Analysis
-
max time kernel
122s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-10-2024 01:09
Static task
static1
Behavioral task
behavioral1
Sample
4515d1b12a30438d7fe9cdc450baee41_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4515d1b12a30438d7fe9cdc450baee41_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
4515d1b12a30438d7fe9cdc450baee41_JaffaCakes118.html
-
Size
11KB
-
MD5
4515d1b12a30438d7fe9cdc450baee41
-
SHA1
a97c2322ce64493a37ed2dbaa3408f4b55362996
-
SHA256
a8c7ac7f51e893edb2909a311373acd5b6472203c75d5b89a8fd068f13b81170
-
SHA512
1939d711f455ea1cdbfcab8c37fa6a4e860a85687cd37106c0db57baaeea994f490e6c79c6552933c2eac05b56ccae0dc2afc6a46a9722a69793c10b8869742f
-
SSDEEP
192:2ValIsr0r57M4tCxatDT8ItK/w1wvqa18LOXuBuLbdU8d:salIcIQ4tCxatrtK/gg8LOXguLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0c3a7199f1edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435116425" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000de12e974aac8dabb87f9661fea80b123595f36275abc3030f4c109a26fc59b80000000000e8000000002000020000000c41beb147d0f136267f59777b2fe092ad20ed4444496398ccf5850ef9b1faff720000000de676210bb8a65f618168884f7c7f6c320266dae00916a6660b6e135058ceb524000000086130ccac15c2450d22bb3320ffe0a506e67b2788aab8b0aaaa2d54997a1b6a8d758ff5531946d6ccecbb589d544ce79bda1ffc436c4c89e300c74979fd1922a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{19BC1E81-8A92-11EF-A8AB-EA7747D117E6} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2936 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2936 iexplore.exe 2936 iexplore.exe 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2380 2936 iexplore.exe 30 PID 2936 wrote to memory of 2380 2936 iexplore.exe 30 PID 2936 wrote to memory of 2380 2936 iexplore.exe 30 PID 2936 wrote to memory of 2380 2936 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4515d1b12a30438d7fe9cdc450baee41_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2936 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50729e9f2ef403642b60ebe18abbee134
SHA174b58fba758359d7dbaf08355d92a0f878e64593
SHA256b5c7e76e8a45ccc2c63b7f0a1801acada804f2cb973d7ef65b8faff84cc8ec14
SHA51250618216fc2e92e7502f94085d11f91dbf1aecafefb3a88bf9dac9efe7cd0de46b8f6f99d8ee6ed6b32886c93c908654ec18a357ab5640ea4d5c4dab5997818e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dd7241e9c2a0f3c95c2f6a97b7cd84c
SHA147cf87c6a613931884a90bada4e5cbdd492738d9
SHA2569feb449d5720221faedcba882670e982a1ee7fe999ff65de4bbffdc019cf6439
SHA5125869c54d36e783394beb2d44c3deb0a8a59368cc7965eed53a2c2201fafdf8ceb4751c97892693250a8c9751099720ae61e80ec6c47e72ebdce9af52e47d8cb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559b203aaaf4dbfc4810f65d9afb2ac3a
SHA13c5f1e424a2992f0f566b4b2d32273cc41b48ff7
SHA256c05fe8e946648b542e1676111ffc1c8dae4fc571a2afd7a6203736eef5448639
SHA5125c0129e35d54dfbaa5b877c0379118e53d68ff8673761b45875cb35d43b9a47bb7d8ed6ef9e54f3f1c1cac6bb6629ab316abde48b1cc72e0b42f5a810d21ec8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4a923dfab1962dcbeac50ddf7070409
SHA124ca04399db2157e92761cee2c95df4773e46f9a
SHA2566ba0bcfc309e6aaa3771fec66bfd5e2706cfc16c3bb4dd7b55bb99a90b76bd69
SHA5124ba207fdf9cf12987777fc0df6f205e7b8c4c8f8dc210f820f9086cf62c564260995cc714b94cc146b95e1f8e54b0d8784f6bec8ea27bb44d2d27f2b45e7bce1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507e695a56f087017106fbd7d804db55e
SHA1dcdc91e0e4599818b339a14bfe65993d5863a3e2
SHA2564ec720b1d1f938cad3bdb9961a6635aa09a6bb4ae503915d98bdfa3eb4b81736
SHA5120ccf795917da6cba0cbbadbf3cb00cb4a914fd12d9b8ae7cbb237f3410fba5f45a55c20dee26c3a934fd24f3268904bd932f2b1eb775ed93f3816390c18e64bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ed5bdf53a463cd6d87debaed19e2aa0
SHA16a184e45d187a28619ce3cd8cc46f44b145c0fc8
SHA256dad12ffb5cc9f6d97633782cc87dd65f4b8e07e0a5bca56c0afa543092c2fa85
SHA512b92566c78aa2789e1afe1e8f5dd7c077d0db8a11504eda7771ead4680663f7d5a0e5bebfd0e4d5950abe05743b1c6ba95df67cbc5d217c601e19099f8d81513f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5764bbcc58ed65707a57c23b0d772297c
SHA12dbaaf321c3fd937bcf51288d82ea71d279c94a1
SHA256699f769db74b6b96894687a55f53fe53400cf1a1b033584896f793783513da2e
SHA5123ca118368685732c051300fe740e3c9234df815e3d9ab63fb50186defa115884b9a418d306bb575be2456cda4e474e3c7571b4dd4fbed6970ff7c4b5ef05e661
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f66978c2a4e200506caf230ac15cd79
SHA1d74a69b0ef7caf267a3b71c59eea3c095704e076
SHA256a65438ff90ce95021385779e240454b70e0340b9a170a46b20444c611f5aed4a
SHA512816d58b9e2cf4cfec7b196f3285dbc929d829a4ecee607918b24b759e68988f0b7e8803dcd6bbbf45165034b9d77904de20c965e1c223d708b5e71b9c37fd567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53437558a460158d5abb93770b8169b57
SHA18b4fa879992e71f73bbf752e4e260e7659fe8108
SHA2564a15738298b72dea4bbdd8e346264ad15e58c4cb5b333cc0ec976c85be5b07fb
SHA512bfaaca27c18d5883263220305411f4184729b1ba03a60970868d2ea0376d4280171756579ba4e1099184f9319be68ba7df8db64e35eee6b9d90abb79abc99694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f930396bc43fa6b24e6d3a8d79b36628
SHA18354484afdcc2fe100a12687d02b383b4a4a0072
SHA25687bdc62a61d1cb6305bd33d0501e37dafd25951975ffd6b4c55d4a2144c36614
SHA5120cc81fe7afcfe4bc4d3a109b06e1fe283b7b760f89f72656ace5696513c32165b4ebc19cb7bfafaa20f99e0c3bf662fb1d170e83d246b17552a03d2c135636e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a0c416e9ed0685a93c85372f3aa74c1
SHA16c24e27fd364f101c824121a853809d6bce1dcf7
SHA256cde3d0befc9c0fe8d120e18b24075f9bc55189cda922d23ddfdb115eb3bd93ba
SHA512b95ac20e2ad9e692c49ad8391c10fc725b22073fc83f454b6cbf6e38976f1703bc8dcd3ec5ec7a08274012245fc34b0ab65197a43e2616dc2711fc4e11fe05b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c3e3221fe928e15d55224874eb6df65
SHA124e81353a432c06f05e3079e4b7b190f4ba51961
SHA256d351d6293b9c6b94f6423db0777cfd098b44f812d5aeff68fbe4afad58907ee7
SHA512e5adecf13bb35ed59dd850096e2db4afefc038b4b90ebffa2a7e1b3d0897ee50ca4bdd533b6c8cd3c64b7547c6c3e8e226279ff2bd8de736f4e90cfbedc47a03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551ae448f38c41fa0ca8bc48e9f6f5b5c
SHA1b733a53435dbc120c6cc63d06975dda79fc54861
SHA2560c1e51b6027b39d0ab3efadba23955c7afb4d261a38c086ff68923c828098084
SHA512ffd1920f72f1f14d84ac85e151529d72db6d96948c47385047feb4d243876aa777d51a316f4338686db7951101ca7fa6a1a3701202ae988a761e04525d396646
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3991206cfb4a6389edcc3be1f13aae5
SHA1b9a9d40f9e7455db1ee1e35fb71f610b69a62d4e
SHA2567a024d7fe0018079b6bf1accbf1ae5dd8d9cb3a87d8e7e4f11a6493dace3096b
SHA51296e770738aa6c9261f90ee7667e0535e7049db27f394c720e65bd7d6436ca1db8ce94e8f1803bc664ecbca59133ed43ba24e589fdafc7bde894d395f8d0cd88d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597d4e9ef4f2154a182608ef929096f88
SHA184249bcc6a8eb2d22058c80f35c3853766dcf501
SHA256765c73c939fc5baa076fe765acb4140496ab40f6e4d07c06114818dc300138ae
SHA5120fac7c8d699401a064a5b4197e40c9b8970df418bbbe2c97ea7b42df0ba5832145f8a68babecb00662b153e5d59f82baf62babec1037d748ddedc71a23aea45d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56eeb9ebfff0da2b2860f9dfc1def030f
SHA16d51cf11a2899eb850c97ba2b8ed78824d85fa77
SHA256b593221e5e0ad472c0a15edfa325848898c78f3fe97def8bd570573c7d7e8825
SHA512c2cface90480eb2e982b987ed8a89a78585e9ede0d804199ffbeade34f1aeae8d53041e7003a171cbccba6440c4ef5c40f4c9da8518016a7221f6988131bd556
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afd07ad2264d42710e7ac858bfb04e36
SHA19a5f24065642d7d8f26d879c03c85bac3dd19137
SHA256faea1ebc359ccf4cee992779099684f06c481af0dd39bc61fd127ae89c55b6a2
SHA51243f6ddc8bdb3757528fe1fa46a7ffa6be0784bcae967cde1e74d6b5fc67ee632572646d3cbc3d4d8665ecdf593174119e42ad8961eab03024828facc119cabbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c60da3e53d09f2f00993d7f05ca77518
SHA162083e68f1186d9559d2763d45f01c07ee02e329
SHA256d95c1e9df0135701c2a734fbf96bc58610f47aaf24b24321ec253ce123969389
SHA512db72e81fbbb8c26df215a6e6c7790de39e4bb3b301017bae334a260d3edd5f022db0e13f532a545641648aefe77e36810c636ac1ab8ecfcdd256ff8ae8a78825
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbec49f8e2cce589011d5896ebc04f01
SHA19e0297e1e8e0abb1cad9bd93f3a959080840fcdc
SHA2567b50c94dbc64057c919b41f49fa2d7cb9b101346afb62262e626d6b758afc24e
SHA512964c80c8a574223269259e9e110b9e4e9af29a234ed7b3acdad9bc2005bf983a0b8c6655ef5d27a310e1c3d7d32e8a822b414dc7f00b93a9c2ab8abd3922e816
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b