Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 22:35
Static task
static1
Behavioral task
behavioral1
Sample
b54ff7f77ef96415e660bca8b4e4890b_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b54ff7f77ef96415e660bca8b4e4890b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b54ff7f77ef96415e660bca8b4e4890b_JaffaCakes118.html
-
Size
7KB
-
MD5
b54ff7f77ef96415e660bca8b4e4890b
-
SHA1
f7127ddd7556ed335f307099862283eb65adbdf8
-
SHA256
4cba2e255e39b43f81f62744c17eee2cb9265e5ca20c1d9662f3af2b79cdbde1
-
SHA512
b645868730df0a24a6ec00d01c12738fce4f0ca9f32be93b2db3f51742024f0dd4dbd31ba510cb92c52d92a5e0cb3d8562dcdb04763ba5da35ff621f74f8fd8a
-
SSDEEP
192:iIzUUpEXVg7nVhiBfpIgpCh4W0Cxhnl4y:iWUUpEXVg7nVhiBfp7IhZ0Cxhnlb
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A8197241-600D-11EF-9478-46FE39DD2993} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d99090000000002000000000010660000000100002000000005ffc990bdd0b5c74a645ac44f6d4d4345e5e8dc2ff12fd2da1019b3f63bcaaa000000000e800000000200002000000039722a096366e222c5007657429b4e10c7985f06c659defd754d3c8fa0e6718220000000f5d51e4596251eae1630f4c19d89003cff423d3b83a743b1ccfa18c58ebcf758400000000ce973f4d631da5f5450ef2fab3f41d8106e2f2be2dc4f730af2d23d4cf24dc763a7c2b2ca023e8ad479ed856743328656977ed108efa7013d3044ab4e1adf85 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4004586e1af4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430441591" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1656 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1656 iexplore.exe 1656 iexplore.exe 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2072 1656 iexplore.exe 30 PID 1656 wrote to memory of 2072 1656 iexplore.exe 30 PID 1656 wrote to memory of 2072 1656 iexplore.exe 30 PID 1656 wrote to memory of 2072 1656 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b54ff7f77ef96415e660bca8b4e4890b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1656 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557ef27b141dce244f780907322486e8d
SHA109dee33fc1379264e48a6adab86b7d94d5aadebc
SHA256ab952cfbc451079b89a39b7bbd36afa6c33b890cb1ee27c33849b887333e88e1
SHA512e74a2e2b01a2db0a98197eb7afb99d7a5c0fb16d888c1f60a01f495ac5da2a616d94fde7d65ec4986cae0c930f0e1f5e83c3b94c6f46e10df6f1b282bba608f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fd48b6e5215bc92ff08a1c54da8c8c5
SHA11b69949adf979e4a61dc44ba23802cffa93c4029
SHA25638ea0005f227a87b99baffaec9800ea917832d831857d91a25b5b955bd4ce0f5
SHA5123be679fa6108fd0690e65317fbfe5fa400ef98f6fb7713905904565d5bb08c7ee643f6f08bf52623762ce520065627bd80d440f44f1ca5a649faa1f4888da47a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f0ae1f22a3d9fd2a68cd7700a0f99bf
SHA15dbbbecbe0656df532ba4d20806255f24b816ca1
SHA256a57137e001ae95960990db5910c27e9a010486a3ecdfa70a540c699603461a11
SHA512f6cee33380a31ebcaf8fb9ad4d77e0fb3cfc1251e97c9fe5605410b251f6c734d3a35c80a1b82aca01995853ed8d248eac392f8e0c09e10f2473003937e70361
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55936fdf370a4500340c6a8c9ea30457d
SHA124264beee13548e8456424a878c22c82696aba47
SHA25668f535cbdd15d1f258e616d4b60214622f567b019ffd31d1e47dda3c9e4b5cce
SHA512432dd16b158f36f86cc69777c47bf112ae7ed9d4580eb4fdf5a10712483552b9ec8345dca9fc7f45cb06c8f0a5153aac9091a90aa3d7b7f3e5bbe8992a64fb2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d894e801848e1938c6105a9bcb3b890d
SHA10d9b1e429fd5c9d9276f52772fcb0142637efecc
SHA256654bb51d3678067ea329ef5c467f01621dd9fd8a1f18d4a4ff629d6b4db6d3a4
SHA51223b4f9f4dda753e0104be8564c8d8f3731487775d961f08a6eea606c11a38e69e480e8663f8054046a36d9b08d9e3174c3e5b180ba42ec279ad28da168a1162b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acabd9d97601741c40c591f8261e9fca
SHA1983e114171560fc7ad880029555bbd1a3f94bb53
SHA25669f5d1d5a15df0024019244c8c10e050c58c0de0e14982053a42689cd5edf02a
SHA51289b76584c1838143ea56e71fe388c82f3668d67850a774a4dae621e12e2023ad52a86a31862bde5f76dcb3bee1eab86e9c4f808252aa949f8dc5332046bf085a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f72d48d48d4d385353b252c91b2fbe05
SHA19bcff7d5065bd470493a5415c193bffe326f7340
SHA256a9216be14422d3be14a64e9cb410104ba931e08a0be2700ab1dca7ee27b49e19
SHA51252990e7fc4065dae33252a46d51e0bc02f6e8dc3f384008abd172001b7c2550caf155da5349a5f1d8cca36fde30c52353e672dcb6813ca931b7ea700ffff5541
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58db81ef6b48d3d76803cb3c854a01526
SHA18ca56b96a3e18ef110ec7d8bb40ca6341c1273bd
SHA256b7a619765f8b27e9a888cbad60a2f715f9e12f395d0c4fd7c1a165139551c971
SHA5125870fec0b6297bfa017db219f02e60ffdae8ae2c68a89554210700a12f19d299c056ad572032408da97a9a9015a6a72705d339609003791d69b211cbad78f657
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516df806d2419d41a00fb3752c99a0863
SHA1834cbc59a21b9ce169f38133a22cb72bc24ec7f5
SHA256a45ce0d1ad647c1616a6cb5bb9da3039654b521ae67ea661bce3d3a11b86248a
SHA512c722c79590b343a472a5cc252e513861eac18d846b5c5b09ac7503891d475f7c6c6e3bb37bb347b52889703a662694ca57498da72c08a2fc4846cf666bd14fd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501a8469bdf97b7f08ee8e08c78197ea1
SHA1e83f6f372b5d281dd6bd2723ae9e6f65d62ca820
SHA2564e87fc5c9090fbb1dc56a47658654ca68bfeea7669406c033f902da9f9c09d6c
SHA5122478f5114353a11dff8df130f8ba1b9515f979b4a95f9a7ff8f7a6de205e219bcd6d063cb12350b795e8131fa5f866b1b36d7fb769ae6de067b5a3b2e556eb7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570d90dd42e5338a358fe60cf9218a82c
SHA1fb45cd30b8a8dd6adf67d69bf5b74a9b5595f388
SHA25617a671256b5fdcc82acb43999b9bfb1c7c32528a41f1c2db5dd100af521ec918
SHA5128c1093cd6c0aaeac0887f476f398af7dc3d43cafe7c4f0e50cdf139d97529bd618befbf121420ff6d9e2cc8aa5f488e5f0eddba8d09825c538207cc4f85a843d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b9af0e3a62b413ec05b6bfc9769f247
SHA179a30c96c95fbaa30e600cfd91b1018688889a47
SHA25608c8f737f743edc1934d716edfb891e03f8d694360d6ad4d2fb67abc16ab8761
SHA512ad29b3a128978013c45d90a5c4a6fdce1068d4d1d05759de49e9d8d6f3aec6a2324883f7b7f32664fb3c53d33f41394878193258234ee5a04c1a749483c88bd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5472ee61563621839b27995f5863987c6
SHA166d550097c657e8c4965ba3e68d248bbfe612b1c
SHA256c76849bad2c454829b1262b4d43d659919cbbc3ca9945e919c82ae6ce7431a9b
SHA51262c3eb49db30c1de3792dc667390cf9d64ae6fc93de095a27725c53fe83669d19633d867ad2655294d554cc855abeb0f12ed658b7dbefc0c98690a49acc8ba49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a436b19a08b5f7fe6ddb92fc8d526df3
SHA14d2f39b9e878d7741721341ddc7823842fb2647c
SHA2568362104d24a8f845ec6bbc105e077e6c0b256e3376960c73604428b632286f39
SHA512247acceb03040b42d9b61142bc9f68d98220cdd32f3dbdb0cf8356de3ea1d1dd55e68879c9e56b9386baaa071a404d22400b48f933e46a1f6113463fbe1b3d77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ceea47783553cc99a055bcd6bb5bda2
SHA123f2a9d738c62a18b629db0694c563c6a3a0cdc0
SHA256e274964f3f5ee0eae88b3dfff96df53144ef08ca562a3c6757a90ee80171e4f1
SHA5120f81d8482db0949fba19a2b31f039331c5c1dd6847699b0153b0da9a98b96dcadff167171c02ed8410026645ba2bb7b141783b7e1783da2c9d749d0a9ada6718
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518d67c8ef657cd16dc6dd477ee59da2c
SHA18f5db9a58d3d06e4579aa411ffc4dfd96158d1b9
SHA2563c4efaeea8b098ff7665ebaff6d90292e580ae42a511ca93263103f0c20162b4
SHA51202b6c5b6e790441849ed9a3fcb5bbd33289b8e83993c2af1a3845e2e229f86853eb560f694017fa5ade6b5dea78de562259b503c1e01184633791f9efde1b55c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcd0cfcdd222a540866e8d6613fb7a82
SHA1ee9782e51af83c15755be25f862b1e2d6fd9a0de
SHA256df202598bf7eb4b71c66dc6f53cefc0d01d236e4eb1e1cbbf45ab544b3c48e77
SHA512fa46da2f2ed6596b0f4dc5492c80e020d6019698201cacf3069c5ff338e3b909c8e0ff78e9ec864e9802b30114260101d8b07ed5ef09ec3cd8ced5d9231d956b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578ab9a8495f4daca096c5a43420c3f89
SHA1d1fe72f156177a7ac9b9d2201817272cc86c87e5
SHA25648ee8667fd86b19bf95a2267fcdb81cceedbb5854dc5353adb5ad2447795bedf
SHA5120f18248b16c2bbeb6a59756ca3bc0a8b055476aa04fad947b14130ad58faf74d97a90c670436795df7dd9aff1395ac7dd339ae37089bf4b58bffdc698a14f4bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508ec45c2af5c06946394e46b83e1c3bc
SHA16e39bbd48c7420b291c03449dc6f6cf1f57412d9
SHA25612ca83ed27a3c2b58f56949bf87cea94f2c8ff61af3919d94dea307f5eefd90e
SHA5122342a8b7162c867ac39b4c67e88f798b9d4fdb2127c072d024047b881b4ebe6e9b6e45881fe6da008e5e06bbf9162ca48290c8fd65045794106d3d4cbfb539fb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z2D3H3V6\bGAvsRKSf[1].js
Filesize33KB
MD554285d7f26ed4bc84ba79113426dcecb
SHA117dc89efec5df34a280459ffc0e27cb8467045ab
SHA256b0754afe500a24201f740ed9c023d64483ca9183fa6361d759bb329462d25344
SHA51288afabcad8dbb0f49cdea27c64783ec98ece295f139d50029d524950a5b40a7971f033529f7b60e5acdef5f0576bdcf107fa733bf439cc76693b654ebdd9a8df
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b