Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-10-2024 12:21
Static task
static1
Behavioral task
behavioral1
Sample
52098c4f829ac0b67717e9c1f317814e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
52098c4f829ac0b67717e9c1f317814e_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
52098c4f829ac0b67717e9c1f317814e_JaffaCakes118.html
-
Size
53KB
-
MD5
52098c4f829ac0b67717e9c1f317814e
-
SHA1
4ecef41540292cb79a1ec6dfff1f5fce6c641472
-
SHA256
671c6f6d7c5ce35ec40e0bd5756dcae73b6a8475f30bb1ac39495e6cc27146df
-
SHA512
622842d574fb052f4328c52f5e85f0f4ee184870a5e91b8835c7092e6ca5015cda42e36082d1314091005fcbfceb132b51e55b5da81eee09a145322c594d0e8f
-
SSDEEP
1536:CkgUiIakTqGivi+PyUA5runlYH63Nj+q5VyvR0w2AzTICbbVoI/t9M/dNwIUTDm5:CkgUiIakTqGivi+PyUGrunlYH63Nj+qh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5810B5F1-8C82-11EF-8252-C28ADB222BBA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435329560" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000c2755d913080bfeaddf74acb17af1d8d1a852ee8ea8536df909438b4a4ce32e1000000000e80000000020000200000003ad2e31a236ffb2989e383e3790ee5c3bd0b30070056087a3cff4300950c2f4320000000281869a891e89a7004f527f0768bc5cc6b84e40a62d1b35955d8e6d4b71e4de040000000ef2e37f335a53efbf7644fb47530520dca424b7bf3cf9d1f6fd650f71c3433b3de90b7313380289406450e2dc0ccd9c6672347436ad77ff5bff6db8fdf9d83b9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0026872f8f20db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2416 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2416 iexplore.exe 2416 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2712 2416 iexplore.exe 30 PID 2416 wrote to memory of 2712 2416 iexplore.exe 30 PID 2416 wrote to memory of 2712 2416 iexplore.exe 30 PID 2416 wrote to memory of 2712 2416 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\52098c4f829ac0b67717e9c1f317814e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2416 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e9d4367f01b0a3f6a92c7b8bf99105a
SHA17f0b47dedf42d508cb08fb9a1dcdef2ab3fd2612
SHA256e4d0a2d91bc273ab8d5d4153567164b6ec3860b5f2a08dd84cf6b7cd0365af04
SHA5128df7a69a65f24fdd711970eaf5d57487f89c1ec50c4ddf3fd71f00ba2ae0d8643731a7642b5fc2e2b5997ba135cc63d2960ee04d52854f0fdfed7ca043df6c9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526122b8f14f0266bbd5745037a6a35f3
SHA13b57c4be7c7be2d6b907d58fbb5715b7e1d2eb92
SHA256000dcacf5cd89d111c268cc67bf093abb5b2aae4c9424ef15f7e7cda6be03523
SHA512b10c3916ad93bb53ddf2c729e36d0099f06a5e2535afe42a8847eef3a6329af137daae083fef9f1f7cbba540006bbed519c2e906134e6c146b9775e7aa38a061
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ff80325edfd9e71ad002970cfa2e176
SHA16cfebc6cd2828c395da016488169cd7eb883137b
SHA25603409f240243c89956c8ef626f4284b6f05c66bde0f4ecd785260fb8e984356a
SHA51211aca9141ff0dea3616ce9a9fc698857dbe5747ae972124cb751259bdb55e4d736d5c324c20d1c2979e85b48b026c15af4e03957bdf1addba35a5b16b0608522
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eac5352ddfe19cbed93d8ef177689b3b
SHA16deee5c05141a44b381260865e19787619e7406d
SHA2563652bd0e7369d14ae2d311a06aa196b4ab7451ef06c47095f4f0f7eae4fe55da
SHA5128d6c62149af4c7fc3f3a9261c9c2783071ceb7ebbf05759f053ffbc84e996da448cce25a36d1f48e3ff164cb271a56cc8ae50aacc8f5b6087fee0f5f7a4851a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527784bc9ab624533f586e9b781108b7c
SHA17d3e055d80118c418565d15b287ead00abfd987b
SHA2560c0fa1eeb254e7504876fba9f2be836a1805f6086d79aa6b8956c7ec7c54bb93
SHA51204e44f1613c02236b0c41041cea50d57716cd25c17febbd7a92d9d92e8045c4b1dae469ee8ecb94d4736e96df3c9f1a11f4dd1844f54e3e898d5dacd605f83cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aab1c325a2c6e107102198945781c375
SHA19ea53515c63f3eb10c55a7a362b3c99ec7651bc3
SHA256b05014e1af5377b201ab73ed278d7c811cfa7c6c9af738f2776239eae0a45a8e
SHA5120da09e1e194f0569283eaaa99b28025faba9cee71bb60215f295aad264fd78084eb156c858f40561ce7898db84709ed8f5a4fed167251e0aae5906a042e3de5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506b6c64f7b6d2d350410ab96ccda8426
SHA119a02e04b20cfce59be78f68aa56bb96fea35f33
SHA256752fe40a25ac81932570dc8cc08b4c2bd2f87e112f6b185f3dd2bfa1cc93ccd5
SHA512fa573f42b69d5c606a98c90a29c44f0b83fe089f010af70fedd60933176e97bd8c22acb74f2378400920c046b820911474304511231fd0708f077f765f529d6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a43c731c99e713402d081f097d3e4c1d
SHA1af4dac8b2a960bd761e154f853a6fc6ec82fcb1e
SHA25627a098a25b44f90573fb7aa0082e8502f82d417662ac80ef64e96c315fa62cdb
SHA512c62c4cca5b6b9457c1c54536bc4180063078c8330c50470385932b6dbb5f90a50e09f58ee78c034931eec761143c95b4e2f24bc7418f52ff1cbd9b716176b45e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bbc5b6363b4358f51ad056a4be2b4e1
SHA1b8c7026d39f4850cc2b6658603b130f9f2746ac3
SHA256e587d84a4c8a1a676bcdd5c585d909602422736220bf9e97674a509abf79f119
SHA51270fcd71a961007a0248f338a0d8a06acbd1bec4be928460c7578777002ffaf8c7485723f41c238d968903cd98a472439cfa21ddae84d4c776cd7143e3b15c216
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5169adf1b7fbc2a483120d67d1fdbccff
SHA1ec99630ba0bf00cf9fa278e13331f4ed6519d7ca
SHA2560da734ade7cc59fe0d4137798f7f2e0809049473cd74c7bafa3fea5a4f5d3912
SHA512de7ef70252c11fdeeec40ad5adfecf9187f9b7607c281e74479060ca4e566b17d47330a75be89574226aabf6fab6e1ad076d181e99410243bfede32ab13502ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5087e873fa80872107301e5d1fb20612b
SHA167d87cc631dd7677bdd1104c965a02fe74a30d20
SHA2565f5d9bb40baa35137a3b83b51158db62e8302e2ca841f638161e00f4dd8184a4
SHA51213bc3c73a76e3d5bbac7fab5b681cb4076deeabb2e9db64c492749ca102137f1276f3a7a767f123076dd2b8da66a2353f6d5b73b5f95399619017cca0d533a04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550382de95355bbca9e96581205af8047
SHA1d2819771b80ee8f0855a938824732b08ff76c378
SHA2565b01e69977ff4ebf49128e9988199c1367f65d90833c7bca2c96ed1d2fc11cfb
SHA512c38e2425b3b6cf3c6a11b36dc8d3e13ffee7a64c739b9079e933c3d5a4b4bb12e505a48c33072c7d0ca888b8f3c66302b635a879ef84387ae47c6ffb7dc3d4d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55161820aac7581252346043b94408354
SHA11353d7119e58acf3af9dbf13fb3773fcaa1ec86b
SHA256256ec70e83dc0e8808d1eeaf6e692fd4750222c747953e12ec363bc91aac2dc6
SHA5123f19e18bdce713953bc8a41b88721a674da3089753fe3396d26994d88a76f3c59e705fc45e0a4d8d489967d4899465fe283576322a42b00dd6d0e38e2698cfa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5772a94bb55bebbed07cdc0846a9a842d
SHA19893e57a75adc4e2399c0d32a5c28d26b27e5848
SHA256598df33e00d57b1c625bfcbd1492b768907cdfba3c4f2c6b647a743625a8cdd7
SHA5121ce48ac280e0011ff7e2f8027c07fc77a90d48a7dfa2423334056beb3d83ba0416e7d28abf320b84d3be73c05bcebde88fe709a96e9f1aee2b1e76d5303cc779
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566f6c3b97ade0f137ea9ecf7b8213551
SHA1091079a09fef16c23db8a0a1153d4d1eae39b789
SHA256f5cbff08e0dd7e201a9e6fbae8c44c3ffbdee1914cd8541fa916aac3ab26006c
SHA51264eceb578c242ba8fda5a357788a719760c18856697855101ade27f8f549acdb88de7cae22198e79069011a4eb7a16de327277171006932efbf3d77805025f49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b514cf9ff84d093cbf731252575c45f7
SHA13b757e41bc19564188e2b5a1f3320f09428f5ae6
SHA2567398680f0ef32a2ed5c15c45216a4a51cb13eec8af2241a06a0b1f878e37de14
SHA512089120b62f11da68d6db6966aeed3393d3100f308f01133c6e03534efa5d3329383ab0c3be227336d69dc9e36f1399afe71a3d3662465cc3db29d34e4a9405e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e2f25627aa1e02b9e1bd1103c826776
SHA142807796f7fc6bf5f487b1b07d88bb1b9022cc7e
SHA2561fc624ef7ca314a4aa6483702428f745a29ca545df0d908c11783652e899f810
SHA5128b9e1d2a292cc57a57b6bf9d520ef3306db514f7f89379766e42335e53425025d0c05798d389756299c856be9a8ed3337e289c0a9826f577e29f73ce8cf271c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53493ddeea6bd5218de5511b1cc21d50f
SHA1abb094cb03f8af1014a0904d3e13b44d930e48cb
SHA256d3dac357b39a14fb672626903c7c725110b2030ea1e601152ede1fbafd78b511
SHA5128997a37b08626ce0ce040e3afde8cf8fe170200b03066e6f0314e170edf5cfaecd5817d5a5c01b89afeb8af22c4e8c34fd8d63f443c8efdf1960b63a4b9b55ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c51fa12e11b83ae5e132c09f0b8203f
SHA11be0692767dbd79c2e053b340b35dc62130eb18d
SHA2565d8ac2546b017cc94be38b3d8dc09aec09d95f493a41f0560a9f21a02228c575
SHA51237a17d2aeadc37633a0b8aeae6c2a97f59fc4a9343e645886a961656ce1489b2f251f4de16b85a63ef4f85528d798079798ddcc80760a805fb2bab1b4c1327a4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Y8UFEBH5\print[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b