Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 23:43
Static task
static1
Behavioral task
behavioral1
Sample
b151c01519b48397aa8500d3c90cfcc7_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b151c01519b48397aa8500d3c90cfcc7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b151c01519b48397aa8500d3c90cfcc7_JaffaCakes118.html
-
Size
53KB
-
MD5
b151c01519b48397aa8500d3c90cfcc7
-
SHA1
2ffa68599851b0bf3529d40c5a9734b99db081be
-
SHA256
90d740eb1515dedfede8641e93adade480f407210eb0c92be69109713b04e1c8
-
SHA512
734bb064504c0486d7534030764722dade3318fbeb1da84e8cbaec0a933e057812b21777b1e968d7393874b7b4d5ac416ad556b5cb3ed94e600216801fa93d93
-
SSDEEP
1536:CkgUiIakTqGivi+PyUNrunlYe63Nj+q5VyvR0w2AzTICbbJoL/t9M/dNwIUTDmDc:CkgUiIakTqGivi+PyUNrunlYe63Nj+q9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F3694E21-5F4D-11EF-8893-6AA0EDE5A32F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000e2adede70ae8f776c4c0041d80e65132a34cf9e842aefa3243b69fda9c7c4d36000000000e800000000200002000000071643d8bbcdb88be2fd7a9982842e680806a121c3b2b4fee36a4e42da0b00497200000006ff3ff579bdfb53415a836f5179544ced05bfb32f91c59ea1efccd8dda37e4b640000000d06a854f460916d2c70132557772d517f4056a1e5dbe4604abfa54f58eea324e858fa4d8af9f9e5d587b15933d135e54d55ad12e37da70d7c073e65806319d15 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 000e57ca5af3da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430359254" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1344 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1344 iexplore.exe 1344 iexplore.exe 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1344 wrote to memory of 2096 1344 iexplore.exe 30 PID 1344 wrote to memory of 2096 1344 iexplore.exe 30 PID 1344 wrote to memory of 2096 1344 iexplore.exe 30 PID 1344 wrote to memory of 2096 1344 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b151c01519b48397aa8500d3c90cfcc7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1344 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2096
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510ad6e42b5d0b33060399a1d0d8373c8
SHA13b45f1c9f175c2c3b433cc4ed10bac73bfcbc6f7
SHA256240b3a838e6ff18abb73bbe06c7217fbb10d81676c37329a2d4087f662d9dbd2
SHA51232132cc0b2915aaeb2593dfc727bc2f145e4a9e18992b8d7ca46103512fdea1e54afe2b6e3be6b8e550e80218317a8fed0154741d50b4ce0a8c2066f10225df1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520b37e733add934c412ed782e0d28224
SHA13f500f5c15be49e73b8c6515c9391084e240d344
SHA25627eeda5b3a2abec9caddfdd8128e9f52db9e773379704073ad9851388248ac52
SHA51227cb8b9b4b55d8cf6e5570cfac07a213d47f8d0fdd02811739fafd130e5bd9e6d6eb93624d0c1fca9590f3c2af138cb6fb8d9f2cc485a07f3f18fd400439dd04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f42c1f33674916028bff860cbf3c76c8
SHA1571efa873b87a807cddfd02764583d9f7510b7fc
SHA256ed3e0e716bc2a6248b32ef0faa6f0144b7a34772b997bf4b9f9c098389724bed
SHA5128620c5888d3931e63f9fa09f14c2ac50ed345bbf2cd70ea864c28e5bf0af0e3ccee62287e0402847bd1e0a933d5a655cd2e33737e9e6993fcdcced63fe04a551
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a85aa6c0ce12a153f5b7dcd94065a43
SHA182bed0e5e081d6b070472556d4eb46c0ea2f74bd
SHA256f9e9080bed4db0a438bfc2a7e927f2c1e90024dbc3b98a1c7a4117d255bf7dbd
SHA512411eb35dd3e897003e19184fb48326c4769c755ad2d37a492e99d77fa0141687beb321f20ec1464fb6edf0b7d65d45eaf2da169e02a49f90b79b25f9887f79cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5120fb8aae0d87712c59413d2cf8a1386
SHA161ba406c605ee87881a1d31d9136526a5c110887
SHA256714da2f1952655224a7adf1a3e15a7648d3d6f798e3646fc01dc0f53bb176186
SHA512de40790afe11721bb91f71d0a5e58ebf37fdde8b8e6030ae13386cabe9bcf35208d1cc0eb3d7b69032d7007c2275d99ca9c80ff2c33e2e60db75cd856f64f877
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506fa7982dd6fefc7ba8660ee7e017322
SHA18688d7bf9ead659515d94220660c008e03625fd6
SHA256c947144420ba7ff78ff08db0534028446b885163a477509b014c3b2cd7746405
SHA5120e07d398b4c86f552dd8039d9730a71e4fea5845f1edd6783dbe015a9d3f4560e007b6dc66d73f5b641626fca9561a2f2471a04b1563cc223d7a3388d1590243
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52718b23030125ec9fa3a7ad7e59711c4
SHA193b90304a76727e7a08524e103dd4cb3a09a1af1
SHA256e62482a7fef502c9faccdcd0abf0981db8faa9db444fa615cd4d94b81ad4f24d
SHA512dbcbd06a87f834b2277c006e5099efdc459fcf3c64a452a38ac27bbbc73afc8bccd1f0bd4947c22c2389f822c3708588e2269e171b4a15d0fda69c1cd8df75f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be47fb95851436b863f9ffde4ab9bbd7
SHA1c7ed845e29695e878c63a29e282581bb63f9341d
SHA25677b4c242389f50752dac9c17940d594e814cd1944da47ac147d6a158c59baad2
SHA512f74710e7928bc4592e97d2f4f9e4c435164f6c69e5cc6760f3deae72db633335a054ba1357e1975672e98588ccc38f38a357ddeaf502d95934bbba8e75d32900
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56795e1761608cdf4370acc3ec40f9ac9
SHA1008de62ba36625204a9f8721b86c0ece999e65f3
SHA256432021d935d61fc9637b02fb3580ac7c8f0ab9b9f309087f4674b39ba9693969
SHA512e9bccc7c0ddc8b99ee8ea1284aa825be692befab0cafd12b914fe712b03208aac1c86f494c1cec99317c4ea450d7ab9aa6566ff35e18587f3f1abb4a9420093d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c35a246694b0434ed44b8f499cc95954
SHA1dd88c8d42588a415204677f5e6134fe2bab5d54e
SHA256daf3a7d4ffdbad51a05020c020151f43fe586bcfd081ad03a2fce8b34612cbbb
SHA51285a69007380a7a68534f474b86efbf166ce2143149f1582c1336d960afaf7cdf26c113ace9906f4cdd2fc154688a67901b14f41b83d70102d927e926684ee913
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f607c450a7b482a0f0b68536caadd47
SHA1f965449b200432bfca7c80f0e69a30bdf4712b5a
SHA256a2787620b2971938c90a2d9d566545a1d709777eab46704b53de8083e700f222
SHA512565efc363dc5d86b2f2893df973fa9b6f6a7a1b1b0f3bbcac4ceaecf90eb00fb300c2e9e53c2d4275ee09ae3554d63a1d399628486d5f24b2a2dffb01a9baead
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb0e155bc0d1d979eb85fcad558cd0aa
SHA1b5fba4a28a64963b7c10d052296fb322b91aa71a
SHA25629699b13d25f13487f6417a48683a38d5d91bf61e398d06476c5659e2abb7780
SHA512ab400172051a021e280a5a9109cac8f5a875358e781f3c698cd47d24e7bb8ad22f6da127411c20f2643862d2360b9985ced1cb6dcfb39b2b66d88b311bfd2815
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530e681163ea46cd2fd726334c81937f7
SHA12a43deec6b52280823c49f091061326547cf1590
SHA256d9d07bd4aa7cb7ae7e95cfce544ab63ae85f1a076031286d4199c9e63f205ef4
SHA5123af2f21533525b8de9c89d5de578b675c2ea06649b538cf30d57459d05ffe3b70d566b4e73badeecc6188fb55a7928f0b7dba02ea824ba1fc3e618dab01e37de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58560d719d3b11da14eab236ddaa8331f
SHA13cb655adcfefb78092d3b967c2e4b0d9a0c54441
SHA256f35fb90598e51b8981bdbbbae50d12a99ab36d9b37d5610ab87421acb725e73c
SHA512e14ede63cb46e81a1f03596feb4d90db2f3dc75a37b676950a489bf7ebf2834356af566976f200a7a06f2f7261a501f5000ae7b05dc3dbb0e881c59edd4d6154
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b5a1803563e5e5d2b13d7f4627b48ce
SHA124220063b8544a070637932ff3e9ec600afa801a
SHA25676b4473c298bdab209cecb84b95681f55bf4bdb0da6f333c8f83998149dc75c0
SHA5123574c8e6b931add10ec9ed9b5e1d5cdc3296f116ec1b4624ba6d0f6037161d0c352ab5356d3a02a3c4101d261667b0afb9bbd94d67e4e7102060bce0b8989237
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e969cb66dee629bf59b3553d4f0e0d8f
SHA1356f044178b35b973f6131ca122219f2f1751988
SHA256b56cc5c8a058700cca2e10be6a887245447df97b33443a1f085677033eb9ae78
SHA5127a67bc4b332e3c711a001cb66c8fc9986e5a998cb004515bfdd16388ed8ed525fceb1883a77b17d45becefad27d22ce13ed07ec4a38d6e2fab85e299b520ae2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530229f40ba8ecc8ffe9b43a7001e8c12
SHA140182af008e8b1d61e3a7641b9499be4bb792e52
SHA2560919a29a5ac8e4022fcc08552c18c7a9c6fdc1dae473db26753a1a2626e18cdf
SHA512030bb6af9cf58b9648166c9ba0bed989cae7e38a20ae6dee2a21076b9ec45a414f77f4b59335035b2e43fa59b333dcf69433fd896014d8c980ddce45b2a2a622
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9c27a3f8dc3bbfef04dc2f54dfae32b
SHA19bff2d3c0f28896257da4c9e13083452a4efbb1e
SHA256585b217a590f6141382fb07450fc5ad70bac43d00e0ba7668cd67d571cfe6833
SHA512cc60c16a053d74b4b89f56c346eb302172c8e12dc73856222a892e211331acf5a32c05f9e579cf0d07500a36e287cf466fff1596c372299f746f89593b85e85d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ce17682d27a58670845f9828462f0d4
SHA1cd1f4bc9d35f1c0f59e4478fdca23c5d039a97b6
SHA256c79a47133c20f00a124449982012bbe1f1412c9efc9158a64128ca900b35b0e5
SHA51231b8b64f68b64d864b082d455582ea7a1482622cf8d54d5a4d05dac487ec3362e51774e1d3138493752abdf1f5d594ff1ab203b5509a20b19e5345745f48a22a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YUF3ZB4A\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b