Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
15/10/2024, 03:34
Static task
static1
Behavioral task
behavioral1
Sample
45a2cf05c676191a6366a80a369c3b53_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
45a2cf05c676191a6366a80a369c3b53_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
45a2cf05c676191a6366a80a369c3b53_JaffaCakes118.html
-
Size
13KB
-
MD5
45a2cf05c676191a6366a80a369c3b53
-
SHA1
d5c7fd1a8149c7af23600d50495c4505ac3dbfa8
-
SHA256
e4a9230daba4e2461b4c7fcecdb6d2511a9c1d83706ee053c1a36d84b7515796
-
SHA512
89c040db90a6de51fba9e906b748c1ed90c154552db8146473a22d450bc5f61ed34dd03593dc3a0f31467783b7b7fd092bfa49b015959285ccbe68d396e3e775
-
SSDEEP
192:5pQHH0YH0lhhvaQjf6otcDJyjXIRKDvo/nymbCf9jmJRorn80xMYfOJ85Fg4suAh:5vYH0lhEQb6bDUFIABooXPwt4sXh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b1319000000000200000000001066000000010000200000008295e66ac0905b1c5bd53bdb0a5c7024ffaaad290a334ffc83376acbc40d7d26000000000e80000000020000200000007a58d834d78f1a660794b8075d416790060906eb6b0c6a6eada11f37866dbb2220000000629a757c64f9509f463ece11d1027fbb07022cbf4bbffb9d2fc0534b4366a0034000000079b01a19fe055a57f85499b90bd2e3d5c407636d91e245fd7e3729d834e11962ce7a489d5e1e9d79969b2d57206e779861578e4722a15165d3ab485a9becda5d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435125149" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20132d46b31edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{69010F01-8AA6-11EF-B232-FE373C151053} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2052 iexplore.exe 2052 iexplore.exe 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2228 2052 iexplore.exe 29 PID 2052 wrote to memory of 2228 2052 iexplore.exe 29 PID 2052 wrote to memory of 2228 2052 iexplore.exe 29 PID 2052 wrote to memory of 2228 2052 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\45a2cf05c676191a6366a80a369c3b53_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2052 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542e929758a4142c3d8a1de9db65bdb11
SHA1e604295c2b9c49f935ec6e25bf88f71c8cda46c8
SHA25689cc32fa12b87aed6058a48f03151ec3ce6c478c181bad32797ae343a387a4c8
SHA512569b3ee5ca1f22e753712b7f6b85739d8a4074dd714e5824ed455b4d2a65c3c564fd83a513c0f36e89201651d95a15a64cd1c884a04e0e77803d8731f37c0ce8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3dcb7e49e5dd68a7c8b27ea210fa3a5
SHA1f49a3f4688e2bcc32aa4f54e8353df5204a9ad85
SHA256530dddc03c2c72a88fd25be1006e56bf35736289f461d58d9b71ab39969419eb
SHA5122801684cb12db0b5f7e105c88f7d243eb9db2318d725c4fede6d827421b616d7cf6f85d8c7d900160091ee383e66afb291ca9c361212ec68984d8f070144f4e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50707709e2cf461dd7b1f96d0b13c7384
SHA1ededcb6b86df81042dd3d246e6f5035201156712
SHA2560a4f14b0af3e49877b6d7a51b1f22116fd2ddb64c0c5f0c254d4129b45c7f587
SHA5123134629a9bb13f3328b61200caa2937871a4da40828644c6d6b7e0558152658922ea0667515093c5f7f700ff87a767a1ea2b121b210184319fe2c6c2b278f2c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca712d5f35bb899e3aff67cc847bd5d0
SHA1179d95703ab7c727e1be5ba6ac65353d53a3b03d
SHA25652c31046a6826dd9adb99d40e96ac544ab9ab4178048d9d1e00f32d676e068ec
SHA512b8ab6ea188334f9e8790e875b4685c52234bcf4bb548e89716f6e78a89bf0ae3e4791bfe08244c16a7a404eba5e88528ad84911b3358c637370d0613c0fc0d6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590eb6b88a6943254e98da3a39d545ea9
SHA1ae3cb53222f0199a50939d01c5565381f9a40055
SHA256cbe86173951716e9aa61fa2384f39abfeea6a2fdf2843d7fb86e31b5b8aa4d1f
SHA5120218f644c1d3afced99b1567b13ce35a46841ef577ab15ca14ff37df89c2b2c7684b22006ebfeab14f6edbda5d284afdae52e4f0479860179a9a8915ddd3fbaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e83061fad4d7afcb5374c38b5be7a953
SHA19ff0febb340128ba6059fef12bd294ced36d00cf
SHA256ed62233a5a33db7d23090dceff9a3765d512e7d944ac7861c92a7d7d2bbc1974
SHA5121de49665cb5adedaf19272cebec90c43b08022eef97b387844a5c470d956d5750075877e6fe3dab59be3549305d0fb424031fa5e7bf1bca806f168c7592a0d56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552bd7bb07c25cb8df30e8825d7eac953
SHA16eea84bd54585a8797d7cc29ed547f4761a73956
SHA256106fce45c18d96c0790c8c93be37d1a521322325f76a869cf7d6084473fd8b34
SHA51293cdcd9cca109cfe920d732cf556331b17d342fa4f6dfbc629fcce856a4ce96aabd5f4924146f34cb133390d7d4964f62647271b9dddba3658a0c294ecaa8cb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54648318829afbad9f57f35f4af962607
SHA14df22630faa22574faacf03080793f8d368ed3d2
SHA2560901a39faad5e82cfce97be84417aed9c71bf5b5474b3a6d6e270478cf2491ce
SHA51286f49db6b1ec6349c6f9b7fb96a4cf4283e80d6b2269d18f2cc4a7085df6723d07eb9d214e99983b9fb097bfe5948336cd92b16c740d2a379a8b7bd3a0682875
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4b29034e93959c9705ed3cf2041d632
SHA11e4ebddbe019f6ecae133df6dc49c359c4fe78e9
SHA256b551937a65ca38981beff40d1a264f46a84a359eaec543c47a0e5cf19ec28cda
SHA512457b9e70ff3a99ad86616ad9229639613de12624b21e57368402f61bf32919bd74f89c320deaf95dbb6dfd46752699bd3e7bc4f784d9196b077be653b06c351d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f257b81ac28af5286c84b37b0cace3f
SHA1cbf0b5a46e41243f0dabd5a372fc505e3eea6aa7
SHA256b3e5d5d37c996f3d39baf0198cccefd4436c65d260e1cab34ff4b0c845504e0c
SHA5124a5bd1b1b3db80dbeebb2f38701a777ab2f27b16e503797151cc32648e873ded5fa9b62137262baa358cd1d004fed03bba94c59995c30c015b8fba448e0e5c1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9bc512632bd5cd462fea2b2e595bbb9
SHA1d9501d035ff11097c8cfe65a2a0f715b58a36353
SHA256aa46fe4ac69a8c0994637fa013971c4ca2e176c3582d2739abe6bb3e54d06133
SHA51238b457106e492cd3ee4489511e377aeda9915d88434c50613d45e7ffd796782b7f47968d7b36cd49e47cedfa3d58121aed68856ade9a5e59e97767e72ddf4701
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f22bcad4f7bd2040bca97184f7bd99d
SHA170b2dafc9f359215fa1c59ebc07356bbc4a84e58
SHA256d9f25e05ee96ce6194fc0951ddbaa48d8ffb910f2beb29ff13429d14308c500d
SHA512d0da503d0d5ee90e6693ca94b25242b3e83e94f7aac3cd62a5853d0bcc6c3db4d00252fddaa7d0ab677f7b09536cf4cfd4b2d4a3fcc0a5d3b23dafab93dfd52c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5340d41712af38cb258c188e274f073b4
SHA15de2466bb4a840b17d8b73968c7569a8f66ba091
SHA2560831351e2b8fa3852869faf2dcb221b45e05a212e952312a1e128e47348c18f4
SHA51263fa16829aa8cad635d18f9f3ed44a938f39b960a8da05a6dfdb4ecb155e4774e03859d93ebf33f509da7db9e5403cd28c702c4ef36fedd1f0048374a29f218b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549872db35b67b013c5e29dfcb2a3b623
SHA1f4ea8adb767d50164fd85b871a5fc9ac2733eba8
SHA2567e21b69d9f30c53d93c73da10938351e753fc9fcf53b7ce6bd64c41a5bdb5258
SHA5126657ff7aaa18fc8e9aa004a3fb6cb2421a222f0b4578b0cfddbef6647fc27aedcb36e79638bb8192e59aca5dc48f142dcaa98c619fbcba37ced4c1f335ce1bfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f772fdb9d73e872f62001cd95260ddd3
SHA1d4fe2a903d806ab5f1c713e50335cc5c00573878
SHA256840fd40e1a395d534f7f5e74ed20a43df80fc37642386c08af7330ec4ca33fe7
SHA512c81675ab77b26f81185a1c580cc3c742ec61e7b85eed06e1b13b1363cd13556a1b8c55174cf24eeb48cb1e7f85358b04b5db8e7603f5fcb492d9f74e48ecdb3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579e89142fd0ce2bbe4bc89c94eed18e0
SHA17581c268226f21a3c37ac4024867db1c76fc410e
SHA25632caf60ae70fbcaf9584de6fa3964397f2030f851896966100293410c543b54f
SHA5126d6899b9c400e6c8961bf96bb842142b0e4cd82f262170ef8a019d8dab55b20a6d1088268562a62f8477c9882e659a61fae33f96f69e666d7e6db95494688cf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5496069734934e8dc6ce1f0a8cfa31ad6
SHA1fe255555ca3c15496bd7023e5b195d3a1b318129
SHA256da0d933efa05fa8d3230769db766fcf8c1167bfe7e0f6b550f0471f8b696f18e
SHA512da5160fc457b30e022d7e23add8dae4085feabba83a0cce1a4fccb1e7dee49f0eae914c38da5dd0e83fa71b89f8521a8993f11c01b71b5a713c6f1321a9ffaa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50900203bd9f15ce6f81bf911c549d434
SHA137f4c1e01167a66e6b9be77ce301e76d935615ae
SHA256b361f2cc1d9c7e74053eed0bf6c9a33b3d0b56811b9f238a5fccadf54c1714d3
SHA512b9f8820cead357e27e0c0aeb5ba4bf1a00c07fb4e9cc0ff45391f7a47a387f8878e2e13aa284bdde245f43612e6b3293ebdb944dd5eb741b4330c84f93ca2f86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5eaaee3576077ccd372e48c62fa1795
SHA12a88aa5afe4ac2ec5ebe4eea4d52a6344086417b
SHA256970bac2a7da511314ed24ee19ef6c9ff2112062f770890086787e5a52a26257a
SHA5121fdd441e365a246a1f9768c636f65dec0ebd19fe75b842b3e1f23d97913f1e5e4270045d2af1bf288ad85b248b0d734f8486c8a9d3ae29159ae1b0f5a4416dc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc48487888417fa7f05fcc01d8ee6aab
SHA1bbb093a6cfce572524da3df7b91dcccb5e795e2d
SHA2567fc27303908f88b592825dc7b0bea6c4a24a2ce78e49198cb8e1c7cf25b41f64
SHA51214cb4eb04affd1396e8e6673a6a8a76bea1ae5d38ca72376bb035d403620613d2b68055b29864c8f546c7f5d88a252e2c7a3819f864f1c877dfbc711f6817b37
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b