Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 16:49
Static task
static1
Behavioral task
behavioral1
Sample
52b20d4e17f30e9e5f63fc43d42bc126_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
52b20d4e17f30e9e5f63fc43d42bc126_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
52b20d4e17f30e9e5f63fc43d42bc126_JaffaCakes118.html
-
Size
22KB
-
MD5
52b20d4e17f30e9e5f63fc43d42bc126
-
SHA1
5c0f28bb36fb9f5a9753cf433588c9bd12ceb049
-
SHA256
ed66a7b4212092a1536b338a1752fa962c23f4b381318c462f144e46e06b57fb
-
SHA512
12ffa6a60af7d67a96982880c0624116662b70e3402f832d07bf02124bf81aa0d185c4c14cc92bb87f7f1e00cd2718b5a7478307749311fbb32c0eaf99ba3b53
-
SSDEEP
384:JiFi8sXSewEu4Wu7mONUyerZOir/yhIz2M/PcDwAs0/ez6S+/tMVJYHAqbIT+ZSY:JiFi8wSewEr7mONUyerZOir/yhe02D+t
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435345629" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10cea6a0b420db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b9600000000020000000000106600000001000020000000bfd24679ea22241234212395b42c5e5ccb5c6cc8d392ef5dddd5b5b1b005a715000000000e8000000002000020000000ece1d3f582722df659519c5a065d3d95f01d7cd27a35e1962b460a4ef0c7ed3320000000ab454c7166851d9d66aa16ff02eac90762ffba53168fbdf86bd2a3ca97852e5b400000008573ff9fc56096a715acbb00a8a869a8f3cf37ea8842031546b3cffde7d2a5b95ca393e44ea27463a1b5138f598c05b91a5346a7dcb32f79c0c2cdc3578699d2 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C1F12481-8CA7-11EF-AB24-56CF32F83AF3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2120 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2120 iexplore.exe 2120 iexplore.exe 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2356 2120 iexplore.exe 31 PID 2120 wrote to memory of 2356 2120 iexplore.exe 31 PID 2120 wrote to memory of 2356 2120 iexplore.exe 31 PID 2120 wrote to memory of 2356 2120 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\52b20d4e17f30e9e5f63fc43d42bc126_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2120 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
717B
MD5822467b728b7a66b081c91795373789a
SHA1d8f2f02e1eef62485a9feffd59ce837511749865
SHA256af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9
SHA512bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6
-
Filesize
504B
MD5e9fce81cb0cfd5e433e20fbde6fc515d
SHA13309468fb347a482363a9bc5c36affd150f20287
SHA2560ca223b27d2a77867ea88137fba1ef752bbecb7d0211855353a12cbe4d4e0c96
SHA5125a9a1d013618654e30612a388487345daff0172b9fb9a2aacf8c3faf313b5197245e61b8b24a5b47c1e5ba21e8b373a7b3410c11ec741ef7740cfe80ef51b85f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec16ce106c0c2babf2b6e8c8d9641acb
SHA1e062404af771ac682a89e6e4c261d23f1eef073c
SHA2563ca12f3c9678bd8065c2cdc93770ffafac9f9cdc79bdb9ca8d8f785d4f0ff58c
SHA5127999d6fff53b932634890418fbab96858814cfb7e09522e1ff94361097b4af1451db69f235e9596cf09067c160c0326098d974d846afa7bd4bbe6dc14d523fca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5654c7a13d2142a685d4ec5c54b084590
SHA11206684b02bceb5f483898f210f69e76d5b8265e
SHA256f1167b49e76879847a850067f50b94139dafb53b9b73174cc90a6ebbe100df73
SHA5121aef83b403a316f40f9395677eec746ef046cb9d62113cba7d049e5eff9c33394ae5c13e3350f76d110257a390dc474ea0d3a3160057a6a988d8a815f77bd54e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58daecf50e1d462b127967ed83530498a
SHA1362eda435bc8705d252c54e12c22154cacce7b75
SHA256781306e93ad5e2b0db6fd66257d0f0d0771ffe50d9e650ae4aa81c45f199acef
SHA512867e8af0e27da4e05b0d5b7a42567e655a7ff7d0f642e611a3e747a7193ca73697290876822726e5884913cbe4138978e188ace12ad196095a5be01a4f359697
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5147eb9572428544ead4126949fa02e43
SHA105df1e21a20762befb1591984e9b337d64fb5647
SHA256c11536d808773d9a98c747dcfda338cce208122ff29d914f9805de5d6252f4fa
SHA512338dafa304ec67a0bf6a75c402752de5e86341da9fef10383990ea7c399d4ba5f3f7be5677a3013f92ed229b41528e4e8d529534245140b6dfe487a8d8d11f2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530f7dbf990da776194d74a720bb24c20
SHA1693cc1ddf5b07e68adb4a83ca8e4b8098314af01
SHA2564706f914a26f19bddbba19ca5668a0a681a1878a587adb4ad7352db33005501b
SHA512e57c668b78e3f2a6de01136e46f4dcab939db32df75771a53a9ed3c7cf317f7948ae78e5a665f50aef33df889450f565c7dc8231d9f61b9ce3ca88e21b028730
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51236e7e9c461268f1f0417768bda7bea
SHA10a11c99505b06e3ca13bf27824262c8a82c081f3
SHA256a8060bebbfabf8021d33f1149a33f3347b211ef13868854b91026d2b7b763472
SHA5120c42224e08c21ffc2c1aa00b4e9016e23fc2687cc20d8ff27e61ada3acc3cec80313b144bebcb2171a83a578a561df682fcdc4497d6bdbf76083db40915b7858
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5300c6399b2811670fe64216ef01327e5
SHA18431bd6a2d1162e79a4df434baf36dfd1311c229
SHA25683b6930d5d4dc09577ad5d9a2004e90330d0876a176ed7e8342d0557db65d513
SHA5125bec30470d2bd791cd0aaa4244525d8489ed233e0b66e01938bd70c45d1fe1df24ca8b2d7c3328b382e1edee3676ae15772458041ff2b234e02aad00276b1876
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5427c791bb361c548f354848339044da6
SHA1cb121f31629f556fb019c539906640855d66da97
SHA256d6de440c4f013a2c3cf0ddf4aaaf8f016fb16144c7a277d8ef70d091927da710
SHA5120d74345c7ad1432c30f826234df5c460d2c000097210364597d87696cd284be36b9ec2f9148da22ba7afe594607dbf3cdd497a5f6fa2e8f8b013450932557a4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d1663f62b4547412d90049205c230c0
SHA1103f3e439381667590cf93047c2abf6a9ed0515e
SHA2566464b9af246520ed1f14e87158fc2e0d49acd14e060cb882a213d43ed9528caf
SHA5122886c328931d2264dbf230427475e8683a29008a1db42cccbf888a72c87cc1bb3937489455ba3bfe9c397b6848464825fd3045fde7b9908aa1d13b04958bc144
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b95d5d7918ebe20b267e6a3125e26450
SHA1c32d57348d34eeb552914f5bf120111da6e9feba
SHA2562a3bc81ff31b3bad52275c1f8d7ffba485cde84adf8e77c13a87182d7e129692
SHA51291fe5397dad0226131f30007a24b233366b16478c43e075c72ec7b9635c1a5ec203fbeac29c3041ceec57d3897c43e129dfacca04d4615e7ed56122838f98867
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d06ce64b5e2abf9d566a67a52a01f197
SHA19f22f6c18790b1d731d8dc2656ac32e50fc9a429
SHA256a7fe46e38fcb0defa21d2525263dd928f31bbd06de4db511c9c2479d52069e20
SHA5129fe373f47efdd0760c0ae9f9722fb3ac8716b00cef5f21afd0b77867a8dc5e256e0df606243f30fb36bcfe7335057ee61241e3f6d3e42dd48cda74c506bd6384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d580430cff55cd7d4a9b4dc81c6f42b1
SHA10d55907f520894d38189407550eb29366422d8c2
SHA25655ab1fd466efc199ed3a6c8dab5cdfddfcf763d98177eed0ea2c9246602ad3ef
SHA51281e8a7dd5c9cee0baf3e3c9ab2bf318b879093146ae709a908408f04bb67cb85e3a17ea952497552f91a491b53862c9e671e4e3310a94a7e0f6db6fbe9cbaec5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5466ce57be8489d4a91cd1a85563a791a
SHA1e135b40ca489cfa65efc67573b6c583fdd594da6
SHA256b64ddd2757a6491575468551219e5f10ff01c7ac0de6e37ded4dfbc0da8db9ca
SHA512752eabb42329fde0d84c8ed81a329359199257c50d31c88b8f6752fbb602f1caa96eea77b16e167ee52f364c5484b7e4067ca9db038438a09403c09487884089
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6ee9bb2c3d98016a7bd627a7cc20721
SHA1c2c0cb80de342ebce98f8061a24e48b4ba4d7b22
SHA2568f98ed074b0bfc7f8580ac354f1f24ebd7ad433139dc9fb177aa630138bd67d5
SHA51295aeb7ea5242c887bb90ce2352cc133c704fc0554f081c32e43d6bb11b89790fb5002f6e3fa9cf43cf936e3f8659cdf207b4f7dd929b309ac1da54ccd22aa1c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd01538e951b111a75282d8bfce2e5e8
SHA1273dc3d46feb882c18c66a02df5a5ab31e715302
SHA2565d21164393231a3eee0e9193b91bb9926165170928a1884a2741de16bfc3b962
SHA51235342c75136f88897ab0c739fe651ebcd79a8be927d9b6c9563ce8ccb994095c13da5f7527819cba1c0ddc96e9142c0369cd37bfdb05e45b7bce04a29b6b99dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de8a4720bb8e379dbd4abbbdb22a970c
SHA150dce8d20040ff0172ae64d365c6a35940c05668
SHA2565af28c4bbf6bfbf98833dc409d5e9e7af3158c4495fa235255ee4ac1ec7fe05e
SHA51209e262b505e1e69d823a158f417dc3d2972987544cbe294c55c09de68d8ffa5bf9982dc097deffc556509767c28e7439c68dcadd5ea13f5ffaff497307abfc55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57237ff8a86eca8fc33d159a0561d3046
SHA1950d1fa6071e70b5b56a966098b222021706ae3b
SHA25659a5e87caae7c67ed14847259e51f2750b17d98dfdfdbf0e723818cb43740171
SHA512b6f43faacf32088bcc1649857aa2cccf2bb45f4335345458cd7cad1c09eb741a1319ecbeb6a4a060a16306e03c231097f61a84c586574948ea3987cdd29eb1fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55892182d0bfa07829ae26f44530a736d
SHA1e67caf2551ce7b105af41d0a5012a32e8148119b
SHA2562b55e035992f0419230e8b5c2467e1700126021e63b53d616720f56e0004de15
SHA51232135d6942ef582718f9fe526d835e6a4011e45a2aa8ec42fed9217961aace395e783aa1be336345237c7469c369f289a51939fa9913fafe26a653287c59dca8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b