077de9cb41b166237c3e0761ba5b750c75e23f630c1900ffb6bd0768966d68897bcc80cd86a1ce74d8b7b85b74d0657931f9f5a2830a70
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b