Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/10/2024, 04:21
Static task
static1
Behavioral task
behavioral1
Sample
45d09663e2a139d9222861cf4ed25f79_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
45d09663e2a139d9222861cf4ed25f79_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
45d09663e2a139d9222861cf4ed25f79_JaffaCakes118.html
-
Size
12KB
-
MD5
45d09663e2a139d9222861cf4ed25f79
-
SHA1
cbd229dee3ea44fe1272c48df07bfe47481396e1
-
SHA256
1d65c6a1de45fbdbfa943beb167a36a09e71517a3029c8e0968798f902f82e51
-
SHA512
6984d6d43e9888e770c9aed9ac79ff099937c1f6a55f2b0eb3a5a1d41e2778aa80786434f59870abf0984613f629afdd10e1d5f01ebb08491c75a4d17e4daca9
-
SSDEEP
384:CyiLmE3FoaBBPdjAigb/0lMz2TRe4TotB:Cyi8kjAigbslMIDToL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FC407751-8AAC-11EF-AA3C-F2BBDB1F0DCB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 301f26d5b91edb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000006e95cc6f650184718407bbfd6e54e0ff920c579efb4ccdb343dcda35089fdf8f000000000e800000000200002000000056aabbf9035f557d5bd3af431242335d485fb97ff4508f528dff8dcc156a77eb20000000def2540dd5a7d5db42efdb3d14e133bb5ce2e9a9e46594773ace088ac55fa315400000005682358be6c667d14950e1f3545893248d39a538618dee79d69a5840b3ff04569eb7d133b33ef25fea384148545b99a0bad3b1be2673da54de9375f14dfacc11 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435127972" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1484 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1484 iexplore.exe 1484 iexplore.exe 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1484 wrote to memory of 2492 1484 iexplore.exe 31 PID 1484 wrote to memory of 2492 1484 iexplore.exe 31 PID 1484 wrote to memory of 2492 1484 iexplore.exe 31 PID 1484 wrote to memory of 2492 1484 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\45d09663e2a139d9222861cf4ed25f79_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1484 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edff71570a468ade7b985ffc7daca67a
SHA1c7588de02d5614db27f66b1ed7b7cb970d05de32
SHA256c3570a11e80e60576b1597659a401775588110dd06ef4124167564c532c960ef
SHA512ab8de370ef6f0c9dc95ad9be9b1c56ae7ed29078bce7cc45c720ff5db2842ae61eaf412c75bcae5e1ce216bab3b22d58defcca459b28cd8e1084d02972d70786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c1d398e02e6f2ca4b51756d01f384b3
SHA145a2b8a2163afa870e07461871f58a3c63e7848f
SHA256aab26f51e59610eeb6458eb1a5f00635fcb6f8d10b5961d9dca1f3b6123f0827
SHA51204e7d896e81ac7c8523a8207d5bfadfabe956bfb59050632e396d35c0d3d94ffde06fc7ade3df5fefa6d3c33db98bc5162975ff50c6719fc211e637ee6e55393
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c6cb8950eeacd4c848067c628f72965
SHA1ec2d66eee105a772471a9b9f2e9e5787f256adc2
SHA2564d433e06b0d97a954c6ef5f23c3590bd6c7984d7bb5a3c1afdfea12ed3c348ae
SHA51220363b4f73df807e9fd362124cc4a551bf6dd19d7bbee5092e34b24390a62e8b4aa0814f603b2298a79a0ca4cd2043f4e248e43419fb9db98daf18d5df30113e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597d21fe75aba1676e487f5bd95e827c0
SHA18bdd8cc9ae4511244f1e57fb8b880cfaad0725ec
SHA2569762dcd250683d9d4ca8902eaddab0cdd92d97045e77ef66789b607f162607b5
SHA51233b210f6ac90e858dcfbd03d719351b29e5d4c97e7814b139c8f88f3cbb030cee6321c4e27ad43680d514935d213d2bf22e67b151e5b25c25f9e04abd5ef9f0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc5691e56fa6b89effd6676d40187b62
SHA1ac4aa19d179e802e686f2186fc33200dfe61ea1f
SHA256d737a05990d874b006e9b4d7719ef2ce6c6157e96a361376f75d6bc51128dc35
SHA512dd3354bc315a63ab3fca485f711c9426af6f6952d2ec48969291cd580749688565f7d62e453c0dd905091bd4f8d98a0cffc31fc4e22de64e82cc73f24766e8ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596cac20291547cb8b3666ee8f679aba5
SHA111c02cb720c71a629db6aecd5058634a184401e6
SHA25659447b9b2f9fcdb20d96bd37ba2da399b17520a532532d1e98905c3719653883
SHA5122b07a622ae9c0bd0005bc4d9c0e1d6097ba31427dfc3012caec46f93cc8d56864f6878ee7b812d3b053683fa3ce06e1618b8167f215a631de707f488c67ad549
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a7afbbfe2b5b5fbde3e5d08433134fd
SHA11dbe345c57b50ba7e36cf6a1bdcbd06ac66dd635
SHA256cddcf4e1bb26ebf3eddcf3d85f8b35e9070627795b743b0c9b3d8869a396ecd1
SHA512c2c64f2ffa79b2090cd25515bec761c3acb2b54ddfc0649340f3ede195dd9849bcc9f0345d92619e4aa32ab82e3aa213c6554442cfdbb3a3f21eafc51a7a18d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c9f2c1510371c14d74c20c33ed299ad
SHA15589d2cd4422d9faf9d149a269a400909dca59c2
SHA25612bbe8313c132ea7230b96bc05b58f5f56c2a7ea21eed3be0898c719dbf9150c
SHA512aa18badbb4f0885811c90e1a53fd52c009bef8fe6fd876396b4297974f00c52aaea4087f5cf88ddb13cccbb1c036cbb3a3a574dcffbb237927b479299911b441
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffb64a4fe1bcb61358e5c3dbd2b3b864
SHA19a35061f1a1fb5ae6b52d8ca0150c4715e133cb4
SHA256f6229339683deb1a1d025c3abfd1045436f1e37d67c0856b9d70f8edc62917fd
SHA51254a1c5eb1dbae82e8469846a8df8bc803578c90017c6b47fc20e31af460e3b2ba48a3bdfa726ecdbe79048e3f9cd2816975f389832ba7202168e62dd0885fcf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d497304752bb6b5d39608b7130ae633
SHA102da4a119f674f73aeb31b1effd881e1cf8ce36f
SHA256f0697b9865e809ce1ec0e3f2ff3ca30e3834535dcb63f425fc39e8994bf16b7f
SHA512f3bf4be07d9c5a789b0cd68047590c60342aac2e80f44ff6b1b96cc454c4639321ba047420c3d9df134dc8cfc5edee833cd9ac1e3fcae4df35d50df82973a55d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5275f9e1cef3478cb2e5d20197978266b
SHA1d6e1d2245d72eb341a67136803a4e7201daf698f
SHA2566703aed629f8096134cb543742334711f3491fe097ace9b1cf71a9183ff63f5a
SHA512a40d4694bbee7b8b3dca4581caae5c220d795f7c54b239aa136ea5f9611430a6bd0c1d2f8cf2a39c811905729102ddebb34973797654a9a871321366224a6a34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb371e5bd9fc2577a051ef8f7bde8680
SHA15c650ccb02f0992e27a61c5f6efaa3936b3260a7
SHA25625b2d4c26c955de3133172f440e0735144ca26901304e2798cf581262e0e7a12
SHA51230f4e382141524eb60968f94a41a2b1bca28759a62a56b3d38a6773a4e1de23587983e8406834799908f062877267fd24edf8df907b4ae472d23be14b02555d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a87fa98e33b38f71b25090fed341721
SHA1d3616d0d8754f3c899ba0eddbf37108dc9e25125
SHA2567244718e8ab625c5a74c75ebfda307a601a9d71ffeb3a23879df658af7877a62
SHA512c9ea87e7640518442fb506b7cb8a870be6b5a964bab3764ebdba0b3cf6836afff34a1f6d561470bdf51c09decfacfc1eca7399e3514e1dd5647ce69382492f0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d998f048592f52bfdac459a36d141741
SHA1d5fd73c62ea34859720a7156dbe764b4b8eb3cd1
SHA256abde459207e5f84c937e7ac046fc9d62aa24dea5f2b2449c60ff55a1f3960eb5
SHA512e85e12641300ba001aca23ea9a2967c334c0ae6e3c44bcb01160d8d9ca94e21e885024f2b94ca69977ad64ae2cb9dabffc03451da05e0693685502df19e905f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5779618edfa92f470bb0cd4a5a2ff299b
SHA1694202abc2583b8a015b6df97809d578f130830b
SHA25654861d98a86faa445a095fcfb392b2e89e92dc5d7b26fdec7ca30ec37d35ffcc
SHA512a45bd8a291cf19015a79a15155e96b7b64a4bf24951c6494e9435909774733c54fc8ff55682248efc570c0cba5dd393d1fe8240a05e5f92f3dcad6940bf8fd81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a5b2aeda6aa123cab6407aa85353752
SHA152dc4d500842e9ab588fbb9b84b494e5665cdd59
SHA256b41203d9c20375d8d61a9c24c84984812cdada43562dcc4a7907cd7aff51478f
SHA512318b0546955cefb2b5b313c873258b6776055d36fa4d550dd1139797bce7feac41bf21c23cbffe372b8f2dd17c0d7a1454a85f3aaafee819bd4dc5b89ef9f599
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55810d53d1a52a0fedabb80d2b91cea00
SHA12d2c629988523e817e597d0fc2dcc4b1e66a225a
SHA256295a0431fb424274144e1828ce14cf45d961fd96465dfece049252aabbbabf61
SHA512a11595929bc4c236b13091834ae1b70a2a8392d7e7298e93e46f782e6f6d794c6adff98890041b538d6c7741743fcba98f84c9a73c985499e234493bf14eecac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5646b009461d5f8509933e12e21379a54
SHA168aa2e3ba7a46b111638e1a63ed64ad5f9d45af8
SHA256710d565753246e57501aa9f8232d26b66367b8a7683b037da7bed7f8c43e2345
SHA5121e0a9d3dc6212c558ddc7d7422e54b77686b3f367eac61f473045519ca895333d335a9752ab10d3eed03eb2b68f6cd92372eda71d6dd07fd2419e878e0299056
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da605afc443be5f3f1d1d3b978fcf654
SHA11d35479c28cca32d7a6a39ef8762c038e416034e
SHA256e65f8aa24c8ba2b705e47084bceeb55907701b81edd23cc8fb27a6b4bf8c208a
SHA5128742ecbc735c3d4c06baeb39a7a598e26c706d827d8642cebfa34526680f68f17aed0aac9b2ae5ed1dd9b227f39334e4b5f5f116a536bb532fb2386cd3710202
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b