Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 00:23
Static task
static1
Behavioral task
behavioral1
Sample
5472d63ef6efb958cd107382234deb9b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5472d63ef6efb958cd107382234deb9b_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
5472d63ef6efb958cd107382234deb9b_JaffaCakes118.html
-
Size
37KB
-
MD5
5472d63ef6efb958cd107382234deb9b
-
SHA1
1551c0bc32ad72671388cbcc6db588b0c290c0d1
-
SHA256
f980319dc93ae0c2addb405ebf9002e58e26f28450c43f82de45cbcca3538fe8
-
SHA512
d508c2e46d242c5688160d0d6441533a7ffa6bba3c1642d6c751c8f324d4af7e8efa5165b2c7b54c268f7db77a2f31f51fd1f09affdf2b153b58e57796603fa0
-
SSDEEP
384:AX7RdiN37FdiR2X/rpBEeqvhcNd/634NXRni/uFfw830JH8Ydq2u6Jx+FpjUUN6:Ar637niRUzpBEnvMpV9Rni/4w8e+FDU
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435372868" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000103515060bd0a0a12136b6293f7dd3ad42c1a10a980d085d61ab7e1f753f8dd4000000000e8000000002000020000000ff1867748aa60fe3ee17d6180c52c70100c2eab7f1238b2359daae2f26c1f960200000008389d44a59f75aa5809b17291c9c7d46d9b2f9296377b86280c6cf5769999b74400000007933508a55a618c70549c53e7dccdeba067a7457ab8daf22cd0e9a46b98889802785e0e60af6fffdbd6d31f1d7be1e9e5287a3f645e4546c9ac249d2380f5293 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2DA2F8E1-8CE7-11EF-A364-FA59FB4FA467} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10be1502f420db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1924 iexplore.exe 1924 iexplore.exe 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1924 wrote to memory of 1808 1924 iexplore.exe 30 PID 1924 wrote to memory of 1808 1924 iexplore.exe 30 PID 1924 wrote to memory of 1808 1924 iexplore.exe 30 PID 1924 wrote to memory of 1808 1924 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5472d63ef6efb958cd107382234deb9b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1924 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d7d1718f1b83ca8493874d161c71d49
SHA19b3e6c14fd3755f845dbdcf850763b2a2ffe0184
SHA256f42a0c84ba0f37fe6564c4d90ed650209d4277fa81c2166e69b5bcb059eaac6a
SHA512a64087b10b14bad825009d47557e55a77f7f815a812cde8951f35744bcfc467796facb0caa8ea799c91856ac10a4d4599f4589722613eb00d7df2f7a11d0e3f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56defe6e9249fb6a72679353f90486b6c
SHA12f0bf33013f94fe224092f76e2869c8e1467bbe9
SHA256c048f1ed318dd9d1b27547e84561bbe38ffe259d3dde44d736a120b736efa33e
SHA512b2e3180825a29f814eb9d8fb531ae2e90db408944b6dc263556eaea3bc729f016d39fd60762052ada3b0096c25f903ffab1e5e88ff2bc9527bffe12ab055482f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fc48c6be1b61300dd246188e2d437c1
SHA19bc35f87f81e2599ef56c5d3ef6b7b049a085c0c
SHA2568b15573a71761ac3808052d56726cd820259d98ad10ff4a4097030721eecc82d
SHA5127646ff32e5187337f06ca4b07ab7516c8f571514d0492dc96f133b63ebc433bb999187bec4200f7d2ca1e60dc0a2088081ad6b5200b61e1178237827ceeb584e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57804743c5cd2669ea7114631df347df1
SHA121f8621a78b651b81bafdc58c6c7c4e07bfef705
SHA256848bf04a18ff2322d54ed4e7a40bf5217350ecc7eb0e1d435e11636b2eaacc2e
SHA512b4c01a2b0be6947f44b2faeedd5c8f18814c792fc5bd4af32655433b8890eb3cd7342f51a6d5987e08a2fdfe1683f73852104aa1588229533d907a13ffa02cd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57681cc5462efbc1dd7f753fc0add3784
SHA1dc79f4b9bef30ccf0854e0683b357127fc2d3935
SHA256915335d1912c996c07f2fcd5aa655c8cc8d32ef9b95258dbdceaaabb0b3ba6f6
SHA5121323280ca693ba60efab1d9613fbd0fb44e0f8111a441022942ff258a17e4016bcdb2c60d470295a99062e4573c6124597f5e8677e845a9f662913734b3e80ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcc3df55dae0c97d46a4d3c1f693842e
SHA1a91e880be771cbac9f8d869bc2110646fc186901
SHA2560bbf9d024ec8bcdb2d38899f7fac2ee7d27e864e0471cf530eeb15ec0610c149
SHA512d83e2c29bc4c1ec8e9226f0ce588e589dab2f4b4e887e717a61ee5009527a97e7ec9d1e07800f03de85e8d093ff7e87425e8c17f7d67757d6ac63daf586c7607
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512a4d7c0a7a7fa6cc51b72a9bbd93a04
SHA19e748703f003210e06da73672b1c2ed6cdf0ff4f
SHA256f9f9171a7a3ba4881be6c210fa7aeff8bb39012ae3816b8f3b54afb020e95e81
SHA5121177f70bd45ec818c4ebb5737c605463ea547577279d99f0b1b2533aad3a36075aeb985979abc1f0d6c213fb60ee3c1b2ccb1d7c0ced254e09fca41759935185
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d2ad7625f1da13e50827ab5fd611ba0
SHA1dd0002aa64ca067d54cb19160acf4aa5fffad9ec
SHA256c8ed016f1a1a701c91f20dcb4ba3f82eb2cf16add97f4c183a303d46690bdddd
SHA512b02285e77d56550a39763a4b1dc84e15fee5c48abbf00fe4dc9796365d039d01a9a90a17e2d2132c0c6e266f3486899e7bd8214bfc7312c4f4b3ecad518718a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf2faa404be707b04b9a8ad4dd1f9500
SHA13b5910ce1899c216957566c5fa892de5e8c9f1d5
SHA256e37929e915f4375bc7bc5e59c0eb8a8427d638b12f2e6b741989d788a2d2aaa1
SHA5122aaf9fa937cbda182d188e43334c4286db69e6498491c6510d7668d7a387ca482e7c771b314d3334de6362dc7a0453fd1006879197ef9654c7c974a2a66a253b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e98a210648641f11af49ea72227b6355
SHA1ab867c22872154a0d1e80eea8a9a5380690573b9
SHA256312ee19f82afa1c2ad247209776460f2d3b209772ade91fde9e4d936ae40de78
SHA512ca0f811ba57d851fb1f2b3c216a3fccccdca79bd1ce7d9d2896b0ad4019605f9c918a5fd582fd7c05c1eea3f5c0190b4797866142989cb4799cc6011c3eda6f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59aced327478fe18f6f07277663c8cf79
SHA18ada350f1ea52baf8786e95648599ab27c55544f
SHA2562e88a60a04de351a2567671076958fc242d436fb2d6963bb7496e200b4559864
SHA5121e579a58db918243fddf62e29b7916d5b06b707c57fd3928503be9724c83581ff75badc6b4c52b80a99dccdbba72e0d16193ee0ce63dac70b68cb8e718e91d5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525ef25d2a878c303595386dac87f5c54
SHA1cf21dc8c2d9714935d38d602ccf21b77f182a839
SHA25670ad339fc12101bc05a15a866657f2191be0a60ee07d183fbfbdb1834a90993d
SHA5126c5c346ebfd42f651a65da1c5b20d64e74721a3521dd064548a1ed398433bf79b9196ee833c97f77b19d843fab3bd3f59e033478f7b14cb5bbd1bfc9f30761ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b51a70e80e987fee9caf453e256cd1c
SHA121a05a7eabfefa00b0ecec943b5b22c6f9495092
SHA256d336ea926f7076e952820e12d0bef2b4c5365fe27f113468f5a7e592a4c0048c
SHA51294309e48524fa9f30d9d3224d0ce645958ad568f5f7c7e8c0d04512121f1635d43cb309186b3c29f5058f29ef53d19eb6411745688790d378a1daa021fc3d2a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5891e29cb0f79ab24ac326ff8f0ce608b
SHA119daefdb943e987fc63b4b60f29428c965ebebb7
SHA256ad9344dfd8bad09c107008ab2be572ba6587dde54f9f2d3ed8a12afe3caa545d
SHA512bae4a08895308fc320e097660ccd0aff4cf124b06db99de6884b5420de29f6504d0a7a38fb35bc4f6f43ca0a65271d5480e86d6e629099b1327b2f65574a1410
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56730888661fbbd345efb1aa9f3fccff6
SHA17340477f013d21f9a0d002154382c901a30bd7be
SHA25675cbba7441846102cdfd7dd89d336392239e6ace9f0859691e2e3ea6cc6db055
SHA512156b762564be309ca6ca76ab67a1f889ab6712b62461a8cd4d411bd411c528a70897976aa312d41d5361ee4c6134c43c2cd26080af38fd52fc82abd693339cc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eecde23fcbe76af2ea1db5cc47473182
SHA1cfc957ad737577b4ccae6f2cda8fc13b829245b9
SHA25617b00c949c5e56bc4dfddc98226cadcea8cf1311a36ebce77ce26109f3eab675
SHA51208ad56310bb797de2ea65357a687ff8f8e2acba75b1291f336add47827a9eb8416ef65cce37950fd3fb1ce8e3de2984f154854c5a1c88bf72757001a177640e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce263b284b97d19653209ce93e3fa084
SHA1cb0d5246ea055fbb038d3c732e40ed81a124c968
SHA25673e5b9d7631b6fcd106565c4189c430ba2e08ffd7e346a3e1c8e7db9b520b9fa
SHA512bae7c4be1dc2f2e3826ffb8e6a5105261c2f27fe394442a36380ab3695c92f4224be4c92b631530940f88a96c84e4058e9ebd02dd975aaed52c184ebff7e90c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5834deb49d693cf8193bb600a2f424a39
SHA1afbc041852c97de953001e16b224c1ee191731c7
SHA2565eaa20a14c9515bea8fc9ffced98c4bdba36e4c448220aa626770e20026a8282
SHA51291b6bb17f29aa3e1de9a2ff1d7517d72dfc25bfce340d144a1fbb7e9266af9eaa472a4c7dd7c0d10927a3a4d9e2ae5236191c40db66fc777a1d54f7b999c69d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f83109d3dadf5e05fe02bf3127acd4f
SHA1440692723b4068d07b14206bbf47c23334075edd
SHA256cc5a43ddf2e57df55b7387189416e0cd29bc5b0fa64a4781098bb68a4f76cfe0
SHA512eec6dbe9ebd54749b4be6e0ffb3a4a4a7bf802e1aad4c39a63d9be766269c628300cf4553818808064608f128e0e2015a906f1363cb4880fc2ab35b7956c3da4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b