Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
15/10/2024, 07:45
Static task
static1
Behavioral task
behavioral1
Sample
468f38b9c158f62469e7da41e04f0a19_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
468f38b9c158f62469e7da41e04f0a19_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
468f38b9c158f62469e7da41e04f0a19_JaffaCakes118.html
-
Size
41KB
-
MD5
468f38b9c158f62469e7da41e04f0a19
-
SHA1
63a5b47888ffaae4a6cda39448640dd4741f8614
-
SHA256
3cadce2079091491e514448836b38001a37eba90e760401825b566069c77a0f3
-
SHA512
be2d2a9d009edbb2e40ce8feda619200b1f6b4b0d49b1bd37fd497b5b8658bf5a9defda9cc7013e18a8569b53531b0aaad414a18f7d26a196e7bcb8d4580c37c
-
SSDEEP
384:P311eJ2vUNV19V+QJakPKFbSG2J6qie754jXAiJquBha/9UUMPtaatODQMpssqdV:VUVt+QJakMvh2Ml9YoFuAASGoiqpBt
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b9600000000020000000000106600000001000020000000cd68c97324e5291a392f637e66d98f0e28ea7090982bcd185068354549a9d13f000000000e80000000020000200000002d55bc19c692add0cc559ddc5a79e13f3ca53195fca1efc03b963a2da00e2869200000009f53d3960500b9abc9a589d71f6bf5a125077de6ee1b76199264a0816c9c9cc6400000005fbf787754178e4261084a79e531463977ca4014598ab5c4cfa704e1ec2051b4f123fe650ed871f5a681ffe6c390504ed99c405a2e5be8ab3b438656a44496b7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435140200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{74BBD871-8AC9-11EF-95F7-72BC2935A1B8} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40f6fb4bd61edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1712 iexplore.exe 1712 iexplore.exe 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2352 1712 iexplore.exe 30 PID 1712 wrote to memory of 2352 1712 iexplore.exe 30 PID 1712 wrote to memory of 2352 1712 iexplore.exe 30 PID 1712 wrote to memory of 2352 1712 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\468f38b9c158f62469e7da41e04f0a19_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1712 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596b11d2379e1f79039b55bde0738a374
SHA1b75ea05cb6719560be4e17665c36f555f412c0d4
SHA25628c3f041c53c1b904b469b11f404aa53b0d15511a7eba1b4dd3aefb8c9093daf
SHA51231eb280567c779c1df64619f7148e908c81ff1e7787fa0066479fdadeb37378bd37e29756eb2d9bf05ea1ca3062a15afb87bafd0837db3b94102276a64d96407
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abb3ac5b96f4ff925899f12ade9f3919
SHA199e05393979bbba5129a29327624591c70f3d2a8
SHA2561337f763cd2f97a0f9cdfc93058e2f1032cb71b95c7feed761d310a042e45d9d
SHA5128623a07d129ebe65b3f1a84426ff0f67d2091d7fdc19269ac69e1083ec2e608180fca8ef106d42e6e6a4f8ee8346b5c87295da0b6ae44f89b4c9462ac860e4ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d91b0bcdf2daf90e615d889941f3d71c
SHA1807ffafcdf340d9590e1b7bfdadd8dc946f57710
SHA256f82ea44f552cdc213d46bdd5f85a864e490b99164e5239599f863978d059f1bb
SHA5123c01e5e05897621c3b9541b323aaffd89caea0f04c0aa09a7bb247ec049f75d7772d89f45648bcd6923b1bd05532bd9d60a913e8fcb55246e12ed359886ee40e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a355cfa7c203f9e060380931c479ef34
SHA1d54463ef0cfa4c3bd55e27349d2eeb34cebeab97
SHA256a5faa590adca7a9990ffb4b73eed904d220d42f0a6347a1b1694c3a41e7cc885
SHA51243e299eb4079b30ad020213fa4e1aaf9df3d81fd9021849e48c5f90229d921bf6aeea498cff5ebabc8a4c3a72a9a3538d212ca3485a0cff50da9f56c7bdf20ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe00f664aa283dab73adc3b8ea2eb877
SHA13b2bbc94d04d04fee1e0c4ea970372e0025dc30d
SHA256df4a324a5baddd5874ac13ce8eb5510dfeeed7ebf1b2146fd5654e544d5c367e
SHA51227f93bb08cb5701f780dbaaf466b6f88df2e389179f4199f7586fd8c64e57bc090bd41f6e37c140c61091a8a0dea08b823a2b5b86360d25078c9550c5ad6f5b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b873f4520691fce58bebc6a7532592eb
SHA1628092d2038d6e0dda858375c49a3610c3d198ef
SHA25643a16c2790337d2047395321d573b0f3b4a3db542fe279d4bd1f3f699bd7e5c1
SHA5122f9f2158b90b0bbefd8d46a95e8f3c18c302a3d3700c18643bf5be7c91610d5ef4dc2453cf462cf5d13839def37d4bc66632b747c0084fa58e2911ca4fdd54e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d24add09ac5dc0287ad207315e52d93
SHA10f77d28cba9fc7a7e5d67f293ee7bc7fd25b34fb
SHA2563ab408b46d89dba17455582cbc4b4bec496f528cc244d5f4806b32ba02413470
SHA5128a2efbe229b09cd7a87edbe85c80d0c79bc1cee2a690105faa3aff7452827265439e0d023b2872cfcb0f76df54b287ccc16ea35f31216e9a4cf66e18362e8435
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ec4ed85c0e3a6ed02b65271cfabc36f
SHA1121570feda57b627c595b03a3376e1d807878a45
SHA2564255749c4a39fa54703e37b0a05e01f71ef14e68f198dc4b753f782a4288460e
SHA512cf6d6724476e75b389306d14d5d91485c78c4eaf0f3be30ef7113419af5635071ca86f125f74cfe98964395baf0b88c1dedc53453f21bca7b803697c589686a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1bff1c19a47f962f015f973485c2ef0
SHA123e2d08ea8d2aa1f8af7811727787a3bab410138
SHA256352180b3296fbfe254af1cbab5a3aded27233d4dee4d264db3ddf4c74c7bf565
SHA51283af04afe5cd7ac6fd0e1231bb773fb7dd3cea1eb759defd4749edf7145654cd8eb5ae239aff8419195ae6fc9b96bf0eb5628e0429fb90468fe6cbf06eb737e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5199743959faf6ae62f0e62adc4dc1d63
SHA1f7338eb4617bfaeb4cd4cf100401e58c1765501c
SHA256b74e3549848309c2dc0e7dfe2be9734b8f22cbee12578129ac6b3a1317adbac7
SHA5120bd7d420153b28435bf4a353ae3fa6b37eed57b756197e97a1529a8491f467b19abfd39f9d06315c6e9555bc942ed5208bbe91f5d069278b594633ff5e348fdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5112e070da08b6adb6257fd0b5e9588c7
SHA17632203e98034a0eb3370ee095893593a12bf9da
SHA25653bf9d71ceeae105093aa02cb0aa57fdc2f71634bf8adab70c896dd1c2a96431
SHA51215aa208f71d01d97de2869445ba607fa0a6b195f29e4b0a20cb19092562bff819fd5ffb3d44879e4c8a279e0901472e5d3b7d59bee58a3c1bf22efe227ffb8ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ce3f1a2c45fd2fc57040ce30ad975b4
SHA169004f6c01c6fc1e187542ed417163a80f9ecdd6
SHA256119600a792653542a7fce243100ee5a988ab2fac10a85012290f9a2eb8ab199e
SHA512cfa86dc9b0594bb3f608fe0f43f835577fa92bde8b752919f09a31c035a3b84324be8684196d1e016b7b8e2f8b97890860adeea7f623400711e4d93025b5b2c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3448465b28eb5d8279a6cb931cca632
SHA186fc8e84744f1e03eee93be945f21d435f4feca8
SHA2566d954ba5915b1b702271fdb93270d3c2494ee6161eedbca500298479afd39115
SHA5127bd285288b75b5f99dd5ca350350a266b142367910ba3c33bd02395ff7e7fc54011bc0e260366a83868ee2e77739750ddf86a4cd664cb5131c72937b3fc38144
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577837fe77390474d1542756bb31e3d50
SHA1fde69f0861be14b7f12be388d751a52f28886cfd
SHA25627fc73fdc2cb63a9010dc933b0e45f25b374d8a4563471a97480f52c5e66e1b9
SHA5122852831417b14ab0ca2a53a209b465011123c82a044dbeaeb3273465ba16e70e4b7a9a066340e49a3d633f8bfab505154e067724ec5633faabff7ebd52c170a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53129db2948fd6fa8f97bd50324a6ea67
SHA18bc49e3e98186c9d74f9d4224de23a8f219708b1
SHA256906ee534eca4fb0012c0b84496cb2f9e7e9c00272fdac220f0b88465b6884943
SHA5120e08af99cc642703743bd9d3601dd9d685122c0037853067fc79c5a96ad00113123cf2bce14cdc09aa4e0a1dce603b6b8be7b8609629e1a046708d2a3568d351
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a697ca9f6862e52fa830e69af493e79
SHA16b511c157ce0433a61ede3ec66d79d1bb8c9f16f
SHA2569ad47f1c76f1d47fc69fb762f9484fcd4acda714c66a3661a8392f1f9d01e64c
SHA512bd0362efa31d2099061d90e63d9449376b2afa3d661d04462b31010bc8bdbeaee621ef0cacfd9df2c4609e20aa4b23fa30f408b7cfc5a2f9aa15fc31b9c1a475
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d4e410ab2339bc5499ccdd0be89a7f1
SHA17f395d39ea758cea5ba074d5ab9c610822877b3b
SHA256e581ddd7d2f8d5c34c059a2dcf48dc7cb1f9e6e2c9b2930bf7b83086416c06e8
SHA512c884a0cd6684d5d8b2b9bf80b15cc8bf3936d8dc75694fbbad44346c7f7d13b04732d4e4dec8d44a1c5170cf2fdd3351428eb2563b7f8ffd1a5046ec99d83933
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f00fecc4f5c018df616326c1e996b0b7
SHA1d1337eab6cfdd7a9461dab84d65d5374e4f503b9
SHA2569113d70f557dcc8a772f2cbc7b51a3f7895ada8aae92ff3a211a61989bd3450e
SHA5123d21cfd258da3e0a5b75c2ae672c98a5d3a51091189a8720da3c0c7b85fc40c5d56ef79fff78fa01d6ddfadf2ff886340b0a90bac19a3cb9821287b51d4fd517
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589d7620fda1c3ba91b4b2c6f46df7a57
SHA10010de9bd16f43388df3f10fc02223a5143b9dbb
SHA256f4ec11814e5ec65eaeacd38e1aa4e652c551df1e50fce7db0ec4f27be94c4605
SHA51253d1b8b73d0976fa2c06fa9c801ff9c698f808093db9fd7f35dadadc2762741ec2cb27f3263545e390d0fe5ed8ea4171e60eaaeab46c20db8c591eaf0c531f4e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b