Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 12:44
Static task
static1
Behavioral task
behavioral1
Sample
af45882079f1920dedefdf9c451883b3_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
af45882079f1920dedefdf9c451883b3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
af45882079f1920dedefdf9c451883b3_JaffaCakes118.html
-
Size
15KB
-
MD5
af45882079f1920dedefdf9c451883b3
-
SHA1
4469df60e7d2f7845c9e6b8bfe2e989729e2dcd1
-
SHA256
59ea74d99cd8936c57c53936513c13631f1d57738318f7fb29bb285c9f6c48cc
-
SHA512
5f8b81525cd42ba2bb44086a1e2667495a41085c50601aa2e512ad040ac1760abaab0ff3afca7824769baadc82c451686dd460a6d678efd7a4b6691f58d7e7c1
-
SSDEEP
192:Nd6qYNPMMnIooSGD/idP9QlXWvRKoArr3XuNpx8ikiuNphVa6eyS8:NMxGFlA2EehVa668
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50d05cd7fef2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F89E9B41-5EF1-11EF-9889-CE397B957442} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430319750" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000aacb6ee356d56dc5142a39feee092d3ea89d4858c0d1d2db7f9185e49a50bfb3000000000e80000000020000200000000c0a01279737175861d17753472e1c826c2cfc27174a7c08bbf96c3432797a2b20000000696d191703286aeb6157d074f17b093427d985c06834bf1def5dab521245fdae400000004d71922c58bbefcadda4e98f1743cc3c13b8e214ef565f5c7f1915f6669c33a78766e14c9c47763d152a916dba8b47731486629564fc6fdd98aaac8e56ffa624 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2972 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2632 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2632 iexplore.exe 2632 iexplore.exe 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2632 wrote to memory of 2972 2632 iexplore.exe 30 PID 2632 wrote to memory of 2972 2632 iexplore.exe 30 PID 2632 wrote to memory of 2972 2632 iexplore.exe 30 PID 2632 wrote to memory of 2972 2632 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\af45882079f1920dedefdf9c451883b3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2632 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fcaf410eebb3c5b02608ba26c0e70c3
SHA12dfb48c141e270c4e3651d39462d9fff95eec6f9
SHA256ae7c1d67c284ba6519a9b346e4a9425ce270b453ddf03554fb8b3671ed727e3a
SHA51210eae7854c71260d4677895279809bc83ea0cf0ccb888b0c56c03e95dda355352e9bfc0865087cb556a8a6efccf8231af1b83feed43effad3fc74d47d4ba6984
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cde2b7bc1f7f2ca73057d0deacf5d169
SHA19e2924883090aa3e9a7fa9bf73ef6dd05c216ee4
SHA256c6ce32869f5d7b0e7fd271ea9726bb4b8ad19fe87db30eb8654330e3d7dd2db0
SHA512dd70794f7d24dc3c31e4d074cf5a9806fc9e5b99adc4cf3624aa3ab17faff3d528056ee2e9433d21646b94c628f539ef74a5ff810e60962b6b2e377dbb0da5e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f36437b168ab50e9dc824840c9cf07bf
SHA1ac5b9b6f034f4b6a6bec9f67a29e4916a86d55b3
SHA25659d03abe4e35d68c1316dfd80abeba2f1dd6d8bc6f55f1e2cf7d21a516aef2f5
SHA5123fb95943f8a923b932433a50e8e817accebf018633de5903c42cd5674cf09c5a10dd876cc849cd2addc2c3f05a523d191b59aa3d35004ae55403742934862652
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dde4c8b1aeeaf69d06fae37d146fe1ee
SHA1c00897a87e75491fe547019fd0cda0d0c1e6144a
SHA256391d85e54e0e828dca9747fb35256b3cc9228d4971af13e7205b781a40cdb3d7
SHA512c70531b95d3a2ba272032c9fdf01744d2c6e6530e94a28532baedac234a7110c9b2bd3d1b39c5cda3e991b93617642ec18862d4238c26f737e3a3e24526ce422
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d59ab3abd4627ba983b16d45db49b897
SHA1a15352d3332b66a91a11473a53aa08cc8e16aec5
SHA256cea0cea1998dddae69a7ae9cf95bcfba72b914bf4ecb9694a13ff050f4c4f60a
SHA5121cbf66fe6b5915322cbd2e464e6a7a0b2ac9006a215702278da9978e47748eabddeab8f5e7bf7672298fa09d9637e84d4304e0647e27f4b9d5646fd9fc7d57cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b54466f0efade668fd7efc9b829e77bb
SHA11d2a371167cd590be8ad7786c3ec4e18e7d9afbf
SHA256b849d645a7871a4019549b5aa17cebb2f69e386927672269ff4a218da4645ceb
SHA51201626e0008a9aeceb21fef686e02358e6835ddafb6b0e1115a0b84596986f57378b44f0c77b99947981e5a4d7212594e8a60ac55254f25d455687a92b0207258
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a1cb6b758c291aa415f635f641541af
SHA1a15b86f4fcdb9cb40aa9b7cc76db25e92105de6d
SHA2562d7c47feecc318950dd850e7ff5e20696ceb1457d0d8950c28fb9aa631063602
SHA512106e6bed3342e6b5dd7b2401d1eeec19792a32fd32c2118b877601950298bffa4318ceef1e25c7721454173f6fac913cbaeb18a38352383287cf3a2217f4a284
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a12fe96d62d6fa589bb320d95c234501
SHA12be5a0025cbbefbdcde93838fd9ade5b65f40f6b
SHA256f42711967417ff04cc305b8eda71cceb80f9e4b9c12b4266640432e36989d035
SHA512415487ef898182d40d9a70f0f9354ba65955d423a86f54922bfea0ad1b5f277fc4d46bb708ea19e16b14df86092d3b268f0c57af918fa131f9d5882ea9d5cd6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57397d3b38e2ad3929ef47d32fc8f6a2b
SHA1b4576f6f8f3cd99b6e15603fdf51eaa277f8b755
SHA256de09eeba91b55a9fd52707645633fd1ef5a62a30049f1c5dfdb0b49d7a292dfc
SHA512013c46ed4030c2de0548f76e3f18a5c33809272f583bc8e69e3bb0a5f802f5af35613ec85a2d899f9d46110be40f74b5a100eb8b4b96170ca1bd30f18afcdba1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b79fa9c4677157536537b7b0b54454dd
SHA18f975d5b58d2001e76873a69ac10937197c5d718
SHA256cfa23613161ee3ed127553f8807f47e1c6ef9ddc737bb1acc9bd83bd9fcea859
SHA512a29ef20203e6640aade3be8400f850e97e8a0ce758799541d2a61856537fa730b33fbf074ab95ef5ad93fe6f2c0c61151d8d8eb0164b304737a49ab7bdb302fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5561df9ba9978c623c82abf000582f849
SHA1eb1fba78b123becbd355083dc9c13fffdc86b0e4
SHA256786d9caf9f06c666549308e07d994c8794440b72ea580313dc34f8f88b191b8b
SHA5125c998719855bf025fb620ba300e2ad8d573d92ff179449c9968f7bc0d16fbc4b45e59b408fa029ec3c405f6f7b05a900136f9c1097570e2ebde97a53387e1740
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8d235208e3b44c67ffe5df88c40b947
SHA1805712737dc4b413ca5e1f5eddcaadc9da888e11
SHA2562a8b17e5f31c8f4e88201ac1967f2ae08046398607abc80834a11f6e2f921344
SHA5127c7a900a08e20f83603566f08e91908960acdfe42840dee317b597ed5ffd704cdce976659717d6315148b860020e1574124ebef780888f049e18e0d13a74e131
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597b768b0d098a9e8b5572b6e91e6ea8c
SHA1c105eee914aba0ba899d22d6a5f591113d0387f9
SHA256a52549ffd91f996a4c20fcc09fab20022d46be76465578a607316c7bfbd876eb
SHA512c04252589605cbf54461ad1a1e2197b0bd1f040015663190800849cd31c4886546854154215663c277173767e95ab53d1d3deedbf1175b4f2121cde057bc1f62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53646180ee46f8f2547279cd0e0f658ba
SHA152d003475536c821209521f114bb5919eb3a35d3
SHA256f1d839426d24f205c8b4a0f9a3bdb2ef0dd5db5d76c6374f7b1e41dc95ca59e0
SHA512dd8976214c11f58d37612870a54a93d2c8ce0e79aa8bceb604733b893920aefabd14c2695bbff5b7d4d1af2e536973cae72c5c04f97e58d256c8609d85ec3c14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b824c986c64f987117d6223fe1e620cb
SHA16ade08500383f5e4b386bb28727c0842c8139e7f
SHA2566bfc40483a388808515b563be93f57d84dc4e83b8809f546ffc17a0fe6e66022
SHA5123eba6b9b619f09ad4279910b00fa2d9adac1ac75435eccf10a49d63faf222a16428696e3f9d90adff901b6f3fd7f3966c707657dbd60b08378b0e1f88f0eb6db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b7306e772271d4af0bd67d1f3a1d62f
SHA1ef963e31bb0cd9deb4901cbe47b234f038e02ec0
SHA256183493ca7a9a77fe92157a7a26a739beff124c33d72192be4bf711f3fee9a813
SHA5129b7357e1fffc967d77aa702e7045010a6332e281e9c43732454a1499697ead2613de85064890668c3e60bf1f4442e785580561d26338da9666160336d11f8774
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501b2d44c5dfa18ef057614f9b829225a
SHA1529d1420e586589cac770278e6fafd98435bfe1b
SHA256880aaf9a919409aacc3a2637197e9b17cc1aed744a95c7f93af1a4a20e5f65d4
SHA512d3ed63adc30d49a7b2a023bc46defe99ec9d8e7438fd304f17aa3157f34db1fc2ef9786e659419c83ed2d53ffa8723c246d86071a271231c9ee4b9a54ea1ca5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c698ff48f25b36f342d1d077518a8ad
SHA1839f55975f70e8f8326947410cc73c5d4622385a
SHA2566045138bcb9a2ac8bf9ae452c560f35e3a1dbc82ba0ec3dfe238dd5ef950eecf
SHA5121c8c0f60a0f065dcb23fd17ea4e044dd707b99ac4ec2233f3339c638b43f771048ea728ac4fdfcd67176ab4b038c0c797eec8aa16b18c00f0d9db160ed6a30a1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b