Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 21:03
Static task
static1
Behavioral task
behavioral1
Sample
b0d4fce45446e8225ef51c89f8f9d832_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b0d4fce45446e8225ef51c89f8f9d832_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b0d4fce45446e8225ef51c89f8f9d832_JaffaCakes118.html
-
Size
10KB
-
MD5
b0d4fce45446e8225ef51c89f8f9d832
-
SHA1
8e14251eaa8d939f68558164e6002109a86be2eb
-
SHA256
cb50a004b12ec4a5ca6d0dc277e94c1c053c408074ee66ff73ffe87dea1ec331
-
SHA512
ec0a23a3ea4d379bd2ea86261576350af224a1a011d70199e48299d3bbd9a7e4b053bbc952fd1e4ad915a57106091109bbc485fd4c992aa2cbe5f0ca022da8a9
-
SSDEEP
192:fPn02Ru41DQVNPFQXr84GxEv9GD2XPEoX/XCS7vBoqhYda85miM+NZBpfkE834TD:HPDwNPEr8dxE1pXPEoX/XCS7vBold15J
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9F555B51-5F37-11EF-946E-F64010A3169C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a037c78d44f3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000d2d1b89ae2e2def5c17d0bec2b3088996f3cc057377f25dfc620af03e0daa49d000000000e8000000002000020000000fcf7904b34032362d9fc079191036dcd9e63fc79c705aa9193e7fe5ed43a374b200000000ab70f03e265e61d7bceb315b2f693d2ef2cb2f5b3b0e5c42aca75a1d288f2b440000000bf10bf1421d3c6aa473d5ed6266d1c5b0fc89ce6e4862d5f5dff8c9c6c0ef5ebfdfb47e6655599a6b4469fa7160ac5dffd21dd764295cc841ef64beeca914d3e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430349665" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000416b19869a33be073fcf7f8d79518720e4434072aed446f3f084a99eb5608b61000000000e80000000020000200000006197e09814d7f4e4ec07d0e640355856b16bba3e395545876a9628e652f1457090000000e4dc813b1ba2a0a438445cd28c80cb7262ff2c036daa6a66e484ccbc6682399dba7ace4f5f6d2df68e493cde2358dcbadec4a841dbbe637233b4040e04d112e8c371dc819a6e8def1b001029f1dcd79c9b06eeb6189d69594d4a59da9c50cbd4ce532004a6b20e45a92d1eef1ee5aac93240cec12b215c24ce92091d8f3de0f086a23d5081147ddfa12ca803a32808a74000000057bb0d23eee7e056fc7a24d784d27e3bfcc726134e486f488ef44ebae3f86f77214472fbe041474d0b2b80834705895819d591d35697af186b1bae3ca8491820 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 964 iexplore.exe 964 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 964 wrote to memory of 2540 964 iexplore.exe 30 PID 964 wrote to memory of 2540 964 iexplore.exe 30 PID 964 wrote to memory of 2540 964 iexplore.exe 30 PID 964 wrote to memory of 2540 964 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b0d4fce45446e8225ef51c89f8f9d832_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:964 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ed6f93790b18b0098ce20d3f37731e0
SHA16de525f895cd97a1841b77ff094200777081afd4
SHA25647c55d3b5564c252b5f9f5894256f04a3b1383805e1aaa566ec31b1b1226ad0b
SHA512c3df475be3ef49e6880778ae611dd6276a5637b136c0f449dd5b58d45a1115ce6f1d4889e74753a6febc945ffb5114aa4c01778889211803f003011d3c507a07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54695a02227dd26de3f33116fbf3ea5ed
SHA139efaf7aee05fad3fbcb4aefb556bb74be3f253c
SHA2561d8ed0b0d23552c5ec68e4e7b3fe660dc60050efbecc3da227ee2a47059fae9a
SHA512bca574ce25821af35e6128f3428a1c50c9a017a1e66d006f7bb19c98a4f6256dc9f612a1e70455a5f50e4f1e1237ced94f441fed341c2489c5126a60047d1bb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e20485c9b98517f49ea67fced8beff0
SHA11c44bfe036694119266db8b9b816e32f8e938bd6
SHA2560134737f8746a65640613865153c86193c3b4b4d72b5a69743c4ec6dd5041cea
SHA512de6457199608cbaf590b83b900c060b6048d6f22c766b625c5950fee542ff06a6b2ea374ed71b10f3c184551661008e4ef48a00cefe05e44ba24c2962cb2792d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9f6d0a30227fc1c2019e26b2b555206
SHA1290f874f1c7c8f42ec58eb05984d28d3a5dfa311
SHA2564336667aa64e841969f724504a95199654caf495b8817e41e5f585fd49e9af4c
SHA512452d6c32c1d3b7a79509abe06352b302f12518895f9d93d7a739e05e5be852e3ecaf76990c4a913e19a82dded61039d976f3169e7e8fd4cc45a2a4f38523ca44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bb4b25d939c66a63bc4af30fcd95b4e
SHA119b0ef93f409703483a8a5170612924074effcb5
SHA2566ccf28ba0719d91f8ee35f530befbdebab84f0d20858559ae5046841385cc1b3
SHA512fecfeb85efdc01aa2c532c69fa1c5a2bab5bb189001eb6449b2bed91dd113277e8034be1b332ac15763cbc994114c9e46434224dd4c39e592527c0136738e47f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffe85091062e4ffc3006295ff798b097
SHA192317576e12b4bed29bff08ff6ddd47de25193ee
SHA256d9970d414788002136206b0fcc8fb83e734512e4492ebc0f59bcafdba0da15ca
SHA51280e990dab6e2a0776d693337b4237ed9cb10c99404add95425da5a7a1ea86fc16fc8dff514a1b69660342c80b0aacbb1eaf0d546b58c8fdf12c05ecd59819463
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aae2ca5b5b458faeda6f00cf84e87e13
SHA115145c3230a051bf6a926e95c5afa2fe9821beb7
SHA256b1147548b0fbd8d9d0e7f2d1ba949fb64eb788073416ddf055b72f7a11644d7b
SHA512a1c12c1753501b63947dfa710890c27accc77e9e02fe77233a05a5757fbffcec4fda9a31c359d7bc5835b48ff0248643e4cd95ec83ac4ef7d4620d9cff266dbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512ae491aaf447c0c737d21b445d0c58c
SHA1ffcbe09f79b5c8469d73e478184897c40ae4290d
SHA25696a005d99ea4405562c09c7efe9ed8fc4a422056ad4a0628c0c85dd939ab34ab
SHA512b7cfe92a376a828c24dcd55e04c95dc5b98876519fb45fb269d729acf04a9b48b9997a38f9f619530e06cfa2eef2ff0d67e40b475627d3e87efc8068cb63bbe3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531ce2869cb113e12a63301e0b368e8b2
SHA1d2114553ec15d7f5cc2884a3921892523ca48cf8
SHA256a0c2d987de6fbce4da3466ae5098e40262650fe7420e4d0a3096efcf0cee040e
SHA512b239dfecc22483000730df313aa4d595c430bfd903c4b84354ed27947f8aff6660008040f7e1a811062f7dde4d8bdbfc592079278980d0be9e56c608c6bc4b43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ff3ce4bf8349c0cf7233ea3d6d0186b
SHA142a22f7459de07592f83b5afe943faeb0723dddf
SHA256b3c39ca9ca742151e8db00b7fd5f0ed38c6321ca239100c5052c9e58ac66d947
SHA512750b01fd733e24c21f8e546809d410cd1f0fecd56a3fb16d560d3885068140a03487d602a03c892d0dd80afb1c4e7c834e9320090dc031546cf4943adbf9b3d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504f4d7f871a0b40f52f4c0fb466aa04e
SHA1c5c077654705431dd0a3adfb3a0067b31bee6227
SHA256cbfd7f2b61a7777b3cb093dcb4b258603ad48b240b2c6fc919e3f3c7919aaab8
SHA51243df90754ffe831673e4fe8d681bda9cf60a2bd2203f76a64d01c3d418fcd3a5602120690e7913bbc6106de4a01e9baa904923cd12c5dc93583fe64451e07855
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52471780da4e8f08c0c3ef66293781e4a
SHA1eb68dc7d8c0a062ac91b1ce09a9d0db60d51523b
SHA256bce2954ede354b83d461787ff5744ee884fad4eb9e89a854e02df8fdc2f39ec8
SHA51282dcb185f312a271f7fca6012c33a98f20107b51e9960b3e504ddd90bb8708e19dd5c6a72898e5121a27b49e5ef66c2b87848498d343efbd41bec363113fe220
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0ff228de74f75889a79b058834db7c4
SHA1a47a060dcd4cc3e328670d6a362f9a7ad5e0ab12
SHA25647f8007020cea7729ef5388dcba7618633558657c6b5bb8127ca7cba228c68f8
SHA512ccdfe23d7e3ed4ec9ed3969efc65ce2a871cdfe5e2166e1dfdb9c69a9ac14ba3a34a6af579895985575b454787da7529ef5013acf15071e0e58a43a87ed104f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f0e9359ef6c44cb33d4c8d64a2b495b
SHA1a3915aba95dfca9b575c6d2bf153aed792135a2a
SHA25645c60a1f4f497db9114543b19c77f6285dc51f6c3883e9be90e3696b70e9b7a4
SHA512b53159e8cdcbef2bbcf578a99a117c35bd4a530374e83eb48d44ef1e04ef5f44a370da84271a9d48187148ba8dbc570ef1e863a3e1c8f375a954d0951483705f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5908c847cf4887019dd39f27149496d40
SHA180f1eeac912fb2d8a4361c3f4fb081a665f18152
SHA25604e41d5b05a3666af5ae4ca2974056d713b16c99a6ba53e339b496ab92e1484e
SHA512ff70988229b9ecd5ed144e0e235cc084bb4bc23b69773fa8e938636b618ab01e92900080f558e79db07be36d953c9c91b5d905d165634cedef6036482dacf395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dfbcb94ed25b0d29659d1b19c4a05cc
SHA1041d7acd2be4b1c5e3c48d452e0245235f6c8579
SHA2565c1218f3c9342a5bb35687481fcf9a2875d7c1d100ac63dbdc54acba50b58b15
SHA512875a5bf654393bd21ea924fdb8b884a75b84312389d76f28eeb0fecc4d4ab6ea430712b4341bd82e981f288a7a97268c80757361909031d9fb00fead6f338c01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbcee0eb50d4d376449a1a6cccb20456
SHA1f2d884a4aae2360f07d3d4c04ce20f7e7ecbd47f
SHA25673e1e42816138baf4863a1cc3bbcc11ca3ce3952f79317e2646e43d13066d658
SHA51264605033197e7113cddd69faeba6f5c988e5448f3b50af4dbba673c98483ef06428b1406db040b69ea27fc75a1890a27cfd7dfa8711594fab4f1c4e6b7347def
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ff8a12bfa8aace5302b80b13668bcac
SHA12114bb6b78b5640a90b4f62f1d954913dc2529d1
SHA256c5a9df321a1ce9c1219185c8090b4ef5256e460f162ee9d804a449988af820c3
SHA512fea371829407585669846a668a08587bcb3f03e55edb97f9145d30209dcbd4e980b7506864251cfc612c8a8c6e56fda22cc6d3e5f788b8dd6f72dc5a6ee8c6ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de63bc660cd1b7196b4d059f70e47edc
SHA17d6ab702a3f2aaeef0be900423a66bff6d66ddab
SHA256e44446eaddc607d06571cb32f3dfe3c5884a9db0be2695a3949f3b72ff73ba99
SHA5121563e8350b01927a10829c628acef39c5dd9fb03850c6339862ca99e3657cbe96c9fffb8c9fb55ca6b6af9a645955f7cd06227835c1e686a366d7bca1bc06dd9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b