Analysis
-
max time kernel
69s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-10-2024 07:21
Static task
static1
Behavioral task
behavioral1
Sample
562578437343c4dab5a1b3fe7ba65c3f_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
562578437343c4dab5a1b3fe7ba65c3f_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
562578437343c4dab5a1b3fe7ba65c3f_JaffaCakes118.html
-
Size
26KB
-
MD5
562578437343c4dab5a1b3fe7ba65c3f
-
SHA1
051f3a88b357ae159c83de006006057c314e9e51
-
SHA256
da33f5f4a666bbbf2fec3fd88162bd372385e82367fb1dd2ddc0177d008fde9f
-
SHA512
59650ce4df4af689a601c3f2249da3af5abe233def7542f29c86897eca57fe003f46f2be6880c081c55c00eb54eff73959d0f32bbbc6451986878eb14c82c76b
-
SSDEEP
768:Su3tCs5tDenkEiCdM8xS3nB76Q0au2kYv2eYr3cz:Su3t/5tDenFiCdM8xS3nB76Q0auHYv2W
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90f606732e21db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b131900000000020000000000106600000001000020000000fff7321d99f58eabce4d405f3c0683780d5c92dadaa25c9319472dce5bc6974f000000000e800000000200002000000029d636e1a265405432af726700f35572f425842dd31e389925edc2565120552f200000004c4da70c4c28bc1a08d857d604e2bd694b29d057c64df95b301776d208ff8b624000000056b34f07194ca65b0217130ee7487fb8b5b5a01f3c017806739d73d60c0f72895b1f05be3b8bfead3eee0f97282b151ab1cfd2d8ea2de21607ce040f5464084b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435397963" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9A4D11D1-8D21-11EF-8121-F6D98E36DBEF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2344 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2344 iexplore.exe 2344 iexplore.exe 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2176 2344 iexplore.exe 29 PID 2344 wrote to memory of 2176 2344 iexplore.exe 29 PID 2344 wrote to memory of 2176 2344 iexplore.exe 29 PID 2344 wrote to memory of 2176 2344 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\562578437343c4dab5a1b3fe7ba65c3f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2344 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4a0b5c9a9f7af6c0e65ac60bca6b21e
SHA1e71f15c6a02b712c88f8b536acbd7994dc8acd1d
SHA256fa441b159c90578c1264405dd7e22787084c607b051c233fc06c856fe07471ec
SHA51297150dab0e72b38a97d4c1d6d5a4d77d45779c69f4a300bcca2c2d7dc34778fc3b3a5dc262e2fb843db6de91bceac32bb1b255dd33225d56f253df8c65b5085e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e1d9bc1003df4d37b66277f1517a5e0
SHA1db6f454a05cfed2f4b90e5ae9bf2bbc90874f445
SHA256d1f95456a2ca422787fe6665a7d0019bd212926ced3ac658d195c6101312cb8e
SHA512064a8994a80918115b329ed378554fa12a1b0a4e16257aeae187c7e5021ef9708b787e7215bdf796184365980713127afa37820ba7aefa28ccf84b22cfc28b5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5889d6364443d4549714244b009ff9bcd
SHA1adcdaa84734357fa62452bfa9d881e4b561403dc
SHA25691066bafe4754f7b79f5751dd3b34d46ede1da4313a4904a4732f17a16432249
SHA5126e22730e82e67bdb9c49147d2ac39769d44687b84945d095d64464f589c7df207247860893dc062eb162be7f6745be146a45e785ade23fc658f78bb78573e871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54039d9a0a867fff991219ad73b56a42a
SHA15f2208eb644d39f55100183ac17b8beafe992f85
SHA256810077afcec4fa02854bc45afef38cc58dfc30e80458c9753e29dbe0f6136438
SHA51201e5aa50b1f32ce33cf8d3b0ce70623af44ff580aeaa816d4667bbea9e3ef73a97e9e9a2149b4fcf684703a2b57df6074de5cda09c7c34f937cb0606587f26fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d57a4e0dd8c0b9cb83bdeffa317ed609
SHA114dfcaadad2dc42c6e57cfaf4db3517e4b42bc47
SHA25617d0f925294da54457d0304510e8e31d127f475b1af136e4f5fe6f78f5f5c16a
SHA5126f8293cc436f5d8411c7bae09332d22f43b94425e55a3a52e9e081f8bd22109c8f18d4b5920a53835fd0b33eeedbd51a81e1b403bdac2b7a3ab1eb8ab5d9dddd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad9e2e745a4720fbe1e2cdd41a0d951d
SHA154ede4027f71f8b02f6aba9a6779b0275bd9649a
SHA2560a07d6f273f3dd4bfaf3bcc9608680b7725571a55ae59d66f52890545d0e8fbd
SHA512580d874d9c711beb9a59e8b60c73bbfca598811532938a5c37a53763d9f30e5b7ab009331eb1d4587da80e5605f5e9682f7b95c6a1e1e61a6b64001a5c48f8ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc0f5e5a29758ce449ce5de133000a85
SHA1f414d8871b08911718f243cea8a0fe1df32e9193
SHA25610c9c378fdf8cf3e9d0511800ee5bf81303429115211531bfa6e744abe6abb32
SHA512fd6fc127118a250063b36791940c5ab5862b207c186cae094184a9a244c5cd21a1f0cd13c9655c8a8953db562db10e03a87566e43690f277ce09641bbad1a95f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd9bb5b10c5ec5f657ee7c2e76a21adb
SHA1a2532c2926926102465c6f484feea59b3cf2aea6
SHA256db147286fee4a99689ff389bc6610c46c357ab2f6d3406e52a4c08d73963049d
SHA512870aefeed90be3115540fef16dcf1e0b374c740e32835340b826b5f614a06cac0fe0c01a19c10a794a7e8f562387c4a03888eea0f6f6091a9c5d2c04402491a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff4a28d977ad540ef8259f7b136d38ce
SHA1da7f76dea5fc06a5b9bb23a5f693e8375f28c415
SHA256cb4375b1153a679845326f44cbc6984c31b2439adac766a151e5a818511b51df
SHA512920677881f6918068cc8bb5d62430f013bca64f2f04930deac000fe034ca49f12311ad1b110b70ee65802da25e90b4d10188032c3477fd4943246773933f1bba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58123c18513f7e27c83c54eccd344c47f
SHA171e14eb820f5f413a5ed532c94244f813950e8f4
SHA256bd959a1d10739df4a26c3b11673d3b1dad2f9d55b61a5fb7d5adf5b715c8993e
SHA512c91fa19203f19b90daf9a43e47a73cb7ce29b53b830440502b8052f1b54ab1d0430b297e56e4c2ddb0079a5b4dd3b3dbd6098f593a4c07e133c01c234319c79c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5781fb3d722bec0805818ca252edc5dad
SHA1d7c8b9b8089d536acaa3d92f45d9a411b2e2642b
SHA2568c150b0a5e226bdcf7594b0b10d3a78be1ac367d7309bb79114dc606e6ebc0b2
SHA5122135111b07fa1e286456d0d6c382d7989350c24da7d9668e3ba516cb8ec35a33166dc69cdbc4eaac3001b8afe14d8188376897edca613b4a76e0443376d3d109
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c0ff48c3594c9edd304a1b7fa5139f9
SHA11f76e815ea612c5b7c36405b494b7f95b16be64f
SHA256146a69cac3d04b55d5899b081bb820623429695f33d35a53271a90a2d2b4c0a8
SHA512a75528e87f0202b18905960edc551a49c64605d683e268c1eac85311cf0417885707ce68d68c5870c1d7171c2d1727e32064c666e842f317a696b7e655b40530
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5342a793c2f7bd9feeda6c077e9868549
SHA109b95da3d265ec2aba404eea442c651a269cea9c
SHA25675dbb174aa6dae6005f62d8d2d407945fafa9396e61da6233d89c0c19d6e722a
SHA512b8739526f4b158c75c2b5ae52fc4d4cbc8e4d5cdb1eab70db97b5bee833d3aa05d5aed26571e48390cd44dd1a49c4891b21cb0a3f90082bdae4b4a1c854cd08d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578e3746bd2bb9b7b421a96ffd93e562b
SHA1f9f1e580407dcdc8fb37796d589cf6eb6918106d
SHA256a84317f71cba6ba8ff81a84c618e120a2ad34292066b2d6d302f91f6fa3d5dbc
SHA512233345e73085c3e891f751dfcd9bda07842312a28167b842cc2f0eabfdd67f7723487acc1b333c062d9e705f4dbc7891fded12cb83868f6946e2c5af8dd6e80c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575952236f946adac6aa449fe2eb80c0d
SHA1d586e8ab4737b19c79732a022abf017628fa9932
SHA256e656f7c05d71ad9bd964733360848ac2bb7793228fc618f2c6f4a2248137972e
SHA512c5e40fd1f66d4a3316c0681e960853b9666b5dc42fcc9f27b23f6d4252f91e7256d046dbfabe45f486e47713fa8c9d33483a91c18df68c537947a3cba4e339fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5303bfd3c5ea2ec6527747953b83d3968
SHA13a0fe2e0e0ddebda4f07cf029891eef5a452aa7a
SHA2566123f4c0b0c3c7d08259c2a3cf8e2fa5615e56f296bab5a927017430e223e773
SHA5121c61e4dbce8ece05a2bffecc188aba5aaaf21e88f0c1ebb91ad188b72f215f4f28d6a357caab20cd9cbfa79c45638eb18294f9bef0b91e7fbc80f683fd533ce9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfa94a6f9fa597ec190f75610059200c
SHA13315edc474a908a5b625673b5d9d80a663fa5b09
SHA2563b4fbf1908bcf09c17cc8c44ab4d52178ef86ee6394558ef3e8a22ec881a663b
SHA512e9b10dd9fb7a9057984b251d69e84baf92f401ef0df141b07339339ffc47a58baaefd8e04f7fbfdbcae8f4bf2ed3fb54133c9dffb353abfdddfcbaae3192fd46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5572cb21e160a12ca7c04a34e3290c192
SHA17b25bc7df56c346719b07e3c3c1c5ef27c437d76
SHA25644e8021c9a56060500cebf89756a0a1a4fd75c1dc3278f20fe083756aedb966f
SHA51295892ad27e6045ab43041c0b59f95111fd5f558ca82897364a4c55211ffca973ede1d6b6ea9491b9f6481dd45aa3bb2471bdeb92975faab4e3d2cfc9951995df
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b