Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-10-2024 07:33
Static task
static1
Behavioral task
behavioral1
Sample
46810a1a9af5728ef79d44cff82eed34_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
46810a1a9af5728ef79d44cff82eed34_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
46810a1a9af5728ef79d44cff82eed34_JaffaCakes118.html
-
Size
30KB
-
MD5
46810a1a9af5728ef79d44cff82eed34
-
SHA1
fd7f5af41326ed6c3ebbc2f4cfa37b2f8e5ac353
-
SHA256
81573fbd67a2119dd181bfcbf362991a887ca195a2e13ef1363acea26439f129
-
SHA512
def44c343ae3454ba7f634f6f10c6da8c27b3cc1bad3c740576bf5d0ebd1f938aff59dc0c0ebe194a133090e06909928ce63b2f89a9a0154e37699a249fb60b2
-
SSDEEP
384:M1Lw0dd8kw973DKaf3ELaHcq6LzPQkZ/4aZccTe1Akh8hfGPPgod1cVrxdfanagM:M5MabNMtdCpYxVof
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000bf98a356ee89a4688e26de6b125b20f8749d136bd1e57fbc63b1ebc80d28a942000000000e80000000020000200000005dd5b5bd25c197073cfb088edf9d03d74059ea1aa9b34d322fa710643c4d570220000000116a548f7be4997dd943adfdc67328b3f61997a4e429df4caf3455a813f59bc94000000040414096e377c054ca20387ee06cc740d1a1e4ec103c8cfb21f9903158da9260ff10ffa51420e6b6b14332a53cb6617d72a7bac32fd6594fb748dd0391e721c8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CC4D8C71-8AC7-11EF-B1BD-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70fd6fa2d41edb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435139488" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1788 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1788 iexplore.exe 1788 iexplore.exe 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1788 wrote to memory of 2500 1788 iexplore.exe 30 PID 1788 wrote to memory of 2500 1788 iexplore.exe 30 PID 1788 wrote to memory of 2500 1788 iexplore.exe 30 PID 1788 wrote to memory of 2500 1788 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\46810a1a9af5728ef79d44cff82eed34_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1788 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8d4816b95e981ad2f2cbc5b8ebaf052
SHA1b822be022c5643b2baca7562b9acca9b71acbaba
SHA2569a229dcdcf93033ea175575181779d24c59b260b727971e360c257b3043aa907
SHA512f270710601cb1d8971157071226626ea7fbd96d00e92965cfbd9bdd86084abd2b1772f8eeca563f53d9f26150d419c0f1e24b707346eccef72ee003f9ce56ae4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5397026a0e2d08c90aa607e53469f565e
SHA12b2bedfa2abd3b58740fa5c108f18a2cf4db7057
SHA2568ab69d9ceca61aacb548c485a893cd5afb7bfa14d8fc2d18ff6d24bd9af70f0d
SHA51204d6c60a2c4915006d43c2fe5ad3969d896254c74102cf153fc3a86592e2f1f565cb4602c6d525b4b392b33fa72e77d1e10f20086bcd3863022f6333462f8d5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e34e3688119f5416c6c3c933b1b93c8
SHA1053566cf8111148e1bf4c134f9fe885e6d8a257e
SHA256a80a0a569cfc55caa5bedc2e97d1db454cd9acc3ce80b318f71beb52fe97b48f
SHA5126158f88fe371cf1032f2aef2a0eb838b0f0c81292dd5c919dd4ad7c220ba5794cbc9465450d540e2edb15a539f4432159236909985816d59146f24cd54ef1d7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58efe4cd1e12bb0b7c230445b3ccecb63
SHA1928f984557bf23f9dc6bed00814e06e3dad32eaa
SHA256598a85a9ce60c4c7501fd5ba3a7f9640e3063de7e66edb34f3740b3c35d73a04
SHA512b799d4d6f584e48ff3bb65aa5f779b8b2fde91f360caf45494e07100aaf01e7c43fc1ce9bda13f207a345d37c7bf54a2ba4a823bd42f0909f3d401be50fea327
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5218b260ec4b826bdcc90ac7cc91b37b5
SHA156fc38c46951f2f3c57b115544462412fa4cb62f
SHA256a98b2ec900c5484bf639cda1d49f77b86f7340b974cf6ffc41761e7721fe1b12
SHA512f51254f72322f0165f7457ef08fe304c267260559e57d0d2f24e79b5fe5367f3916e8ef08c2cbcfab669a861270df44c6c87153da91b93a2a81aeb4adc000888
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bf2aa49dc27d629bcc4b13e9e39eccd
SHA12332b26216c4ac759eadbe3b68874fcd6d9f2f25
SHA2565ca2b04541e68ece9e287f6eb494f9ec697e93e9ce33978d924fb0d0b765411c
SHA51261b60a22fc6b7c6175c400b13353eae59888c9aee194dc5793fb9a327a9ed5f032c3af6de328df03c0e625d4f7296909b49deed192daab4f9c121d9b9c2a318d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb69a4f3ba9c82c18dad1dd12d2c80c4
SHA1cd2ed3c259ed780c83727b31eb7bf8bbfddf127d
SHA256a78fa49e13c8a5a24866de27c25bb71d490e0c7d24435fe4efbffa2ead9ae542
SHA5129e39be15984b6c5bf4d6da0ebda99a5de1039684c887a6ae856cf3a86d4d7b358b3443222f036cc34aca937c08b36635345523f6410f902b9db8830914526da7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b40f2a553fe39bb656e466ff9ebf66e
SHA19c2f4d0c03e719bd8d9d29b4fbd2a8312389511c
SHA256de0207f578882cbd1078873a99256636414d66a5088475e3463fa947620f8e0a
SHA51207ff2375b195d65c2bfccf98991e3a0e8cecc7fe7e0d46777b1067bba0708d40c31c5802669b225c9f45c683af31df5606f5a3e7a834ffa95521a6f66d4bad95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c576cb0241dd85d30805467336313cc
SHA1c241ff5a30b7ee1076929e03dd8c521f53fcd3af
SHA2566d5e6233c18c34213858f411d3a008e594d5b9e961a7d65307d6f86aa93148f7
SHA512ce02e5b8d0111291b2052e737a8bab047ed0c5171398b612b9c34d06b101ffab5173fe103b8c4935929c1fc49d0a61405019af30c354516d5e39a68348e1dac1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59da196be7696cc0da1d594b957dc575d
SHA19559983b2055c696125449f68e06848cc6a5eb1d
SHA2564e84bf087329b0157b94b8e55648bd6598b637085dfeef7c1057619673af5b90
SHA5124109753c080d4dbad81eb9d6e419da5e550de029bc7aec3d3488de2cb6b0c3c0b1c3ccb717cd97d2397ecfef479380a28bec50be5f96d2143d6a8057e42b4e4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba9495a4dcd9a28c6bf6e3b68a12abfb
SHA1399be6cbe86b740528031cb4fc182b5e1e73465a
SHA2564e22bbc925b76f32e3a4bd4450baf89983c4584ee0c2712d581d93c8ad4d9c99
SHA512c382ea6a07a497a1fa6bd327c4a412fc3c74260986eec1cb58e65b136ca7d07c0bc1e7e113053f0271d856253e42fc44c8c4d133c38f7610135709fcc5d01287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d1727d5ed7bca426a2583ca7211d3b1
SHA1e46bff4ffbcd66724a1e67c009cd0a94959e5a9a
SHA2564b5a03a315bac4c8b6f304aadfa8b7846821e1222bcce13df5d0d774328429d4
SHA512083c0217caeb4a820cff02ea3bf50987d17ee2579547ce2fc21f0eee287ec17b36015f20987799861dafd93b92a35d2de39880e045bb2e9356b5b9707f4b856c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcd8bcdeb771f547b16a09e8cdec2305
SHA181d6d02bde723f1fcf586163c123827056517c87
SHA25629da69f6b72c6031a954a15d688c8857f1939f5842ba0d544fea84e3a6335336
SHA5123028086e7f1f6f1558a619d056dc2cd74236d1f2a4ceceafb004bb02718bdd5d0f3634e62872f23eafa9786863701c85e77cd1c081482c985e1e0e422f04f4a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4aa9bde9de47398af3271802e4266b9
SHA19eb21bc5434c31e05cfbb6ad220b3b16d9f8fe66
SHA256866ebaa4146cfed44e84ea54a3c2fae92298c54c062f352cdc9612ae88f4d741
SHA5129cdd6830484af531db44e8927fb7a8c4547d2cade980c8aa7bea1409e561c586615f74f102a0273d73421504be1cc86fbda7c2effbfe373f44f475f6f8140835
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7185b5c35eb32cfbc0581b20474f6a7
SHA1066528af7e83d39a6fb306af371061872bc74e18
SHA2564398ce626b22b5830a545d1ce57de3fb153a1e2d1207635c6ae7dbc18d490e9d
SHA5126d858263ebc213ef06b51b5c98d11b67679115b3b7cd0f80f4455ccaf5f2a8195b0c506d4885aae75084b6e841f79832f018583a2830bd62956122a2e938de5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b149926b897e188f5e12fd9bdee93aa
SHA1e2502a5fb1d17607e338b0c4845b8c463bd956c1
SHA2566b74f15aa5ded4006cccae3414e53ae9f3739a0227bb88cffc31c3ec60ad9d81
SHA5122a830e3254759d7dc0f06421cdb38e9cf146d4de9bdd541b833324a77a5fc0eeb16d1180422ab99bc0cd6478907a9b47fcd70df3892f61a34c9352bade0f8dfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593846e96004404eaef93c1cde2b6afda
SHA17e00c443b9b29723cd99d67f0e1d0018e0920aaa
SHA2564af788f7925ca0851d9a1b1b4043d1eab240f8d2c1dd33fec9d2338e41130d6e
SHA512f5600d725a47fca8749474bd30f8d6f9342ddc5c14e143a9afb61f2d7ad8c43cd63c311ea209a3b0e6596bbf7a30fd36b3c07c0c61a76765f547599a2b5dd755
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596aa75da4b2667afb7b6030534e4f364
SHA121409fa23a659d8ca51e036c27d6be81fc8bdce5
SHA25676de35c569e742ce92dc0a9e0b28f7921fef8bc327a6d7697262940220c00c88
SHA51232b14fe7549dfc3f076f96b50f8eca2cdcaa1f104a73fed69a9c1dbec58eb9ee2fbca32537e6ad7ec2dcfdf6ca52cbf0b6f184da1acbb69c37e52cb0c4ab604c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529e38511b464e7fca11a909d1510ed75
SHA123b61779424491f9dcaba79765b84c7910d0b7b7
SHA25606b6b846d77bc030c201ecb07196dd6a364422dd979bb2f438e225d63f42f221
SHA512ee1a05785afa3f82a3692c3c51da8bd8601deff6b494d7c3ed5bdc111b29153e51f67fb969c6ae1f09f6bed69d7b9de21e35793924ce96e04613edd921cac564
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b