Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-10-2024 11:41
Static task
static1
Behavioral task
behavioral1
Sample
51eb6e1774c9214ab5a14600342f3475_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
51eb6e1774c9214ab5a14600342f3475_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
51eb6e1774c9214ab5a14600342f3475_JaffaCakes118.html
-
Size
1KB
-
MD5
51eb6e1774c9214ab5a14600342f3475
-
SHA1
64defc84461e26dab67ae7e27429a57e48bf6581
-
SHA256
90a96b2a491a97808e0b10b51c3f6049d470c15106857fca2941094199d08885
-
SHA512
d395d0e5b5ef470072fa596b364dbd5348a1dba4eed9e70e589536ca632eb04c7b13f6336c7d27e26159bafc80ea5cbeb8495dbd7c99cf41f1acbd4ea0cdef3e
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000078ee5eb2445f043c2e10d982bb40cb6e463f5df44c72e8735fdbd08693b4b015000000000e80000000020000200000006d0ecfb56d08b756910fdc549bc5b674e9623023d0e1d928ea11cc65da60189a20000000d5709bf7facb3008c0aa6140d891967795f1f7fb5fb5afc8879f1cc17d1df6e0400000003186f95bafc0fad703f862cc9300c6aa4ff1a9c1dd35abe916103f18a47e20dbe6af1c0a7b4325cce7094104651d8018c74eae967149ec660ff8f08d4fffc2d0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435327169" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C783F511-8C7C-11EF-91D0-C60424AAF5E1} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90c1b69d8920db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2468 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2468 iexplore.exe 2468 iexplore.exe 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2188 2468 iexplore.exe 28 PID 2468 wrote to memory of 2188 2468 iexplore.exe 28 PID 2468 wrote to memory of 2188 2468 iexplore.exe 28 PID 2468 wrote to memory of 2188 2468 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\51eb6e1774c9214ab5a14600342f3475_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2468 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be6a1ddddc11f81e68941b290b8a9864
SHA148ae327b0ea5a36ba2d5ad003360d4819c648161
SHA2569e857ffb9be3832cee5243b50e6bef7741670bc5565e6ed064dea8541867645e
SHA5124833385891b7395ff4ea631c309788f393916ac3a70baff096f6460ced8bd5248a5f3fc146e96e61109da599bad23ed6ae834e95d68f00c6a8c9db83e70ecf6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8ecd6ca16b7087757135203f0f7526a
SHA19a2971cae9cbebabfbc87d14b139dcb011fb3735
SHA256b13826e458960ea9e0771bace6828b5f35691f4313b4b133307603339112d6e0
SHA512e564aa4d8174e2965d7ddc3f095fc9737d402bc2c0b191a3c1ef79302225aa11b02458ecc99784387bd20fd69f7300bdeac9483a4e818690f2ff34e235c16ebc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a1d0308c8c476c813019c6c42247f7f
SHA1bb88feb89a67d7be16785e09738855ba92a5e0ee
SHA256eee744c867ec1550f7997b750ce99697bd81b75f182f9bd7c72ca68eb464cf4d
SHA512e01b249f7b669d989f2e0d27fdf61741422e021a05b904a435b1b0a9bbc2df72318b2012f5df0866abacd88c350264efe165bd9e4f9155c6f1c5d17653b7ecc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53baebb27320d497af442a433f79eb1ef
SHA14868068a69ffbf6a546980f4f59401773e2f3197
SHA256732fc7cd43bbaa1c4c14b83badbd1c47323ca48a47287c51a79f07dd5564cd93
SHA51255da66f2f97d7b09ac71987f388a2cbb9c64d4cffca616628f99e388d8148fa53232242451941e37aae1deebd4311d4f7e35dcfda9753ef95ca53f53bdf6b141
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdcad600833e77f37a9e236f58d3d31d
SHA15ce0fe8a7281fc7ea6ce5e543bfddc55b311d7d7
SHA256d91292685bf14f18fd24d11d6a6b685fdb50f89a1d7c1e16ed28ae20e3599f8e
SHA512b9dc94b63858340293a6ca4ea41efe58b42906df5b7b11d3a2ad73f9f4a526ef98b59f94c402fd5948d229601f7d70c0120536ab21c213aa66231b14c0ec59be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b9eac158c6d6a42c068a754c0a7bd90
SHA18e67854c1bdf573d584552fbc3159f39a104af81
SHA256c2673bd484b474f0fefe9941a2f960f757238a84e24943b47e20e326db7b154c
SHA512b121e758ccfe3c33e328310b6781da238b3f46b3bbb91fd1f5ba8388eb582251f3cbfd58bcb1cf4b9121a31541b5461a8988f8bb74233781281dc254b0b0c772
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c8e5a2805e7d6ab5d89d89c62fe1fbc
SHA19e017a92753899abfaa2af419c97a3b790deea6a
SHA2566361eefbd44ee0243577421ac7fef410c229bb2670d7c9eae05dd827c05a27c3
SHA51265855844d4703b486771d8e004d3c23071d709763d8b8624a467658d8846155b59649807234ef7e5d82dac7c9c73be208f0d9b77798481ce5ed45dcab511ac75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bed1bb9adf1a7880eaa42fe63d2c27b1
SHA1c713c720b6d6bde06433dd429631dee4936eb957
SHA256e06a67bbc8e9e3f0ced5631fcc182fd1ec8eb251d61f070f4d06796c8a8b9c50
SHA512518b655743e4b527b0fc1f8597bc279f6ea1792fd91abf115d03e2cf372c662c0b4ff13b182a49e4bf493f818ed11a458786dddeae1ca8577dfa2bfe13fb213a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546a4f2cbc9fe860abe3437ef55a820da
SHA1fd87bda48e3ff4c710abb85d5e12ebcbab7bcab8
SHA256907ce83e347a89358521759a8ed929b4a79265fd5fa4c24e495789aad018345e
SHA5123938e0ea25a78558af6eb296e62140f8ab0006cc9854f4c77a4bee54bf5efe2225e6e07791a7ee76d9f04368959ecf436c33ba9f88d70c510b2ec3eb7ace94ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588daecc8f0fe254e9d74bfa1dd341047
SHA1699abe3043cd9dc0d7a95e58e24d4131adcbad39
SHA256829289a580fa897f26a7fd97dc3d37b770ead06385508943ca502cfca5ee2b43
SHA512bde7fe3729219ed53d8f0aa72d5a27e66706048e7651609c873dba059c76490b25cc1a7e863f9320ff22e31462e986e726ecd2a1e86ab64b828d1a2a171177f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aba6bb7a40886cb4725e6a7b94932fa8
SHA1454538c31672a04e3b834fdc2dae7fa85838c60d
SHA2562c6734a63a00b448e53c7bdc92118f88c3e0d6142899b7c5d2f0f16eaf93c326
SHA51212471f6be01b01247501d2a40f50c56aff81a6bac924b812e33f53007bfe8ae33df440abae2e1d591e6276f1327fb84a111a052d2078aceb96ac76d24dccffc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5136d99b3ae321c1643fbe52771757edb
SHA18f2e7d75c0b350a84b859cf129cc46b6a360f5b4
SHA256e5b749df839c1fff55c576fc21be3e5b60b3aab4cdd5592062f5280354f3cedb
SHA512f82090bd10e7116d1c547b510db959c08f070ab8541163cadbd353e453d1a8c643cd758ba6cdb32ccf7fa140ddfbd9c1a6e0cd24395849b28ec1176bec638696
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d283e4e231ef11cb82b7a1c062d577de
SHA1119b9e0900a313ee6e3966a3bc83645efe753c9b
SHA2567cf3148dc66d86467012b6961295b315c59340ac80808e69102d0fd5fbf5c58b
SHA51203200b1b90a4bbb4fd1a8f68a703d5490941d9174936b637bfe33177c770e5fc1b7579204a33d302039f5089e724e4356094ac43e3d0558329f4f9cf0662197a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d901f81219335d6c2fe07c30b29299b1
SHA1d4cf67ceed3824290cc058e19026cd95973aba57
SHA25645672ebbb1fa25b2ee8e3eb0c004bb22675d02c5bd4d572f3d6339858974c863
SHA512c28499725a58b2496253cd71fa9bab8220190b7618ea306b1f8c5f903fb959969cf11b2b9b606a449cb958d19345233a8cd0b99115f664c9488010bf2a037317
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508af0d6a44bcc04599fba815d301ef09
SHA187f0e59f74364885ca32850d199c22782896f248
SHA2563113d67917cc88a2ee594e62b2c8cad117d518d19fc0cbf13ddb24ff6bcefbcf
SHA512f55aec80de258942c1b7c8cd0692abe9ed6c4c7d029679e52d76fe3a7f7f21bfcab2f026f2ec798488c11d9f5b4572d91d3d753788c87d661fe81c1dbbfa05e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558ee83cfe4165d0d190ee7645649c141
SHA1d1550ffa9a0af5dae9414bf2d565c91348d8a9eb
SHA256a25ed98801bef8207a06c65096f63ab2f074fe4fd3860a0ed66640c346f232f8
SHA512e87ef44da1266719744eb779e3b15013e05dfb0d288ea0b8757022087aa8e9fbff73311ea59291f1e596441518f3968636ef139fdb09434edb2856550d287658
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8ccd21c46a5d7263e4e96ea4d318018
SHA1d98018c6dba689d715d55dcd998e7caaf840a5d3
SHA256eee66112a04184de97959d1d5e90bbb28b081704fbcfe67998b24fa157dfcd57
SHA51235b06ca2acb95dfe3d5c6942d37dd9f6936115ace88ae9e364fa25ccb2ec9a39bbdd7053a3f91a9fcf26115fd63c5d099516ab672bb6bfa1c08fa92905db2f2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a825c48c08ad262f11d2cee9143896a
SHA133715eb3a0532172128bb5d0d260a55b205c1918
SHA256e04ffd64b2b16c8071e72face8dfa3c3059d79a6519e00df8f3b65d2877f5408
SHA512ed6357db2f21cc075bd3abe422805bb8f0191a1266e385b49d66418414a692d06362c37143b77a62394774d07e2d98a13794f6ac6782bce8a4d5fb0989110d4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500d94eb891940137e43277c7b88448a9
SHA140bcde9bc654b64a285e54ffe73fde754dda368b
SHA2569842b3dcd2058eb62995157fb89960f26eeab4e5397cf9261e2c9c88172161f2
SHA512de007fe4ea86f00a5623485e7494a71e70313fae3f102e72de4aa487b6ebf2d33f92caa3a763adf28081d94dfab1e532ffdf15d22c4ff927f03aaa569705474e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b