Analysis
-
max time kernel
138s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 23:56
Static task
static1
Behavioral task
behavioral1
Sample
5455c1611da07f454ac8e7f0ce6b1555_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5455c1611da07f454ac8e7f0ce6b1555_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
5455c1611da07f454ac8e7f0ce6b1555_JaffaCakes118.html
-
Size
214KB
-
MD5
5455c1611da07f454ac8e7f0ce6b1555
-
SHA1
0a5d5e241e7527913614bdb971d0c02751411fb2
-
SHA256
b02e0ddd003b90f0cc20310a9a432841cd9135c52b4c69df0c49028faacdbfaa
-
SHA512
5c99fa65764e572068f15981a7def6d3e5d3514f0421348b2e54fa5ef1639138eb89077c3ca37dc2bcbbacea96ff9e69f39fc387c4b9888b75fae750a323fd34
-
SSDEEP
3072:IrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJX:Qz9VxLY7iAVLTBQJlX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435371237" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{60E49281-8CE3-11EF-94CC-EE9D5ADBD8E3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000d351d422621728570a705efa216646fea5f84fe2cbfc8a1077a55db49c805ae1000000000e8000000002000020000000d07e17546d9ca751ab80b5cf805bc812d230824d06701523dc12001b3d129baf20000000ffa923466fc0aaeb4e0b502d255a39248b0554526616921e179411f154d47198400000002c890cb3aed15fb275940e8a61f222b042b6e9e7c280caa4988e56da63e758e27177db1c5737646b0300aa7acda15ff36ccd65c2fdda36370da1c397c5e2b327 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90c8c075f020db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2532 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2532 iexplore.exe 2532 iexplore.exe 1980 IEXPLORE.EXE 1980 IEXPLORE.EXE 1980 IEXPLORE.EXE 1980 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2532 wrote to memory of 1980 2532 iexplore.exe 30 PID 2532 wrote to memory of 1980 2532 iexplore.exe 30 PID 2532 wrote to memory of 1980 2532 iexplore.exe 30 PID 2532 wrote to memory of 1980 2532 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5455c1611da07f454ac8e7f0ce6b1555_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aba9f61c9a1b0a99cdc68c434db22ca2
SHA1f10c635ad85b9e3fb6ea8642215dadd62b8cbf43
SHA2564892fd5a529dc7c1771902faac8a467c10a8fc64ba801438b64129fa10be7727
SHA512445fd1a9c481fa3424a4cdcbd36e8bb9c705a6fcf435569fb30dbee384fe7a12b8e5f451eaec1d873fe7bd6c769cd2954c61f2de7ac04e0efe97ef0a7970228a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1ebc5a3ed844c3eff88cc27b25925b3
SHA1ab4be099eda4d1f26eebf1d411e776e70995692a
SHA256b335d8011da837831ba15366342a92c8dbff70db87345731d58b1257c75c21c6
SHA5129e20f66002c683bfb7b773e4632a857038a17b04b6aa6533d8298b66e7003fcb7f01bc4a3090b27515df11d2327129f4f8d75014c4cd88207cc24f32556c0a14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b66f4052b911846d1839a4609ee6599
SHA13b9a05d544055a7710f8fe446766d9ecce759590
SHA25624c8b1ab498fb595a2a8a40af07fc563def9b0026335e0b27bdf41998d0340e4
SHA512603164417bc3adc3b8dd319b68363b35a60d8e1d1e186f40be38db019c108780bf0353a5075f58ccfb696f3348ef7f19e6ce0503b57718611d3f567cabe1bb47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534356fedab37b38ed7b5f534b7b43ae5
SHA10e1d5a62608b67368ca29a3f59a31cd8ed24d7bf
SHA256c68b16b76514851f4f1025c80b5e0e24a4f6eb2a2462fc3919200eecfad74ade
SHA5126ed6f5abd7f8c48542c66ce2ff075036ffed43a84422a11d2f87e35282cb1761c9a2075bb25e6c130347f608c7200a2819bdd403383213c444d3808ef05abd48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a51e8bc678ae4f89fc6b5a4f6293ddb9
SHA1338133e93c640725651ef7d5b43cd58895eec312
SHA2567cc7816d6b533cca3355044a77bbea4f210a601546ab5f84bcf711edacac31fa
SHA512007debc7e47965ccecaaaa850e12e487ccf2e9bdc2e4bfe7d573519a4925fd2ec26ed0af2a48ad31b43a7a365f9a39f5715d09d032cb477d4497de70283c4dab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548c12536f9337953fc68db9f943b0ac9
SHA196ed218d0f17746b3682d3d43eef5a1ea615213c
SHA256b4b7b5f4497bd6eb770a35992d5b22a4f35beb588cbb31cd71761e7458cc75b3
SHA51293341b4a055c03ac195b3acf9d0ae6a9a14340cb3554214c315445294f76b3a63b40dc680f521505f29334c00915ae7ec9903a8923b0e53115cfdbf96f0606ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a568caf91baf5615d7ee8b6f82e1c0e0
SHA1eb78db101919898c8d9ca2510c7e52478ba8d144
SHA256c41eb014df53346f09d0f5a2d049ebbbebb3daf35bbdc735fe361b55cd9c8d92
SHA512edc42403eaa261878a63ae5a178bd7d0bf43bb06f645ff370f5035ec27ec899353dbb250d1a18095478555c0abaa64301270edabe8f9dfa8ca741170701cf22d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cd9dfaa3bfa2c83e0bd5eb698060cb7
SHA14350decbb8ea0e37bde24a4429a27809bf92178b
SHA2561b9d42ce02705a95b4f3452215606cc79fafffe1bc3ca4dbb43b142a3a72e410
SHA512299ee219b587d608a60825e6c29b3c1dfd4ba63deb59cbe6095d905dd842a7ecde808d6365f83a91f0ff4b2290d6a1f58833b677b5e05961033a72e696897113
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dde385411dd32a9c342e7aea82be128
SHA170920ec42f76408be1dab68b7500abfb3d2c38d1
SHA2569ed53a53e093162d6746e9887ce2b062256e175d1c0dc6e11ad6aaf9103a152a
SHA512035379a39a9dc3d5558be7c0b988a2ee9c242a41af6616e6ca5b2329a9e8a78045efd2e9190a0a2aa66a7d5e4d184c35a4c0233e50061437318b8e6fb1f97616
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2f96589e4a7ae3f40e539d06fe30947
SHA1be9df7ff80b60c100bee08ff710bb3b4471e55a4
SHA256b27912f5d99890be38e378e42eaadcf8a83532a0a03b272b9ee9b09bb1c084b6
SHA512c49f59215b3553626e6b85c39b0d1819204df1a0b4a8f439887462c86eedf3ed4166017b05ba85e3a44794453c737c077ea928597be6ed42c3951ff8ba912981
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f14ba94bc75528794392c5d39dea517b
SHA1d0580619f15617a2985230f12de6bdc32b64cd91
SHA256a2bde6aa59d75af25aca3fe0b57eb5ae1ec262039f1517fde7acf8094860410e
SHA5124af5c1e4d509532cd2c206fcb3a702ab52a2dc2af816a7d1d3dc4d59e175bb70ce88de3be81e225e0c8004996236bee9ac0c63e2cef7eb78186516e7bb5789e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd864652e50791c42ebbcf124fbaa9a3
SHA17534fa515b6b9147baa7ce78b4158ae05934c778
SHA2566395085c8263292b1d68ba9803f23f63aaa2782f1fff07e6abb4a4f98061ac29
SHA512dd4d1638203b61ef71f875a04c8923b655b61023520916195bb31d00b6e4ebb49222bd691a3fbb0d32a996e632a33f46520b7ecd686fdaff483a93dd3f0ef7fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e4483d560a98f2e5537d63154331699
SHA117ed881d21f32647dd49526f5e0686e452f46e29
SHA256432db8e2854e2180dec82a560657c2386dff4bd8c2fea5c35be56de60187eed1
SHA512a6dedf572624324444ecb844c4e3dcb7cee573aeed55463a8d8812aad613b866c278771cfff3f517bd71d9ffdf51fd1dc53866b49a31b302a7a0a62abad508ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a0a4622182fb79dcc8f9ffb907a5e1c
SHA10f4e42f728ce15ea9c17a50bfd8ea42b47abc41d
SHA256d70bbae1f08aaff7a366be78fb667fc54967e27cfbd9aba90648aea9e011cf3a
SHA5120053c8ce673e0a690c5d36ebcc2163ebd1abf15bf0bc8d48ed0e2ff6e77626bf21f23b31288258537ade0f61e0dc0db986cfa89ff2a3208b4510c2e2a02d274a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e022d7f25d040afa16b5614f4c9580ed
SHA1fcc3f98683f3d0000e0fbf590be215438d240e74
SHA256cd1509e080dc4fa94e2babab3c377784d74b6b2933c7771c0e6ccf1e29e33b87
SHA512e6803a044c2409fa419818bacc5d7fa20db5a2cc8e5763088ae9cba86c4156021e5c6979e148bfcb2c3643305715b1568ef31d1394beef75f6a4a9289072c01d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df4ebfcf6b915e54cd97c34a4ae85002
SHA1f792f43ab747abe1b91a20df5edd6938f050e2d8
SHA256aec94204947d7c26c38bcbb4dc4c1d99102057070cbdf83d1355c5de42b3749d
SHA512719bb90f9b35dfa5996a4774ef305c9b5a525885f786ab2a3ffbce3769d54cefa2e768a1649ed1120a69bb1e86412810f212cfd4bc3eba91d33bf1658791255a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b