Analysis
-
max time kernel
141s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 18:50
Static task
static1
Behavioral task
behavioral1
Sample
532bad0c74583589429730e3836349d3_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
532bad0c74583589429730e3836349d3_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
532bad0c74583589429730e3836349d3_JaffaCakes118.html
-
Size
31KB
-
MD5
532bad0c74583589429730e3836349d3
-
SHA1
0100bb581a4d850f15a75715482d0770bf506a9e
-
SHA256
aa4fab1d792448c5b76c678f04b650141fe21eeae3adeeaf51183bc095d47838
-
SHA512
9c9931b141aee46a50dea95fd2181af263340fd833dc8626890f7b2aa4a1c497a82416b2a2fc9b02427a75030f93433d2b9547ded405f22e1909cdcc0b15f720
-
SSDEEP
768:Zcd9QZBC7mOdMIppC5I9nC4f3BYlw3wkwZyo4Pd:gQZBCCOdl0IxCMBgw3wkw0o4Pd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0206198c520db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b131900000000020000000000106600000001000020000000aea6fa268c7edc02b6c3ff96f2106ca494b5c48921d6b1db85542cd133ab155f000000000e80000000020000200000009380b29f9a76f71707b1c5c00a683a72b31e58ff9c7b169d54b4931ebe5af40920000000ca61faaebc3c540bb11d2882ed9cbf5ec2ea76c978d9ff1ab58b5fe105d95bf94000000006fd131e002c9b89c76f606897b8d88480986e94f09597a2c086bfbaee9e09ee7d23a50fe68a8a25f887e1eec01a4dbb99deda43e5cd47173b65d07a5b6bf9f7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C23FFFE1-8CB8-11EF-BA44-CA806D3F5BF8} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435352932" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2128 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2128 iexplore.exe 2128 iexplore.exe 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2456 2128 iexplore.exe 30 PID 2128 wrote to memory of 2456 2128 iexplore.exe 30 PID 2128 wrote to memory of 2456 2128 iexplore.exe 30 PID 2128 wrote to memory of 2456 2128 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\532bad0c74583589429730e3836349d3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2128 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512f79e7ced20e22b9270bd9dc8039279
SHA14e189fd1060abd7d090c9b383aaad5c49d50b39c
SHA2564a9b80e1d03ad9435bc943eb116ed742805d2ce140a65cb69d6f6ab66cc55fff
SHA512c51ff71f7ed0d64fa456faa8575d902c6eec60e320ee95452c27833a5ac20c2a9f7d6cf480c562f82c6871bf04206cb053740d05e1d8455f223143bd9f4ab1fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9b9a9eb5c482514046d384dd405dafd
SHA1c5c82faf87dcd3f830aa77c95797b059e2cb9ce9
SHA256134ac493babc178d4eaae8ccc0065f27d0fcb64c9289d9012bc76c87fb24b073
SHA512d7b90c2fa3c364d111ca0f639f74916164400a7ff33a1ca9057dd2cbab64679654011dc61cac774d7bbfacc7c1af81593b2423322293c2c003b4f6fe976461ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55884ec93c037fa8e13356aef837c45e6
SHA19d38d7ef7bd1eb107c0b644297cedd3abfc07b31
SHA2567b8ffb1514127d635d3e2a44ac173f6ef15ecea217fd6620ceef27d7c792ae21
SHA512810b6e4729d2ececf41de144074cc7d01c7993a772151f4906c00f62c63bf6d880e54d84e0b2248a1e7e11f28a558bf9fd670f6511b5eef7fffb753a93b1aa3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543423c544ab4ce235cbf083d6bb41da2
SHA1f5151e77a58b113f56533fabf0b7a8f4fd442520
SHA2560811e114d3ba7f0ee3b19e7863457a28db65a8e713a8836d59b63c196026b44b
SHA51279f20a5fceb6a59f254e2d51e95759e61d570bd5a76d5d4872cffe75bf60dc6df87a9a6f49d6526055b6f4916d3cc4a01e33f70c1ecd38e27fcb5aaad0859f41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5675f4f3cfebfa501f6c72e973d34674a
SHA14ea5b66c7a4c31df70d6c9620e580ae73f7c05f1
SHA256fde17f580b19409228e1440796fdc9225184771de0dd7a2bcad139d11aa23357
SHA512e5c0dda2a5a051f5e0aa701c3a38b987e07af8a822ee335707263809afd8bb6c10204377a8f553b2fec9706877cf2d87a7887c8fc29dee4d23f32045c8594197
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592d220094e83a76f2ae31d1bc7f1d187
SHA15d9fbddd962ca01e9120316c24a803894a5fd105
SHA256c40d137754d110119552db218d7fc574922aebcad0c4361f4106b1bd9126d6ba
SHA512d74c045b4dd7b4fb53600145914cb9248d311c2169aa3a242da732ed7f4cebb9bd315f730015395ee001ca1f82177fc57ebe1f155e5d67d7df1ecaa4a51fa51d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5365724b00eed5ce54f1ec37e18c1a344
SHA1b6c426804ca2bdf6867405475909cfe1455a3a60
SHA2568a1db370be9e667674ce48951ab4d57b1fda8a594e29f03f99cc2feb0d23d5c0
SHA512e621538947b4d1d345a953981edc4c4b13ebdabc87a6aef4213a55240e517915f3ee9451778e6b478beda595996e37e16f794feccf85cb476ad6cf1571ce587b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff1aafb6406c5b7123f0a552ed7fc4ab
SHA1c1e0858924bcb7d9e83586df960a5f254421ceb0
SHA256258d2fe87d3b4ceab0240fd742c1ee520e3709992ca40eaec5f57b207552365c
SHA512a48b57799bad87d78d4408bd183cdf526bc7f6cb8fbdab00f5546695ca429c9898f2a2f1f6854e45cb9841254c69bee2f57b9bc26ca90092937c02123848e520
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58078b9ad076322fa0be8c9e57a5baed2
SHA1ed3ba84f5bda809f9e6d9f5b96eeba0b88896ecb
SHA2566a93fe42ca689a77a8074d80fef4e3d9dfd0d531ddd596824be4b10df90c983c
SHA51277d76df13d655570085525c5e9828b9cbc1738a46ab48347a2c6644fc25fc15a3389abacd34eb6ed8d3795c19b87b6ee1aa36dd5a48e13d63e52d3a417b6c6f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8d82afc824523aa86846757e575a05e
SHA1b2bbd0437d53026897bebc47af93e7447b0110ff
SHA2566d44f536679c2dc71cf01d0c6ebf8e54c58c3bfdb1029a8c37237861a3279eea
SHA5122decc1e7e5bdd4fc56df48691e7b6f10aec6f6f859d92e2289c93eb106c8958fc05d8c4205cc5294fc71791d8f2be10dab72f678921712a31abaac9dd20ab3c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7ccddcffdcbabce74fdd1f1af41864a
SHA117857087d73935ef67b2907e8c1a85fa3d8d5390
SHA2560281b7457fd198469c4aff21b241f9ee1b4d0991971f695b06b82d277b9d28f9
SHA512e9197434888c90c784d6123f8427a9257d0111a2ae65f98aa90baf03971f09ac6ec0dfdc1b8049ba856678cc585e3e5f78a1152425ad24c95f6e325ec7c234bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560cf30fd8464b8a7b907a2e269dce451
SHA13df9ececf2005c5fbda4220fa53f722761de69f7
SHA256616744b0196835396b13a119c465aa1f119e79a0bfe7f1a8f3b4b706e6dfce9b
SHA512705320cd596362222072363ffbfe2594cc41ab27afac1e66855a0ca16fa87c44445e5a5459d4158dd2f14c98d6f4e786271e5257240785b0f4af7de1ffae4c59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3964cac4662809cc611f38855cf3461
SHA1f81a68da06b1dd5a8b882ca4ee0d548fec1dc054
SHA25613c74798e79aac8496b262881518616ab8ba565a6ae401d9400ca217603617f3
SHA51254120b0c79b99ed93d2c407e7647a0e71b66d4d10e038ccdb5add651670ba901f4fc0482f8bd18852bc8b0255947fd9f1eda7f2a92b29c7b673c0edf281bf1a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b09f77cdff155f0900595bd2c9ba558
SHA14b2b8b50cb674b383e5ccce2d72db9e25f1d9cd7
SHA256e6b9e45de089565706df946fadc8f30c324b0fab222f258a0d9b342393c434ab
SHA5129b23c9f25446286c9a63233ca34777d4a395d74dea65b1c3aaba7848330f6e7ced41cd4df99d8b1bc5df2fd09fda1c7c1c6fb99ee7c3d9243043042fa9943af7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541b2877dc652c93e37f3fc21efe099ce
SHA17eea5e4f3439b1217e6584e11a3f0175bcd54fb5
SHA25641c93fe4ac753df689696c2c0a2bc741f2419e0afb644eebe4cad102f2b03290
SHA5126989d8427ae245cf893dabb74a01435d3c4c537e3b22f311a4b0220fd185e189489f5a2e13bfb021b193f6bf0b3b4552cf537fe318e5744aee71bcf47b897789
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5763647adabbb671f018d7b0edd222e68
SHA1e3cf144a192f76f29a188862dfb27b15bcf38548
SHA256d837f7a3d86563e2f90a31674e6b1a5643ae38cf02bffc085e727ff22c30ff12
SHA5125e01893206af7d7fbbb7108d162e3dc584ed6f208c8bd41c0150ac08a22a39de11df3b19d0c15eb700ed7a2c775cd84a96d6e6733fc32039f964a13e83aefb42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543490ff976490fdc8ec6bd87317ba8bb
SHA1d06f2ba633c1d8af0f0768562baa7bca2bbb551d
SHA256124bee51dad6207b7009519484a174bc8d05f4568629baf31d8522b5d714c150
SHA5127980fd29c5f1989f911021604f97777e203aa01ca4b92dd2883885cf925f9755b2ec57f211be0e9516a234d42e73deea76606bee2bb1df7a3e00c94058ae129c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5147a006a224bbc1294437a80257e948d
SHA139189b388011cad98819cce9e751a3c0ecda9c3e
SHA256e53e549535009d3b3a004d1bd8cbeaf1a4373b76821d9d6aa16e487a140c50db
SHA512bd089d98decdea3202062db84d2ca7854af8b982075c88d2c470dec025d8cba9af227f8376a698d445725db85d62f9c7208603954c0b18b786273ffdd6fcbe20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d2a270f075795f76f587952ee36ff4f
SHA122f216a1bd27e4450beea83aa71c9df26a231453
SHA256fd8415bbd64fd59f42e0fd75adc46ddf5cc6c201455908a7dded576176cb37fe
SHA5126c01ddd9b7d32d7925c52eb828e0ada3f6311c2d10f7be3dc1ba8ee34d5b88c79303a5fa734d33fd3e849fead34ac921247fd61573b268ca36a0086c4bcce4e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575a4d1c14eaa8d1daf2b40a1b886b71b
SHA107cd6618451f43a8cdd27ad5aeff4797dce2b2eb
SHA2567fd4c583c21c040c2a1cfe60b774083b93f4b38483ab021b167126a8006cd6d6
SHA512b0dfd318135ec662d42e753502cee7bba598ff3bd0768d3998b25673c9a5f3cc5dfee4f20c10e78e4e53c37e22445f2dee8386cba444750c15e5c0e345c911af
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b