Analysis
-
max time kernel
139s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15/10/2024, 07:06
Static task
static1
Behavioral task
behavioral1
Sample
46676073140a6425120ae6c12c12240c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
46676073140a6425120ae6c12c12240c_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
46676073140a6425120ae6c12c12240c_JaffaCakes118.html
-
Size
139KB
-
MD5
46676073140a6425120ae6c12c12240c
-
SHA1
3c17bb24e7ce58ca1a863d9ca5acf81b217f8d2c
-
SHA256
153f5d4a1af0ef192036e4c505bee6e66c9428c24b74892cb0881abec333f3d8
-
SHA512
52122f7436e962974b4ff28694d735861fdd35c75e61cc10841f3b816a56f58b013fca400597621c93fc70569dda2bb799aaa19903fd3a6ff330bec69ee91e1a
-
SSDEEP
1536:ScR/OvBLUlbcyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusG:ScovBLMcyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435137848" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000992b93dfaa853e439226ebf1780d2a450000000002000000000010660000000100002000000001d34cf55359d212a585cab6933a43692ffabe3fdae50994e014689181f8a3f0000000000e8000000002000020000000508a86718a43c80353ba7d82ad7d413d60f6b94230cc7adf5f56df912995d2912000000092325d346d22177eb6c7beb21821a85c57531da8515f179e2b2aa6d3abaa6db040000000203f93664cae134666ca1a6d0b742fb6414c3d000f3c9fed18dcceb2f4ada4881cd666d25b61568e20c60960c88d311bfdc046f5c2624a78272aa2a73338d508 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0060f10d11edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FAD89B11-8AC3-11EF-9A0C-EE33E2B06AA8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2528 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2528 iexplore.exe 2528 iexplore.exe 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2420 2528 iexplore.exe 30 PID 2528 wrote to memory of 2420 2528 iexplore.exe 30 PID 2528 wrote to memory of 2420 2528 iexplore.exe 30 PID 2528 wrote to memory of 2420 2528 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\46676073140a6425120ae6c12c12240c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2528 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2420
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565d957fc0841f73153652f966841ce7e
SHA1d1367337ec3ec50928926345c85e3e7297d50dc6
SHA256d83290145ca416ce37fa3d0718d9b794559fb54415f94c907d5b5cc2b49bb031
SHA512819f722c10758c43908a365bf87585eb552e3f570d0ad56ab300b55d3fba41d258a748ebc499445a364b84e8e764d6c3a4a699acad8c6a82a2a230d40272a261
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bef222e576ec934600e45fa9c7084484
SHA1c33b109120d41d83114c3be5962cc9291e54402c
SHA2564fcbf7bd24eadc62123505697f303da575e76b17cbd17c60b266874477068821
SHA5127b898c88fc88e7d3e81f92dacaa3ea3b56dc058dba6c8b5031b523c0e955b41470840c5fd558bd6ca2167869ac7b09fa02cf1d5782468b3542011ae59069950c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5854ab4269ecfa733357c758e126c42b8
SHA1e65c15b15c5813e982845a2698ae7348f12508af
SHA2568b5aa3676b015db436a24d35a286a9df4794f8c455bd96dfd86a0c14db81b22c
SHA512e270970d3ce21b3a657c5e7c1425fa1bcc51083644fafca7f870f4a60b3038cbef98c9590681b19bc21f12219a93e7887c60bde7c8d520f878dbb501190216b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae82643f1d4cc4ea2d0c3df8b3da958f
SHA197ccb1f1b98b2af9f8d0345718bff5afb4a26cec
SHA256b37214f003d13221615d202157bdce6d4ab9fcc19f20a4c1accd759b0ef98c16
SHA51283396477596b7a1f7a54c8f184f3dbf6a0b3b1e23f66da90c126417def441a09ce0b4025e0d1c48976325f2e4b2deb043274357d5969688b9baa6bb7fc28fe40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d42f3597fd4b7111b435a30bdcd656a
SHA1b54e974c7640874c568b21c4cdb094010d5a8d3e
SHA2564990c7fb2945422b3caa899fa1f4e04b2d6023fcf260d9b913f6735d182202e3
SHA5120faec12e94503e5cf15460d2ef988420d56b84f16a792501214f89c1a33f5842f689fca1db7bdd1ae6bf327f58d7afa438e70e48cfdd38959c32a17a19c2aa68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c071d1c6b3b66e79b5a9d2b5db45a9e8
SHA11adf6b965a0673c6eba2dfcdd069b24f9c10c722
SHA256c5eff2abf4788c299bb3f8c8ad181422c050c03c904d11ca50173d67a9aa6b0d
SHA512441d399c6fdfb8c09e984ba32d7339a08bea1cf30f419ec858d0abea2c6f8094cff6b98329ab9725822b862fc0b45505924f289aea40e8155720f142e6b0bf84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584e8b060d8dcda5065ad7b8027ef0900
SHA1e758486a3ae20c5052c8b7ecbf024c1825c1f6af
SHA25653838be9b46179d68cac9525b854ec4e1e47e03094e22994fb7bb3f7e978059f
SHA5124c0795bffd72fb3e0e4d8058ea0c40b20e6daea24f6318985ff7f79bea761104c45fa17b8a38a30d3ada1eb4697d4e6d3f51ee456b95c728463550e1c84966f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550f98990194ee506fdaf10ba228fe9f4
SHA1d630508f7c6e35564e75fde15479793cbd4cc38c
SHA256c5267bc21e8e3b38653faff35077ca2d70fe9b0769416e9d1414c8f8509407eb
SHA5123bf7f199d96c0d4f14dd054dfeaa7df945029811dc4bb5015b760c135ec5d76c84b24d212814b77711ac4fc3e43f269e25a1b3532d65da4048bf10f20fbd74f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7abcf69a346d1fa955112943af9c78f
SHA1da140a0ba9753b8a7511ae11ab4e0268355de52a
SHA2563f6b0336532d15b421d2882b9c7130ecb5aa896d401a0c4bafae390f4824242a
SHA512e81eaf9599501bfeee7dfc966b78f2b7490ab82fac250fb1608c9a767b0dd97eebb6657c728c8fb6d4b7b110fe3fadfe0071f3606495e4e00823ec52a625a1ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52abf08e4450cd667d92c1d418de11f7b
SHA1116de533e7ad6cf11ff612f1108909b80817464a
SHA256acbc09e547afc8c9a220112c1f66343163785443a181712da8d2f90d2d6f3a98
SHA512119d06e49dc1fd2fa38c822e3dfa2525952c50ae675d30817e5ffa13f2b2e92de1be9a4d8b07f96745825338c1571c9d5e0fdfbf58cc504ce929944a2ec953ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c27aaf2a2fb395bd7ef0c57fb6e6706
SHA1bb106a492c84efe79d2f378222d94f1d7ef3559d
SHA256c56bec4ebfe5cf1fa7e9c0475b713bd5cb072f82eb92d094612dfe34112bc797
SHA512f315e6c81cc2f17e8e4d1f0f842f551bd0535d24c1fdb4b46f6d6f5bef2f0e41c54eb7c6a9101282de6955145cc5dd786df25539f6234d4d29bfe74e349428b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eeec28600d9c71e3808bfb6837d0a227
SHA1264b93f654ba85a3c6e48d4ad0da7ddacba996be
SHA256e01be70168fbcbdfa09060b117f9e6711b3d38768e87bfc60cf6e0e4bc33d7d6
SHA5127b8f62afb6b7389c5b54d0278db544b90a36564eedacd69c2a460183343a01fc38b68437361c73bae359a107e4ad58a30739e1837da1a7f900697f86893b50d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590e8d6b82d8616ded2602a0723f394a6
SHA188c24dc671a4ebf644b773a28876d75e27c55895
SHA2567175da51b82377269dc8dcbb715b3c3250814cad815446f5ed22d8d059900f4f
SHA512823a7a737faeee998aed890ad46d886563210a29381428a04655faaf800768449c48872a039e6db7f37f2555ac66cf6a666479f58fba6c1df0ad99f3d79b8bf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdd4df6ee586e0fd596d11c79b64c3da
SHA1e89083400757d8433b14964626f8980a71e5a7b2
SHA25697108aa9275b99e0dd62b6921ed2d8933e083e6f442c7f8efe77604325fe849f
SHA5122c7615863d093f9fa35b84ad5b808329b5934e043b07866f9cf0af3bc154a5418bf359b9d7e9c2fdeddc750f3982e7ebd06fa3eec04922ccce991ed8bf52ed0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52221c94de66b9e1db817c2a08e2dc955
SHA12755798b691879f71fc545a13f2cf679f96b1daa
SHA256b91d01095be14311bd07660b99d1b0e100861dfdbe1c9005d8fd5292cdca1ebe
SHA512631efa23e28c5511a43d513c3eadaff7c00c55612afe6a99bbbbd20fc418c7d0b1478d5e37aa0e2327f43ea7ac4900972697eb6093020a8b83b20b906ecb0123
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522a6c74a0cdff17868e67a98ed51ed1c
SHA11b75694b0a3914796afdd5a84013052b40a6eb00
SHA256750c139d910cc3d2f8edb523645f7e254fe283513931cdd65a6d5ec3f568be4f
SHA51261c5772910d40e52bef0a876ce6028aad5a3b4b9cfada541a68c5362681485593723e4635e17cd64766a955014ae0f821cd3bc361c29b7de4b38ed62c89b7a9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b00978b8d95617df33a2b68724ddd745
SHA15bf23df72e38c49f04a31d65ac5692561b635906
SHA256b697d06281be46cbf178705baad6ecfdc11efd90c0b235cbcd771bb82191c70d
SHA5120002f1db638bdef816b081eff402b614b1f4a2999a851e9cb339cb1ba1aa18d5982a2905edda6782abdbd650888fc99dd2e64f5d7745affec5c100d84cf5a260
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b