Analysis
-
max time kernel
121s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-10-2024 04:09
Static task
static1
Behavioral task
behavioral1
Sample
55673bd75ae9efa8062f6b3625e3fe89_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
55673bd75ae9efa8062f6b3625e3fe89_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
55673bd75ae9efa8062f6b3625e3fe89_JaffaCakes118.html
-
Size
12KB
-
MD5
55673bd75ae9efa8062f6b3625e3fe89
-
SHA1
e3558c93d3f4fdd5bf39a4d12cfd2540a10d7ab3
-
SHA256
9e591adff7720c3f8cab32ed38f371d66917c3ac5959f71b0f196f97fef6f992
-
SHA512
2919ec42aafc534290549b29641a1daacac5749c59986ae4d13be65d55c5923c0b6b519ac48f959e18ea1c4add88fc5b6bbe5c29ff5c425c0c60516dda75a0d2
-
SSDEEP
384:smlIc8q8VCjg7/g6mBFZFnjmM/Y0O5guLZ:4gX/25xLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000016a8f700f39a2dca6ae37226dfe9dbbe38192703551cb2133e48c7a13c5e6635000000000e80000000020000200000007550f7e9c2d8e0e6c7d129e627d8d1edbf5ce4d836979a55f9a37a59e165a0fe200000005e395b42c02c8521bd2c4fa999b3c0c59551fd23d97e429e06635200f47630b940000000a4db8d21f6403759d0a14ba13c94e62ae6bd5060ea9dec3cd98c5112b17447d033a4b189a1992bd13dfb9fce375be572d0fe9577b5c06f255a7228538ef51d07 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435386453" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CEF007A1-8D06-11EF-9FB8-523A95B0E536} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0002a7d11321db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2128 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2128 iexplore.exe 2128 iexplore.exe 1020 IEXPLORE.EXE 1020 IEXPLORE.EXE 1020 IEXPLORE.EXE 1020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2128 wrote to memory of 1020 2128 iexplore.exe 31 PID 2128 wrote to memory of 1020 2128 iexplore.exe 31 PID 2128 wrote to memory of 1020 2128 iexplore.exe 31 PID 2128 wrote to memory of 1020 2128 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\55673bd75ae9efa8062f6b3625e3fe89_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2128 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539a27e904aa774db8570b0e30b9f1bb2
SHA1520c2cc9a7d4e25f4959bfaa4f8ff4a4a7bc19d9
SHA256e8df28e2fe9a29a0db0799239142c6b4dd5f4bef4481290ea0785292b57b434f
SHA5124cef3f3b963d79d242af1e76c1040d63147bdd42c44b598a85162c2e6f90c0cea9595d90658b89f2593a705e9c8e7da39d83dff2e57eaf497c541ad0f216f1ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591afddadcf06d7463242dd70050bbe74
SHA14451e4d8809d819fabeeca6454c1404ea6f0e8c4
SHA2569f41b6b9b90754a64e51a07804b76c4950ad6651a63c435924aee50bfd0a633a
SHA5120587f777c7e5384fba4437a4dd628281fa252cbe073959da2d0b03e7c8a471475007a7f6f966a6ef4e19b0f8665304941ef69b2cc265adcff21c99b3febc3a1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0b0c75da7af6c1b766084bf49007b4f
SHA1ba39ca85dd1ad586195e17dfab9e0f1c549ce8c7
SHA25662d5ce9f86960fef750a1d264d5d341deac87218e458e8ab0c73b10bf1b957c4
SHA5120369bc959a3965fbe027310a0428490992558aace29d0f894fc2202c81daaa2dc54ac28d49f071b1a5d7d7f0c4a828d7a08fc5a4c80ac8142701d95680c5c363
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab972ec0b11ce95593bde53c788c1ddd
SHA1bffcf34889c299d137d1faddfbad0dca3f6e358e
SHA25619be1c0131f244f3b723897e6aa1f02f9869c29ae8d273d13936af7fbe959554
SHA512679a59c44d4ed39d04909acbabad605ddbb70aa807812874872abeb316bcc7b987c17720bad2724d4caf52e2fe371e0837eae2b51009187f5019ca15eab549db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfeb34e9e9618bc17fa6a8b1158392bc
SHA1b635f6012034b8ddb8186bcfac0f8ef8a840facc
SHA2562e0ec71dba8665499d98cf4a8b30dccd5f3b63f1b62c24a14a10deaf80d3c4c8
SHA512f7b1a509fe49555ec04c60c070dca7db7ec04fb63228089c36338912100a42a42a1073f7caf09306c1dc3029ab80aa9b48c481982ec34eea6b3d2d6529bfb96b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5f8b4845cc3de8216bac13d17fc659d
SHA1332f9b8ce37b7a23ae27c006586dd4df4f3709ae
SHA256314e281c2462f52ff42e2db91ae00af45b941975845c876d3cdc5c5140cd1a75
SHA5126a9c4843e45bbd1a9c4e744a7e584cb83e48a1c4da5e50dfa2a960246fcb91882a999f7b3f46d6cce14047fa1c20e7d4d911fe78ad3eea09e205eaee228b3910
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf87de092936427f8c9c84239a637fce
SHA17fea7b9d1baaf75e690a7ba853ae0294e1745752
SHA256d76df7c3faa7d01ba049f048faa06c2d6522af409dd5d5bc364a06692761d47f
SHA5121d55039f6d770b8b5b37b0d61a73f0c164c77e4a4d38c0c5a569419bae9a8958a42efb48ef9fae17c9c58293d0c67c71dc9c6ed1a2ce923bb43f64e171a3a7c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd8beeb5f074ec1fc388d6131ff51986
SHA1c4497945d20ad41962d51f86f3624da8f73e4a32
SHA2568a784daec7552ca5a25058afae990e1cd3ce9c7ba42e02160a08a3bad55af672
SHA51254bb93734a5126e0875498024e94f80dfafb8bff6e9b9d3f99977ae0317ac761381e568c903ed3277bdb2ba0c2879398914b6cb51f2dc732a4fe295e4061c03c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5689997f4773691df3a871026cb9e26b2
SHA1b47cf9f7021e4774106611d65753a2f6f390775c
SHA256d4aeab7fd3118c6728ce573387cfbc4a0d59a8d9bbb8b82df23499449a9583e6
SHA5125ebf88e88ec2c6c49e161c868a4dca9b13929423ca6028a190491eb60da34940b25345e1e5bc417113765deeb644bd1456d29adae84736f758761833643d54be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dce0e2a361bfa35e9901177b9e8857e7
SHA136ddf353757b25473f429bd3382d1555832774ca
SHA2565aa992385c07aa6062d83705847480cdd799b1eee6070eef210a653f85a2a6d2
SHA512d4bc3c6ff5d68ddbcabe1eb4378647f385d1d1ad085f43473f3142409433b8610e0e895b088375fea4694e4172ba896a43757d12391a1a11573bbc158d1b7201
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528bb7b7f44db3dfc45c7e5f234d6117b
SHA10406da54997fc644afbc677aeae0a3a890f902cc
SHA25659ce481decc17e3214a3ac68fb466dda2ccf181bdbb2bb770652a35bcbe2e289
SHA51222fea5521ff3b9633cf46332c6aa103f2719392e78e338641ebb364a54c1aaa4f96a6ec62e09652d4a006d5f37322c2e0ff27a3e2bf44eb9545b8cf755b11227
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51852185c436d6945d642087ea79a9f35
SHA1da52f216d5f6e8d53ee2cc417393a863c8fbcf18
SHA2562789952c4b486d405c5559fb90aa137df09333a97031c2410765c94a4da65768
SHA512a0e76f709f7f0f5407da221165d1f54f9e5e3427f41009ecd02a960928ea06a4151880715ad7a55f71748bc881dbf799b2f14f42c0cc3dd3f35cf0b3069af1f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c741c9f5f5445be1a2d0f14550377355
SHA101685316f2776c91874d45624bf310aa6393f517
SHA2562407a5322aee00f7d76d82220d4d0c85579c6dac972ba473cd4cadb5dbb7682c
SHA51286c9095bb3c078c946f546fcd73d07554936a202daa8c286eea3c0bca32c808db605fcad3ecb11ef0bd6fe79d486df28baf87db5ae99fa046189b8ed90d6a294
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd6a78ef2657b2100626aacc84cfeacb
SHA1fbfb14ea13c5227e4555abe4c9f57fa2e1a42fee
SHA2562bfe23dc146e9b343081ac880b2b91968d79862e93b206084435a4d4eaa0fd30
SHA512eb11e133952119285f802d8f114a6ed0a562537cc3eba96c59d8b139e9ff71cc4368941800833e25749bb07b7a7344991d344e3ccfec859d2018bf1fd82e7af0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1b7181aa6509ccb66439979d885e9e3
SHA1ec988af40cb87ceac11eb052b5fd233737c75bef
SHA256776fdfa136c9393c99ee16672b6b17352274533df7d22518f4716932dbefb84c
SHA512b84ab7c6359cc13fe645d82d77bcd52bce70b22b803d4fe317d7eab711466537baf52c9821c0aec0b1e450fae1343eb7a672defcb72deead6fcc733c38e54c19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506194cf5a86aae159418e0f2485661c3
SHA19b6fd200335b0d3ed54dd30ba0f47c2da1084824
SHA256c3848d0cd04de0f3bef927f48ebfb4b3c5167cd2f09fd4a23d01ee1e76e8de61
SHA5120a8bfbdead97968a4b005f0372d03352720bd23d037c8bcf68153b1644c3bc021213e38608f0a82066807cc574c6fdbe32d0fb1510774ddfcc6d08dea67cdc88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbd1f74ebd4635afb3729c4deffd0785
SHA1f078d283999de897a3362472a452fb0650270066
SHA2566c67cbf61cd48e251ea96ce7594ee80c3fb6ac6278e38652ad1bf9b9b63279e9
SHA51221b041d6271d2d4846889a64eb0485690c1372acbffb388bba0fbf8c8a8ce8e27f7a65d54ca4f5613422616bdbcb7ad0aa27e5ff450aac71d36c543864fd8a69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccc15f106297a2133fafe0f88e27b24d
SHA1cc759e80c9b0311a1c552c82972b445d8268144f
SHA2566b2181345dfdd7b11dee766eeb4e7caa98d36ad637d9419c6f946c9704f510cf
SHA512d9a816323bc365b2f51de94f96a3b6f0b81a034a50a88c0c7e4895ef3c0866bd3f1b7af3dde46c2fed260dd95ad839c08dd817c43ac8ead7bc924775cbf8b963
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d41a56772f4668f2c78aa528420721d4
SHA13916bb5a5ad61cf5cfa8ab3fdc02e32077a6b378
SHA256c2ea1938c5c788465e2cfc8349cb9010ce96362d3b1b1295a0d9e821e54bd9e6
SHA512aeb79e29cd644d68b95991f1df8a2ba8962579868ac7d0257226f170b43c068944ea5ae03e3260017f30bcea53fa7a38929065087e1d94341206ae20ab9b27c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543fb07e7e659eec1ea31f0994f4a3ec4
SHA1ed9b4076faa13307affe0c9b1d24fa430db710a2
SHA256a1c11c6a76341d7da727eb88414c19f547dbb16406893ef221496813099c4381
SHA51287a5cfa33fe05f10ec1d70df203aef441e59c5cad67085d6c0eca737182c62d217c1e7e1d389dfd88b14601b3c85f48704aa879740ba01e544eb05a26db62c18
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b