Analysis
-
max time kernel
69s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15/10/2024, 02:47
Static task
static1
Behavioral task
behavioral1
Sample
4573a0bcf2c63802651dd3dd9b55fa8a_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4573a0bcf2c63802651dd3dd9b55fa8a_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
4573a0bcf2c63802651dd3dd9b55fa8a_JaffaCakes118.html
-
Size
17KB
-
MD5
4573a0bcf2c63802651dd3dd9b55fa8a
-
SHA1
a4521132416ea6c24b09ce522d14da2857c7760d
-
SHA256
b8bb64c616466ca6fd708199982d38b8198f61463bc5d6d6039c9384412106e5
-
SHA512
621046fc39e2a2872ba88f0bd0e6d77d06ad9f43d149ea915f628f8f943ab5098421560bfd8ab6a37fcdab880a6b38e175d1f3fe9ed1a9675488b1bb1df695f3
-
SSDEEP
384:Se3Zs+QA8+v5AhcG5q0unxgrEsjzbS99Bq5p8Z3LQxarSdICgyQ+GGdVJS:Se3Zs+QA885AhcGk0unxgPj/OC83
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f09d47aaac1edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D5C32D51-8A9F-11EF-A817-DAEE53C76889} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000094cf039cf5365843a56627562ba09d7f000000000200000000001066000000010000200000000e458de7ce95f4453cf1c01baaae4694c3394384316e74c4cc74546b12e3c915000000000e8000000002000020000000a95a4f602ffd18662d9fd38507dadee7316cd235f09cf32fb74a030784525e0c20000000ec89b20a5810ee1f60acd9cd13ffe865d92f1259e177798eb8431bcb2976c07e40000000eaaa7b4d963a1a3f3fcf7489412b206314bdf895cc5b70e40b03ecc30298ecbc69262c0bca7147de4d28bdc068a4062487e5136afc72e4f062288fe172a08ba1 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435122326" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2412 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2412 iexplore.exe 2412 iexplore.exe 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2336 2412 iexplore.exe 29 PID 2412 wrote to memory of 2336 2412 iexplore.exe 29 PID 2412 wrote to memory of 2336 2412 iexplore.exe 29 PID 2412 wrote to memory of 2336 2412 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4573a0bcf2c63802651dd3dd9b55fa8a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2412 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c337cb73b0505684bd0e469ed7fb1b97
SHA126eb2b75fe6f5d155df11997806638fa615b1931
SHA2566957c8062ae5b7de8585f4f5911530f99d6b904320d8bcde8c8b3f9f8470782c
SHA512b8e4505f239d6052f62e2b28e8ab0fb823749719d4a82740b7795cef711dd51063829756954648b4d550e2e4746ef2f948a976556e379d144f37bd3428d87cbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dee86a547399da12b36b09f441367ea
SHA115a69c510b7c6138420afc7cd995e858f851aa98
SHA2562efcd03edafdf1ff9769d4c39ba5b73228bb7682451bce2e86619df9931c1e78
SHA5125edfa08f2929ac44f5a8621d350d3b1f785e3c7d7ce5cd90a4769ac0368f66c14d570908376a83a85becb5e7e99b42037d4874faea5022d9ef87e4edb669dc58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c5f721e5c8e8d3230727086a3290625
SHA1876d57c633f1adbe16b66faef4e221ae03fc0ab3
SHA25699381cfa58ac87a3f99cc17eb9f50a52aec26b4032cb2075f7514d867e8d26c2
SHA512ce533d9ef1a3296ba66e2478673d8a3c276e4b96598c29c8b59bb74e36b32bebf89d1be80d37ee95e5a47dc37b316fd1ac56ecdd27222fd4ba491caacb1a83d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e8394ebb35af99b8f28ecc976449812
SHA1f62b686af84a7487f033bc21bdefb0a86f69b140
SHA2569066c8205da98f1154febf96cb93ea0ae6cd8bdda6cf8effad4de14c62f123c4
SHA512aea93e9e5e583b5fe5a5c435f9826d6725c76df38db86eaff29788280d45d1da9538d9d18badf6e28787d3bd41ff9ec7092a394f229f7d1a838e77cfff6483e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56200f5c305b625d5bf9ad075a9f59ab6
SHA1dfa928509bcf2eedf03528adb0c22d2a47905ae8
SHA25674db6e82baba40038de0fa6bf46887e834fcc4d80c9fba62977402cf94ed20e2
SHA51261196ccea5eb48f2bc26ae4bff5b9fa0df2a84c3ccc6b6cd94f24e21903f022f9f7b00d239e7646f73ff399646abdf7f04e9264c70188637e1a7cac01cceb521
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be4eec5fab2d25f3c40545cc266c581e
SHA182752595ad46d262f667373603eb50f2af2b12dd
SHA25683491a9f5b065a1e3944e8f3559b27a1d8b6d67dbd781452f7e9a9fb6d520eb4
SHA5124463a4d34d802176ca67d3645a4c380dc562d0581d216bb5d8bd1e46e850dbc4ff7cec1d7e6dd5a3e208ff41b7c0ca4b1c064cbd4cc89f35eed5a7d78125293c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cf27d70026e4e4d48e4415ae0dff643
SHA16fc2356db6789e84f230727dfa9a8a312ac924c1
SHA2566f4aa99e5bc67f9b8917b972782e73ea582ff1504d9c09e7e71a858eeffad729
SHA512ec2a2c8d90641d9bb227620dcd24df58a14feb63fe9a837394c7a3d4a135c44355b8685f308cb102db5b8bab8ecd77bf67f29043b04ad614edf62bc28ecd19d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bd6bade24c09cc8169234e2ef5c1b95
SHA1f504d2650ee64135d677a9139fe4dd4c1e68533d
SHA256fc7995dd474d787b7610172f3967dcca4ec935bf28a30a748247c4045daf8086
SHA51286d640710fe29a2e218bb34f24475d3b52dc186a7957d6c680170e928c08ccebab858a1e358db75aeb96d2b6f9ce59c6f9fe7d3984c3a9111c86581c629fa066
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505fd21d19ce9cc77e4883063e9e9e6bf
SHA1a242da8003c3d7eacdab6e861d39b02f205ee3f6
SHA2566aba53f423ea8dbd448b2e295e42af41314e5ce2faad229ca70b0f6af2318cca
SHA512928c0618bbb1e043d8f00628e1a37409b8f647921de8ed34ff58fc9a728092cad8277e554cd48c04a87616935c54bb49defbe0c6e6aee133390dabedf2ae6b06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540475807517dcc43c5a0da10e5c5cb2b
SHA1b809ad5bb8c7b06807e6b03e4f23dbae0e0245b0
SHA2562896c3a3de390d1cb76fc1a465af8e3d0988ccc9f01f799245ec88bbe70e2b73
SHA512b81a16e77a86227a66600927a2f2319228797ad9c363c44fe024c0833f0749cf6cf3fcdde9c694ac8af077304a3af1a64fe8bb48a0ebbb62dac66d6919c8fe18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b6902395e3c4f77f9d22167036e58d2
SHA17ed03cfb665b46fbdc381bf0230df6ccade152c4
SHA2561e1f037d7de0c20c08f403b446eda50499ca6d0818110c19a7e3f76c42ab6d23
SHA51285c8bdde19c0e6b112848dbaa46067f98e27fbe897f07e15fdfc73491b74d78cb5f2a31ccca8f99502e7c8087d3fb8da80a9e9376849cf9d9f2c368f060aec95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3ca9f9e3ff30122ec2ccc87384ea928
SHA1a40378c1b9ee084f2e8d24a5620dbf01bc8a1a7f
SHA256fafa78178d9e2228d0de64f5db54022e24141a8fbe75dac8f130d5399a24bd6c
SHA5125f0c91f794d5edf5a785b79096ecf78d96b3e1328f59782b5cbfc4f1dc32358bbc31f24e379cf81878065472efc11ab909e5e3d666615380e83b2dff30ea392e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa929a0f1bdb500567bdf9422afdfce0
SHA1c915e04fedc68373b2e258323fd3414e363be4a9
SHA2567de99c826bd6e750b6b9b37bb7b5f5236d1400be5d991b02a1f403d02e4f17b0
SHA512644f5fd40e947a6a37769106295655db7e71ac3dfd3a218f3f864d897b7c4c3980846d387e33343342f98c37fa0b4133bf58055ff2478ca256d7bcf9c548c4f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581f25bb720f01cd3cc99b8eadf910ecd
SHA197e5022fd22f2a9c6f7d0dd18841f418e8468d2d
SHA2564beffc3a6dda44f37b66dc04ceaa4eb7c131e8f667a717df4827e5561a497e36
SHA512a71e4bdf21d05711ac4f4fdbd25113685d836cc15e68d81802325b6c7bcea566a114da79fb53e3818c47c91aeab92c5eed584349d8e2b36db86d73248576229f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553076954595ef9c5dbe1e0cf823d05c8
SHA108fa861b79c724a12d59dca16225e11230650be1
SHA2560f74bc6901992c3c57b68e439f2e2d037dcdd72bce13d5bfd0780d0c8b7e5700
SHA5126f1af409ab7638d60fb5576a68be20debb22af78f58dc75ff91204d93a2595ff07f51627dfa30ad1ef329c70faf09ed2d78e17b4619eb83662e515edc9c25832
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58829019567a5eda29b4bc4b4bfb64f46
SHA1e2f17937559eb52727636891d799a4bc19525233
SHA256e3e404d8538444cd0ebec5ac526a974fbd4e00a4cf3e6ea087d140f147a1d2a9
SHA5127651e52951e63b1524b755934dd8784c190e568fe7b01731bb728016ed7f2155f7aab4441fac14c34cd7e7cf75dfd6dbe56dc6d79fc2b4ff3489f86b6bcd2913
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f151d78efac1b67359e5ba75f8e810cf
SHA1b68bcfdc5f90699a12608523435cd6c1790ce76d
SHA256aff530e4a81e273593c57c33ddde4be3c0e851ed6c1096b91ae78b77ec4b27a8
SHA5122fe6104428c5098e0b9dceeb18db41016b6532a07135e6832eb5ddea64c2d95a6c0be80ee8c4ecf913aa0b3b83d609de0bfd5f60e2caa878ef52f1a1f9e2094b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fd1b273480785441f96ec946d82a257
SHA1db9c715d6a8ee5cbfa2c17588bdc1b2d134f30e7
SHA25686f9adbfd3357742f26cca0da9beaa6d25b66aea1618f814c836e64c8e8f81ad
SHA512f381aec493c5627a4beb8fce891c2193fb261092f196d9e8c5a6ef260215309d6e18b17898d8f54e290565f851038f6f5b160aff413c7b449bc641b637b084f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa36c30b9e193357e9b8837e0e7ffdae
SHA1b763ef98b3c75b7fc28174b96afd055850ee9812
SHA25643676a09ab22e09e92565d3df32b59f62fd7008e788ae2b1b2324ac364c043fe
SHA512457448a76f98e0d04586913a663971570e5bca8e926c95fd338753eec78fea28c0da3c11950b53b79f33e2660b06023e33c4d979a1c271ec31ca1c905e03e0ed
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b