Analysis
-
max time kernel
119s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-10-2024 08:29
Static task
static1
Behavioral task
behavioral1
Sample
566bb912a6003d4c81a6051d257554ee_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
566bb912a6003d4c81a6051d257554ee_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
566bb912a6003d4c81a6051d257554ee_JaffaCakes118.html
-
Size
4KB
-
MD5
566bb912a6003d4c81a6051d257554ee
-
SHA1
87c9854894b30299f9bbabe7d9aa85a7b5e58a96
-
SHA256
2a9a90766ad6e6659786ef34e600c748b5c1326ac2f559509aa9d161dfa31c29
-
SHA512
1d32b476c60acca77fb031d4bc6404ebaf31f057eaec7b3df08dd28eafa05d52b64d40433a2083ec154a67f5e4218b41377bd6270ba4e585affeca6aed268904
-
SSDEEP
96:lnfuBtDge7W1uSlN73U+oLPLQNS3gO+zHVf:lf6tOVf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435402034" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b9600000000020000000000106600000001000020000000e9813a866bc414bfc58c1d5e39ba0b110ec6d7fd128905f51bb99d58c039e3f1000000000e8000000002000020000000cf8c66e3973686cd14fa50bcc4bab784aeef2149a2fdf3af7fb4c3215e75718620000000529751903b708c77eb860d58ef6e19fb03a7e18ad6b3307d74d29294d7c55ab34000000032fe054e90bba3348f40984a3ae0531b7caea0e3ba0c4f59656cbb9c681d4dfc4555376e99fa3c59a6b033ac56e5e0d71aed474d8e66a02b343628ddaa522539 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90f4e6ef3721db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1430DF01-8D2B-11EF-A5D6-7E6174361434} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2324 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2324 iexplore.exe 2324 iexplore.exe 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2424 2324 iexplore.exe 28 PID 2324 wrote to memory of 2424 2324 iexplore.exe 28 PID 2324 wrote to memory of 2424 2324 iexplore.exe 28 PID 2324 wrote to memory of 2424 2324 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\566bb912a6003d4c81a6051d257554ee_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2324 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bab1842cbc530362cb65cad2e8923dc7
SHA15eceabce6c618a118a763d442720c160b5652582
SHA256a750023747520e816c3f29324575492a78e7ac75662e3e9938329c4d42fde929
SHA5125564b9fab2ad38106a875de3e0052bd955e350b86ce0ef67fadd1267f29f8a065fa9d10e939033bfe382c24f4fecf9f71a114ae46f6c3a943a474b5c0e44388e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5585f27061de0b461497348449f19ee1f
SHA172df201f53add164177886a1f90bb7b27b8f78d5
SHA256c612dc570a9d857387577118c85d57228845a6362c8b4b35c20ffe91c5140e4a
SHA5120f15d4b97cc77cc8bd230a3def4e1b8ef6b6459286fc8e250f06a7411a17667ff7c7fa629d1726d213714acb817db25328a874a121aa77d617ac0f2fbb48d43e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543cdf9bc49d284233c7daed6a61c9119
SHA1fb49ca97506a98dffd03221e0e875a10cb7c3d9d
SHA256d160eb49793e4d474ebf0f12d2c965fe54af8ad1235145c51b7aaca30e0895f4
SHA5126a41e8ff26ff6075105e0e0dfbe0f86ccdd9c75792accbda7b952eb0204248cda7670df6673a694c3ada888ff1e17f9a90f4e335db142448b32c962424e2c2f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57952fa705a8e0f485ff5fbee14ffba9a
SHA142a55f5db5d7aec90c05f3eeefdc9f9c8f3f57b1
SHA2567b9356237c0f80303750faba03732b37bfa134bae92f9071c34418e8bbe09b9f
SHA5127c92b96d034dbe1417b5b9167e8a25dc1de2129f2ffa6e1177209bf9a8d8b575bda579be2725c93a25f7204b8ca3ba55c7b3671d9ab693588aead8168788d22d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fa53d1609c9ea124044b61e80105f0e
SHA151e832ba617cce7dfb37a9b436f6252281eed896
SHA256ac1140adf100f6c1bf9f822ff6249fd96c92a5d5d37154005ca0c14a18ddf833
SHA512c18a0d1481c57daddce7c9fd7d99c6ae48bcb77a421c7e217e22518a048fe4f1bc2b5c09ead07426d0beb17a4ff95a2453b32e6e318cf853ee73ce5d07ba7642
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd22f4bf729419a3b91a985cc14c91a5
SHA165f827c21a9013eab7ec2dd7dc37274b3d3a1392
SHA256f2a4440b50aad6030487616e397577e5e58bc7e4fecbb584194719dd73f74aa8
SHA512e367a5ab95cd518c40078636e2a730409be63ab7aec12da9bf06f08683818dd16a3654b1e6e1e8f77478155da13be6b60a8bed8e74190169b94b8f8931fc6389
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5938dda0b85340291bcd5126e0bf466fb
SHA179561d20d26405dc49de0e52a13a5e69d11107d2
SHA2561a926e51a8f76a321d5565bbbc498c3403e1e2964989ce203511b5d7bf8679f3
SHA51269e96dd73f84f4b51cb4b1cda11f808d7e257a18be3db4cc05e5bda308c8187fd4da07dc3d10d1ebcd84136393e650f4cddd7742b320ed243178971a340eea7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f93de54e45bd83f22c2a97f8c09ce354
SHA17244be5ae267c0392ac177bc8d5cebd52c11ca77
SHA256ac4969214e9de301afdb67bef80c40e10aa29644192810e247afe0af52ae292c
SHA512a713fd3f6e3bdd55739dbfdd952a81f32f9868bd171b0bcf0fa0dc0d5eb60bf95f50c421e1d3a88040aff20fd53c976bbed14d2c0ae9d8129f5166291ca3b98b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7a7cf8d41d6c8078010537ab3ae57c6
SHA115d55c00d7f732ad19516af48da82fca1fdba6a1
SHA2560731d613beedce3621b70518335bdaf41e860bbed07a259245231b3b60ccbe85
SHA5120d68fdec48b69a50ca4b3c41bf74dea25436ce4cc4ad54efff82b823590d5ed4a9f2317aa91c48adf50b1f41dbcb030da0c3e1e4de5ca94da8510ab3d12e964b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0d07a82e83b75ff63b17946e0cab6cc
SHA1fe9f07c48f2582425861b4ba7c1413a2e81c6865
SHA256d968f0379019730c35aef6e0728c6455a3c821da9c52ad768689d7e8cad2f5e8
SHA5125aae5294b13746cfaf4ac8f2b38b2e55418e54d511a4425065b5e2f0ef637869f1a87fcfad4a72c6acb0635d0e1d2d9f0ddefef898920241cb0929eab182efc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcb535b0163845ef57d6d768d28248be
SHA1010bafb74a2765444ffa2de6b03edab495dcb4b0
SHA256d6df136a9e387f1eecfdeabcb9cceef5e307059fc2305df5906f347df4786cb3
SHA5127475b880eba3b224a74a6db3ee1da743d241095d3933ed66ed7c3734f8beb6bb4eb98739ed90b45540ae30e28a63238d124a05cd1bbc6ff001a7a2e4dd09dc69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2c80cf514209f9300f2a61377c24626
SHA1ac5be8032d8443d2d102b58f46cfc81bc2b81a79
SHA256064ac3e43a1ca26005e4b833cfcf6ac2699ddde053edad2b1d805877a88fa88c
SHA512e50a5a2254a494e0d4f3ca3eadc6289fd687ea57eca2cb46a8a5fd9c42f9acb7977c5c6ec35a8c37c4f80d7144a79e8ab30f3edd95267be08c827d95a4d32bf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5290ce269759e3701f23ff0e06eb72309
SHA1e73d70d062324fe67a46b6b536f41c601bacd30c
SHA2568bf48028e916d2c9a8e59c1ee0b28b12740212a46a9aecfe9a2c4034f2d455f3
SHA5125b7c4cbc0ffc9a4a476e41db11c1d0e62383d0443c87938908901f66cae9749292b3fcb564eb2bd33715fc50fabb942b58a1b676e55be999e62a373886559d40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548b134af0b957adf109b2d25ce2c77d5
SHA15547981438155baae00a19f5939427c5dd2df592
SHA256669297155d13df0d3e855c26c015b45507723086c8453614eb66e0034a12f4c1
SHA5123b527658338e76ff67ab9976016d287df6a1c44d0cb23d308b50b3404e694f3ff4d1aa7379a02288456171dd6509898836e279222d5e0e79932f98a5a9f9424b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559695f889f52c28ee3c292358b36e04b
SHA11d1519f7f580b137bf3360804394bd56dd00155f
SHA256abcf0dffa5f8fc4b42358c764f2d7b87d3f3ec382b0a09672664bb18abcb292b
SHA5124574a8cc2208ed8967747d0e566d4ea379885a55e16a1b762950c15c14a6dc8777f7af388801081eba1e1a2dfe43955e516ded519ce55c3e822648577456bf23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f797455c11b3afa9b7e0c1aa9f1d543
SHA1ccf16205439d1e34660f80130554a30ee4d47e9a
SHA2566926c6f02bb6f1ce6a4e30cfdfe18cad088d446906f2dcc9077a30f3ea29de8a
SHA512ab5defa3144fa45ab7d94ae2d293415c069f86794df07f4ef068eed6e60e8bd9858c34f428dc0916e5e35b9ddf70cdc788df5a8f094b4cdca2a806fbaafd97ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d190dee024d0c0939ae74ed2d1cdc36
SHA1f0d13d518c8a2bd1ac14288c9c15763581cf3c79
SHA25604e3e7c13c78c205bbf5242fde96ab433c861d4ba98ac49af7ae0fa900f33ef4
SHA5127a61045ed2c8ef6190585f4e3e9f72e550228e29d291b29beddb1a9a0d72ca8a82969c9bc8293d9310577b6ff3eb55c69983c04f8e560cc174c5f275f9afee89
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b