Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17-10-2024 19:21
Static task
static1
Behavioral task
behavioral1
Sample
534ae3ceae6e5fb43bba10dc2d219977_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
534ae3ceae6e5fb43bba10dc2d219977_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
534ae3ceae6e5fb43bba10dc2d219977_JaffaCakes118.html
-
Size
90KB
-
MD5
534ae3ceae6e5fb43bba10dc2d219977
-
SHA1
c5cccd5ab5a851d82f5b7d90b28e1d31f0cefb29
-
SHA256
7e6f47629571749bfeef714799a6fd3019bcd8503cbd176fc811b5307f3be568
-
SHA512
065a375c5a3e5c3e256b962e086d71cc38becfcb674ea82e64eceb2159c7ca5863aa191c5968bec4a27adcea55c285487fc6bca0067b59f0eecdc2236a76cb37
-
SSDEEP
1536:gQZBCCOdV0IxCqIRfIGkEeY1OwHJGXuFA5+0I1Xw2lgzHuOwDUjDlG6lW0Or1iTo:gk2b0IxIPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90f84ecac920db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435354731" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F329B5C1-8CBC-11EF-9333-DEF96DC0BBD1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b960000000002000000000010660000000100002000000006495106eb4319156797699deb509532cc1cf0f68d7e378e9ffd42e9441ab8fd000000000e8000000002000020000000b9aed2c550c5582286b415af4856264767c480e38ae3b8c855f0d9459f6a5344200000002552d0d97ecf768f227c21b3a511c8f50488b33fac640e7daebda41877eacb4e40000000691e97e0328450bf08f56276f7fe7e81bf89522567fbeec7b33b087f5ebfb9b9c35f864450e1edf68f233e7fb93153c8a1b06210a8594f80c4dc29f91a76346e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1592 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1592 iexplore.exe 1592 iexplore.exe 1712 IEXPLORE.EXE 1712 IEXPLORE.EXE 1712 IEXPLORE.EXE 1712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1592 wrote to memory of 1712 1592 iexplore.exe 30 PID 1592 wrote to memory of 1712 1592 iexplore.exe 30 PID 1592 wrote to memory of 1712 1592 iexplore.exe 30 PID 1592 wrote to memory of 1712 1592 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\534ae3ceae6e5fb43bba10dc2d219977_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1592 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3de1ee6171c20dfc48731c51f035451
SHA1d63810965ec3d8e8e9f6ecd3195bd3a4a826cc7e
SHA25609ef7b8726356290341ae6ab4bd197e03b352598ec4a3d3b58f8ce1c0243335b
SHA512cb6b78a29841e9d698f48b6c1cf07c2b172fdf484c9f531e914e9dec1d3d56916606a44d122eff27be9f0e0ebac9cbd9fee11610a54609c3b70a2c8f876aff4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535c7088b377e7ea53b4608bd81626739
SHA150aac8f6141eed996b5f71782e12e8f56befd303
SHA2560b36e00d384dd83cb7b0bba9d321215606e48243807c6f7e1c31ed3535818ead
SHA5128923e2108800f46e6b62f63a08d6343eb932f15758791cd623d941b6840d984399d80f225d7fadf3a082f24a19e48835657fa6dd06bea56bd32ebb553e172bf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efc62d91ec181f1a911c2ce8165e6997
SHA1d4349b7ad273f444f017f0fcb2a5eb0901d9a592
SHA256b8b901a670a4d9a64de51bcb224077007ca617b08c3890464a42e539276e6687
SHA5124bfeba5259a1c864080f618df3e9bbc6ed5ab2273a2d6093178aabbbff080a44d2f556c57ead8ad74781c6492a05943cb33382c8cee0d468055f094bf6790597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553c22dd5d400f757883b193c89787678
SHA1df9ec5c77f2c529cb0aca44c62c0a1d6a60cde7e
SHA2560ea61c7c108d106b9e048e58395945219323de1f7cb32900620f36779f0fc251
SHA512b6dc047ae0fe2c4f1b912d6c1467803583477fb0a6b044f6d984cc6822e1955e36130a1385053f8444420d7f457dee70221158d394824956aaa49e78515e87d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d1def05ce8d9bf1834127ddfd3955ee
SHA1ecab456e9b9ee0e1520640bab73efebbe010cdd6
SHA256c2dfd11f868cc4388383f668ca536af0c5c1f20eae05af692bf2891ebbb78c28
SHA512adff98340f45198c139376c6d46d092a78ee50ddb35a377e3246e3e8cbb4aafb258f97ad82dffe9802b39e87abf5e0fdae680021283536c149f1cde09ac367f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb126221eb82d6988a0ed755e943c74c
SHA13065c493369094e1ae1b8508e67ea08b632df6f2
SHA2565846b979475e1a1e678d62d152170f16a998c0276fda2e9ac76de581f5b61d65
SHA512c0862ce9a39a8e0c00fd647a3e8f6db66be7a22f253728d2d7d85479d6e9d3ae5ec9189d6e97203bb70ec5d549c71f3261851bddfc56ba8c6b41185692c34964
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598d915042e7a38e27d1a7ab41c715e67
SHA189a1cc1066932f1a16e01d23c073ed0ef836230f
SHA25638de647b3273b8afa42773fe8f6a520d0d973c81d91016256e31b057c1d1c703
SHA5122c6db071b12f3d61388312832cf5c6c3297712c8b7c7ca0f42adb4d93357a741e7559f0cd0d11635bd5970845b217cf82f65f443b5fdda710ec453e0c8a15ca8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d51156661bfc784ab607117029a8b653
SHA115c39a07c10fdda2f8eb12c89201870400df5b82
SHA2569f75f43823f7d30583a40cf8b86a6853580df876e267d39fdd17344b52d50ff4
SHA5127daf4c8ad1246e92ffcb1b0728a82e8dfa36254201b6a54154528831d5ac487d954c89478b9cd21fb95f7c7ec0b85f260ffe820d36d78162c20f0b69cdfbd639
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c74ac8ac1da5c1b24c74f4cd9d2c848b
SHA1c07b6cdc0ff879fd64d4aad94d7b0e5b73d670e5
SHA256d0300fcc00c44b81b02d6a2bb6d54e2f1f04d9af6dc230237b9cb4df184cc41a
SHA512ba4b576468057b992520223181cfcdb39cd94f82cb485cc6a4aac92cffe6b23123940cea73863bcad845c4c9791a51deede614f1b6c34799c454133ed828e2c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1e3f3a02d698487f027375049de5fe3
SHA149c5d2b155e95e1ee6e84b0b8ebf46ec32b10985
SHA256ee87ceffad955e0dc6678fdb555ce029d46ba8cea5df4b1f355bebf92c41f4f6
SHA512af54d97dd7b891e01e3fa4563962dda03077d3dd19c6529dfa4cbb30eb12cda14b4c0a247324aa12743a2af547aef139ee32974a9ef17fb6487debf94f01168c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575a94d06ecf8526465aa093c824814c3
SHA1dbd82ae43b838fbf8380000fa391049979fbe970
SHA2567fab9e8c7045a88c325578507106a9d1780e028cf16f89b84ac22283f6dce127
SHA512961d377e54e51c17e4bbae22ed77e712091014cb0d1f6176a5ffa752ac4f3e8aa75f1ecbbefc1ae8a7891dfe82ec128f0057554b3c5cb0d8423b8e684e4d15ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f911295a4640720d46330a5cbfff632
SHA1465ab60818579211b009f74badb5222418f770b6
SHA256de5b1089541403595d3197bd006533d8cbcd2443399efdca1c45176961156481
SHA512a2641921e3aa363d1117c377635a3b373f7fabffd1cc97b42dd59222567c88a82bc0905e423749c4c53e96ac35918f945ace1b8bfb32fa31b32649050e955012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5926a7f426d17bdd7323df1197a37a582
SHA1dc48c8459e83117bef033370a487d090bdf8fe6f
SHA25674b613184aba6c6c5b090c8303ee8c534ebc869b20cc0a99233e14153e0c223b
SHA512e5a92537c1f049d625efe3e86b1544d642d87f123413a39c7cbe44d471a11bfae75835cebfd3356004212e9f223d576cbf7f2001715c9a703711ddd5b4c05790
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59652770adf49637accf8ef36ebfc5a65
SHA12847f5b6ea0d16743b55fb1f6d7c9463cf942959
SHA256b80f0362f4e04f56c866a13477090a3b5cb4d267fa84687f765ae98f765f3fa2
SHA512e1335d54d4e2248d4639e85769bdc39dd9d8aa7c21e1d80706c40d2c1f9e7949d44032e4cc229baef52ffc4d5418bf9fe3c9a1145ca32d0bec1ffcf6770a5656
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512576084447aae7562eb9fdea1e01aaa
SHA1c97ed28ca94bfb23cc36a5105c7a093643b1d0a7
SHA2563b9115ec12dd6e54fe57c01be1057e7cf6e50b86b499baa50b3c96a330c41e8d
SHA5127c5196b4e58571f6e31b449d90a8b5c476864d766f1127f25bd571b6d07f2b81a1dd06f89aa030ea2c769c3d402c4282579bfa02343a3e9ad9bc9c53be6a3f9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1795f98af390e79043274ceabd6aa56
SHA14f85fea20dcc27d2c95f7833a60f1beb8e605544
SHA256a924bce79620fbd07b068c5fa6f3d9ccd423fb57bed962a5a2748f84b7177399
SHA5128656c7412fc9da9a709d8be9dd18682a8f1e8aa1a7d7c2eda013b93c3e1f4c3d916365f51034631551914357d71706a9f9193a38937db9a4e3b54af6a6127b2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c71c5a61cfeff45d9609d633d275cf5
SHA199cbae69c2349fa768be71ac28b309e5659796e1
SHA256768a1d654ff61ff9ba62575080ea8c7f58836fb398b5f377c8464748234d9caf
SHA512f062198c80f643c2e487755f661699eba79bafbe529b9be59f039f4eac6b253650ddb94b11cfd8a84da4dd1de6bf19f32a0dd87d3e8fcf54e12bbdf9e4fde749
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef4f8733bf36acd879af7e0c81ab0e6a
SHA18dca49266a889923ac48794d3bf655b9412bd80e
SHA256c4278f8d05345fb3a492e509ead5984e7b78e7847e1c507f70fad807dcb687e1
SHA512bb992d87df7d073921d5482c640fa064700a55814af5eb9769e1795d4e047b5eb1dd0567202e4b86910454d653d5b62451aeba5fd570e80a06481658046125d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579a72153cb1748264b686bd1bc64c6ec
SHA1b6dec4720cf932751cc74422a9b0cc0984b97193
SHA25675ba82376ea1a9c182e48a14057cb604acf75c55ebe0cd8285ea5c2c0c63f253
SHA5127f34397b26305fcb291c1465ca8142a6c108bb1e09ced2adbaa0ac548ddd25a5da895d8958e9855131cb1fdd5819c2875247a0c2c83be7e4f1469d8950138b3a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b