Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 19:44
Static task
static1
Behavioral task
behavioral1
Sample
b0933dca2f0b15b1b8b32188e6f14c17_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b0933dca2f0b15b1b8b32188e6f14c17_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b0933dca2f0b15b1b8b32188e6f14c17_JaffaCakes118.html
-
Size
11KB
-
MD5
b0933dca2f0b15b1b8b32188e6f14c17
-
SHA1
350cb99cacf111890f95296c65e29bdc40bee05f
-
SHA256
7cfef6fdd2bc623e89150ab37ae663890aea212d567341950846259cdd145359
-
SHA512
b61a38d04df71482a05b325e1673455f47d11392e8b208ea8147c5b808e4a7cde0b3a0c597943b4d8a0cd249d1dae2a8cdde2b6e52d52b16cb6224ba0ab96b67
-
SSDEEP
192:eE1+SBJu4QevfLMYh1X0Yrm5ORg+nGKDJB9lewFRL9CX8P4PFm1:31R/X6OrdJ0wrj
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430344936" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000f392e13a9371da3c794203a1114dd2f5da1d844a75ea0f78e205df7ce044b384000000000e8000000002000020000000d2e5d132f75d39e1e71fd3a499e3d80b3b4e93e621d626b5e03f9931782cb068200000005d89ce335179493da68f2b08c951094e5353157c88585012d42828bd30f0f9ea400000001c99fb0aed44a2bdc25cddb861dddaa4aa95788d2f014732b46f5357dd66956e12dfa93161f28b1dd2a46499184f906c97dba52787b3ae75485b83ac7f1df714 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9C9E6241-5F2C-11EF-8BBB-46D787DB8171} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60e7818c39f3da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3008 iexplore.exe 3008 iexplore.exe 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2328 3008 iexplore.exe 31 PID 3008 wrote to memory of 2328 3008 iexplore.exe 31 PID 3008 wrote to memory of 2328 3008 iexplore.exe 31 PID 3008 wrote to memory of 2328 3008 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b0933dca2f0b15b1b8b32188e6f14c17_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3008 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a994ce37977dfd9227e785ec69a2727e
SHA14edb54398477cd8cd34fd9189c504b073e531fb0
SHA256839abffa0fe0ae3280fa6c635e084976c1c34267c367aed3de4da6b27208c44c
SHA51267ed6359653d8c3492ac90fe728db8ea0b27449a5328c2ae5f3a588868bda26eeac6da8ec94642ee3a3f92c97b8f8ed89bf8281d56db39e446de43a4ea99845f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55032a3207f9629f2f40429f5619fcfe3
SHA169241d0e8e479f0bc50844887716ffb336415c60
SHA25606b2fc06130e0620476f3ad63bea79009443d664eb39fc5da0bdcdbf8749dd79
SHA512fad0abc30c6842ad5a00a4bdabadbe688b85623f983db9e2d9cae1ed655903171ace007399bfbd1adfe96affa94ba2b73042639ce879e22e5140759e72b7235c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c66af25c53ce455adba65e882d9c20c8
SHA1ff91d646e7b7cd4c2c94d31554d6beac555fd6bd
SHA25697dece6609ac10b2e133ad43a823b06d8e8f67f84cdfacdafa26046452037568
SHA5120c8c43c1af6c3169e282427a4f459cfff2c7e51f853793e2fdf22edaa34cc71b561e6d85c073f083fc506f47999f5b54f62cf68397c3c0f94e44ee8e80c15231
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588f91936f2e9ce87434057317235e564
SHA166e6512166123bf1e0dc6b42145bf0b90b01461c
SHA2567d14215af4f149068df8fd698e6ed249b25ab0b41fe5764b687fbefa164513ea
SHA5123d96fb4a00992e4431364c7e23b89a3f77c462fe7f1361f9ccccd10ba3effeeb650269fb9b1823ceda58ae44d199049ad600f2db6be79e1fa2f2b87c5d726b4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7effdf1c1b56add2affcd7effd6ae3a
SHA1595031dbf64da338b8031f6c7f5088affc7b9a07
SHA2568c671119e59ebbaebb338f6b4137a577eff6150845c921c3368cf1ffdaf623fa
SHA5125bf1747c5bf3737e9df756dae6200de125b8ded58f925cad0ef12f698458bd09ea94498008214a55d211e8423a62ee8b5a4c06610e3e37375480790e7fc09dbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56af555232b9dfb40e935a3287778865b
SHA17c7f836e429b227fbc5238c9955c7ae031bbff51
SHA2566b247372a9f5c52bf7ea4ac7388ffae94e69c79c1400139b491da68569b813b1
SHA5125687807932e9ee5bd67fdd9389eb9a17ebcb1c30dcb5d106a71a0fc0ca2d5b50ac54a9be2c952a7d8412441d29b63cdff043b2fd97449e5aa357698d6cd4b03b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e945ac60ddc8e3d1b1cb51247175f478
SHA18d6e4843f7595fde67619be062a2c87fa8a4b8ab
SHA25698300a9a4b54b971abf3120b5ddd24ad2ac5b8084635f09379e14cc131b4d4ca
SHA5120e931364451d71687503a4ab53b84af0dc770c645b2cbf278901852cdfc526abdebe0b9b8db817cdad7a8e0eec17afe938c0998f3832550bd664b688b0022a2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6bf09c7e19720d6c0470611234f1369
SHA1f017f75f8b80d95336ffb134c9d2b22187e8037c
SHA256e4b6b8484fad3b5f19849f010a999d0afa6b4d3a68ca4b9fd5087bc805f4dee8
SHA512d6c5deaa55ae09bdcc514c6caf6132ce4a35395459bc20f81370a2c85ea021ee4d5d823e7af07f1f9c535ed406d6b5b62d8c48200db0004fbbc110886ea5133b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b293783e8466d7f5ad712651fd0c3766
SHA1094121bbae839035a3e9592b9d719e3224ea4a0d
SHA25662f7c34e700ef039025f6efe16d40d4ab4630d6a3d172fc7e41e6ec15aecae3a
SHA51220ba2da89db7d80ccaf4ec27d7860815a32886a74fb788045416e8b95865d0bbb0387f5556e50fa51bf55814f3260440178ed49a6cef2f04459bb8fb7de4a268
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5150f2207d0d8c0183806a9926080f920
SHA125f07f1a69875e0605bb4aea8d5f5500b87f3442
SHA25650d506886c9061f5f05ba6be5fea7123b4f51bb223aba4532bb3e847f5f525a3
SHA512930a589a5aef6f32d3b5680741eb189c2a3bcc8d8dc032ec813a7477c7e27d1adc9c667f4689cbbe5a40ebda317b7f4482fb59194e7a436b81afad1a66d519ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b91839bc2740275e520a041166ac270d
SHA19fcbf287a7ba8cb744a7ca3c6fcf13a7cac57d7d
SHA25648de3e32d93e1a79a78fd795fa1fc6e7945c9e891a76d40853962e6e7bf6430e
SHA5125b82970504c5d857147807fe9a9f96899863484ae68682eccf63910f2e693b034420b09a1d1fae83d6d7f5c1b6082db0b004fea0000c29972b566ab23bfee82a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d211c6257495a14eff92893d11f83909
SHA104652d4f7bc3ac38e9d6388fa83bdb933f6a060c
SHA25651a62100926bafee72d60b039f7646563a80fb2ae7a2772e1425f4b0bdddfa2a
SHA5129227a529a9b63996107c424afe16cb352f9cc30f678a423cf8ea31bc589a3a12d53a9f9a02745e5431fbd5f18fb0d746e2a268ad4edbcb3e8de31b3623837c9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583bea38175433f7fa3de302b0dd46a4e
SHA12a02acdd493a9a1291dbf1c849fb8bfa82c91138
SHA256d0342e94efe68db4a67659d310fdcfaee66a778763b843263ee0e384fd83ca32
SHA512ae0ac87931f4fbb9ae1a7be633a8e2e2e8f0b568720ca408ee860c3a33d2b2e4fc52d3155b40754ec352a09e557b78cb0fdd20b6bf6cd2fce92ff66b85fd54b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520a0f5e665acf0836d80795deff5e5d9
SHA10c846def22fa9ceefcfd8c0e0cf550db68674ae5
SHA256513215d76f520120176a7bbc756f5785178562450fc2863c1d7ee94665444f5a
SHA512d73e1a6e705bbd9c970d709025395b56bcc71510048384dda3325ac84d2b88def45c0c369b19b4691b468d6ad0c1143845be33c33bf25ec7091bea9e8ea74fc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53138b21a9405472154225b160de492a2
SHA1659419f1898aa28675ab647b194057b1f4d2732a
SHA25602f794d0414aad98e07614feddbe5845d838cd2add1cd223a8cd794b74a9efa0
SHA51289858876fd326557072c8403608561a12a7b4e5f4f49377045d0fd8443308193f57b37f4cc462029a139c243d4ae406f7b059ff77831a3497033551899d8a0c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55550b3a2e7d6f2d2cbadfa4b82b78d7b
SHA12501ff289fa4663ec0551617d524b21a740299d1
SHA256cb59c80d2bea34c7e4618873631ce96a2420bd84ce6c46193da96768406c3388
SHA512b0afb6955d4400c4286b7b917ad74fa1e9f36f172f08ab403f9be058f74fc0513653b8fdb0159625a7ea50fcc28906b249f5c3afb2552294cefd6f4c330021f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e57bdde63c2ea6d41299c5ee83c5054
SHA190288515a3458de9d112fffc9e9e35333b66605e
SHA25677eb4f5e414c953678be0566d367d97a889ab34a03475c0b5042b5bb804434c1
SHA51275d017578cc1e657be5229cf4aafff4a65404494e75afcd9945cb29880b1927c1abd0c3ca203ad2ebf7b8a29f35908ad449738c91ae568ca2c0ed41735a14b7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcde80167d4b9c0a5c6d453836c58d54
SHA135f9fceb76ce5410ac6d34c54794254efd5eb7fe
SHA2565c9ad7d6e47c7193a5d76ee83e42cdbe8a3048ddbf8e5e531f052713c365d480
SHA5121ce713f49528c96e1e2c4c11ed0dd0cf45ff95d45141fe7233fcf1053b28d89a8a18af669d74d56f1d72a8eeb9caea18b1786dc91f3c69d8c154e1270f2bf8ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516df5ce0fbbff50d7b4107bbc6226a42
SHA1d9a5b63009acdd49623682902a1e73f236489efe
SHA2560bb30563bbacc54a9666fb29c4edd21786dfdd5bfee852f59ae051688782afbd
SHA51246b17246ac5d1ee7b333e548bf7e6e971076f0396edcb2ba93a90456a11e12e4c03d6a90bf5e90fe0a04d87fc61b02f15d8b9307c9564c9856fbafc4adb8cbac
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b