Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 17:28
Static task
static1
Behavioral task
behavioral1
Sample
b028747675c9de108fadedfb65e46920_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b028747675c9de108fadedfb65e46920_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b028747675c9de108fadedfb65e46920_JaffaCakes118.html
-
Size
2KB
-
MD5
b028747675c9de108fadedfb65e46920
-
SHA1
5aa413dece864554f2750fee197c7d77c16fab23
-
SHA256
b35398c20daadeb6cc29081991feaa41b837876fbf4a0f41ef9cf0d50e327464
-
SHA512
bf484474b8b1ebf9561f37dd6802eb38b869185ae2383b5684a500c2e8f92318bc2667ee65f45ad96bd500abf4882a4d06c568b2fdc9f1a1fb9865e8f2cde388
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0dd527626f3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000b9c23610eeb9b9f49901746dcd24f7a8399e71abe37e2bcb0ad3f7f8740e214c000000000e80000000020000200000003e5b443fe159a71e6709446bbd37b800a6e06e2ad0fc9a497e3a89181c3d307620000000a0ab61affcedb95f25f58b21dc3ef634b5320928c4e404228f534e720d223712400000006dab9a0719ca39f29d099643b87156907cc734f2838dc7a876815eb26b39d1dc6d03fb6dad0f8d0c606b962667724e9d373ba9575fd45ebcb9996fc7e7d5babc iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A1A45001-5F19-11EF-902B-EAA2AC88CDB5} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430336784" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2524 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2524 iexplore.exe 2524 iexplore.exe 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2148 2524 iexplore.exe 29 PID 2524 wrote to memory of 2148 2524 iexplore.exe 29 PID 2524 wrote to memory of 2148 2524 iexplore.exe 29 PID 2524 wrote to memory of 2148 2524 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b028747675c9de108fadedfb65e46920_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2524 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5806887341181d7cc1a1a70b64aa278c1
SHA15bf13898964cf11309d0afc16b1531b3f998a7ac
SHA2565888f071a8ebecb7786f4145c90312b65e829e912d465d750db6881d6baa7c74
SHA512b6e9e29fa04167320b4e0354283ddd6979f6de802021dc6ff2d84321fe962898ea4aebcd67e42474da60dc4a3c088714a6e49d2faa76b54be67daf0e8d0224c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e4acf9ec5a7f9d888c46be200f03da8
SHA1375fb13b178a42adaa3d9957d56b21abd5d60fee
SHA256a653aa4e61291ed637dd7a3d2ed95bdbd907603528f7a409221455a2a3ec498f
SHA512a8bfc8d7591be3f899ef7061971f37c0bee59de2ecd90099cbc04d50f810ed6e546fef77998d7abcb3b2e89a101b1a153a71ce1838cdb0fded2314eca5f9976c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbfb3604eae5b46af4ae68914162e251
SHA1e153ccabbf168b4500604732d7d09a8013796e2e
SHA256326bc98ffffa83fd4456be72162d1124747162f2ed4a84525ed279738add5386
SHA512e14a956130e05a32256f9a61f86ec532d6050015cd26ba52c4f1e891e7fa826060aa16ae5b56f696d26420986880b8fe96c3da3bd17af6fe0881e756d7ff05e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590f8ba100e98eb4823864c62c0342dfb
SHA1f62a64b6127e228d982448c658a08a693683b862
SHA256c609fc77dbcf7fde2357e82a4579466697b832831d887a903c054f5f954729a6
SHA5123db86f26f613e2327b7dd935e22703d35e4fec3002bd136af63214fa704f244df5c163232dbea503c719ecafbc6445ac269cf0599d37f3c280040394e61802f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a89810e5d51fab8df424a9d5abd7bccb
SHA1982bf881638de2416fb672c20d6932fb57c95ceb
SHA2564f9cac117691cf4573c87c48946fd08b339b81bde7375a5f49fae07a13fe3346
SHA51277ae14c5b422b9ed893024f80ab02e050e0011b49183e328810c5929b399c1d2a8877a408417000d8f2684eaed3e5d71e5326e4e63d22cd1ff2860ca48d18899
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5318afde469268e9b5770af16aba00fce
SHA1411930ca567efeb54a7e979164f61d0ae036687b
SHA256c3f5fdf1af5cc204126bc9e1bc5bb23c4bd2cd75911b2c3e41528c83e32281cb
SHA5129b1a4d9626a7ebe43bea545fd2545b2a56e2e6dc29fad235ed3541540cac1cf342f3dc23480b0c0371691a0d1db91aac71673b8d49a143b9881cc0b7d8a3f260
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acf64e924a23d6f100b31924816d36f3
SHA1854efb9df90c2e5c630e085248d176efbf528d4f
SHA2567f2b7e4314243f374e419b7aa2c2807e75a26afa366764656cc253f5d7ce63f4
SHA512fa0c7945abc82cec50922bc924c9caa73426ef25e511c235c33281daed901fa570d2887d9f2ff07d1ca2532f2f21cc32204e31fc22df1ee7f68131651f961925
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575ce745290d65bca9287afba1e65fbd1
SHA1b97e6552a7a94792cdfd79936d22c75db0928437
SHA256d8d09f6dff2051c2890a7395bacf25e98b56958f948e3d7b0c94543563efb33e
SHA512361d684f1a7d4cb4b9a1dc130f99c9df36854442be7eef5d633810d118b3ebc73ea02987c514954ba7a45804617b6be6d046bd72da716fd3292a448c9fcb2910
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54680e6fb485855cf5543a85d8ee62446
SHA111f89b99ca6b1d3bf08134efb9a39e626ab2bbb5
SHA256e895b7c7136e692b7d47a56246121bc9990aea431dd3daca46098dc4f4443f69
SHA512fcf7f0529beea2721fa989ab61b21a16294fa824f89db541c8ff2243a6743708ac12203ecde481a13b37ad9136c959436ac63179122041f97dafb62259db881c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c06e58c826a3fffb6c933e57875c35f
SHA1f143c0ac8c7c9719b0dd7a242844497ec7f9b65d
SHA2563d787f072f4747b91ee73cd680f239e759d9cd217195c41d00b4dd282284e762
SHA512ae65671065d9244993dab857af8b31078502c9c1c2c92a85e7527083dc6c92fc117aa606c2bdfe462c112631891bc0201e2c75b79197357ccca31f9c476d8106
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbdd3461a6623a692ddc0f04aeab928e
SHA1234beff796e2bca2c571740f8f7bef13338bb73f
SHA2562c2469b27b86ce82d1dd9fddf066df2ddd9884f28f3ee51bc08b23fe426c1a8d
SHA512ce279a0719ba9a409b3123dc40214bb9ac01860afd0da389ee1f0d13eee24f9b91a1730058ed7fe1607fcb738538e77c93aaa0eecbd87d29b588288019039cf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e490ca7dfdc665aeb994130e52df013b
SHA1f5a2c4063f9d712719e8ad7967f397b02d72fd73
SHA256d10017639799930fa6a90ba033d6517a90be47579ebd3b2b50f172d2749f9d95
SHA512ebe30b8ca8668577a96e818cb5f8b78004d484fa1cf05a922507fd58f2f5888f753d4c4313e59bd49468745fce10f2ea3449e7c52d86abb0712ec61e173d4a07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f516afe8a3b80e646a5f3a70f8037a2
SHA13318e57c5b70efcc5aaf04a7d6199e5edd0fe49c
SHA256e6697a9b9d9f2ed6d5ec31d468b7fb832752329d928f076e06eef2fe73c59bca
SHA512d176c98aa9b4413d002602ac7b57ebe657449bdc8d71a805688f1cfa081f744aad1e4d9a1cac7f786314871a9e03cd1391dec27f52c7eb07c680b27e03339104
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5000cc9ec95d43a0203f872705c9a0a9c
SHA1fbe62c7cb9b86b0df724f5b2591d2d597582a981
SHA2565bbba75fd55e55d9045ec13b74bd46d437bf1969bb926f699f8f61a046327bb4
SHA512621b9294b7b8d6d3808a08debe857c89c0b933de9b8f7ba842bf819a9c3462925ce361953ead8fbbfb1a2d474f79aadf389cad0e970866c422e68160642646a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a53a5d708f20897c82a9dae03e2d66ee
SHA11c37b776385b55f64f03d6498617710313b10c0d
SHA25676484a6ec3e79391378e0f85ad073f6d17ab072e427733d3d7c72b43c31fa95e
SHA512c5b554b1b4959f5672e28d5de6aad51c2abc68a7038302e0a1d6371b016af311c554678d7b7be10ca1e5d1f57a7cad86e35b2b276d9e9a27b0461a13a9789c77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50787f589c0f38759dbc1787c6a668d4e
SHA13e2bd6632343deea75b13e3731ed727452ed3946
SHA25697a13f08595baa9ea18814d53a1f03aa5814f2c3c71c521a8e90dc514e58609a
SHA51236c3e1cb41a5a61da234e6fe19cc504f997e3a65556eb4bd59dee2ccdb6afc81b8591566476862db91a919ecbf5eab1d361968dcec67bdd907d022fa75b69abb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5482c199a666a3672666af5ed5beae5d5
SHA1bf489ebf194f407b0a7f1ea895fa1d4d445d1de2
SHA256528b7a284f84e862e76d53bd9edd72ef733e1995fb1d9f9154f20d38ec21450b
SHA5129dda180729ef9887c2cfdec213b0b8cf0cdc6a00a3f3dd7d2e0c298837ec0a9b942fb0f7b454aedc962233b62e7379ebadab0d281d9b8f571afbe2a34fa32a46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5189720d49a0bcefdbb85849b5244da5e
SHA1bd1db64aa32ad00972726be4da5d5f3728f49ae1
SHA256c6e4d30a5e76dcb653387703f7baef1a341344622aa08e6b40ec2dc94e47a7e1
SHA512ab1df1ee47fbc17828d1a8e4af0b1abbdc9fb38e3da37bbe0c06e263f7d269c3b9345c8bfc97d8cf0a11c51df17a41f3b5ed56c6839347cb0624b786a97d3912
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584969b80ddd3d30c6dea84c1272753cb
SHA1bd6bab48eb1250f87dc1cc825117b36d5e3e1331
SHA256111c36070ea6482f5637277bbcd58ced3371a9d3c3272a0e2e4704adcb6d2c64
SHA512df1bab2473bb59c633587c2173416cf0d271540d8f3775c7e5a368a4038ebc1c4f41cafb714e389e2d9f231ed39e83a51b5eee526335aed0a418c720e112e024
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b