Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-10-2024 06:31
Static task
static1
Behavioral task
behavioral1
Sample
55f46c1f13db41bcee0f6e31f5865605_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
55f46c1f13db41bcee0f6e31f5865605_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
55f46c1f13db41bcee0f6e31f5865605_JaffaCakes118.html
-
Size
5KB
-
MD5
55f46c1f13db41bcee0f6e31f5865605
-
SHA1
09594ed85b9f6c2159c469ffb06e5c6f143836ca
-
SHA256
300a6af860082c7b398a54bbbebb4e310fbdfd0ed837ea802cfdd13e9509ce05
-
SHA512
f13ab120b652e4a64d24452fc81f810cf945213040834377adf93f408cece1eb134ffb17d99e8caed0230a62ae4fdcb68437c94c2688b401dc7abd3f122991b6
-
SSDEEP
96:QMp5qxWQpeDXWd5p8JtRURBvm+TsjDKMDKHDKQlswx2NY+g8TCwECRfE06U:QMXgeDXWd5p8JtRU7++TsjDKMDKHDK3f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435394940" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000ad8bfdfe47b24de42efb745f037d983a77e8d642918df241e9cca90d9475b0d2000000000e80000000020000200000006032c55e9a83c5c09e94438962654ca246e2320f0deb46b9b8cfb7447aefd6c120000000016d8b4e1469fed8731de2dc10e56bbdaa9706544c3a10374f078407e441461a40000000cd6cdbde309e2dcb1ca0f6675750864527a76eb039adc5ff9c85cc4778a95344ae04120009b96824a2d30d8e5299846ba697a5f599f4fc3568e705a18aab8e30 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c006c4682721db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{92336AA1-8D1A-11EF-B909-C60424AAF5E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2084 2072 iexplore.exe 30 PID 2072 wrote to memory of 2084 2072 iexplore.exe 30 PID 2072 wrote to memory of 2084 2072 iexplore.exe 30 PID 2072 wrote to memory of 2084 2072 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\55f46c1f13db41bcee0f6e31f5865605_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2084
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8ddeb57323b678106b1d6a6e857739a
SHA17bc53dad83e51db05eefcc5fa636021603c5b254
SHA2561a6e502705045659773ca20fe116c76706ec7f7cd60ac7cbacc89a27b7392fae
SHA5125c92497d81a79040e1fafac41cb3856d3355f86f67c7aaa4236d4b0abcadc1460abdd49223137d8716bb0d40c1926ed135ede4c90c1b890c2cef7cb67a86dd86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fabebb5aa3df3df87a6c5f9b76ceb265
SHA124ce562ed24a9bbdbd80174a8020626af33bbaea
SHA2560fd59bf5168a9f4dc9531092a83f13c255c81bea0f7b50c93d436c9b1cf20832
SHA5124c668f595d71b41c5b5da9f2ad0303517cde72c8a358e7b9eb9c99be06ece6470771a5d571b7103bac78048aedc784aae8dfd3dec3369ced909d05127cbea1c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57131189713ee3fe0f387de9661f1db8f
SHA1ec9229d3fa8eed6be025b9b126aef3155f621164
SHA256ba990ba0cf315f53c3b49f33d967a5d1d518b5c8e4bb1f23cfaa0d7d065ee74b
SHA512db78b609b9a9261862d1324a279252e980d28750057c3bd4a0fa81120251cc9d3a923e047238ce6a937dd660f84d0a228c896836533cfca4e6da074886c99a3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8ea6a9b4d0ed3c8389707388ab773d8
SHA1ff1949d6f151ba526762412585e894ce4542c763
SHA2567719d016ecbb06f1da710904f4832f24ddb5f06e2cb0beb4a2aec60252145559
SHA5127d6f4bc2fe4417d394c3565250ab5df487393a2d785fd9ef25fa3a727b4974600246fb5d62069f385d52fb16747f2a84d8be0f28eedc9e25cdbb3682be20aafc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5479ea4209ad485d3a3953521cfd3a99e
SHA11ff99b8344c90f667b6cf2ceda1aca2b3afd8623
SHA256bdef48e312a06c91550328aef6364a06725eef4ec656aec47e12bf7fd85dca7c
SHA51223be2373f3ef040664cb54ed07b8294b9508fc446ed98237d26ae1c4e60e81cf28fce62e651ee03c0d692f80cd7283a391fe6526471fbbf580596f538503df7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558aea122d88c4869ae44fe91d4d440b9
SHA19575a556ca6c17f80860d517a43643639f187757
SHA256d9c6fecb0eddfe1a6b4b4aea873e5136ce78a255e9288d293688a5ab948e415b
SHA512732a6c554989fff2a307522236e50ee01fbe727d1eb6f507450374d4d167866f37a62e5546498fe720c469c0b9912c134bf521af4132e93297da005d75c4c576
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fb3dde35b78001433f9b81ba128b857
SHA14022b463050ae84611a9526f26fee334614bc2cf
SHA256debb687762526ac1ffd8938285c565ccc0bac080920860ee14a2db184185414e
SHA512c597715f1944e98967d4ee27cf7a2def28be9cef7fe89289f253c106d8878e6353427f83ae6e8f0a406c7ee759771115115e8d297e9498979bd0b8375ab02b77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b3f63927c44d5d70bb0bf915a907953
SHA1241632474fe240dfe6dad3eaf8fd21694b13aa0a
SHA256a424770562be41dec34f8c3907b6bb1edc36d7bd6b90a565807f5d1306b5d8dd
SHA51223dd06e4544b92915d5eff0f86a48cbb5d475333e608d86978b8b84de886a86ad703a1a6b729d67e2610396133be0cd1227ab187d83d526a79910f53bafd683f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560ebf85d9feb22c6aed4508ed7c6ab0f
SHA1e22415a58e152a54afebe3e104c4fbdabe7a4585
SHA256c872ed2b8923bce7a94b2fddb30c23527ff4db6debe020b960048ab9017548c9
SHA51246606793f9581ab735c66fc3f7fc1e3f5bd4aab9ee545561afc1739274ddaefbb54804f182c8052acf432e453560bfe99e748880390b8b0f8593e7f9be2c3ae8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e26b24ff5b7a902a4da83d21a0196714
SHA15d40e29f07bc60cc5d1739de8cb84a363f9cf08e
SHA2568d0f79bf6995dab6dc61b3151087e21862685e86621bae4c1079595146ee4db5
SHA512f86cc5d90dd6469cde22ef3e279091b55a503b1e0de3c7a26eacb1913ece6302a1659befc7b1dfdfc62eb24343921f6ffe25b1bb99618c91fbf87ad15468b208
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52565b9ae6e5b76e236b53ff319ae4266
SHA1ab3e32c2f85e598879925e48c745cead1170a194
SHA25618d498565f8224d855d323f369005a65d1a499a3ba5b1e88424c3a7781774a34
SHA512535e4b878173b45259b695707e4d2a559874f5c51b037066dda603fc07787666b55f7979a24d817c5c3f6d1f2502750f1b59810df83ed03e4dc38cefbb69e6b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fedfe31d24a79c6c408ebf3a61fa1f1
SHA1b293ac993fc59d8cc6ee73e05d28b19871923505
SHA2562ba403fbd4b76996672643bf0d63e61adbbf79eaf9f8fba15e85f284ecb6a693
SHA512c5201f86e72cd7e7dca4c437083795bcca2bdb6068b0e152227a7c5ad1add0b4617dfc3eb2eff2a395392f0084cad37efabc4efd48046726d82427b4c1777c94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59edee89b52f12cb33ba758964f109df6
SHA19165ad027d9e5fed365fe512820b8daba2d68d8e
SHA2566613164f9384211ac1184ee7e2b4f643de249ef8119d6edf46ff96579f348676
SHA512eaf225426997933bc10fa6ccf1a6f2c49283502523befaa8535b71e1b784100e85939a656b312541e05aa133c86554c04af5ba765ab5d6fd697c51b342471fa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593287f4314b167642f6b1c59d75e9265
SHA1b8ba3b918e3f545725c5dce1c9fd3bbc0bc8fdf2
SHA256f9fa4cb7096e7c6f2b59a49bd5aeecd7790b7eea755c0a2494a911a80b1c5f2d
SHA51218cae54c97ed55c0fcd753558fe84e345338b88682d88fef4f7f85be9bf3567ac61ea62f4acc629f5e2e4f95cf252f41f317744883ed199e28aa64c7f176a7f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5245b31d6d618e4ff7dbb22527b4e6c0d
SHA1d419ca6f626000ab7d15aa8f890973e00b9e03e4
SHA256df59bbc291f9b344369afa3ff64fc0b853ce6bd27b32d00be1a63bc03e79c9f4
SHA512b76c371ffb726a55b82a34d3fe72d1d82bc803dc3af400946af8e577920e84d0d9b48826735effb79b71c12bfa9fc6e24c1637778d25a6ae9f79739768fd0b77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b53899c2ff1b36d244d6d88b4017a8e1
SHA1078d617441b53e4a5720efd055d29858e9458e4a
SHA25663ddfc011773c177fb25155ca4877926c80daf3ecf4f711cba94d63cd8de0339
SHA512210ed8e8566de4b0e534326f0b03cccca894faaadfd7dea2cdf2af5b417fad4aff2595218de19530d26800bf1e2c044d61561bbfe3a1c0a4bb5ce2215658f00e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5271c28ab29e2196d4f15c2eb8c27bf52
SHA1250d2b4485591f255a011dec579d641727427a15
SHA25602c358d105a849020188b3e77f3b2ab9397b8bc6cd710b59df13be1de984d676
SHA512371eab802d1f10d06b72677cff498d620276a282a1fc0a2ff94474bfaec9bb6668c91c260ef039b6c1dbee471f0863a9b1a7b4f2e71196d04e3e28ec3383bb46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f924c2af021b555c10230394e166ad4
SHA12bc4efe9cf2456cf386f35e6dca39ee370d11059
SHA25620fc33f446ad38bf1d3c854a554aeb8cd083edd9e2abf27c1a11c5969cfe8e2d
SHA512dfe6a789124f2d8bb04df2f094f37f76885fa942a0bc5a7518ba32ec62a6018eff95938bf282f7d792e2973b961625307dd543b03f2501fc3b67731f39aa8f6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567187d76c2a8aefa0975d4fda78799cb
SHA144d0b92a874fb7061c53f5e14afce1b0903f216c
SHA2563bc0816d3dccd9268993f2368a809d1845d89e5a5e1823316776bb3ae7793572
SHA51297c2de050d3469dbbf32c40c1817da4e499a525db91fa73dd472763bc7433bbedb632b191a5fa011eb62d7db424dc8b552ec2ad01bb9ce0ffadb1484e204f11e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b