Analysis
-
max time kernel
70s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
31-10-2024 08:23
Static task
static1
Behavioral task
behavioral1
Sample
827202964802999c2a17417d2a854fd6_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
827202964802999c2a17417d2a854fd6_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
827202964802999c2a17417d2a854fd6_JaffaCakes118.html
-
Size
9KB
-
MD5
827202964802999c2a17417d2a854fd6
-
SHA1
6d44c9614b26ac8dac3f55fa07bff5a151f07ae8
-
SHA256
b0b81417a3fb10aad4e85518b740b13ec37cfa334902c0c1e2f3c4e80b5d4a14
-
SHA512
a07fb242345dad99118aeafa38e114b43da4c6ccfbb3f34548c9746563a13f54910c3b5f1572abf1efa12a3a88f900b2bb3ca2886e8d06d1fd8c24929f34579c
-
SSDEEP
96:uzVs+ux7VNLLY1k9o84d12ef7CSTUAGT/kNQpglVHcEZ7ru7f:csz7VNAYS/BkgPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4BF1A1D1-9763-11EF-B985-56CF32F83AF3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b131900000000020000000000106600000001000020000000548bbee365cee5e62f19603c8d8221054963864a87aea3b15669db6be7dd4e77000000000e800000000200002000000053bd6bdb361119a3e63983baf017c895cf75621c424d3b977d6cd222dbf45d05200000008ab4fd0b927773e30c3437373ed75269e72bc449e904279ca75f0d864d4babb7400000009caca0a5136dbca5752a551a1ff8d0e9eff243bcbce9f8e4a3e14b4a692f03e36c8b6c898938afe51fa75a36c99d0d50212615f63008a400b705d6396d3fe7b7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 904ef021702bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "436525689" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 760 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 760 iexplore.exe 760 iexplore.exe 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 760 wrote to memory of 2192 760 iexplore.exe 30 PID 760 wrote to memory of 2192 760 iexplore.exe 30 PID 760 wrote to memory of 2192 760 iexplore.exe 30 PID 760 wrote to memory of 2192 760 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\827202964802999c2a17417d2a854fd6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:760 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8ac9457b2284ac44cfc44a627295ed7
SHA16b316a4d0b44a08a5c72fc9a38039192498f7ea0
SHA2561b4a840b9361c6299b41432cecbaebace9b1026478ae85de19cfb570ae917a7f
SHA512c7d9501b338fc1be372afc790dd05a8d0534d2b1a1732aa73c564adc19f79e437d950d0431004f387825f2279c42e8fb755d2e19d94c80ae4523d9f508b70ecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f520ee2313357d65ddc6a8bbeb4808a3
SHA191e446c85e1be029ccb6227db72cdd80563e534c
SHA256a08b54808e1a62cfd7d5065b124e9bcdcb0ccced82e2285d2ab0113a9f23753f
SHA5128a7dea3c68058fc4c8adae16cf59223cba93fa79f21acdd4faf3dd29c471a7d2ec795ec3feeab4e22a57320538a82336b6bb6b58eedcf72dad20227df8049f6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fb1751780794a4dfcf0ad5bb577ee75
SHA1307212cd22ba9d8295f99c0c7a4f42fa8d4f2e83
SHA256cabc5b3faba509fec59ddf8e024fc1de6351b0f6ecf6d223a96d23c3aafe5b68
SHA512dd17c88e88c227d66942473a95e28c81e3cec53c7888acdc60e7566eeae78d8d060723dab7efd34b4ed7365fdbd9137912201ddf3974121bf724aba951e49ba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9c9aad340fdd81e32a41548888b9c51
SHA1d05b4ae2d898aac3cef98985ab70a94841a59e01
SHA25642e0f3e96576839dc01a32169febcc9121a158d8453e735317688705d361cf23
SHA512e3ced9a0572131766030b7550780af09b38dbaed541d34c9cd6aa23e279f4e5a39adc3cdfafda52326fd55c1864a8395c39a841868cd1871b3dc3a3bb0a17053
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e6c16950037463c398ee26a43e25f3a
SHA117ce9f9bec43e5cc00a098f4ee2560b17d74f34a
SHA256705207892e7f3bb03f21518bec542acdfe363a10d0a76a87258b55f747efdcf0
SHA51217fe252e7ad76f1a80752710d5e2489ed27f11d12580155c6a03faaad6412d5abf80be7d9f895b0d8b63ddb47727778a59839f3b038b56268b4dddcc9d97095e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f6a37426462c610acfa61dc85b5ed62
SHA1e68642e514cbd8ca6f3453acded5c511b707ef1f
SHA2569fcd74a46fd2d2eb8ce7212de3cdcc3071b05c93c29a1e79f3ee2a247f54da3a
SHA5121fba2524714dfc9dddacd9bc2a3715f779b384943af248dfb867b1a69a29a57a1f5842478e75e5c59a3ec6a4212baa181718c8b7e2bea88d83921094444a641d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542aab9763706d9b5826a7bc287d9fafa
SHA1e749399e8bc90f90fc704622dc966ae748f2e1fd
SHA256ed478e84b05eac50b496c44e7a15d297cff93dfd6ffed281f04de1d6da465d38
SHA51249ba3ca0f8b15cbcda2788b8434788a50e34aa0b462e7cc5e56cdd028eaff04afd4c90ff9cd879cb672fde1350edccdd675c525974fd2212e875539caf8a6379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565c3ec80f9525b0fab5e3035d34d9100
SHA1922cc79c370210af64753b5225330c330eb98187
SHA2560deabb1930e259a41000adfe56aec23e4b2dc75771b52620ebb5e800c40f1dc4
SHA5129aa0364566116a6226f907551bec63bb47da00b92a78516ca08192fa3165e601623befc2d6b94281c39290c33cc5cf54e50162003a7208f428c6be502f24cbf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d8a5714d89b2e337f146ea49d0e5785
SHA18f65f520ef83ce369c6a8e3081a28ca1e45e9378
SHA2562c8c8e0f587c44224ce585e94ace328fec8cb9191ee846c0079032d8ac1dd10d
SHA51227432fa708f131c0f49780c4c7d6a9916b15096217570861964599915356eb49a42b99eb05273a41c2d92d4150eeafc628595bebd904df0678a16d3292234d10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aafcc30409f638449b4feee885631a2
SHA121450185df8ddfc9b416295a766494d241909f4f
SHA2568fbd229f6cdbfe76d5229f4a52eb7807f84a5ac611125db52c9425302c8453dc
SHA5120f2da8dc50fa5a74d17ace84678612a986824ad2f00fc58b8d59688f7a540b8fc9af1fcd368c77f642e40905c4abbc15a837057a0d5c02c0fb3b5e08c5c421a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500587f26bf223cd35d0d6559b587a043
SHA19d66ef74350ebad2e6b723c6edb4e1be1508946d
SHA25655879a8acff5ee5a13835253d1f2600d06aeada44e68a8fca58adfaefc177ef4
SHA512fe3f680ee9669491d975046328a59f302bca142ecd40bb53e813a7735763d48e9db9de5c6791e42149be6e8388d1d652f727372bb12021953f02059dd2cd2e15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c19603268228a47867d90d716b3f632d
SHA1355c1e1a5f5f2e1e00b7a2ffc241cd23d86836c7
SHA256f02a466bad8c38f6d8b9ae0b459e96b91a1fb1157706e5023de63e77cb7fe387
SHA512959aa51c37251bd18cb358ec843262a6e5ab214ed4c3319362f4c6d297cd32fa7ce3a0395b5543f41562a4e1c9f3de50eaae388efb1409bc6ddc725ba0948627
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7aacfd1e58e367d07fb468b365b1bf1
SHA121576998a29f365071532df93d07a90d885bc2ce
SHA256abf12b96474bd8f9b292afc731c82f4422fad387b13785170369f20901074714
SHA51264cfb21a4ce90b8c3b2c16a28e7aa6152258d8b3818aa3b17c7ae07e8f402a9c5e3c74012e26ce1709322a51d3eca02f2e6ae8f5fd80cdf8f3a87a5e0320f2ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5625c6dd1246131e93056f391b73da906
SHA148b4ece3021f579d711067d0aa8d53c955604e0f
SHA256d85103b7bc66ce0cad8fdd47b690dceb88854ffe07e8ee6276293f857d8f0f12
SHA5122936a9988f71a9c2b078457f76650213c8ed178cb4be5e6ff8507f60842bce5de6d326db8b4ac0f4339685249b844c733e1b594a2844f4f1a05616d8b59f1921
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d19a1789a19eee0f77a4cd109747b78a
SHA154a0790c7fa334c6c5a5703a804d7e3a430249ba
SHA2563070c9fe7b2c0145859d6f81937bf184135adcc6a6be82fe1c9b2ee47da7f006
SHA51298b2077d1eff9544103047d430041730451e08cc39a2c9a6c099b2674fb13f19c2a16a674e1fd8de6ab2342a01e9ac245b823da59f783d291a0554ad34fcfbe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cc577a04b294ad47b1522eaee58b5d0
SHA10b37b9fc3bc00a481d6541075a3cc03fbfd93ea8
SHA256ed7d495d99abe5d26ba851e337bb40d6a54b857a567fb554b5bfb406ae7d7a26
SHA5129217fd103df6f70114785df2f4f1a4d35f6206e9710a40852073cae7307447081098cfa7b9e324681c96762d5ea9d2db718870971b2efb5a54a6a97807e7c841
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ca2b5931a1001f9a73c018f89e57bdb
SHA1825f9ef59cf17c200ad67c325a06cfd137f9b467
SHA25632bcb236c26502845d407ddbc5a994fe063c4896c69d45dce51aa6452322ea07
SHA512f2406674000a25c27aba62ab572f7703e9803702969e20830e1436641df11bc19a6901a7999c5216a46eec3a344cb7d832fff9c52f016e548de37c8e6bd57688
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfca383004ea5374e74a25e917061a3a
SHA1ea8c430623cf7d54859af2fc01ba0c170b17cf84
SHA256d9a4f7fa21e5f600e8a2b73b0fe6b63c7afea47f42294236810a95e3edb4cc96
SHA512703e2de85fc2e3028d5b1e9489682b7df4507a4ba5ee381b44f045a64ff7fda0e0367b778f58c618849f19b1dd68ac2c85e1a1b3d6f061b918a47bace55d701a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d753b422e715da3f51a95ec7eeb2642
SHA16f3b4c4287450fffc86deeaa42efd7c131892e6d
SHA2568888ce1d55d2be754124012dd1cdd42d9e1e6e31437f2f61027ae885d1892c06
SHA5120466499021c23d46b726bcf0b23986f6dc89b6f075244a772a7dfa760046b1e5fd79b1d31841469699ad459bf10d99bd9980a2d3a4617577e8c7e0e9c4ae0153
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf326c27098e51a8e4e7192588221fb6
SHA13afbb39c1bdec5bfaf062fffe8fd9845032cbd83
SHA2568c9836f182fc80e8fe2a1c2c495df51f6a9edea2316d1dee84472a42d143d583
SHA512127cd857d4fe52bb59cc2321b9ce667904949a6e668782b31254b7a75f6003f845440fe09a28cbc7ca828c9d11ac040e14cf038a914030921b0bf61672cff36a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b