Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 14:44
Static task
static1
Behavioral task
behavioral1
Sample
52656a514b66d35d06291f6169eaf239_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
52656a514b66d35d06291f6169eaf239_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
52656a514b66d35d06291f6169eaf239_JaffaCakes118.html
-
Size
13KB
-
MD5
52656a514b66d35d06291f6169eaf239
-
SHA1
90bbdeee329b9cc8fef39a91dd70f8cd4893be2c
-
SHA256
446661490d373b8b1961b594f29910a0a8fc1947afd16a050ce7784a23ff8352
-
SHA512
899c69091c4a12c6ee386a56bf501c5bfe33380fe5a4c83dd1e7d635f5d7de9f7f86db2c37d009aee70c5e023aae7baec280a0efccc01d86e1c4a02b4df73f47
-
SSDEEP
384:EjarmZM7HqXl8RIu6XvOE+eYaf7o8AuQfsbNIlmpo:EjarmZM7HqXl8RIueH+ehfU8AuQkbNWp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000345fc0dd835b1f39e1005c41062e5bda4c862426df40998b3d7a5237b5ffd3fe000000000e8000000002000020000000c3a100d254eedc708c486adc2261aab18a7a7153baa144e4c65734354db518d720000000c5c635a0a5dde61d11f904fd5be30cbb8db8479487d342d2fd5d473602c9deed40000000d66488ede7bc4a5f568c017101b67d6b88f77b710ec92f171e6784466a9c419c07cf82635fc193b5a24dfca44849aef432aad1464375cd73899cc8c85cfd8857 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a07eb427a320db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4E9B8221-8C96-11EF-B9F2-E62D5E492327} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435338133" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 860 iexplore.exe 860 iexplore.exe 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 860 wrote to memory of 2428 860 iexplore.exe 30 PID 860 wrote to memory of 2428 860 iexplore.exe 30 PID 860 wrote to memory of 2428 860 iexplore.exe 30 PID 860 wrote to memory of 2428 860 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\52656a514b66d35d06291f6169eaf239_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:860 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e35a5c3ee33aeda2342e61721e150897
SHA18d5ee10c4f27e53b83f05dd183441f28663ca1f2
SHA256acc2ef343719ce8bb93c431503c7aef24caaacbb68eb059fd0ee9e1bd650cdd8
SHA51297eb04072f6e1a725694c2274194e8f589d915602e2c3bf24ff67a4fb4240436dc10a46a3bcb8338151a84a88b80c76a7de87afe2a35cefe2c2ae24fed5d2350
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5215bb23a3777087e512888c2765ef527
SHA19364020ad1ee58be9fc3d22e3c8de3786baf9bdc
SHA2561d11499f42cbddb8e0b67281fa785ad1166fa8916270ff2a8fca7ead2f6397d5
SHA512cf08f4b8527f851d074b157b929994a11287fb9669b8e0cdd519f1c91bddcc54a161f8bdb9eda81e0349684fb1dad9551ed8dac891d5c5c6691822da536e0f3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528a35ac459ae3068b5f9fe15ec02ef98
SHA1800e4bb0d17040cefd9eb675325aae7203b98d8b
SHA25641556e715bf2234dd750a8199c10ef700809d4e1fa1b158a40cb4d3d0d8c434f
SHA512293d3dd72043bf6154de8a2e62ee61236a6c8d54a12a3050a612cfe9ebf09efd7090db6c48fb815e3e21455644a768022bb33a5c4464a8aceb50a6fd7ef5c5a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59583146f007c99babd141220ed90115b
SHA1aad04c6899382bbd3b92e10592c2851ca9f54cf1
SHA256b42d9a8ab72959fdd3285c9610eca8bcbba049628582c0e73953312d9b97d677
SHA51251797151f2bdf980d0c6e3621932216d58609f81357e1b0c7ec01e3e16dc218573a7b9bb08f1b7cd0ff21018eea14986e95b3a2df443d589ba3fd38ca2c1fcc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f686375b3fab699e3bd9e313333914c
SHA1d9938c3817d207bdbcef3ae3a05f02ae880581c3
SHA256ae6406cfa0041c6bb5a00a373a74dc0b161e5aa927a7706998bd44ce20121777
SHA512cd9fc0a27ff3e675415f90c8bfb5ec8e21f206c44f1e6986c15dfe56e7ca59b16f2973ffeb10f7882c0d7f747b34e4fc2eb57d1ad4862adec435047d3fc10c73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2fac75824002258555508be6efa5228
SHA1aaaa77dbebeba8d44a89036b4818f552dd0de2da
SHA2564e8fb0d66a57770ac1218999cdd2850b3bf9e0a84f208e19cda6f7a42e405ff4
SHA5125ea6c10c9c4d799b886b43c848971642dd0cc7e3e64540122390641d3265d5681fce606e3a7b7ffeb42170eff77a3c53f1de6d725944d8c531ee848ee51f1c26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55daa885d7ae58eb209da60250c93927a
SHA1a41f5b2e573c6ee660e33dd11790d5fca6302971
SHA25699ec6dc7e50c2e5294e52a1059fb86660ecd26738a03a4a6da4fc40c238abe7c
SHA5129f97c10171bb2f161ffccf20a44e896760de6dc8a6576a39fa91e8a500f6c003bf2234034811c53b60f78dc0a7a87204222463a8e0fbcaffbb310f7a69b919e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed4644700699576f08b400fbdf47aba0
SHA120350ae40f97bb3094d7d2220ebc650b142f68b6
SHA2560a9257e9beb4692ab47804024b74a4535da074fac3b1bdfd12b4739a427ec3b3
SHA512a494c5fa4c50db79b3434d71b4bb9506ec68b8edb9e7914f7be2b23a682cc49e7b228b057bd1cca850c883e92f1df1e0f90b3245e610f15445d4722a2e75cc1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501e3c6c214529ffb767385fc31dc9d35
SHA1e7af87a885beaa6583df7f39c15ce3a970cbc722
SHA2569f7b9e620594e9b483275b70aff83f06c7c4d1ae95ba66b9317651da5c3e1af0
SHA512f746bc16e9b3530785c2476620f1b07b3512bfaf13d03215dfc8ee6ed2f268167bc0d5d397d76c986e484b6a7b5e420dc4cc692ae9fd902f7f46888ee4257e7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5899a5e99218c050c2ce565e9ff2775d0
SHA1770cb2ac38efe678bac71e4821ad60d3e3acc33f
SHA2563e548cae58cb12e71872b8107f676ba2c2f8da55efd28d1121c801a01d7c1f75
SHA51242b583fddba402043b1faf2519507af79c32b8190c8e08efeddcb8bdc4235a0d650683e982ad2be1791281dd72d87d40d3ef91432af6393e5fbaa78d663fa929
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ac33e510085f650776aa6435cf1987a
SHA1bbcaaea01ddeccfb5facf0e4cf4684e9b8bc75b9
SHA256a09ff81bc3119fd446ab4715414f7dc6c523cd7a8e1e07674b928d452a7bdef4
SHA512c5fed7ae1acf9d774abbc97015a72e792425bf3f621a7515f783a39d5064fec4c4a6ba08f0d87280cde69b859ee922acfce5ac2cca7c65d90e093754184e7000
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb43565fa0e1b165d0563679253592b3
SHA1c811fb1e62fe132cdae9dbb97e0298c94540bf0f
SHA25693becc76cc8df4917c3cca288b5c5162127b27307aa09f7c368ad8b30a61bc4e
SHA51255230d80da76d01eb42b9aec6451c960c1038970d32cdafac6e8e0c2bdefb83664e4e3b9165afa5dbfb5e602f58926811f694daff9571f6d73364e69d38ef979
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ff4c05d76db5344315c40332760f02e
SHA13794a2fa1709e9c7a9aa1512f3cf38f89bdbbcec
SHA256c099e34cfc79aa2aca33366aa2792caee714f7faf44b0d7bf8e0bf28d785525d
SHA512b7c6719cc37840c19212f4a00134d97bef766ef5f084625ed36a351a342a771bd60eebf42e9a96fc2b7e14678eb13bfd703c3b3f01e0c2f85b0b1164879512d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558c880eac40408bafcf06c3bb536d66c
SHA1ef12a0676b56bc2959d0ad3fa09862840e568364
SHA2565ef8f558d337ecda71ef6acd9bf9d987cc28efbf626f2b1270622b31176fffd2
SHA5124e00a0b65cfed54979b9490e42801ebf29e8950f1f4aab19e391929f0edcb19118caad48e1f5337c5045371f9d8f7d3d997c7caf7579e8d35e336227ee08c5e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bf71618e007fc0e56cf2c10aa671ed8
SHA140598b8ba8d629137eee2f1fecf1d1c1bf66909b
SHA2566b4035cd9cb37b0413e00bd02a7685d02d96c73d61ef603f2a9b2e430baede34
SHA51214d6f9ca632b0ae44d5acc2015797edba457afbfa45d780abf7165e838dd79b2865140eb64d10f77ef1a3327e46d95c48f4dbc29753b62359ba14c5416ddf011
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebefa415df0958a0764b2db7f77caf8b
SHA16d5af65ab31c5031656a25f3b85b90f92619238c
SHA256f3c6dc68612b5eb7a27d2d6a6e3820d948a73a075ae6b94c84f4fe51313d1503
SHA51243770384c3dad5ff129921adec32b648a7dc72bf4fb6bb0947ec4981a51cd9c9e5ef811edf2f6eb54999c6e3c8c75a9465cd0c846288efc6ccf5cf5937d92a97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd20587610c77985bd1f04c50630971c
SHA12726919d030f00384e32e3690dd6b58dd9549279
SHA256c83c37a830a64ddd4147532277d6f437ab566f8341b8ff38898c6160ff68390c
SHA512f955adbcb8101c548c48f4dd5a420415b19441334c0bb0412ee332e39f9c3c85131063f292fd3533dee90c0b623eccd5ecf666b8fb9d339010759c3e699a2220
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e542655d5f3503edcb94ffbfbef5b545
SHA19207c9ca0d7456fc06f523c727872cac2548afdf
SHA2560b7f2d12d76623bc8b20380bcaaf7d0665ffb5f3bbc669a2881827fde4d6c06e
SHA51276c9ea78ef81ff7f83beb43ff65ba16b837db5d85522598d81c35dc3df0edbc76265066d89ba548a6771eed73d56f1026f5434481a879c779b4162b7042d49c5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b