Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-10-2024 09:33
Static task
static1
Behavioral task
behavioral1
Sample
56b033b26b6830f5994e30f63143328c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
56b033b26b6830f5994e30f63143328c_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
56b033b26b6830f5994e30f63143328c_JaffaCakes118.html
-
Size
33KB
-
MD5
56b033b26b6830f5994e30f63143328c
-
SHA1
bb6d7f6f7e3933d1139089d5435f6e372d4ea46c
-
SHA256
b97f55bcdf37f81a4a0803554ca0e59221c3a87d485b1a373e8e8744596d298c
-
SHA512
1c746bf5ebd1aaef4c3553594aff5b9302aad4caff177734e93add6fafa0189be728e1c79995e92a854399653170ad30769e247e0296e01e74b514d339a5a640
-
SSDEEP
384:dfG/wTLidsLfQEMG+3Lz7HLTuVjtmfGskk85bKIKWbFaYMP/8EXn5EMLVzIDzpe:U/wTLidsLfQEMG+3jtkk85bBdqSpe
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000008da089000f705010074853e61672830247ad7df44c5903cddbdb941607f8989c000000000e800000000200002000000080e5120de8d615a5b25e6e2db8140aa9634bd071f0354d2f470a8fa48083981f200000000e680314b6c0ae6f107cac72a405fa45d796eb6b0ac4510560de7c911350c85e400000005b407717f083bcc2d13a584f5d0ac8ce12140282c00887b3d2abdeeed36aa948e3a3b02deb772147b2cb7166abea28b5285dedbfc08f351cc19f8b66d7bc9733 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{01623D71-8D34-11EF-A1E2-7E918DD97D05} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435405864" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 401cfdd54021db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2644 iexplore.exe 2644 iexplore.exe 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2736 2644 iexplore.exe 30 PID 2644 wrote to memory of 2736 2644 iexplore.exe 30 PID 2644 wrote to memory of 2736 2644 iexplore.exe 30 PID 2644 wrote to memory of 2736 2644 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\56b033b26b6830f5994e30f63143328c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2644 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5038d3dfeb491b4ed68b77d36ad0811a8
SHA1fee7d1ac57c63700d09894ed9199b849f20e4e01
SHA256dd91f312e863beca2bb3d8add50b168968878f8e7abce85cfb12d73d037a5f7f
SHA512c31beeb12b78ccf54d75bdcd674422d444d935ffff1b1097747bd166321c190e35c46f59e77adf28556432207c882fb858f5113e70756b994edcb2e2e55aaeb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ae4b5f88a2318cb0ccc6d6bd23272ba
SHA109dfe69874cb2f4172857b12dd5633d56b8deaca
SHA2569c33c92af6f92d58959fa1317fc90a5a77a4766cfaba2d69af196dcea0f08c60
SHA51289f084c4dc825a688060906b62e3f22df6b028899ededea3977de194b69faecd61b8255aa630b6f61dae030c54392cebab81edbda1f33fc9e6bbebb988f89e1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6599a83a8497895eb82b68e63447300
SHA1b0b8ecbdaf0bf4c3c1b2eabf5c0ed19fb0709978
SHA2564987a12b8279abaacc30bf0a1c390be4a75f31e25b3f5c98902074bdb342df44
SHA512baca05e23b2a5a1be1b4e03961759cd942c4dcda7d8e392eed149b2923801ef6f2c207a1f65c0fddb874e16ecab5bd8e96677cb6c3a5aae9b577908c9abe1a98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab89b188d48117261e4aac68359d2092
SHA14232361875cb726f7e1cfea10fd7dc6924de2d2c
SHA2562764e7dcb8dc6c761fd1cd2a37e79264ca2dcbabdd275683a03d1403100ee5df
SHA512cbd223376ce4d5784a66da06671a2cf6817890b912a4c6961be02ac37daaee4927616c1721cf39e51d767e420c75a7f82ab6178dba3b46bb2fdd6843ba384ff6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590ee57ff1cb248704e0d09506f403a7d
SHA1b64f402d7c0421caf349c32c7a83cc2c870482c1
SHA256b46e6264209b49f181cc3ff31cb201656cf95ec1042500d921d87e5a5fe7a8a1
SHA512f2bd35bc7ba95567377b5f46eb4e7d24c4a47852f182252846f7efb4206093c1e0a90d069138c07e734200d0f02d155329b45791f5a17db7685bc044f5faa0f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5accc6ec47b83a4a59111ee01579fe77d
SHA1640ce1327d58687de60c9e73e4428f0a155d8830
SHA25627ce645d2efaa77077d3d37ecb0fa43775b06e29277f2513c79d9f9a7581bbae
SHA512456514d033ad4c3a5d8e102dbeb7b502c60253137a85fddcac492b719c8b454333c7664a07dff445e9d33bbb6d7cf4bf2f812dca40b86f43211169c951058dac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52767b9cd520dcffffb2b608513c4dced
SHA144f5025ae4214324410ca3b79dc5bbe1286f6fef
SHA256c101831f653c087f137ef86cc5d4b7865fdf1ed8952102dad008ebb1d09945f6
SHA512daced65d7edde89a6b98ca1d8f44899c58880df6fab6b50a9668db46b0c1830b5fd2b1aaa8e65e22f26d7594fa1a9ffe50505137285963e654ce3a61bc81136d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5263d18b4dcf606e53031c60afcb30616
SHA1e8f07ea9683e36add7950d09af9248feaaeca881
SHA256a5aaafcc68bdb1f798b0529d648f5bb1b9f526f8bd926d90724f8485e10979da
SHA51220ce0e43e31dfcb84d7e32078321c3aeb910a15ca109db3954777834e843ef6511be62f025d1a06b4c953efb033b0ea2ea6a84a27a03e00c7cfdc1653cbb4785
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b7260ec5613795a12730bd3afccf520
SHA1610e3b892ab2cc8c5104f8848f066658af21e91a
SHA2563309bad026ed71a79188aaea7ba242343e5635881c1082a0aeaa76cb66fb20c4
SHA5128aa0367258392c260675236d0392e073673783aea7268e7ff07719ba91aae5b27dbba8fe1fab4b9709a5495fad134e5d864a05d6e2c011c85effe3b4d146b458
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53649716d09aa5e05468ad0edb6b7cb6b
SHA1881004fb4880011ff67cc3148091a6199e242583
SHA25687ca6e54451e1ebf7bcb601f7ff80c5ab485b94a699d11d23b1cc75eadd91f47
SHA512c2181a1b631729fd0f188b6a95e8e144176a11ac1f5b065e3a6bd74709138bbd7f824269fe40f2ca69925c2eab1062ee45bcfd708bb6de9afedc276a33236862
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5678fec0943118d2a0f2b91872a0e7e3b
SHA104e58cb19bd118c7b39d2f46df72296a6dc9a82c
SHA25622020e5c273dd3f77fad891a76df03b8fbaed357ccc9ea8ab79ec8ee18899eca
SHA51245b9e42052a7dbe60920074c6dda2075ae1a61ffea1540457c161d818aabc1058906e66d195b8c903d2eb68428b346d9128ca0690f29274caa5ae4b3c6088c8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5329a7cb2374f11d2cca37a63300e08ed
SHA1175e758a9ac14faaa85ab8540728e88fd8afbe41
SHA25655d4f36636212e1c270f00493af004c72fa3db4d76df4b00942064e88dd67956
SHA51205b76dda608a2d5aa5acb5e51ffd52e8f6014cbf91f44b5d17157bf2e758ae620c027341140adef1c2d30410b60ef9baee909dd7b536092ea6752acd551d2bfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5207e978b86d741ec4c22862985abde35
SHA1d9e6e5be2870fa667b503e93f168a9820619c316
SHA2567f2995653c21bd1a232da84509cf784a5163d282b795393edb2c5d54fb3d6b4d
SHA51209218db0ffa4b698ff7a4e1a61030423a370515aa240ac164690e14883d1be3f430b9ec81cb003a9619352af80945558af376a180ebf6e158b51fd56ffe59b1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574dbf1547a80cdde3c9f5bda92064626
SHA1db727f6722f4aacade3a67a9e6a303698a616cfa
SHA2568964dbe3bc01be093611b59156a7718f3163afb81e6a8248a2368a2d9dec62fb
SHA5123994ced93c66d9c0e0fa7323f9773c95e12b686b5c6a531e3bf879cc2339cb9ca082111c36347ee3e3a3ec781d7bf02e0e9853479cf336c6f39011439fc51177
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a44034310d2e52bc48a20c62a1ec757
SHA1defb99b56630839e2b24dae10eaa3f9752973f43
SHA25642026f836eded7b22261a56694e44e0a61e5c3952e7a058a4ca20fb9adeca144
SHA5129eabd438b210e5e789fd0f9230acde9e5a619c6e6a933bbc0821039ae5cf13b7621e9da76f91e559fe72bae0376819e7a2b501f7dec32b2b32f4c6a5c91e22f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3801b8ab2016a5839b9c9b86b739431
SHA14cb034484428d9d4bc183ca57a224cdc9d965cd5
SHA256ecc9bd7a945f7dbdf0dadee643e78335b95b1549ea6999c8a972aeab9f1b2805
SHA512b05fc84f4c40479105dfce5acbf47360356a780049f52047ce9e79efcc70edba3e3779c7270a00e06071634cce02418528dc7f34b74eba8ca14ea8f221dbe8a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b79f44d0283119e9cd43c8d03d6b037
SHA10b9033def264b5ab4894abcd81e5084dfb9b91fd
SHA2563bc6cff8f5100c2a9eda2a682568f6c3606585e9ae2c5e0430a83a0d3ccab8f6
SHA512694ed4241df2842ccda9e5f41a1b7b72cc32ae86d8859a17404f6730a9262a0dd675522347178bd5f7365fae09e558b4b2cc2b20f9ea5c7c3a462922806e6f9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596dafdb45744224170a824367a5751be
SHA18deb22f1112b169ad84411c07fda9c455d8238f2
SHA25600599da17e7d3d1d4803d27874377f4844a7f355de773c6359da694c0f6bf13f
SHA512b6dbde8ad5a5783a20d61f899de7f24ba1a8969765966a31e2e183f409c2e63cc763b3e2e4190b3bf5f55e73b14cdd7b4f5fd6fbc9c16a95e977f734e4c7dafb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e35eaf40d6ce0429bd5ce135908b7f16
SHA1d8ecfd75b86f3e136460f3704881fb6259ff9631
SHA25668cc2eda856389f64a95bffb47760b87182d256a31d300424670c46f81b9cb6b
SHA5122c648409c473906c102c247686ec95b68d490f40c42a753006fcea64b2cb87a7e7a3b0521bdc3466f3d081771f62d67d02da957bbb709357d602cf5534f3cbe8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b