Analysis
-
max time kernel
135s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17-10-2024 18:56
Static task
static1
Behavioral task
behavioral1
Sample
53319d63ae45b639b54ee2f4e49841ad_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
53319d63ae45b639b54ee2f4e49841ad_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
53319d63ae45b639b54ee2f4e49841ad_JaffaCakes118.html
-
Size
7KB
-
MD5
53319d63ae45b639b54ee2f4e49841ad
-
SHA1
585431eef82e687db9453f31dc2ce16999e9074f
-
SHA256
a866c795cbd1f40e37d529d1152b2adab467b3bb2964a9d7773df439ed109d55
-
SHA512
8f4f52f4b19a2af68798d14c2609cc5193b7a57cee298467f74dda834699fa7bce92143a68dbf07738202446b6f831a17fb9b0a9634b01aa6aaf696a807e0ff0
-
SSDEEP
96:uzVs+ux7CYLLY1k9o84d12ef7CSTUezMcEZ7ru7f:csz7CYAYS/sb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8F4AF761-8CB9-11EF-9358-7ACF20914AD0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00657f66c620db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435353276" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b13190000000002000000000010660000000100002000000080627a17b4cc778fcc4ea5c220cef23605c89a2a21dfdcaa75e1df4801113650000000000e80000000020000200000004b79c3f4f8472bd21ac99e3600bd3fe88ed528506f24db236fe2fda5ce3d0d042000000004d2c88b3fe96e4361d3b0166ae7e4c75444179d450d0d24b300bd80d3b5d4d740000000016de453674eb64821bbd31d6d22838fdbee1b2e236ed1906a3be3e819e63fc3d9012739470a88140f0e2075b95e10f85fdf12a1a1509d5763b85f425bb71ac0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1840 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1840 iexplore.exe 1840 iexplore.exe 1408 IEXPLORE.EXE 1408 IEXPLORE.EXE 1408 IEXPLORE.EXE 1408 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1840 wrote to memory of 1408 1840 iexplore.exe 31 PID 1840 wrote to memory of 1408 1840 iexplore.exe 31 PID 1840 wrote to memory of 1408 1840 iexplore.exe 31 PID 1840 wrote to memory of 1408 1840 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\53319d63ae45b639b54ee2f4e49841ad_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1840 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9755f7278af8b17916deebc922a9991
SHA13d6f5d16a1f4016a294e392327c18bf34b87b8e3
SHA256728ba5298eb53beb455bae4a3c82d5547753babde7a656013e5d830bdcdd52bf
SHA512172f7af578b36a1b10ce078c101cd4e6ecba25b02a3af1aa8da676e1e5d17880a15ba81ac35a045b705c18f4bb28af9c0b94972b5906c4811e5956fbf6cee5d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c3b4bb124133d1119551b2d54161ef5
SHA1fbb3b1abd1ab9608020d8bfd7c3718dabfea8cd5
SHA2560ea71fbb83feeaf28c90a9ae248981d7ba271c02726956c670d326ff5aec5d9c
SHA5127fed7776c002ca966bf6113eef7815d126a47587b47389408954dfe48d926ca7af7ec9a4215dc9f0dbf5558fc015ecbca67c86374bf380ff3be442c880459970
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515c46558d231a9526a75aea009bb9545
SHA1a6b28cc023bf652e9e9bdf1454fb6b3ecfbe61fa
SHA256bc18f694485fb0e78ff1b5e265cd37bb1c01f7e249e2726d64ac5590f974d687
SHA512c5068ba249538afb117a7333356312cef4e4fb3a44c59368fcf2af8c913f923712c059ec376b0974935dee144c5cb0290bcfda3a08198c39c4ffbfec346d6a54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533976e93a052f4f2717b6dfb497cd686
SHA1dd70318118a116cedd9651663706a8fd19db8017
SHA25616fd444298cb7048fafc2551f5017d642ccbadfd4739c12dab913455c2917232
SHA512a32551728b72613326820087078d8a94ea966a1bbd96718b4ed8869f2ee344431caf26014ac2a846690fee239d929b881772ed84c5bdaa1637a78447fddef09b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500a88ed3a30893e4570ad1180f4b52e1
SHA14dcc43ccf32c2287de6279765e815fb0a5575299
SHA256e3a01637a47f8cd541f50cfa601a145ea750d84c76a564f1dc9279319e1a9169
SHA51250775fe94382ab3809c787ec1626888b7e234781fdd8b87f504c8f40affdee72bd4656d1a2799e65ce1ef8a5fa57d8c053e868af0a8de436a38ec182cff54f1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5969473b8619992df01ebbec80877d8
SHA140ce6b91a6eb8b4b4ebda1703d7e007566cb205f
SHA256ec8dc94f003b430fc053cc709f2e3bcfaff542fe6a649af9bbf7b4c3f17bf01d
SHA5123095a7fddeb2a0c573cae36eaa08ef77eb2f5620a9ca03b3c100faf0c208ad1583cf6a76772b03882477b978362010dcc30771d3e36047a40e94278cef3fce75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519e4ae9d0c1c69e6fb395c1327483df7
SHA175fd11cd6e7b0c02c432ca0828bb422db19d2f34
SHA256fe840379b2b5445a5429d4004f31ab6efed3c8da9e5f19554bc312cd576a5a44
SHA512b4fc9afde5aea5fb4e28d6f22c99653b83c38df5bdbacef945f8702ca478460b2fa55c0f3cab91da62e43b1c7735d8588877e8123a0f286737a39163b991922a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bb90b71905284e93a509bcb512573b9
SHA1c0ea4e827e5047c1389251d9883d41b52fe4228a
SHA2563cf486c3684c89e5eb1b046f88e9a9a4e4b195bb9017686577e9a4d1fa6ef42f
SHA512d14b4038c7625f5664ce359088fd22f36c025ac35036fcb6465c40de61c6a5cac102737a2f2969b8a0648119bd4bbb5374d6a3a8356d2308d67fd24f339de4ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c783dbc32e41522a5da0d5d56033ed4
SHA116183258a378e5b93c1caaa911adbf041a8ea142
SHA2568c9ab8d46441d2fe19643e0d2d43d28f9b76eb02a4cbe6adaeb7f41a9c142c92
SHA51227e4cfebe8f142ba5abe181bc82b213ee9ac5be5373732ff286c6cc0c63cc63aa7db8088d9eeea5ccfca3be6d45ebd8e94f9926e20c8f096a33e54c0694b2bea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6f6cc917953645c0d4cd60fd1bce0fb
SHA1fb67855fe5787b9c5b2670bb560fab9c7a2dd9fe
SHA25688e681049751bf3c789058a0d8a5974d6d92282f434c2f68b38918b17379cd13
SHA512afa827db8464648900cd26b1e0eed41466024482d31a535a5a37f022722df9f779abd0b3aaa65759d1aa7df22adc1d7df5f43d410095c8e235562d747b35d663
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdb50052424841f096c0a5d7558c4108
SHA1d328c36b0e10b1ff8220ce50e693d342b4d60386
SHA25697e206f1a612e7f4c129ea94c10c03c66e19ef9705ac9bdcffb6c42599e4ebf5
SHA512484f4a1e5be320f6a4c2e9d824d7715b0d99694c81dea9fa1989f925b021ca9d434c9729bc29ce99aec7ffe720789acb9c250411b8a50b0ecdf364ee676f7417
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e32c1460f6293806d5683c74c9cbe013
SHA1fece272533b071dda3fa2df830753692e16a6429
SHA25625a15c124ee6c9fc9b96736382ff50b09b2b5513cf6149e6a1451153fd395e76
SHA512731b627fcbc23ad83a80b7a384fd3c6569044135f8fc41846f56ae34d8e9314b698145214d7df5ae643d3a2bc21b1bf2b0423c67170a50868a5d6123c5f260b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544de5ce352e572657508306a2165d62c
SHA110f4230b7de28271192dd6c541321528532ca98d
SHA256ac8c14099da9a9fb95633f142a20c1ab51fa8c8b94297db11ce6d8b849c9c5c2
SHA51290a1f1126b2d41c253f3fd8e8f5907eda4110bda782654dc6f9bb7a2433ee9802d3b28a2518776b0136a3c51162914ba97b47ad36f9bfbc56287bb9d3ed1bf70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aee75f4a16411acd205c646cff6e6861
SHA1fae94f7a9125972479363f5e8bb88de567a120e6
SHA256ef4ce14e3e0050f0c7076e5600f5a15903c9e8849891672228e1908a0b4683fe
SHA5126951893a831779bcb36bc38caaf4434b889cd0afeca9c0332cfa72b6fe74f7df45ea7f4b55c7c83c11192c9663ae0a5c31e652d354b2947e5106a59b8474b958
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec39b0d40472625546e275e86bee3aa0
SHA16528297b2908bb3d078db6e0cc20d8d98fa0a0f6
SHA256fbd338448628c0276923966ba5e2af03fbade7ecbe38ad81f1fa69c56b6185cf
SHA512311974190f2af26b7714e7c46566d1733f0a057cfcb55d05ecd871829396fbea891f14ba0d2e8eeb4f1f1db9d094d17c62b15d8aa879b7abe4a74c8a6a47dde5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0fdcc8d77cae6641d213895a2456bb0
SHA1128890a803b279c9a8c552d68e4e1f3a37134b6f
SHA2569eaf9ea30c4006ba910b8f20fae3e542096cdd2a77a04f264a77f96bc21bcb5c
SHA512f79c93f0eb8dc71a69069afa645cc84f294ea5d399bbd1b3fece0e5a5c4ff79400d61a00021ba5921252884c4b9effc8ab29ee279eecb5d4c4b634d597b114e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579f991c45fe13e4c58eea1ccc75593c5
SHA1652713bd582bf33f4181afa76e9524160d25708d
SHA2563124969c873176be279b5bc693edf9a1e8479fe3120ee3631d40d9daef5d72de
SHA5126e02ac0814dfa82b0e5e2fd3c377140fc7746553c2687fe94e1f865d46f2acd800f6f969abe6d9d505ac4999d32ee6a4d8821fdb2ebb5bf203833e8e71e0a9ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54780078cd7630ebd110edb5a7301e9ba
SHA16a19b559085023c710523ae69a0c528abe84f294
SHA256be04cdc5b56ecf7b3978ebc4dea4c38db811540516e700d32f82a014365045e3
SHA512b3274cbb11dfa8ad14921268d76e6b9519c58212d3dbdd6198952d94b98843585d3087bb4c03ecd8d5d520dcf0fe47a1f1bbbd4b4612308f5e6b540cfb30f86b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55032ef1c21ab02a36e72dfda9a590dd5
SHA11a06f0823c6565caff4d8cc204be8c751f1f514c
SHA256c6c293922b5b5b3e281bb107a979a8b1176388c2d088b0863e2d77d8a1f728a1
SHA5121aa05b0c8ebfa35b18dc0eb686c44afc69f61ca291ef18e54232e2d7e9afed5b59b76eaa6185383c850d2fb58062ec27a4332bd02270437191b35abf3f93e9fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaf971d64ed04648ed564db8abb20ee4
SHA127895711c91f0c9bcf8c68722c856a8af76a72ff
SHA25645b13721947fa0fcfcc5479ee033b54fce37231fb24e734704da655366018f84
SHA512911b30046718bd8075eb66f1944c6631dc5f0fb2b235b4befbbd170ae84210d4299e57da46a627cede97c48a05a4c9228d886587e74b8170019dc87256e87de8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b