Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 20:05
Static task
static1
Behavioral task
behavioral1
Sample
b0a42a4d12a0e22d757fa99d00a58dfc_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b0a42a4d12a0e22d757fa99d00a58dfc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b0a42a4d12a0e22d757fa99d00a58dfc_JaffaCakes118.html
-
Size
2KB
-
MD5
b0a42a4d12a0e22d757fa99d00a58dfc
-
SHA1
5472101a713748df69b934d64a689696db566675
-
SHA256
14c3f44cd12e52629be604df3da13a5aa101fffc3bf4b08ceb9c15e1eafc0675
-
SHA512
ea1fa0c80e0b3c9624f478394864d5b03c7c76553e0f6f24a4c3b35b4f62717803e057b1f7e02a4f455e0a6400c39384803d776e34a609cda6a1ee833af53600
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000988b1ef8d70f4e48a0a14b188627e93990e8f6bf06f225c6d42e54b16fb7508d000000000e80000000020000200000007f019bcf957f7407faa36f7acab730318de16a15648d9bfab5e7db516d76575320000000efd201dc3df9c76dda94a5f0bf2376d92f306db8c1e5e649ea6c1aa88b5c2f4f400000006cfe0043430b8546bde6335451d32a379afae2d4c0264f40226a0bbfe22e26e761c410f6fb16254335f702b2172610bb3849040e967b79e5d9de237b0557fc49 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{88B0F1F1-5F2F-11EF-9BF6-6AE4CEDF004B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 202a795d3cf3da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430346191" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2084 iexplore.exe 2084 iexplore.exe 2436 IEXPLORE.EXE 2436 IEXPLORE.EXE 2436 IEXPLORE.EXE 2436 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2436 2084 iexplore.exe 30 PID 2084 wrote to memory of 2436 2084 iexplore.exe 30 PID 2084 wrote to memory of 2436 2084 iexplore.exe 30 PID 2084 wrote to memory of 2436 2084 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b0a42a4d12a0e22d757fa99d00a58dfc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566d1a5ad6df93210485292bfe7a48a5b
SHA1a5788b7bb7d558a07b09214673b81ce2a67b60c2
SHA256a77dd9c2d0dacef292bb9a7fe18350ccaa6c4d250455b0e3f7dd6b55a9a00cbc
SHA5120ffebf5ae70100d84d5154bc64a331c4c68a9b2750855e6bbbacc185794c5024bd3a364456cf247d1ec0d5cd987ab39ef2b09f739d5b0600f967b5d2376eec58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55154cd7adb4d619d7c70e3d79e92cb51
SHA180c5a1cfca5bc2a2f1bc4cc559d3484519df4c17
SHA256d7649cd01c744609ce46fc522608bdf2b2b7d8043a1d14a80c44aeff0f59a7af
SHA51233fb324626cc0b0041a203372f5c7f8497b997a3523539b5238d8572fa00bba246522f494c8bef1d310b540438d110fcc22f8f9010aea358371cbec5bfb8ec93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7b04eba6819e2d53f9c8461e31eed1f
SHA1486cec2e8b03f30f902e56ea831f9a7f760a58fc
SHA256545823de7d9e57a1d872596b05c24d299d39d674ff7d020fbd4294dd5bafe476
SHA51206a9f570b321f9e9d1735382d3aabbe15bf2605710b00fc9e84b709d566c453894ff0d1b6a00fb6b2115e3ca56e51246c968d70d0056819b18b4e776237b8962
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5814edb5f7a41ca8105a83a1850ed46fa
SHA1211174e3385dc6e23b88b925effa77d0f1c61840
SHA256358fcd2819ef7e3b457f837cd9784b0f74eb44ca0ef6cbb030bfc30e968ba018
SHA512fc8bf5e5bf6ba2f7a9042200e20000c22ed5d117a16d3c136749190cbe62062f8da999df4fde6bfabcb188d36f646cb6804d569b6c8115f2d606c3bbb03fd549
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d19c3f66312d73de69f573843a16ea8
SHA1cb1e844bdc2eb60eecd8cdc10e3bdf4b09fb6e59
SHA2560d62f2ea3b6427680bfd26fb40d4c72ebb242144b126aaf57bb1a93802b52d44
SHA512cc78442bb8184aa56eaf50fc7c34ad582b852083a5425dd986f9d583b830606d1f63a53875730da19fc9a7959fe1f6948b6b9cda740d794c4403aa90d6e40bbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543a3765c0d29334ac69c5fcd7df0cfc0
SHA14c2de04087112b34008da34abe69375d22807339
SHA256fea5e898e24fce2dcffb1f72cfd27368caf01faaef68074cc601a8aeb89d6dc8
SHA512a21946f2d91f6383b2363be53ebfb12ab47122d4ce33bd87878c76296069a2075d835783a96ab7d13cdf0295ab3be7baf74db0b86b499f3ed8048bc3a52c06ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52830a9605622826ed4dc80834da9d814
SHA1409ff9cdb9cd310f13d11144c76b29f9aa342c09
SHA256e399e7f0631a258cfc956b89d0f038ee3c88664e9acf13af0bceda7db0e055fa
SHA5127007091353f313f565349bb1c5717ae5e80429a60a0df9a82c5a0803a34323b042a5bd63bcdfa033ec4933a98635d0254efa1e1757230acb928e083438f27b67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5827a6e58121ca54849fa31d2387b1171
SHA1505792994b6b884211272cb288ae2062e1e498c5
SHA256e8397df4a108b103be21985219f8cc99803e36bd9dc1b9cf8a8870a7ccaa3d45
SHA5122ef01bac2979063abf10f0701fcd305fb370e93138addbc7b3d528f82cda896851e4155e551dddb7455a305ecacaa382beda03da6bb881d5ea88f15d9ea378fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1fbab2780c752edad778bf4a4272c50
SHA1151cc8f69ab6f16e9d5c8b0fe9f60e844f373569
SHA2562ff9b8358bc333aa0ac73903290d1ce4f88c3d150bc713e4709c84836c864543
SHA5124d2d8518a37bcd09a6886acd2cdb6ca670af4cc140bc354eda3e362f0411230dfd48169897ad990ed2b88a670922e61f9fe12f35d4ca31e43835aa49fac4072a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e94c7c5e89ec1ea449d16a0da215a236
SHA19139134fa058bc8f1e14fbbe48f41438ed5f9da5
SHA256c3d8b36807c0481af2add5be724a5db2164761dc2eb8a1bdd31ad8c8897e3221
SHA512d5308fbe4c9b8e9d48a0d0ebddad7fa8f16f691980f0c764c6ffcdc0f637d2e1de2f04837b576936e310bf496653968027619628ef8feb1ccfc3740ff84f6f56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fe72a3766fd82d13428510b49a63c3d
SHA1a3ccac56a18288acb4443f7fb24813e7d5a068b4
SHA2562b117472a709016071ebc480842b962aed17b53b11f4d55f245e9c5dae87365c
SHA512d02227cce9ac55b4ca70c7c456d9de63aaa78f928e38bf76de04d35c28c963aa5132a912205b6b97529e9b33899549169687ea0ec55ef312a42a866297038de1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0e0c542cf607efac696fd14c8ce1e1c
SHA14a931b8cb6f72dd33fd317460eba3f5f074a262b
SHA25638143e87b20653224b84096f3e27e9e39d99400b9e78933c845dfed110208648
SHA51201ffafbf2c38031b6c35664f79f894d55a3fc22e4cf9d0af50c6eef4a1675dc035d7d045a9537fdbc09684ff73eab65ed3d190f5c602c099ab69d82415cd5776
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53beb581568e5c6d5f591e0d466166699
SHA1b8c3cc341b9d8b1ed438c3d581db66fce8489115
SHA25682bc1e07fc586b806ba0a0cc7e5b5e700262fa78906b8e4896de260acae6fc22
SHA51276b0d17dafa96fb1336e2d9b8c5eb4563dcc26c65b81c84f156ce982e1bbc1b4f4cb0263c39f5fd0a6498ede00c42fa226142364680fbfe1c644c6bfd73a7aaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5778d7bf6702b4a25b1e070c0956c48e1
SHA1a593aed7267b4f08773ba982a40ad81fe8ee3e66
SHA25682f3cf9fd235327d920d48468c124038ff7463ac8587d66d578ed27e565abdcf
SHA51226e5a39df6b14d8f62ccd1bae707187c1db4b448b4afe25af3cb44d908ab1256ccac6d49a2ae854c9f901b84a329a6850129701d10e1a8c6f6381a208b7175bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55adec0eb80624fd9caadbc3c0391b721
SHA16a370d4c60de29e0f90d9d856d144ad838f96f28
SHA256cfa3ac8563408ddecde16f00ad43134d3306fd5c0a606c3141b4523b50cd05db
SHA512fddfdd6f0b3fb5c993412f716d773f629994e1940dd17ea37958081336163e7b2734b439bfc058122dbe6919608450324134e7291f232320ec8a47dc506d4343
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538d42e23267b57db00753e40e903154c
SHA1d4b2ddbfe13e4c379ee77f71c44901c7d8b46a3f
SHA2560905bb5187ea78f05229d4c07e9b687a3c127b06df4a574af67544b8e6eda192
SHA5128cef16fa59c4b3f2a7af4c4d02e7653eef80454bad0aea83f454de974fbd060508500207e2ff340177c988caf7f5afc0fd3f903809d96cf5ca1c2977e98ba4d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50275b93f8093f31eac17d63625b9a827
SHA1ea3927a9f8bd9e29e4045148564c40d46f86b3ba
SHA256ee1a8c6676b3baee185731a79cd55bf63b44497de7d4e77a93d04dd7dcb4de07
SHA51229ec336c633a823a203d560f50bd387d746d1f3b968132beaa126481a55b21c796db5fd7c3fa8316cdf7ffc82c9f3cb6e90b221e5e24b2edefa2e79996361c9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f077cbc66cdc40e56ff51e6b8dbdb1a
SHA1665028b513e0724b4cb353420b480301c45fe211
SHA25616d3bf600ecb1e6ef263e9c19c4886a40f4a1cfec8ccd29907a0103a151101f8
SHA512b29ad3d8e40a215452f971e96460c0449faddcff7750993f1411e9fb00eafdb9eac1a50be843eaeea909cab30f2a96690de1d3a8d7f247ecca4f950a96ae2fed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d165556085e99d3cb17326b9ac6455f
SHA17355a4e917f0e3a3ab69da8167de4ad67d0425b8
SHA256b448bfe9ac95ca0a2546ccdfcb9d28c2c943ed7b958fcc18bd51ef87fe8280f3
SHA512fc7d676eeaaa3b4be8bc03069589b23925e2001d9061f0b5b866bed22c40bcb4a382c300de20d235bdb1658a28409bc8475d6d7366ab917eded000398a62b91b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b