Analysis
-
max time kernel
136s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/10/2024, 06:17
Static task
static1
Behavioral task
behavioral1
Sample
4639fff12079efa5cb993560e7501c97_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4639fff12079efa5cb993560e7501c97_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
4639fff12079efa5cb993560e7501c97_JaffaCakes118.html
-
Size
140KB
-
MD5
4639fff12079efa5cb993560e7501c97
-
SHA1
03ee93fcc5956231ffb6624f0e71e124d9784873
-
SHA256
a2451065e84c5f09224ad66dda8ee533112a0d5793bd8433a96675a2249c2534
-
SHA512
754fe397d09a7201a655ad3d0009185721a853670d258dc571d707ba8762933118f7dcb8b6bf651a98733c1b826e57fa39f8a612dd1cc1cc82ddce8a44357d99
-
SSDEEP
1536:SOnZCmR8ppChYKBCvfwYXUlYoLkyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EXe:SOnnO5yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0bb6334ca1edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435134904" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{20A885F1-8ABD-11EF-9C5B-523A95B0E536} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000a0173d8a6d66f4952cb9fb145c1d9acbb0f099d3bd1e3dc125a56263e2e80139000000000e8000000002000020000000f37f86499a612c1e193e1290d415d81f04ba3af7a9b625239d0b2e2d873e48402000000090866d8d26b28455426cef64fe67da24d33738fddfaeb5e450a69c06fd765880400000001c89d7064a8f863cd3aebc897b05ff60ab270b93aec45d7b6025f97a4228acbba13750deee753aa031e792b9e7109664cfca2e4a5494a8127d1fd482b680e568 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2224 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2224 iexplore.exe 2224 iexplore.exe 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2136 2224 iexplore.exe 30 PID 2224 wrote to memory of 2136 2224 iexplore.exe 30 PID 2224 wrote to memory of 2136 2224 iexplore.exe 30 PID 2224 wrote to memory of 2136 2224 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4639fff12079efa5cb993560e7501c97_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2224 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8fecd3c4ac827d9869b303ea045cb82
SHA1eabcd942f1be33652643e63f1b0408e3ed7c4466
SHA2562524295e515648062b4e46c42c3687c2c21674c66d7aa7f8db3c91370545fd25
SHA5128bdb5f4824a02f65dd9c422adcd32b723c2ffef82218c33d948983a36a785e648e7b3eef8381c7feafba305c14823d9f930c7914fcfe02b944fa8e05f00acd05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd7cd44feea962d91e1e2c2bd94e517f
SHA179d577891c6cf30bc54a0f2dbb9152db9a8a3961
SHA256fca1b4ebe58602ca6d4b91e48a6fdaa624b307d910b0a9c0b4107b27a37d297d
SHA51285024a18e4bd914c0887496927a3f934ffa56ae381fc6d5a3de7d9e03d2724263f7a5e856a7c6f043d7049885a7b049c9cdf0efe35746aa14ea2d25d21fb9b70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d6fa8fea3960565b8e2225ee3b41c84
SHA10f208f5fcf6048636431957304db29492a121157
SHA2564c1ed4360e1bc6e77744a57b976c9e1845433dfdaae1ee87773c21bec6f2f84b
SHA512823f0ec3ee076bae7b100b21f5e0fc19247c3b2f44409fd491ba07d8c0d51459ab5081fb4e1adf8c2a8601e16411fbca78d15a3952675ee845a197751d19403e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541d1581e8444b0e0d9cca77d2c1cc77f
SHA1e5039e81feb90651ac565465306c481cfa473d1e
SHA256e0fb545469b4c5ea6022e03d6fc41c576893f7fc23ecd3ae8a398c8a0a4a4804
SHA512317c3e7bbfac50e244b73424b0c483547f7f73f0e4ab3fe47928bbd8a8e68b613aadb73de7c9be44a22c2d37c62d0844a99d7eb675017bd53d316c6418aca005
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573b0eb87a80de6e8e40dfd7de781d3b4
SHA167b1ba1faad02433c75594ed926c9e7cfa51f8f2
SHA25675fedafbb384551e5584a6c37262445e56b55a0b0393970d3c8832f515424161
SHA5127cbc650364b2633eb316f3e332c69615ac45c692210367c2a3a176e642552ad4e2899311aa75ced36fe9eefa4cdedbf1664930983ac65c2ea92c0706d53c7836
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cc3d79c303a120b05828d3b95c0ed7e
SHA159a83dd0021d08eee4063237063d8be684faddf4
SHA256ec06f74134f17da2cbf6b29e0169011ba4df478746cf34876374295c1cec098f
SHA51238090a265a2b2b379f4a0db9c9434a1fff8a075275fff3bb4565310e68ae3d5c40cac35430323b8bb41eaa2136ea561081a38baeda47777ac22f410860d77b08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562bf69d7c41a81bf3a05bf573e5f7452
SHA196aba9723c16fd559c3b03524ad8b49573614ce8
SHA2563808e57bf6fe034c0caba7d1ccdd437f4552583667aa91c1f95ca256a99233fc
SHA51222c190763e3d103bbd6ba772e6de84ca5c45e616a5b33f86b61cbdbeb2ef57a9085687de4e3a1cd56ba4f7398504f183115811b5b1e88b124b79c08a60780834
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f1413c7eb0493a4bc83a2134dedaf40
SHA130eefa75d543eb0d13cb471d3229f1d4006d7067
SHA2567c4de3c422b19b9d047172383e39bd323aa783fa31100abe000f4408ac000a91
SHA512dcef24a3fd3a9e95fdaf92fe8e70e115d9128256b448ac4a4d38f88dbe1924eea929464e3f07540e32704697c0ddc3c51fa192162b14936910b4d320eb89d9b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5873c5bfbaa36a816ef5e2ddc99824714
SHA1537557189621661c714aa346515f57bcb9d5217a
SHA2564955aac61badb39a568f79f5793ad74a37481c2eb2375c91705a369dec73d0ba
SHA5123ec806282b1028ce34088891aa6299462d1bfb091817dd1b764b18f8a3c830e61547e02a87dc38c7708254c9b2a70550a613c8dbd2c48ee458a8be8d9780cf33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522ea7ed55d916b36e5084bd2a67904f3
SHA1f424e835019908f80b848fb5089650428211ae8e
SHA2568dc59f4a4de139ddc7bb6d71226058e0f659c8ec266df554851baefdbdafd918
SHA51244a5f70dd05b182f14acb1e5fcd91aa363738348748f71897b366faf13eaa885bdd979b9c9d1e202f86afd938c3fb9c7d6d08dd816ce363581853369b723abb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530d9b0ab82610f79d38b43906ece48a3
SHA18e780304adae2f0d55108c546d33acfd52f270f1
SHA256e6d291ada1d9ee29f114ca869764ac0789fbbc762fc0015aa8ea91c6632aa53e
SHA512703c7a2c34abdc57f6a872e8f7c0dc8f1348fba523dfd1c373f5bdc1e88fb36f2e18925f1e25aa9ccc6e88447b76d61250599fdba4c8d338c34f2028b4873673
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522f966a6f91948c8df97b57670f1bdb8
SHA1fa8f815fd73cf549b6d964e2f8231c840cbdaafc
SHA256e9bbf41176c7d3a3bf1618f9d96f4a9bce85d52ba0a296f86bf59d21164b08fe
SHA512a7eda90a4856d1e9eb3a54c0fd384a782fe82bd937736434312e2a382471323fabfa6e28db07953fe6eebdf347835fd638f0ca32dca83d20f5647bcb7a3da288
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589f22849be965fa5093f261c522341a6
SHA15fdae6b889ae9fcbb5312b61df936032be03f013
SHA256148f038682e95712b69ea8fcd7aac970f6e027b9b435d7146b68834f61dfbda1
SHA512f34de7a25c542e08739d7f695ed15b9eb1ca369550913d365a0ffdffd79e944ae68fb10801894740394965ae531182ae583fa24fe1c2213537f619bff399bf6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a2ceccd4db628233769cb77a337bd97
SHA1da4782befffcb827ad14ec624db2b60082c4e342
SHA2561b6b18626845169a853514c4093be6fea6effd7ba0c2307647ebcd351ab06a0e
SHA5123789abec61dd6d9cbf10db5919a8740df085a7ce2e498e262042cf7e3337a7063e058623c4fa5d77149564e6d698feebeff73e4dceed0cbb079ae319c26a74dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e17218b0002c7467f4b6a95eceda0e4e
SHA1e7f0d6897ad09e3b18040d3b7152df4e425420d0
SHA256c768905026ba30c82ecde3cb9739938f22c0dbeb17a8d593a1469848dc6c4f52
SHA512315a7d6b1d5f6b4cca710303f1f514333a3cfa3e33810e69908cfbc8291b771aeee5958355e5b5a658bfea408a9f934ddfa86e567d47e6e9b32c6c45b342bfe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535c56fc3b2ea65f5cdf71363862a41db
SHA19aa953384de2d00eb98c22ce1675d4a51b4ef478
SHA2567b4b29c1eb0751077b73a1deabe5113a8cfccc0508cf5bd4f35bd88d4b66838a
SHA5122434d43ae2978d73bd22e0b7188e1600c92477cb4c7e84f79df8860fa2272aa7c550272e869ce0627393c828ae7fe249c0884fec4c24e43032fde17a7ebd5744
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca706a9dc65df666c04440b9e6d3b64c
SHA10df03c145f7d07af4edde95a5e04ae75e0ab3bc2
SHA256422cd164a68709b1035ef09d4aed6584c829796cc50882de9eb235bc2be167c8
SHA512a59ac519d542c1b9ed748784ea3aa7d4dbb848b31cf638ba7354c2772b91053a7939ab90f084a4022221ceb24f0406c18651c7c335c107a54969db320b14c4bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d40b33304189c0d7c53f12447cec0df8
SHA160cb019cc30e31827e1bca92c2655bba6b79701d
SHA256ffbfe761f508ce0192fab44a306a600c8bf0fea7b8e4d3384aec3fe1038e77dc
SHA5123783d3916b3f5d88279bbb5e8345b62b20c381cd79467379b854e70ba339818c65bd13f3c4af25eba0554fac8a9c7a70ea902a81df9a5c0efb95e58bdfa0a4db
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b