Analysis
-
max time kernel
133s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/10/2024, 02:26
Static task
static1
Behavioral task
behavioral1
Sample
455d6819943a02efca749f463a2a46aa_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
455d6819943a02efca749f463a2a46aa_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
455d6819943a02efca749f463a2a46aa_JaffaCakes118.html
-
Size
8KB
-
MD5
455d6819943a02efca749f463a2a46aa
-
SHA1
68ddcfb5cf4b97e2df3d41715934ada0df858265
-
SHA256
d84fbb9cd3daa8542e052791a87879d5c2bd848ba28033bb1f51b7e49d604659
-
SHA512
759512abca85e2a6b66950cf3e1a173f670abf7db132bc07b2f5728d1e106d928f2cc28d3a2d9276aecc253e736d480db0b29829215bef67dfd2a7940436fe73
-
SSDEEP
192:ISknxroEvgq45+l29wdu8TaoF/p0iY0aBBv6AVYZSot+t2t3m:bknxroEvgq45+gqdu8TzJp1YnBBiAVSC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 703246b3a91edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435121038" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000f9aec188442e92f209442560acf64be5322992b4969dd23c4bd30b3a62f523a4000000000e8000000002000020000000a61d051edf4684140567713276ee95a18fc8fc264991619badf0a5a499b87308200000006140566d70eda3bd83dca7d3ac352b93fcb60c49c6fcbd7ea7548a5dc1dc850f400000003e4e54543813dd68054462cb38f4fc489d5f4cec2759a3141b14d4f5f53626e09a84e731e9b89be5bd00edde583358c6ceff95e9a5d8461519a771b02313ce99 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D74158D1-8A9C-11EF-B0B8-7A9F8CACAEA3} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2120 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2120 iexplore.exe 2120 iexplore.exe 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2120 wrote to memory of 3044 2120 iexplore.exe 30 PID 2120 wrote to memory of 3044 2120 iexplore.exe 30 PID 2120 wrote to memory of 3044 2120 iexplore.exe 30 PID 2120 wrote to memory of 3044 2120 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\455d6819943a02efca749f463a2a46aa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2120 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51deb2dc1b1e85e66cb13bf6543325d21
SHA14afdebaaa3bc7e96e5de547d8a7e20b21bb28a42
SHA256f1a594c4ccf12e0cef9d83ec102230cd0b104e46d0f1d66bd55305d2fe8a11fc
SHA5127b8cec87b959dd562e89c824d37913afe90cc59ee6a1b94e6c914be7b897054ea5131a9c3fda11e8d3bcd7fef964665b96ca31c5df0ad524171b41dd2fcb7dd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f33e7608456821f3dc275e844732dc53
SHA12a08a24d3e6ae4413c5fbbdb3ad5ea968fdbe4d3
SHA25636b32711bdd6f41148dad5ed50e7ee6656180398cf789e8068642e68bbed964f
SHA512da42142d0f460ecbd2e337cadfee6eeaade7bc519a38239e2f88657df9f361cf73a4909fb577f29910c3a53d144f4f10b19cafab43aecff5cedc43c011984b21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5370eb7b4127fd90145124b0e028ff2a4
SHA1fdd8ff515865274bec53aa48db57e0759a094f89
SHA2567eacb319c4c615679a67e1bb2b5cc145559107281411588c2fc24865ba83909d
SHA512f4a9a6995f35d877f440386fc3ce5afa0926ae9c6116102e04611c7e1e04245137d5db626ef4cb1ee0a85d1a2e801746708d8994345600b035cd2ea7dea415ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5829b1667b244b53fc81ad04397ce8fb3
SHA1ca30a3013fc364758b33f2d15d1d7db529b8827d
SHA2568efa8d51662f6af48094e93da8afa8de7b9a421ea34a0e8f5843d2bb01401301
SHA512bf68c5835f45f9275f873fdd0f4a69dbb3bda093395b82f8b4569e9ed090639997f9894655f2902480301aa28e1e0913fce22dc06c7dede0013c82ceedcef242
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595c61b6bf359f5ca504239ffc55c92f3
SHA1a0cc94eb0b8a148ed99c8fcf5616189da44ac3e9
SHA25680a0c8a58726f5ee78472d0b28295643c3e18dfc1ca6085633ba5e7dda19c931
SHA512929e4276af46f8d162a5ae1d212de410576e8c55cfcceaca86dcb41e8f6979d69d39827d59c299c15f6c3498d55e255f69e34685ea65f1ff3c7cff10b1bfaa0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9820e6b2a776674b7a524a60cb1f18b
SHA1ae7f544713463fb3e87a5140a7fd797e445bde18
SHA2560d0e2c4c2dd16cdc9cfb1a24dd59308829bf126b396328a37766b55855510468
SHA51226e76c9f9e1895675f5124cec24b243256adb4e5d75979887fed978397f95a1bb11d275b5fd0a0dd593df6d83f0f9762ed1a5cb2d0e653ec5611fe0188afc338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c78c6b710e645690483cc60dffcd2871
SHA1da59a4e6b0ebddc0ad396266f14a0131b7637e76
SHA256780e8a4f96d40c3dab189dd088c050a14c03d96062e69bf7dd03cea3893659e6
SHA512862d410032b6784bf5022bfb9827e4b52c1498903ed7ec5dc0f334dc2d8dc3e50588602862793d073e992e9a6d899bd9fe2e3fa6eedbe401a6cb934306701936
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50611789e5f8a97a73da990b6e20eccaf
SHA1b4dd6c6cac1ee003edac6860cb5218c51eac8f8a
SHA256a68da10d9fe06e39fc3b388f2b57b8c64931206edbdc6705e037f0af1114fe05
SHA512039cf171e6587a07997c0dcb1e4e2257ef62e549b5dbae086d3655aa14d38f30d24e12f04d4a403ca5ece5f90b739b31ec3fde1ffbd2dc8edda323ce7baf564d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5460556f0ab79d60f76c975b31cc80058
SHA1ad0c291a68fc111cc21c2aa776881220553266e7
SHA2562f54fb327b968bb71a25c16708f49ba3c91f991cbcad66bf57bfbea7a4233933
SHA51243da6fd4dd75cb5dec5015f5a883470f2c4a0de4cca194feac24a9116fdf719fde82bb4f09c5d92b5f43a436b1316fdd4f38398b371bd77f7fe9060be2389f9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e01d0fc54c02152a002581c266714deb
SHA1d639c01fac53d1ab703ac362f22626eb3a87030d
SHA256adab066bcbfed9f0e91fee9d59cabee17f71a704701bb0a074ef23a23fe4d8b0
SHA512a2ee8ed2ecc3260adc54691a12989ec328f71e3b568db9c598af1c2a155f7f2f7abf07c41d18fa652664d2d08347cb8e608671ecb43e07a8c59e5cce84d0f400
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a1b069c2373f73a6bb029f7060fe80d
SHA18b57a6888f0e047b0014a62944695dfa0c6186d6
SHA256a02f1113d8474946dab3d3f4d15f64f2c29252831fd0dadf8a561cc47710f7ff
SHA51214247a05d3350d604767c40b65ad6e8d0f7e01ed413515ca0ad2107b402bfc2445af2f4cf36ef4888e7430589b078e79841a28cb44b9b57f6e8cee7dd3f5f8ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571f2e1f577200682988cf84b53b518a5
SHA1721e67ca621f6037de59a132fdf8cdf6fc7080e3
SHA256b0f48c91a2c905413f14b86ce85a0d17c5bc41bab24aa0e4e9ec41ac302dd150
SHA512599ed8e5361cb4a04943de055242fab5235cb72a57f0d0fdb812db553bc65c22e6bcef6997c3c1e9aef15819ff58d420f072889043fc9f78d936eb4faa8c4fa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8a6e9761a8059fc66a891ac672efe40
SHA19058bc98517db4fb336ada2f41c6e2418de833ea
SHA256303fb43699cd72d5be17586e6d890ce9a7d7405ee84d6d680fd7e0f9823cd857
SHA5127dae85f7cbe2db5bd8b4e6b83839333c5d392762d6d8764701ea8eec661b90c709a07003fc728340628898c7d793a955fd3eafa6a6087481eb6c75b48f606928
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d7e52b3c9de61539551062d132f7687
SHA18617ae842e5e717406ccb2e9af411dc63bc9aff7
SHA2561a0623e2081e9a9f9b8c4e8e1738dd8c961cd7d90091840e9785f93213fc6e9f
SHA5123fb860d0798a97fd4fc3e77f7588a5cc3dbc5ea9c468d8284072dd917b5f8d902c7cb9920d54b1b30ba6687f0edf985283e0e351a76d00bed3faeb913f95ee16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc0a00e600128e822071a7e0a07b658c
SHA106eb111ac37d8c6777ecc45742f22c5f113add8a
SHA256b979a1e40f15f9a41a982a30c28f332fa3a107d1ddcf18bcf3a719b52672f4e1
SHA512ba0c0cc5916d9cc4cf53d962fd9c3d1e5f3a872a322ee08d0e98ee4138c21c7a8ee9c0ab1cd24d7dcc7d57d52fb9d318b60df8c8d32919ecc0271efc6d97da06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c630ce5cb1931477261add9e4ac439ca
SHA1226b92cb81831c43c875da89391be62334307475
SHA256dc762a969adca5d8ad276d66cbdb29505b56908c19268ea7204b077c27ecf550
SHA512eacd6e769a2491b2327091546f4b336c587eff32beeedeab5571ce556bdbf0727deb71b2576bf09814cfa3a8cc8a4295bb297adb5b2e4955cdc71d7e528b4520
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa5271526666f226592dfe258527996a
SHA15737e78c0c034ae0cd88c9aa422f4b10c7ac7756
SHA2566a3acaa21a97cb02711a3039e51ce38edfb70fd6c01886233381e29d7e4226af
SHA51247f3ca029c769ed1aabad3f03d3a87261940136bbebf97b8bd18f84c85dee8824901f4bd6e9f6aa0d17c18bb3a16dac68d23e9acd5fad961c6cd14821a7c1c47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5c4aaa0795eedc48cf9e2dd0aff25d6
SHA1546b4b96768075c29221a9be51534c43d02b9384
SHA256b2a455e629437c50b35c71178acda7a21bfa4bc6565e863648a2353d3b8d8bf1
SHA512d979d805db79e0eb5e9e76d6e9bb7ed18ff830b6c4a4aa45c1734eb8d0022f8f72d03118e09927ba3d626e3d91504c5832b4daf58d58c992beae30745f2fe55b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534fa341a5f692f50dc2f72bcf7f17d27
SHA1f1d3f1c08443839623ad694609e0a83e6d0849e5
SHA256decd21f57e630c3645f4a209b1d2a69f5ddf368a8ff2fa630792215bf4d671ab
SHA5128df3e3fec020c1bb9406d239f997f936deaad49c50fd0930b43810910d2b1111be0f31252ef7ab664c8b09dc55164453dcfd9ba7cc394640a994ce5102542526
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b