Analysis
-
max time kernel
137s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
31-10-2024 08:10
Static task
static1
Behavioral task
behavioral1
Sample
826b4fc07df722a0a801aec33f09c303_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
826b4fc07df722a0a801aec33f09c303_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
826b4fc07df722a0a801aec33f09c303_JaffaCakes118.html
-
Size
26KB
-
MD5
826b4fc07df722a0a801aec33f09c303
-
SHA1
461bc21687799c125a033dca86cb24a6cd79d27e
-
SHA256
ac4f309438548cc4a02d6ac773383a3837ee1c1af53a541521c93673d262c5ec
-
SHA512
5a380dd0f2035ba96a67b8c816e93a4619e6b95a981eb60fac246714cdbfc2ac964c69d42b5f6ef5f49fbd782d9d5dc2409b527baf17e26ed64a0caf8f9ec88a
-
SSDEEP
384:4+QfPFd9QZBC7mOdMI6BKfpC5IgSnbmFe7AcmH6NqkJvAgo0i3A0Pd:Zcd9QZBC7mOdMInpC5I9nC4DIP0i3PPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6041CE51-9761-11EF-AB0A-FE373C151053} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0cdf5356e2bdb01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b9600000000020000000000106600000001000020000000892ebabfa974b251fa82c058e57a9acb702f80528badf5c4d33007ccffd429d4000000000e80000000020000200000003180e8c300725a1ebf85ffeee5b6f3c0154b6a69cda7cae526351531dcc65553200000002ba80e0c70adf08e7bd5aa6936d957c90223ba46d3d6304712044e3e7682bbd8400000001b4c9cffcbf2c1076def7e1f47496156a34610cc4f2747095a67a95c840dd6bc7a4d83517921519cd155afdb4b60dde32c1394f558e7c0e828832bba6a77012a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "436524863" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2552 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2552 iexplore.exe 2552 iexplore.exe 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2836 2552 iexplore.exe 30 PID 2552 wrote to memory of 2836 2552 iexplore.exe 30 PID 2552 wrote to memory of 2836 2552 iexplore.exe 30 PID 2552 wrote to memory of 2836 2552 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\826b4fc07df722a0a801aec33f09c303_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2552 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5feb951047fc8f8a293e100497732dd42
SHA18353df37e63cdf1ab1221ae36bceeae8d4096357
SHA2567c2bae1de8d5819efe91f4069b53245125599663d9de2f18d7d17d01941fadec
SHA5128378b6a647c1ddf429a1e860d968c844a0363a8e8b64358bb72f39304b96a887577a04d6fe4eca752304b0a35ef46cbccac3adc16559f05839e953948429ee9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f14b9356050209654d09b6e45f8d8abe
SHA16a898968347a7a3dcec1f7e1451618cb943f7651
SHA256a7f8e26cfcb1797cade54f34671d5d3a8569a80c9a726940f1a876e38e8037a5
SHA512e98764fb0480fdff52a41ddc9562849c2f43c10410ac1c815bdd9aa428e187d7806190b73acfd236e9b35f1a9993f6c84b9f0630f25f8eec36d51974017620bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5157103b5a92d719c87b604d3ab2c8585
SHA1b50a1f61bfe5ae05f33fe1c5cbb950d118fc94f3
SHA2564bcf95b92eb777766404d965f88a4dbde07913912e9a9302f5a232a259f3d39b
SHA51221c804c7e91859544737ca1d930f6469f115577ea3fdbc080634529236270694233e03eaaa2a1a59d6d6f31fc706fcc94cab55ddf9e82d2dbb63ebeb13b39efd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e01a7bfca2138e67bd0a876e68f3750
SHA15414e79b729f1e92989a29d6d5ceb67a53994296
SHA2565e67ea9d62927aa60148de5930cc913042463596f66be2d134a46d4c6c381ba5
SHA5124a1f8caadbd5296f96f4a722f13eca559c4e74c9e20d0cdf1a915ef4672e29d1af9da88454a147a7d760985caef96e966f58980af3314f90730b91db98e92fee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5435cf75626d113297185c8b80107ab8a
SHA1919fd683ad4ff3c1001fcd99a6c145549852939d
SHA25601c2de802dd4eba90cb765d67112a300996411d62a79b6953eec9497b8966722
SHA512086d7ec2ce757aabd0026e50ea2c2873ff5f7fc46683a6ec6869eb1e460d54306fa7f0cc1d4d8df8e093bca8ffbc7522017f9cd0c3c3fa99e30bd177c21f1297
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee98a63bad9f31a3cbf1fbdb43ca47db
SHA1f40084653bb9eea3fcf8e0de1b78a98438d92472
SHA25622259f27d6496a3ea19dbe6474dc944c41b1a6ae4e8f4ea42b8ae8e75b7b7d40
SHA512368c1b1ac5c976007e574eb67e54871cee836c7a2383966af9034e9d1f84cfa9dd84eb5f5e6faae3c73a6f5bcb0f5f3e6b67abf1e8ec9f126447f1a853ca7342
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6f0d2ae34f8de20cccc66904a169c4c
SHA1f0218c62a82e9aae9c2b3dcb7bcd8df7807d61d2
SHA2569ef33fab1a3aee4ca44c9a5016569b5b4a8928e1aaaf836fd8f04108c81d6bc5
SHA512fa6fc934a7d074fa6dbceb1190ac030923f66b08eb1f6fc3501330cd3def9539a28e44bdc72596163c8440c3333259e3eaa5330e7015cda24fb928e541917fb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f13ca54be0abde76b72febe35c0d64d
SHA1cedc691e063160c413366ecf5ea7c630a0b684da
SHA256d3ad8ee3ffb9ea5ba87872779f981130dcfd42a0d5cc2ebf7819d504d45d1442
SHA5129be3d1841db9c4a4739d810e12a83eb2c3f4ecee92b4f626b44d9ed0649a79fd2d43a72d1eb2418f4cb167f188861026f55e1c31becf440cb2f4384f0cb0278f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d7798a0be056d2d8220a6a889792393
SHA17df7a8cb41b8e2a44f4c63c128f1f579ff0e74ad
SHA2563e033373a2a41beba9eef13ee7e68b57317915a8f55fcd74f0571a2d966a9d73
SHA512d4be8c05f2f6c7d7a15f856af07398886723bd428d6bcaa3fe1baa0ebd533b531c28555d756fb86de495fa918288af768fe06f3b7c993216c661dcb0e6564c13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549b81b92a92b7bf4e9bad426688d6eaf
SHA1f84fbb94c122eb9c2a71c9861fde9dbdfb5442bc
SHA256629f62bf347a9f54a691eb53bff05f8cb3bac245983166b94f1e8640dc7990de
SHA5120527439c58969573d03d628b92d61bece5d34ad926f6ebae96618c735d055b0974b54eafed1a9dcfdfbdc276a29ac7d281d0f47fcc013e7f33fd8170ef4d694a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52318c0e22275c2674e22c69d06e38691
SHA13f73fd933237bfa7699386e26e33fae09bb226b0
SHA2567893a6997275400cadbaf492cff17f54f12f0ba349dbc65ef26a18ddbb33a5bd
SHA512855467b7e4e60a94cc7d423b5b65728aa4320644b2e39978c0a5af99f3509392f43526493024b1c29ae190d9eb53c63a030abe6d537d36b84d4b3c1a72d00468
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5656941334e43b226a3c7a3c2c847a8c4
SHA18d37baba36c91a5aded0b68939baf1fb207850d5
SHA256bd0be69fef17685221083d73cef7dc4666edbff01c78bce07cb291b5304ee780
SHA512aca59c048aaca528c933a1e8d4c1d4742088e5f902775ce113dbc97d92ea8775aee0b489ce08e4bcc159224aa2e6f87c9cda4ad8c73cda267380008794f31a0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fa89561af5009960944262e846e2e6c
SHA12d7cd4de81cb2ffcf3f4a47e3aa131a056900194
SHA2567cf7edb304362f05de04b4c92b7ffda099032ad836e4a38d83f38a565abfee7f
SHA5129ab749adac79f548b7dc73ce3fc2ae9c9ec958e0368298bd882e0d90a4d8f7ca3f0e077fc791ff26fb83eef26ed19a1b6774ef3790b6757aed01f22d77ef93b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cafdf57a65bed9ed904efd6cf2ae4926
SHA1ff494f4d979ea7cfce05313539e3436be2d1bcd1
SHA2565a21ee0be151c09ea774ddee9f26076bd3c922a12829cec31db1497dfbcb4b7e
SHA5128ad17a1b10182abbf1a3dfdc219bad6fd3849e9d6eac33e25abc1721ca74d89b6820383282991bb32c43567a8a815c94db111bc461961e90cbf31ba036b2a24e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5459e2f9a3b1a61bed07177b6e52e4c5b
SHA16fcbddcecc5fce25ab913a94e2e7d9c4f15759e3
SHA256b610f0d77b553f59bc89c6917cab39fbd52d1b1a800e6400cd6c596935745005
SHA512c8c1215edee451a439fbb7f69995e6ac13f207481495378e3e0745737b38544b1ba40421ce41e2dc7294c4b94fc443155b5e61ddcddb313c79bdb323ab1215c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d357a7309a6c17a68017d42a3569b5b
SHA16f6a7f534d1524b8931248e25494e683dbb900b7
SHA256c86b74cd8a41913361584d17661f740fdf13e04c3b5b86ede97f660300c2b4e5
SHA5121e221d13348fd8c7974ec64c19a6819d565fe2272bcf66920c3be8712eacfc4f01c12d86e662c395f264b27fe690381b745c6b9684760ad13332227953725aad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567da3684b1941964c13645aa4e4019b6
SHA18cda3e20e2672361e6b0fdcb7a5ae700b2dd66d5
SHA25607f7fdbcea83f12bf6ba6ce1cbdf1799c9b055c2aacac8431476f155cfd703a1
SHA512d9ed82208cfdc7522be0e311c741647d60e2f2b6dabd4e92eeb08d7b45b7684926ee2ea66794fa9a41d360d72c59a0099c6ca5b57a72031b76e63c66d38da1fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec09fe1bafe08ceea392d1029dfb8143
SHA1ef50716ed7a35d7fbfe8728def388499b035d6dd
SHA256992332f466f282d0ba57adc87dd29c0882f21facd4e5e92e170e12f75d79a47b
SHA512fc004075ad2b32792d9de70fd743bf4ee612f71172454f99d79930059f9c30dd56fcdcf10fbae3361fcdeafac7b5a671ae78638bcdf01fb3f794f7a5bad3b0eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e290af5ba7cc94a07e01e91b281a334
SHA1a553df14f463d553b8394eb78b6446fb54ea2a7e
SHA25640a1fbe4ee4e318992eb55b9a721c51f227160c73271e65875c420f380a36b2c
SHA512a62cb3be8999010e2812040d5fd9c6cbcbb01862dffc388fc10344d3b696b6d598b470a49fb637883c2c2f4df0030e287281e303f4c774b8134c2f122a9dd222
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b