Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-10-2024 18:42
Static task
static1
Behavioral task
behavioral1
Sample
532323939d87031c0334b156ef5365eb_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
532323939d87031c0334b156ef5365eb_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
532323939d87031c0334b156ef5365eb_JaffaCakes118.html
-
Size
1KB
-
MD5
532323939d87031c0334b156ef5365eb
-
SHA1
c6229e9993b2f81ef5f63c9d75fe693d368b1f1a
-
SHA256
7fd07eddf8087a6c523c59f17a05d17f3c2974e57cf7a3b2bf17d5f8c01ead23
-
SHA512
cb6479b89319908ce0207d79475fe6b5314fe2fa49e7a927fb176cb3a35649d85e19509af749ac033a0fd819c1ec82d616201f0557ba0c64987f4ae1a15be364
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50714d75c420db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9D9C03B1-8CB7-11EF-B909-C60424AAF5E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000dfebf788d8c928be2c75ae2013ea189da736b8ba9141a03e3d36fbc85bc762fc000000000e80000000020000200000004c696b617b44cdd028a8405a4e9c7af8c324ced37b593a20a04a0d91f5840f6320000000e7bf446600657931d85115fbb2c948a22778caab411e317febc611cd387864fe4000000028a4feca47927a72c6a7ba23e1cb341d618b83b9aa56627455245172c683ffba9e0ff0afcc35ed0c701e4b52e0ae56e1283ab5630e98b174f3a13094851f5678 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435352439" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2352 2072 iexplore.exe 30 PID 2072 wrote to memory of 2352 2072 iexplore.exe 30 PID 2072 wrote to memory of 2352 2072 iexplore.exe 30 PID 2072 wrote to memory of 2352 2072 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\532323939d87031c0334b156ef5365eb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5869a8cd0d9d3bc72939ac8caab8a3e00
SHA144136f247c0762f0fcde904664ddcf2c95495e84
SHA25611fa0a0e3d521031979d3ab33c761016f0a0082ff2988021ea65ab8ffc985bca
SHA5129d810a60063dee273d01f720a594b1f35484818d8e40cb7a76b2ae056a696a83ce56ca8060ff81c057b327f0aafbe3b256c2f688dd2d2319b409014c0e5a6938
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e140e3f11e8b976b35a5d31a55199834
SHA144b06b945f6a49943151169b4acb629c82980273
SHA2566130cb117c6e57999c3524a48ecccaacc6f093d0d7300b4e9566e6964f2a8d78
SHA5122e41c288351101e5130c65ac4c6e17e128d73a57a01a46e0801d8545c18f14fd6c9293bb86969b8770f08fbd32fa8c55d23fae80a4bee8aad31e398031f9cf87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6d1beac00683752e7d34e6d246d69a9
SHA1a639ee7733ca364302d19d088b17a09809038f72
SHA2569eccd1fad708d5fa17f0b4980348f40aa80063ebc7e36aa41241cc3a6db48770
SHA5121880a6b2284a1d46675dd1a119bfdea97457efcb556c45f4ddc116f8bcbcfcfe41149e7692299c430fafafe20469bd58a8a181381eeecd137aa7f9091e1579ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c8b20eb2c2bcfe294a9d860d5ede315
SHA1d59ac9f47c0c3a63d95ecec31daf021c74676c55
SHA256c2b0f4ede8d4963f2b50fbee866767b302e042ff80e68cff42e0b6e144477147
SHA5122bc865b215e29e5e8213b10a329da872ee7471b71dd6ad5f2c25ad44db632c00ed14260167d73387e3d5241f9a51a23a468582d807bb139077ab166e137eeb26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce20f73ee572a0a60d53662ceba39237
SHA1bf54dc40be3eb83003ddd59b6891f0c895922ccc
SHA2560fb16f6904b23e9a37691b649f2afd656a8d31028177e53d9f999f361c1abf07
SHA512953144ccb80ca7e49868dab7b6131c2338080594f2b0bba816b345ff579d9b20a963cb49cc17b36b68c46536c3c753b7589360a974b453ddb2ed0a4f8977797b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551321db154d8ce55ec77c06868e60693
SHA118fd9a6e1ef09fea644fc9791aa7a3b3b0ab0283
SHA256f526c6934ac8be95ee894211581dfd11251d024b6c42fef02133d6742127005a
SHA512de4b6691f04aa42085a7f105c0280cecadf4aaa2f15973733bd01e14b4c5e13f7f7142957cca6c9cf9e18124a4b465e2bd135d3b8678647b8d67a9a8f9244845
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bbcbe4bd0dee4f0260a9323b25d7899
SHA1638210f2fb0d386f92b23f295793786f18ab21d8
SHA2564b04ce6340ad18645d5573fd22383f4e8b4e26935be96e751b8fd82b425d6562
SHA512be86d46d0727c1f882ffb0c36447bd6c4045098c7294896465800c42e38f9e75d2f6a144b1057daee520defb3cf8fb992483f0d44e5257660022f7279985bfe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a54fa84059fb9f216a97faec1940640
SHA1a784bb65da270774fe236627ad31e00897e6ebbd
SHA256e46371395421fe23f331d28a0b670a19dc6f738d291ed9752790cb7781453bd0
SHA512a8ea4b14251e372a14a25af03dd6b07d1cce2ed326eccfa795b475a019c734fc9048078246eb490214540f2b8ce18ff9788d0f1101e419d959b6d0d5f0b773a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554029066e51db3ee57ec36f4b4b6bdf2
SHA163f386bacbd7246b769fd864101492ecd44223ab
SHA256d2968f968e3d3cc70eff82a975d18ec311700dba1ef946550c2b848d9af99341
SHA512977f960711216f0ca2d1907fc7a43d464fd3ad47d36c7bde75cdec0ea78285589fa7edb5bc7939ac47c239114bc58f4d8482843cd3ac446a110c9ddb57d09694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8f553ce0703cfd7c8b27b98440e5837
SHA136f20e45bb6dfb187894f0ed86081dfc8cb477a2
SHA2560a555d02c87c7540403ed7915c4219a7fba1771f7a4587def97e85ffedf8d9ff
SHA512e4b281ec013b31352ff593bc19f11cd1c9b7a4661db641224cf77855adcfb93db8c06b20b52e905107d918a4d6e7fd02d16214f587e58d82a34b264e583b9e11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c738e821fdc4719b417e3f3d01cfb25e
SHA13198bbd242ce0d14b328fa6e6e4ef6bbbd52738d
SHA256d2a0bb27bc5c8451408948d2c624986d2fdced06d4537934df3bab0385012837
SHA512c8f9f5cd8505810be0ac8d916ad791e0675861940982e44ae74d94277ebe8efd96c4c46decac99067a9a25b4a0a1c9f1fba5a4e9a3f92355530e485c41b4307a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5629642e281f546ce5c3173f50bc1e583
SHA13f8047d40d603e581fa76776d251ebf4def99297
SHA256acbe7474096cf7aa959331e0f3177bc3494855615a5e131b51b277ac1a6f0297
SHA51264782675d2979a71e89c13771d6326c547ec81433c600d132f700ba719d8287984f0a7175cafcc26900b7cc34499b128cfd9612bc73df6a008f86d516d74bcc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f1f49a5ebf438128d5635a3f085045f
SHA13743beca196a91df04c482aea3d815c79a02ae02
SHA2568af8566be322fa3c787c2e8c81deae66b6be8a4f78c37c8ce58a1cb0494a5616
SHA512a3e9b3383fc9d19ea8c7df38853f28b2a7d37f7a38e1048c1c9cbb69ea2789fd5fd8357cc72545723cc071c3bfec43f85bf73ec09d76f3d4538d47d906655d7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a92ba54dc77ad0932469e0ec8a8b94d
SHA1fe350c4c604e8cca89a9ca3f00e378a52775ee21
SHA256b57a243537dee641ecf276377716ce267871280bdb5fe1827f1504d7d8e37690
SHA512350ea29b0b410a5cd12f527fb2778c541908fe92ea40b7cc887fa1e4a2c371420692d2ce270a94d7a916f3d437dd6869069fdc16eb8a302572691850f712f3b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ad0f6553e865ce90c229d42f09ad521
SHA19aea32bf36b98f51c2ea1b0bd302226a73348fd9
SHA256a5263de888d97d12619451ccaf95fdbb83468b12b4c439cef957926aa86de780
SHA5128c8d8468e03349d8524a3b191c4743fcf23ae605e73dd20468ca5ceeb365d355e871c997ca4d1e1628783c10907b6c58b7a4e5ff2b0069a553ea744786837448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c22390f702a603fd43c50e15cafe02a4
SHA140e9cd1f00a7c104859d020267e962b3eb9c26a9
SHA2563dd4d8de1b0ff3004855116ff42cc045821eb53216f074dfada16af71f541662
SHA512eade4c9ea28dc92a2208050e198dc5c11b403efd768e4fa187e4b07a860b195b012e613cb5b147f8f01916d14953411ca55ad26d2f151f540915cdd44a00e995
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddc7ce531b9c7296e09b4f19e645f82d
SHA1b022159f7036e78012d406c7f6ea922e194ad48e
SHA256320024e354be72ea6b313ab281b8007a7198f7dd84c1ef9a4a4675275c7491ef
SHA5124d124a5bdb56a3b9c387a4aa8599ef716138a040a46eb3233e01d1c3ff76314a49599fc6f59a6294c1e86f7a805184f1ec7ad9913678cbd181af37fd7854fd85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f440ff24070c5a5e81c11061420abc9e
SHA1f5a77bddcd2452bad9eb730409d373541aad112c
SHA25600f0d4bb53184671a3dab6e5b99acfd49533f01056b9cdf7030ddb90829f27d0
SHA5129fd79271fce261c2107a58eb52fd7d87e38835f3285c68ec2108ca76a1acddd205120b2db154a93c18ea5cf53b5ffef5897b12462fe56472281cc8e7f711087f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5625605c1c61d4219a5c4dd3786d30620
SHA1f1af54ec2b93b165d93597f2d9ee5a80f3e93d0a
SHA256e9ba31fb46da8aafcf9962f40b74bd240c8990e73001ae6487f7bb9c67a3b6e4
SHA5121fb0bc108fbbc99095ed2123d681e6fad8272f22cde4c1c5ebd63ce00ee9dfc030bc1e9144e988d2971e850163062b7c810281fd30ed47e7d1cda6a97ae51ee2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525b0639ca5cd81a4e99fdfb0de2cb638
SHA1fc488ac0a63fe53ed2507fe7bb47d9aa70d65053
SHA25648d13cbe13e5fca9e1d56fa7bc3d651ba37ac1525990e7d03635b1cea9d8fe65
SHA5124cbf5f0c45a06acc2686aefe09280ba8adc6aaf9859a1162718e1af90082fa5bde8345ebdd74095ff64adac4f6e7ada6f4d682c9d3018221e5fc261b58940b3f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b