Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 19:56
Static task
static1
Behavioral task
behavioral1
Sample
43ecf89971e5becdc13ea9850f1bcebe_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
43ecf89971e5becdc13ea9850f1bcebe_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
43ecf89971e5becdc13ea9850f1bcebe_JaffaCakes118.html
-
Size
22KB
-
MD5
43ecf89971e5becdc13ea9850f1bcebe
-
SHA1
870dbbb336777766e3a81b12144e85b7112df27e
-
SHA256
b5189606be9f0514b40715945d08bc14f12ad24daac901d395ef3acae499a9ec
-
SHA512
a4f3a0413b8d8dd33d419e4b4643bfa795236c8ebf40b42032820c313c1bdf346b40e72f2026a93e3dd08bde78ea4bdac8bfc3fe911352983eb953f4cb8f96f8
-
SSDEEP
384:MsjlFfiPzPrxt/9/skcQdYmMCWUFEbYxuhWIPGZLJwaAViWe:MWlFfC/9DMCWUMYyPK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435097660" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{697D10E1-8A66-11EF-BBA4-FA59FB4FA467} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000e7c6669bb7c9aed0fb95d8f87baa082dc3156562bab7d4b59177cc0315bce03d000000000e8000000002000020000000f9ab7382e163504cbb05cdee9190654ff8302dd21d13e9e2750fb59618a8412420000000860e86e5d82a730fa60570936733b9703c5fceab12d993db1bfb2c5049df60d040000000247af91dcac687099d25b047a873176600ae9987ab1f1d59839c7aa533ac05efc08bbc045273789a03d505756fcfc80df8adc86c3111345efe1f6d04a24b6cfa iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 403a5b3e731edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2188 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2188 iexplore.exe 2188 iexplore.exe 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2804 2188 iexplore.exe 30 PID 2188 wrote to memory of 2804 2188 iexplore.exe 30 PID 2188 wrote to memory of 2804 2188 iexplore.exe 30 PID 2188 wrote to memory of 2804 2188 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\43ecf89971e5becdc13ea9850f1bcebe_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cfaf43b70a07109670c705cbddc4b10
SHA1fdecd1047671ace42e9e080314c4ebe2402151c3
SHA2561d42c3aab07ae6e512fc5763d12e9f2e5d8d2b9cd46380cf86f2cf09c2365479
SHA51213f21d9048457e823feaef92f76ebfebf09615cf59ac08b907bc24b60484656d3f112fbc0235cb7e5a345ae34ccc0c442e69f6bbe1f4043e5f0135e6e4f0564f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdcc6accb1e1f7459f0354c10ef55605
SHA102ecb934f24063a0fb93f9e71c5e3fca9bc4627f
SHA2563ad3bbd31cf23037f2faa3fb8355e1ac79f26e5802e7f86bc09ce2d60a473555
SHA512cd044eb6f7ebd3e9167494290a43400447d1283e0325b3b4ea631256c1ed26c99e2ad2401c1d91e693aa556ade7d674b46e4695a4f9bb28bc538b1ed08e319fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a4f560e81e33c92fb283dca9017820b
SHA1bc0213689d745e97ca9c34edb0e343026279361f
SHA25600338c1cc4b8e41a18f2cbacbe08778310a5981f341169c153ac2ed92aef4d0e
SHA51255ecadc81246bcca6fa9c3739f4fc1198d21abaddd9a762e3e15aeb68bab8d985529c404c8052d95335e582e60299c539303adc8b1d39d4eeaeaa056761426ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59aaf495bdfa611f6ba7d9f868ec7c452
SHA12b35b9191ca32abe4c944625fca42d48d7423c40
SHA256cf5025001d275f52d225e34a1343cca003f5663c3fa51311c76f831144159b07
SHA512eb1764e73c545627eda14b6937541a96d35bdb3841830141b9d3040b51348cf5a5911aa05cde0c17dc8001e944f3e251ae6aa36ed34f6ef6aabfef3ff3b85ee3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fea5e1b98b84be1bd11396cd8b151bc
SHA14f2511da6a98eecf733fa5cc89a7f7e5ca669a08
SHA256d7845b01262067c1768fd6e370062643c2a543c13bc2b5c525fe7edc8b1b5eaf
SHA512c14000ced9e6c8c9abf92781987036f4b277b4fc57f6e39aeeda14caa2a6a70e1e154af744ab62a682299ac64d8d46949a3d6caec1fa854cf25a13583a9c4c80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f716e1a41e2506b39ffd99edcd8dd3f5
SHA160fa8b5c191cb5983edc6f70c7f2441b0b5a9253
SHA2567e6194c72a40761d5af1519c5a4a612816e35cf7942c53237be23633309e0aa1
SHA5121c19265efdfcba17a00890f71bc5303415e818f2eab5133cb2b80e74c7562b5f0256bd3b6bfc343b3af6670b6501f694bd66a4c9afb2c065fef811df09465f5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55262081d03f44f649217c7d39f0ea34e
SHA1d8473887fdf099c09f36e015b653844d57a07ae1
SHA256e9d17b564b8b7e6abfc15e8a5451991e473290d40f6019f021ada5cb82b6f162
SHA51233df974d1320aa5699fe75c065241142ce3ddf5171b48eb6c74b8c2f0fac5983ad55a5a0342254757bc14e8302ec1379d1bfe30226845f8f3f5c9b25fa53ded4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581c481f694b4ad245de0575febeb3cee
SHA1a93c60862c78b27e9e98cc2c70865eeb408017e1
SHA2562ef661690e5a5578ca4b85507c5357391d21db9e1b91ad941e9d56f96ca9f1eb
SHA51245aa269a292486015ea54b6e4cc0b55d430b59d7254f299b9dcfd35886f4b2d47587a4b29bc9573f222cc0fea33c7a3f90c71c570afe400e5a3bdbac183e4976
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a48505929ee9b4acd3fd1532cef87e85
SHA1a899938f4428fa68f62a4e26a1523e63161620eb
SHA25630956316dd7d2ae67f081a6e65e554c1bd2f7d87b00c485b2f23ef88cc01abf9
SHA51287f0ef50d07ac9c9ac961e5029ba39d43289de6a8e14729a154c6c4407966ede46b4c073da0745f1e72e670250f345852949a9354579a6b5a52aeff88b7dad66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f251ec8d38bded7bcfe138c2ce16372a
SHA15deb4e5ef8a0d20a0c8d24a46b04cc6a85976e35
SHA25675917ddd1322f1430bd76bc28594824072be317d7a7199b007a7dac0540b31e6
SHA512b703040f8fa64942b8eb8d926cfae997fb9213e30410a2770d8ab269c12c2a81140a5c7849f32af39af4bd474b93d480f9c610fff764a93d1bb0b1c89404b032
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc9872c6ddc0287853052050f4cae0a8
SHA1cbfb1aab4bea497be064201bb40d817cf28c9259
SHA256b06affb7951db1a9f8b70d930939734fa646122f431ed514805dbb2806d4127e
SHA5129ad21db15def4b4c7d0dc2416a9514f717dbb5da217827c8425fe21fd2954d83d84d0991a21f97887a29caf4bd310525d59215d844015635b84872f88d287358
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519408eaf779bfc376db5bd769065a6c0
SHA1402beab37bbec72678f4fa3984d8519bc6223f70
SHA256d04cd6a1ce3c406f090294efe6f74301c6b6888b164283f538023586c81a51d4
SHA512b5ee0c2cb785256a768f6f5dc609298fd20530d3c2e8e3a59930af16a19b8a27536f0d6ee6e3784fbf2b139cf188a9a83f2e7f845f46c0e2d3974056f5adc5d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e772d834cc44acb91251bbbc27ebb2f
SHA1fc88c4ade4082277b700b429fb98ca7d5e26c661
SHA256cf4c5c0a30bb4fa224e7f5814f419f37e7041701453aeaee2f1152e20ee83904
SHA512bdd034003b2ac2ab80d1628bc200c06d645d220406cc492149e7b5a3cbf7905212ba0948436e605954650aa9c30a956985b7b7e46dfe95576e8d03cf4ed4f19f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c6d51365746c83c91e7ccd25c3ca6b9
SHA1ee0591bce529fb567af9a0e0c1ea51eb5350002d
SHA25670d92f6b8f66b8dbe357b1f41422b8de8b2fca6b7384746a2b5d7712d98de631
SHA5126ea089d875bf3d36bcaedca99b3163746b7462efeedd33fca9e32ed1089f01d01e9a4102db4196694ac444842e983826f70f74920d665fbe761f3133819472ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5615c601aafd913ffabedc962a68ccdb9
SHA15adc43b7052ebf2439e6f2c772e94bba2130050c
SHA256a463f024ced3af767bb6c4d0b824fc3e151863b046966371b45456017d5a92ab
SHA51261223be4b99bdb5177492aa57f923831772e210fd45d2b064e93422d5fe7b8fc1b2ca19846fe9da2ae00aae87ee9999e3e0fdb2e90b0d199fdcce9cf6c9707df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daa7716f8059194c489de4dcd5b09bde
SHA11faeea7517292c81ca3ebd29e48aac210bf0d05f
SHA2562038ccc1c1372fee60cd7ade2e7c556879011a7de66063ae11b8f551176e086f
SHA5129375ccba44cd5a3ac6c97c5a8e1094f987af8a013f331d4cc8b6d0ce9665df975e181baedc285490194685012811479641cfcff2ef6b29435470d62c5e28193d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c57486513b292dd3cf3cb36a263a824
SHA14a757390d89487bfdc29244c0fd200559a26cb90
SHA256a7b49d5d74821cb4213f1ac6c351cbc3588623ae0ea45f66a9d0154e96cf5c7f
SHA5120667986c743bd3f3d4313404674a96b8d2e5e1b3004245a1b8e1a472b40ad9e89ae0e3d38f5e52c74ef61ef79d00159dba59a9f2e5a03a1572981b87e2705221
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53884e6878aa5381f49e68332c5a88da8
SHA1997f97684bf1ecab5343c3c80d0d1315bc951d18
SHA256aa2e33b5900cd6495845c6adfe9897f91822ff2ebbc13d730ca99530f685c3d9
SHA51248017cd79aee1d79e1cff88ce482d6d5b0b49db797146168da586eef92a13b6dc6cc43650daa2fc51df55ed7fcec6ef660358b7b49990f6bac3cbdff49eee57b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc035bd5663bc4eed22c4f3dbde6c46c
SHA1fe47df133d53a14446502d502f779bfa326b00e9
SHA25645f1b56ca2d57e842af822bdad58fee47dcd5c1aae2287e41687a7c7f70996c7
SHA512948ad0a65a3dcf0731934db0bdc19b4a6b45ec9cd3fae0b0334b59e522c1f24f3cc678f8d6efe5a73033d00ad4bc9923c69b2bb22ac32005fedabf0702649e6a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b