Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 15:12
Static task
static1
Behavioral task
behavioral1
Sample
5278b2f74fd254bbae8d6032d9a931ab_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5278b2f74fd254bbae8d6032d9a931ab_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
5278b2f74fd254bbae8d6032d9a931ab_JaffaCakes118.html
-
Size
6KB
-
MD5
5278b2f74fd254bbae8d6032d9a931ab
-
SHA1
668d7358caf5349d5f81a56fbc6287ad3ecb4f16
-
SHA256
a6933480e20dc631be0502dd076f858e6c6782a6599123bad7b0a274a2a36220
-
SHA512
5edab1df7aafd68c73eb347c2547bde2903c1e900d5e6c9329a8490600c745dbf900f4808c3458139dd6021448c0cc91fcaf43aa9c9593a1f8dad67c8ca666cd
-
SSDEEP
96:uzVs+ux7Y1LLY1k9o84d12ef7CSTUpp/6/NcEZ7ru7f:csz7Y1AYS/E4Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4511A051-8C9A-11EF-BDD1-5A85C185DB3E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435339836" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000f9a9f31b2c9c8a3ca847d590ac531616713670d13a0fd1b37f71768f61f4a71e000000000e80000000020000200000007ec2199b5873ce310953489a66b56fc55a6833abd434da534b1de1f76070305420000000a21b9011fedc593d182517f7896f136db2d7430597868ee92e8202393aa4846140000000f9a9fddc6fab5ed2ee492b28dec186d39f229d3849b4179d9231d0f55beb2f626078b219c70434bbdf05391e3ba940eb3905c9f231a4d3be45c8b4d43582fc51 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10203d34a720db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2492 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2492 iexplore.exe 2492 iexplore.exe 1384 IEXPLORE.EXE 1384 IEXPLORE.EXE 1384 IEXPLORE.EXE 1384 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2492 wrote to memory of 1384 2492 iexplore.exe 31 PID 2492 wrote to memory of 1384 2492 iexplore.exe 31 PID 2492 wrote to memory of 1384 2492 iexplore.exe 31 PID 2492 wrote to memory of 1384 2492 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5278b2f74fd254bbae8d6032d9a931ab_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2492 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d06a74388002ff1383db4d8c9153ed4
SHA1984442d08a2cac1b769a1abceb9db00a9b4f5d71
SHA256f05d1c2ac3a1e315380d4a048c027f83722c569e6df9a38cda94df814d3d2d38
SHA5123e93b9bd428fe9b9cef11954a7b94099ea8c4ab80efbc7a631f945af63433288fec24240077f128510fe11c1f785eb54e60031bc2784b020db9df0ec4132042d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548b60a0913385bbf41022825fc463552
SHA1ef85d19e0f1625fad86b6c08f99442e3e15b1712
SHA2563a1d954e6a7b4fecf65fc8b79a4e742ff4dd9d6aac74dc749ceaafad6f610c0e
SHA5123d5cab59070f47d8139c2ef7a5377dd134dc73660a1a667f0ce582fe1a14de4ff562f2aa55599582dd4ab9e6453805103bed0100a5b82995fe0aa3803b707ce4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a90c10695fc3dc4c13efa4fc1fa0fbe8
SHA156292159a66e683ef76448f9e9bd1e77f75d1b53
SHA256b7d5661390250312b0660b4e5a98d282450c5ce6a4bfe08a53ccee46c2247ad9
SHA512b04707773e8c783c23a4d8ef4ff79b2be309bf4b11e87736b35f6089dad3254488b4c0b09cd3c789e095f391c84b5d459cd3799561dc269be068ecfd0d3af6cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c63a8cb293b147a1967610736f76e7b3
SHA1c005559449f18035084eb3de01b4e3eb493f5456
SHA256d02918e1c39fabc21c7ba45c5f6acb03a9bc1e7899c6e696a75b72bbfbc9048a
SHA512a665edb0cdfd365f267203ce22fc435215ed184cfed20ac98cc09ac74515173790669149416560d70c30b5cce8e45d6c1bc4498069da8d139498bc4781d37d80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e79e8585b1ffaddbc4f699d3d17a81f
SHA1f68a9aac39721d6a9382923c6fe58a9ea1328fd5
SHA256d5e99536c6643127f53539d76018a4f6e8f19b80792998488048f78b1e08ce17
SHA51232e1ea37bd7d77ea32f6cf535d983e8330868b5ad319d26a55c39991c00da917d8a71c4e3a4dcb4ac8d546ff22936b1ef039836155612e17b477c1f10a3780da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5feb5d5a9937439d71ce3d9228b03e305
SHA18da941a43756376d324027cd07b276379d008fdd
SHA25635cf4b81f862b5705addcb9edb00b666c6e5b235597401e7ff3400bdca0f650d
SHA512a73bb74a532437e2ff85fd6a251f08b3c82e98344e20418fe5ca13de9a03d41e9e905aa572caa07a8d50366d355660a7c78eb68ce85b0425e96a2f078fdd53ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abdeb76c52ba4d53a859771016c0ed38
SHA153a66700f5854e07d02122c97b325412710beb00
SHA256989d584a359ba40556a5daf94a7c11a3a237ee1b6728da0c083b2bd2407f3633
SHA512f14b46056bffdba7980e005efa8f29ff93f551d022e435a3d69df64037340896c3fddf0c6e9825590afedbe18799a43e2200e2ac1494c39239a848c6e582919c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502b4160906a7723f4ff19b995d9687ab
SHA1920a882472e6851a35f570cb391621ef12c70e38
SHA256175f783dcfedcb00077dbfc21e8bcdb7e7c87147e3fe74bd466133d6fee7b7f6
SHA5126b27215322914d3244b603fe4b15386e89079bc756883ca3dcd964e80b1128e59c0af3080de464d3c68528767381ac1177628feff8003936ad24979a7bf15503
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e557a893714ebba1e2e9282bed3f20fa
SHA1fda86e1f2e7b3b45752f8d89b7677ee2a7448443
SHA2564a5ffc62abd6c9e3a9ed5166b03e5efe9018ae57065da319014816f10ddcdf87
SHA51230dcadf5b8e5c9fad460db34c21cff75d283649ec6bea1fa3a9557dcbf3a2834abb352c0b4bfb6293daab783082b56ea1d9d08884632abb0cbe1acbab5fc27bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540276b9f788fbaebe20bdecc2e6414f3
SHA1157da4dd02f5afa45e34d9f8467a4844f28ac278
SHA25655820103bda193ee4eb4209ee4961867085644155fcc0ba0301eae059dc33d27
SHA512dda40917b4a04194668805d6c82386a1900c6008b17cdd737a6c2ed2ab21023936349b95347e7f93d9d673ee27ef944ca44b2d9a4a14ecd3bea2e61aff20922e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553d882dab3f2fb746e9c905e478ab657
SHA139148b70682155230b903de79c58baeacdd00571
SHA256bd77e980cc05786692dceb485e971d66461d3b049e2376933ce71cae0ee66c17
SHA512b49034b91beb365169c6e0b0148061ffe3d4b7a24ba256513c2895166ca68987794c43f7653d927d14a3f82e6ed1b4c14f07388f09da0f73fd9b6484754e6ea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51717e271a1529f9d755e934865e664d6
SHA1003165539d727e3934a1ca3a150e4555c9fe3d28
SHA2562173008d624af510321100965aab39051be4359d1e94744ccae0831e5d861b76
SHA5127ac0ec0d3c0e468b8e21a432c9dee52653dec9aae6051df63c32731cda5913a128389bffbe3d1839c52599525faf32611a5e104f4077975ec38b7f26e6cb6dba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539881ce5e340bc1a1bd2fb41d8039aaf
SHA10048d51b0ae99c4c853d8e681194c77b7e25e590
SHA256b1f92c812c92078179475cfa7a15cc5a2ceba7ea518b3a48fdf9d037f00c7a9e
SHA5129c00d88319e5f583be90c2bdf0d8e5dce3b7b416f3dcbcdc64bbda1bd6c81c198b27e99c52285f61639d5413f8db888651c9c7c914f244d37967e7b54b3d8536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5547f2046723ef876be40bcc84bb0eb88
SHA1470d5f16427eba0627544c8b82936da06ac5c4a9
SHA256551aaa2c771af117aa8bb086a32f5a6f79221c5678f1305ebe70ee5e1dde470d
SHA512c6d74fd12aaa709b7fa42ceff093f0f30ac02dfa065873052ab8b444fd9beb6c2b3cf47d781c44d34f729d57ec779748d1106096289f925a65255e57ad4a79ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5944ba0cc2f2c0c45aa111a3f9232c0af
SHA194e41af4735c79895b4680c4d0101493e549fd37
SHA256706dd55b0c3fd4232abbdeb2955e7981302beae70fd26d47950692d83212033b
SHA5128a4e48fe07ddae7609f33f69316197caa9ac0cf6673890215eb8503623c5106a0d8c92b39d88ed954b6a6fc7a8e27f4d2ab04bbe50474da1dfc9d417390d75c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e977d27adcd1bc35efe877db8544fcf
SHA1cd524aa16cc44e402fb2aac7f56dcec9b538dee9
SHA256523ab699f8eca741978e7c668848c09bda5c2186ebd619cdfb8789d12841468f
SHA512521385652f1725bbaf04526c65cedb8eb7609b99925cd4d9735cbace95522903677f1c4943836951c1b5d1a059467fbf1961c1d106fb979a6d2736c0d1f6ae70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5238702fc4d787ae0ba22767fb7cfa087
SHA15575e4f38c70ee840aa5e489089501c2084e14cd
SHA256c36bf98da883b84a5e449ed96f10d3327d4d0f10ca6f704d71639263dd5e3204
SHA5123f5cb7ea9a384e41b22527e316b8878f952ebe3a67e920f9ccbf80b3254c41be8418dc591af31b5b6854040729f9ef1d88172eb12f760a6bb4d5d94cfd4be01c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cab8712e4f0672bc3769cbac89a10494
SHA19f8aff01e109be0e98a6a32beff7db6e545b523f
SHA256267f470ac3f265c278adb0a9b464f18d9acf80b8e900f52c940f0c2f04a42a0e
SHA512f1dc731b2f85d9cc9473d242651e12c05044f8282838823a9b3a09939c69935da04272eab89c7bf240092006d02c64902d6bab6008538af7ba23b2c6ec0092c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59682246aee3d7859f32a473602756718
SHA15a7b4a3eaecb018f854c2b29fc7ff4425d7e6fde
SHA25641ce612e0cabb70eb791ab5c3d1a8a237cc7b9acdcced9ff350edc713f755555
SHA5127fb1c869f5fd4f61d2f5b2bcc9f2a62e83c74fc41d561cdf5f5b6ade5ce6bca51b6df18b65425d3997f996a4aba3ffe1785d74bc4f076ecc855f0c76c89b3a37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505c47511d766996711e44cb07e78398a
SHA10f55ed6ffe7990d655981be07a0fa4140d55e435
SHA256e3ee8a02ea462de8ec09d681016ffa4085420b50b92013580c826c92d514763e
SHA51270e10d5b335b1d85d0b7c57fca29899e1a5d6c19fff85db42dda3b42cfe8fec3b5c218772e0fa134e26775554d01a124fb68d5d3f19939af65f05a22e29b46f6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b