Analysis
-
max time kernel
138s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-10-2024 08:04
Static task
static1
Behavioral task
behavioral1
Sample
5652756ac98d92f608575694a88291e4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5652756ac98d92f608575694a88291e4_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
5652756ac98d92f608575694a88291e4_JaffaCakes118.html
-
Size
10KB
-
MD5
5652756ac98d92f608575694a88291e4
-
SHA1
96c477e7f7a673a4afcc30d402fc4b08d458f18a
-
SHA256
abb0f4f0001e89d2b0d526e473a2463d0b1088caacfa956ff43400ff12e9e92a
-
SHA512
e47eefe355b00671f71ef78b851b53aeb7d93c97dbf4e4c9bc12009132027dddfd2cc7db147a9ec75aa47ea9c84948e6ed903e608b801e1eba757743cb5201f8
-
SSDEEP
192:2VUlIsr03Bi8k/w1wvqLkZOBm9nUv+EXg01/6uBuLbdU8d:sUlIcuBq/guOBm9nUv+EXg0/6guLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000008f30377fd3e27c824ed823413fb9c9a3b7caa317390289ebca31b7787624196f000000000e800000000200002000000018f58258bb93d4c75da5b4f802fc8a3c77327a945eecbfd45feff757ed9bc13420000000e260967f99cb2188922c7ca7f0b1e176ccba6c104d95ba25b1e415b9f8f6e3894000000018e8bcd25e127c42d1d859ece9e3f53acd741ebbe0db79005744f0e00f9344975151a52f75243c00ca4a1d52aa1f9cc354fbb9e48429cc4c0f66f7cfc192b648 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AAF48801-8D27-11EF-AAF2-E67A421F41DB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435400565" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70fcc3bf3421db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2540 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2540 iexplore.exe 2540 iexplore.exe 1764 IEXPLORE.EXE 1764 IEXPLORE.EXE 1764 IEXPLORE.EXE 1764 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2540 wrote to memory of 1764 2540 iexplore.exe 30 PID 2540 wrote to memory of 1764 2540 iexplore.exe 30 PID 2540 wrote to memory of 1764 2540 iexplore.exe 30 PID 2540 wrote to memory of 1764 2540 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5652756ac98d92f608575694a88291e4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2540 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4fa09ba5777a3a89796f73c23865b58
SHA1bd6993a6f821e44b63767dfd583a8f7df3f367bd
SHA25666eea2c66a1a762a805ad96b4b222c84fc20693bacd348a3ebbbf6729a848662
SHA512ada5c5301df233508dcd0239b327a5e34778673679c8b98434664da19efaa92f3fb0e6ab2df6227cf0777e5142d6278ae463529b9fcc5ad4c3da6ea577b265ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5447c5d5e67c9579d475e96beedd7e559
SHA101960ada533a900b56ef708bb6da3030f34b084d
SHA256a21ef1bfb2544910d55c6f0b6e6af2c1c1111043f9c7e379a1d5e27fdda4f04a
SHA5126bf4ded539d9306d88dc0da23e71cb0fb6a1bc48f257b2ed65e7ff36327a07ac01f43765165bb18224217f5defbe44daa7c3eea523efe8416dcc1e9aeaea5e83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a01efbbf70bb091a89ee89fbbba29773
SHA1c3bbd2a0862b0b8b02f2ee122012a22a2d1ec22d
SHA2561bc756844ed5b081e177311946611af5c35f4097a3f07b1fa9f819effbc9920a
SHA51210dfad1dff335f43535ed908dadbe7515b885630407dba54f5cfb3e40214b7ab8fcffcf7c8f692e5cf8a570a1545137d853d40c7a7a4c7d0a387dce6debc69dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505a15f9e125cbf8904bb8b2b930db6a9
SHA1efd2aa5f84221ab36fb7229eaab7399b84bc7ae5
SHA256702e93cc26f71b702bb4693160f67d3423d8fb8151cea0e1b0519fbf30d962d8
SHA512fa6b13d1b1481787efe14022eee2e8800e98d5cfd6d478055bb12df3bf1141087ee3dfbb971f1bdaf350dd4114c21668a403c1b5579e5d204a4baa178aa542f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5567120181b215caa2b2202fd53473bcd
SHA1866517809d0fef9c8651d259dd627d751839eec0
SHA2564a328779bff4acd5207e67c0cdbb4ce99872a05bd13c1967c1e7645d7111b4a8
SHA5121ebebb742e7e70117ad097d0bff566286cafb11d1e8ca7d093b2747ca4964cd6823d1db4ad72313ede59a864a49fb2cd9b529c15457ec7eacb1662dc68cd5623
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b7e527fcda55ca904cdb7f8a85c551d
SHA11c1d8ba2c1ca9b99767785fbb074066db134dbc9
SHA256f5d3a6ca2b4a93ed452c39991c7a6b374f5d3451ead994ee350453f44e1ab1af
SHA5125963fdd051c5fd6be7ca9cd198416ead1f9b2f60faa9869f5cacd57c79248aac52bdc8d60cc3de189d5cc523f95562a4086456d99c9b56ccdf606430ae75c4f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570b292fb870eb1395ee18c918ce5fe11
SHA1c743cc64d63d57b542c851176b8c739f967099d7
SHA2566d1d071565341da4f6ae823deba5f12f8d612707858d3e622819fac44478e189
SHA512c9ec64dfeabc0ea40fa9a8819cf432ec95c20d477c497a4131f95dcebcefbaf32b7123d66fdc645a33c5e84b67ce956290c7fac8fa4c240b0ec2839af73c4cd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500eb4d1f0973e862d468221493de7fed
SHA194f18e2bff67551cf9c039df8f8eec72c40da5aa
SHA25677716eabce35beb08b16ba85e38e617f6caf88cfb08ab69a3259bb08a1f5aaee
SHA51204856bae155891ca19757e2115a1d41bb1d5912b02f5fe71b523286c6de962b372acd7a4b748fbfad58a6452730e9de63fa0e9f9b61162d7110fc330e2e4182d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53620d24205a4b596b14b329e771df6a8
SHA1d1fe39d9e4445ca82220a160bba9abfc261d4f69
SHA256842675af2a131ba85e17795d78c4851bdbb18ca55ab257b72200425e563d34bb
SHA512261a33a5553021bf99f763bb6f4cef78086f76955401c9607f1dd896fe6d5f5989b9ab76dd91ce2c7c176544ee0205c6e0b6cacaf99ffc47b67d66383087af02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ed89a15ddf68fc7b136c5c417f2f2c3
SHA132e5c2a8739e1edcbedfd82e18a70e326bc396c7
SHA256f24f9580e53d096038890bcf35d4cdeb0dff6fe10ef3f2f5a196518e3e260241
SHA51268da19bd6814c76a9b3704260cd8ad3dc32a7de46dca259d873c64a8b5f9e6ff5a72e3bc5ad1efd0ad4cb96e380427920356086b1acab4d668ee17f1c0de36f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c248d753224a96a24ed1c764eab478d
SHA18ad90947a5a0ea747ba3da04269668c615613d81
SHA256bc23a755962b3d08d6d197e8a63aa6db1a1d8bf60c13b8a9ac486e4c8121e2de
SHA512a59833913f99b5fea86b7cd4d143f764057b7a8f80c3fbab37c5eb015e0b63f20031a7dd8be6f545ff8318140fa9b2f263f354572b93226d8580fef83d8cafa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5489900c98c7949396be52c6c9509f4f1
SHA15bb7f54700c3b7a71f9fbcec0240125964400a9f
SHA2565cd09d63f49632c5805f35bd00f4f0ea8b1fcd5276e2716df13ca52d48aad21b
SHA51296135ce7997f24acbfe39b035ece2aff9d55cf2d27b255319979a5cc717345770a263f1116bee33c2050dc74f70d4763e01619f8f7e5a584297513e33f7eeeb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4570b1cef4cfce0b9e5236329148d20
SHA125aca8616eb145cffefa7e6011179562337fce19
SHA2567b09ad0678a2b28ab9ea66ceb16916b0b9c6ae242108e19adabdcbae44c2307a
SHA512a5b3b800504ae5b53880d08af2f2a4db18e69872c83a8cc2a1a1dd656adffc44da18cffdad7d65f6d111e2c59e4de5c61b83813ef126417f5127e4a1dc18951b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f375e3575e8f1cdacd7b02abd92d8801
SHA16ad42c06e4dcebc187574a8a31c83484692f3dfa
SHA2569f00c18032e6c1ed81330937c9f9d4d072ae577893dbcd0af57a3bc6d650a15f
SHA512d8e036297be97d39e35cc1c939bd8e717fc29e0663bd214808c97bd441f94d4009f52db4f758b139bfeb1854fe615d85811f7ec7704be99183af0ca6722848fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515fcea4a2871d9f6e41d530e7a824523
SHA1d0841a44771151b42d3dc8f812d02474f5774b4d
SHA25620e3a2f56610f585811c133ab352486012797fbedd94b22977f0d8bb489cc0d3
SHA51284b0fe391ddc7dd3cb67867c85e9ad6bed1b2913b9f69a8624e39df6bf3c5a0b0819112ed2a7c754eaca090f8091e675f95bd9fe57e8000b1705cfe7f482215f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56695eb58bce803a0e3349eec17ece902
SHA1d4d6416c971d719ccdffc52d340fc127e12a9dc9
SHA2564c8ada59386e74c02b5afffff099f5361d011eecc5da09b84373d5bc72683167
SHA51285a60578826ff3dc19cfa88e55ae57d1c683e6fac8ee2039586e60980cb66fd173eb66973568aba89bf427d5055db9baca4a1f0fe7b4e3c68b5cfcd21f4f192f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558e9952b3b4db2c9e2ac8c54fa3e1eb7
SHA17f726f3c1c00a728fdf97cea216ce26d8c27cd3a
SHA2562fd3e2e5b21f84259ba5de111639d33a29fe08a8350587deff81e9c228cb0dbd
SHA512f1a77d633d1341d64d1a16db4fe33c667f926c319ec4a56dce092ca2175e702b848f6c53ee8f068cd89a514df88004e911b7e0fe120b97c87b26c560a7195a33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b44a8bd6d73cbc8c671b7fa48e7578bd
SHA18291c9ccac77bafb5c245969ddc0d790422ed6ed
SHA2565b012c63e7dbe5d5f1403e35181ea056a28452a93989b2bd1face55223d04bdc
SHA5125b88b4139db957ceed87150431ffa01719721548ba7b7e2dda3f7fdb43270423660a26a0fe53e22a6d6d4509cb9fbe373e51d5b218d1ba2bf0b8068ee64477ad
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b