Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
13/08/2024, 21:43
Static task
static1
Behavioral task
behavioral1
Sample
94d9ad472ff64121482e735727039b21_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
94d9ad472ff64121482e735727039b21_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
94d9ad472ff64121482e735727039b21_JaffaCakes118.html
-
Size
121KB
-
MD5
94d9ad472ff64121482e735727039b21
-
SHA1
2db386d31486137fc16c13635896ab148838c726
-
SHA256
55d07a72a8c7623edad422b90041d0ec96ba0af9cfb10cc9addb40efc65fe38e
-
SHA512
b36e535b2ddd6adb7bd6debda4850f1ab99f8d692cfc98e9d884a00c43075eb6a81a21a327561b9b6e3201a62f2389d9425dc40e77aee6955fe2b5392b60a00b
-
SSDEEP
1536:pTc25DKtgSHr3UNVs+dLh0GKK3ZysX6aMn/h5Ugg:pTc2hmlHr3UNVHWKdq/3g
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000009b81797bf33895657cc45ea7a36491652a6c71d9fe66a44c4a5e50942689efb8000000000e8000000002000020000000bec318f69520cb4a0a4d8901b692684d03a3c0fb6ab70609edea56ab77d630462000000017dcedc459d3fb7aac2a6f1f53a3299b090acc9e56ff83b6bc7bd87630129395400000006a3d6e2824e51829f9e1deb6e297b4684c16259f835ef109ba47f08de9d43dfba64ee9c28840def59483f7010b243eee58b36e5a0b21fa9f9d99050dc6f3b24a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{05CED9E1-59BD-11EF-A7CE-FE3EAF6E2A14} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90da2bfdc9edda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429747253" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2452 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2452 iexplore.exe 2452 iexplore.exe 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2452 wrote to memory of 2384 2452 iexplore.exe 30 PID 2452 wrote to memory of 2384 2452 iexplore.exe 30 PID 2452 wrote to memory of 2384 2452 iexplore.exe 30 PID 2452 wrote to memory of 2384 2452 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\94d9ad472ff64121482e735727039b21_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2452 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcdea726c40393bdaae35b202989c072
SHA1921ddf3f5e8a1aac6ab674d9783486515e58797d
SHA256f4f1f7ce279b6ffec87a48e83681cee0327e1fc7a9c819fe90b8140520c06b46
SHA512468519f94b311e5cc2305275434bd15b410db49f5dd522a3d7e8c84b523991a76e260a914ccae06fd1b356f999e56470b6faadd60d09ffdaa631bace17861f66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa90b3331c382c5e8825d5c075c77e1d
SHA1ea570672173d481f66c0dd87ee01a35509ffc4ee
SHA25626f11883a4006ba31b361c03e02e3c63fd85032f92c14ff255bf923ea3e35709
SHA5120c618b34c5107f7ff6a678ca86209afaed46f8e095b63d764ad3b554bd5a184b3cbfdea1ce93b38324fa16a06976b06882a71f9f3f4ed919d76a0e0900930288
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e1f1e5d0be00c42cd4d57e02dfc234c
SHA10e49f562ccd6161f854369fe32023331ff1e4192
SHA25680c19462ae59d13d047538ca15861036c7fbb0f4e955f808804b72d605fd5314
SHA5126e5223f56161966b317a78529e846912588dae5a29c420314a91b5cbba1adf30b9a531630589712959d5c4634af24603e98ef84621ae70382437e83bd66ac722
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb14c521d15e8df0f228c09c566cc8e0
SHA12517a98a1260349352d841d9fb85bb2972c076cc
SHA2560705c2c61802a3e0ff3e82b8d96f3b43ded4b748dfb7889cfae265613cd258cf
SHA512980f52a555da53112ef65645867ad04b8eb9e8e3256ea3b19ee05cdf427f5c2cfd4668c28cb79fba20b4413ee4d34a190d450868cc1e698479e6b4ba36c31ada
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e42f8d3c3616cb2e42507443c3f8286a
SHA1db3d99622a29425e3dc0e079adfdb58ed3de70ed
SHA256a01326ae055b5d96136edb10e1d40c25e9f901924d38b9c01dbc6f79de5266b2
SHA512810ec0d316cc1c1e229e00cf189461f0d39dad9f026a7136d6a6df47a45b4d219b1f06fa1b2695205ab2d6c7d135345c6c62d7a8edad87cce74a0118444b425f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55efa3a1ef8137d6d568e8278196d26b8
SHA1beaf7ffb4309ee206f08cb2285d05bdc8de23da8
SHA256aa95fc508bb531fdccc67c801cc3bda27085d452459ba201575ce18ebce6492f
SHA5124e4d027ac46cc0dc047940117a611d3060369853f8fea19dd13d00440382b018f15bc7c495ae7602ac67e317f7c33003ccde0543951e9471db9baadba62273a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cf14dd61dc05d81f145ca89c9d7dc7c
SHA1d47c5b47e9af790ecda063ef2dc2154ce7467632
SHA25620e7035f7224d13c09eec8a66714f46a0a5a60952e2e41f10a6e3ea51b8e7eba
SHA512188397b66249cab5154ebd47fe3ea587712c21b2a3e23aa5dedcbd81e912319bb89af8991cbcec5c2baef8d0fa073f5bb00a22289dd2f24df35d92bafa2c6667
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57233428e1178e4873e11acca24fa5eba
SHA1fa43e6ac4a910cf7be17feea59d15dfbc9af1a36
SHA2567d597088433883b2cddda92a8207250bbbd0ba5d7e52c7d65f4a680c8a4539cb
SHA512cfe52e4b354b242757162f665a9cf5620932b49f163558e3460d934a3d352db775ca4b7d8ef74ba22ea53ddf6e14ba814dbf4fb996d707a6857f61cab287bab7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54be89ca72cb74f7522a3f27e44700405
SHA140f7bc994aedc6cc74315b9a4b332c72bbcf3b95
SHA2563b3096f9b7843bc52f9ce86c4d10720e69b1d3c2339ffe5e13cac2f9f1aa7a0a
SHA512b92266307ac9b9e5df1385ec3930e7ec8cf91ffe563062fedf6e333d082df4ced29d75585b9271eab39dee72cd1b0281c2926b9e2972dd97d8a35ecb2cfdcbc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a977a4c70248cb6e66256b72f8f2056
SHA169d368a0fad8f53db7f380eb88403f87ba1c384c
SHA256cbacdaf441d87ba4c079e7c48ea1919a5a9b3024c0a2eed4962193af8e766938
SHA512f11adc98600bba34958f5357e4ba8531f2bc486d1bef9d681dd237550d714a7775d7b5f5060c8d0a8d0506a00cb8fa2d091d75c2447d312dbd50ee70616175a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c55c0a3ffe06359cb3fc4d54d72997d8
SHA138a33f114bd13d24d738efe1d0c02b8266da7f05
SHA2566ffd79d3e82d04ab40ca854845fb984934a60371cafdde3ba56a36729bdf6793
SHA512a76c002ab3f9ff5f005b412151ac0975c630a004fe215087279d31988c1096d8d4daea73c732a34765584f66ff361cda19af8735e546c4d0d49406c248e1c48e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fb2783e2149dc7ff722b2e5ba92cc2d
SHA1aa86c4771ba79d1b46795c2501a01e65e9ed408b
SHA2568595fd835faaf08beac79e1be1bbd2bacccf76a8980912644bcf866812e122ca
SHA512412dbb20ec6bf1610972de8756f39ea06e9e219936d33e8d819dede18fe9bd7f04506215d997299779d9f5556d9ce0238147b83239fa64f794f29e13fe619ea0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568cff7f2bacd1b59f76432c15d9d6653
SHA170024d6923c4465c9f86326be57eadb58e9bc507
SHA256460ecefffb56757da2248f6f38bb60cd2203255dfbd89fa15b42544606effb6e
SHA51207090dc6eb7efdba56fdf285c4267079b5130497ff35bbb62e6f9581bb9a5f1d9b3510bc334d5700e7402b2421887fbfb7acce75b2d9c4413822d9af10c50e2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a6cfbcc5ba9264bde78cd562077e93e
SHA1364f1d400d91ca89872a18d672bee2c0046e079f
SHA256da6bda1700bf2de73af0d543c3a94400700be851fbeee5c3fa8c7845eb1346ed
SHA512409dadfc5470e3570221e48125a60d31a6350e4ef53e0e15728bc14065a10a3f79acae4b397fe6d1a96fd93ff288ed2461ab7e2bdf51318f4ea384e7f524e701
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cde06241d1e4fe4e481a739ad0047277
SHA1518587c12fe76148557f474990cb9abe70c1fbab
SHA2564c1b6c79693f7c574ca4a5f5890cfb3c41460d457bfaf4e07c4d3445dae1b913
SHA5129e97e3da60ef48a270818a55252fc379a4e21e4e180ed283c2cb906633ed5ecdf1b4bbd14cb77897e106d5b33afeb7596f3f5545a5b8451cdb1328e474663b58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a9b5f8a8999e974aab6ed34bce67eb4
SHA1766240382c777856cb481b44d37ed96138143b9a
SHA256bc48d0c6ba33fcd2923aeb4e07196a23bf71ee57545789033509aaf3b93ddd62
SHA512af78d787db2037f395f6015e23a7d504cbab5b544e4e4368ef3f22fe5dc88523513d2dc1f0019191af88e09384319a6a5b81a41fbc60ef216b1864ae64d4afb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da79abfc9579fa5c1b2f8d4e0c6fcf58
SHA13029f87a21e6b0ae1ea9357dcd609dff6defe2da
SHA25698ae535aa0da94d3b8ec0ae77182d61119d9293c4e70f2550a3598d5e9f22f96
SHA512fbecb10aa7e409c965e4155e7a35ad3039884c64492fa01e3dc106023df6b79886288ea1293cd54c39801bce370dbd03e5fad8242c1dcf1d504d0885c6964b59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535ccb19aeb94f06c8d21eb1fbb11a8be
SHA13362d71d156f28c195067d72c844714f34911bcf
SHA25669bb8e92c8d34df5fe3bb26b2eb4520e7a3f5bba8ae18efb3e2add42cac03382
SHA51215599b76df34ac08f06dfc9768e8a264b50632264c083d5929f12ea970fbd1cbe5399ae2ad31356879c4a3655bba5d02cab16662005df9b8ac4bce8837587782
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c39a0a44d07807e30c477b4e881ebbd
SHA1258d193b32efad96d20eda8562a571c3aa17b032
SHA256fd7b4518ab2ffd9b8e19df2fae497f86b4976af84786c1e2eba9bab0d872da0c
SHA5128757e07b51d5b1902db0129011592059c9ae114532e62ddbf1cb90a9e89bfc839b25d36377b82a78c9afad6629115f11fa6487284772b2f655730709ee154918
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b