Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/10/2024, 01:12
Static task
static1
Behavioral task
behavioral1
Sample
4518501b73febd5c77d1e0e6da1866a9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4518501b73febd5c77d1e0e6da1866a9_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
4518501b73febd5c77d1e0e6da1866a9_JaffaCakes118.html
-
Size
74KB
-
MD5
4518501b73febd5c77d1e0e6da1866a9
-
SHA1
59bb508d5a83a3da1c6bbdf776785d4d7000ef5d
-
SHA256
a17251b429c1482e1c7e709a858e3ac937606682a27cd509e1ac76ad12b29c23
-
SHA512
9131cde76db29d8c02166ac5b5d93a147a7e8564a4290860028c507428492ddaa6ea68b3b2027614fac69cf95c21aed0c36263fc966451ec95661dca7084f2da
-
SSDEEP
1536:fFOrV46BnavJoOeWYZLPccaw6E6dDk+Uevc1sVIWlonFnZspee2u6fq9kHXJ3TQG:fbeWqptyyOs5jQ0qVGZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000054702740b5aa2a048df4b93f999f674d58c3317be2470486c433c45696084fb000000000e8000000002000020000000a536b0504131650142cd43483f064956d4340c05ff2b6483f71ce32566b77de220000000de8d111e7bb81e2c16b66653c5d7ea70caf57d74b4ae762bc4dc32b9b1c1490540000000c0099034f97be2514381c572a9755c28ba5d7609f530e0171a77fbf3f13d8fb905a82abf22da54bfdb0742c78b602d96e9f3a366283687da6747170030aa2147 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0d5455e9f1edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8800D931-8A92-11EF-91D0-C60424AAF5E1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435116609" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2136 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2136 iexplore.exe 2136 iexplore.exe 1608 IEXPLORE.EXE 1608 IEXPLORE.EXE 1608 IEXPLORE.EXE 1608 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2136 wrote to memory of 1608 2136 iexplore.exe 28 PID 2136 wrote to memory of 1608 2136 iexplore.exe 28 PID 2136 wrote to memory of 1608 2136 iexplore.exe 28 PID 2136 wrote to memory of 1608 2136 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4518501b73febd5c77d1e0e6da1866a9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2136 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a718b08f7d14d4947e00403aebb95a33
SHA1369b32657ac940fbe28f929c7200fb2208273ad4
SHA256df293ac037aad9fa41ef4f38617d6ab54e4dc34c5ed19cd39ce9b11121f9cfce
SHA512c553faf52e1330cf91fcc9c18edb53f17184478ad38b00a35fab5e649cb49075ff6c6c99786e2fe59ec8dc3bf13291cf92c5da46d8356cf852385044c6d8fd35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d666924ce3f887c61e51108f9a56b8f
SHA1f178eb35ad25a7256d4add2b82b5edf9d421250b
SHA2565af7acf30e0424ad66eec11ba65e073f6aed6954d4a051b4a56ebbaf9a5a5e4b
SHA5127931bd3f554034688ab5711154594e4490a8746eab16d4a745ccd16b438fede36ebfafb70d44566965e994cc264a2ec0e28791ef89ab3b2010d71afb3f79f3b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4d6b675c340075feef62e3b4db40398
SHA18d78f4106fb3efdc13418d31abbcdd865ee85003
SHA2562d672c0d896eec026271efbed4a5f8ac51bea7001a3709c5556270d97aff1352
SHA5123d757e46bcfc205d0b2deea6bd9523fd2002c96ec013b9fd67ded1b117676e3002141c0504df844f77893c4c61c211b96a53854b8916286455b8c54bf964726c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590a2002468aa0b403cf559188e8ade44
SHA1bb516b0881d4c681049653b8177eda2e59da52ad
SHA2567ed9081634a083523baeb91b2d943d49e39b1947a3d3d2ce742e13499881fd77
SHA5121347e37d13395a3bde2f4dd2a25c1f0eca9b78ee0e9247ef77d4e475ff90e13df6a1561d818b135d131d40df873dee27f91c0cd912a0678d1712eecbbc52892a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5468e9a2266d6bb1ddfa2a675bb6a0af3
SHA1c8eb05516439f78f8eb84d76939b46009c8b7c42
SHA2568d1e34522cc306c057189d7d214b5dcbab513cb154d511c1cde9dc725f7ab222
SHA5120180fe60425c17ec9db4ad9aa04d5e46a80a37851abfe9c86de92d819f1607a391e726885a5daaeb738e36926eec986d338b005e96724c662ea5570ddf88dd61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d99f77a1efd863687d1051bd6995782
SHA11ce4da25ddc8ef1e345c7ff854334a7ecbbeb2b8
SHA256d3092fddc348ac1a1e04a41917556c9df4092a3780922ea9d739e0bb7b1a26ea
SHA5124be3abfb3373e37db9e8e07ffb34c0945ce9421cc244fb21f9f53ed1f7c51876cdf0ed7a1b90a8b9c441a7478c440b18b70cdc1aa2ae9c2c12c8debecf80aa7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c008429a58294d8c6c0db52dce5cd5c2
SHA18a1da61f961dc016aeaad919fdc29f418f430f47
SHA25685f8778e791d219b8635e757f4565bd5f7c2240f2a88e282212038e4e36ecf21
SHA512682ac43242c49d881e666c4dd6fa77238c829f07b3b215fcc6e1966e15b35674f4fe69c9d7eb46cc36cde3ab815b96a191a3266559fb6ee2e29a13e64a1e8d48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4dd6713b9793e971e7af00c6c50c36b
SHA1a281776c470677740b3c0baba45f17b5ceec105d
SHA25695fd316c88a2c8d156c51cacd30ff357c8ce50e0cad7fa3f3570581c38b2cd3d
SHA512bd7afa50563e0c04dd7e626499284fc499fad0fb629bbafcdfc7436fab6493bd01d317b7d89251d0afdd450ffcbc4b7f520f74053dfa99ba74ef1716d09b3726
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf206c92b1fa1e90537fcca7133e367d
SHA1fa893bfb29403b3351defbb8fc505e120467df5e
SHA256cf767b3cc948e156313ebdc4b313b292b10ca1423c2f2a36597f1da36374f34c
SHA512a6afd4c96c7e2994cd1e3637e38daedd75d6ab0c0e82dca975bfd90f0411f4719373a45b1ccc5ab74cf4881be3d20e28c8aaa27415d75ed6fb69be2a0290da97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595d84e9d1db36fd85e51a72c264f78a5
SHA1e78334ebd8285705d741330578aca38ace745d52
SHA256e014913f27434c39fed90974dfc7da1cbc56122de51205a45b475d53f6fe1d39
SHA5125c263c65343d6e0eb809451289694bd3af86f06ee466d635fd37cc816739d5980cf3311ed89d2740b8d67765501ba01752690ce04f7f233639d48bbdbb416fe3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea9ad328c141dbaab06ec8634bfc001b
SHA1ac6acc298e1ce61ad2609368b2ac01c53e6645a4
SHA256fa91d6932ed9e6813185070d3254d923f3b5a1044b9341365c4c5b980cc26c2a
SHA5125c44718b00ab9408d664e8ceb170ce4ab5b1575abc29aeda4a746c770843d4bd53f92bb1acf353967b7ec82a8fabcee48646a3093ce15c2647a2bf597517923d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55585295a3201f3963d574b4a3115a7ca
SHA1b23dfd035efc00bbbbc7412c5f721489965c9983
SHA25614bacde21b220be5465fc4e3e0382be7990836549673a2004e53416f2e0be8b8
SHA5123224b60c557f70deba83e5f6a4184b346cd2b94797f0cf399af3486983569b36b4ad22b07d314db11e712ccab3c8072384fde5d2444a19ac9e2082fac06c18ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b43c1b8d9028f45b6f07cb951c35d66
SHA135710beb43793029eeb1acd1f56d50040aabee28
SHA256ac160f570bd9fcf66c3918e033bea0b990bc7e28c657a17768e7ef126e836a5a
SHA512320ae2a1a5d912ff26de6f0709b2e03a7bdbfe9b1aac5002b2ea0b7f9fa357db2ab72e8b7ac6ad8b9ba9d44e4506696c6733c6fd221d034a88243c529b16ac99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b03fa9f1578f82078e44e9d2ea291e3e
SHA192af1b871fabdce6d099ff4ea6ccb0172a79214f
SHA25666164eabd332af8b2cf19b33237fcb3f19aeb6a847de4106bd6f155ac26c5320
SHA512c9f9a86b8ee6122a00cb0bbe28867dc925c0e6f57dab5571468617080dda7654e7ee66e3645926d300629ae2d5be7ad17a36736728beaf1a26c555300fa3bde0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e8fe4e1bed0927e51b1726acbf5860a
SHA1facdaf22d7c56d91a3851139189d800970a5ed1b
SHA25681cf82f39e6d73b8f50c1667c08a174ac3d7294707aee2c43165df70f1aeaaa9
SHA5127abfaa19aa71425bd1fc1b7bdad62a796d8695ae30b8f8689e8f9ceed5ca8018d8e6e1302ddc0b75c14cda31c7a0e5d7c6d8e885421b516935208cf22408632b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcb1ad01e883b32fcca2a1e12f76b050
SHA140ce02ec8c5042a55a1d1657531cac6c3f5ed0fe
SHA2567245f111ab541b5b97e44e16821010d160a34141c5cc41a7b43dbd5140e7a9c7
SHA512b73762f0847447cbee7cad2fd187902a7992c78660207acfcaa1b4e53affc16ea814fd71bd34d228e4f6118099ffe9c3284406a4c150c48b8a6ca9cd6c0187b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c22ad2325cfd0df50f034abcee6f5c6a
SHA18ababb93e38741a264f013baebdd80d933cc2298
SHA2567b4887233e7594016536282e8ced6d6f07e6d37650643de9f7c36920f66cedf0
SHA5124eafdeb854a895fc9c4deabfe2a9aaf3b1093d90fc8aeb347271a24ee5a84b9ddf7cba8fb2e07fc36498bbb5112cf3ad4f966a4449c37bc25f762f3451bac74e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d9ed26ee4a40d5e8998eaa41cbf32d7
SHA1522342c64414a2820b2873f43604d841922d5ccf
SHA25631e38c08037edad02c49fabfa67ace18fe2f2a84af44de9e26cd9e8fb72b9ad4
SHA51262e129a144f3891bde2aacfa5d26953ef4e9548a069eaa9829ab7ef6f5dba3e9107aec1f496397fcb41f541549553a97ee5c186cd39fb5b2ce549f3a38ec8576
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b