Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 22:35
Static task
static1
Behavioral task
behavioral1
Sample
541310628d825bf4e5a5481d690ae6d2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
541310628d825bf4e5a5481d690ae6d2_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
541310628d825bf4e5a5481d690ae6d2_JaffaCakes118.html
-
Size
26KB
-
MD5
541310628d825bf4e5a5481d690ae6d2
-
SHA1
a2c733d04516adafdae3b24ccd4cb26c6e75067d
-
SHA256
9f0be860db435026b4ea4656bb506f5fd298a0a8a5bd57f4a8d0aaf1b8b93a06
-
SHA512
8d731f9ef034f00aad60b1038c6995b979a1f1378379cb43c1f826e05d88c8485e886800054e76e49feb548f6e6b968390d12deb3690e27c96d911024b35655c
-
SSDEEP
384:4+QfPFd9QZBC7mOdMIcBKfpC5IgSnbmFe7AcBo6YgkJvAgo0iyARPd:Zcd9QZBC7mOdMIhpC5I9nC4qIP0iyePd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 301285f6e420db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435366401" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1F996591-8CD8-11EF-8287-5EE01BAFE073} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000e64b702f2b3f9e6efaff604001a10f9bfae33ca9bdbd510a0222ec60e9ead626000000000e8000000002000020000000efc2f341a882cad31cd6b6658a9b29e1c9244162f503dcdd0c8357bcea529edf20000000327e15e95122794c346ac574710a0d2f1342419ca038b43bf86a14715c26619740000000c67dd2933afafb37a47f1204999866d15c806a838ab3a4fff4e0b87596a397839b6409a3c3c192e620a397b6645a923046d2bad20b04e279c59ea62683e26f8b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2388 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2388 iexplore.exe 2388 iexplore.exe 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2252 2388 iexplore.exe 31 PID 2388 wrote to memory of 2252 2388 iexplore.exe 31 PID 2388 wrote to memory of 2252 2388 iexplore.exe 31 PID 2388 wrote to memory of 2252 2388 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\541310628d825bf4e5a5481d690ae6d2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2388 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579bc168516fa7bdbe4960916e0b11f54
SHA10c07bd0b0b9432fc847863b764699b941a1e6969
SHA25641db62ee192bcbdf189f2c300907a3afa07146581a6ce7b32a6aa648c3980b39
SHA512af54600b5cb2ad8b9eb16cb82549bb8c522e77d476f3e9cdc69f563eee21c6a70c17b3e9a77176dcc68e9eaf1df21e8e4f005395bfd1bbfbf7fbe746e4a61230
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ecc605c72ff5080652d5a14090c767c
SHA1fd7d4421ba63ff8465b3241413fbafcf2135e37d
SHA25615701883c9b89a2473a1c953425163a95b7c289c2b34f9f5be94fff01b52f7b5
SHA512c1670203ebe74c495f5159b41e0d717f2be77400ab601428e17a4698dcad20b4e3365990194cae8d13ba3886bf150fa0fd192911374f412ce7636b80de27ac9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b733b0c363526e5704fe463e23e87383
SHA1e24c87cffb3630ac75fb227f5c266a2ea38e6ea3
SHA256edbd233f62c2af72e5a22a86aaf7de66478f634a60efcd1f71edc4e273246d59
SHA512efebe3112d578c7d13b90e789b3a5587aabb389ca7cb39c0a9102011e38213cc61b5c6eda51247dfd302a1ca8d216d7eb936a2d88101d8a6dc684050899d7546
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fb9b8059713b0310ebd833446cf107f
SHA10679790975942b72d458c002ec86d2357cdd9b2e
SHA256f36215de60836a34585997cc7cbf0cb924a85ebd48b197af066be266d0027ad3
SHA512705f9e0de8d739a0e449508d3264bc15e6e93d025adb726a2b2ba43a9e9d14d53146ee8e2a759980cba26cf215c1a050f1ce738f7d0af097686205362b5dd22b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538a46548c6a8a690fcac1a139e44e554
SHA1dcca2086834b8ab91cbacaa1d5c3e2e33b55dc06
SHA256760b8206aa0c9a454eaaecf2d00091a4b1a7ff81e69646e402fe5c267ee842f3
SHA512de1737cd63f1e9a44aaa1eb8ce5113761fba5ed07e8235332120397f4cff8a0c42560a624ba1ec46c0d99fb31d3afc096563eb71c405bc0c742ca0cd8cd302a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54da867406d190fa2571cc29b05e1c21a
SHA128ef7d039983529f8270d31fb406a491c8baf091
SHA25656ab693ddfec20591112cba6cb24d45b9b16c9974c776fa1c1a494cca961f887
SHA512b6bfc59b05cb4dae9301b1eed89de42eba0308daaef0b524f5b8c06927d3a589b9019d35d8868218c65c53e731019f33af36591413ffac8f9d4c76e5d6d7ae35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fa7e0f536a5920f43b4cbfffe8e3f78
SHA13e4b8856f49bcd502bf5bae4dcefa68de486614f
SHA25625bd613e1386305f613fc6b1876423a2632fee3eb7d9d864b8bded89a94d38b4
SHA512838861e2abb425ae62dfbd0544d4c1140f38ddd87eafa8c18728fc7bcc32a30018022f60e0347a3e1100d7647d7e76141045eb08c91bde2c680191ddb8b9110a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5174063563a958efa98dcdc5958e54e71
SHA1388e24fde4a34bc5ccf81e0807859e5e8ad62189
SHA256639bee8957ec3505cc11172d1aa61bce83676f02dcde9badfccaf5f3eb92ae7b
SHA512b3ff2aed5440ce482f0ea04c037e4602a9e81e4d2f87ed11645a74166336b1a779477cb46e37d734ba914e4165c672951cda242691f3bb5622ed46049f0163f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c021a963a824b7c2fd48cee8309a106f
SHA1053dd46ace2533c2260602217d58854fcb8d90a6
SHA256b735bd9a1b4f93e798729fca9d457ade9ae32c18d2b5ffadd37ca92a95ce366d
SHA512a8fd6f128d00900bf7da5d7602f46c5e623d530ef0c81d21a85d8e9b7c051577c4089222844e0584d2ab8e3ad8f91a6d81256eaf54f4d493432977c991c28f64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f15f7142e3d205bddebbe5211cb34ea2
SHA1d60a8ff2e5721699a8663eec2ab03c4aa8c3932e
SHA25698b2cc4117c97eab51af27c6da071254c928d46e2fd2e48b4c97c379ef350f25
SHA51260debbf8a5e6517f3193ab251cb4ce358dc4e264c9ec35455e0e9091fd2585693a3e018bcd231170021dfa987790a9e2d592763ff2775124d7f96122c39dda55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6af93262f2d5aa5e95bd7c9e5e86da1
SHA12574b98cd6b6d8b7f521d34e198db286a6743fee
SHA256f6355e8436ba55700aeabd67adb3f61553d86f54942fc328cbebb67d3fe6074a
SHA512108b2ca2d16f7714b1313c3137f9e344e223a98f0f5a7f2c13998e7d79c47752eeb5e4dd0cea622c9c68c37e6e8f25a6dc187437e81abc490686dc81da1a11d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e3945ee21962a113bf3560934a080fe
SHA1e19a7303600e6e36045f4831f73db876838f9262
SHA256760f680af2dc2eeb807de9d263a09b5ab6abcb042bc90324ca0e21fd1678b2f5
SHA51205e4af7be6407b4cdba1c3c35cb0b5fb5017b78a0f0d47a2bd252608894030def74a359c919f16d6a5098e76bdc1761a7788ff5a21f0b6b15443d31198f117ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c33fb805f16bb4d9ad79af11fa93fe6
SHA1c8158bd1bfd6ac2eee5e76a648a348f4bc069faf
SHA25629abc3cfd6c4c7017626a90884bbe5f2cd497727e00eb957be687b4318dd3ff2
SHA512766210d167b7d37222e62cbaa753bb17fa032b2b2707dfd27462d0ca2c82e19de3c1f5eba1baef93417a7cd96ec4780cbf6bab905a12229e9805ff3806b7eae6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585c8e0be238ddc56d44c692e0eacb45e
SHA12f53899418993f1e084c4fd2a3b8cc2fe68746bc
SHA2560b1fe4814a0cb4402e3aa48d1d0caf7aa292b2489ad464f192ded33c0e8d7933
SHA512a02b094c8fb77bc53ed54ba0d22ad9eda9d774e6f64cf36733d3305b27c7cbee5e8965e67b9694aa4453545ddc97d502bf3b3608acea5ca6cca6f50d7055bb67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad1e6b2c8c3f05c983968d90e61d8e4b
SHA12981d3032e5a2478b4a6ed17ebe9c7477b12f574
SHA2560c291e0c8d8e9f75899f45f638a7739af49d8b3cebd7340187cd2baba7c3e2ff
SHA51238d39b6403a229008e16ceef7a734d8b6164aec3c9f3654df5c3c66b8a0ae415910001a8afb9108e03369611297b31464edb853843913aa843dedaeea65a2a1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a17bd17d5c6ebec3e112d16532b85d39
SHA1095bbdd5c0a869a6c69823c227fde3be6b04218f
SHA256053f23f93b7041cdd1dc5ff38598e07faa61306546db36b5dc82272461b2ce97
SHA512e802d72cad2922cb3a63f8fea4f603c5d289fffeb9b0a4813fd495f52bfb8c45a906806f40284fb6c38be6f8e0c434c9c28d7adb4f17f8649d758c6d5da16fed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d72a60f5f023933c09d90a6b27c625ab
SHA1efb9c34f797b1b52803a232f7c9f00fc01e8531b
SHA256509b11851f15c3d21efe914328f56612ffab477d6ad2eac591bf19e94a8580cc
SHA512fb9f1e095683b4ff794b45eda47935a5e55a80da668eb56e42142c0cca3b15ca2401d20b370b0e6931bbd6b9d94a1623b4b2b517b9f1f496692147869b7bb342
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578078a10997101216dce4f36e1ec8281
SHA136622e703b7747df51e07aab6c3c2ef10baba9d9
SHA256b36dd4a63128e81e28f595be460c5da32bb0e0140e669d2a0b00bc6b0a71e64b
SHA512256ea47a2df487306d67c6a85eac42680dcd153613eb31db65ea5f23ff72bc8ce9eacf1c28020ff8a1d88a2cb56a0f9807a63258c1f07a10fd97bf0790478dee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5211cb21076f209db2ec945f55b5e9add
SHA1a0964c29cf3a0dc7eb07e291ce54d7bdf8f062ca
SHA256cb85e091847bfb272abb061728fd41a62d91e253dd94fc04c95e7f7ba1b78eb9
SHA5129b19803cd980af4c64f22cafa248a332410b47c61b2cbdc805ee9021e3127ad2ac11f419321ec91d6f8351a0a17fe51fc9b5a77e7f15cd2aa7a0d2aa2199bc3f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b