Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
21-08-2024 02:29
Static task
static1
Behavioral task
behavioral1
Sample
b1c97c28f777d5aae454ae910788b3b4_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b1c97c28f777d5aae454ae910788b3b4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b1c97c28f777d5aae454ae910788b3b4_JaffaCakes118.html
-
Size
53KB
-
MD5
b1c97c28f777d5aae454ae910788b3b4
-
SHA1
e7472a43695846d8b2d00c3fce12618826ae9489
-
SHA256
2cf6a8a690ec54abc3d23798d1c6fdb7e06713b5167d041567518d548ab640f1
-
SHA512
453083d1238356846fc50e4362d3c991a52862c9dbfdcd9eb3d1815896a228933ad1787c941404b3c86b13e76abed0fe03a124e1d94638af67aaa0162299ed63
-
SSDEEP
1536:CkgUiIakTqGivi+PyU8runlY863Nj+q5VyvR0w2AzTICbb5o9/t9M/dNwIUTDmDp:CkgUiIakTqGivi+PyU8runlY863Nj+q+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430369252" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000be38d72f3e759204038abd7def3f17056cebcf4b1fc068801a06021098185ab8000000000e8000000002000020000000466d9a0a0b49e3f13d9b9ede4309a76f84f4dfc7618ddde84c6dd9b8033922ed20000000dd897d0af34c0f9c451bd9d0aaf04fe7fc7432cf01d978619f1de64af87b15ad400000008cb2c9fb7b3bd78a41441151ad3b808febbef78f10c858a64cdaac9541efea722d46ab7433bb60adea975f92caeb7e4f6122d8d909e0743ecaa820a6da315edd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3A228091-5F65-11EF-BDB6-FE3EAF6E2A14} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b041921172f3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3012 iexplore.exe 3012 iexplore.exe 1988 IEXPLORE.EXE 1988 IEXPLORE.EXE 1988 IEXPLORE.EXE 1988 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 1988 3012 iexplore.exe 30 PID 3012 wrote to memory of 1988 3012 iexplore.exe 30 PID 3012 wrote to memory of 1988 3012 iexplore.exe 30 PID 3012 wrote to memory of 1988 3012 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b1c97c28f777d5aae454ae910788b3b4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3012 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c42fed118eb6687febde716b6988dd0
SHA1bc75261120a52dd5ada77e8f73578969a567e10b
SHA2569b6022e3a8caacb6ceaf90f0a153fdfe17910450f4398e617eeee17d94a89bb7
SHA512aae8073b7d2068c13c1bb140bf7ecdb63fa17df5e72e2342e46c9d3f8b1a7755ebcc2b66136b78ba05dc9d3a3fb1663a1a183f97755402dc3cee9ce31c630cc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588b6698017b952308b0da83a33b112da
SHA1664549a1bd2baba48380f541968e3304d25615fe
SHA25627265206da4c171ae15b3eaf59182109c1da2a574caf883f07002eb46fd2fdf1
SHA512a4426ebad59ebd187ce1fde5f8b33de89e5ed26672b0d502be974917c908eddb27977a80910573885281619b967ac5a35c5d53d777621620ced12222e3efafc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdf23c57733440ad27402af37b388463
SHA1b33319859e66a9600d5fa880e81b662e17695771
SHA2565f226883767c585572cb363c1f2add4f5d4174a657d275fcab711f602c3c93d4
SHA5126997abb6e0fb50e647cc002c17973a654fa1ce8f4cedec991caf59da0a0813617a34f7d241f9a562b8cf77f834071f0ebc56e7a661d0e5465c96e7c044b238d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c9d1956a3dab25db7949462d00d1733
SHA1dae659085039b70c22de24d9bef5bf0a8e1be8d9
SHA25660f15cd871b4ffe273d08086aef67b3eaab4f97b7be3780e3fc9131b724ce466
SHA512361fca0ca596f2b51487d061cda6e16312aa260efd7e6b0e1189cc55a70ccc6b46b956b86b7fe04975949cd41aadc11e1c1e67a478971569728c0b4514ec117b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab3775932a18e6256eb75f491aafcbb7
SHA13b21c8c263d9c6fa009fb9a2740639f7676e5f68
SHA256fbf49444580f9c954e524604e723a4a63c95afcd5127ef80dbc000399581cd4a
SHA5125d9a4caa02e4038329a1a0fcc0ca6b902204dd2afda392977c1853e10bc81efa5b5c3a885319ddc81b20e0605bdaa46b142e75f814b94c67deb844a1481d7c3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4ce7d418f2c430921ee221c5c234bfc
SHA1bce41d941a4105fa6883b35f373f05037b37e232
SHA25608565af0b99c96dc51de63472ee6f7266c3152c7f22df750d2587323b5e0ca1a
SHA5123ae884478fed46e4a49bcbbc090a024d88803b324dc78a4b94f518c9fdfd2c23a1cb1284d218cc39b66a168bfdc72a346626a8906071318e4294e87f3a051c3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd83a7ba1c83e7f327d61bb74b57f1e7
SHA1b263342b9548da0f1d765bce7ce3af6350a93ae7
SHA25608e249cfb96e609a818bab502d6045db41364efba30ad1062d8306c7e836a73f
SHA512a176f3cde47dc501915370989969fe5bf260aeb5c22df9b3c918b2be5bb8054e2b7b5f04fdf31a6f1da7d118647fd908faa3c391c813681e6066dbf9ab6d9be5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd8ac31e292dc66067a84c76d9716298
SHA19ea0da15cd006ae9845f5f29005e8020189a823c
SHA256ff1994b1fca09b977bb717b8bfd2703acead96b64f5ee1580e28a58fc30ef4c0
SHA512053e93bbd2d3c8c06593675e134e1663c96c2470680e4236d2bc4b082d441106b97668be61cece5ee653750fba44ef896f3e4466cf49367ed2c36a0fe11e9523
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f3caf821fbfb9e5f62e07e3397e8d36
SHA1d8f2eb2796b920bf79f2010920cd287dfa80a262
SHA256da56381cfa23b61f8129ab53808172852717ef279a62889a26cc7a8a4526027d
SHA51283ed1e617b1bf41581fc4854499c152814ac511bdc9bb71fa52ca819275e6f7a0fe75af00103c0adc1656b74913084796960efc972c0be5c38371580d0edae95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec5ca4adad455285ff2001320a68cc52
SHA1186db28def08efeab7e60b918459feb906caec41
SHA25651c18cb1c87d2223f0544b5c91f9b527bfaf72e508fc841a79da43a5b3ff0c43
SHA512074bc94bd942c60783f383c797f65b6b5acbd644aba352d01f25aa7b2c4997a26b797aa0472bb9646cba6cf4abd08c826b8889ede0fe721f631266148df77a25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57266c0a5c35f6d8cedfee25fccee5b97
SHA156792b09c3f6e09b96611a514670fa88605cd874
SHA25641b9c0d6bd4aab8fb49a9d6616512a211272285e05f31d148a03baf267115e5a
SHA51256d992ea3cdc5ec7f2f337056826bee9d64e4c76a53f2ca02a3d71b24c4da7f8a0c70bb0cc787e34500991729a331bc5b47be55a04fa0e9cd8e3f37229425fba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599c876de67e6385c404505d6b703189b
SHA145e8b15ff1eaf886a341f135b6912095e5469882
SHA2560bec7a3da09d6754a1c5409e3423be4f3098525873dacdb5333964d0cb659dc6
SHA512502ad506b36be25dc50e9bc1df6c9b12c3fa8af20c468bdb9f754b52d7b224eb518331fe37a99ae3dae568694eafdf97f618545ecad42102f91f8ad36774fb6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d67d2610ce81b8079fee28f72e829501
SHA10d85dc49906e1fc4c551db1ee703d895ed9ec790
SHA256279d42ff93cdcecf92e87b07f1c40e91aba2305b2766506c11a00d52d06d4ea1
SHA512a94cd410fcc593fc39b1fc2ed65a3dac4620738fb72b163046d29a69c5ad708c9e0a0763a35c5882b90ee6aab87d2c5d35a66bc7d6b15a583303ab3808d02c7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56899c16fd8d18a4a189feef458b1cc47
SHA19e36bbe7fce67d6036d9b783ad67af770d791739
SHA2562be1bbf5612ff883ea5c20ab54f0038cccde4b8a2ff223250510eb182c49f6f4
SHA512fdd35c172c6dab463c863d767091c9c71a718bf46148ee81aaae3267961b63124d21bf4c9d96b22bed029b8ccb4e76cc3a1eeadf98b592edcf00246f4317b97e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5007cdd7800063ebd6abadb6ba2e8a960
SHA1f978d1b32ed560ea807af1f9bcf14f271195b6c3
SHA2569f88286c0d60a062f3a78427e860b43066c91a975f23030bd9873ad325dd8660
SHA51238bc67fef4e0c263f564eeb974b983117e588ffc25120e5ba2618a02ebab306598d84549d3468c57acc337aea81f8198d7a164fe4f7ec75c66eec4eed3239662
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5269cfd13cb742ab17e0b94e473e1517f
SHA1a166288193177a74f6e640b4db481f8ce9549a46
SHA25603ea6828d1c70b2136acb215c2169fe1a9492ea27570d3700f3dd71fdffe06f3
SHA5122cca4c50a9ae2bf5f091ab84dfb2feea7d98fd7b37ec98d73df54dcfc2077961ec939c0a7593c44303dab26b3f5f05a5bd836573c09196909dd37d5e90a9b509
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecc0ef9522665bcfe5019193b2d2ee69
SHA136839f62d1fc556129ed2eaeff03f40d0973d778
SHA256033b88557f715e41c0c206d0ba6ffdca206972161bd404cf28f78f6306fdb78c
SHA512447d2014cba15577e772e3d9c62c00158dd30294b8388f30eb07423ea8f4918ce7f58506249f35c9c62bbdec8afcf76f097f955fcd9f9222b2b28f3bb977608f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5964ab53d48e8aa74619b4c2fc5a948d4
SHA17102e5c2ae776a1dfd4dfbe614a3693c465c269c
SHA256c6c77a217b71d3da6032dbe5e14b28b60b1c800e98073fb2672ceff3313e452f
SHA5128a2859f9966e1f52e8d3ff06680e79cbc545ff3b6d1325153ac9a2cdaf9838719025f5af6012d2fe3b1da981e4945ca4f1d70aaf0ea6486ec66694f470e96ede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e62ce539777b4bbc0d22f978335dce3c
SHA1597ca8827ef602741ad8a323c1d8facd2736d8a3
SHA256275967a38043d0ab6c5ccd8c2de5f5d6440a4a9521aea992ab3a66be06278305
SHA512a75cb1ff8db8e9fe738c1bfd64289374b15b6721641e726cf28f747af98278c26a303402ebbb057208e236d61108919862ea70207f497232d553ec839a009cb1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5J67VDZD\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b