Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15/10/2024, 03:46
Static task
static1
Behavioral task
behavioral1
Sample
45adab3cc68120423c35014630cc5f07_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
45adab3cc68120423c35014630cc5f07_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
45adab3cc68120423c35014630cc5f07_JaffaCakes118.html
-
Size
139KB
-
MD5
45adab3cc68120423c35014630cc5f07
-
SHA1
e42a4276b0f4ec9b27a8278b01212040362abe97
-
SHA256
c716daa2c35a2ddc8146d9c1c6ac48840ec664e40f3bbdd29494b34c3e30223c
-
SHA512
644ab235d3f94e05da89639df26e2614beb738797b6953d3e951fcbeb86a66fa6d739a4ff91e18aff6916e1173d0fec3b1a15c120910586cfbd1e580a6d18d71
-
SSDEEP
1536:SJLXdmxsJ89tmlnyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJA:SJLetyyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435125861" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e2d234a9071d7348a07c6706b92564cd00000000020000000000106600000001000020000000bf534e234161f7b325c78cc648a31265a03feaa384cf6585a327521bbdaf5169000000000e80000000020000200000009b0ad127078c62da1c2265f9d9f497a417288a415d33ca4597b67ec96089aa1a2000000061685533f2995f883d066dcaf08280e210aaf660983b03c8bdca203fb63e154540000000bf60f8276e763a3c63e5cf743e0ead595ecbf1c921d2c6fcb7672fbc82d3fd9785ea5893b77f7a720e97b731d86db4bfd814ff9b3e592393a8cfa977c3154267 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0269728b51edb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{12082831-8AA8-11EF-9AE5-CA26F3F7E98A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1332 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1332 iexplore.exe 1332 iexplore.exe 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1332 wrote to memory of 2808 1332 iexplore.exe 30 PID 1332 wrote to memory of 2808 1332 iexplore.exe 30 PID 1332 wrote to memory of 2808 1332 iexplore.exe 30 PID 1332 wrote to memory of 2808 1332 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\45adab3cc68120423c35014630cc5f07_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1332 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5343b95eee699f1aaa9ec6903215693d8
SHA11871044b66c2f7f43de995541ee22f07e2d8fdf2
SHA256ef4a379d5bcc86e0eb3c819f20d0ba54c5b4ee67a99ba6814766e11aa06a5470
SHA5122923b419f3161576e0e61cdc7e063611e765ee16a5647347b13725e9d3c066cef0a5cb8aac054f29560f1c57f240fc4f4e92d53bc0118881229c5ea499baf39b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57876f03b7d98bb683f25938d25301f6c
SHA17c518670701303733e5bb212aef12e09bdb3a4c3
SHA256877997d1f49ec3941ae287e73adbf5ef190cc9e88edc971c2408cc3a65262363
SHA512351e21fc60cdbac45c6ef390a33cc06783bcf2945ad9b31f441271ea26ccf9ffd2df1b4bc3f8d7baabcf28cbc5253d5ddf920a6ea17e889c6c4f3fb996ef287e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55990e9374d0b57b12c4f456bb9e75ff1
SHA1ddc1d1162f1bc78d16b830c0d31f8ad961f9812b
SHA25651f98666f310ac9a36ce6aff77ed5c9ff119530d96f56406828b78ef658727df
SHA512b3bf521695836de53d2527cfd2aab2ce611b180d8a45127ed694e7f43ac053ed11a553f3662f2c5fb0ec8141b7be2b116eb9169478010cea052c51eeebabd5fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587a931a90e223a8a7f82e274b8c8a159
SHA13b237703b14cfa813f46d4ec3653c67491435244
SHA256bf71fd65d27ebcd65cc9f589bd35db94da50da9e4362d6879f6243aa43f61644
SHA512c2ae8839c63f35b1e375e06fa907816f7ca0cb62e85984d2c20564416a6e2ea0b640e56bd01390b5a3b4ecdb7214e7e93e8a22290c819594fb80309c1f7f9538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b86426d710379940e3bda41e61d7f3cb
SHA169d03da7d5b3e3326b38d6adfbedef75d21cb290
SHA25670448fac843c811bcbd29652e6e7a6d19d6fbc4c29078761b377e90a986f3aac
SHA512cce1c0a825ca0b3a0c8526d131ff9d08a8ee78484823fee4822d2a738d5cfa8bfdbce9f77ba054ef38918ef4979e0b1b7ae0a5411a5279e3df4d6d0c7a7ce883
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e185a3f298fca0f8a865c0f4ecbcab8
SHA1d35c1cfc1cafd61ce3526a64de1e4b09eabf5c4e
SHA256cd4186b00be8b6270aaf68abf3c98c650aa8ed821ba206c50b341f3b8c247a01
SHA512425fd4507cef143d1396b604b2764f841c627d480b108b2122adf36fe111c75d3b61e2a97fe30813fe5310afff77950cb072690796a72cd351a31eb6de740193
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d55b9d18e86c7ff0f4715bbfe91f6a70
SHA186408f274509dd5812b4925a294c49e29f72b451
SHA25652763d2b2833a5b2f6377a9ebfc527362a4a3e9e6c15400da19c3541cc4e6955
SHA5125bc263be34eb450e3d935b7b9129eb6246d284726f1305bac9ec801260c034d0e7344f5e98b881fab56cda578326c12ec5ef34752bc1e70cc0ec1a69b4426dee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ecc392943c785e9242dc945f7947688
SHA1b142b32cc37ae4549f018e7d798da0820427ca4c
SHA2566b30a53789cfaea930867a3827001a72c3b4e8d442e56f9468df24be15dfdc36
SHA512f4f214f2aff1a11b383545f3c3a08579ee4d79e4960871f501ae97c86f5c8684e8fbe8b0254ddfb7ad72734319a7491f0fd1cfc6284fc0932f5f0ab1c92fc425
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55aa76a4cfcf25ee9df61f5edf514a62d
SHA145c3e48380b750a0f5c2b6ceddf489c902596214
SHA2566c2dee9e184e95c2bc40b3e64b8fe0c70b2e3188ea159eec591612156fb343e5
SHA512de7affc954ff16e85925691b687bd8d4f18c3b1a071666f1610032af62caa1aaf2153576bfa326922f382c6e7e22a4d9d181587592459b5ea34fb074ef5e768e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3f871cc1826d009bee6662e3a421471
SHA1a6bc6c1e242ea21029a8cfb11a83f5ea5bb3f93e
SHA256a87bdaab52ea1b02f9abf0ced7470b2b762ff453f80aaacb1575fab9db8dbffa
SHA512e95cac71faf6246a33b77fdef7ff29af18fa574e2d6a4cd0c2f68b0831eac446842afbf68da3280532cd74e7d0b2a20e08127f96fe6f4d82b660e7c3d8b0ca2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5feaddde6e390862fbe83e05c38ab2436
SHA12f346c3c65d40ce9de3c98172780f48ae3126245
SHA256ed046259f61f3a878e12480f0a3be37258d83c58849a8fdb16cb9716a7f6836a
SHA5126d48e09db7c874eaa53f2061868ef9b82efa66972256721a7f54faad3091bfe59e1cb2cb1ea051958d3e0c08482f540efc9f83d1377eaa436bb9481a3b1a406d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dafc8419fa2112821328b6c9057d7704
SHA1f36a92eab86b9277579116384fb15cf41a536c65
SHA2569569fcd762930bce708a8a77d37432c129bc604fa6c40c235377495ff854521c
SHA512ac51a4474f86220945240159977fb842ce734f708687d10838c62b4ee500b613fe4eeac2c002c263a9ade45184abd592b876634a3e3bbafe48493172494e42fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd81f40d6e3f1a89ea1bf923545f72bd
SHA16527d35b429523921a7f0258027946a11ea221e0
SHA256175b52090e29aa73378acbc25307fada7525d1b147a4f4008dad224845e706bf
SHA512827f720c01da4a313b3bc9ca1c4d2136ba520830a2348d76cdef02dcc2ab10220ae8b93c66c15583ec00aeb3be094173fe4c066ac9f2766bce49bc8c6f17e5ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b48a55731600508e63a1c953805daa0
SHA1e138ffd9f2f5f94060c1102df1bd756490e5348b
SHA256bac3d61060bb4f7b39b1cc3a8ab2bae2c091e44c1dcb0fd9c0209615c6e0c6fc
SHA5128d552c1eb92667918883f9aede3721e1e8c76b714fbe33b84359f9afb9871d5b168e27f45e41922ca295c7c695dd1e8baf7295de152ed4b76cc01e5a3fd0a84c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574b55d403b6593340a75c18f16225e24
SHA117d01265f27728d47ef6466a785ef1f2ee2a6c68
SHA25609de1bfffd795df0292ea48fde59a5798312bf88c1a8b14e26599e65afc22647
SHA5129d444f050a4c4de5d6df5685229da3dfd8a60707078be4a830e0d88120db4957ef3b849134d77d5187370792c04aa7c9814d6394769041e6fc6ed62f49aed34e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5509486fa1a07af2b800fbcaf2f9c05e6
SHA16bd1ce8cd5e490e31cb43f33cd811d77ab7e5e14
SHA256496067e0c69be9d51926484e5ff24719003b5207ef51f4ac7c57dd55ca6e37bc
SHA51212862e9fcb02a819e0f6ea0485f25072d6e0a696c1623730705741ad3723f6816f21ae9554169eb796c4727365d8a0ee46f07cc3cbf4675df1baafacbab025a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de520b0ddd3ebbd294e275598a16ab19
SHA1fd6302c17464d7ace17ab77ba9f8178e14b091ec
SHA256a18c8de356094cee07c81de37b93dbaec4d227c2a9b6f58d5c8d291ab0496605
SHA5123921d634625eb7f1db854ea285f11f41d9e4512488bfbe833fbfa4df0c4f9266f7c8c06facbad7d1829357724e79286c7691c49cf9d8c14761a49910e59e7501
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b