Analysis
-
max time kernel
144s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
21-08-2024 02:24
Static task
static1
Behavioral task
behavioral1
Sample
b1c5d25960c15e325804299dcbe05fa1_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b1c5d25960c15e325804299dcbe05fa1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b1c5d25960c15e325804299dcbe05fa1_JaffaCakes118.html
-
Size
17KB
-
MD5
b1c5d25960c15e325804299dcbe05fa1
-
SHA1
5b2541e1ee09bce4a29db19cdd6e3f0025d88ec1
-
SHA256
1c0b4092f2d2ee926fbedfabb14859fe8a86a10c7d2d4cde09dabed5010684ea
-
SHA512
69646a8167247287f0c5a34ec2318068678e0a9def3561f5d3ed237029b324d8c8feff3525516390667a99417165334a9118ed42bafd413bc006e113e9d46a39
-
SSDEEP
192:FNXLlIsrkOykLOptC4dxJGTHBu/Jhkh4ISdrqi88k/w1wvqLkw1HR6uBuLbdU8d:jLlIcatC4TJGTHDh4Im2/gRx6guLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0a33d7171f3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{72678551-5F64-11EF-B58C-DA960850E1DF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000f08dcba7fd7804d3bfc967ea069efb36e333deeeef265b3ffcfe728bd0a5e666000000000e80000000020000200000000e7e068c644eb9025751feec2e507bf2aea0c4b1dd9205795135fdd7058f127b2000000025622f1ed96d6824042ef980a23cf3a42daba4843a30a25e7bfcd9b837f184394000000007fc7c345676fd3213a7f70f1d1415003f288a589802da3e7c8aad4210b7e41e016672e6d09b17d0ed3e7134d7614e1979a0a2ff2fc1b3d18ad151062c618842 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430368917" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1756 iexplore.exe 1756 iexplore.exe 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1756 wrote to memory of 2908 1756 iexplore.exe 29 PID 1756 wrote to memory of 2908 1756 iexplore.exe 29 PID 1756 wrote to memory of 2908 1756 iexplore.exe 29 PID 1756 wrote to memory of 2908 1756 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b1c5d25960c15e325804299dcbe05fa1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1756 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579fcd0f636df2f7a26e09ce82908e9ba
SHA1f99785625a6f2e6df7e923e80c60bb5810bc260f
SHA256d8723611eba5cb441391c5c9c37a56ca2d0747db6a347f966ff9e33c1ab803f5
SHA5125404200bb2c9e8386a51e0d37daf92cde78a97ea4b84215a1cce11106991df51d0dcf0e60697957d95cf6922877bac33bc4675115192e77c46eb46794ad556a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559eb84675cedb1167e6cb64cf7d03a4c
SHA14d7745c53696fc28ed0ada71f7e54755d4f4fc18
SHA256c9dbc21cfadb1df2bd7228d0b00ac1a9c64db9efca75cc2266620e6e7d20d08e
SHA5124e6cd6e35b9989f8b9274d2a06f33c3ce9d0ec21131c0811726d1736bb2792c3619068a6efceb9d8da7af430fff8ed24fa9ba57648b9cf76eebc8ea539c99095
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff4c99ec00db2ecee6f608585a6db4d7
SHA106692e52cbbe8d2bee22fa544a0226bc8f9e185c
SHA256eed047ee564aae0290e756666e1fd438a0deeaf31e508ed5051d17037ce44acf
SHA5121d5980354d34de14589fe52fd764852c175e948d538fda879b8afcfdf8a998ee72c8bbbfe7884f2de9b12b59e23ec84e14566b0b8486d383cddac4216245e99b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56561a5931208364c9b58a668a9d5ea21
SHA172974e5dd8613a946a7b518670df4d742c4e9078
SHA25675b17691aac387b600b47f60f3baaf5a5fcdfda432b097e1351433b10d148411
SHA5129af9a5546210426c43c4674b99adfee0974a4cf3b5d535b1edb093694c917e66574ff66c38139fd5c4c900128375def818516247e601d7caa0bc9eb970501e02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e4e6c63138bb072708d90f9abef7ea7
SHA1c6a3e5864ae08b002b112104fbc5c613cf04cf7b
SHA25655a7c804fe3d2bfdf2c41ae6e97b83ba0025269b98265ccf7ee2cc569e4ae7bb
SHA51258d7550888fd4efe158bfd4afe917754a352cc6672fc05e6354a916e4d05ecf08c35401b0f65d704c962905b3c18695de2ff45ac92bd1f829f121cf434708e6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad80cb770fc9725300893685aa6e4b54
SHA1b9cbd34ca0278daf4d53ee5e11f43eb62bf18556
SHA256e2d9889b59bcfc5dad61a3f284c658801a4737652aa9f359e06d16526c10a353
SHA512a06f615681c3066603e43e13beb0b0ab0d77353b95da35475219c14d66e0dd2d7905fdf2f6ea3909444ff0f91de3b1467146a15a343b7ed72e311b2c3cdff5e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c9c97a2fd07d64d2cc440e6426af652
SHA137c3b9f138d7e4fdd994b17dd090bec763b944bb
SHA256540a8ab7b883cfbb5abdcaf875334204242c56623af9203fd998807f190ced19
SHA512e3b645ea853e82b24e40c2a5c47e2346d3fc7cb9138da44b000e67159895b5fa10e2f5b050e43686aafcaa6a07d3362aefcbce5db273f6bc634ccdcfe5126e84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea3bfd54160927ee465f0befc06f3416
SHA1d1e38fc09ebc401212f34be588843bf917199a21
SHA2566d18455592a19049491f43df68d2dde6f7328f4300ee7bc2273840f9ce7a2ccf
SHA5129e61c1bd23b2d33a28b6080393906287236319c617ddcb85091efa7ac37ff58ea743e5f6b9400cecb87e4e0d682a3b9694e91921ba52c48c25f3380c7e396ffc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e67d938ecc890281854828ef6e05434e
SHA12fa04b9c53892553df5f076485921a6a29a8e7e5
SHA2561a07ee1c803800f9e0aeb22f221e35d6f3ef2e170a9d60cf21a38498c1fe21c6
SHA512df6f2f346c3d64d655922da24b8c03341ff6f26cbdbd3b88e5488cc51644c2fdf20062aaeacd06199bad8bb3dd18e00fce0561363c3a17c14522d58a7a2531a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5050eb93b8c4890fa1935f57f6fe8afba
SHA1eecb1806b5fd62a6a366f2cb0be1d3ba22dfb276
SHA2566b29a697875beae68b36991490b46dff796b385eafc595adbef26d6e8160d47d
SHA512196fedfd87c02c1bfbb573380e2974d605b233c4331767fb88466a77931a2b83c8e22d5b549312f7869e629ba566338b13a21da7703cb86b8f16362b2d29c554
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a82e1a98b4e7846a55af2368439c01cc
SHA1c34f8758098c50374e1394da9a7a12183387f01a
SHA2561e2fd907e3be97477ac277f3487d43921147f9a189f59859ca01d600c8905bdc
SHA51283810ea880d30a4b68f3f291e0d9b5931a5aa34abad59116b208124fd215120e7ba09a35c8a41b29043b6bb8b7c0bae967e7d711a28fff86f30a79742b26cc3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5088944f4dd3432862c23bf5ea8ff2fe6
SHA1da56a40cbe528f9319edfc8dc1dc7fe38c421c03
SHA25691dc53dace147c7e323025b6ae2d5e9c72cd6180901341b731eb35d3e0146d1e
SHA512a4ed856c840ff64034f8c968510c08db954e8c4f6a749944ca06050f53d52d2fdc19ee292386f4d311d841b90e1fc9099b10ef27e3abfd5009f5d67ef3bbca2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1cf4b449b0c70df63632b501b96740c
SHA1ec39e7e036eda618077cc9956ba159d0d59ce1d2
SHA25617d0c95bf8f03353a7c1301989dad19d89f79267c7da3b041b3faaa3a78c4148
SHA5126ff62c025fea7fbb36887193216dd53e5cdc728d65b0d4ba435d17c9c6c6f0064c0531c312464f59f273360f309e686d9c26f301a76ac4f9f8d8733506483038
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53410f6c4507c8cc07579f59419ee6b04
SHA188c2f17ecf909ef23b9e2f6e247a53ad87058179
SHA25608fe75e4f2f74d29970f1e05d4ba115a2030aa99c7a7874d5908bff82864eb2b
SHA51255c65b41d5c75ebdf9cb2aa2ea97020f106958f33b711437e6d3505f66829111a434eb2c8720dd519e736d8a2644f637c7b0eebf9167430adbfc881c8f00660e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5633798e0cd0618010434e97e0309cd
SHA1bde0184fc41a34a862ff858b46f23d2d6aa413c4
SHA256ab116ea5547f432faea0849a6af0c308d4b4e0eb4822663a70bf4c0d1ff31ba0
SHA512cb5f108cdd4f4cd8680338f2de765d975394af13b053c0434eca3fa2c41443c079f56cb932e73799888835ae03838e1a02fcdca0e1cec508ef668269f8cc6b56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d40f8faaabdebb92fd08fe93d52609ea
SHA11e2c3eea5caa6fa4741298a9bc4069c54df945c2
SHA256b5dd8130dc1e3610a5b4b208f41b49a710ece31eb706086843c9efdb39f2d5d6
SHA51245c4448d7df1e124220630144387d39bbfb5dc3ee085fc941d32ec100ace39a03792c8c4cf8291540a781eb3c28f0758ee26705c2bacb1aebca3798e258128a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e0aaec692f8bd25e0b41a8849880d53
SHA19c27ffbabf2fce6059c0a20f04553a7feccc541a
SHA2566f156dc025b421d0e58eebf41f6052efac3157c648827f0775be420e5d54a0d8
SHA512bd784b3c847fdda14a8c62d821e1bd9b28c46624c02ab8b6cc6cca86cffb2386fa80bab92e8d66d2ef00d70443e4e3feb0c862136049d023eb1b31eba857e3cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca5578b09c786c018a5d195ef402fa09
SHA1bb2a68cc0c1cbf9829a08882de6633127aa34e1e
SHA256c398d3a22ded3b849aa893954850e94a490bd22de150a3ecd3d7ef14bafe4179
SHA5120654b9b6c176ca771698e889af54c2b6a5863a1e362c7facf2b5599cb4c4fb93f3b2496f0c1dca786e6b7f38c27a02d654e3de0000c1598c82d703f0598c27c9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b