Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 03:15
Static task
static1
Behavioral task
behavioral1
Sample
552e2cf37fc7f004f5dfbc0f0c7a9ef3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
552e2cf37fc7f004f5dfbc0f0c7a9ef3_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
552e2cf37fc7f004f5dfbc0f0c7a9ef3_JaffaCakes118.html
-
Size
101KB
-
MD5
552e2cf37fc7f004f5dfbc0f0c7a9ef3
-
SHA1
ce80776a19f7c2f12c8f339c9c5eb90459c98247
-
SHA256
a1c240d8f279aa97ef2c4c261eafe5db19e8377641726ecb9c4011db32aefc34
-
SHA512
e6bd2276a82402fe182b5272f18dd5d12d92fe92e07ad46c45124ebb22b7e5927c684bc882ad19194c24ceda11852393f1148f1d7ffb6328066944ea7b501e5c
-
SSDEEP
1536:SWSebzaL3IqhrF/mTCwzZ2wQzRWkFZWJRigGEFhH2csw:SWShOTCbTzR5IigGQH2cF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000006d8fbecc0164d5bae9d64721edc19145b83f83370ce8b6461475b903a7b2c39c000000000e8000000002000020000000bc8cf02be94887a03810e0138591fc1330f7b44532213a5285e1c0f495d8218f200000008c56f450eb0e922b4d61f8ab1addf420677c9afd6295ce680e371e9a7241cc05400000009e8b8cf0061c6a4473343ed905d4acede8b57f7eca01463d87d1815590f1b85a68da9efa7ffe224a3494bee01d6620e66994e551c8c86f5e46787450b76534d9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0bcdd350c21db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435383218" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{46C5EC21-8CFF-11EF-B9BB-7694D31B45CA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2096 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2096 iexplore.exe 2096 iexplore.exe 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2452 2096 iexplore.exe 30 PID 2096 wrote to memory of 2452 2096 iexplore.exe 30 PID 2096 wrote to memory of 2452 2096 iexplore.exe 30 PID 2096 wrote to memory of 2452 2096 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\552e2cf37fc7f004f5dfbc0f0c7a9ef3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2096 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b80b76de8dbf1f2b75f0071740fe0e6
SHA11206f581734b0e466a3ffdc078a773f402a58a30
SHA25682d9415421fb615e4f58ded4c99a40a3bbac95fccd9d02fddab3532b1e6f92ae
SHA512595e39870894f1e723e96759cacc6ad04af9103a5a8f0c29e6c44a2789e6994a7aef252e8d4bfc5fbaf8b8d2f6e9b95d0bcc021748940920d6c8c0972ddfdcf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b02e9692e4b0e019e732e26acb64cfa3
SHA1991ab19c322d0041df4520758b1d7af803542727
SHA256140fd3488445e080529fdbdc0b35f8f3bc4dedec4256e0ad21a71445030a34a9
SHA512c74b1f5a2d4ebc98996ba0becd35ef4e0b9b49976a66e68855232a8d220bfbb57fbd734097b124d6b57ff908192f131a061dca1e3fe4791c364cd0f2d7330164
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e01a30278106739bc89f7ee02de6c915
SHA13fb4885820c1927c94a776d5abfb7a5406e80d67
SHA256b496095c836898bc6d2f493da95b907ffe6dd8a6a1d5fa3e29417fcded3ca496
SHA5122e7f3263bfa014a08be008f8735e1aec26e1e92a9902612264255920cae20be444b45be5b0fd0b5af32648735af9c0cc6848fea36a3f28e5e40b1fc3dda3c86d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdbced316863519f38985484a43cb72b
SHA1293d6ef75b1dd8317d4a7cd4a55540b5f4418599
SHA256f8d69a7ec631fc699215eb439fce15bce3d26a5135e6b5838bb69212e733f361
SHA51296f55d4260077f9fc1766d944be23effc714d9e17a93508d6264897d7c609b808436ba5039d2886ab24e4df759eedc5cd4312d83e282b58cee3c63ceaa64e446
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571ce84b1e34b6873f12c69f40bdb3b63
SHA1277ebf3a0b1dee358894b2d8fddda1da2c289101
SHA256aca81806feebc592f1b82c4f38a9f7556b83906cb644431564d91e9fc3db7ff6
SHA5120124a871b119edddebe7ffef7017704a260ecfc39b4940143b8fd15d0327981aaf3a0876f60eed725a6cd3a71469d8fc74f180e7d29cc08dcfff718f4a40b775
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd56fd7ffa0afeb64237de21cf398823
SHA1a00a6bc7acdc25e18d74ff89677efa491bd98499
SHA2567cfa10460a23d31b7f8f47342846e3ecca379c75d24e09363364a42970c897b4
SHA512d6476ee3c9b016debc9f902cffba5ee4795738ebef0e195b7ccf4ccf41c72c888f865e47c3ab8914fb169de2ae9ffa81c2eacde4912b22711817daf5eb0324d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dda9cf7e24f004ea6f79f45afe11d60
SHA12197f8c62ee12b08cc21fb1aea51903f4b9124c9
SHA25627a9c70b0723531193c07c9f967b43aa079465cef1fabe26ca6dec57578e7e28
SHA5123067236d88317aa65eb2392d2f0ac8abbba0b1b035b4fd8f4717c9f71a95a9863a248f8a07ff1b7bf0701aa8607db51cbdb33ac4beead72c6e7d58ea00f06ed6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca4bf2bf187d7fa84d85b874d071affa
SHA127d3291f9c1bb1d44774e2998e5efb0b95448e53
SHA256c2e6664192a23e3a3a24e878583a5530ecea0f921ac067b54f2b3c391746986a
SHA512e33cf5b58a445391fec4fa45f9f4a56e8efc4b919ac295837ce5a08bae9a7aceaa9cab5220c4df114368604268101e1e67f40d417ecf99a7d13474672779b951
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568283fc000d253d35b138b29cc0e6e0b
SHA1a7b5afd587adad341c53e30d6650d6feb2b2a719
SHA256d8d44c1656416d741d93287c6def2838105dff8140adadedbb150cf07f646099
SHA5122d09175fd76cc78ae32f99bc90281ea0f25952221336a88c4d1c84ed4746643dccdae718833fd93fd6d79b8dc8819f4964c0843e35b590ab6dd782ae9541c9d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523ba8c5b952a0666e3cb936e9cabaa4a
SHA113ce195589408ac3cc37ad4baa9111f91be3be11
SHA2561633990499a71f0a773ae33f92a8269e6e4dbda0e3877f0af25132cfc401af25
SHA512e7a3aeef4766bd7af6a326a77f7ef029052dcd08feb8248724eabd786dbd1a816020f7d48110ae1535502d7f77736d072fcf116ab0f575d400082bfa9b082280
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fa05b5fe4bcfe71549469e6f9af4097
SHA13ada42541f60bb994f57fc2dc7bf6743dbf3c75a
SHA256241e7ef7c18b715b07c6ffd6be52bff4cee3cac8f113e73778d4c361dac6b928
SHA51296cface47a43088c3cddf32c1c4ec51efc3876c60bc7b33db3e1ca6b1fbb2f3170bdd3bb901272981a7aff7640108bea5bb2b7fdcbe0b486fd0255554c243849
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565725666e4012e1262bafd39ad7d18c8
SHA18b0652ff8a6a8705c3d38ea3ebd7b5b71c5ee4c8
SHA2567f8ff37d4c3b88ad9798f9aaa0034f26e1cac5f89ebf519d5fd789630b083943
SHA512cb09207dc5b09a427ab7d85b29f785dcaf8dd89b7b935e4cc57294e9a18362565f9f023635e57da5798bad0847b3b6ba8b4a78a8015b94538a5ff7215e046aa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5693368f94c293b195f7b27f4bf81bda1
SHA1b7cd6f69b0eb71d09def266fee4c716c217e1b6b
SHA25647273ad95353ee9f75d19e909f50c17b42534e6804b9b3a74b8763292446a9c6
SHA51238a58cc25cb31c85e283d2145235f3d107c38050a85923c17f748d694bc0c29101c1bef18ab6644adbd438628b9cd1b623ec240b5c20e1be9c38630b247c09a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511612707b8be02fb5f0b89936b8489e7
SHA1cee5bc49ab377645a06dca2a24a4ebbf5e9cd490
SHA256c9f6c124df43a60b13bcf53181f1d1fd6bace0767ce582e1d11716018189e8a2
SHA512024c476cb0259912aa7a560805ce6cb438ca976ea14525723fbe0bfd2844e4b5a4d25bb775cd7f81529780bf2a8c91289dbb86b8aee95a3c20668acb85297d24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2e1fc25a45d541d3bd79a7ed3064ad6
SHA196a658fc7b7926ab103c5d2c4e0686d7cbb33516
SHA2565b5b4fa1496eabfcf423423157d27f954ef6e5a0f4844e65e06161471cc3c2f3
SHA5128621b3be251f88d10570d8e90a08ed05d0f1b730a2702bd3d7a395738cacd9fc50f71e002ba0422886a649d5e931e284ea369b51d5737237a0e72bbeac46144e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50109a8b90ae6f7e389eab6f177040643
SHA10cade07db8abc22a3a30708ff5bcb2f2c119c70a
SHA2560152661db58c0704f66b4bafb1660f88fc7ec0553e515c083e25ca5b3a79a08b
SHA512e91f0fd0275bf81cc309fcf3762342a3ec6f2b826823ba480464a091f5e9df547107ec0bc74ec7f59ef134b4e05343eb7d42fe36afeef8d9e25798bc47bbc5e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520b270dfc85e37e61943adf6e68c3afa
SHA1ce3544ec2529fc8bb05558ac8ebb44c29b606891
SHA2568a35f95999121f7ecdaecb3dcbbedf160b741b2ca5a5aaad93e091ace5a9d268
SHA5120a572a4c6e9d6a70857d0e3c5d786a1528bea92a970ed88edd939d087c58942641210eedf694a6c627bd06a17fbcff6de8409d3753299ec1102698cb36aaeaf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5390096807f466718717304449f12b07a
SHA1a1e39ee098bdf30403ca871e9f1dbc715a753c81
SHA256321dec77aeb6374596f1d4ba7650a362dfd87970c460465eed4ba1236db766dd
SHA5128059024eafde68bb08ebb3ced3790137a74ac507e4ebf3ffa6980c2beb552a20c9aafa7e33bd528e0481340336335e8d6c5e1bdd5de8c683e41a1d805d22af1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba2b7ee05b5182340a79278c518ac913
SHA198ae71fd4ef85cbdb1f332d591f0353a77016ee2
SHA256159f3bef559fad2f480c8fa436f3655d4227351bdd0cf51a5e781eae578bc187
SHA5129b2836d2ee4d4d236658dcd567ecee9102bcc7e0822e787ba076cd6cd42bafd6f58c40f87720a146fdef174ff6edbff65bf433a85dbd51178a7da4af26030111
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b