Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
15-10-2024 02:31
Static task
static1
Behavioral task
behavioral1
Sample
45638b1178c199427c9688ae4c052340_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
45638b1178c199427c9688ae4c052340_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
45638b1178c199427c9688ae4c052340_JaffaCakes118.html
-
Size
106KB
-
MD5
45638b1178c199427c9688ae4c052340
-
SHA1
7796c4cb0681084737f33f99575b78c07da13507
-
SHA256
770feff91422a892b78cd832aa33b2f4c18b5c5e4e6d5d34965e940bda91118b
-
SHA512
b57a521ee3127f58c7d515c935e3a5923386ebaabaea6072c5c468c0189aca87475784de33835f03a7979a32b68c70d12d67def6c4a34ea9ff4c603ca93d5d8a
-
SSDEEP
1536:R8NzeeReemee2eeueeFeeOeeneeFeepee+eeveeWeeveeOeeZeeDeeyeeZeepeeE:R8WTKkfUGWyn
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B46B7331-8A9D-11EF-ADEF-C2ED954A0B9C} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b9600000000020000000000106600000001000020000000fa23c584a7dae5914fbee1ad68cf0b72288c2cde252bcabd7ceae012dee4cd15000000000e8000000002000020000000ab40b194a743def98fb05aafc2c14bf50d9bff835bb576d5ba8a1f2cca82c14520000000bc2594bf0dc2172a77e58a4f67b8109446d405a61505bf61e6322b34aa136b314000000090fa12aa0c04b2f96e9f1b77096ced1ca55a60c4eafa2782cd0588314f2342722b46a924aae3d2547b2264f68a8b140421f84c2502c8ad90d692519cd5778baf iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c00bb08daa1edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435121410" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2360 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2360 iexplore.exe 2360 iexplore.exe 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2492 2360 iexplore.exe 30 PID 2360 wrote to memory of 2492 2360 iexplore.exe 30 PID 2360 wrote to memory of 2492 2360 iexplore.exe 30 PID 2360 wrote to memory of 2492 2360 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\45638b1178c199427c9688ae4c052340_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2360 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9d4ca098f994b3be04d1b22b308b330
SHA1e87599457051773c301542ae438297619ab71e26
SHA2561c9d02fb338894522e8a671cb892ec59d72a21bf290a38f2a856f7d7c273012b
SHA5129a299ba78fe11e9d65dfb67e1a6ea30ae28f8c00d9fcabb332fa54f987c85d12f56cd50bbea1ea3fcbfba82bc6656ca4fac324b3b45187f690450a09c67b468e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa603554481373f2d11f48f0d9e9e829
SHA16f8fc67b2bd459523323428489cc1f7bbb796ffb
SHA256723bed481f0f4828880e72279609b6743590ba3a2e2f016a70495ba81ff3e007
SHA5126062cf5c411f44e7c1754e70ea5637587641abd28867ea1f0a3042536fd83903c0904717660c7bd4020c3961cd2cf6191ef552239548636eb8d1a37781a6ad20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db77f67bec16dbafc7c65179edd80c30
SHA1f9c33cdd7de380f4da156e9d19b6d328bfb43947
SHA25690c815684d231f28e100327bdfbd3fa08b8c9f7e66d985ed3d12d36874e2ed8b
SHA5123f6d601af73fe4b46a3b6147d62849a271a9380851f47879304761fa93ab6b40bf4ea2100590630392818818700fd5f07b400dbb3167ecd3919cd3afe894745d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553570792935e066bca92c12ff86f2753
SHA1563054f458511facf803f6edbb940b2d3a7069e0
SHA25612a1fb0b0b97499c7daae7d07a2b993beeedd24c8c19107b4329bf253ff27046
SHA5129138ae55e6994a3579f03a8417cf87f729bd1cec72d38ef29e842b7cc9fcefedf7b53dab1a9c0e6f58f68fc052206e52f72b58510658455311196d2b6959f770
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549a14331bf0e263f964c7bc20a2f9862
SHA1e3c61f4d3678f97b8f9586b772710b2bed10183b
SHA256048a2ab77c082f9603db38a5391c6b918d8c8081497e103813a1b24952533eb6
SHA512324b3079ba0587d83eff2b9cf18d096c7363a7f49ce4eaea47795ff15ad8c69fce36f8ac1786bb08b172ef443cd00c88ac7f615a420e11bd195da68e3e3d669f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8bccb89787d0805913a53830dfdbb32
SHA1e8c6cfa6387f3cb45a5d92cbf7d553aff606d8d4
SHA25663be70e8b1d1a417a0ccef26eb327b72bef9cdc0bcc2ddb7fb99c3ba14e8537c
SHA5126eb0aec52039fb1a37b895d8519e6b4d179a8857179ec7f10ce56ccd2235cb1adf0364c96807750baf9904aa35446db0c583e0c217d6b2c1bd6771c607af4d0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9c1b2fb208fcf3d00756a85a3fc50ed
SHA16d12c8d59c65274cd977bd7cb2f2f0155b8f7ea6
SHA256a7688683f01fe4b494c13f6a73a882c78f55a1a4dbd10438043e3c1e2f466fcd
SHA512d86aee7ebad23f3375dd24f082c676e587d1e721eb4b50a0ff7ff4bcac87ad6d7996f8bacfc7507596d555e0e06f2e4c9984b57999a75255beb27aeb74f9b019
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c95bebabeb9410fb80ccf8dd829cf720
SHA17872f8a5a38c59e085cc5a24c15bd62ee763d934
SHA25673b495f868ce60834350a57ac38b519a04e55ffb485cfc07b9035d33d83ae893
SHA5126207b7a9ea2d8e2ef0de269069fc536202a3ad0e79596be7f714cffdbeb550b107bf90439eb5c481dfef05ed3d2eaa208c6e599086835b6dd4ff9effe0137447
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d061a510479d81f80350859daa4de2f6
SHA172af0c9caa2aa56b31c0a54652acc73ebc6f3789
SHA25693e8163a6d315b7e604af86bd8e01f00132a4c36fc4362752706369621e22e7c
SHA51234a541b74ce1d716daf1b1132f427ceb8ecfef2eed58870f0c2fb82f46012cfb36c243c2f99e75eb34a41982a310ffe1903d87aae9a05b2aed1898c52d9a281c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f1ef41db4023ce12ab7fd6f4001ab32
SHA11f851a4d15287a55580abf151cac41df4fea5200
SHA2564caa6e5de4e51121add741057b8d4f5d2868d251f9f2df39709a67d12ac3fb06
SHA5127c6768fe882e9ae7451a18c38f5081062dcb07bec3b84a9b7769041362771269553b38886e6c0dfec8b44bf928e728e3c4edbc1b2e6a3d58ff1f4ef7d77a40d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5462603504e859bd439d38cd07525ad92
SHA15fc3954e3130f59b65381a4b338d1c3bc47ea258
SHA2569013d198801d31307f14294986e0b26af2b930584a8ba84a1b6e24ec021fb0a7
SHA51279d82016398a6ef8c78bd086d595ae5253d2cd98668e1853c2f1c7da94ef142eaf5e9d169ada86821ecb21712c3ce09f00b3fb5aec20078524641bf686433a54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5187f53c429b0305a4838c6acfe8145c3
SHA19a927722e480083f87b43cd88f09dbf9532e839e
SHA2560669da775d360a2d1b783075b699737d76a8c7a620750ff56b7e5c81355cc3e9
SHA51262485f968fad8bf9adf3283cc49ba934b83abceac64097a8450c3ac56ae154519013dfacfbec6b276f84e2051c82c2bbe26b7feb99fa784c47e8f861d64cb96a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0bda7c4857158343f0998e7d50c5215
SHA16ce8c096cfb1e4519291c1ef5ba45b07b82aea0a
SHA256551c9ed00ca7a3d99ab5b1df72ff1c2794247beafd0d3c6c5b1173e60191b02c
SHA512570abe575727d942ca9d6a4d9313b6c9f33a42c89ec8aa86e1779c5fad9eeed04e8d61c9a775c194329538a036319ff42bc56fc935ae5c2440ce8784c43319e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8b74638aa873c5527b01925f7809f81
SHA1a97734ddc86f7571b4fba0f62eb1cc82dbe5e343
SHA2562345069e49821d5e37de28ba90399bf67a3bcb2e202cd1024c77f7be6dadc4a1
SHA51218c0aa0eea13c2ea47e0b3b3c72076fed5a0dff2aaec4aa7e474a00141f75c0a926729e995af2233d1bfe8cf9138e076aca71647a090b106977a08e35ee1c17d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de15208bfbf56b2eaf0185a589b7f443
SHA17d91d79df2261f9481a10b6dda77b56a336449e6
SHA25654f50daee9613c7a9fdfee107990efaa433e6c95801f656ffc1e9f7962151cba
SHA51297e0038a6139842899c3bb697d52592f4516a63c249ffaee96840a8bf80d6c582c856895512bc35be1703748c8b141d8e3ac817e52a0e5a56cbe16f135a20a5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5350c77a5a87b690505f3ada44d3c4738
SHA14ffdb6fc9b0cecc31e9d7fc43161849ae81fe1c4
SHA256134b63e894c2d2709ad37dcf426a7ce86874a999347e23d045b58cd95d8dc67e
SHA5128d0d8da9fc3bd5af1d6b91d8f8ac48b6f5e6d358a1a7c137d74d324bcb89b6f4960b33f8312daa4714a43b20ee8c1af51478eeff653e8651c20bfa766e5aee7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546b82b0f241fea69cf350c1449065122
SHA1f6beb0998484fd2ee6ee1001f5b170e8b89246c8
SHA256ad82182e8f7984b52eef4f14739b841007d25f5c37fe2f7ddffdf314a66e5d33
SHA512f705455b0a008add380514425034550ecb33cb8068b9540ca913ac7d83698b7d1ef2d4f54c9d6530ba50d0e296f011b5f392f6c82be6ab6df5e11a40a639b1b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1064de028e5e7309bfc12d86eb63e14
SHA18bc59fa6f9e92936a046eb09563e599ac30519c6
SHA256b7e96579aebf42b7d3c535e84c6f20b4d20e8cdc1427ced72c0906a059135622
SHA512d671d158178fa82bca62d7f61bdd0f895eda8086aa660519d1c32ec5d8fe06fc16698065aae5d605d176b7ebad6502bb6bca5770a5ddd574681b58e399a81084
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589d3cd54b0a44f9a056eeedcf3ab82f9
SHA10510e85455856d23820b0fee29ff2ab4d6a64b3e
SHA256213ecb9ab3db1fb6e0c85d6894e852a3bd7a4292cd602a78d451108642bf551b
SHA51250535fa18406216d485e6c9a9d7dc6e3b4125f15be8035a59473d66f0723631ba62fe90c39533e948b03e5fa861698dc303fecd329a1293948d1988790bb4ddf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554425c7a02fd1274a5d5ea89d437afc0
SHA116d42a55eaa5bd7ea3b480201904ce91af8420f1
SHA256a5d74785778c4b3462c47bd5ac6056a1ff7998973c24160f45f9ae89a7891f02
SHA5126705b8a2c15539087a7c6aa246ea85f37ef9c94c2ae29f80ccb3491d7c0abf9c0d19e364be18e776077c96944df94d6d7a9b5eb39b9e39c0a48f15f09c41ef84
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b