Analysis
-
max time kernel
143s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 14:41
Static task
static1
Behavioral task
behavioral1
Sample
5263c4c2c412364d49f3db0a7eeeace5_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
5263c4c2c412364d49f3db0a7eeeace5_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
5263c4c2c412364d49f3db0a7eeeace5_JaffaCakes118.html
-
Size
139KB
-
MD5
5263c4c2c412364d49f3db0a7eeeace5
-
SHA1
82772906e448e9c841790bf247abc4aeadb92eaa
-
SHA256
252908c46096591572a180a8fd1cf0365928c1aee89fa3a52eaed3acef877e52
-
SHA512
8495a36296dc2d0d9f22dae9ab1a9bd472ad508a98f08490160f455d45dd5ae043cbf8544f9c080c0ffe7e59cf8085d858f3d89708150a7f1a480a0ecef7f6f3
-
SSDEEP
1536:SwNwZ73O5kloQVml5yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3p:SwtyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F36B7BD1-8C95-11EF-BFDF-52AA2C275983} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b131900000000020000000000106600000001000020000000fcac87549173a5c4996a7668af9d7cd53d9f27cb1f22197f2267c7c4c8ce04ca000000000e8000000002000020000000dc3fd1dd810a90ff4d55d0781490e760796613b984392824c7e14407844f4bdc2000000006c61f7a17e54676e17b9fd9dc3e97b71278e3c44491aed617769d7bb5f81f09400000003147e2a37407d49b6c7d3010326c51f5f9113c1fa9dabce1c00683b18b421667cbeb414412826bfb6783d2cc8859702d190a30abd6cfbbb067af9ad6bcd21867 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435337984" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d00ccd0aa320db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2448 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2448 iexplore.exe 2448 iexplore.exe 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2448 wrote to memory of 2724 2448 iexplore.exe 30 PID 2448 wrote to memory of 2724 2448 iexplore.exe 30 PID 2448 wrote to memory of 2724 2448 iexplore.exe 30 PID 2448 wrote to memory of 2724 2448 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5263c4c2c412364d49f3db0a7eeeace5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2448 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dabe1676d65e72161a8a258a7db9a547
SHA1cda4231caf2a94cc054d8c981702526a6b5711b3
SHA25681d234c30119379c2c45100b6ce87894cc5c5a5f840e0594561e605cd7be6e28
SHA5129a1a2f6087958087f6bc73feb3715af997bd1bbeca5dfb0f4d0b0dd0916cd487c1404c93c76f765b14496612668b3929634dcbdfe6409192dacfb437da4abe11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dacf36101fe468b36d961dbfef0334f4
SHA182fbea8af5a37fac38121f548d45daf593ff25d5
SHA2565e05d38df4f79e901449e7ee2e3d91653e48b205706e8acb0d415a49df877e06
SHA5125a83d650e4577b442843e8bcd63ddf26d7e716c9fc33c8591c6d7448c2eddba218318000b2f819a93eb7979a7d01e1b157f4d4676cb337df055729b6f99ebaef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc11f2a4268f028d4c9834fa6c53f0c5
SHA170d62340faa385173de2f3f939a2ba750faad497
SHA256ec9bc243ba6f3ba095a93eb2f8412c53a228a3ad8855dcefeae2f5d82c94b916
SHA512c8cce5f68d47dd9e62596ab32912c9eb6af8df8f1d8b0acfe1a7fd05765da04fc81a0ba087d66937073fcf804324e212b806b6250eeaacbaae054b1fb9aeae48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a672eb17c1e05f397e6fb61e191604b6
SHA19c0a66a140e69fc34d5a1fd1240198ff7e2cc962
SHA256f5393fee1c3a90bede447d88001395876f765052c19aae200a304737798c330c
SHA51213c07085551a21a33783299ea690c7cf6036ce5e89d1b62185456799387415c3e5bcb5536430ad98ff12bf51654eed937d6106b94f8c795405feced42e4051dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560b43bfc9b9d2b98b1588a392aecd899
SHA1486a0109608af61544a1c14b55ce8b7e585b3fe0
SHA2562b31fe398ae7d9076aa10af8dc54b2a9af24a0c431fa8b197ab8e33ad5fc5878
SHA5122a9ec4161ab0d5a3fa177800dd32fa3d0c2ea8e03ef77dc5da339b47b13d753b34acb8576aea9bbb6742566b92c6c5bf2da4624fb44b2884de5e710a49f8eaaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b59170df28a85b2a8d48a6d7dc73c317
SHA159b2b293de6d66f022868026bff56f49ab1fd526
SHA2565b854a599c0a5f3c799e0b4c65acec0f6d687f3a8736e4d35d32842adb798a93
SHA51296c6a296d776ba62487618dd251fbc9b1bcb3f08ae34565928dfc35aed00a423c13a66d1d77959574e455383be84994bce197c98b88641e6b0207eb0d313495b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d56673aea059d873c9b33a42a405bffe
SHA145e2877867fb23ded15f072731256d3c43ac9e42
SHA256232116c30098ea185e965403d58e398d2b2c3b37e9f78168ca538aa8bc3c23ae
SHA5123201cab0293c735b3d472e3c4dcfc62cf090d89994eaeda5fdb803322eb1d4920f57d0658b3eca53d55ff540a9b52753d225f2365c8b890437dc713cfca24864
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ccb30b88dcee7edf551ed820e3549bd
SHA1e069a51c99dedaa3cb6762a53dfb7f3e87897760
SHA256d515b4bd3901c1c983588513c0d322db08d7c95c35b0dd43d547b5e3e558af75
SHA512c02ddae119ecbc50b410e318fd3bd887f50799a8b15565fe7fb563bb8fdcd0b77ea75fb74274e27c7a06d059e332a9f1914a88cf9a39b2dd4f0299da028a95ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff8053890c1a42d44273495e0086622a
SHA1f2e3a2c61b40beb5c854d3f1478b7687b912fa4b
SHA256f436daef40ea0a3644d7ad924323c7d2eb9d0747eb17040f7a0a9aa004ef9d91
SHA512fe010be9075fb5146522512dbc74dd1fb28cb1696afd4b0b6b39f98b4832d7baf7f2ebd5090394f8fa6a45c0954abd3ba41ebb9dcc5304bbc8b1f11cfb1252e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8fab3553a4448531a39cace9f545118
SHA12c55ac292dc57c11fe194720be9b28bda5e2bf26
SHA25678bf87f35a6a8adf5f3b925eb41e27bfd729c70eaafc7c01fb20b985a9baf770
SHA512f4549c672040e3f4bedd36bc2a469bb63a2c5b8b58566780a54467f686725007a3fc5351cb6cba86e7e1c6ecef72cc1a1d5ff9249450654684644d13e1c5883f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b8683887ae92022400c5f166bf4fd61
SHA1b8ee94ee8438ad1b1edb96ee833705a3e908de10
SHA2565443fe1a072e1bda39781aa7e126da00dd906ff13249ab7d9ad37fb20166e0cc
SHA5129828a0a16856474c6190c9bcec6a67b500f496e5e0d2384c2a634809251602e34f7800b61f9d8c8f6fe8e9b0d39cc3b29a28a3cd99ecf36d376cdbb43a3707d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddbf07ad95a9711eb24ba722d979ec36
SHA185859e53bbc9d5cf1585025184640c903d782d42
SHA25692d130106bd5afe8a0ce78e8022537c13dbb838a85fbf155185f00db2a4e92f5
SHA5128da5b29f93f5d6facc3183914e9e79aab4a407fa230bdb1063601eeb18b25e084a80f9d98a4eab690819089c4918f172c56e2631967d35de472e4214944df2fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5037e286f28e9b5f8eec1dbcea8119278
SHA1f2a22c8f29d653a8a816d3f340c11de32ac4ceef
SHA256612d062553038ca2ff99a6969ccb7de4d4f7abc65bd21358ee63a620bdf9837e
SHA512501d8aeed4445c32f2e593b81059c3cf09e1451de6390006630c854087f792022794c8ad754e8e23f43573d838eb9f5f7cd9cee32c1fabf2a5e8b73cc4a350ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517c87ff5f601640a8a7f0cf83ea005a8
SHA1b1aa09f816a1b215d1853e121028c01958a9d832
SHA2560d2d347e64e12220581ba748b3ac9111fd8e7fd86c41f131f88485b1dd6334fd
SHA5129f1043ac24df812552d592fba769b5377abf9c9eec1281ddfa48e8b3c04ddae5b71cc721dcee39607e5fb38b416ffafca3f65c0bd4d16f1deea8e2356cfe1d6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ac2260ee9cb9acd4d5dfc1d7ee75463
SHA1a6c2638e1b7124354ef06fb3a552030506a630b3
SHA256655aac57e236aa01a2ba4267dd67f82ab2c1f66e91f2ec7ef5780592d3facd92
SHA51203f0a1b6f4ac0457990acd970f0b0b7d0caea12b33bd1bb7f9ced5396055ac4135e43c5e0b398436fca85cd6275b535045eeb18282442c6aecb86a6b8b050370
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5506256cbfc73812b657cd4a5b4c36423
SHA19992a28972ae4be7ed8b2214de86d5a85896bb34
SHA256fa969227fb3146fc6601c61ee4c302a4d24efa3a7fa736d9c08c68aef0491493
SHA512a00b4db2c06e93e056cd764a61efe8e1026c8248db85a0c6a44bbb7e7ee61280834f6b116dad75360973c449238cbb11cf9dcad573c72163319381e61c1af655
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0b6f8fd44d19ff4e58ce5dffa12d3b2
SHA11de042106b100d60060dbcba7af0966a7d6ddc09
SHA256ab085bdeeb17c54b76b772f450b6f364d9c0ef6e53d05c6043b7b735365cf52d
SHA512fc0c56fbad324136a6ff578f85f52deebedc7975778bb762b2b5c6bf7fbddb3d46acd6234fc1ceaf493e681ac0ba462c0603f5e8d11e875efa19bcfd6a7a8772
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b