Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 12:22
Static task
static1
Behavioral task
behavioral1
Sample
520a4f3b8d4eb6f3c1828617f5975b43_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
520a4f3b8d4eb6f3c1828617f5975b43_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
520a4f3b8d4eb6f3c1828617f5975b43_JaffaCakes118.html
-
Size
10KB
-
MD5
520a4f3b8d4eb6f3c1828617f5975b43
-
SHA1
e2e4f96f30ca2a70fe75ee2f4be47e2601cf8a31
-
SHA256
ac256f10173e6dc819f5b13cb5d6af1988037f140e27ef37f9616a5ece6af275
-
SHA512
9180aaeca939a149ea7fa53162e1b8f612bedf806b8c7505e0e455e732078caaa616dcee0f3dcdc36d8503bf6c6a4cacead6f49754608fa3b910839796e58a09
-
SSDEEP
96:uzVs+ux7GSfLLY1k9o84d12ef7CSTUqGT/kJKRp9TgtAP3QSlVHcEZ7ru7f:csz7GSfAYS/bu9TgtWQSPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 505447648f20db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435329650" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0df799d436b3241a01fc860932878ac00000000020000000000106600000001000020000000c0ac66c4f57d7aa01fb7a1d1cd652f2ad96525ed16f0bf2d8adaed6e87475eb7000000000e800000000200002000000016614974793ad0326bf80e4e5533b71b64933ac5e0d15d9f5f361cd0f73746ec20000000469dd6e0cfa256fb3bec2b85f79748d0a330f836d115fc964bd137d23079e096400000001aa2bc7ec22d69f76645887b78bfe32cda87745e3c4ed4107a6d41308f0d4e146f28fce14f782e107576f3479b91534acb378fbbfef4b7f57ec3241ccb28efbd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0df799d436b3241a01fc860932878ac00000000020000000000106600000001000020000000bcec38aa0ab2fc05a8b59843b7a9cea5a416f684bc559346abd910350fa6f4c7000000000e80000000020000200000000857b6d11eb7824cefc3013b7d4a09966612811788116cbb74b9c43134bf4fed90000000e2956136e2f32ba75121880a4eba40a57a9ea976c9e09a3545f8f5b6f8c34f6d60b403997b8fd77e865879d0a64878a4a4a8e6b7f6b8de578c6541c87581650d75fbf388ad1df11426effee2aadf4c7262cc9c0d03b293e035353ed2745a1807122a843b588a85ac54abf84c3bb538bcdf3e749f1a13e3f785712cce30a70b3d938a80ff9ae992ada36e99f4697f657740000000d1a9d06c7088c6fda1ece00bfaa53f06da11effe95b3b28daa076635f08711571f2b57970421fb4a6e1fef7cc726212a7b2008dbaf2f3a9c4bd1fdafc45a95e7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8DB715F1-8C82-11EF-9CB4-D238DC34531D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2328 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2328 iexplore.exe 2328 iexplore.exe 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2328 wrote to memory of 3032 2328 iexplore.exe 31 PID 2328 wrote to memory of 3032 2328 iexplore.exe 31 PID 2328 wrote to memory of 3032 2328 iexplore.exe 31 PID 2328 wrote to memory of 3032 2328 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\520a4f3b8d4eb6f3c1828617f5975b43_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2328 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a99925b5f9b44530aa2a59187d94fbba
SHA1ae68e584776e39a572f91268b2639a26370938b8
SHA256112ac841aabc37ff5007ed51bdbdeaf7f10367a4e8e70896284cae7b7bc02df9
SHA512345f821e08aeed5097bc0f0033585e6d637b2947517bd7d46198769ea90e9345c91e1843df009ecd86813986184d4f43ee249a006a8afb747ee07dc9a389a57c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552c965ddf212005a12eae3e41458f4f3
SHA1946d12b76f4f94596ee87a7dc0ed5cdc1d9937b4
SHA25600517c0c787e3ff8482949aeb6def9567d02eaec67c8d20496810800ef1c9590
SHA512be81090ff39ae907b9e949125a4650c389c9f416a06e2047cce7ef098696fce743b5170cfb558699b5ffaacf3d0e37c785049f44be06c1b8135a94d110ac551c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dab8117fbaf9a32dd5a85ec86eb4491d
SHA135fc2ddc15dee35ce4edfdfae792d4af8f5fe6d3
SHA2560bbc5adc8b4557ef6c1e4ab3480d97e78ef23495c260677a5a0d81490255fabf
SHA512d16d051534ea6969431db00d5217ab135738c8bf404d1492d7da6e3e763974ee5b21a2f06e26300fc55b025582904e632a4bd4a293f521935e6fb3d4d53e15bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0c0b11e3365b531a3ac846c25e1c55b
SHA17050c787fd5afaf3078e44a9d8e0b7387e2eb16a
SHA2568073133f5899b8a3561ba51071ea2847f26a3d1d8ec89e73653e4bdda873ed05
SHA512f73dde58df0db0cf56646e2e04f96fed4523362f875d0aeb69c4974149ee662b6d00959af576b46841055fd27e1fec7f8aaf223e0bd7f3fc6f4a254bb10a6222
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b88c8b25c6e61353c50a3f9b3303086
SHA1aeffb41d69208230c9d15fbe2df74aa88d422120
SHA256383d0bff91a14c3bba02c116259c26c8f7ae9b63fd3c5abad6e62c838d9fa4d2
SHA512e15c5d46eb5b81474a3664591144d849f3768d65feae0945f8b05f6c514c6a50b3e4c750b28d6e5aea43d530fa106a58bf1d6eacd8eb766303a2e82074dfbceb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530f8da91a85494f5c62991ba42f20dd7
SHA1b71a5a88b608b5c33c63f11fac3837994bb9cdbb
SHA2568c88de6be54aaaff0630209fc72ec5d8f0a565e14c1a3b44507400a3b9adbe7f
SHA51201992ec44a87866d947786cfd5c85ab8c395115a144916302e8cb5c9599cd4b49eb739de0c2bbdee9fb153bd865d34495cc5fd71e3cccd61434d74d0f1f63725
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edc7f9a0556487c31f859cea4e4c407a
SHA1664cf13b3d1be87f62b05c0e0bbe74ff1d057b90
SHA256c9ca0200550ed49b1cec0c5192a4570d2b7dec710b32e69a5398fe7715c6970d
SHA512ba59be61b17d7e65e3eae46a30117a1de8319fbf941c61cb001deb8dad5326b277404b1c84796bb2f20bceca6ad75c3717cf2acc645bd518b9ffc17215235fb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b9671c5a2ae4601440365af5a32aaef
SHA108ba528afeb2e2c2381282f8bf162f8f8d29191a
SHA256bd5ac99a40dfecd507939cdbe0480fdccc630511ae91a2ba9d1baaf9094779b1
SHA51221bfe1eb7a3e5e4df3c8d4fee8c879678e9a240923f037bb5c86469ddcdeff55565dd344d3144471699aca06c021fde6793d4e830e18bb620f7e73c1a4aee9aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce634eb810ef6e4d43847befc2d872de
SHA1ed98593db5c45415f8f60cde0718c820483f617e
SHA25641900e61a20165e81f181ebb16901291149a75577b2703f83cea898ab853490a
SHA512b22b35486da0f7c5c25709f37961cb82e961d2f081f73d789f88ec9cf5cc286ea8585b7899b5e2ffdd083a1292ced368086270ee19311bbd336102d2f3c8c814
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c5d6efa7166c8237b1f799ef50a7a47
SHA1a99da6323c42ec0ea8bfa1c4717f04cc3207d315
SHA256c126c529b654feb8d6b0acb4ef6ab127bce101a6f1412d1910577b98d0883681
SHA5126efb1ee2c0c9589f32b6befd59ffbdf67c5c7a340c495601aaafda97561275b9f567aef8b7b1d956491b372aad22b838e075740271ae32f38cb06c8220bd8e4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddbdc02ffa25c4dcef4376f2428db8ae
SHA1ffae451dcdba4ea9789f8c17d209e01104394e8a
SHA256fa11397c38743a20c279f614370fb33ac934add41bc8291f74cf6ff59f0d42dd
SHA5123dbdebcdf16d6aaed9efefbfda4f2c47af078459badcae8ea2702cdba6e70bf019c28c974d782c41fdeb976291d5bd25a0de56731abf9b9302f9dc59baaab8fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ce0f08885f846d5e015c734c495c34b
SHA1418897588a960b8118b5e7c89dcad96b390d6a48
SHA256654ef2b728dcc5b5674c8025526604cd716d8ccc0e0712ddb16fd8706a805f86
SHA512a29e9fb7db197a658f8caee77ca86e8af727faffcc80fa0d8661f442b8cef27c7efbeb0c9746f4bc7a3ec7241c1139ebe1896f2aa8666089c7d72b6af2aaa980
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7adf888dc5e574de6f6b80f137ff036
SHA1b9bfd21b5111d651f1ef0ae5d3e1c6c3b2c98f44
SHA256ce851f69a5da741062ee876b56e31f953853c9f5355f43ec6cccdb522e188e8f
SHA5120181f7450e8170536881bfe26ba1e31c389c5b094b1c5bef40f5ce42ec0e680f225ea45ab15f1bd58806e51ce09d694c43dfaaa3a63f0f72ee47ccbb61868fb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fc4129be9c24f54de85d8270b6864a2
SHA17df82532ee783089bfe46dc2845f4f25e1fe0d41
SHA2569fa6ce4cf0071c1af4285cb4aa6b41c8af1262c44f8ef1e7531a645c5181fd30
SHA51246e230e6de63816d9bc83ea9c5c20fda6bd02bdf7dc96610035446c3c674e6f761b132d794727f1a15f2829c436c6177432f72b26c92def6af39039b3193716d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffcba5f738ea9a9c9977a19e9fef6b50
SHA172c6f2068dcfd02a87e4a4917729cb35d66255e6
SHA2565067201307ee1c6494888dca4d8bab2a24ea9ee2d8d460fccdd1a725cc87b0bf
SHA5127d509adc1ce54993d7f972d527f0310f7c4b552cd90c0dbb39cf75990b63dbe36fb05326d042c20a76655cc9147836a94e22718857d886475eae8a54f3db6e50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a17d008dab629fbd552a410ba2dce80
SHA199c27e148297a0acdd9cace6f8b070ea49309ef9
SHA2562ac2160f3e4d92079f220622a0ff17736d6195b516a90717d42fcb95f069e4ad
SHA5122813111299c4f453d1e6f2e7d5661a8612f89414ffacccc733ed0a6c959970f86e880717eca7603c0d27824d6df82bf9a81843ceb7a3e1d84b63d4c81b98c60e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efd1329cfed0b6fe07878451fd5e6ff6
SHA1a73694fa9ee63debd926d8beb50181b832ff87d9
SHA256cd7b6ecfb361adafb02e913c4af9369d0aa071356b66107be96c37b3cf8dfee7
SHA51260612ab0f1f6ac6f2ad0ce676b7521b8f74dd3a84a784204231d4f7ceedad8cda17ab0f0156e952eb85ab94955491dbf5be0d9bfbd4982a04098ab6dfc4e70ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5243c84f2014f356c7d75d484cf98f098
SHA135ce8ad60b1c8085fd03385ad93f7d32b439cce9
SHA256980606a4d8f85c46b48070e6dce7cfa790d92c7aef1e75dcc8ba5174cf9e3132
SHA5121c1437803a982a82e5d8f75a4b25154b176a0d1914240bb3fd526cbdc06bf78a0de4e59f7e22a7c2dd93e0e26890eaa3484e91e8c1856f1a3b20ab03a62488f0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b